0% found this document useful (0 votes)
14 views187 pages

Communication

The document provides an overview of networking concepts, including types of networks (LAN and WAN), network topologies (bus, star, ring, hybrid, mesh), and the roles of networking devices like routers. It discusses the advantages and disadvantages of networks, the differences between public and private networks, and the significance of protocols such as TCP/IP and DNS. Additionally, it explains IP addressing, including IPv4 and IPv6, and the functioning of communication systems like PSTN and cellular networks.

Uploaded by

daizhuomingdai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views187 pages

Communication

The document provides an overview of networking concepts, including types of networks (LAN and WAN), network topologies (bus, star, ring, hybrid, mesh), and the roles of networking devices like routers. It discusses the advantages and disadvantages of networks, the differences between public and private networks, and the significance of protocols such as TCP/IP and DNS. Additionally, it explains IP addressing, including IPv4 and IPv6, and the functioning of communication systems like PSTN and cellular networks.

Uploaded by

daizhuomingdai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 187

 Show understanding of the purpose and benefits of networking devices

 Show understanding of the characteristics of a LAN (local area network) and a WAN (wide area
network)
 Explain the client-server and peer-to-peer models of networked computers
 Show understanding of thin-client and thick-client and the differences between them
 Show understanding of the bus, star, mesh and hybrid topologies
 Show understanding of cloud computing
 Show understanding of the differences between and implications of the use of wireless and
wired networks
 Describe the hardware that is used to support a LAN
 Describe the role and function of a router in a network
 Show understanding of Ethernet and how collisions are detected and avoided
 Show understanding of bit streaming
 Show understanding of the differences between the World Wide Web (WWW) and the internet
 Describe the hardware that is used to support the internet

BY THE END OF THIS TOPIC


 A network is two or more computers that are linked together so that they
are able to share resources ,eg. Printers ,Scanners ,Data, Software and
Internet

WHAT IS A NETWORK?
 You can share hardware
 Software is allocated out to each computer from a central
position. Making the installation process much faster
 Work can be backed up centrally by the network manager,
meaning users don’t need to do it
 Passwords make sure that other people cannot access your work
 Email facilities are available for users on a network, making
communication much easier
 Users can access central stored data

ADVANTAGES OF USING A NETWORK


 A network manager needs to be employed, which is quite costly
 Computer viruses spread easily and Hackers may gain access to
the network
 If a network breaks down, then users will not have access to
important information
 The initial cost for equipment and cabling is quite expensive, plus
the installation

DISADVANTAGES OF USING A NETWORK


 Local Area Network- a network on one site
 Wide Area Network- a network where the terminals/computers
are remote from each other and telecommunications are used
to communicate between them

TWO TYPES OF NETWORKS


 Confined to small area
 Usually located in a single building
 Uses cable, wireless, infrared and microwave links which are
owned by the organization
 Less expensive to build as equipment is owned by the
organization which is cheaper
 The risk of outside intrusion is reduced completely

PROPERTIES OF LAN
 Covers a wide geographical area
 In lots of different buildings and cities, countries
 Uses more expensive telecommunication links that are supplied
by telecommunication companies
 More expensive to build as sophisticated communication systems
are used.

PROPERTIES OF WAN
 The devices in a network may be arranged in different ways.
Each is called a topology

NETWORK TOPOLOGIES
 Bus
 Star
 Ring
 Hybrid
 Mesh

TYPES OF TOPOLOGIES
BUS TOPOLOGY
 All the devices connected to the network are connected to a
common shared cable called the backbone
Advantages
 Lower cost because less cabling is needed
 Simple cable runs makes them easy to install
 It is easy to add extra devices to the network
 If on e cable breaks then only that PC is affected

BUS TOPOLOGY
Disadvantages
 If more than 12 devices are connected to the network then the
performance of the network is poor
 If there is a break in the backbone. Then the whole network fails

BUS TOPOLOGY
HUB OR SWITCH

STAR TOPOLOGY
 The star topology uses a central connection(hub/switch) for all
the devices on the network.
Advantages
 Faults in network cable will not affect the whole network
 Easy to add more computers
Disadvantages
 Higher cost
 Dependence on the central hub/switch, if it fails then the whole
network fails

STAR TOPOLOGY
RING TOPOLOGY
 A ring topology is a network topology where each node (device
on the network) connects to two other nodes. This forms a
continuous path for the signal through each device.
 This works because data travels from node to node (device to
device). In a ring topology (also called a ring network), each
node handles the data packets itself, then passes it to the next
node, which also handles the packets.

