0% found this document useful (0 votes)
18 views

4 Networks and The Effects of Using Them

The document discusses different types of computer networks including local area networks (LANs), wireless local area networks (WLANs), wide area networks (WANs), and common network devices like hubs, switches, bridges, and routers. It also covers topics such as IP addresses, WiFi, Bluetooth, and cloud computing.

Uploaded by

nora
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

4 Networks and The Effects of Using Them

The document discusses different types of computer networks including local area networks (LANs), wireless local area networks (WLANs), wide area networks (WANs), and common network devices like hubs, switches, bridges, and routers. It also covers topics such as IP addresses, WiFi, Bluetooth, and cloud computing.

Uploaded by

nora
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

4.

Networks and the effects of using


them
Network
A computer network is a set of computers sharing resources located on or provided by
network nodes

common network devices and terms


4 important parts of a network
» network interface card (NIC)
» media access control (MAC) address
» internet protocol (IP) address
» data packet.

Network interface card (NIC)


A network interface card (NIC) is a hardware component in the motherboard needed to allow
a device to connect to a network by converting binary data into an electrical signal.
Media access control (MAC) address

The media access control (MAC) address is a number made up of 48 bits which uniquely
identifies a device when it is connected to a network.

its shown as 6 groups of hexadecimal digits where the first one 3 groups are the
manufacturers code and the rest is the device serial number.
Internet protocol (IP) addresses

An IP address is a unique string of characters that identifies a device on the internet or a local
network and its location.

Internet protocols define the rules that must be agreed by senders and receivers of data.

Data packets
A data packet is a unit of data made into a single package that travels along a given network
path.

4. Networks and the effects of using them 1


Packets of data will usually have a header which contains:
» the sender’s IP address
» the receiver’s IP address
» the sequence/identity number of the packet (this is to ensure that all the packets can be
reassembled into the correct order once they reach the destination)
» the packet size (this is to ensure the receiving station can check if all of the packets have
arrived intact)
» how many data packets make up the whole message.
Hub

Hubs are hardware devices that form a local area network by having a number of other
devices connected to them

A hub will take a data packet received at one of its ports and broadcast it to every device
connected to it.

their disadvantages include that they are not very secure and cause unnecessary traffic.

Switches

switches connect a number of devices together to form a LAN by storing the MAC addresses
of all the devices where each port on the switch has a matching MAC address called a lookup
table.
a switch sends and receives data Using the look-up table, a switch matches the MAC address
of an incoming data packet arriving at one of its ports, and directs it to the correct device.
Bridges

Bridges are devices that connect one LAN to another LAN that uses the same protocol
(communication rules). They are often used to connect together different parts of a LAN so
that they can function as a single LAN.

Routers
Because each router has its own IP address they are used to route data packets from one
network to another network, based on IP addresses and join a LAN to the internet.
how it works?

When a data packet is received at one of its ports, the router inspects the IP address and
determines whether the data packet is meant for its own network or for another, external
network. If the data packet is meant for its own network, then the data packet is routed to the
local switch or hub. Otherwise, the data packet is transmitted to a different router

ROUTER VS BRIDGE

4. Networks and the effects of using them 2


Wi-Fi and Bluetooth
Wi-Fi and Bluetooth offer wireless communication between devices using electromagnetic
radiation as the carrier of data transmission.

Bluetooth sends and receives radio waves in a band of 79 different frequencies/channels,


centered on a frequency of 2.45 GHz.

When a device wants to communicate, it picks one of the 79 channels at random to pair with
another device. If the channel is already being used, it randomly picks another channel. Once
paired, to minimize the risks of interference with other devices, the devices constantly change
the channels they are using.

Bluetooth is used when transferring data between two or more devices which are very
close together, when the speed of data transmission is not critical and for low-bandwidth
applications.

Wi-Fi sends and receives radio waves in several different frequency bands

A computer's wireless adapter translates data into a radio signal and transmits it using an
antenna, Then A wireless router receives the signal and decodes it. The router sends the
information to the internet using a physical, wired ethernet connection.

