You are on page 1of 19

Objectives: Subunits are

• Networks hardware
• network issues and communication
What is a computer network?
A network is two or more computers, or
other electronic devices, connected
together so that they can exchange data.
 Easily share files and data.
 Share resources such as printers and
Internet connections.
 Communicate with other network users
 Store data centrally (using a file server)
for ease of access and back-up.
 Keep all of our settings centrally so we
can use any workstation.
Greater risk of hackers.
Greater risk of viruses (spreading and
disabling network).
The significant cost of extra equipment.
When the network is down computers can not be used as standalone computers.
Print queues can be long.
1
4.1 Network Hardware
Common Network Devices:
• Each device has its own manufacturer given MAC (Media Access Control) address which is
unique. Example : AA-BB-CC-DD-EE-FF (6 pairs separated by a hyphen or a colons)
• A Hub and a Switch both connect a number of computers together to make a LAN.
Hub – Dumb Device
• Sends data packets to all the workstations on the network
which causes network traffic.
• Poor Security
• Only would be suitable for a small home networks.

Switch – smart Device


• When a device is connected to switch port, it records its
MAC address.
• The switch will learn each workstations MAC address when
it sends a packet of data across the network.
• It sends specific packets of data to specific computers on
the LAN using workstations unique MAC addresses.
• More secure however more expensive
• Normally used in larger networks found in schools, offices
etc.
2
4.1 Networks hardware
Understand how a router works and its purpose
Data Packets contain the
following information:
• Header to identify Data Packet.
• Sender and Receivers IP address.
• Number of data packets making
up the whole message.
Purpose of the router:
• Connects network/computers to the internet
• Connects LANs/networks together
• Transfers data between networks (Receives and Sends Data Packets)
• Router can connect to devices using cables or wireless signals.
• It stores information about which computer is connected to which
network
How router works with the webpages:
• Everything connected to the internet has an IP Address.
• Web Pages are stored on Web Servers. Webpages have unique IP
address & domain names to find/communicate with each other.
• Routers direct packets of data across the internet to its destination.

3
4.1 Networks hardware
Common Network Devices

MODEM converts analogue signals


from a telephone line to digital signals
which can be read by the computer. It
converts digital signals back into
analogue for transmission over
telephone

Network Interface Card (NIC) allows


you to connect a device to the
network. The NIC will contain the MAC
address which will be used to identify
the computer to the network.

A bridge is used to connect two parts of a LAN


network together so they function as a single
LAN. Two Switches can be connected using a
the Bridge Device.

4
4.1 Networks hardware
Understand the use of WiFi and Bluetooth in networks
WiFi is a wireless networking technology makes it possible to connect devices with a wireless
connection to a network or to a single computer .
 • Reduced cost of cabling/Safer – won’t trip over wires
 • Easier to connect other devices to the network
 • Makes the computer portable as long as it’s within range of the wireless access point
Limited area of network
Strength of signal is weaker
Possible slow data transfer speeds
Easier to hack into/less secure
Physical obstacles can interfere with signal/can
cause disconnection
Bluetooth is a wireless networking technology designed for very short-range connections.
 Connecting wireless devices such as mouse, phone, headset to a computer which are
close in proximity.
 Transferring files between devices.
 Printing Wirelessly from a Tablet or Mobile Phone.
Very slow data transfer speeds
Short distance of coverage/limited signal strength
Greater risk of interception of data/less secure
Supports a limited number of devices in a network 5
4.1 Networks hardware
Internet Service Provider : ISP
• Internet Service Provider, the organization which provides
Internet access.
• This offers web space and domain name to create own
website.
• It provides users with an email address.
• It provides a router to connect to the internet.
• In may also offer storage space to save data in the cloud.

Web Browser: A computer program/application with a graphical


user interface for displaying and navigating between web pages,
accessing World Wide Web.
When a user requests a web page from a particular website, the
web browser retrieves the necessary content from a web
server and then displays the page on the user's device.

A web browser is not the same thing as a search engine. A search


engine is a website that provides links to other websites.

Electronic mail (e-mail) is a computer-based application for the


exchange of messages between users 6
4.1 Networks hardware Intranet: It is a private network that can only
Internet: It is a vast network that links be accessed by authorized users.
together millions of computer around the • It is designed for internal communications.
world • It allows employees to securely share
• It is a Public network. Hence available messages and files with each other.
to all users • It also provides a simple way for system
• It is a network of networks and it is administrators to broadcast messages and
global roll out updates to all workstations
connected to the intranet.
Typical uses of an internet would be: • It has extra layer of security
• Viewing web pages • It helps in sharing documents.
• Sending and receiving e-mail messages • It helps in viewing internal web pages
• Sharing files (e.g. company schools, university's etc.)
• Communicating using voice (VOIP) • It helps in Internal e-mail and instant
and video (video-conferencing) messaging between workers
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Extranet: It is an intranet that can be
accessed by authorized outside users,
enabling businesses to exchange information
over the internet in a secure way. 7
4.1 Networks hardware WAN: Wide Area Network
LAN – Local Area Network • It is a network that extends over a large
• It covers a small area, normally geographical area.
confined to one building or within a • It is often created by joining several LANs
close proximity. together.
• It consists of number of computers and • Routers are used to connect LAN networks
devices that usually connect to a to form a WAN Network.
switch which is connected to a router. • It is also called the Internet.

