Professional Documents
Culture Documents
MODULE 11
“Network Topologies”
Used for everything from accessing the internet or printing a document to downloading an attachment from an
email, networks are the backbone of business today. They can refer to a small handful of devices within a single room to
millions of devices spread across the entire globe, and can be defined based on purpose and/or size.
MODULE 12
“Network Topologies”
As with most things, there’s no “right” or one-size-fits-all option. With this in mind, I’ll walk you through the most
common network topology definitions to give you a feel for the advantages and disadvantages of each.
The web-like structure of mesh topologies offers two different methods of data transmission: routing and flooding.
When data is routed, the nodes use logic to determine the shortest distance from the source to destination, and when
data is flooded, the information is sent to all nodes within the network without the need for routing logic.
Cable Length
Generally, the more cable involved in network topology, the more work it’ll require to set up. The bus and star
topologies are on the simpler side of things, both being fairly lightweight, while mesh networks are much more cable-
and labor-intensive.
Cable Type
The second point to consider is the type of cable you’ll install. Coaxial and twisted-pair cables both use insulated
copper or copper-based wiring, while fiber-optic cables are made from thin and pliable plastic or glass tubes. Twisted-
pair cables are cost-effective but have less bandwidth than coaxial cables. Fiber-optic cables are high performing and can
transmit data far faster than twisted-pair or coaxial cables, but they also tend to be far more expensive to install,
because they require additional components like optical receivers. So, as with your choice of network topology, the
wiring you select depends on the needs of your network, including which applications you’ll be running, the transmission
distance, and desired performance.
Cost
As I’ve mentioned, the installation cost is important to account for, as the more complex network topologies will
require more time and funding to set up. This can be compounded if you’re combining different elements, such as
connecting a more complex network structure via more expensive cables (though using fibre-optic cables in a mesh
network is overdoing it, if you ask me, because of how interconnected the topology is). Determining the right topology
for your needs, then, is a matter of striking the right balance between installation and operating costs and the level of
performance you require from the network.
Scalability
The last element to consider is scalability. If you anticipate your company and network expanding—or if you’d like it
to be able to—it’ll save you time and hassle down the line to use an easily modifiable network topology. Star topologies
are so common because they allow you to add, remove, and alter nodes with minimal disruption to the rest of the
network. Ring networks, on the other hand, have to be taken entirely offline for any changes to be made to any of the
nodes.
MODULE 13
“Network Hardware”
NETWORK HARDWARE
The basic computer hardware components that are needed to set up a network are as follows −
Network Cables
Network cables are the transmission media to transfer data from one device to another. A commonly used network
cable is category 5 cable with RJ – 45 connector, as shown in the image below:
Routers
A router is a connecting device that transfers data packets between different computer networks. Typically, they are
used to connect a PC or an organization’s LAN to a broadband internet connection. They contain RJ-45 ports so that
computers and other devices can connect with them using network cables.
Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from the source network to the
destined network.
Gateways
A gateway connects entirely different networks that work upon different protocols. It is the entry and the exit point
of a network and controls access to other networks.
NETWORK SWITCHING
Definition
Network switching is the process of transmitting data packets from the source to the destination through a number
of intermediate network nodes. Here, each node controls or switches data packets to the next node towards the
destination. When data comes on a node it is called ingress, and when data goes out of a node it is called egress.
Switching Methods
The two broad level switching methods are connection oriented switching and connectionless switching.
Connection – oriented Switching: In connection – oriented switching, a dedicated path is established between
the source and the destination before data switching. Once this path is established, the entire message sent
through this route.
Connectionless Switching: In connectionless switching, no path is established prior to data switching. Each data
unit has complete address information and is individually routed from the source to the destination using
forwarding tables of the nodes.
Switching Techniques
The three common switching techniques are circuit switching, packet switching and message switching −
Circuit Switching: Here, a dedicated path is established between the source and the destination and then all the
message is sent over this route. It is an example of connection – oriented switching method.
Packet Switching: The entire message is broken down into small data packets each of which has switching
information in its header. The packets are then individually routed from the source to the destination. The
destination node reassembles out-of-order packets according to header information. It is an example of
connectionless switching.
