Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

GATEWAY INSTITUTE OF ENGINEERING AND TECHNOLOGY

Department: Department of Computer Science

Topic Program:BCA
UNIT 4 Semester: II
APPLICATION/
PRESENTATION/ Subject:DATA COMMUNICATION AND NETWORKING
SESSION LAYER
Sub.Code:BCA202C

Presented By:
MANDVI SHARMA
Tentative Week of
Assistant Professor
Presentation
Department of Computer science
First Week Gateway Institute of Engineering and Technology,
Sonepat, Haryana
1
TABLE OF CONTENTS

Session Management.
Introduction to Cryptography and Compression.
Working of Email and Email protocol.
www, FTP, HTTP,HTTPS.
web browser, Internet.
How internet work, Internet Infrastructure.
ISP

2
BCA 2nd Sem DCN MANDVI SHARMA GIET
SESSION MANAGEMENT

Session management is used to facilitate secure interactions between a user


and some service or application and applies to a sequence of requests and
responses associated with that particular user. When a user has an ongoing
session with a web application, they are submitting requests within their
session and oftentimes are providing potentially sensitive information.
The application may retain this information and/or track the status of the user
during the session across multiple requests. More importantly, it is critical
that the application has a means of protecting private data belonging to each
unique user, especially within authenticated sessions.

3
BCA 2nd Sem DCN MANDVI SHARMA GIET
Session tokens serve to identify a user’s session within the HTTP traffic being
exchanged between the application and all of its users. HTTP traffic on its own is
stateless, meaning each request is processed independently, even if they are
related to the same session. Thus, session management is crucial for directing these
web interactions and these tokens are vital as they’re passed back and forth
between the user and the web application. Each request and response made will
have an associated session token which allows the application to remember distinct
information about the client using it. Session cookies were designed to help manage
sessions, however, there are several properties of the cookie that must be
configured and implemented correctly to prevent potential compromises.

4
BCA 2nd Sem DCN MANDVI SHARMA GIET
INTRODUCTION TO CRYPTOGRAPHY

Cryptography is a method of protecting information and communications through the


use of codes, so that only those for whom the information is intended can read and
process it.
In computer science, cryptography refers to secure information and communication
techniques derived from mathematical concepts and a set of rule-based calculations
called algorithms, to transform messages in ways that are hard to decipher. These
deterministic algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on the internet and confidential
communications such as credit card transactions and email.

5
BCA 2nd Sem DCN MANDVI SHARMA GIET
Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of
modern-day cryptography.
1. Confidentiality refers to certain rules and guidelines usually executed under confidentiality
agreements which ensure that the information is restricted to certain people or places.
2. Data integrity refers to maintaining and making sure that the data stays accurate and consistent
over its entire life cycle.
3. Authentication is the process of making sure that the piece of data being claimed by the user
belongs to it.
4. Non-repudiation refers to the ability to make sure that a person or a party associated with a
contract or a communication cannot deny the authenticity of their signature over their document or
the sending of a message.

Applications of Cryptography:
Cryptography has a wide range of applications in modern-day communication, including:
Secure online transactions: Cryptography is used to secure online transactions, such as online
banking and e-commerce, by encrypting sensitive data and protecting it from unauthorized
access.
Digital signatures: Digital signatures are used to verify the authenticity and integrity of digital
documents and ensure that they have not been tampered with.
Password protection: Passwords are often encrypted using cryptographic algorithms to protect
them from being stolen or intercepted.
6
BCA 2nd Sem DCN MANDVI SHARMA GIET
COMPRESSION