RING TOPOLOGY
 It is a very organized network topology
 it performs well under a hefty network load
 It can also be used to create a larger Token Ring network

ADVANTAGES OF RING TOPOLOGY


 One bad port, or even a bad node, can disrupt the entire
network
 Merely moving a node, adding to or changing the network can
also affect the network

DISADVANTAGES OF RING TOPOLOGY


 Hybrid Topology
 Mesh Topology

OTHER TYPES OF TOPOLOGIES


 This is whereby a network is composed of two or more network
topologies i.e. a single network can have a combination of many
network topologies.
 The most common hybrid topology is a star-bus topology that is
made up of a star and a bus topology.

HYBRID TOPOLOGY
HYBRID TOPOLOGY
 A star-bus topology supports future expandability of the network
much better than a bus or a star topology.
 Failure of one device or network element does not affect the
whole network. E.g. if a single hub fails, only the computers
connected to that hub will be affected.

ADVANTAGES OF HYBRID
 It is expensive to implement. This is because of the cost of extra
cable length and additional hubs

DISADVANTAGES OF HYBRID
 This is a network topology whereby every device is connected to
all other devices in the network (full mesh). In this type of network,
there will be more than one communication path between any
two computers therefore if one communication channel goes
down, data can still flow through a different communication
path.

MESH TOPOLOGY
MESH TOPOLOGY
MESH TOPOLOGY
 Malfunction of a network device does not affect the network.
 Breakage of a network cable does not have any effect on the
network because data can flow through a different path to get
to its destination.

ADVANTAGES OF MESH
 It is difficult to add components to the network
 It is a very complex network that requires complicated
configurations to implement.

DISADVANTAGES OF MESH
 A network within the range of an individual person e.g. Bluetooth
connection which have a range of 10m

PAN(PERSONAL AREA NETWORK)


 Private networks are owned by a single company or organisation
 (they are often LANs or intranets with restricted user access, for example, passwords
and user ids are required to join the network);
 the companies are responsible for the purchase of their own equipment and software,
maintenance of the network and
 the hiring and training of staff

PRIVATE NETWORK
 Public networks are owned by a communications carrier company
 (such as a telecoms company);
 many organisations will use the network and there are usually no specific
password requirements to enter the network –
 but subnetworks maybe under security management.

PUBLIC NETWORK
 The Public Switched Telephone Network (PSTN)
 dedicated lines
 cell phone network

COMMUNICATION SYSTEMS
 PSTN stands for Public Switched Telephone Network, or the traditional
circuit-switched telephone network
 Using underground copper wires, this legacy platform has provided
businesses and households alike with a reliable means to
communicate with anyone around the world for generations.
 PSTN phones are widely used and generally still accepted as a
standard form of communication. However, they have seen a steady
decline over the last decade.
 as a combination of telephone networks used worldwide, including
telephone lines, fiber optic cables, switching centers, cellular
networks, as well as satellites and cable systems.

PUBLIC SWITCHED TELEPHONE NETWORK (PSTN),


 Step #1 – Your telephone set converts sound waves into electrical signals. These signals are
then transmitted to a terminal via a cable.
 Step #2 – The terminal collects the electrical signals and transmits these to the central
office (CO).
 Step #3 – The central office routes the calls in the form of electrical signals through fiber
optic cable. The fiber optic conduit then carries these signals in the form of light pulses to
their final destination.
 Step #4 – Your call is routed to a tandem office (a regional hub responsible for transmitting
calls to distant central offices) or a central office (for local calls).
 Step #5 – When your call reaches the right office, the signal is converted back to an
electrical signal and is then routed to a terminal.
 Step #6 – The terminal routes the call to the appropriate telephone number. Upon
receiving the call, the telephone set converts the electrical signals back to sound waves.

HOW PSTN WORKS


• Voice over IP (VoIP) is also known as IP telephony, broadband telephony, or internet
VoIP telephony—but it means the same thing: your voice transmitted through the internet.
• The voice signal is converted into a digital signal and it then travels over the internet and
reaches the destination.
PACKET SWITCHING
POTS
 A cellular network or mobile network is a communication network where
the last link is wireless.
 The network is distributed over land areas called "cells", each served by at
least one fixed-location transceiver, but more normally, three cell sites or
base transceiver stations

CELLULAR NETWORK
 https://www.youtube.com/watch?v=9OrNuAf6C3I

CELLULAR NETWORK EXPLAINED


 A packet is the unit of data that is routed between an origin and
a destination on the Internet or any other packet-switched
network
 A packet consists of control information and user data
 Data such as : source and destination network addresses, error
detection codes, and sequencing information
 Network packets may contain a checksum, parity bits or cyclic
redundancy checks to detect errors that occur during
transmission.

