CH 04
CH 04
Communication Technology
数科中心:李妍
Networks
IN THIS CHAPTER YOU WILL:
discuss the operation of a router and other common network devices, such as
network interface cards, hubs, bridges, switches
explain the use of Wi-Fi and Bluetooth in networks
discuss cloud computing and how to store and share data
describe the characteristics and purpose of common network environments
list the differences between different network types
discuss security issues regarding data transfer, including understanding about
passwords and other authentication methods
explain the use of anti-malware software
describe electronic-conferencing.
4.1 Networks
A network connects computers and other digital devices together and allows them to
share data and resources.
A local area network (LAN) enables a group of computers that are in close proximity to
each other to be networked.
Typically, a LAN would be used in a school, in an office or at home. A LAN is useful
because it allows resources such as files, printers, games and other software
applications to be shared by the computers on the network.
There are two ways of connecting the devices so that they can communicate with
each other. These are:
• By cables that have to be routed throughout the buildings.
• Using radio waves so that no cables are required. This method is called a wireless
local area network or WLAN.
An advantage of a WLAN over a cable LAN is that it allows the users to move around
the area with their devices and remain connected.
With a cable LAN they would have to log off, remove the cable, plug the cable in
somewhere else and log in again. A WLAN also lets one or more people connect
their mobile devices such as laptops, mobile phones, tablets, media players,
speakers and printers. This is often called a personal area network (PAN).
Wide area network
A wide area network (WAN) is a network that connects separate LANs over a large
geographical area.
Typically, a WAN will connect cities, a country or many countries. Imagine an
organisation that has offices in more than one town, they would probably each have a
LAN set up in each building and then connect them all together into a WAN. A WAN
ensures that computers in one location can communicate with computers and users in
other locations.
The internet is a huge wide area network.
The separate networks are connected by cables running throughout the world under
the ground and under the sea and by satellite communications.
The uses of Wi-Fi and Bluetooth
When computers and other digital devices are connecting to a network and
communicating with each other they have to follow sets of rules so that they can
understand each other. These sets of rules are called protocols.
Protocols are also used for other activities such as accessing printers.
Computers communicating through cables in a LAN usually use a set of rules called
Ethernet.
The two main sets of rules used by computers communicating in a WLAN using radio
waves are Wi-Fi and Bluetooth.
Wi-Fi
Wi-Fi is a digital communications protocol that sets out how data is transmitted on
wireless LANs.
Wi-Fi is a trademarked term that is owned by Wi-Fi Alliance. Each device must
connect to a wireless access point to access the network.
Bluetooth
If you have a smartphone, you can use it to connect your tablet to the internet. This
process is called tethering; it is the linking of one device to another to connect to the
internet.
Question
As well as the software rules - protocols - hardware devices are needed for devices to
be able to connect to and communicate over a network.
Network interface cards and adapters support both wired and wireless network
connections.
Every NIC is created with a hardware number permanently 'burned' into it. This
permanent hardware number is known as the MAC(media access control) address.
Every MAC address is unique so that all data on a network can be sent to the correct
component, just like letters delivered to the correct house or text messages and voice
calls to the correct phone number.
Hubs
Where a network has a central point to which all the signals from individual computers
are sent, a particular kind of network device, either a hub or a switch, is needed.
Hubs work in the following way:
• All of the computers on the network plug into a port on the hub using a cable.
• When a message is received through the cable from one of the computers, the hub
transmits it to all of the other computers.
• Hubs are 'dumb' and cannot learn the addresses of the different devices on a
network and when a message is received through the cable from one of the
computers, the hub transmits it to all of the other computers. This creates a lot of
needless network traffic.
• Hubs only allow one device at a time to transmit messages.
• Because the hub transmits every message to every part of the network and not just
to the computer it is intended for, there are a lot of unnecessary transmissions or
network traffic, resulting in a reduction in the speed that data is transmitted as the
network becomes overloaded.
• Due to this, hubs are rarely used today.
Switches
A network switch handles messages more intelligently than a hub by inspecting the
MAC address of the device to which they should be sent.
The switch knows the addresses of the different devices on the network and only
sends the message to the correct device.
Switches work in the following way:
• Network switches have a similar function to hubs in a single network, but they read
the messages passing through.
• They can read the destination addresses and send them to only the intended
computers.
• They can do this because they build up a table of all of the MAC addresses on the
network.
• They therefore cut down on unnecessary network traffic, thereby increasing the
performance of the network.
• Switches can send and receive information at the same time, so they are faster
than hubs.
Bridge
WANs, such as the internet, which is a network of networks, rely on routers to direct
data to the correct network.
