0% found this document useful (0 votes)
99 views25 pages

Network - Issues and Communication

Uploaded by

a2080903768
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views25 pages

Network - Issues and Communication

Uploaded by

a2080903768
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

CS - Computer Network

Overview What is a Computer Network?


A network is two or more
Networks and the effects of using them

Workstation computers, or other electronic


devices, connected together so
that they can exchange data.
For example a network allows:

• Computers to share files


• Users to message each other
• Share Resources
Internet Router Switch
Network connections between
computers are typically created
using cables (wires) or via
wireless signals.

Wireless
Access Bridge
Point

Cables
Wireless
Switch
CS - Computer Network

Network devices and terms

Network interface card (NIC)


Networks and the effects of using them

A network interface card (NIC) is needed to allow a device to connect to a network.

Media access control (MAC) address


The media access control (MAC) address is a number which uniquely identifies a
device when it is connected to a network.
The MAC address is made up of 48 bits which are shown as six groups of hexadecimal
digits with the general format:

NN – NN – NN – DD – DD – DD
Internetmanufacturer’s
protocol (IP) code
addresses
device serial number
Whenever a computer connects to the internet it is given an internet protocol
(IP) address. Example of IP address

Data packets
Data is moved around networks in the254.25.28.77
form of data packets. Whenever a user
sends some data, it is split up into a number of packets and each packet is
transmitted separately.
CS - Computer Network

Overview

Advantages of using Networks


Networks and the effects of using them

• Easily share files and data.


• Share resources such as printers and Internet connections.
• Communicate with other network users (e-mail, instant messaging,
video-conferencing, etc.)
• Store data centrally (using a file server) for ease of access and
back-up.
• Keep all of our settings centrally so we can use any workstation.

Disadvantages of using Networks


• Greater risk of hackers.
• Greater risk of viruses (spreading and disabling network).
• The significant cost of extra equipment.
• When the network is down computers can not be used as
standalone computers.
• Print queues can be long.
CS - Computer Network

Understand how a router works and its purpose


Networks and the effects of using them

Data Packets contain the R R


following information:
Router

• Header to identify Data S Switch


Packet.
Outgoing Data
• Sender and Receivers IP
address. S R Incoming Data

• Number of data packets Internet


making up the whole
message.

• Connects network/computers to the internet


• Connects LANs/networks together
• Transfers data between networks (Receives and Sends Data Packets)
• Router can connect to devices using cables or wireless signals.
• It stores information about which computer is connected to which
network
CS - Computer Network

Understand how a router works and its purpose


Networks and the effects of using them

Web Pages are stored on Web Servers. Web


Server
Webpages have unique IP address &
domain names to find/communicate R Router
with each other.
S
R R R Outgoing Data
Incoming Data

Internet
S R

Routers direct packets of data across


the internet to its destination. R R

Everything connected to the internet has an IP Address.


CS - Computer Network

Common Network Devices


Networks and the effects of using them

A Hub and a Switch both connect a number of computers together to make a LAN.

Switch Hub

Smart Device Dumb Device

Sends specific packets of data to Sends data packets to all the


specific computers on the LAN using workstations on the network which
workstations unique MAC addresses. causes network traffic.

More secure however more expensive Poor Security


Only would be suitable for a small
Normally used in larger networks
home networks.
found in schools, offices etc.
CS - Computer Network

Common Network Devices: Switch

Switch Ports
Networks and the effects of using them

Workstation connect to switch ports. Each


Network Card has a unique address (MAC
1 2 3 4
ADDRESS) which switches can use to
identify a workstation.

2 2
You always start Switch Table
with an empty 1 S 3 1 3
Work
station
Mac S
switch table. Address
1 AA-AA-AA
The switch will 4 4
learn each 2 BB-BB-BB
workstations Sending Packets of Data from Sending Packets of Data from
3
MAC address Workstation 1 – 2 Workstation 2 – 1
when it sends a 4
packet of data The switch will send data Now the switch table has the
across the packets to all computers MAC address for workstation 1
because it does not know the it is possible for workstation 2
network.
MAC address for Workstation 2. to send a direct pack of data.
CS - Computer Network

Common Network Devices


Networks and the effects of using them

Modems Analogue <<< Digital Modems convert analogue signals from a


telephone line to digital signals which can be
read by the computer.

The Modem also converts digital signals back


into analogue for transmission over
Analogue >>> Digital telephone lines.

Network Interface Card


Network Interface Card (NIC) allows you to
connect a device to the network. The NIC will
contain the MAC address which will be used to
identify the computer to the network.

