You are on page 1of 5

COMMUNICATION

Digital communications describe a process in which two or NETWORK TOPOLOGIES


more computers or devices transfer data, instructions, and
information. It refers to the layout of the computers and devices in a
communications network. Three basic network topologies are
star, bus, and ring. Most networks, including the Internet, use
combination

 STAR NETWORK All of the computers and devices


(nodes) on the network connect to a central device, thus
forming a star. All data that transfers from one node to
another passes through the central device. A star network
contains a single, centralized device through which all
computers and devices on the network communicate.
 BUS NETWORK It consists of a single central cable, to
which all computers and other devices connect. One
NETWORK
advantage of the bus network is that computers and other
• A network is a collection of computers and devices devices can be attached and detached at any point on the
connected together via communications devices and bus without disturbing the rest of the network. Another
transmission media advantage is that failure of one device usually does not
affect the rest of the bus network.
• Advantages of a network include:  RING NETWORK A cable forms a closed loop (ring)
with all computers and devices arranged along the ring.
 Facilitating communications Data transmitted on a ring network travels from device to
 Sharing hardware device around the entire ring, in one direction.On a ring
 Sharing data and information network, all connected devices form a continuous loop.
 Sharing software
 Transferring funds

Network Communications Standards and Protocols

 Ethernet is a network standard that specifies no central


computer or device on the network (nodes) should control
when data can be transmitted
 Personal Area Network (PAN) A network that connects
 The token ring standard specifies that computers and
computers and devices in an individual’s workspace using
devices on the network share or pass a special signal
wired and wireless technology.
(token)
 Local Area Network (LAN) A network that connects
 TCP/IP is a network protocol that defines how messages
computers and devices in a limited geographical area.
(data) are routed from one end of a network to another
 Wireless LAN (WLAN) A LAN that uses no physical
 Wi-Fi (wireless fidelity) is a series of network standards
wires.
that specifies how two wireless devices communicate over
 Metropolitan Area Network (MAN) A high-speed
the air with each other.
network that connects local area networks in a
 LTE is a network standard that defines how high-speed
metropolitan area, such as a city or town, and handles the
cellular transmissions use broadcast radio to transmit data
bulk of communications activity across that region.
for mobile communications.
 Wide Area Network (WAN) A network that covers a
 Bluetooth is a network protocol that defines how two
large geographic area (such as a country, or the world)
Bluetooth devices use short-range radio waves to transmit
using a variety of wired and wireless transmission media.
data
NETWORK ARCHITECTURES  UWB (ultra-wideband) is a network standard that
specifies how two UWB devices use short-range radio
The configuration of computers, devices, and media on a waves to communicate at high speeds with each other.
network is sometimes called the network architecture  IrDA (Infrared Data Association) transmit data
wirelessly via infrared (IR) light waves
 Client/server network one or more computers act as a  RFID is a protocol that defines how a network uses radio
server, and the other computers on the network request signals to communicate with a tag placed in or attached to
services from the server. an object, an animal, or a person.
 Peer-to-peer network A simple, inexpensive network that  NFC (near field communication) is a protocol, based on
typically connects fewer than 10 computers. Each RFID, that defines how a network uses close-range radio
computer, called a peer, has equal responsibilities and signals to communicate between two devices or objects
capabilities, sharing hardware (such as a printer), data, or equipped with NFC technology
information with other computers on the peer-to-peer
network.
– A modem technology that uses existing
telephone lines to transport high-bandwidth data.
DSL provides dedicated, point-to-point, public
network access.
– ADSL (asymmetric digital subscriber line) is a
type of DSL that supports faster transfer rates
when receiving data (the downstream rate) than
when sending data (the upstream rate)
 ISDN (Integrated Services Digital Network) is a set
of standards for digital transmission of data over
standard copper phone lines.
– With ISDN, the same phone line that could carry
only one computer signal now can carry three or
more signals at once through the same line, using a
technique called multiplexing.
 FTTP (Fiber to the Premises) uses fiber-optic cable to
provide extremely high-speed Internet access to a
user’s physical permanent location.
– FTTH (Fiber to the Home) provides home users
 WiMAX (Worldwide Interoperability for Microwave with Internet access via fiber-optic cable.
Access), also known as 802.16, is a network standard – FTTB (Fiber to the Building) refers to small
developed by IEEE that specifies how wireless businesses that use fiber-optic cables to access the
devices communicate over the air in a wide area. Internet.
 Fixed- Wireless Wimax A costumer accesses the  A T-carrier line is any of several types of long-
internet from a desktop computer at home or other distance digital phone lines that carry multiple
permanent location. signals over a single communications line.
 Mobile Wimax Enables users to access the WiMax  ATM (Asynchronous Transfer Mode) is a service that
network with mobile computers and mobile devices carries voice, data, video, and media at very high
such as smart phones. speeds.

