1 / 110

Internet Protocols

Internet Protocols. www- World Wide Web. Developed by European Laboratory for Particle Physics to allow information sharing between internationally dispersed Physics scientists TCP - Transmission Control Protocol IP - Internet Protocol HTTP - Hyper Text Transfer Protocol

joylyn
Download Presentation

Internet Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Protocols • www- World Wide Web. Developed by European Laboratory for Particle Physics to allow information sharing between internationally dispersed Physics scientists • TCP- Transmission Control Protocol • IP- Internet Protocol • HTTP- Hyper Text Transfer Protocol • FTP-File Transfer Protocol

  2. Cyber • The word Cyber is derived from the Greek word Kubernetes meaning steerman. It is used in computer or electronic context. It denotes the control of a thing represented by the word that precedes Cyber. Eg. Cyber crime

  3. Cyber crime • Cyber crime includes the use of a telecommunication device such as Internet or Mobile phone for activities such as Fraud, Theft, Forgery, Harassing, Threatening etc.

  4. Online Cheating • Phishing • Spoofing • Pharming • Internet Auction • Health care Fraud • Online Gambling

  5. Safe Online activities • Stay anonymous- choose a genderless name 2. Never give name or full address to strangers 3. Don’t respond to harassing or negative messages 4. Avoid uncomfortable situation quickly

  6. 5. Watch what you say- don’t flirt online 6. Learn more about internet privacy 7. Don’t give email ID to strangers 8. Frequently change your password and answer to the ‘secret question’ 9. Don’t disclose your password to any one, not even to your friends 10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud

  7. IT Act 2008 • Computer & Mobile Related Offences • If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two to three years or with fine which may extend to five lakh rupees or with both.

  8. IT Act Section 66 A • Punishment for sending offensive messages through communication services. • Creating or forwarding any electronic mail message, images, videos etc for the purpose of causing annoyance or inconvenience to a person. • Non-bailable offence. Shall be punished with  imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.

  9. IT Act Section 67 • Punishment for publishing or transmitting obscene material in electronic form • publishing or transmitting any material in an electronic form through SMS, MMS, Blue tooth or email.

  10. IT Act Section 66 E • Punishment for violation of privacy. • Intentionally captures, publishes or transmits the image of a private area of a person without his or her consent. • Shall be punished with  imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both

  11. Chat Rooms • Take extreme care during online chatting and browsing blogs and web pages like Orkut. Hackers are waiting for you • Do not reply to anonymous messages and do not give mail ID or full address in such web pages • Use a genderless login name while creating e-mail ID • Frequently change passwords

  12. Online Chatting Take extreme care during online chatting and browsing blogs and web pages like Orkut. Hackers are waiting for you

  13. Cheating Web sites • Pop up Ads • Pornographic sites • Cheating key words – Boy, Girl, Toys, Games • Cheating websites. Original site – www.kerala.gov.in Cheating site – www.keralagov.com Spoofed Websites

  14. CELL PHONES • Perry Long invented Cell phone communication system in 1940. • Erricson in 1956 developed the first fully automatic Mobile phone called MTA(Mobile Telephone system A). This was commercially released in Sweden.

  15. In April 1973, Dr Martin Cooper, former general manager for the systems division at Motorola, invented the mobile phone prototype and made the first call to Joel Engel, his rival, head of research at Bell Labs. 

  16. Mobile Phone Systems Two digital mobile phone services are. 1. GSM ( Global System for Mobile Communication) 2.CDMA (Code Division Multiple Access )System.

  17. The mobile phone system is referred to as “cellular telephone system because the coverage area is divided into “cells “each of which has a base station antenna.

  18. The system consist of a Base station antenna which communicates with the mobile phones through Radio Frequency (RF) transmission in the 2.5-3 Giga Hertz range ( Microwave).

  19. The mobile phone tower can communicate to 8 mobile phones in 1 second through time sharing method. The signals are in the form of packets to give two way transmission.