When devices transmit data across the internet, the data is broken down into small
pieces called data packets. These are sent separately, and then joined up at the end
so that the message is complete.
Rules are needed so that all of the computers on the network work together.
Otherwise, how would the receiving computer know when the message is complete
or if there has been a transmission error?
A packet consists of three parts :
• Header: this contains the addresses of the source and destination, and also the
position of the packet in the complete message/file.
• Body: (also known as the payload) this contains part of the complete message/file.
• Footer: (also known as the trailer) this informs the receiving device that it has
reached the end of the packet. The footer can also be used for error checking to
make sure that the packet has been delivered intact.
A router has a routing table that lists the routes to other networks on the WAN. If the
router cannot directly connect to the destination network, it has to send it via other
networks along a route to the destination network. A routing table is a database that
keeps track of paths, like a map, and uses these to determine which way to forward
traffic.
The packets sent between computers A and B take different routes across the WAN.
The packets are sent out on their various journeys to the recipient computer. They do
not all follow the same route. In fact, they do not all arrive in the correct order but,
because they are labelled, the receiving computer can put them back together in the
correct order.
The internet allows all users access to web pages. The internet uses a set of rules or
protocols called TCP/IP. This stands for transmission control protocol/internet protocol.
That is why all computers need a unique IP address so that data can be directed to
the correct one.
An extranet is an intranet that allows users from other organisations to use it for
specific purposes.
Examples include hospital intranets that allow access to community doctors to book
appointments for patients or a manufacturing company that allows access to
distributors for ordering and pricing information. The organisation can also share news
with the other users and keep them updated on future developments.
Question
6 There are different types of networks that are in use in organisations and
companies.
a Describe the differences between the internet, an intranet and an extranet.
b Give examples of situations in which they would be used.
7 Copy and complete the table below with the words internet, extranet or intranet.
The internet, an intranet and extranet all use TCP/IP.
The level of access to each of them is different. An intranet gives access restricted to
the members of a company/organisation; the extranet expands the intranet access to
allow non-members, such as suppliers and customers, to use company resources.
The internet is different to an extranet because the extranet allows limited access to
non-members of a company/organisation; anyone can access the internet network
resources.
Cloud computing
Cloud computing is the delivery of computer services over the internet. These services,
such as software and storage space, are housed in remote computers called servers.
They are called servers because they serve these services to the users.
If you are using cloud computing, then you do not actually know where the servers are
located. They could be anywhere in the world. But they are definitely not up in the air
in the clouds!
Cloud computing allows users to access and use applications, such as word
processors and spreadsheets, stored on remote servers.
Advantages for business:
Most computer users make use of some form of cloud storage for data files, images,
etc. It can be used as the main storage device, like a remote hard disk drive, but
most use it for backing up and archiving their data.
Even if users do not set up their own cloud storage, they are using it if they use social
media. Every comment, tweet, 'Like' or picture and video is stored on remote servers.
The servers are housed in huge data centres around the world. There are about 8.4
million global data centres, consuming about 3 percent of the total electricity
generated worldwide, or 40 percent more than that generated by the whole of the UK.
These vast amounts of energy are needed to power and cool all of the computer
equipment that is needed.
To conserve energy, many of these data centres are built in cold countries and ones
where there is more energy generated from natural sources such as hydro power.
Some have even been built under the sea.、
Question
Networks should be protected against data interception and theft. Data traffic in LANs
and WANs can be intercepted. Hackers use packet analysers or 'packet sniffers' to
intercept the packets, which are then analysed and their data is decoded. The
criminals can therefore steal sensitive data such as logins, passwords, credit card
numbers and PINs. As there is no change to the network data or systems, it is
called a 'passive attack'.
There are several different ways to ensure that networks are protected and that
data is kept private and confidential.
Encryption
Firewalls are either software or hardware devices that protect against unauthorised
access to a network, and are primarily used to prevent unauthorised access from the
internet.
They can be configured to prevent communications from entering the network and
also to prevent programs and users from accessing the internet from within the
network.
For example, a firewall can inspect the
incoming packets and reject those that
are from IP addresses not on a trusted
list or block communication to certain
external IP addresses.
Authentication
Authentication is the process of determining whether someone trying to log into the
network is who they declare to be. The primary method of authentication is by the use
of passwords.
Passwords
A password is a secret word or phrase that is used to authenticate a user so that they
can gain access.
To ensure that a password is secure, some simple rules should be followed.
• Strong passwords :
• should be at least eight characters long
• contain both numbers and letters
• contain both upper and lower case letters
• contain at least one character such as: !, $, ?, etc.
