Unit 4 - Networks and The Effects of Using Them

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Objectives: In this chapter we will learn about

• Networks hardware (slides 1 – 7)


• Network issues and communication (slides 8 – 12)
Network interface card (NIC) 
• It is needed to allow a device to connect to a network.
• An NIC turns binary data into an electrical signal that allows access to a network.
• The NIC is usually integrated into the motherboard on most modern computers.

MAC  Each NIC is given a unique address Media Access Control (MAC) at the manufacturing stage.
The MAC address is made up of 48 bits which are shown as six groups of hexadecimal digits with the general format: NN
– NN – NN – DD – DD – DD where the first six hex digits identify a device made by Apple and the second set of six hex
digits are the unique serial number of the device itself.

Wireless network interface cards (WNICs) are the same as NICs in that they are used to connect devices to the internet or other
networks. They use wireless connectivity, using an antenna to communicate with networks via microwaves.

Internet protocol (IP) addresses


• Whenever a computer connects to the internet it is given an internet protocol (IP) address.
• This is assigned to the computer by the internet service provider (ISP). Because the operation of the internet is
based on a set of protocols (rules), it is necessary to supply an IP address.
• They define the rules that must be agreed by senders and receivers of data communicating through the internet.
• An IP address identifies the location of a device on a network. This means, that if you are using your laptop at home,
it will have been given an IP address when it connected to the internet. If you now take your laptop to the school,
and log into the internet again, it will be assigned a new IP address. Hence, the IP address changes each
• time you log in at different locations.
• There are two versions of IP: IPv4 and IPv6. IPv4 is based on 32 bits and the address is written as four groups of
eight bits (shown in denary format); for example: 254.25.28.77
• IPv6 uses a 128-bit address, which take the form of eight groups of hex digits; for example:
A8FB:7A88:FFF0:0FFF:3D21:2085:66FB:F0FA, where colons (:) and hexadecimal numbering has been designed to
allow the growing internet hosts and increase in the amount of data traffic. 1
Data packets
Data is moved around networks in the form of data packets. Whenever a user sends some data, it is split up into a
number of packets and each packet is transmitted separately.
Packets of data will usually have a header which contains:
» the sender’s IP address
» the receiver’s IP address
» the sequence/identity number of the packet)
» the packet size
» how many data packets make up the whole message.

Hubs
They are hardware devices that can have a number of other devices connected to them. A hub will
take a data packet received at one of its ports and broadcast it to every device connected to it.
Hence, they are not very secure & there will be unnecessary traffic on the network, which results in reduced bandwidth.
Switches
They are ‘intelligent’ versions of hubs. They too connect a number of devices together to form a LAN.
A switch stores the MAC addresses of all devices on the network. Each port on the switch connected to a device will
have a matching MAC address called a look-up table. Using the look-up table, a switch matches
the MAC address of an incoming data packet arriving at one of its ports, and directs it to the
correct device. None of the other devices will see this data packet.
Switches are more secure than hubs and do not waste bandwidth
*** Hubs and switches are used to exchange data within their own local area networks and not with outside networks.
(such as the internet).

Bridges
Bridges are devices that connect one LAN to another LAN that uses the same
protocol . They are used to connect together different parts of a LAN so that
they can function as a single LAN.
2
Modem
A device that connects your home to your Internet service provider (ISP) and translates the
digital signals from your ISP to your router.

Routers
• Routers are used to route data packets from one network to another network, based on IP addresses.
• It can do this because each router has its own IP address. Routers are used to join a LAN to the internet.
• Each router has a routing table which keeps the IP address of all nearest router’s IP addresses.
• When a router receives a packet of data, it checks the destination IP address against the stored routing table, which
allows the router to determine the packet’s next step in the path. A data packet will pass through a number of
routers before it reaches its final destination. All the information in the data packet headers allows the data packets
to be reassembled in their correct order, according to the sequence/identity number, by the receiving station.
• Many modern broadband ‘routers’ actually combine the functions of a router and a switch – this means that they
store MAC addresses and IP addresses to enable data packets to be sent to the correct network and then to the
correct device on the network.

How router works with the webpages:


• Everything connected to the internet has an IP Address.
• Web Pages are stored on Web Servers. Webpages have unique IP address & domain names to find/communicate
with each other.
• Routers direct packets of data across the internet to its destination.