Message Switching: It is a combination of circuit switching and message switching. Here, the entire message is
considered as a data unit and is routed from one node to another in a connectionless manner.
MODULE 14
“Computer Ethics and Laws”
Computer Ethics
Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use
of computers, both hardware and software. Privacy concerns, intellectual property rights and effects on the society are
some of the common issues of computer ethics.
Privacy Concerns
• Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of
a computer system or network and can acquire unauthorized access to other computers.
• Spam - This refers to the transmission of unsolicited messages from various origins using electronic messaging
systems such as e-mail and chat messengers. Typically, attackers use spam as a tool for advertisement. E-mail
spam is the most common form, which is also known as unsolicited bulk e-mail (UBE)
• Phishing - This is defined as a software or a program used by an attacker to obtain personal information.
Attackers commonly target user passwords to hack and take control of a user account. Furthermore, credit card
numbers are also targeted by phishing.
- Pharming - is a cyber-attack intended to redirect a website's traffic to another, fake site. Pharming can be
conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in
DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP
addresses. Compromised DNS servers are sometimes referred to as "poisoned".
• Malware – means malicious software which is created to impair a computer system. Common malware are
viruses, spyware, worms and Trojan horses. A virus can delete files from a hard drive while a spyware can
collect data from a computer.
- Viruses - are a subgroup of malware. A virus is malicious software attached to a document or file that
supports macros to execute its code and spread from host to host. Once downloaded, the virus will lay
dormant until the file is opened and in use, Viruses are designed to disrupt a system’s ability to operate. As a
result, viruses can cause significant operational issues and data loss.
- Spyware - is malicious software that runs secretly on a computer and reports back to a remote user. Rather
than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote
access to predators. Spyware is often used to steal financial or personal information.
a. Key logger, which records your keystrokes to reveal passwords and personal information.
- Adware - is malicious software used to collect data on your computer usage and provide appropriate
advertisements to you. While adware is not always dangerous, in some cases adware can cause issues for
your system. Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and
spyware. Additionally, significant levels of adware can slow down your system noticeably. Because not all
adware is malicious, it is important to have protection that constantly and intelligently scans these
programs.
- Ransomware - malicious software that gains access to sensitive information within a system, encrypts that
information so that the user cannot access it, and then demands a financial payout for the data to be
released. Ransomware is commonly part of a phishing scam. By clicking a disguised link, the user downloads
the ransomware. The attacker proceeds to encrypt specific information that can only be opened by a
mathematical key they know. When the attacker receives payment, the data is unlocked.
- Fileless malware - is a type of memory-resident malware. As the term suggests, it is malware that operates
from a victim’s computer’s memory, not from files on the hard drive. Because there are no files to scan, it is
harder to detect than traditional malware. It also makes forensics more difficult because the malware
disappears when the victim computer is rebooted. In late 2017, the Cisco Talos threat intelligence team
posted an example of file less malware that they called DNSMessenger.
• Data Protection – also known as information privacy or data privacy is the process of safeguarding data which
intends to influence a balance between individual privacy rights while still authorizing data to be used for
business purposes.
• Anonymity – is a way of keeping a user’s identity masked through various applications.
Effects on Society
• Jobs – Some jobs have been abolished while some jobs have become simpler as computers have taken over
companies and businesses. Things can now be done in just one click whereas before it takes multiple steps to
perform a task. This change may be considered unethical as it limits the skills of the employees.
• There are also ethical concerns on health and safety of employees getting sick from constant sitting, staring
at computer screens and typing on the keyboard or clicking on the mouse.
• Environmental Impact – Environment has been affected by computers and the internet since so much time
spent using computers increases energy usage which in turn increases the emission of greenhouse gases.
• There are ways where we can save energy like limiting computer time and turning off the computer or
putting on sleep mode when not in use. Buying energy efficient computers with Energy Star label can also
help save the environment.
• Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has
been very popular nowadays.
• Computer gaming influenced society both positively and negatively. Positive effects are improved hand-eye
coordination, stress relief and improved strategic thinking. Negative effects are addiction of gamers,
isolation from the real world and exposure to violence.
• Computer technology helps the government in improving services to its citizens. Advanced database can
hold huge data being collected and analyzed by the government.
• Computer technology aids businesses by automating processes, reports and analysis.