Unit 4 - Networks and The Effects of Using Them
Unit 4 - Networks and The Effects of Using Them
Unit 4 - Networks and The Effects of Using Them
MAC Each NIC is given a unique address Media Access Control (MAC) at the manufacturing stage.
The MAC address is made up of 48 bits which are shown as six groups of hexadecimal digits with the general format: NN
– NN – NN – DD – DD – DD where the first six hex digits identify a device made by Apple and the second set of six hex
digits are the unique serial number of the device itself.
Wireless network interface cards (WNICs) are the same as NICs in that they are used to connect devices to the internet or other
networks. They use wireless connectivity, using an antenna to communicate with networks via microwaves.
Hubs
They are hardware devices that can have a number of other devices connected to them. A hub will
take a data packet received at one of its ports and broadcast it to every device connected to it.
Hence, they are not very secure & there will be unnecessary traffic on the network, which results in reduced bandwidth.
Switches
They are ‘intelligent’ versions of hubs. They too connect a number of devices together to form a LAN.
A switch stores the MAC addresses of all devices on the network. Each port on the switch connected to a device will
have a matching MAC address called a look-up table. Using the look-up table, a switch matches
the MAC address of an incoming data packet arriving at one of its ports, and directs it to the
correct device. None of the other devices will see this data packet.
Switches are more secure than hubs and do not waste bandwidth
*** Hubs and switches are used to exchange data within their own local area networks and not with outside networks.
(such as the internet).
Bridges
Bridges are devices that connect one LAN to another LAN that uses the same
protocol . They are used to connect together different parts of a LAN so that
they can function as a single LAN.
2
Modem
A device that connects your home to your Internet service provider (ISP) and translates the
digital signals from your ISP to your router.
Routers
• Routers are used to route data packets from one network to another network, based on IP addresses.
• It can do this because each router has its own IP address. Routers are used to join a LAN to the internet.
• Each router has a routing table which keeps the IP address of all nearest router’s IP addresses.
• When a router receives a packet of data, it checks the destination IP address against the stored routing table, which
allows the router to determine the packet’s next step in the path. A data packet will pass through a number of
routers before it reaches its final destination. All the information in the data packet headers allows the data packets
to be reassembled in their correct order, according to the sequence/identity number, by the receiving station.
• Many modern broadband ‘routers’ actually combine the functions of a router and a switch – this means that they
store MAC addresses and IP addresses to enable data packets to be sent to the correct network and then to the
correct device on the network.
3
Wi-Fi and Bluetooth
Similarities:
• Both Wi-Fi and Bluetooth offer wireless communication between devices.
• Both use electromagnetic radiation as the carrier of data transmission.
• Bluetooth sends and receives radio waves in a band of 79 different frequencies known as channels.
• Both work on a frequency centered around of 2.45 GHz.
Bluetooth
• It automatically detects and connects to each other and do not interfere with other devices because each
communicating pair uses a different channel.
• When a device wants to communicate, it picks one of the 79 channels at random to pair with
another device. If the channel is already being used, it randomly picks another channel.
• Once paired, to minimise the risks of interference with other devices, the devices
constantly change the channels they are using. This is known as spread-spectrum frequency hopping.
• Bluetooth uses key encryption to create a secure wireless personal area network (WPAN).
• Maximum number of devices connected Up to 7
Bluetooth is useful:
» When transferring data between two or more devices which are very close together /less than 30 metres distance
» When the speed of data transmission is not critical
» For low-bandwidth applications for example, when sending music files from a mobile phone to a headset.
Wi-Fi
• It sends and receives radio waves in several different frequency bands – 2.4 GHz and 5 GHz
• Each band is also further split into channels.
• The 5GHz band has a faster data transfer rate but a shorter signal range.
• Wi-Fi is best suited to operating full-scale networks because it offers much faster data transfer rates, better range
and better security than Bluetooth.
• A Wi-Fi enabled device can access up to 100 metres away. The number of devices connected depend upon the
router’s capacity.
• WEP (wireless equivalent privacy) and WPA (Wi-Fi protected access) are the most common security systems) 4
Cloud computing (storage)
• Cloud computing is a method of data storage where data is stored on remote servers. There may be thousands of
servers in many different locations. The same data is stored on more than one server in case of maintenance or
repair, allowing clients to access data at any time. This is known as data redundancy.
There are three common cloud storage systems:
» Public cloud – this is a storage environment where the customer/client and cloud storage provider are different
companies.
» Private cloud – this is storage provided by a dedicated environment behind a company firewall; customer/client and
cloud storage provider are integrated and operate as a single entity.
» Hybrid cloud – this is a combination of the two previous environments; some data resides in the private cloud and
less-sensitive/less-commercial data can be accessed from a public cloud storage provider.
