Chapter – 4
Networks and the effects of using them
What is a Network?
A network is two or more computers, or other electric devices, connected together so
that they can exchange data.
For example, a network allows:
Computers to share files
Users to message each other
Share resources
Network connections between computers are typically created using cables (wires)
or via wireless signals.
Advantages of using Networks
Easily share files and data
Share resources such as printers and internet connections
Communicate with other network users (e-mail, instant messaging, video-
conferencing, etc.)
Store data centrally (using a file sever) for ease of access and back-up.
Keep all of our settings centrally so we can use any workstation.
Disadvantages of using Networks
Greater risk of hackers
Greater risk of viruses (spreading and disabling network)
Significant cost of extra equipment
When the network is down, computers cannot be used as standalone computers.
Print queues can be long.
1
Common network devices and terms
Network interface card (NIC)
NIC is needed to allow a device to connect to a network.
It turns binary data into an electrical signal that allows access to a network.
Each NIC is given a unique hardwired (or hard-coded) media access control (MAC)
address at the manufacturing stage.
Wireless network interface cards (WNIC) use wireless connectivity, utilizing an
antenna to communicate with networks via microwaves.
Media access control (MAC) address
MAC address is a number which uniquely identifies a device when it is connected to
a network.
MAC address is made up of 48 bits which are shown as six groups of hexadecimal
digits.
MAC address is sometimes referred to as the physical address because it uniquely
identifies a device.
MAC address is useful when trying to identify network faults because they never
change, which makes it a more reliable method of identifying data senders and data
receivers on a network.
Internet protocol (IP) address
Each device on the internet is given a unique address known as its internet protocol
(IP) address.
This is usually assigned to the computer by the internet service provider (ISP).
An IP address identifies the location of a device on a network.
There are two versions of IP: IPv4 and IPv6.
IPv4 is based on 32-bit number (four groups of eight bits) that is usually written in
the form 109.108.158.1.
IPv6 is based on 128-bit number (eight groups of hex digits) that is usually written in
the form A8FB:7A88: FFF0:0FFF:3D21:2085:66FB: F0FA
2
Q. What is the difference between an IP address and a MAC address?
- The IP address gives the location of a device on the internet, whereas the
MAC address identifies the device connected to the internet.
Data packets
Data is moved around networks in the form of data packets.
Packets of data usually contain the following information:
the sender's IP address
the receiver's IP address
the sequence/identity number of the packet
the packet sizes
how many data packets make up the whole 'message'
Modems
Modems convert analogue signals from a telephone line to digital signals which can
be read by the computer.
The Modem also converts digital signals back into analogue for transmission over
telephone lines.
Dial-up modems operate at transmission speeds of about 60 kilobits* per seconds
ADSL (asymmetric digital subscriber line) modems operate at up to 100 Megabits*
per seconds
3
A Hub and a Switch both connect a number of computers together to make a LAN.
Hubs
A hub will take a data packet received at one of its ports and broadcast it to every
device connected to it.
Poor Security because every device will receive every data packet
Only would be suitable for a small home networks (local area network (LAN)).
Switches
Sends specific packets of data to specific computer(s) only on the LAN using
workstations unique MAC addresses.
Switch uses a look-up table to determine the destination device.
More secure however more expensive.
Normally used in larger networks found in schools, offices etc.
4
Bridges
Bridges are devices that connect one LAN to another LAN that uses the same
protocol (communication rules).
They are often used to connect together different parts of a LAN so that they can
function as a single LAN.
Bridges cannot communicate with other external networks, such as the internet.
Router
Routers enable data packets to be routed between the different networks, for
example to join a LAN to a wide area network (WAN).
The router's main function is to transmit internet and transmission protocols between
two networks and also allow private networks to be connected together.
Routers direct packets of data across the internet to its destination.
Everything connected to the internet has an IP Address.
Router is able to send the data packet to the appropriate switch and it will then be
delivered using the MAC destination address.
5
Comparison of Routers and Bridges
Routers Bridges
The main object of a router is to connect The main object of a bridge is to connect
various types of networks together. LANs together.
Routers scan a device’s IP address. Bridges scan a device’s MAC address.
Data is sent out using data packets. Data is sent out using data packets.
Use different protocols to connect
Use same protocols to connect networks.
networks.
A routing table is used to direct data
Bridges do not use of routing tables.
packets to the correct devices.
A router has more than two ports. A bridge has only two ports.
Gateway
A gateway is a network point (or node) that acts as an entrance to another network.
