Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


My Prezi

No description

Shravan Jaiswal

on 28 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of My Prezi

NETWORKING Applications...:) VIDEO CONFERENCING Security Security Definition: a form of protection where a separation is created between the assets and the threat.
It is in short about managing risks. This guy just said something on protection of assets.
"ASSETS" hmmmm.... Data Data is a very important asset
Networking has also made online trading and Business a Success
But to these assets there exist "Threats" Secured Entry Password Required: ENTER PASSWORD: ************************ ACCESS GRANTED Wildlife Conservation what is ........ NETWORK, is a collection of computers and other hardware
components interconnected by communication channels that allow sharing of resources and
information. web hosting ? let's begin with something you're more familiar with................
a website. did you ever wonder how a website was buit? This is a normal site. What do you mean by..... network security main ek bodyguard hoon aur data protect karna meri duty hai!!! jo tera (i/p address) hai wo mera hai...
i.e.illegal claiming of another's i/p
address before a website is accessible through the internet,it goes through several processes... even after the design job is done,the website is not 100%complete yet. firstly,you may need a web designer.he/she will design the web page based on you're needs. this is because the design files are only stored..in the web designer's computer.
and not available on the internet yet. How can we get our website connected to the internet so that people around the world will have access to it so the web site have to be present on the WORLD WIDE WEB. To get your Web site to a Web server, you must publish it. To put your site on a Web server, you publish it. Publishing generally means copying all of the files to a remote location on a server. Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.thissongissick.com/index.html in your browser, this sends a request to the Web server whose domain name is thissongissick.com. The server then fetches the page named index.html and sends it to your browser. The cPanel, also know as the Control Panel, of your account is where you will be able to make changes to and customize your hosting account. This includes but it not limited to: cPanel is very robust software. While there are quite a few tools available within cPanel, with navigation icons and a full help menu it is easy to use. If you have not accessed your cPanel before, please read the next section for information on logging into your account cPanel. File Managment - In the cPanel you can create FTP accounts to access your files, and also use the File Manager to modify your files directly. Domains - You can configure new domains with your account, setup Parked Domains, and also create subdomains. Email - In your cPanel you can add new email accounts, check your email, modify your MX Records, change your email passwords, and much more. PHP is a popular scripting language that is designed to produce dynamic web pages (e.g. login pages, shopping carts). PHP code is embedded into the html source of a website, and is run on the web hosting server rather than on the browser. So, if you look at the source code of a PHP web page, the code that you see is just plain HTML. Since PHP is a universal scripting language, websites created with PHP are fully compatible with popular mobile devices like iPhone and iPad. A large number popular websites, including Facebook and Wikipedia, are written in PHP. Types of Attacks: TYPES OF NETWORK THREATS DOS(Denial of Service) Sending more requests to the machine than it can handle. what does the machine feel? UNAUTHORIZED
ATTACKS DO? 1.Executing commands illicitly
2.Confidentiality breaches
3.Destructive Behaviour
4.Data diddling WHAT ARE THE
MEASURES? 1.Have backups
2.Don't make important info easily accessible
Stay updated with the latest OS patches
5.Bastion host
7.Access Control List
8.Router A group of components that
effectively form a barrier
between two networks 3.Hybrid Systems 2.Packet Filters 1.Application Gateways TYPES
OF FIREWALLS Network Security
Devices WHAT IS "APACHE"? it's a web server software playing a key role
in the initial growth of the
"WORLD WIDE WEB". SQL STRUCTURED QUERY LANGUAGE is special-purpose programming language designed for managing data in relational database management systems (RDBMS).
Originally based upon relational algebra and tuple relational calculus, its scope includes data insert, query, update and delete, schema creation and modification, and data access control. THANK YOU!!! PROPERTIES...
•Facilitate communications
•Permit sharing of files, data, and other types of information
•Share network and computing resources Communication media 1.WIRED TECHNOLOGIES 2.WIRELESS TECHNOLOGIES Coaxial cable optical fiber Few of the major applications are... There are a lot of applications of Networking Radio and spread spectrum technologies NETWORK TYPES How Network works •Computer networks are connected using network interface cards (NIC), hubs, routers and bridges or switches. A hub contains several ports that allow several computers to connect to it and act as one When you connect to the Internet, your computer becomes part of a network. Internet Protocol: IP Addresses Every machine on the Internet has a unique identifying number, called an IP Address. The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet. URL: Uniform Resource Locator When you use the Web or send an e-mail message, you use a domain name to do it. For example, the Uniform Resource Locator (URL) "http://www.howstuffworks.com" contains the domain name howstuffworks.com. Every time you use a domain name, you use the Internet's DNS servers to translate the human-readable domain name into the machine-readable IP address Internet Servers and Clients Internet servers make the Internet possible. All of the machines on the Internet are either servers or clients. The machines that provide services to other machines are servers. And the machines that are used to connect to those services are clients. 