You are on page 1of 7

NETWORKS:

Network terms and devices:

1) Network Interface Card (NIC): It is needed to allow a device to connect to a network. An NIC
turns binary data into an electrical signal that allows access to a network. Usually located on
the motherboard. Each NIC is given a unique hardwired media access control (MAC), this
uniquely identifies the device. Wireless NICs are the same as Nics as that they can connect a
device to the internet or networks, however, they use wireless connectivity via an antenna
(they are usually plugged into an USB port)

2) Medica Access Control (MAC) address: It is a number which uniquely identifies a device
when it is connected to a network. It is made up of 48 bits which are shown as 6 groups
(first 3 groups are the manufacturer's code, last 3 are the device serial number). The MAC
address may also be identified as the physical address because it uniquely identifies a device.
MAC addresses are useful when trying to identify network faults because they never change.
The Mac addresses are constant.

3) Internet protocol (IP) addresses: It is given whenever a computer connects to the internet. It
is usually assigned to the computer by the internet service provider (ISP). Due to a series of
protocols it is necessary to supply an IP address. If a laptop connects to the internet in
another place, it will be given a different IP address. The IP address changes each time you
look at different locations. There are 2 types of IP:
- IPv4: based on 32 bits and the address is written as four groups of eight bits.
- IPv6: uses a 128-bit address, which takes the form of eight groups . It uses colons (:)
and hexadecimal numbering

4) Data Packets: Data is moved around networks in the form of data packets. Whenever a user
sends some data, it is split up into a number of packets and each packet is transmitted
separately. It contains the IP address of the sender and the receiver, the identity number of
the packet, the packet size, how many packets make up the whole message.

5) Hubs: They are hardware devices that can have a number of other devices connected to
them. They are used to connect devices together to form a local area network (LAN). A hub
will take a data packet received at one of its ports and broadcast it to every device connected
to it. Hubs are not very secure because every device will receive the data packet and they
generate unnecessary traffic on the network.
6) Switches: They are “intelligent” versions of the hubs. As hubs, they connect a number of
devices together to form a LAN, unlike a hub, a switch stores the MAC addresses of all
devices on the network. Each port has a matching MAC address called a “look-up table”.
With the switch, it will send the data packet to a specific device. For this, switches are safer
than hubs, and do not waste bandwidth. Both hubs and switches are used to exchange data in
their own area networks. They are unable to exchange data to the internet or other external
networks.

7) Bridges: They are devices that connect one LAN to another LAN that uses the same protocol
(communication rules) and are often used to connect together different parts of a LAN so
that they can function as a single LAN. Unlike routers, bridges cannot communicate with
other external networks, such as the internet.

Routers:
Routers are used to route data packets from one network to another network based on IP addresses.
It is capable of doing this for every router has its own IP address. Routers are used to join a LAN to
the internet.

When a router receives a data packet, it inspects the data packet's IP address to see if it belongs to its
own network or if it belongs to an external network.
- If the packet belongs to its own network, the data packet is transmitted to a different switch
or hub.
- If the packet belongs to an external network, the data packet will be transmitted to a
different router.
Routers know where to send data packets by consulting a routing table (stored on the router´s RAM) .
This table contains information about the router's immediate network (computer addresses) and
information about other routers in its locality. Because the routing table contains all the computers
addresses, it will be able to find out where the data packet is intended to go. They do not store MAC
addresses because the switch is able to use its look-up table to send the data packets to the correct
device.
Wi-fi and Bluetooth:

Similarities Bluetooth Wi-Fi

They both offer wireless - Devices automatically - Most useful if operating-full


communication between connect and detect each other scale networks since it offers
devices. but they do not interfere since faster data transfers, better
They use electromagnetic they use a different channel. range, better security.
radiation as the carrier of data - To minimize the risk of - A wi-Fi enabled device can
transmission. interference with other access the internet wirelessly
devices, they constantly at any ACCESS POINT (AP) or
change channels known as HOTSPOT.
SPREAD-SPECTRUM
FREQUENCY HOPPING.
- Bluetooth uses key
encryption to create a secure
WIRELESS PERSONAL AREA
NETWORK (WLAN)

Cloud Computing (storage):

Common network environments:


-Intranet: is a private network contained within an enterprise that is used to securely share company
information and computing resources among employees.

-Extranet: is a controlled private network with internet connectivity that “facilitates” intercompany
relationships. It is an intranet that can be partially accessed by authorized outside users, enabling
businesses to exchange information over the internet in a secure way.

-Internet: a global computer network providing a variety of information and communication


facilities, consisting of interconnected networks.
Network types:

- LOCAL AREA NETWORK (LAN): usually within one building or near each other. Consists of a
number of computers or devices which will be connected by hubs or switches. One of the
hubs or switches will be connected to a router to allow the LAN to connect to external
networks like the internet.

Advantages Disadvantages

- allow sharing resources such as hardware - easier spread of viruses


and software - slower access to external networks
- easy communication between users of the - if the main server breaks down, in many
LAN types of structures, the network will no
- network administrator that ensures longer function properly.
security and LAN is constantly monitored.

- WIRELESS LOCAL AREA NETWORK (WLAN): They are similar to LANS but there are no
wires or cables. They provide wireless network communications over short distances using
radio or infrared signals instead of using cables.
Access points are connected into a wired network at fixed locations. Most LANS need several
APs to allow uninterrupted wireless communications. To do this they use either
spread-spectrum technology or infrared .

The AP receives and transmits data between the WLAN and the wired network structure.
End-users access the WLAN through wireless LAN adapters.

- WIDE AREA NETWORK (WAN): They are used where computers or networks are situated a
long distance from each other. If a number of LANs are joined together using a router, they
can form a WAN. WANs usually make use of some public communications network, but they
can use dedicated or leased communication lines which can be less expensive and more
secure.
A typical WAN consists of end systems and intermediate systems.

Security issues regarding data transfer:


Passwords:

They are used in many instances:


-accessing an email account
-carrying out outline banking+
-accessing social network sites
There are other cases in which you might need a password or in some cases a user ID. Some ways to
protect the passwords are:
-run anti-spyware software.
-change passwords on a regular-basis
-passwords should not be easy to crack. Strong passwords should contain at least: -one capital letter,
one numerical value, one other keyboard character.

Authentication methods:

-zero login: relies on devices being smart and secure enough to instantly recognise a user by a
number of features
-biometrics:
-magnetic stripes:
-smart cards:
-physical tokens:
-electronic tokens:

Anti-Malware Software:

Topologies:
The way the devices are connected:
-Peer to peer (p2p): one device is connected to another device.
-Server: when all devices are connected directly to one certain device.
-Ring: when something happens in the device or in the cable of the network goes down.

-Line: the data of information passes through a line if something happens to one of the devices, the
rest still work, but if something happens to the line from that point forward it starts working.

You might also like