Compression: Data compression is the function of presentation layer in OSI reference model.
Compression is often used to maximize the use of bandwidth across a network or to optimize disk
space when saving data. There are two general types of compression algorithms:
1.Lossless compression
2. Lossy compression
Lossless compression : the data in such a way that when data is decompressed it is
exactly the same as it was before compression i.e. there is no loss of data. A lossless
compression is used to compress file data such as executable code, text files, and
numeric data, because programs that process such file data cannot tolerate mistakes in
the data. Lossless compression will typically not compress file as much as lossy
compression techniques and may take more processing power to accomplish the
compression. Lossless Compression Algorithms The various algorithms used to
implement lossless data compression are : 1. Run length encoding 2. Differential pulse
code modulation 3. Dictionary based encoding. 7
BCA 2nd Sem DCN MANDVI SHARMA GIET
Lossy Compression:
Lossy compression is the one that does not promise that the data received is exactly the same as data
send i.e. the data may be lost. This is because a lossy algorithm removes information that it cannot later
restore. Lossy algorithms are used to compress still images, video and audio. Lossy algorithms typically
achieve much better compression ratios than the lossless algorithms. The Lossy compression method
eliminates some amount of data that is not noticeable.
Applications of lossless and lossy compression
Lossless compression is mainly used to compress:
Images sound text.
It is generally the technique of choice for detailed product images, photography showcases, text files
and spreadsheet files, where the loss of picture quality, words or data (e.g., financial data) could pose a
problem.
The Graphics Interchange File (GIF), an image format used on the internet, is generally compressed using
lossless compression. RAW, BMP and PNG are also lossless image formats.
Lossy compression is mainly used to compress:
Images audio video
This technique is preferred for audio and video files where some amount of information loss is acceptable
since it's unlikely to be detected by most users. The JPEG image file, commonly used for photographs and
other complex still images on the web with no transparency, is generally compressed using lossy
compression.
Using JPEG compression, the creator can decide how much loss to introduce, and how much of a
trade-off is acceptable between file size and image quality.
Lossy compression is also suitable for websites featuring JPEG files and fast loading times since the 8
BCAcompression
2nd Sem ratio canDCN MANDVIthe
be adjusted while maintaining SHARMA
right balance. GIET
WORKING OF EMAIL

The email refers to the electronic means of communication of sending and receiving messages over the
Internet.
Email is the most common form of communication nowadays. An email has significantly evolved over the
past couple of years. There are now stronger sync and messaging features along with stronger security
and spam-related features.
Components of an Email:
Sender: The sender creates an email in which he records the information that needs to be transferred to
the receiver.
Receiver: The receiver gets the information sent by the sender via email.
Email address: An email address is just like a house address where the communication arrives for the
sender and receiver and they communicate with each other.
Mailer: The mailer program contains allows the ability to read, write, manage and delete the emails like
Gmail, Outlook, etc.
Mail Server: The mail server is responsible for sending, receiving, managing, and recording all the data
proceeded by their respective mail programs and then processing them to their respective users.
SMTP: SMTP stands for Simple mail transfer protocol. SMTP basically uses the internet network
connection to send and receive email messages over the Internet.
9
BCA 2nd Sem DCN MANDVI SHARMA GIET
Working of Email:
When the sender sends the email using the mail program, then it gets redirected to the simple mail
transfer protocol which checks whether the receiver’s email address is of another domain name or it
belongs to the same domain name as that of the sender (Gmail, Outlook, etc.). Then the email gets stored
on the server for later purposes transfer using POP or IMAP protocols.

If the receiver has another domain name address then SMTP of the receiver and then it finally gets
receiver after the issue resolves. And if due to very bad circumstances, the SMTP protocol
communicates with the DNS (domain name server) of the other address that the receiver uses. Then the
SMTP of the sender communicates with the SMTP of the receiver which then carries out the
communication and the email gets delivered in this way to the SMTP of the receiver.

If due to certain network traffic issues, both the SMTP of the sender and the receiver are not able to
communicate with each other, the email to be transferred is put in a queue of the, the message remains in
a queue for a long time, then the message is returned back to the sender as undelivered.

10
BCA 2nd Sem DCN MANDVI SHARMA GIET
PROTOCOLS OF EMAIL:

Emails basically use two types of standard protocols for communication over the
Internet. They are:-
1. POP: POP stands for post office protocol for email. Similar to a post office, our
approach is just to drop the email over the service mail provider and then leave it for
services to handle the transfer of messages. We can be even disconnected from the
Internet after sending the email via POP. Also, there is no requirement of leaving a copy
of the email over the web server as it uses very little memory. POP allows using
concentrate all the emails from different email addresses to accumulate on a single
mail program. Although, there are some disadvantages of POP protocol like the
communication medium is unidirectional, i.e it will transfer information from sender to
receiver but not vice versa.

11
BCA 2nd Sem DCN MANDVI SHARMA GIET
2. IMAP: IMAP stands for Internet message access protocol. IMAP has some
special advantages over POP like it supports bidirectional communication over
email and there is no need to store conversations on servers as they are already
well-maintained in a database. It has some advanced features like it tells the sender
that the receiver has read the email sent by him.

12
BCA 2nd Sem DCN MANDVI SHARMA GIET
WWW

World Wide Web, which is also known as a Web, is a collection of websites or web pages
stored in web servers and connected to local computers through the internet. These
websites contain text pages, digital images, audios, videos, etc. Users can access the
content of these sites from any part of the world over the internet using their devices such
as computers, laptops, cell phones, etc. The WWW, along with internet, enables the
retrieval and display of text and media to your device.