WLAN – Wireless Local Area Network


• It links two or more devices using wireless communication to form a LAN within a limited
area such as a home, school, computer laboratory, campus, or office building.
• This gives users the ability to move around within the area and remain connected to the
network.
• The signal can be weaker as you move away from the Wireless Access Point.
• Security is a concern. The speed can reduce if there are more devices connected. 8
4.1 Networks hardware- Accessing the internet
Device Advantages Disadvantages
Laptop • More portable and smaller in size • Touch pad may be difficult to use
compared to desktop computers. to navigate webpages.
• Bigger screens compared to • Processors are not as fast as
tablets and phones. desktop computers.
Desktop • Stable internet connection since • Has to be connected to a power
the connection is normally wired. supply at all times.
• Use of input devices including • Not portable.
pointing devices to make
navigation easier.
Tablet / • Tablet: More portable than • Signal strength dependent on
Smartphone desktops /laptops however less location.
than phones. • Smaller display screen.
• Mobile: Portable: Easy to carry • Not all websites designed to be
around and use whilst on the used by mobiles/tablets.
move. • Touch screen may be difficult to
• Mobile: Always likely to have a use.
mobile phone at all times. • Limited battery Life.
• Mobile: Can access internet via
phone networks (4G) 9
4.2 Network Issues and Communication
Security issues surrounding the use of computer networks
Methods : Hackers, viruses, spyware, Phishing and Pharming

How?
1. Adding viruses & spyware to the Network.
2. Creating threat to the data - Data could be deleted, edited, corrupted, replicated or passed
on to other people.
3. Creating threat to the network - Network may have to be shut down to quarantine virus
which could stop production and cost an organization a lot of money

Policing the internet:


Why should it be done?
• To protect vulnerable users gaining access to undesirable websites.
• To prevent illegal material (software, videos) be openly posted and shared by web users.
• To punish those users who continually misuse the internet for their personal gain.
Why it is difficult?
• It would be extremely difficult and expensive to police the internet.
• Infrastructure including staff and offices would have to be required.
• Would be difficult to enforce different rules in different countries.
• Could go against freedom of speech.

10
4.2 Network Issues and Communication
Hacking:
• It is the unauthorised access to computer systems with the intention of causing harm.
• They could edit, delete and steal data.
• They also could introduce viruses to a computer network to cause disruption.
• They could employ someone to expose weaknesses of the system though spying.

Method of Authentication:
Password:
• Username and password is the common way to protect from entering into any system.
• Passwords must be strong which include multiple characters such letters, numbers, special
characters. Use upper and lower case letters.
• User should have different passwords for different accounts
• Ensure password is regularly changed.
• Install spyware software which will block the installation of any key logging software.

When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
• Security Question: Typical questions includes mothers maiden name.
• Personal Image: Requires user to identify an image when they log in on the website for
online banking. They have to confirm if the image shown is one they selected as their
account image.
11
4.2 Network Issues and Communication : Alternative methods of Authentication
Biometrics :
• Methods: Finger Prints, Retina Scan, Iris Scans, Face Scans, Vocal Recognition
• Uses: Biometrics use unique data. Only the person with the biometric features can access
the network. Cannot copy/replicate biometric data.

Magnetic Swipe Cards: They are used to gain access to the system by swiping the card into
the reader to enter into a room or gate. Swipe cards are quite easy to use and update.

Transaction Authentication Number (TAN): It is used by online banking services. User will
insert their bank card into the reader which will then provide a code which will need to be
entered to complete a transaction.

Two factor authentication: In Twin Factor Authentication, the bank sends a code which needs
to be entered to the computer after typing in their password. This code is valid only for few
seconds. This code is sent by the bank computer only to the authorized mobile number which
is registered in the bank.
Dongle/Digi-pass/physical token:
The device is registered in the bank against the customer’s account
number. It displays a number at regular intervals. After entering the
password, this number is entered to complete online transfers/
shopping payments. This is another method of twin authentication.
12
4.2 Network Issues and Communication : Security issues regarding data transfer
Virus: A piece of programming code/ software which gets installed, replicates itself, without
the user’s knowledge and permission.
Effects of virus on computer’s HDD/SSD:
1. Track zero & sector zero could be erased
2. Files & data can be deleted or destroyed or corrupted or damaged. This can lead to
computer malfunction
3. System files can be corrupted if on the hard disk
4. Disk space can fill up
5. Causes the computer to crash – become slower
6. Data files can be copied by the hacker and sent to others
How can the computer be infected?
1. Clicked on or opened a spam email or Clicked on a link to a website within the email
2. Opening software from a portable device /external secondary storage device
3. Running it without being checked by up to date anti-virus software
4. Not having an up-to-date antivirus on the computer or not at all scanning any file
downloaded or used from an external device before opening
How antivirus works during scan?
• Detects a potential virus, compares the virus coding with its database
• Alerts the user of the potential virus & asks the user if the file can be deleted or not
• Deletes the file and virus, quarantines the infected files on the hard disk so they cannot
infect the computer. Dis-infects & cleans the file in the quarantine.
13
4.2 Network Issues and Communication : Security issues regarding data transfer
Spyware : It gathers data from computers without the user knowing. It monitors the key
presses to gain personal information or passwords. This information would be sent back to the
hacker.
How to keep the computer safe:
1. Install antivirus and antispyware and keep it up to date.
2. Do not download any files from untrusted sources including email attachments .
3. Do not install illegal software onto your computer.
4. Do not click on links from unknown websites.
5. Do not connect storage devices (e.g. USB) from unknown sources and scan for viruses.
6. Install a firewall to keep the computer safe.

