Network - Issues and Communication
Network - Issues and Communication
Wireless
Access Bridge
Point
Cables
Wireless
Switch
CS - Computer Network
NN – NN – NN – DD – DD – DD
Internetmanufacturer’s
protocol (IP) code
addresses
device serial number
Whenever a computer connects to the internet it is given an internet protocol
(IP) address. Example of IP address
Data packets
Data is moved around networks in the254.25.28.77
form of data packets. Whenever a user
sends some data, it is split up into a number of packets and each packet is
transmitted separately.
CS - Computer Network
Overview
Internet
S R
A Hub and a Switch both connect a number of computers together to make a LAN.
Switch Hub
Switch Ports
Networks and the effects of using them
2 2
You always start Switch Table
with an empty 1 S 3 1 3
Work
station
Mac S
switch table. Address
1 AA-AA-AA
The switch will 4 4
learn each 2 BB-BB-BB
workstations Sending Packets of Data from Sending Packets of Data from
3
MAC address Workstation 1 – 2 Workstation 2 – 1
when it sends a 4
packet of data The switch will send data Now the switch table has the
across the packets to all computers MAC address for workstation 1
because it does not know the it is possible for workstation 2
network.
MAC address for Workstation 2. to send a direct pack of data.
CS - Computer Network
Bridges
A bridge is used to connect two parts of a LAN network together
so they function as a single LAN. Two Switches can be connected
using a the Bridge Device.
Switch Bridge Switch
CS - Computer Network
Routers
Networks and the effects of using them
Routers are used to route data packets from one network to another network, based on IP addresses. It can do
this because each router has its own IP address. Routers are used to join a LAN to the internet.
Setting up a Network
WLAN
• A wireless LAN (WLAN) is a LAN that uses
AP
radio signals (Wi-Fi) to connect computers
instead of cables.
Internet • Internet is Public (available to all Typical uses of an internet would be:
Networks and the effects of using them
users)
• Internet is network of networks • Viewing web pages
• Internet is global • Sending and receiving e-mail messages
• Internet has more information than • Sharing files
• Communicating using voice (VOIP)
an intranet and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Intranet • Intranet is within one organisation Typical uses of an intranet would be:
(Private)
• Intranets tend to be • Viewing internal web pages (e.g.
policed/managed company schools, university's etc.)
• Intranet has an extra layer of security • Internal e-mail and instant-
messaging between workers
• Data found in an intranet is likely to Sharing of internal documents
•
be more reliable/relevant than that
found on the Internet
CS - Computer Network
laptop computers • More portable and smaller in size compared • Touch pad may be difficult to
to desktop computers. use to navigate webpages.
• Bigger screens compared to tablets and • Processors are not as fast as
phones. desktop computers.
• Network communication
Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.
When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.
Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.
CS - Computer Network
Device Overview/Advantages
Networks and the effects of using them
Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
CS - Computer Network
A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.
Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.
Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
CS - Computer Network
Encryption
Networks and the effects of using them
Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
CS - Computer Network
Proxy Server
Networks and the effects of using them
Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.