Wi-Fi is best suited to operating full-scale networks because it offers much faster data
transfer rates, better range and better security than Bluetooth.

Similarities and differences between wi-fi and Bluetooth

4. Networks and the effects of using them 3


Cloud computing (storage)
Cloud computing is a method of data storage where data is stored on remote servers – there
may be thousands of servers in many different locations.
Cloud Storage uses remote servers to save data, such as files, business data, videos, or
images. Users upload data to servers via an internet connection, where it is saved on a virtual
machine on a physical server.

three common cloud storage systems:


» Public cloud – this is a storage environment where the customer/client and cloud storage
provider are different companies.
» Private cloud – this is storage provided by a dedicated environment behind a company
firewall; customer/client and cloud storage provider are integrated and operate as a single
entity.
» Hybrid cloud – this is a combination of the two previous environments; some data resides
in the private cloud and less sensitive/less-commercial data can be accessed from a public
cloud storage provider.

five essential characteristics of cloud computing are

1. on-demand self-service

2. broad network access

3. resource pooling

4. rapid elasticity

5. measured service.

the uses of cloud computing include:

1. File storage: You can store all types of information in the cloud, including files and
email.

2. File sharing: The cloud makes it easy to share files with several people at the same time.

3. Backing up data: You can also use the cloud to protect your files.

issues relating to cloud computing are:

1. security

2. cost management

3. lack of expertise

4. internet connectivity

4. Networks and the effects of using them 4


Advantages of cloud computing (storage)
» Customer/client files stored in the cloud can be accessed at any time, from any device,
anywhere in the world, as long as internet access is available.
» There is no need for a customer/client to carry an external storage device with them, or
even use the same computer, to store and retrieve information.
» The cloud provides the user with remote backup of data, with obvious advantages in the
event of data loss/disaster recovery on their own computer.
» If a customer/client has a failure of their hard disk or backup device, cloud storage will
allow recovery of their data.
» The cloud system offers almost unlimited storage capacity (at a price!).
Disadvantages of cloud computing (storage)
» Security aspects of storing data in the cloud (see comments later on).
» If the customer/client has a slow or unstable internet connection, they could have many
problems accessing or downloading their data/files.
» Costs can be high if a large storage capacity or high download/upload data transfer is
required.
» The potential failure of the cloud storage company is always possible – this poses a risk of
loss of all backup data.

Common network environments


Extranets, intranets and the internet
SEE CHAPTER 10

Network types
types of network:
» local area network (LAN)
» wireless local area network (WLAN)
» wide area network (WAN).

Local area network (LAN)


A local area network (LAN) is a collection of devices connected together in one physical
location

Advantages disadvantages

» they allow the sharing of resources such » easier spread of viruses throughout the
as hardware and software whole network
» they permit easy communication between » slower access to external networks
users of the LAN

4. Networks and the effects of using them 5


» use of the LAN is constantly monitored » increased security risk when compared to
which ensures security stand-alone computers

Wireless local area network (WLAN)

A Wide local area network (LAN) is a collection of devices connected together in one
physical location based on radio transmittions.

Advantages Disadvantages
» easier to expand » data is less secure

» increased mobility » data transmission rate is slow


» no cables so there is a safety improvement » signals could be stopped by thick walls.

Wide area networks (WANs)


a wide-area network (WAN) is a collection of local-area networks (LANs) or other networks
that communicate with one another. and are used where computers or networks are situated a
long distance from each other geographically.

Advantages Disadvantages

1. Greater Geographic Coverage 1. Slower Speeds

2. Enhanced Data Security 2. Security Risks

3. Increased Flexibility 3. Higher Costs

4. Improved Collaboration 4. Dependency on Service Providers

Network issues and communications


Issues regarding data transmission include:

1. Data breaches, where unauthorized 4. blackmail


parties access, copy or steal data
5. extortion
2. can lead to identity theft
6. reputation damage.
3. fraud

Password
Passwords are used :
» when accessing your email account

4. Networks and the effects of using them 6


» when carrying out online banking
» accessing social networking sites.