1. Online Transactions 2. Video Confereincing 3. Social Networking 4. Wild life conservation 5. Applications in Business That clearly suggests the first application Online Transactions Online banking (or Internet banking or E-banking) allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society.It may include of any transactions related to online usage. •To access a financial institution's online banking facility, a customer having personal Internet access must register with the institution for the service, and set up some password (under various names) for customer verification. •To access online banking, the customer would go to the financial institution's website, and enter the online banking facility using the customer number and password. Though single password authentication is still in use, it by itself is not considered secure enough for online banking in some countries. Signature based online banking where all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation. That takes us to next Application called Video Conferencing "This new world of geographical togetherness has been brought about, to a great extent, by man's scientific and technological genius. Man has been able to dwarf distance, place time in chains and carve highways through the stratosphere. Through our scientific genius, we have made the world a neighborhood…”
-Martin Luther King Jr. Video conferencing in its most basic form is the transmission of image (video) and speech (audio) back and forth between two or more physically separate locations Video conferencing Components: Cameras (to capture and send video from your local endpoint) Video displays (to display video received from remote endpoints) Microphones (to capture and send audio from your local endpoint) Speakers (to play audio received from remote endpoints) Codec - "compressor/de-compressor“ - A codec takes analog signals, compresses and digitizes them, and transmits the signals over digital phone lines. The Supporting System and the Network Connection Types of Video Conferencing are... Point-to-point Conferences: A video conference that connects two locations Each site sees and hears the other sites at all times Multipoint Conferences: Video conferencing can take place between more than two people infact it can take place simultaneously at multiple locations The third type of Network Applications is Social Networking A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who share interests, activities, backgrounds, or real-life connections A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging Different softwares and laguages are used on different social sites.
e.g Facebook use the servers which runs on LAMP (Linux, Apache, MySQL, and PHP) Connecting World... The Fourth type of Application is Wild life conservation Preserving the legacy of the Kalahari bushmen, today's bushmen trackers continue to successfully track animals. They can follow nearly invisible animal tracks and identify the animals that made them, when they made them, and even what they ate along the way. A very unique example of a computer network is in conservation of wildlife.
This is an example of a animal preserve that spans parts of South Africa, Namibia and The Congo - modern technology has partnered with an ancient art to help protect the wildlife. Last but not the least: Applications in Business Everywhere in the world, business companies are constantly looking for effective ways to save money, either by using their existing resources to be more productive or by cutting down costs, but without possibly losing any services that they rely on. Most business companies of today are pretty much depending on the internet and broadband services to market their business online to worldwide customers, website hosting and telecommunication. Things to do with online network connection to maximize its usage Virtual Private Network (VPN) Voice over Internet Protocol (VoIP) VPNs typically require remote access to be authenticated and make use of encryption techniques to prevent disclosure of private information.

VPNs provide security through tunneling protocols and security procedures such as encryption.

Their security model provides: Confidentiality such that even if traffic is sniffed, an attacker would only see encrypted data which he/she cannot understand Allowing sender authentication to prevent unauthorized users from accessing the VPN Message integrity to detect any tampering of transmitted messages VoIP is a communication service available for free as long as you have an Internet connection.
This is a great saving way for both micro and macro businesses.
But you have to remember that only VoIP-to-VoIP calls are free of charges.
For VOIP calls to any regular phone line, you may need to make a subscription or you simply need to pay a fee for the call. 1.Secure modems 2.Crypto capable Routers 3.Virtual Private Networks(VPN) Online Banking and Shopping African tribal woman using a hand held gps Teaching locals how to use a gps By:
Dipesh Bariswal Gaurav Dudwadkar
Shravan Jaiswal Radhakrishnan Iyer
Mandar Kadam Praharsh Jha
Keith Fernandes Tushar Daware
Pratik Dhargalkar Thank You
Gaurav Dudwadkar Shravan Jaiswal
Dipesh Bariswal Radhakrishnan Iyer
Mandar Kadam Praharsh Jha
Keith Fernandes Tushar Daware
Pratik Dhargalkar
Full transcript