CH 06
CH 06
Chapter Topics
2
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
3
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
But analog data can be converted into digital form. Even though
digital data is not as exact as analog data, it is easier to
manipulate. 4
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
5
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
6
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
6.2 Networks
7
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network
• A network, or communications network, is a system of
interconnected computers, telephones, and/or other
communications devices that can communicate with one
another and share applications and data.
• Benefits of Networks
• Share peripheral devices, such as printers,
scanners, disk drives
• Share programs and data
• Better communications, including email
• Access to shared databases
8
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network
• Some disadvantages of networks:
• Expense: The initial set up cost of a computer
network can be high depending on the number of
computers to be connected and the number of
connecting devices and NICs .
• Security Issues: If a computer is on a network, a
computer hacker can get unauthorized access by
using different tools.
• Rapid Spread of Computer Viruses: If any computer
system in a network gets affected by computer virus,
there is a possible threat of other systems getting
affected, too.
• Dependency on the Main File Server: If the main file
server of a computer network breaks down, the
entire system can become useless.
9
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
2. Peer-to-Peer (P2P)
• All computers on the network are
“equal” and communicate directly
with one another, without relying on
servers.
• Peer-to-peer networks are easy to
set up, less expensive than client-
server networks, for small firms.
12
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
13
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Components of a Network
• HOSTS & NODES (The client-server type of network)
• A host computer, a central computer that controls the
network.
• A node is any device that is attached (wired or wireless) to a
network—for example, a microcomputer, storage device,
scanner, or printer.
Backbone
18
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
Star network
• is one in which all microcomputers and other
communications devices are directly connected to a central
network switch.
• The central switch monitors the flow of traffic. A PBX
system—a “private branch exchange” telephone system.
• The Ethernet communications protocol is embedded in
software and hardware devices intended for building LAN,
and it is commonly used in star topologies.
19
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
Ring network
• A ring network is one in which all microcomputers and other
communications devices are connected in a continuous loop.
• Electronic messages are passed around the ring until they
reach the right destination. There is no central server.
20
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
Bus network
• All nodes are connected to a single wire or cable, called the
bus. The bus has two endpoints, or terminators, which stop
the network signal. Each communications device on the
network transmits electronic messages to other devices.
• Works like a bus system at rush hour, with various buses
pausing in different bus zones to pick up passengers
21
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
Tree network
• Often used by corporations to share organization-wide data,
a tree network is a bus network of star networks.
• A tree network might be found on a university campus in
which each department has its own star network with its
own central computer.
22
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
Mesh network
• is based on the principle that each node has more than one
connection to the other nodes so that a message can take
any possible shortest, easiest route to reach its destination.
• There must be at least two paths to any individual computer
to create a mesh network. (Wireless networks are often
implemented as a mesh, and the Internet is a mesh.)
23
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
Network topologies
24
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
25
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
6.3 Cyberthreats,
Hackers, & Safeguards
26
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
• Cyberthreats
• Denial of Service Attacks
• Consist of making repeated requests of a computer or
network device, thereby overloading it and denying access
to legitimate users
• Used to target particular companies or individuals
• Viruses
• Deviant program that hides in a file or a program on a disk,
flash memory drive, in an e-mail, or in a web link that
causes unexpected effects such as destroying or corrupting
data
28
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
• Cyberthreats (continued)
• Trojan Horses
• Programs that pretend to be a useful program such as a
free game or a screensaver but that carry viruses or
malicious instructions that damage your computer or
install a backdoor or spyware
• Backdoors and spyware allow others to access your
computer without your knowledge
• Worms
• A program that copies itself repeatedly into a computer’s
memory or disk drive
• May copy itself so much it crashes the infected computer
29
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
• Cyberthreats (continued)
• How they spread
• Via e-mail attachments
• By infected disks and flash drives
• By clicking on infiltrated websites
• By downloading infected files from websites
• From one infected PC on a LAN to another
30
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
• Cybervillains
• Hackers are either
• Computer people who enjoy learning
about programming and computers
• People who gain unauthorized access to
computers or networks, often for fun or
just to see if they can
31
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
• Online Safety
• Use antivirus software, and keep it current
• Install a firewall to monitor network traffic and filter out
undesirable types of traffic and undesirable sites
• Don’t use the same password for multiple sites
• Don’t give out any password information
• Use robust passwords:
• Minimum 8 characters with letters, numbers, characters
• 4cats is not a good password; f0UrK@tTz is safer
32
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
33
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology: Your Digital World
34
Using Information Technology, 10e © 2013 The McGraw-Hill Companies, Inc. All rights reserved.