PACKET
 Another name for a packet is a datagram.
 Data transferred over the Internet is sent as one or more packets. The most
common packet sent is the TCP((Transmission Control Protocol) packet.
 The size of a packet is limited, so most data sent over a network is broken up into
multiple packets before being sent out and then put back together when
received.
 When a packet is transmitted over a network, network routers and switches
examine the packet and its source to help direct it to the correct location.
 During its transmission, network packets can be dropped. If a packet is not
received or an error occurs, it is sent again(ARQ).

BASIC PROPERTIES OF A NETWORK PACKET


 Circuit switching
 Packet Switching

TYPES OF SWITCHES
Circuit Switching
 In circuit switching there are 3 phases: Packet switching
i) Connection Establishment.  In Packet switching directly data transfer takes
ii) Data Transfer. place .
iii) Connection Released.

DATA TRANSFER
Circuit Switching
Packet switching
 In circuit switching, each data unit know
the entire path address which is  In Packet switching, each data unit just
provided by the source. know the final destination address
intermediate path is decided by the routers.

PATH
 A set of rules for data transmission which are agreed by sender
and receiver

PROTOCOLS
• Every computer, mobile phone, and any other device connected to the Internet needs a
numerical IP address in order to communicate with other devices.

• The original IP address scheme, called IPv4, is running out of addresses.

• IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly to IPv4 in
that it provides the unique, numerical IP addresses necessary for Internet-enabled devices to
communicate.
• IPv6 utilizes 128-bit addresses.
• IPv4 uses 32 bits for its Internet addresses.

• That means it can support 2^32 IP addresses in total


• Therefore, it can support 2^128 Internet addresses —
340,282,366,920,938,000,000,000,000,000,000,000,000 of them to be exact.

IPV6 VS IPV4
 The Domain Name System (DNS) is the phonebook of the Internet.

 Humans access information online through domain names, like nytimes.com or espn.com.

 Web browsers interact through Internet Protocol (IP) addresses

 DNS translates domain names to IP addresses so browsers can load Internet resources.

 Each device connected to the Internet has a unique IP address which other machines use
to find the device.

DOMAIN NAME SERVER


CONVERT URL TO MATCHING IP
HOW THE BROWSER USES THE DOMAIN NAME
SERVICE (DNS) TO DISPLAY THE WEB PAGE
 Short for Transmission Control Protocol/Internet Protocol, TCP/IP is
a set of rules (protocols) governing communications among all
computers on the Internet.

EXAMPLE 1-TCP/IP
 Public IP address
 Private IP address

TYPES OF IP ADDRESSES
 Internet Assigned Numbers Authority (IANA) is the organization
responsible for registering IP address ranges to organizations and
Internet Service Providers (ISPs).

IANA
 A public IP address is an IP address that can be accessed over
the Internet.
 Like postal address used to deliver a postal mail to your home, a
public IP address is the globally unique IP address assigned to a
computing device.

PUBLIC IP ADDRESS
EXAMPLE OF PUBLIC IP ADDRESS
 Private IP address, on the other hand, is used to assign computers within
your private space without letting them directly expose to the Internet.

PRIVATE IP ADDRESS
 This
part specifies the unique number assigned to your
network.
 It also identifies the class of network assigned.
 the network part takes up two bytes of the IPv4 address.

NETWORK PART
 This is the part of the IPv4 address that you assign to each host. It
uniquely identifies this machine on your network.
 Note that for each host on your network, the network part of the
address will be the same, but the host part must be different.

HOST PART
 Port number:
A software-generated number that specifies an application or a
process communication endpoint attached to an IP address.