Network Cables
Many Computer systems use Wi-Fi, network cables are still used because they have
the following advantages over Wi-Fi.
Faster data transfer rates
Can be more secure than wireless networks
The cables can be either copper or fiber optics: offers higher data transfer rates and
better security.
6
Wi-Fi and Bluetooth
Both Wi-Fi and Bluetooth offer wireless communication between devices.
They both use radio frequencies as the carrier of data transmission.
Wi-Fi
A wireless transmitter (WAP) receives information from a network via its connection.
This transmitter converts the received information into radio waves and then
transmits them.
A device (e.g., a computer) receives the radio waves via an installed wireless
adaptor which allows it to download the information from the data source.
It offers much faster data transfer rates, better range and better security than
Bluetooth.
Can access, the internet wirelessly at any access point (AP) or hot spot up to 100m
away.
Bluetooth
Bluetooth sends and receives radio waves in a band of 79 different frequencies
(known as channels).
If the channel is already being used, it randomly picks another channel.
This is known as spread-spectrum frequency hopping.
It is useful
when transferring data between two or more devices that are very close
together
for low-bandwidth applications
Bluetooth creates a secure wireless personal area network (WPAN) based on key
encryption.
Feature Bluetooth Wi-Fi
Transmission 2.4, 3.6, 5.0 GHz
2.4 GHz
frequency used
Data transfer rate 250 ~ 31 Mbits/second
25 ~ 3.1 Mbits/second
(maximum)
100 meters [but can be
Maximum obstructed by walls, etc. reducing
effective ranges 30 meters effective range to only a few
(meters) meters]
Maximum number Depends on the router used [can
of devices Up to 7 be one device or many devices]
connected
WEP (wireless equivalent
Type of data privacy) and WAP (Wi-Fi
transmission Key matching encryption protected access) are the most
security common security systems)
7
Cloud computing (storage)
Cloud computing is a method of data storage where data is stored on remote
servers – there may be thousands of servers in many different locations.
The same data is stored on more than one server in case of maintenance or repair,
allowing clients to access data at any time.
This is known as data redundancy.
There are three common cloud storage systems:
Public cloud – this is a storage environment where the customer/client and cloud
storage provider are different companies.
Private cloud – this is storage provided by a dedicated environment behind a
company firewall; customer/client and cloud storage provider are
integrated and operate as a single entity.
Hybrid cloud – this is a combination of the two previous environments; some
data resides in the private cloud and less-sensitive/less-
commercial data can be accessed from a public cloud storage
provider.
Advantages of cloud computing (storage)
can be accessed at any time, from any device, anywhere in the world
no need for a customer/client to carry an external storage device
provides the user with remote backup of data (data loss/disaster recovery)
If a customer/client has a failure of their hard disk or backup device, cloud storage
will allow recovery of their data.
The cloud system offers almost unlimited storage capacity (at a price!).
Disadvantages of cloud computing (storage)
If the customer/client has a slow or unstable internet connection, they could have
many problems accessing or downloading their data/files.
Costs can be high if a large storage capacity or high download/upload data transfer
is required.
The potential failure of the cloud storage company is always possible – this poses a
risk of loss of all backup data.
8
Network types
Local Area Network (LAN)
Wireless Local Area Network (WLAN)
Wide Area Network (WAN)
Local area networks (LANs)
LAN covers a small area (normally confined to one building or within a close
proximity).
LAN consists of number of computers and devices that usually connect to a switch
which is connected to a router.
Advantages:
The sharing of resources
Ease of communication between users.
A network administrator to control and monitor all aspects of the network
Disadvantages:
Easier spread of viruses
Slower access to external networks
Increased security risk
Wide area networks (WANs)
A WAN is Wide Area Network is a network that extends over a large geographical
area (e.g., in a different city or country).
A WAN is often created by joining several LANs together.
Routers are used to connect LAN networks to form a WAN Network.
9
Wireless LANs (WLANs)
A wireless LAN (WLAN) is a LAN that uses radio signals (Wi-Fi) to connect
computers instead of cables.
Devices know Access Points (AP) are connected to the wired network at fixed
locations.
These devices provide the wireless access to devices on the network.
It is much more convenient to use wireless connections instead of running long wires
all over a building.
Advantages:
Can access the same services and resources from anywhere within range of the
APs
There is no cabling there is a safety improvement and increased flexibility.
Adding new computers and devices is very easy and the costs are reduced since
extra cabling isn't needed.
Disadvantages:
Security can be a big issue.