13
BCA 2nd Sem DCN MANDVI SHARMA GIET
1. The building blocks of the Web are web pages which are formatted in HTML and
connected by links called "hypertext" or hyperlinks and accessed by HTTP. These
links are electronic connections that link related pieces of information so that
users can access the desired information quickly. Hypertext offers the
advantage to select a word or phrase from text and thus to access other pages
that provide additional information related to that word or phrase.
2. A web page is given an online address called a Uniform Resource Locator (URL).
A particular collection of web pages that belong to a specific URL is called a
website, e.g., www.facebook.com, www.google.com, etc. So, the World Wide Web is
like a huge electronic book whose pages are stored on multiple servers across
the world.
3. Small websites store all of their WebPages on a single server, but big websites or
organizations place their WebPages on different servers in different countries
so that when users of a country search their site they could get the information
quickly from the nearest server.
14
BCA 2nd Sem DCN MANDVI SHARMA GIET
FTP

What is FTP (File Transfer Protocol)?


1. FTP (File Transfer Protocol) is a standard network protocol used for the transfer of files from
one host to another over a TCP-based network, such as the Internet.
2. FTP works by opening two connections that link the computers trying to communicate with
each other. One connection is designated for the commands and replies that get sent between
the two clients, and the other channel handles the transfer of data. During an FTP transmission,
there are four commands used by the computers, servers, or proxy servers that are
communicating. These are “send,” “get,” “change directory,” and “transfer.”
3. While transferring files, FTP uses three different modes: block, stream, and compressed. The
stream mode enables FTP to manage information in a string of data without any boundaries
between them.

15
BCA 2nd Sem DCN MANDVI SHARMA GIET
WHAT IS FTP USEFUL FOR?

One of the main reasons why modern businesses and individuals need FTP is its ability to perform
large file size transfers. When sending a relatively small file, like a Word document, most methods will
do, but with FTP, you can send hundreds of gigabytes at once and still get a smooth transmission.

The ability to send larger amounts of data, in turn, improves workflow. Because FTP allows you to
send multiple files at once, you can select several and then send them all at the same time. Without
FTP services, you may have to send them one by one, when you could be accomplishing other work.

For example, if you have to transfer a large collection of important documents from headquarters to a
satellite office but have a meeting to attend in five minutes, you can use FTP to send them all at once.
Even if it takes 15 minutes for the transfer to complete, FTP can handle it, freeing you up to attend the
meeting.

16
BCA 2nd Sem DCN MANDVI SHARMA GIET
HOW TO USE FTP

1. The three most common ways of using FTP include:


2. Via a web browser: With a web browser, you do not need any special software or a
client to download files from servers that provide for FTP sites.
3. A general user interface (GUI) FTP client: These third-party applications enable users
to connect and then send files over FTP.
4. Command-line FTP: Major operating systems come equipped with FTP client
capabilities as a command line.
5. What is an FTP Port?
6. An FTP port is a communication endpoint and allows data transfer between a computer
and a server. A computer's operating system only uses a specific number of ports, which
are necessary for software to connect through a network. An FTP port is required for
the client and server to quickly exchange files.
17
BCA 2nd Sem DCN MANDVI SHARMA GIET
HTTP

1. HTTP stands for HyperText Transfer Protocol.


2. It is a protocol used to access the data on the World Wide Web (www).
3. The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio,
video, and so on.
4. This protocol is known as HyperText Transfer Protocol because of its efficiency that allows us
to use in a hypertext environment where there are rapid jumps from one document to another
document.
5. HTTP is similar to the FTP as it also transfers the files from one host to another host. But, HTTP
is simpler than FTP as HTTP uses only one connection, i.e., no control connection to transfer
the files.
6. HTTP is used to carry the data in the form of MIME-like format.
7. HTTP is similar to SMTP as the data is transferred between client and server. The HTTP differs
from the SMTP in the way the messages are sent from the client to the server and from server
to the client. SMTP messages are stored and forwarded while HTTP messages are delivered
immediately. 18
BCA 2nd Sem DCN MANDVI SHARMA GIET
Features of HTTP:
1. Connectionless protocol: HTTP is a connectionless protocol. HTTP client
initiates a request and waits for a response from the server. When the server
receives the request, the server processes the request and sends back the
response to the HTTP client after which the client disconnects the connection.
The connection between client and server exist only during the current request
and response time only.
2. Media Independent: HTTP protocol is a media independent as data can be sent
as long as both the client and server know how to handle the data content. It is
required for both the client and server to specify the content type in MIME-type
header.
3. Stateless: HTTP is a stateless protocol as both the client and server know each
other only during the current request. Due to this nature of the protocol, both
the client and server do not retain the information between various requests of
the web pages.
19
BCA 2nd Sem DCN MANDVI SHARMA GIET
HTTP TRANSACTIONS

The above figure shows the HTTP transaction between client and server. The client
initiates a transaction by sending a request message to the server. The server replies to the
request message by sending a response message.