PORT NUMBER
 IP can be dynamic or static
 Static IP does not change whereas a dynamic IP address does
change
 Web server will always use static IP address
 Nodes connecting to Private networks will always use dynamic
IP address

IP ADDRESS
IPV6
 Uses Hexadecimal notation  Uses Hexadecimal notation
 Use 128 Bits  Uses 32 bits
 Has Eight parts  Has Fours parts
 From 0 to 65535  From 0 to 255

IPV6 VS IPV4
 HTTP - Used between a web client and a web server, for non-secure data transmissions. A
web client (i.e. Internet browser on a computer) sends a request to a web server to view a
web page. The web server receives that request and sends the web page information
back to the web client.
 HTTPS - Used between a web client and a web server, for secure data transmissions. Often
used for sending credit card transaction data or other private data from a web client (i.e.
Internet browser on a computer) to a web server.
 FTP - Used between two or more computers. One computer sends data to or receives data
from another computer directly.

THREE OF THE MOST COMMON TCP/IP PROTOCOLS


 The TCP/IP address for a website or web server is typically not
easy to remember.
 To remedy this issue, a domain name is used instead. For
example, 216.58.216.164 is one of the IP address for Google and
google.com is the domain name.
 Using this method, instead of a set of numbers, makes it much
easier for users to remember Computer web address.

DOMAIN NAMES AND TCP/IP ADDRESSES


IP ON WINDOWS
IP ON MAC
 Each web site has an IP(Internet Protocol) address
 Two types of IP (IPV4-192.168.0.1 or IPV6-f880::8081:8f21:ef21:ef74:622f%12)

INTERNET PROTOCOL
 www.google.com
 www.yahoo.com
 www.polytechnic.edu.na
 en.wikipedia.org

FIND IP ADDRESS FOR THE


FOLLOWING SITES
 Ethernet is the other domain protocol in the modern networked world.
 Institute OF Electrical AND Electronic Engineers(IEEE).
 The STANDARD of wired network is denoted as IEEE 802.3 which can be
considered as a synonym for Ethernet
 The standard has evolved through five generations:
 Standard , fast, gigabit, 10 gigabits and 100 gigabit
 Gigabit refers to the transfer speed
 Ethernet transmit data in frames
 Each frame contains a source address and a destination address
 The address will be the physical address(MAC) media access control
 Uniquely identifies an NIC(network Interface Card)

ETHERNET PROTOCOL
 Methods of sending and receiving email

EMAIL PROTOCOLS
 Client server architecture
 Peer to peer architecture

TYPES OF NETWORKS ACCORDING TO


ARCHITECTURE
 Client-server architecture is whereby one or more computers
provide services and information to other computers on the
network.
 These services can consist of; file services, web services, email
services, print services, domain lookup services, network security,
database management services e.t.c.

CLIENT SERVER
CLIENT SERVER APPLICATION
 Increased cost: due to the technical complexity of the server
 A weak link: if the server goes down then the whole network is
affected as the service will not be available to the whole
network.

DISADVANTAGES OF CLIENT SERVER


 Centralized - Resources and data security are controlled through the
server.
 Scalability - it is possible to remove or add clients without affecting the
operation of the network and without the need for major modification.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Backup - as all data is stored centrally it is easy to backup
 Support and management - as the server controls the majority of settings
on the network etc the job of support is far easier as the main element of
support is provided to the server and not individual machines.

ADVANTAGES OF CLIENT SERVER


 Latency-the delay(how fast signals travel)
 Bandwidth(maximum rate of data transfer (bps))
 Error rate- rate of corruption
 Wired connection faster than wireless
 Bandwidth e.g Ethernet = 10Mbps, wireless= 11Mbps to 1.3 Gbps
 Bandwidth can be congested
 Wifi signals can’t get through thick walls
 Wifi range is limited
 Wifi signals on the same frequency can lead to data collisions

FACTORS AFFECTING PERFORMANCE


 File server
 Web server
 Print Server
 Application Server
 Mail server
 Domain Name Server DNS

TYPES OF SERVERS
 A file server is a dedicated computer in a network that is used to
store the files such as word processing documents, spreadsheets,
financial data and other useful information. Typically a file server
has a large memory and additional hard disks. Server itself and all
the client computers stores data on the file server and access it
again when required.

FILE SERVER
 A web server is a computer that is used to respond the client’s
HTTP requests (usually web browsers) and return the response in
the form of the web pages, images, voice files, graphics, video
clips and others. A single web server is capable to host many
websites.

WEB SERVER
WEB SERVER
WEB SERVER
 A powerful computer that provides software application services
to other workstations in the network. All processing is done by the
application server, none of the terminals connected to the server
does any processing.

APPLICATION SERVER
This is a computer on the network that
provides print services to other computers
on the network.

PRINT SERVER
 A powerful computer where email accounts are held i.e.
provides hard disk space for email account holders e.g. hotmail,
gmail, iway e.t.c.