Bridges
A bridge is used to connect two parts of a LAN network together
so they function as a single LAN. Two Switches can be connected
using a the Bridge Device.
Switch Bridge Switch
CS - Computer Network

Understand the use of Wi-Fi and Bluetooth in networks


Networks and the effects of using them

• Limited area of network


• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/less secure
• Physical obstacles can interfere with signal/can
cause disconnection
WiFi is a wireless networking technology makes it possible to connect devices with a wireless connection to a
network or to a single computer .
• Reduced cost of cabling/Safer – won’t trip over wires
• Easier to connect other devices to the network
• Makes the computer portable as long as it’s within range of the wireless access point

• Very slow data transfer speeds


• Short distance of coverage/limited signal strength
• Greater risk of interception of data/less secure
• Supports a limited number of devices in a network

Bluetooth is a wireless networking technology designed for very short-range connections.


• Connecting wireless devices such as mouse, phone, headset to a computer which are close in proximity.
• Transferring files between devices.
• Printing Wirelessly from a Tablet or Mobile Phone.
CS - Computer Network

Routers
Networks and the effects of using them

Routers are used to route data packets from one network to another network, based on IP addresses. It can do
this because each router has its own IP address. Routers are used to join a LAN to the internet.

Cloud computing (storage)


Cloud computing is a method of data
storage where data is stored on
remote servers – there may be
thousands of servers in many
different locations.
Three common cloud storage systems
• Public cloud
• Private cloud
• Hybrid cloud
Advantages
Customer/client files stored in the
cloud can be accessed at any time, Router used to connect LAN to the internet
from any device, anywhere in the
world, as long as internet access is
available.
CS - Computer Network

Setting up a Network

ISP (Internet Service Provider)


Networks and the effects of using them

Set up an account with an Internet Service Provider (ISP) to


receive an internet connection to your location
Web Browser: Router:
To connect your LAN to the Internet (WAN)
To browse the internet.
Switch/Hub:
Email: To connect Network Devices together using
cables.
To send email messages including Network Cables:
attachments to other users. To create physical connections.
Security: Firewall:
To keep network secure from external threats.
Anti Virus/Spyware software to protect your
computer from external threats Servers:
(Viruses/Hackers) To manage network functions such as network
security, network file storage, share resources
etc.
CS - Computer Network

Common network environments


Networks and the effects of using them

LAN • LAN is a Local Area Network


• LAN covers a small area (normally
confined to one building or within
a close proximity).
• LAN consists of number of
computers and devices that The most common
usually connect to a switch which examples of WAN is the
is connected to a router. internet.

WAN • A WAN is Wide Area Network is a


network that extends over a large
geographical area.

• A WAN is often created by joining


several LANs together.

• Routers are used to connect LAN


networks to form a WAN Network.
CS - Computer Network

Common network environments


Networks and the effects of using them

WLAN
• A wireless LAN (WLAN) is a LAN that uses
AP
radio signals (Wi-Fi) to connect computers
instead of cables.

• Devices know Access Points (AP) are


connected to the wired network at fixed
AP
locations.

• These devices provide the wireless access


to devices on the network.

AP • It is much more convenient to use wireless


connections instead of running long wires
all over a building.
CS - Computer Network

Intranets and the Internet

Internet • Internet is Public (available to all Typical uses of an internet would be:
Networks and the effects of using them

users)
• Internet is network of networks • Viewing web pages
• Internet is global • Sending and receiving e-mail messages
• Internet has more information than • Sharing files
• Communicating using voice (VOIP)
an intranet and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking

Intranet • Intranet is within one organisation Typical uses of an intranet would be:
(Private)
• Intranets tend to be • Viewing internal web pages (e.g.
policed/managed company schools, university's etc.)
• Intranet has an extra layer of security • Internal e-mail and instant-
messaging between workers
• Data found in an intranet is likely to Sharing of internal documents

be more reliable/relevant than that
found on the Internet
CS - Computer Network

Accessing the Internet

Device Advantages Disadvantages


Networks and the effects of using them

laptop computers • More portable and smaller in size compared • Touch pad may be difficult to
to desktop computers. use to navigate webpages.
• Bigger screens compared to tablets and • Processors are not as fast as
phones. desktop computers.

Desktop • Stable internet connection since the • Has to be connected to a


connection is normally wired. power supply at all times.
• Use of input devices including pointing • Not portable.
devices to make navigation easier.

