4 Networks and The Effects of Using Them
4 Networks and The Effects of Using Them
The media access control (MAC) address is a number made up of 48 bits which uniquely
identifies a device when it is connected to a network.
its shown as 6 groups of hexadecimal digits where the first one 3 groups are the
manufacturers code and the rest is the device serial number.
Internet protocol (IP) addresses
An IP address is a unique string of characters that identifies a device on the internet or a local
network and its location.
Internet protocols define the rules that must be agreed by senders and receivers of data.
Data packets
A data packet is a unit of data made into a single package that travels along a given network
path.
Hubs are hardware devices that form a local area network by having a number of other
devices connected to them
A hub will take a data packet received at one of its ports and broadcast it to every device
connected to it.
their disadvantages include that they are not very secure and cause unnecessary traffic.
Switches
switches connect a number of devices together to form a LAN by storing the MAC addresses
of all the devices where each port on the switch has a matching MAC address called a lookup
table.
a switch sends and receives data Using the look-up table, a switch matches the MAC address
of an incoming data packet arriving at one of its ports, and directs it to the correct device.
Bridges
Bridges are devices that connect one LAN to another LAN that uses the same protocol
(communication rules). They are often used to connect together different parts of a LAN so
that they can function as a single LAN.
Routers
Because each router has its own IP address they are used to route data packets from one
network to another network, based on IP addresses and join a LAN to the internet.
how it works?
When a data packet is received at one of its ports, the router inspects the IP address and
determines whether the data packet is meant for its own network or for another, external
network. If the data packet is meant for its own network, then the data packet is routed to the
local switch or hub. Otherwise, the data packet is transmitted to a different router
ROUTER VS BRIDGE
When a device wants to communicate, it picks one of the 79 channels at random to pair with
another device. If the channel is already being used, it randomly picks another channel. Once
paired, to minimize the risks of interference with other devices, the devices constantly change
the channels they are using.
Bluetooth is used when transferring data between two or more devices which are very
close together, when the speed of data transmission is not critical and for low-bandwidth
applications.
Wi-Fi sends and receives radio waves in several different frequency bands
A computer's wireless adapter translates data into a radio signal and transmits it using an
antenna, Then A wireless router receives the signal and decodes it. The router sends the
information to the internet using a physical, wired ethernet connection.
Wi-Fi is best suited to operating full-scale networks because it offers much faster data
transfer rates, better range and better security than Bluetooth.
1. on-demand self-service
3. resource pooling
4. rapid elasticity
5. measured service.
1. File storage: You can store all types of information in the cloud, including files and
email.
2. File sharing: The cloud makes it easy to share files with several people at the same time.
3. Backing up data: You can also use the cloud to protect your files.
1. security
2. cost management
3. lack of expertise
4. internet connectivity
Network types
types of network:
» local area network (LAN)
» wireless local area network (WLAN)
» wide area network (WAN).
Advantages disadvantages
» they allow the sharing of resources such » easier spread of viruses throughout the
as hardware and software whole network
» they permit easy communication between » slower access to external networks
users of the LAN
A Wide local area network (LAN) is a collection of devices connected together in one
physical location based on radio transmittions.
Advantages Disadvantages
» easier to expand » data is less secure
Advantages Disadvantages
Password
Passwords are used :
» when accessing your email account
» zero login
» biometrics
» magnetic stripes
» smart cards
» physical tokens
» electronic tokens
a technology that allows users to enter their accounts without the need to enter passwords.
its easy, quick, and highly secure.
Zero login essentially relies on devices being smart and secure enough to
instantly recognize a user by a number of features based on:
» biometrics - the use of fingerprints or biological features for authentication
» behavioral patterns - a technology that uses behavioral traits of users like how you walk,
your typing speed and location to authenticate their identity
disadvantages
The magnetic stripe reader reads the information by detecting the changes in the magnetic
field caused by the flux reversals on the badge's magnetic stripe
Smart cards
A smart card is a physical card that has an embedded integrated chip that acts as a
security token
High levels of security. Cost. The cards and the smart card
readers can be expensive.
Larger memory.
Compatibility. Not all smart card
Prevents fraud.
readers are compatible with all types of
• Ease of use. smart cards.
Security vulnerabilities.
Physical tokens
A physical token is a form of authentication in the form of a physical, solid object used to
prove that the user has possession of the token.
There are two types of physical tokens:
1. a disconnected physical token – when a PIN and other authentication details are
entered, The customer inserts their debit card into the top of the token device and the
device either recognizes the card as genuine or rejects it. The device then asks the
customer to press ‘IDENTIFY’ and then enter their PIN A one-time password is then
shown on the device screen The customer now goes back and enters the code. and are
now given access.
Electronic tokens
Electronic (software) tokens are software installed on a user’s device, such as a smartphone.
When the website requests the user to authenticate who they are, the user opens the app on
their smartphone. The app generates a one-time password which is valid for less than a
minute. The user enters this OTP when prompted by the website, together with some other
form of authentication, such as PIN, touch or face ID.
Anti-malware software
Antimalware is a type of software program created to protect information technology (IT)
systems and individual computers from malicious software, or malware
How it works?
1. load the anti virus to the computer and run in the background to constantly check for
viruses
3. the viruses will be compared with the viruses on a database and check for any behavior
that could possibly be a virus
4. all the infected files will be put into quarantine where they will either be deleted or the
user will be asked to take action
Uses
1. help prevent malware attacks by scanning all incoming data to prevent malware from
being installed and infecting a computer.
2. detect advanced forms of malware and offer protection against ransomware attacks.
common features:
They check software or files before they are run or loaded on a computer.
They carry out heuristic checking – this is the checking of software for types of behavior
that could indicate a possible virus; this is useful if software is infected by a virus not yet
on the database.
Any possible files or programs which are infected are put into quarantine which:
– allows the virus to be automatically deleted, or
Anti-virus software needs to be kept up to date because new viruses are constantly being
discovered.
Full system checks need to be carried out once a week, for example, because some
viruses lie dormant and would only be picked up by this full system scan.
Electronic conferencing
three types of electronic conferencing:
» video conferencing
» audio conferencing
» web conferencing
video conferencing
Video conferencing is a communication method carried in real time that uses both video and
sound and is a substitute for face-to-face conferences between a number of people.
uses
hardware: Software
Audio conferencing
Audio conferencing refers to meetings held between people using audio (sound) equipment.
1. The organizer of the phone conference is given two PINs by the phone company. One
PIN is the personal PIN given to the organizer and the second PIN is the participant’s
PIN.
2. The organizer contacts all of the participants and informs them of their PIN and the date
and time of the phone conference.
3. When the phone conference is about to start, the organizer dials the conference phone
number and, once they are connected, keys in their personal PIN.
4. The participants then call the same conference number to join in – once they get through
they each input the PIN given to them by the organizer Without this PIN, it would be
impossible to join the phone conference.
Hardware used:
4. a standard phone
5. VOIP if using a computer (a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular (or analog) phone line.)
Web conferencing
Web conferencing uses the internet to permit conferencing to take place.
uses
» webcams
» monitors
» microphones
» keyboard