MAIL SERVER
 A peer-to-peer architecture is whereby all workstations in the
network have the same capabilities i.e. they all have their own
resources and run their own programs. They do not depend on
other computers for any service.

PEER-TO-PEER ARCHITECTURE
 It is easy to install.
 Configuration of computers is easy.
 Users can control their shared resources.
 The cost and operation of this network is less.
 It is ideal for small businesses having ten or fewer computers.
 It needs an operating system and a few cables to get
connected.
 A full time network administrator is not required.

ADVANTAGES OF PEER-TO-PEER
 A computer can be accessed anytime.
 Network security has to be applied to each computer separately.
 Backup has to be performed on each computer separately.
 No centralized server is available to manage and control the
access of data.
 Users have to use separate passwords on each computer in the
network.

DISADVANTAGES OF PEER TO PEER


Step 1:
Open the Command Prompt (CMD) as an Administrator.
(Press Windows key + X + A)

Step 2:
Type in the following command to ensure that your network interface supports Hosted Networkfeature:

netsh wlan show drivers

If Hosted network supported shows “Yes”, that’s great.


If it says “No”, you can try to update your wireless driver. If the updated driver still does not help, then you need to upgrade your
hardware.

Step 3:
Now, we need to configure Ad Hoc Wireless connection. Type in CMD this command:

netsh wlan set hostednetwork mode=allow ssid=<your desired network name> key=<your password>
keyUsage=<persistent> or <temporary>

WINDOWS 8 PEER-2-PEER
Step 4:
Next, you need to start it. Type in CMD the command below:

netsh wlan start hostednetwork

Make sure your wireless network connection is enabled.

Step 5:
Navigate to Control Panel > Network and Sharing Center. Click on “Change adapter
settings”

Right-click on Wi-Fi adapter > select Properties

Head to “Sharing” tab > check the box Allow other network users to connect through this
computer's Internet connection > finally click on OK button.

WINDOWS 8 PEER-2-PEER
 Youtube link:
 https://www.youtube.com/watch?v=Az3KhnoBXKQ

BANDWIDTH, BIT STREAMING AND BIT RATE


 Bandwidth measures the range of frequencies available on the
communication channel
 This statement define the capacity but bandwidth is measured in kilohertz(KHz)
 Or as transmission rate in bits per second(bps)
 Bandwidth is not quite speed. It is the number of bits per second that the line
can transmitted per second

WHAT IS BANDWIDTH?
 In networking and digital

WHAT IS BANDWIDTH?
 Bit streaming is a contiguous sequence of digital bits sent over the internet or a
network that requires a high speed data communication link (such as fast broadband)
 A bit stream is a continuous flow of bits over a communication path
 Bit streaming can be either on demand or real time.

BIT STREAMING
 Digital files stored on a server are converted to a bit streaming format (encoding takes place
and the encoded files are uploaded to a server).
 A link to the encoded video/music file is placed on the web server to be downloaded.
 The user clicks on the link and the video/music file is downloaded in a contiguous bit stream.
 Because it is on demand, the streamed video/music is broadcast to the user as and when
required.
 It is possible to pause, rewind and fast forward the video/music if required.

ON DEMAND
 An event is captured by camera and microphone and is sent to a computer.
 The video signal is converted (encoded) to a streaming media file.
 The encoded file is uploaded from the computer to the dedicated video streaming
server.
 The server sends the encoded live video to the user’s device.
 Since the video footage is live it is not possible to pause, rewind or fast forward.

REAL TIME
PROS AND CONS OF BIT STREAMING
 An intranet is a network that is used inside an organisation and
makes use of web pages, browsers and other technology
 Schools and Universities use intranets and they can hold all sorts
of information from teaching resources, information about
courses , adverts to student personal records and attendance
details.