Tablets • Tablet: More portable than desktops/laptops • Signal strength dependant on


however less than phones. location.
• Smaller display screen.
• Mobile: Portable: Easy to carry around and • Not all websites designed to
use whilst on the move. be used by mobiles/tablets.
• Touch screen may be difficult
Smart Phones • Mobile: Always likely to have a mobile phone
to use.
at all times.
• Limited battery Life.
• Mobile: Can access internet via phone
networks (4G)
Networks and the effects of using them CS - Computer Network

• Security issues regarding data transfer

• Network communication

Computer networks help users on the network to share the resources


CS - Computer Network
Computer networks help users on the network to share the resources
Security Issues
Networks and the effects of using them

How can hackers effect your network and data?


Hackers
Introduce of viruses & spyware to the Network.
Viruses Threat to Data:
Spyware • Data could be deleted, edited, corrupted or be replicated.
\ • Data could be sold or passed on to other people.

Phishing Threat to Network:


Pharming • Network may have to be shut down to quarantine virus.
• This could stop production and cost an organisation a lot of
money.

Should the Advantages Disadvantages


internet be • To protect vulnerable users gaining • It would be extremely difficult and expensive
policed? access to undesirable websites. to police the internet.
• To prevent illegal material (software, • Infrastructure including staff and offices would
videos) be openly posted and shared by have to be required.
web users. • Would be difficult to enforce different rules in
• To bring to justice those users who different countries.
continually misuse the internet for their • Could go against freedom of speech.
personal gain.
CS - Computer Network

User Name & Passwords: Methods of Authentication (Network Security)


Networks and the effects of using them

Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.

Passwords are Disadvantages Avoiding password interception


a method of
authentication. • Passwords can be guessed especially • Set strong passwords which include
if they are simple. multiple characters such letters and
numbers.
• Passwords may be seen by others.
• Ensure password is regularly changed.
• Passwords can be stolen and used by
other people. • Avoid using the same passwords for all
of your accounts.
• Spyware could be used to logs key
presses to get passwords. • Install spyware software which will
block the installation of any key logging
• Passwords can be hacked by using software.
password generating software.
CS - Computer Network

User Name & Passwords: Methods of Authentication (Network Security)


Networks and the effects of using them

Setting a strong Password:


• Use at least 8 characters
• Includes letters and numbers
• Avoid using names or words which could be easily guessed.
• Use upper and lower case letters.

When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.

Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.

Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.
CS - Computer Network

Alternatives Methods of Authentication (Network Security)

Device Overview/Advantages
Networks and the effects of using them

Biometrics • Biometrics use unique data.


• Fingerprints • Only the person with the biometric features can access the
• Retina Scans network.
• Iris Scans Can not copy/replicate biometric data
• Face Scans •
• Vocal Recognition

Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).

Transaction • TAN is used by online banking services.


authentication • User will insert their bank card into the TAN reader which will
number (TAN) then provide a code which will need to be entered to complete a
transaction.

Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
CS - Computer Network

Security issues regarding data transfer: Viruses & Spyware


Networks and the effects of using them

A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.

Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.

Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
CS - Computer Network

Security issues regarding data transfer: Firewall


Networks and the effects of using them

Prevents computer accessing Monitors and controls incoming


undesirable/unauthorised sites and outgoing data traffic.

Prevents unauthorised computers


using the internet accessing the
computer

Helps to prevent malware


(viruses) getting into
computer/from the internet

Keeps a list of undesirable sites/IP addresses


Keeps a list of acceptable sites/IP addresses

Warns you regarding threats/allows you


to accept/reject downloaded programs
CS - Computer Network

Encryption
Networks and the effects of using them

Encryption is the process of converting information into a form that is meaningless


to anyone except holders of a ‘key’.

1. Data is scrambled up (Data is


Encrypted).

2. If the data is intercepted it then it


prevents people from understanding
and reading the data.

3. The person with the key is able to


Decrypt and understand the data.

Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
CS - Computer Network

Proxy Server
Networks and the effects of using them

Can be used to monitor Internet usage

Can block certain sites

Server passes on requests to the Internet


Passes the requested web pages to individual computers

Can cache/store the webpages

Can act as a buffer (between Internet and LAN)

Can act as a web server


CS - Computer Network

Security issues regarding data transfer: Data Protection Act


Networks and the effects of using them

Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.

Principles of the Data Protection Act

1. Data must be fairly and lawfully processed.


2. Data can only be processed for the stated purpose.
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they have
adequate protection.

You might also like