20
BCA 2nd Sem DCN MANDVI SHARMA GIET
WHAT IS HTTPS?

The full form of HTTPS is Hypertext Transfer Protocol Secure.


The HTTP protocol does not provide the security of the data, while
HTTP ensures the security of the data. Therefore, we can say that
HTTPS is a secure version of the HTTP protocol. This protocol
allows transferring the data in an encrypted form. The use of
HTTPS protocol is mainly required where we need to enter the
bank account details. The HTTPS protocol is mainly used where we
require to enter the login credentials. In modern browsers such as
chrome, both the protocols, i.e., HTTP and HTTPS, are marked
differently. To provide encryption, HTTPS uses an encryption
protocol known as Transport Layer Security, and officially, it is
referred to as a Secure Sockets Layer (SSL). This protocol uses a
mechanism known as asymmetric public key infrastructure, and it
uses
BCA two different
2nd Sem DCN keys which areSHARMA
MANDVI given below: GIET 21
1. Private key: This key is available on the web server, which is managed by
the owner of a website.
2. It decrypts the information which is encrypted by the public key.Public key:
This key is available to everyone. It converts the data into an encrypted
form.
3. Main difference between the HTTP and HTTPS
4. The major difference between the HTTP and HTTPS is the SSL certificate.
The HTTPS protocol is an extended version of the HTTP protocol with an
additional feature of security.
5. This additional feature of security is very important for those websites
which transmit sensitive data such as credit card information.

22
BCA 2nd Sem DCN MANDVI SHARMA GIET
WEB BROWSER

“A web browser is a software application that is used to access the


world wide web(www) or as known by everyone on the Internet. It is
an interface between us and the information available on the web.”
This information might be pictures, audio, videos, or some other
files that are shown on our screens through a web page.
The web browser can be called a client program as it requests the
webserver for the information demanded by the user. Some of the
common browsers are Google, Mozilla Firefox, Safari, internet
explorer, Netscape Navigator, etc.

23
BCA 2nd Sem DCN MANDVI SHARMA GIET
How does a browser work?
The whole process of gathering information begins with the user when it enters
the URL of the desired website in the address bar. The browser is a part of the
client-server model where it plays the part of the client.

It sends requested information to the web server through HTTP- hypertext transfer
protocol. Once the request is received, the server gathers the related information it
forwards it through web pages.
When a URL is entered, supposedly artof testing.com the web browser first requests
the DNS (Domain name server) the IP address of the artoftesting.com. The DNS is a
phonebook of the internet and therefore, it stores the system names and their
corresponding IP addresses.

Next, once the IP address is found the address is used to request the servers of ‘art Of
Testing’ website for the content. This is then fulfilled and displayed on the client’s
screen.
24
BCA 2nd Sem DCN MANDVI SHARMA GIET
Element of a Web Browser
The web browser is made of 7 main components that work in sync to make the web
browser function-able. These are-
1. User Interface
The user interface is the first page that you see when you open the web browser. This
page has the address bar, forward/ backward button, menu, bookmarking option, and a
few more options.

2. Browser Engine
The browser engine acts as an interface between the rendering engine and the UI of the
browser. Based on the input, it manipulated the rendering engine to provide output.

3. Rendering engine
The rendering engine is responsible for producing requested content to the browser and
displaying it on the screen. It parses the HTML documents and then converts them to
readable form. All the browsers we know have their own rendering engines.
The safari uses WebKit.
Chrome and Opera use Blink ( fork of WebKit).
Internet explored use Trident.
Firefox uses Gecko. 25
BCA 2nd Sem DCN MANDVI SHARMA GIET
4. Networking
The network layer is responsible for security and communication on the internet. It
is also used for HTTP requests and to cache the documents retrieved in order to
reduce network traffic.

5. UI Backend
It is for drawing basic boxes and windows/ widgets. This is for a generic interface
and independent of any specific platform. Behind all this, it uses an Operating
system for UI methods.