INTRANET
DIFFERENCE BETWEEN REAL-TIME AND
ON-DEMAND BIT STREAMING.
 Internet stands for INTERnational NETwork, and Intranet stands for
INTERnal Restricted Access NETwork
 An intranet contains information concerning a particular
organization, whereas the internet contains information about
everything
 Intranets are usually only used by employees of a particular
organization, where as the internet can be used by anyone
 Intranets are based on an internal network, whereas the internet
spans countries around the world.
 With intranet you can block sites which are outside the internal
network using a proxy server

DIFFERENCE BETWEEN AN INTRANET


AND THE INTERNET
 Intranet are ideal in schools because they can be used to
prevent students from accessing unwanted information
 Internal email system is more secure compared to sending emails
using the internet
 Only information that is relevant to the organization can be
accessed and this way employees/students will not visit
inappropriate sites

ADVANTAGES OF INTRANET
 Computers used to supply an internet connection for other
computers are called web servers.
 Most people connect to the internet via an organization called
Internet Service Provider

ISP AND SERVICES THEY PROVIDE


 Storage on their server, where you can store your website
 Email facilities
 Instant messages where you can send short messages to your
friends when online
 Access to online shopping
 Access news, sports, weather, financial pages, etc.

SERVICES PROVIDED
 These are programs that allow web pages stored on the internet
to be viewed.
 Web browsers read the instructions on how to display the items
on a web page which are written in a form called HTML
 It allows the user to find information on the web sites and web
pages quickly.

WEB BROWSERS
 By entering a web address(URL)
 By internet portals
 By Links
 By Menus

FINDING WEB SITES


 A device needs a NIC to be able to connect to a network
 All NICs have a unique identifiers called a Media Access
Control(MAC) address
 SO every device on a network has its own MAC address, unique
worldwide
 It’s hard-coded into the NIC, so cannot be changed

NETWORK INTERFACE CONTROLLER(NIC)


 Bridges are devices used to connect LANs together
 When one of the LANs sends a message, all the devices on the
LAN receive the message. Increasing the data flow.
 If one computer in one LAN sends a message to another
computer on another LAN then the message needs to go
through the Bridge.

BRIDGES
BRIDGE BETWEEN NETWORKS
 WLAN
 Network devices
 HUB/Switch
 routers
 Unshielded and Shielded Twisted pair cables
 Fibre optics cables
 Smart and Dumb Terminals
 Modem
 Satellite links
 microwaves

METHOD AND DEVICES USED FOR


COMMUNICATION
WIRELESS ROUTER AND WIRED ROUTER
 A packet is one unit of binary data capable of being routed
through a computer network
 A data packet is a unit of data made into a single package that
travels along a given network path.
 A packet is the unit of data that is routed between an origin and
a destination on the Internet or any other packet-
switched network.

WHAT IS A PACKET?
 Each computer linked to the Internet is given a number which is
called IP address.
 This address is like this 198.168.0.10 and it is unique for each
device whilst linked to the internet.
 When data is transferred from one network to another the data is
put into packets.
 The packets contain details of the destination address of the
network it is intended for

ROUTERS
 Computers on the same network all have the same first part of
the IP address and this is used to locate a particular network
 Routers are hardware devices that read the address information
to determine the final destination of the packet.
 Each router has a table stored to indicate where each packet
should go, it will be bounced from router to router until it reaches
its final destination
 Routers can be used to connect wired/wireless networks together
 It also allow computers in the home to share an internet
connection

ROUTERS
 A hub is a simple device that does not manage any of the data
traffic through
 It is used in a network to enable computers on the network to
share files and hardware such as scanners and printers
 Data is transferred through networks in packets
 A hub contains multiple ports(connection points)
 When a packet arrives at one port, it is transferred to the other
ports so that all network devices of the LAN can see all the
packets and inspect it to see if it is relevant

HUB
HUB
 Like a hub, switches are used to join computers and others
devices together in a network but they work in a more intelligent
way compared to a hub
 Switches inspect the packets and forward them to appropriate
computer
 Uses MAC adresses

SWITCHES
SWITCH
 It is a server that takes client computer requests and forwards
them to other servers
 The proxy server is able to modify requests and responses.
 A proxy server can be a major component of a firewall

PROXY SERVER
PROXY SERVER AS SOFTWARE
PROXY SERVER AS HARDWARE
 Wi-Fi
 Bluetooth
 Mobile hot spots
 Router

WIRELESS LOCAL AREA NETWORK


 Wi-Fi enables computers and other devices to communicate wirelessly with each
other
 Areas where the internet can be accessed wirelessly using Wi-FI are called access
points or hotspots and they can be found in many places public places.
 WiFi signal from your laptop is often transmitted at 2.4 GHz, a frequency found within
the microwave range, or spectrum of 300 MHz to 300 GHz. This 2.4 GHz frequency is
also within the same spectrum of what is called the Radio Frequency (RF) range, 3
KHz – 300 GHz