  20. Mobile tower and base station

  21. How it communicates? • When we talk on the mobile phone, it takes the sound and encodes on to a continuous “sine wave”. The sine wave radiates out from the antenna of the phone and fluctuates evenly through space.

  22. The signals moving in air are electromagnetic signals. These waves are picked up by the receiver in the base station tower. The base station antenna emits radiations continuously to make a link with the subscribers.

  23. Time Sharing The cell phone tower can communicate with 8 mobile phones in a second. This is called time sharing

  24. Mobile phone evolution

  25. GSM & CDMA Phones • GSM - Global System for Mobile communications • It is the most popular mobile phone standard in the world. • CDMA - Code Division Multiple Access It is the channel access method utilized by various radio communication technologies.

  26. CDMA –GSM Phones

  27. GPS Phone GPS or Global Positioning System is the navigation device used for the purpose of determining the present location of a person. GPS is used in military, aviation, marine, geographical surveys, site mapping applications.

  28. GPS Phone

  29. Satellite Phone • Satellite telephone,  is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites.

  30. Smart Phone • A new introduction in mobile technology. • A smart phone offers advanced features, like a computer. It e-mail, Internet browsing and e-book reader facilities in addition to usual facilities.

  31. Smart Phones

  32. Mobile phone parts

  33. Mobile Phone technology

  34. SIM • Subscriber Identification Module (SIM) • The SIM is a form of digital Smart Card containing the user's subscription information and a phone book.

  35. SIM CARD

  36. Secret of SIM • SIM Securely stores the service subscriber key having 15 digits • First 3 digits – Indicates Mobile country code • Second 2 digits – Mobile network code. BSNL, Airtel, Reliance etc. • Third 10 digits – Mobile station identification number. Local station that is connecting.

  37. When you first activates the SIM card, every details like, mobile phone make, pin number, area code, area of activation, server code etc will be recorded automatically in the SIM as well as in the server data base. • So it is easy to trace the mobile communication and location if there is a complaint regarding misuse.

  38. Mobile Phone Terminology • URL – Universal Resource Locator • iPod – intelligent Portable occular device • MPEG – Moving Picture Expert Group • MP3 – Moving Picture – 3( Audio layer 3) • Wi-Fi – Brand name of Wi-Fi Alliance-WLAN

  39. GPRS – General Packet Radio Service - Blackberry system VoIP Phone – Voice over Internet Protocol. The most common type of VoIPis Skype.

  40. EV DO • EV-DO -Evolution-Data Optimized • It is a telecommunication standard for the wireless transmission of data through radio signals. It is typically used for Broad band Internet access. • Example is Wireless modem.

  41. Bluetooth • Blue tooth – It is the technology of Open wireless protocol used for wireless communication between the mobile phone and other Bluetooth activated devices . It is named after Harald blattandBluetooth II, the King of Denmark

  42. Cell Phone A Real Friend…… But… Inconsiderate, Annoying, and Stupid in public places

  43. Like millions of others, you may be the victim of cell phone abuse. • What is cell phone abuse? Let us imagine a situation ……..

  44. You are in a public place trying to concentrate on something or in serious discussion with your friend or enjoying a peaceful moment…… • A stranger 5 to 10 feet away starts talking on his cell phone loudly……

  45. Your concentration breaks or your conversation ends or your peaceful moment disturbs……. • Now you are a victim of cell phone abuse. • You may develop one or more symptoms of cell phone abuse

  46. Symptoms of Mobile abuse • Inability to concentrate on what you are doing 2. Mild or severe irritability or annoyance 3. Sensitivity to ring tones 4. Initially thinking that the cell phone user is actually talking to you

  47. 5. Wishing that the user would finish the call 6. Wishing that the user would leave the place 7. Wishing that the battery would die

  48. Cell phone abuse results in • 1. Cyber crime • 2. Invasion of privacy • 3. Health hazards • 4. Social problems • 5.Psychological problems • 6. Financial loss

  49. Radiation Hazards of Mobile Phone

More Related