There may be problems of interference, which can affect the signal.
The data transfer rate is slower than in a wired LAN.
Accessing the Internet
Devices Advantages Disadvantage
• More portable and smaller in
• Touch pad may be difficult to use
size compared to desktop
to navigate webpages.
Laptop computers.
• Processors are not as fast as
• Bigger screens compared to
desktop computers.
tablets and phones.
• Stable internet connection
since the connection is normally • Has to be connected to a power
wired. supply at all times.
Desktop
• Use of input devices including
pointing devices to make • Not portable.
navigation easier.
• Tablet: More portable than
desktops/laptops however less • Signal strength dependent on
than phones. location.
• Mobile: Portable: Easy to carry • Smaller display screen.
Tablets, around and use whilst on the • Not all websites designed to be
Smart move. used by mobiles/tablets.
Phones
• Mobile: Always likely to have a • Touch screen may be difficult to
mobile phone at all times. use.
• Mobile: Can access internet • Limited battery Life
via phone networks (4G).
10
Network issues and Communication
Security issues regarding data transfer
Hacking
Phishing
Pharming
Viruses
Passwords
Passwords are used in many instances when accessing the internet.
when accessing your email account
when carrying out online banking
accessing social networking sites
There are many more instances when you might need to type in a password and, in
many cases, a user ID.
It is important that passwords are protected.
Some ways of doing this are described below
Run anti-spyware software to make sure that your passwords are not being
relayed back to whoever put the spyware on your computer.
Change passwords on a regular basis in case it has come into the possession of
another user illegally or accidentally.
Passwords should not be easy to crack (e.g., your favorite color, name of a pet
or favorite rock group).
Passwords are grouped as either strong or weak.
Strong passwords should contain:
- at least one capital letter
- at least one numerical value
- at least one other keyboard character (such as @, *, & etc.).
Other authentication methods
Authentication is used to verify that data comes from a secure and trusted source.
zero login
biometrics
magnetic stripes
smart cards
physical tokens
electronic token
11
Zero login and biometrics
Zero login means you do not need to supply your normal login details such as user
ID and password to access your device, the internet, your bank details, etc.
Zero login essentially relies on devices being smart and secure enough to instantly
recognize a user by a number of features based on:
Biometrics
behavioral patterns.
Biometrics is already used on many smartphones as a way of logging into the
phone.
fingerprint
face recognition
Behavioral patterns include: how you walk, your typing speed, your normal location,
how you swipe the screen, and so on.
The advantages of zero login are:
enhanced security (it is difficult to copy biometrics and behavioral patterns)
easier
much quicker way to login to a system
The disadvantages that need consideration:
How do users know when they are being monitored?
How do you know if and when you have been logged out?
How well protected is it in reality?
12
Magnetic stripe cards
The magnetic stripe cards are used to gain access to the system by swiping the card
into the reader
Data such as name, ID number, gender, and date of birth may be contained on a
magnetic stripe when used as a security device to allow entry to a building, for
example.
Some ID cards also use a holographic image (hologram).
Another form of security is to have a photographic image of the card user printed
onto the card surface.
Advantages:
They are easy to use.
It is not an expensive technology.
Magnetic cards can be remotely deactivated (if lost or stolen)
The cards can be multi-purpose (for example, door key cards, network access cards
or used in vending machines to buy food or drink).
Disadvantages:
Less secure than, for example, biometric methods (no encryption is used and the
stripe contents can be copied fairly easily).
The cards wear out with a lot of use.
Magnetic readers often fail to read the cards on first attempt.
Smart cards
By inserting a tag (chip and antenna) into a security card, it can act as a smart
contactless card (that is, it can be read from a distance and does not have to be
swiped through a card reader).
The chip on the smart card can store data such as name, security number, gender,
date of birth and a PIN.
Smart cards can be used as a security device.
If the card is in a wallet or a pocket as the owner of the card walks up to a security
gate, readers on either side of the gate quickly scan the security data stored on the
RFID tag embedded in the card.
The user will then be invited to enter a PIN on the keypad.
If all details match, then access will be allowed.
13
Physical tokens
A physical (or hardware) token is a form of authentication in the form of a physical,
solid object.
The user’s interaction with a login system is used to prove that the user has
possession of the token.
Physical tokens contain internal clocks and when a PIN and other authentication
details are entered, then a one-time password (OTP) is generated.
The OTP is shown on a small screen.
The code changes on a regular basis and is usually only valid for less than a minute.