WI-FI-WIRELESS FIDELITY
WIRELESS MODEM
 This device allows a wireless connection to a wired network using Wi-Fi
standard(transmission medium=air) Radio waves.
 A WAP may be standalone and connected to a router or be part of a router
itself

WIRELESS ACCESS POINT(WAP)


BASIC INTERNET SET-UP
USB Wi-Fi Wireless LAN Adapter
Wireless adaptor

WIRELESS ADAPTOR
WIRELESS ROUTER
 A wireless modem provides a way to connect to the internet
through an Internet Service Provider (ISP).
 A wireless router is a way for you to share one internet
connection, usually at a home or small office, with multiple
computers

DIFFERENCE BETWEEN A WIRELESS


ROUTER AND WIRELESS MODEM
 You can work in hotels, coffee shops, restaurants etc. Provided if
there is a hotspot.
 You are not confined to working one place
 Fewer/no trailing wires to trip on
 It is easier to keep a working area clean if there are not as many
wires in the way
 There are no network wires the costs for installation are reduced.
 It is also safe because it is password protected so not anyone can
access it.

ADVANTAGES OF WIRELESS
COMMUNICATION
 The danger of hackers reading messages
 There are areas where you cannot get a wireless network. Which
areas do you think we are talking about?
 There is some evidence that they may be a danger to health
 Limited signal range

DISADVANTAGES OF WIRELESS
COMMUNICATION
 Bluetooth is a wireless technology used to exchange data over a
short distance and it makes use of radio waves
 The range is typically 5m to 100m
 Bluetooth wireless uses radio waves on a particular frequency (2.4
gigaHertz) for data transmission from device to device.

BLUETOOTH
 Wireless connection between input and output devices
 Communication between hands-free headset and mobile phone
 Creating small wireless network where the computers are near
 Transferring appointments, contacts.
 Communication using gaming controller.

USE OF BLUETOOTH
WIRELESS CONNECTION BETWEEN INPUT
AND OUTPUT DEVICES
 Smartphones make use of Bluetooth to
communicate with other devices
 They may use wireless technology as well
 They can produce mobile hotspots for other
wireless devices to connect to the internet
 Smart phones are also capable of screen
mirroring(ability to project what is on the
phone onto a smart TV)
 Smartphone can make use of applications
like “Unified Remote” which provides the
phone with the capability of acting as a
mouse and keyboard through Bluetooth or
Wireless adaptors

BLUETOOTH DEVICES
Mini Bluetooth Dongle Wireless USB Bluetooth Dongle Adapter

BLUETOOTH DEVICES
OTHER BLUETOOTH HEADSET AND SPEAKERS
BLUETOOTH PRINTER
BLUETOOTH SCANNER
BLUETOOTH KEYBOARD AND MOUSE
 IR wireless is the use of wireless technology in devices or systems
that convey data through infrared(IR) radiation.
 Infrared technology allowed computing devices to
communicate via short-range wireless signals in the 1990s.
 This range of wavelengths corresponds to a frequency range of
approximately 430 THz down to 300 GHz.

INFRARED
REMOTE CONTROLS USE INFRARED
OTHER USES OF INFRARED
 This is a protocol for MAN or WAN
 It is designed to provide broadband access to the internet
without having to lay underground cables
 Local subscribers connect to the antenna of a local base station
using microwave signal

WIMAX-WORLDWIDE INTEROPERABILITY
FOR MICROWAVE ACCESS
 A mobile phone is often called a cell phone because of the
fundamental infrastructure provided for mobile phone users
 Cell towers

CELLULAR NETWORKS
GENERATIONS
TYPES OF GENERATIONS
EVOLUTION
 Computer networking allows for data to be transferred easily
from one place to another
 Some data is personal data and contains details such as credit
card numbers, bank account details, medical information
 The internet is not always secure so special measures need to be
taken to ensure no unauthorised access takes place(hacking)

PROBLEMS OF CONFIDENTIALITY
 Usernames/user-IDs and passwords
 Biometrics
 Digital signature
 Access levels
 Training of staff about the risks in security
 Physical security of room

METHODS OF SECURITY
 These are techniques used to check that a person accessing a
network or communications system is the genuine person, also to
make sure that the emails are not sent by someone pretending
to be someone their not.
 Authentication methods: Username and password, digital
signature and biometrics

AUTHENTICATION TECHNIQUES
USERNAMES AND PASSWORDS
 Username is a series of characters that is used to identify a
certain user to the network
 Username must be unique
 Network manager(Administrator) is in charge of allocating
usernames and passwords to the users
 Network manager also determines which user gets to have
access to which information
 He/she also keeps track of what files the user is using for security
reasons

IDENTIFYING A USER TO THE SYSTEM


 A password is a string of characters(letters, numbers, and
punctuation marks) that a user can select
 Only the user will know the password
 Only upon the correct entry will the user gain access to the
network.

