Chapter4 Networks and The Effects of Using Them PDF
Chapter4 Networks and The Effects of Using Them PDF
Networks
Network devices
Hubs
A hub is a device that connects a number of computers together to make a LAN
Broadcasts datapackets to computers in a LAN
The typical use of a hub is at the centre of a star network
If it receives a message, it sends it to every computer on the network.
Switches
Aswitch, like a hub, is a device that connects a number of computers together tomake
a LAN.
Directsdata packets to specific computers
Aswitch is a more ʻintelligentʼ device than a hub: if it receives a message, itchecks who
it is addressed to, and only sends it to that specific computer.
Each device or computer on a network has a media access control(MAC) address that
uniquely identifies it.
Bridge
Bridges are devices that connect one LAN to another LAN that uses the same protocol.
Bridges tend to be used to interconnected LANs since sending out every data packet to
all possible destinations
Modems
Modems are used to allow computers to connect to networks over long distance using
the existing telephone networks.
Dial-up modems operate at transmission speeds of about 60 kiobits
Broadband or ADSL modems operate at up to 100MB when using fibre-optic
cables.
Router
Routers enable data packets to be routed between the diff erent networks, for
example to join a LAN to a wide area network(WAN)
The routerʼs main function is to transmit internet and transmission protocols
between two networks
Other hardware
Gateway
a gateway is a network point(or node) that acts as an entrance to another
network.
Network interface card (NIC)
a NIC is needed to allow a device to connect to a network
It is needed to allow a device to connect to a network
It contains the MAC address generated at the manufacturing stage.
Network cables
the cables can be either copper or fibre optics
IP and MAC addresses
Diff erence between IP address and MAC address
MAC address isunique number that identifies a device connected to the internet(Each
person in that house).
The IP address gives the location of a device on the internet(The house you live in).
Wi-Fi and Bluetooth
Wi-Fi
A wireless transmitter(WAP) receives information from a network via its
connection(broadband).
This transmitter converts the received information into radio waves and then
transmits them
A device receives the radio waves via an installed wireless adaptor which allows it to
download the information
Bluetooth
Bluetooth sends and receives radio waves in a band of 79 diff erent frequencies
Devices using Bluetooth automatically detect and connect to each other
When a device wants to communicate, it picks one of the 79 channels at random
LANs and WANs
LANs
A Local Area Network is a network confined to one building or site.
O en a LAN is a private network belonging to an organisation or business.
A typical LAN will consist of a number of computers and devices that are connected to
hubs or switches.
WANs
They are used where computers or networks are situated a long distance from each
other geographically(diff erent city or country)
WANs include the internet and the network of ATMs used by banks
WLANs
They provide wireless network communications over fairly short distances using radio
or infrared signals instead of cables
Access point(APs) or wireless nodes, are connected into the wired network at fixed
locations.
Accessing the internet
Mobile phones and tablets
Laptops
Desktop computers
Network issues and communication
Network security
Should the internet be policed?
Digital divide
Inappropriate sites and the accuracy of information
Security issues
Accessing your email account
Carrying out online banking
Accessing social networking sites
Authentication
Authentication is used to verify that data comes from a secure and trusted source.
User ID and passwords
Digital certificates
Biometrics
Magnetic strip cards/contactless cards
Viruses
Antivirus so ware
Theycheck so ware or files before they are run or loaded on a computer
Theycompare a possible virus against a database of known viruses
Theyneed to be kept up to date
Fully system checks need to be carried out once a week
Avoiding viruses when accessing the internet
Look for security indicators such as https or the padlock symbol
Copy and paste the URL into the address bar at the top of the page rather than just
clicking on the link in the email
Donʼt open emails from unknown sources
Viruses from hardware devices
Pick up viruses from any devices plugged into your computer
Plug in a device from an unknown source
Data protection acts(DPA)
How to stop data being obtained unlawfully
Donʼt leave personal information lying around on a desk when not attended.
Donʼt leave data on a computer monitor if it is unattended
Use passwords and user ids, which should be kept secure
Make sure that anything sent in an email or fax is not of a sensitive nature.
Network communication
A physical fax
A standard fax machine allows documents to be sent to another fax machine using a
normal telephone line.
Electronic faxing
Make use of computer technology and the internet
Faxes and emails
Online faxing is always associated with an emailaddress and a fax number.
Thefax number is similar to the traditional fax number and needs to be known bythe
sender.
Once a fax is received, the online fax service provider sends an email with the fax
message
Video conferencing
Hardware
Web cam/video camera to input/capture video (images ofparticipants/documents)
router/modemto transmit data to participantsʼ (computers)
Microphoneto input voices of participants/to speak to other participants
Headphones/speakers to output voices to participants/hearother participants
Large screen/projector to see other participants
So ware
Webcam and microphone so ware drivers.
CODEC ( 编码解码器)
It stand for coder-decoder orcompression-decompression.
Echo cancellation so ware (回声消除)
It allows taking to take place in realtime and permits the synchronization of
communication.
Audio conferencing
Audio conferencing refers to meetings held between people using audio(sound
equipment).
Hardware
Telephone
Computer(with built-in microphones and speakers)
Internet phone
Internet Telephony/VOIP
It is possible to hold an audio conference using a computer provided a microphone and
speakers are connected
Web conferencing
To carry out web conferencing, each user either downloads an application or logs on to
a websites from a link supplied in an email from the conference organiser