There are two types of physical tokens:
a disconnected physical token – a separate device is used, requiring the user to key
in data manually using a keypad
a connected physical token – this type of token transmits the generated one-time
password directly to a computer through a USB
connection; the user does not need to manually enter
data.
Electronic tokens
Electronic (software) tokens are software installed on a user’s device, such as a
smartphone.
The app generates a one-time password (OTP) which is valid for less than a minute.
The user enters this OTP when prompted by the website, together with some other
form of authentication, such as PIN, touch ID or face ID.
The website server runs the same software as the app.
Because both the server and smartphone have synchronized clocks, they will
generate the same numbers.
Once the OTP and other form of authentication are verified by the website, the user
will be allowed access.
14
Anti-malware software
Anti-malware software, known as anti-virus software, to protect devices against a
potential virus attack.
Running anti-virus software in the background on a computer will constantly check
for virus attacks.
Although various types of anti-virus software work in different ways they all have the
following common features:
They check software or files before they are run or loaded on a computer.
Anti-virus software compares a possible virus against a database of known
viruses.
They carry out heuristic checking – this is the checking of software for types of
behavior that could indicate a possible virus; this is useful if software is infected
by a virus not yet on the database.
Any possible files or programs which are infected are put into quarantine which:
allows the virus to be automatically deleted, or
allows the user to make the decision about deletion
Anti-virus software needs to be kept up to date because new viruses are constantly
being discovered.
Full system checks need to be carried out once a week, for example, because some
viruses lie dormant and would only be picked up by this full system scan.
Data protection acts
Data protection Act applies to paper based or electronic forms of data stored on a
computer.
The data protection act is to protect rights of the individual who the data is obtained
from.
Principles of the Data Protection Act
1. Data must be fairly and lawfully processed.
2. Data can only be processed for the stated purpose.
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary
6. Data must be processed in accordance with the data subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they have adequate
protection.
15
Network communication
Physical Fax Machines
Requires a fax machine and a telephone line.
Number of the recipient dialed before the document is copied and sent.
Physical documents are printed and can be signed.
Disadvantage:
Anyone can access faxed documents.
The fax may be out of paper or ink (toner).
No notification of fax received
Electronic Faxing
Electronic Fax is sent via an internet connection.
No need to buy a fax machine, ink or paper.
Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
Electronic Faxes can also be sent directly to a fax machine.
Send faxes from any location with an internet connection.
No additional cost to send fax over internet network.
Email Communication
Can send multiple attachments.
Can send to multiple recipients in one message.
Emails can be received instantly and accessed on many platforms including tablets
and phones.
Disadvantages:
Email attachments may include viruses.
May receive spam (unwanted mail).
May receive phishing (scam) emails to obtain personal data.
16
Electronic conferencing
Three types of electronic conferencing:
video conferencing
audio conferencing
web conferencing
Video conferencing
Video conferencing is a communication method that uses both video and sound
using an internet connection.
It is a substitute for face-to-face conferences between a number of people, who may
be in a different part of the country or live overseas.
It is carried out in real time and makes use of some form of network.
The basic hardware includes:
webcams
large monitors/television screens
microphones
speakers.
Software used in video conferencing:
Webcam and microphone software drivers
CODEC (CODER-DECODER OR COMPRESSION-DECOMPRESSION)
Echo cancellation software
Advantages:
No need to travel to have meetings which would cut down on travelling costs
(including flights and hotel) and travelling time.
Video conference can be held at short notice.
Facilitates long distance learning – students can access live lectures without
travelling.
Disadvantages:
Technical problems with the internet or hardware could effect the quality of the video
conference.
Set up costs to purchase hardware/software and to provide relevant training to staff.
Lack of personal contact you would have if it was a face to face meeting.
Different time zones could make it difficult to find a suitable time to have a meeting.
Not possible to sign documents.
17
Audio conferencing
Audio conference can be done over the telephone network or using a computer
making use of VOIP.
The basic hardware includes:
Telephone
microphones
speakers.
1. The organizer of the phone conference is given a unique Pin which can be shared
participants.
2. For Participants to join, they have to dial the conference phone number.
3. Then they would have to enter a PIN.
Web conferencing
Web conference can be done using internet connection.
It is very similar to video conference as participants can hear audio and see a live
video stream.
Participants can join the web conference by clicking on the supplied link from the
organizer.
Participants can join and leave the web conference at any time.
Instant messaging (IM) feature is available to communicate with other participants.
Participants can be given permission to speak and can share content such as
images, video or presentations.
18