3
Wi-Fi and Bluetooth
Similarities:
• Both Wi-Fi and Bluetooth offer wireless communication between devices.
• Both use electromagnetic radiation as the carrier of data transmission.
• Bluetooth sends and receives radio waves in a band of 79 different frequencies known as channels.
• Both work on a frequency centered around of 2.45 GHz.
Bluetooth
• It automatically detects and connects to each other and do not interfere with other devices because each
communicating pair uses a different channel.
• When a device wants to communicate, it picks one of the 79 channels at random to pair with
another device. If the channel is already being used, it randomly picks another channel.
• Once paired, to minimise the risks of interference with other devices, the devices
constantly change the channels they are using. This is known as spread-spectrum frequency hopping.
• Bluetooth uses key encryption to create a secure wireless personal area network (WPAN).
• Maximum number of devices connected Up to 7
Bluetooth is useful:
» When transferring data between two or more devices which are very close together /less than 30 metres distance
» When the speed of data transmission is not critical
» For low-bandwidth applications for example, when sending music files from a mobile phone to a headset.

Wi-Fi
• It sends and receives radio waves in several different frequency bands – 2.4 GHz and 5 GHz
• Each band is also further split into channels.
• The 5GHz band has a faster data transfer rate but a shorter signal range.
• Wi-Fi is best suited to operating full-scale networks because it offers much faster data transfer rates, better range
and better security than Bluetooth.
• A Wi-Fi enabled device can access up to 100 metres away. The number of devices connected depend upon the
router’s capacity.
• WEP (wireless equivalent privacy) and WPA (Wi-Fi protected access) are the most common security systems) 4
Cloud computing (storage)
• Cloud computing is a method of data storage where data is stored on remote servers. There may be thousands of
servers in many different locations. The same data is stored on more than one server in case of maintenance or
repair, allowing clients to access data at any time. This is known as data redundancy.
There are three common cloud storage systems:
» Public cloud – this is a storage environment where the customer/client and cloud storage provider are different
companies.
» Private cloud – this is storage provided by a dedicated environment behind a company firewall; customer/client and
cloud storage provider are integrated and operate as a single entity.
» Hybrid cloud – this is a combination of the two previous environments; some data resides in the private cloud and
less-sensitive/less-commercial data can be accessed from a public cloud storage provider.
Advantages of cloud computing (storage)
» Client files stored in the cloud can be accessed at any time, from any device, anywhere in the world, as long as
internet access is available.
» There is no need for a client to carry an external storage device with them, or even use the same computer, to store
and retrieve information.
» The cloud provides the user with remote backup of data, with obvious advantages in the event of data loss/disaster
recovery on their own computer.
» If a customer/client has a failure of their hard disk or backup device, cloud storage will allow recovery of their data.
» The cloud system offers almost unlimited storage capacity but some cloud companies charge.
» cloud is controlled by external companies, they will ensure that your files are backed up and therefore reduce the
possibility of losing irreplaceable data.
» Cloud storage is also ideal for collaboration purposes; it allows several users to edit and collaborate on a single file or
document
Disadvantages of cloud computing (storage)
» Security aspects of storing data in the cloud
» If the customer/client has a slow or unstable internet connection, they could have many problems accessing or
downloading their data/files.
» Costs can be high if a large storage capacity or high download/upload data transfer is required.
» The potential failure of the cloud storage company is always possible – this poses a risk of loss of all backup data. 5
Common network environments.
Network types
» local area network (LAN)
» wireless local area network (WLAN)
» wide area network (WAN).
Local area network (LAN)
• It covers a small area, normally confined to one building or within a close proximity.
• It consists of number of computers and devices that usually connect to a switch which is connected to a router.
Advantages of LANs:
» they allow the sharing of resources such as hardware and software
» they permit easy communication between users of the LAN
» they use a network administrator that ensures security and use of the LAN is constantly
Disadvantages of LANs:
» easier spread of viruses throughout the whole network
» queues for shared resources which can be frustrating
» slower access to external networks
» increased security risk when compared to stand-alone computers
» if the main server breaks down, in many types of network structures, the network will no longer function properly.
Wireless local area network (WLAN)
• It provides wireless network communications over a short distance using radio or infrared signals
• Access points (APs) are connected into a wired network at fixed locations.
Advantages:
• This gives users the ability to move around within the area and remain connected to the network.
• Security is a concern. The speed can reduce if there are more devices connected.
• It is easier to expand the networks and it is not necessary to connect the devices using Cables
• No cabling, so there is a safety improvement and increased flexibility
Disadvantages:
• The signal can be weaker as you move away from the Wireless Access Point.
• There is an increased chance of interference from external sources
• Data transmission rate is still slower than for cabled networks although it continues to improve
6
Common network environments.
WAN: Wide Area Network /Internet
• It is a network that extends over a large geographical area.
• It is often created by joining several LANs together. It is a network of networks and it is global.
• Routers are used to connect LAN networks to form a WAN Network.
• It is also called the Internet that links together millions of computer around the world. It is a Public network. Hence
available to all users
Typical uses of an internet would be:
• Viewing web pages
• Sending and receiving e-mail messages
• Sharing files
• Communicating using voice (VOIP) and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Intranet: It is a private network that can only be accessed by authorized users.
• It is designed for internal communications.
• It allows employees to securely share messages and files with each other.
• It also provides a simple way for system administrators to broadcast messages and roll out updates to all workstations
connected to the intranet.
• It has extra layer of security
• It helps in sharing documents.
• It helps in viewing internal web pages (e.g. company schools, university's etc.)
• It helps in Internal e-mail and instant messaging between workers
Extranet: It is an intranet that can be accessed by authorized outside users, enabling businesses to exchange
information over the internet in a secure way.
Internet Service Provider : ISP
• The organization which provides Internet access.
• It offers web space and domain name to create own website, users with an email address.
• It provides a router to connect to the internet.
• In may also offer storage space to save data in the cloud 7
4.2 Network Issues and communication: General aspects of internet security authentication technics:
1. Passwords Protecting the password
• Run anti-spyware software to make sure that your passwords are not being relayed back to whoever put the
spyware on your computer
• Change passwords on a regular basis in case it has come into the possession of another user illegally or accidentally.
• Passwords should not be easy to crack; passwords are grouped as either strong or weak.
• Strong passwords should contain: at least one capital letter, one numerical value, one special character and at least
8 characters long