• never use user-identifiable items such as name, date of birth, phone number,
postcode, car registration, etc.
• Passwords should be changed regularly.
• Previous passwords must never be reused.
• Passwords must never be written down.
• Passwords must never be shared with other users.
Passwords should be unpredictable so hackers cannot guess them or try to enter
them by trial and error.
Weak passwords are ones that can be easily guessed or discovered by hackers. They
will try things such as dates of birth, names of relatives, favourite sports teams, etc. in
different combinations. Hackers can also use software that will randomly generate
characters, numbers and symbols and these have more success on weak passwords.
It is important that all systems are checked for malware, such as spyware, so that
criminals cannot intercept the passwords or monitor computers to find out what the
user in entering. This can be done by using anti-spyware software. However, because
malware changes so rapidly, as criminals find new ways to hack computers, it is
important that your anti-spyware is kept up-to-date.
Authentication can also include a variety of methods such as:
• biometric methods
• magnetic stripes
• smart cards
• physical tokens
• electronic tokens
• zero login.
Biometric methods
Personal and security data can be encoded on the magnetic stripe of a card and can
be swiped through a reader to allow access.
The magnetic stripe on the back of a credit card is split into three tracks and they can
all contain data. The first and second track hold coded information about the
cardholder's account: the card holder's full name, card number and CW value, date of
expiry of the card and the code for the country in which it was issued. The third track is
not always used, but if it is, it holds details like the currencies that are valid for use
with the card.
Smart cards
A smart card looks like a credit card in size and shape. However, a smart card
contains a computer chip and when it is held near a reader, data can be transferred to
allow the owner to be authenticated for access to a room or computer system.
There are two kinds of smart cards: contact and contactless. With contact smart cards,
the smart card is inserted into the reader, and the card's contact plate makes physical
contact with the reader to transmit data. The user then enters the associated PIN.
With contactless smart cards, the card just has to be held close to the reader, and
data is transmitted via radio waves.
Physical tokens
A physical token allows you to access software and verify your identity with a physical
device rather than relying on authentication codes or passwords. They are also called
key fobs, security tokens or USB tokens.
Electronic tokens can be used for electronic payments. A credit card number is
converted to a string of random characters that have no value.
When a credit card payment has been converted to a token, a payment network such
as Visa uses its secure keys to decode it and pass the card number to the standard
electronic payment processors.
Importantly, merchants themselves cannot decode a token. Converting a token back
to a card number requires access to the encryption keys, which are typically stored in
military-grade security.
Paying with a smartphone uses electronic tokens. The app replaces the customer's
card details with a unique virtual account number. That way, sensitive information
stays private.
Zero login
Passwords and other methods of authentication can no longer be relied upon in the
long term. Using artificial intelligence, technologies are being developed so that users
can be authenticated, not by a password or physical features, but by how they behave.
This is called zero login.
Its main difference is that complex passwords or other documentation will not be
required for identification. Our smart devices will be smart enough, and also secure
enough to recognise facial features, voice, movements and other ways, in which a
person is unique, to use as identification. How you swipe and type, where you are and
when you work are all unique to you.
Anti-malware software
Malware
Malware is short for malicious software and is designed to get into computers without
the user’s consent and to disrupt or damage the computer. It includes any software
designed to disrupt the functioning of a computer system and gain unauthorised
access to a computer system.
Types of malware include:
• virus
• worm
• Trojan (or Trojan horse)
• spyware
• adware.
Anti-malware software is software that is designed to combat the effects (or even the
installation) of malware. It needs to be installed on a computer so that the system can
be protected from infiltration and infection by any malware.
The anti-malware program first detects any malware on a computer, removes it safely
and then clears up any damage that the malware made to the computer.
Audio-conferencing
The members cannot see each other or any visual presentations. They may not be
able to tell who is actually speaking or may inadvertently talk over each other.
Both require input and output devices for sound and vision and a communications link
between the participants.
For web-conferencing
• microphone
• speakers or headphones
• video camera (if it is visual as well as audio)
• a display screen or monitor
• an internet connection
• web-conferencing software.
Most participants use mobile devices such laptops and smartphones, which have
these hardware devices built-in.
For video-conferencing
Video-conferencing requires the same hardware, but this is usually of high quality,
individual components rather than being built into a single device.
Usually a dedicated room is used with a large, wall mounted monitor and central video
camera and speakers. Video-conferences are also conducted over private lines or
secure internet connections.
Question
11 List the similarities and differences between audio-, video- and web-
conferencing.
12 Describe 'electronic-conferencing', and explain the methods and equipment
required.
13 Explain the differences between video- and web-conferencing.