Encryption : Encryption is the process of converting information into a form that is


meaningless to anyone except holders of a ‘key’.
1. Data is scrambled up (Data is Encrypted).
2. If the data is intercepted it then it prevents people from understanding and reading the
data.
3. The person with the key is able to Decrypt and understand the data.

Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
14
4.2 Network Issues and Communication : Security issues regarding data transfer
Firewall: Monitors and controls Keeps a list of undesirable/
incoming and undesirable IP addresses,
outgoing data traffic. And only allows them

Prevents computer Warns you regarding


accessing undesirable threats/allows you
sites / IP addresses to accept/reject
downloaded programs

Prevents unauthorised Helps to prevent malware


computers using the internet (viruses) getting into
accessing the computer Computer from the internet
Proxy server: A proxy server is a server application that acts as an intermediary for requests
from clients seeking resources from servers that provide those resources.
• It acts as a buffer (between Internet and LAN).
• It passes on requests on behalf of the client to the Internet & passes pack the requested
web pages to individual computers
• It stores the webpages. If the same page is requested again, it provides from the cache
making it faster to supply.
• It monitors the internet usage.
• It also blocks undesirable sites
15
4.2 Network Issues and Communication :
Data Protection Act : It is to protect rights of the individual whose data is being obtained.

Web based business such as Amazon or E-bay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.

Principles of the Data Protection Act


1. Data must be fairly and lawfully processed.
2. Data must be accurate and up to date
3. Data can only be processed for the stated purpose.
4. Data must be adequate, relevant and not excessive.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they have adequate protection.

16
4.2 Network Issues and Communication : Network communication
Fax: Requires a fax machine and a telephone line. Number of the recipient dialed before the
document is scanned and sent. Recipient receives a hard copy
But… Anyone can access faxed documents, the fax may be out of paper or ink . No notification
of fax received.

Email: Can send same email to multiple recipient / multiple attachments. Email can be
received instantly and accessed on many platforms, can be read from any physical location
But… Email attachments may include viruses/spam, may receive phishing emails to obtain
personal data.

Electronic Faxing: To send an email fax, you write up a message and attach a document as you
would with a standard email. Instead of adding an email address, you input your recipient's fax
number followed by a unique eFax domain address. Then you hit the send button. No need to
have a physical fax machine.
 Electronic Fax is sent via a internet connection.
 No need to buy a fax machine, ink or paper.
 Electronic Fax documents are sent to an email which will ensure the correct person will
receive the fax – less chance of document being intercepted.
 Electronic Fax's can also be sent directly to a fax machine.
 Send fax's from any location with an internet connection.
 No additional cost to send fax over internet network.
17
4.2 Network Issues and Communication : Network communication
Video Conferencing: (Same like Botim, Totok apps)
Two or more participants, able to communicate, talk, see and hear over a network. It uses both
video and sound using an internet connection. It is interactive
 No need to travel to have meetings which would cut down on travelling costs and travelling
time.
 Video conference can be held at short notice.
 Facilitates long distance learning – students can access live lectures without travelling.
Different time zones could make it difficult to find to find a suitable time to have a meeting.
Technical problems with the internet or hardware could effect the quality of the video
conference.
Set up costs to purchase hardware/software and to provide relevant training to staff.
Lack of personal contact you would have if it was a face to face meeting.
Not possible to sign documents.
Web conference: (Same like Zoom and Teams)
 It is very similar to video conference as participants can hear audio and see a live video
stream. They use internet.
 They join the web conference by clicking on the supplied link from the organizer.
 Participants can join with permission and leave the web conference at any time.
 Participant can communicate with other participants through text messages.
 Participants can be given permission to speak and can share content such as images, video
or presentations.
18
4.2 Network Issues and Communication : Network communication
Audio Conferencing:
Audio conference is generally done over the telephone network or using a computer making
use of VOIP.
1. The Date and time is decided by the organizer.
2. The organizer of the phone conference is given a unique PIN which is shared with the
participants.
3. For Participants to join they have to dial the conference phone number followed by the
PIN.

Process of setting up audio conference:


• To set up an audio conference a provider would have to be contacted.
• The conference provider would provide a phone number and a PIN for the organizer and
• participants.
• The organizer would then email the details of the conference to all participants including
the phone number and PIN.
• At the start of the conference organizer calls the provided number and types in his PIN.
• Then each participant dials the number and enters the PIN to join the conference.

19

You might also like