2. Zero login and biometrics  It relies on devices being smart and secure enough to instantly recognise a user by
Biometrics or behavioural patterns. It builds up a complex user profile based on the above two features. Biometrics like
fingerprint recognition or simply look at their smartphone screen which is face recognition to unlock it.
Behavioural patterns include: how you walk, your typing speed, your normal location, how you swipe the screen, and
so on. These behavioural patterns, coupled with biometric data, should be enough to uniquely identify a user, and allow
them into a system without actually supplying any passwords or other security information.
Advantage is enhanced security and an easy and quick way to login to a system. But…it is difficult to identify when
being monitored, when you have been logged out & How well protected is it in reality.

3. Biometrics  finger print, face recognition

4. magnetic stripes  The cards have a magnetic stripe on the reverse side. The stripe is read by swiping it through a card
reader. Data such as name, ID number, sex, and date of birth may be contained on a magnetic stripe when used as a security
device to allow entry to a building.

Some ID cards also use a holographic image (hologram). These are designed to make forgery of the card more difficult.
Holographic images change colour or appear to have a moving object as the image is viewed from different angles. Because
these are difficult to copy, it prevents somebody simply photocopying a card and using it illegally.
Another form of security is to have a photographic image of the card user printed onto the card surface. This prevents a stolen
card from being used, because the image etched into the card will not match the perpetrator.
This is not an expensive technology and can be remotely deactivated but.. They are less secure than other methods and they
wear out with a lot of use
8
4.2 Network Issues and communication: General aspects of internet security authentication technics:
5. Smart cards.
By inserting a tag (chip and antenna) into a security card, it can act as a smart contactless card. The chip on the smart
card can store data such as name, security number, sex, date of birth and a PIN.
Smart cards can be used as a security device. If the card is in a wallet as the owner of the card walks up to a security
gate, readers on either side of the gate quickly scan the security data stored on the RFID tag embedded in the card. The
user will then be invited to enter a PIN on the keypad. If all details match, then access will be allowed.
6. Physical tokens
They contain internal clocks and when a PIN and other authentication details are entered,
then a one-time password (OTP) is generated. The OTP is shown on a small screen.
The code changes on a regular basis and is usually only valid for less than a minute.

7. Electronic tokens
software installed on a user’s device, such as a smartphone. The user has already installed the electronic token app on
their smartphone. When the website requests the user to authenticate who they are, the user opens the app on their
smartphone. The app generates a one-time password (OTP) which is valid for less than a minute. The user enters this
OTP when prompted by the website, together with some other form of authentication, such as PIN, touch ID or face ID.
The website server runs the same software as the app. Because both the server and smartphone have synchronised
clocks, they will generate the same numbers. Once the OTP and other form of authentication are verified by the
website, the user will be allowed access.

Anti-virus/anti malware software Running it in the background on a computer will constantly check for virus attacks.
» They check software or files before they are run or loaded on a computer.
» They compare a possible virus against a database of known viruses.
» They carry out heuristic checking – this is the checking of software for types of behaviour that could indicate a
possible virus; this is useful if software is infected by a virus not yet on the database.
» Any possible files or programs which are infected are put into quarantine  allows the virus to be automatically
deleted or allows the user to make the decision about deletion
» This software needs to be kept up to date because new viruses are constantly being discovered.
» Full system checks need to be carried out regularly. 9
4.2 Network Issues and communication Electronic Conferencing: Video Conferencing:
It is a communication method that uses both video and sound. A Number of people, who may be in a different part of
the country or live overseas and they can conduct a meeting in real time and makes use of some form of network.