Passwords should be protected by:


» Run anti-spyware software to make sure that your passwords are not being relayed back to
whoever put the spyware on your computer
» Change passwords on a regular basis in case it has come into the possession of another
user illegally or accidentally.
» Passwords should not be easy to crack (e.g. name of a pet ); passwords are grouped a either
strong (hard to crack or guess) or weak (easy to crack or guess).
» Strong passwords which should contain:
– at least one capital letter
– at least one numerical value
– at least one other keyboard character (such as @, *, & etc.).

Other authentication methods


these include:

» zero login
» biometrics
» magnetic stripes
» smart cards
» physical tokens
» electronic tokens

Zero login and biometrics

a technology that allows users to enter their accounts without the need to enter passwords.
its easy, quick, and highly secure.

Zero login essentially relies on devices being smart and secure enough to
instantly recognize a user by a number of features based on:
» biometrics - the use of fingerprints or biological features for authentication
» behavioral patterns - a technology that uses behavioral traits of users like how you walk,
your typing speed and location to authenticate their identity

disadvantages

1. users don’t know when you’re being monitored.

2. users will not know when they are logged out

3. this method’s protection is questioned

4. Networks and the effects of using them 7


Magnetic stripe cards

The magnetic stripe reader reads the information by detecting the changes in the magnetic
field caused by the flux reversals on the badge's magnetic stripe

Advantages of magnetic stripe cards Disadvantages of magnetic stripe cards


» They are easy to use. » Less secure than biometric methods (no
» It is not an expensive technology. encryption is used and the stripe contents
» Magnetic cards can be remotely can be copied fairly easily).
deactivated (if lost or stolen). » The cards wear out with a lot of use.
» The cards can be multi-purpose (for » Magnetic readers often fail to read the
example, door key cards, network access cards on first attempt.
cards)

Smart cards

A smart card is a physical card that has an embedded integrated chip that acts as a
security token

The main advantages of smart cards are: Disadvantages of smart cards

High levels of security. Cost. The cards and the smart card
readers can be expensive.
Larger memory.
Compatibility. Not all smart card
Prevents fraud.
readers are compatible with all types of
• Ease of use. smart cards.

Security vulnerabilities.

Physical tokens

A physical token is a form of authentication in the form of a physical, solid object used to
prove that the user has possession of the token.
There are two types of physical tokens:

1. a disconnected physical token – when a PIN and other authentication details are
entered, The customer inserts their debit card into the top of the token device and the
device either recognizes the card as genuine or rejects it. The device then asks the
customer to press ‘IDENTIFY’ and then enter their PIN A one-time password is then
shown on the device screen The customer now goes back and enters the code. and are
now given access.

4. Networks and the effects of using them 8


2. a connected physical token – this type of token transmits the generated one-time
password directly to a computer through a USB connection

Electronic tokens

Electronic (software) tokens are software installed on a user’s device, such as a smartphone.

When the website requests the user to authenticate who they are, the user opens the app on
their smartphone. The app generates a one-time password which is valid for less than a
minute. The user enters this OTP when prompted by the website, together with some other
form of authentication, such as PIN, touch or face ID.

Anti-malware software
Antimalware is a type of software program created to protect information technology (IT)
systems and individual computers from malicious software, or malware

How it works?

1. load the anti virus to the computer and run in the background to constantly check for
viruses

2. the anti virus will scan all the running software

3. the viruses will be compared with the viruses on a database and check for any behavior
that could possibly be a virus

4. all the infected files will be put into quarantine where they will either be deleted or the
user will be asked to take action

Uses

1. help prevent malware attacks by scanning all incoming data to prevent malware from
being installed and infecting a computer.

2. detect advanced forms of malware and offer protection against ransomware attacks.

common features:

They check software or files before they are run or loaded on a computer.

Anti-virus software compares a possible virus against a database of known viruses.