Communications Software consists of programs and Communications DEVICES is any type of hardware
apps that: capable of transmitting data, instructions, and
information between a sending device and a receiving
 Help users establish a connection to another device
computer, mobile device, or network
 Manage the transmission of data, instructions,  A broadband modem sends and receives data and
and information. information to and from a digital line.
 Provide an interface for users to communicate – Cable modem
with one another – DSL modem
 A wireless modem uses a mobile phone provider’s
Communications Lines network to connect to the Internet wirelessly from a
computer or mobile device
 A wireless access point (WAP) is a central
communications device that allows computers and
devices to transfer data wirelessly among
themselves or to a wired network
 A router connects multiple computers or other
routers together and transmits data to its correct
destination on a network
 Some routers provide additional functionality:
– Wireless router
– Broadband router
– Broadband wireless router
– Mobile broadband wireless router
 A dedicated line is a type of always-on physical  A network card, sometimes called a network
connection that is established between two interface card (NIC pronounced nick), A NIC is a
communications devices. hardware component, typically a circuit board or
 The cable television (CATV) network provides high- chip, which is installed in a computer so it can
speed Internet connections, called cable Internet connect to a network.
service. The CATV signal enters a building through a  A hub or switch is a device that provides a central
single line, usually a coaxial cable. point for cables in a network.
 DSL (Digital Subscriber Line) transmits on existing
standard copper phone wiring.
HOME NETWORK

 Many home users connect multiple computers and


devices together in a home network

TRANSMISSION MEDIA

 Transmission media carries one or more


communications signals
 Broadband media transmit multiple signals
simultaneously
 The amount of data, instructions, and information
 Broadcast radio is a wireless transmission medium
that can travel over transmission media sometimes is
that distributes radio signals through the air over
called the bandwidth
long distances
 Latency is the time it takes a signal to travel from
 Cellular radio is a form of broadcast radio that is in
one location to another on a network
wide use for mobile communications
Physical Transmission Media  Microwaves are radio waves that provide a high-
speed signal transmission
 A communications satellite is a space station that
receives microwave signals from an earth-based
station, amplifies it, and broadcasts the signal over a
wide area to any number of earth-based stations
 A GPS (global positioning system) is a navigation
system that consists of one or more earth-based
receivers that accept and analyze signals sent by
satellites in order to determine the receiver’s
geographical location
CYBER ATTACKS  Botnets or zombie army is a group of
compromised computers or mobile devices
A cyberattack is a malicious and deliberate attempt by connected to a network such as the Internet that
an individual or organization to breach the information are used to attack other networks, usually for
system of another individual or organization. Usually, the nefarious purposes.
attacker seeks some type of benefit from disrupting the  A denial-of-service attack (DoS attack) is an assault
victim’s network. whose purpose is to disrupt computer access to an
Internet service.
Information transmitted over networks has a higher
 A back door is a program or set of instructions in a
degree of security risk than information kept on an
program that allows users to bypass security
organization’s premises.
controls when accessing a program, computer, or
INTERNET AND NETWORK ATTACK network.
 Spoofing a technique intruders use to make their
 Malware short for malicious software, consists of network or Internet transmission appear legitimate
programs that act without a user’s knowledge and to a victim computer or network.
deliberately alter the operations of computers and
mobile devices. Malware is a term used to describe CYBER INTRUDERS
malicious software, including spyware, adware,
Cyber intruder is the one who attempts to gain
viruses, trojan horse, rootkit, and worms.
unauthorized access to or to disrupt or damage a
 Virus A potentially damaging program that
computer system or electronic communication network.
affects, or infects, a computer or mobile
device negatively by altering the way the Types of Cyber Intruders
computer or device works without the user’s
knowledge or permission.  Trolls A person who posts intentionally offensive,
 Worm A program that copies itself repeatedly, or off topic comments online. The basic purpose is
for example in memory or on a network, using to upset people.
up resources and possibly shutting down the  Spies All such data collecting - as is much of the
computer, device, or network. gathering of personal facts about us by credit
 Trojan Horse A program that hides within or agencies, educational and health institutions, and
looks like a legitimate program. Unlike a virus agencies of the U.S government.
or worm, a trojan horse does not replicate  Hackers a person who gains unauthorized access to
itself to other computers or devices. computers or network
 Rootkit A program that hides in a computer or – Malicious Hacker known as Crackers someone
mobile device and allows someone from a who accesses a computer or network illegally but
remote location to take full control of the has the intent of destroying data, stealing
computer or device. information, or other malicious action.
 Spyware A program placed on a computer or o Script Kiddie Teenagers without much
mobile device without the user’s knowledge technical expertise who use downloadable
that secretly collects information about the software or other existing code to perform
user and then communicates the information malicious break-ins
it collects to some outside source while the o Hacktivist People who break into computer
user is online. system for politically or socially motivated
 Adware A program that displays an online purposes.
advertisement in a banner or pop-up window o Black Hat Often professional criminals are
on webpages, email messages, or other those who break into computer systems –
Internet services. recently including smartphones and Twitter –
to steal or destroy information or to use it for
Can Spread via an Email Message illegal profit.
 STEP 1 - Unscrupulous programmers create a virus o Cyberterrorist attack computer systems so as
to bring physical, political or financial harm to
program that deletes all files. They hide the virus in a
groups, companies, or nations.
word processing document and attach the document
– Benign Hacker Also called thrill-seeker hackers
to an email message are hackers who illegally access computer
 STEP 2 -They send the email message that contains systems simply for the challenge of it, not to
the infected attachment to thousands of users around damage or steal anything; their reward is the
the world achievement of breaking in.
 STEP 3 - Some users open the attachment and their – Benevolent Hacker also called ethical hackers,
computers become infected also known as white-hat hackers, are usually
 STEP 4 - These users do not open the email message computer professionals who break into computer
— instead they immediately delete the email message systems and networks with the knowledge of
and continue using their computers. These users’ their owners to expose security flaws that can be
fixed.
computers are not infected with the virus with the
virus
 Thieves may be a company’s employees or
suppliers or professionals. (Hardware Thieves,
Employees, Con artists, scammers, & counterfeiters
Outside partners & suppliers).

You might also like