6. JavaScript Interpreter
As we all know the JavaScript is responsible for all the websites/ webpages. All
these pages are written in JavaScript language. Therefore this interpreter
translates these pages and these are sent to the rendering engine to display the
final results.

7. Data persistence
Data persistence or storage is for saving the data locally, like cookies. The
browsers support storage mechanisms like IndexedDB, WebSQL, File System,
etc. to store databases locally on your computer. This way user data is handled
BCAlike
2ndcache,
Sem bookmarks,
DCN cookies, etc.
MANDVI SHARMA GIET
26
INTERNET

What is the Internet?


Internet is a global network that connects billions of computers across the world with
each other and to the World Wide Web. It uses standard internet protocol suite
(TCP/IP) to connect billions of computer users worldwide. It is set up by using cables
such as optical fibers and other wireless and networking technologies. At present,
internet is the fastest mean of sending or exchanging information and data between
computers across the world.
It is believed that the internet was developed by "Defense Advanced Projects
Agency" (DARPA) department of the United States. And, it was first connected in
1969.

27
BCA 2nd Sem DCN MANDVI SHARMA GIET
Why is the Internet Called a Network?
1. Internet is called a network as it creates a network by connecting computers and
servers across the world using routers, switches and telephone lines, and other
communication devices and channels. So, it can be considered a global network
of physical cables such as copper telephone wires, fiber optic cables, tv cables,
etc. Furthermore, even wireless connections like 3G, 4G, or Wi-Fi make use of
these cables to access the Internet.
2. Internet is different from the World Wide Web as the World Wide Web is a
network of computers and servers created by connecting them through the
internet. So, the internet is the backbone of the web as it provides the technical
infrastructure to establish the WWW and acts as a medium to transmit
information from one computer to another computer. It uses web browsers to
display the information on the client, which it fetches from web servers.

28
BCA 2nd Sem DCN MANDVI SHARMA GIET
HOW DOES INTERNET WORK?

The internet works with the help of clients and servers. A device such as a laptop, which
is connected to the internet is called a client, not a server as it is not directly connected
to the internet. However, it is indirectly connected to the internet through an Internet
Service Provider (ISP) and is identified by an IP address, which is a string of numbers.
Just like you have an address for your home that uniquely identifies your home, an IP
address acts as the shipping address of your device. The IP address is provided by your
ISP, and you can see what IP address your ISP has given to your system.
A server is a large computer that stores websites. It also has an IP address. A place
where a large number of servers are stored is called a data center. The server accepts
requests send by the client through a browser over a network (internet) and responds
accordingly.

29
BCA 2nd Sem DCN MANDVI SHARMA GIET
To access the internet we need a domain name, which represents an IP address number,
i.e., each IP address has been assigned a domain name. For example, youtube.com,
facebook.com, paypal.com are used to represent the IP addresses. Domain names are
created as it is difficult for a person to remember a long string of numbers. However,
internet does not understand the domain name, it understands the IP address, so when
you enter the domain name in the browser search bar, the internet has to get the IP
addresses of this domain name from a huge phone book, which is known
as DNS (Domain Name Server).

For example, if you have a person's name, you can find his phone number in a phone book
by searching his name. The internet uses the DNS server in the same way to find the IP
address of the domain name. DNS servers are managed by ISPs or similar organizations.

30
BCA 2nd Sem DCN MANDVI SHARMA GIET
31
BCA 2nd Sem DCN MANDVI SHARMA GIET
When you turn on your computer and type a domain name in the browser search bar, your
browser sends a request to the DNS server to get the corresponding IP address. After
getting the IP address, the browser forwards the request to the respective server.

Once the server gets the request to provide information about a particular website, the data
starts flowing. The data is transferred through the optical fiber cables in digital format or in
the form of light pulses. As the servers are placed at distant places, the data may have to
travel thousands of miles through optical fiber cable to reach your computer.

The optical fiber is connected to a router, which converts the light signals into electrical
signals. These electrical signals are transmitted to your laptop using an Ethernet cable. Thus,
you receive the desired information through the internet, which is actually a cable that
connects you with the server.

Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the
optical cable are first sent to a cell tower and from where it reaches to your cell phone in the
form of electromagnetic waves.

32
BCA 2nd Sem DCN MANDVI SHARMA GIET
INTERNET INFRASTRUCTURES

Internet infrastructure is the physical hardware, transmission media, and software used to
interconnect computers and users on the Internet. Internet infrastructure is responsible
for hosting, storing, processing, and serving the information that makes up websites,
applications, and content.