PREVENTING UNAUTHORIZED ACCESS


TO THE SYSTEM
 A good password should be one that you can easily remember
 A good password should be one that is related to you in anyway(name,
surname, birthday, mothers name, or friends name)
 A good password should not be any word from the English dictionary
 A good password should be a combination of text and numbers
 Any password containing NUMBERS,LETTERS, CAPITAL AND SMALL LETTERS.
Basically a combination of Numbers, Capital and Small letters.

PROPERTIES OF A GOOD PASSWORD


 Uses features of the human body that are unique to a particular
person
 Usually fingerprints or the pattern on the back of the eye(called
retina)
 Instead Username and password the user puts finger on scanner

 The system automatically identifies their unique fingerprint and


allows access to the network and the resources

BIOMETRICS
 Retinal scanning, the user looks into the scanner eyepiece
 A beam of infra-red light scans over the retina and converts the
pattern of the reflected light into the computer code
 This code is used to find a match to details stored in a database
 This will authenticate the user

BIOMETRICS
FINGERPRINT AND RETINAL SCANNING
FINGERPRINT SCANNER ON
SMARTPHONES
PALM PRINT
VOICE RECOGNITION
VOICE RECOGNITION
 You don’t have to remember passwords and usernames
 The system is hard to abuse unlike swipe card systems where the
card could be used by someone else

ADVANTAGES OF BIOMETRICS
 Some people worry about the privacy of data stored especially
fingerprint details
 The readers/scanners are quite expensive

DISADVANTAGES OF BIOMETRICS
 Ordinary signatures can be used to check the authenticity of a
document. By comparing a signature you can determine
whether a document is authentic
 Especially when doing business over the internet, emails and
electronic documents ned to be authenticated

DIGITAL SIGNATURE
DIGITAL SIGNATURE AUTHENTICATION
ATTACH SIGNATURE TO EMAIL
 It is method that protects data from prying eyes by scrambling
data as it travels over the internet
 `It is also used when saving personal data onto a laptop or
removable storage devices
 If any of these devices get lost or stolen then no one can read
the data
 Only the authorized person who has the decryption key

ENCRYPTION
ENCRYPTION
ENCRYPTION
 Sending credit card details such as card number, expiry dates,
etc. over the internet
 Online banking
 Sending payment details(bank details such as code numbers,
account numbers, etc.)
 Confidential emails(e.g. with personal or medical details)
 Sending data between computers on a network here
confidentiality is essential
 Storing sensitive personal information on laptops and portable
devices and media

ENCRYPTION USES
 Fax
 Email
 Teleconferencing/video conferencing

METHODS OF COMMUNICATION
 Fax is like a long distance photocopier
 You put in a document in the fax machine, then enter the fax
number you would like to send to, then document will be
scanned and converted to a binary pattern of the
page(analogue),passed along a telephone line and then it will
be converted by the other fax machine to digital and then
printed.
 It is mostly used to maintain originality
 FAX stands for Facsimile

FAX
 Fax do not spread viruses
 Fax cannot be hacked
 Faxed signed documents are legally accepted

ADVANTAGES OF FAX
 Fax’s are printed in an area where everybody can access the
machine view confidential documents intended for someone
else
 Paper jams cause wasted time
 Receivers fax maybe off
 Receivers fax maybe out of paper
 Information sent by the fax cannot be edited

DISADVANTAGES OF FAX
FACSIMILE
 An email is an electronic message sent from one communication
device(Computer, mobile phone or PDA) to another.
 All web browser software has email facilities

EMAIL
EXAMPLES
 This allows two or more individuals situated in different places to
talk to each other in real time.
 They are also able to exchange electronic files with each other

TELECONFERENCING/VIDEO
CONFERENCING
 International Network is the worldwide collection of networks that
use the Internet Protocol Suite(TCP/IP)
 The World wide Web(WWW) is the collection of web pages
hosted on web servers. The web runs HTTP
 Internet=Hardware, the Web = Sources hosted on the internet
 URLs are there to address specific web resources
http://www.example.com/folder/file

INTERNET

You might also like