Computer Network

What do you know about computer networking? well here we will discuss a little about the existing computer networks so far. At its base, computer network  consists  of two parts, is:
Wired technologies
  • Twisted pair wire is the most widely used medium for telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer networking cabling consist of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 100 million bits per second. Twisted pair cabling comes in two forms which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are rated in categories which are manufactured in different increments for various scenarios.
  •  Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second.
  • Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers that carries a data by means of pulses of light. It transmits light which can travel over extended distances. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed may reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than a twisted-pair wire. A recent innovation in fiber-optic cable is the use of colored light. Instead of carrying one message in a stream of white light impulses, this technology can carry multiple signals in a single strand.

Wireless technologies
  • Terrestrial microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx, 48 km (30 miles) apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.
  • Communications satellites – The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 35,400 km (22,200 miles) (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.
  • Cellular and PCS systems – Use several radio communications technologies. The systems are divided to different geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.
  • Wireless LANs – Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radio-wave technology is IEEE.
  • Infrared communication , which can transmit signals between devices within small distances not more than 10 meters peer to peer or ( face to face ) without any body in the line of transmitting.

There is little that can we submit, may be sustainable in his next article. We are corrections from readers.

    Operating system vulnerability to viruses

    Not much different from the human body which sometimes susceptible to disease due to no body's defense against attack. This is of special concern in the 1990s, when Microsoft gain market dominance in desktop operating systems and office suites. Users of Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) is vulnerable to the spread of the virus. Microsoft software is targeted by virus writers because of their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated and non-integrated Microsoft applications (like Microsoft Office) and applications with scripting languages with access to the system files (such as Visual Basic Script (VBS), and applications with networking features) are also very vulnerable. 

    Although Windows is by far the most popular operating system is the target for virus writers, viruses also exist on other platforms. Any operating system that allows third parties to run the program can theoretically run viruses. Some operating systems more secure than others. Unix-based operating system (and NTFS-aware applications on Windows NT-based platforms) only allow users to run executables within their own protected memory space. 

    Internet-based experiments revealed that there are cases when people are willing to press a certain button to download a virus. Security analyst Didier Stevens ran a half-year campaign on Google AdWords ads that say "Is your PC virus-free Get it? Infected in here!". The result is 409 clicks. 

    In 2006, there were relatively few security exploits targeting Mac OS X (with Unix-based file system and kernel). Total viruses for Apple's operating system older, known as Mac OS Classic, varies from source to source, with Apple stating that there are only four known viruses, and independent sources stating there were 63 viruses. Many Mac OS Classic viruses targeted HyperCard authoring environment. Virus susceptibility difference between Mac and Windows is a chief selling point, one of which Apple used in their Get a Mac ad. In January 2009, Symantec announced the discovery of a trojan that targets the Mac. This discovery does not get the coverage that is until April 2009. 

    Meanwhile, Linux, and Unix in general, always native blocked normal users from having access to make changes to the operating system environment, Windows users generally do not. These differences continue in part because of the widespread use of an administrator account in contemporary versions like XP. In 1997, when a virus for Linux was released - known as "Bliss" - leading antivirus vendors issued warnings that Unix-like system can be a victim of the same viruses as Windows. Bliss virus may be considered characteristic of viruses - as opposed to worms - on Unix systems. Bliss requires that the user run it explicitly, and can only infect programs that the user has access to modify. Unlike Windows users, most Unix users do not login as an administrator user except to install or configure software; as a result, even if the user ran the virus, it could not harm their operating system. Bliss virus never became widespread, and remains mainly curiosity research. Its creator later posted the source code to Usenet, enabling the researchers to see how it works.

    Computer Virus Infection Strategy


    In copies of itself to grow in your computer, the virus should be possible to execute code and write code into memory. For this reason, many viruses attach to executable files that can be part of legitimate programs. If a user tries to launch a program that is infected, the virus code can be run simultaneously. Viruses can be divided into two types according to their behavior when they run. non-resident viruses immediately search for other computers that may be infected, infect these targets, then transfer control to the program an infected application. Resident viruses do not search for hosts when they started. Instead, you load the memory resident virus in the execution and transfer control to host program. The virus remains active in the background and infects new hosts when files are accessed from another program or operating system itself. 



    Non-resident viruses 
    Non-resident viruses can be considered as composed of modules and module finder replication. Finder module is responsible for finding new files to infect. For each new executable file finder module meeting, she calls the replication module to infect files. 


    Resident viruses
    Resident viruses contain a replication module which is similar to what is used by the virus overseas. This module, however, is called a finder module. The cost in the form of virus replication in memory when running, however, and ensuring that this module runs every time you call the operating system to perform certain operations.Replication module can be called, for example, each time the operating system executing file. In this case, the virus infects all the right programs running on your computer. 


    Resident viruses are sometimes divided into the category of fast infectors and a category slow infectors. Fast infectors are designed to infect as many files as possible. A fast infector, for instance, can infect every potential host file that is accessed. This poses a particular problem when using anti-virus software as a virus scanner will have access to all files that have the potential to accommodate the computer when you run the analysis at the system level. If the virus does not realize that this virus is present in memory, the virus can "piggy-back" on the virus scanner and in this way infect all files that were analyzed. Fast infectors rely on fasting levels of the spread of infection. 


    The disadvantage of this method is that infecting many files may make detection more likely, because the virus can slow down your computer or perform many suspicious actions that can be seen from anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectious agent, for example, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: this is less likely to reduce significantly the computer and at best, often trigger anti-virus software that detects suspicious behavior in the program. Slow infector approach, however, does not seem right.



    ref: wikipedia.org