Advantages of cloud computing (storage)
» Client files stored in the cloud can be accessed at any time, from any device, anywhere in the world, as long as
internet access is available.
» There is no need for a client to carry an external storage device with them, or even use the same computer, to store
and retrieve information.
» The cloud provides the user with remote backup of data, with obvious advantages in the event of data loss/disaster
recovery on their own computer.
» If a customer/client has a failure of their hard disk or backup device, cloud storage will allow recovery of their data.
» The cloud system offers almost unlimited storage capacity but some cloud companies charge.
» cloud is controlled by external companies, they will ensure that your files are backed up and therefore reduce the
possibility of losing irreplaceable data.
» Cloud storage is also ideal for collaboration purposes; it allows several users to edit and collaborate on a single file or
document
Disadvantages of cloud computing (storage)
» Security aspects of storing data in the cloud
» If the customer/client has a slow or unstable internet connection, they could have many problems accessing or
downloading their data/files.
» Costs can be high if a large storage capacity or high download/upload data transfer is required.
» The potential failure of the cloud storage company is always possible – this poses a risk of loss of all backup data. 5
Common network environments.
Network types
» local area network (LAN)
» wireless local area network (WLAN)
» wide area network (WAN).
Local area network (LAN)
• It covers a small area, normally confined to one building or within a close proximity.
• It consists of number of computers and devices that usually connect to a switch which is connected to a router.
Advantages of LANs:
» they allow the sharing of resources such as hardware and software
» they permit easy communication between users of the LAN
» they use a network administrator that ensures security and use of the LAN is constantly
Disadvantages of LANs:
» easier spread of viruses throughout the whole network
» queues for shared resources which can be frustrating
» slower access to external networks
» increased security risk when compared to stand-alone computers
» if the main server breaks down, in many types of network structures, the network will no longer function properly.
Wireless local area network (WLAN)
• It provides wireless network communications over a short distance using radio or infrared signals
• Access points (APs) are connected into a wired network at fixed locations.
Advantages:
• This gives users the ability to move around within the area and remain connected to the network.
• Security is a concern. The speed can reduce if there are more devices connected.
• It is easier to expand the networks and it is not necessary to connect the devices using Cables
• No cabling, so there is a safety improvement and increased flexibility
Disadvantages:
• The signal can be weaker as you move away from the Wireless Access Point.
• There is an increased chance of interference from external sources
• Data transmission rate is still slower than for cabled networks although it continues to improve
6
Common network environments.
WAN: Wide Area Network /Internet
• It is a network that extends over a large geographical area.
• It is often created by joining several LANs together. It is a network of networks and it is global.
• Routers are used to connect LAN networks to form a WAN Network.
• It is also called the Internet that links together millions of computer around the world. It is a Public network. Hence
available to all users
Typical uses of an internet would be:
• Viewing web pages
• Sending and receiving e-mail messages
• Sharing files
• Communicating using voice (VOIP) and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Intranet: It is a private network that can only be accessed by authorized users.
• It is designed for internal communications.
• It allows employees to securely share messages and files with each other.
• It also provides a simple way for system administrators to broadcast messages and roll out updates to all workstations
connected to the intranet.
• It has extra layer of security
• It helps in sharing documents.
• It helps in viewing internal web pages (e.g. company schools, university's etc.)
• It helps in Internal e-mail and instant messaging between workers
Extranet: It is an intranet that can be accessed by authorized outside users, enabling businesses to exchange
information over the internet in a secure way.
Internet Service Provider : ISP
• The organization which provides Internet access.
• It offers web space and domain name to create own website, users with an email address.
• It provides a router to connect to the internet.
• In may also offer storage space to save data in the cloud 7
4.2 Network Issues and communication: General aspects of internet security authentication technics:
1. Passwords Protecting the password
• Run anti-spyware software to make sure that your passwords are not being relayed back to whoever put the
spyware on your computer
• Change passwords on a regular basis in case it has come into the possession of another user illegally or accidentally.
• Passwords should not be easy to crack; passwords are grouped as either strong or weak.
• Strong passwords should contain: at least one capital letter, one numerical value, one special character and at least
8 characters long
2. Zero login and biometrics It relies on devices being smart and secure enough to instantly recognise a user by
Biometrics or behavioural patterns. It builds up a complex user profile based on the above two features. Biometrics like
fingerprint recognition or simply look at their smartphone screen which is face recognition to unlock it.
Behavioural patterns include: how you walk, your typing speed, your normal location, how you swipe the screen, and
so on. These behavioural patterns, coupled with biometric data, should be enough to uniquely identify a user, and allow
them into a system without actually supplying any passwords or other security information.