They carry out heuristic checking – this is the checking of software for types of behavior
that could indicate a possible virus; this is useful if software is infected by a virus not yet
on the database.

Any possible files or programs which are infected are put into quarantine which:
– allows the virus to be automatically deleted, or

4. Networks and the effects of using them 9


– allows the user to make the decision about deletion (it is possible that the user knows
that the file or program is not infected by a virus – this is known as a false positive and is
one of the drawbacks of anti-virus software).

Anti-virus software needs to be kept up to date because new viruses are constantly being
discovered.

Full system checks need to be carried out once a week, for example, because some
viruses lie dormant and would only be picked up by this full system scan.

Electronic conferencing
three types of electronic conferencing:
» video conferencing
» audio conferencing
» web conferencing

video conferencing

Video conferencing is a communication method carried in real time that uses both video and
sound and is a substitute for face-to-face conferences between a number of people.
uses

1. team 3. product demos


meetings
4. job interviews
2. webinars

hardware: Software

webcams software drivers - a special kind of software program that


controls a specific hardware device attached to a computer.
large
monitors/television CODEC - stand for COder-DECoder or COmpression-
screens DECompression.

microphones Echo cancelation software - allows talking to take place in real


time and permits the synchronization of communication.
speakers.

Advantages of using video conferencing Disadvantages of using video conferencing

it is much easier to access important There is potential time lag in


documents or bring in ‘experts’ at key responses/delays when talking.
parts of the conference – this would be

4. Networks and the effects of using them 10


difficult if they were a long way away Images can jerk – usually due to poor
from their office. internet/network performance or poor
bandwidth.
It is possible to hold conferences at
short notice (a conference date can be It can be very expensive to set up in the
set up within a few hours as no person first place (both the hardware and
needs to travel very far). the software are expensive to purchase
and get set up correctly).
Not travelling physically to meetings
reduces costs: There can be problems if the delegates
– reduced travelling costs live in different countries where the
– no need to pay for hotel time zone differences are large
accommodation or venue hire

It may be better to use video


conferencing than have delegates travel
to potentially unsafe places around the
world.

Audio conferencing
Audio conferencing refers to meetings held between people using audio (sound) equipment.

how its done:

1. The organizer of the phone conference is given two PINs by the phone company. One
PIN is the personal PIN given to the organizer and the second PIN is the participant’s
PIN.

2. The organizer contacts all of the participants and informs them of their PIN and the date
and time of the phone conference.

3. When the phone conference is about to start, the organizer dials the conference phone
number and, once they are connected, keys in their personal PIN.

4. The participants then call the same conference number to join in – once they get through
they each input the PIN given to them by the organizer Without this PIN, it would be
impossible to join the phone conference.

Hardware used:

1. a computer (with built-in microphones and speakers)

2. external microphone and/or speakers

4. Networks and the effects of using them 11


3. an internet phone

4. a standard phone

5. VOIP if using a computer (a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular (or analog) phone line.)

Advantages of audio conferencing Disadvantages of Audio Technologies

It is cost-efficient. May require scheduling.

favorably flexible and easy-to-use Not conducive to visual information.


communication solution.
May be impersonal.
It is private and secure.

Web conferencing
Web conferencing uses the internet to permit conferencing to take place.

uses

» business meetings to discuss new ideas


» presentations
» online education or training

main features include:


» Slide presentations using presentation software can be posted on the conference website in
advance of the meeting.
» The host’s computer screen can be shared for live presentations, or other live
demonstrations.
» It is possible for any delegate to draw or write on a ‘whiteboard’ using their own keyboard
or mouse.
» It is possible to transmit images or videos using the webcam throughout the conference.
» Documents can be shared by first uploading them to the website before the conference
begins.
» it is possible to chat verbally or by using instant messaging throughout the conference.
Hardware used

» webcams
» monitors
» microphones

4. Networks and the effects of using them 12


» speakers

» keyboard

4. Networks and the effects of using them 13

You might also like