These Internet infrastructure companies do things like operating ‘web hosting’ or ‘domain
name’ services, storage, backup, virtual private network (VPN), or acceleration
services. Web hosting companies are what you use when you want space for a website, and
domain name services generally sell you the name of the site, like “christiandawson.com”,
and help make that your official space on the web.

33
BCA 2nd Sem DCN MANDVI SHARMA GIET
The Internet has been described as a ‘network of networks’. That’s true —
telecommunications providers draw fiber around the world, and they trade Internet
traffic across those wires.
That traffic consists of all of the movies, pictures and memes you see on a daily basis. We
call that ‘content’.

The heart of the Internet exists between this telecommunications component and the
content that users send to each other across those wires. That is what we call the
Internet’s ‘infrastructure’.

34
BCA 2nd Sem DCN MANDVI SHARMA GIET
ISP : INTERNET SERVICE PROVIDER

ISP stands for Internet Service Provider. It is a company that provides access to the
internet and similar services such as Website designing and virtual hosting. For example,
when you connect to the Internet, the connection between your Internet-enabled device
and the internet is executed through a specific transmission technology that involves the
transfer of information packets through an Internet Protocol route.

35
BCA 2nd Sem DCN MANDVI SHARMA GIET
Data is transmitted through different technologies, including cable modem, dial-up, DSL,
high speed interconnects. Accordingly, based on the method of data transmission, the
Internet access provided by ISPs can be divided into many types, some of which are as
follows:
Dial-up Internet access: It is the oldest technology to provide Internet access by modem
to modem connection using telephone lines. In this method, the user's computer is
connected to a modem with a telephone line. This method has become outdated today
due to slow connection speed. However, in remote areas, this method can be used where
the broadband network is not available.

DSL: DSL, which stands for 'digital subscriber line' is an advanced version of the dial-up
Internet access method. It uses high frequency to execute a connection over the
telephone network and allows the internet and the phone connection to run on the same
telephone line. This method offers an Asymmetric Digital Subscriber (ADSL), where the
upload speed is less than the download speed, and a Symmetric Digital Subscriber Line
(SDSL), which offers equal upload and download speeds. Out of these two, ADSL is more
popular among users and is popularly known as DSL.
36
BCA 2nd Sem DCN MANDVI SHARMA GIET
Wireless Broadband (WiBB): It is a modern broadband technology for Internet access. It
allows high-speed wireless internet within a large area. To use this technology, you are
required to place a dish on the top of your house and point it to the transmitter of your
Wireless Internet Service Provider (WISP).
Wi-Fi Internet: It is the short form for "wireless fidelity," which is a wireless networking
technology that provides wireless high-speed Internet connections using radio waves.
To use the internet, you are required to be within the range of wi-fi network. It is
commonly used in public places such as hotels, airports, restaurants to provide internet
access to customers.
ISDN: It is a short form of Integrated Services Digital Network. It is a telephone system
network which integrates a high-quality digital transmission of voice and data over the
same standard phone line. It offers a fast upstream and downstream Internet connection
speed and allows both voice calls and data transfer.
Ethernet: It is a wired LAN (Local Area Network) where computers are connected within
a primary physical space. It enables devices to communicate with each other via a
protocol (a set of rules or common network language). It may provide different speeds
such as 10 Mbps, 100 Mbps and 10 Gbps.
37
BCA 2nd Sem DCN MANDVI SHARMA GIET
Thank
You…
38
BCA 2nd Sem DCN MANDVI SHARMA GIET
Guidelines For PowerPoint Presentation (PPT)
1. Your first slide should include the Title of your presentation, Department, Program, Semester, Subject,
Subject Code, Your Name, Designation, Your Organization, and Proposed Week of Presentation.
2. A table of contents / main menu.
3. Font Size: Topic-32, Heading-28 & Normal Text-24
4. Choose Readable Colors.
5. Keep The Text To A Minimum. Words Can Act As A Comfort Blanket.
6. Be Consistent With Style Settings.
7. One Message Per Slide.
8. Maintain A Consistent Style.
9. Use Large Impactful Images.
10. Make Content Easy to Understand.
11. Use A Lato Font For the Body Text.
12. Select Standard (4:3 Aspect Ratio) Or Widescreen (16:9) Or Custom Slide Size.
13. Proofread Everything before submitting/delivering.
14. Every PPT must be uploaded on Collpoll (ERP).
39

You might also like