Advantage is enhanced security and an easy and quick way to login to a system. But…it is difficult to identify when
being monitored, when you have been logged out & How well protected is it in reality.
4. magnetic stripes The cards have a magnetic stripe on the reverse side. The stripe is read by swiping it through a card
reader. Data such as name, ID number, sex, and date of birth may be contained on a magnetic stripe when used as a security
device to allow entry to a building.
Some ID cards also use a holographic image (hologram). These are designed to make forgery of the card more difficult.
Holographic images change colour or appear to have a moving object as the image is viewed from different angles. Because
these are difficult to copy, it prevents somebody simply photocopying a card and using it illegally.
Another form of security is to have a photographic image of the card user printed onto the card surface. This prevents a stolen
card from being used, because the image etched into the card will not match the perpetrator.
This is not an expensive technology and can be remotely deactivated but.. They are less secure than other methods and they
wear out with a lot of use
8
4.2 Network Issues and communication: General aspects of internet security authentication technics:
5. Smart cards.
By inserting a tag (chip and antenna) into a security card, it can act as a smart contactless card. The chip on the smart
card can store data such as name, security number, sex, date of birth and a PIN.
Smart cards can be used as a security device. If the card is in a wallet as the owner of the card walks up to a security
gate, readers on either side of the gate quickly scan the security data stored on the RFID tag embedded in the card. The
user will then be invited to enter a PIN on the keypad. If all details match, then access will be allowed.
6. Physical tokens
They contain internal clocks and when a PIN and other authentication details are entered,
then a one-time password (OTP) is generated. The OTP is shown on a small screen.
The code changes on a regular basis and is usually only valid for less than a minute.
7. Electronic tokens
software installed on a user’s device, such as a smartphone. The user has already installed the electronic token app on
their smartphone. When the website requests the user to authenticate who they are, the user opens the app on their
smartphone. The app generates a one-time password (OTP) which is valid for less than a minute. The user enters this
OTP when prompted by the website, together with some other form of authentication, such as PIN, touch ID or face ID.
The website server runs the same software as the app. Because both the server and smartphone have synchronised
clocks, they will generate the same numbers. Once the OTP and other form of authentication are verified by the
website, the user will be allowed access.
Anti-virus/anti malware software Running it in the background on a computer will constantly check for virus attacks.
» They check software or files before they are run or loaded on a computer.
» They compare a possible virus against a database of known viruses.
» They carry out heuristic checking – this is the checking of software for types of behaviour that could indicate a
possible virus; this is useful if software is infected by a virus not yet on the database.
» Any possible files or programs which are infected are put into quarantine allows the virus to be automatically
deleted or allows the user to make the decision about deletion
» This software needs to be kept up to date because new viruses are constantly being discovered.
» Full system checks need to be carried out regularly. 9
4.2 Network Issues and communication Electronic Conferencing: Video Conferencing:
It is a communication method that uses both video and sound. A Number of people, who may be in a different part of
the country or live overseas and they can conduct a meeting in real time and makes use of some form of network.
The basic hardware includes: webcams, large monitors/television screens, microphones & speakers.
10
4.2 Network Issues and communication Electronic Conferencing: Audio/phone Conferencing:
Audio conferencing refers to meetings held between people using audio equipment done over the standard telephone
network. The procedure is as follows:
1 The organiser of the phone conference is given two PINs by the phone company. One PIN is the personal PIN (e.g.
2151) given to the organiser and the second PIN is the participant’s PIN (e.g. 8422).
2 The organiser contacts all of the participants and informs them of their PIN and the date and time of the phone
conference.
3 When the phone conference is about to start, the organiser dials the conference phone number and, once they are
connected, keys in their personal PIN (2151 in this case).
4 The participants then call the same conference number to join in – once they get through they each input the PIN
given to them by the organiser (8422 in this case).
11
4.2 Network Issues and communication Electronic Conferencing: Web Conferencing/webcasts/webinar:
• Multiple computers are used with this system, all connected over the internet. As with video conferencing, it is
carried out in real time and can hold meetings for business to discuss new ideas, for presentations & online
education.
• The only requirement is a computer and a high-speed, stable internet connection.
• To carry out web conferencing, each user either downloads an application or logs on to a website from a link
supplied in an email from the conference organiser.
• Delegates can leave or join the conference as they wish. The organiser can decide on who can speak at any time
using the control panel on their computer. If a delegate wishes to speak, they raise a flag next to their name.
• Delegates can post comments using instant messaging for all delegates to see at any time.
There is cross-over between web conferencing, video conferencing and audio conferencing through the use of webcams
and the builtin microphone and speakers. It is possible to have a conference using any device which allows these
functions (for example, tablets and smartphones would both permit this type of group communication).
Assignement : Pages 96 to 98
12