The basic hardware includes: webcams, large monitors/television screens, microphones & speakers.

Points to note before the conference:


» Agree upon a time and date for the conference to take place.
» The delegates in each conference room must log into the video-conference system.
» The video-conference set-up needs to be checked before the meeting goes live.
» Webcams need to be placed in the correct position so that all the delegates in the room are within visual contact
» Microphones need to be placed centrally so that all of the delegates can speak
» There should be one person to be the main contact in each conference room to make sure each delegate is able to be
heard; this is particularly important if more than two video-conference rooms are linked up at the same time.
Software Description
Webcam and microphone correct software is used to ensure that the webcam
software drivers and microphone transmit their images and sound to the other delegates
CODEC CODEC can stand for COder-DECoder or COmpression-DECompression.
The first is used to encode or decode the digital data stream to allow data
to be transmitted and played back . The second is used to compress the data before it is
transmitted and then decompress it again at the receiving conference room.
Echo Echo cancellation software allows talking to take place in real time and permits the
cancellation synchronisation of communication.
software Microphones can pick up sound from the speakers creating an echo; this software
copies received signals and checks for parts of the signal that reappear but are delayed
slightly. The reappearing parts are removed from the signal (the echo is removed).

10
4.2 Network Issues and communication Electronic Conferencing: Audio/phone Conferencing:
Audio conferencing refers to meetings held between people using audio equipment done over the standard telephone
network. The procedure is as follows:
1 The organiser of the phone conference is given two PINs by the phone company. One PIN is the personal PIN (e.g.
2151) given to the organiser and the second PIN is the participant’s PIN (e.g. 8422).
2 The organiser contacts all of the participants and informs them of their PIN and the date and time of the phone
conference.
3 When the phone conference is about to start, the organiser dials the conference phone number and, once they are
connected, keys in their personal PIN (2151 in this case).
4 The participants then call the same conference number to join in – once they get through they each input the PIN
given to them by the organiser (8422 in this case).

Audio conference using a computer:


• It is also possible to hold an audio conference using a computer, as long as a microphone and speakers are
connected.
• This makes use of Voice over Internet Protocol (VoIP). It is also possible to connect an internet telephone, which
usually plugs into the router or other internet device.
• In this case equipment includes » a computer, external microphone & speakers, an internet phone, a standard
phone.
• Using VoIP allows an organiser to create a group of people to take part in the conference call. When the
conference is to take place, the organiser clicks on the required group and the conference is initiated.
• Using VoIP allows communication using voice, instant messaging and video. If some of the users do not have an
internet connection or do not have access to a computer, it is possible to add actual telephone numbers to the
created group.
The drawback is the quality of the sound when using this technique because it is totally reliant on a fast, stable
broadband connection – otherwise ‘drop out’, echoing or a very noisy line can happen, making it difficult to
understand.

11
4.2 Network Issues and communication Electronic Conferencing: Web Conferencing/webcasts/webinar:
• Multiple computers are used with this system, all connected over the internet. As with video conferencing, it is
carried out in real time and can hold meetings for business to discuss new ideas, for presentations & online
education.
• The only requirement is a computer and a high-speed, stable internet connection.
• To carry out web conferencing, each user either downloads an application or logs on to a website from a link
supplied in an email from the conference organiser.
• Delegates can leave or join the conference as they wish. The organiser can decide on who can speak at any time
using the control panel on their computer. If a delegate wishes to speak, they raise a flag next to their name.
• Delegates can post comments using instant messaging for all delegates to see at any time.

Some of the main features include:


» Slide presentations using presentation software can be posted on the conference website in advance of the meeting.
» The host’s computer screen can be shared for live presentations, or other live demonstrations.
» It is possible for any delegate to draw or write on a ‘whiteboard’ using their own keyboard or mouse.
» It is possible to transmit images or videos using the webcam throughout the conference.
» Documents can be shared by first uploading them to the website before the conference begins.
» It is possible to chat verbally or by using instant messaging throughout the conference.

There is cross-over between web conferencing, video conferencing and audio conferencing through the use of webcams
and the builtin microphone and speakers. It is possible to have a conference using any device which allows these
functions (for example, tablets and smartphones would both permit this type of group communication).

Assignement : Pages 96 to 98
12

You might also like