Professional Documents
Culture Documents
Internet protocols
Whenever a define the rules that
This is usually
computer connects must be agreed by
assigned to the
to the internet it is senders and
computer by the
given an internet receivers of data
internet service
protocol (IP) communicating
provider (ISP).
address. through the
internet.
Internet protocol (IP) addresses
An IP address essentially
identifies the location of a
device on a network.
IPv6 (128bits)
Data packets
Data is moved around networks in
the form of data packets.
A hub and a switch are used Hubs and switches use data
to connect devices in a LAN packets
If the data packet is meant for its own network, then the data
packet is routed to the local switch or hub.
Suppose computer C1
Data packets are sent
wishes to send data to
from C1 to R1.
computer C10:
R1 checks the IP
addresses and notes the The data packets are
data packets are not then forwarded onto
intended for any devices the internet (R0).
on Network 1.
The IP address (in R4 recognises that
the header of the the IP address of
data packet) each data packet
matches that of R4; refers to Network
this ensures that 4, and forwards
each data packet is them to S4 which
eventually then directs each
forwarded to R4. data packet to C10.
Comparison of routers and bridges
Questions
Mention two characteristics of a hub.
Lesson 3
Objectives
Explain how Bluetooth and WiFi
technologies work.
Evaluate
Bluetooth and
Wi-Fi technology
(8marks)
Cloud Computing
(storage)
Lesson 4
Objectives
Explain the meaning of cloud
computing.
Cloud computing is
The same data is
a method of data
stored on more
storage where
than one server
data is stored on
(Data redundancy)
remote servers.
Cloud Computing
Explained
3 Types of Cloud Storage
The organization has complete control over the cloud storage environment,
including the hardware, software, and network infrastructure.
A retail company uses a hybrid cloud storage solution to store its sales
data. The company stores its sensitive sales data, such as customer
payment information, on a private cloud storage solution.
The company stores its less sensitive sales data, such as customer
demographics, on a public cloud storage solution.
If a customer/client has
The cloud system offers
a failure of their hard
almost unlimited
disk or backup device,
storage capacity (at a
cloud storage will allow
price!).
recovery of their data.
Benefits of Using
Cloud Storage
Disadvantages of
Cloud Computing
Disadvantages of cloud
computing (storage)
If the customer/client has a
slow or unstable internet
Security aspects of storing connection, they could have
data in the cloud. many problems accessing or
downloading their
data/files.
increased
safety
chance of
improvement
interference
Wired versus Wireless
Data
It is possible
transmission
for signals to
Data is less rate is still
be stopped
secure slower than
by thick
for cabled
walls
networks.
Wired versus Wireless
Can lead to a
Lose the ability for
number of hazards,
devices to be
such as tripping
mobile
hazards,
Wide area networks (WANs)
Wide area networks (WANs) are used where computers or
networks are situated a long distance from each other
geographically (for example, in a different city or country).
Describe different
authentication methods.
Password
A strong password is a
combination of characters
(letters, numbers, symbols) that
is difficult to guess or crack by
an attacker using automated
tools or dictionary-based
attacks.
Features of Strong
Passwords
Change passwords
Passwords should
on a regular basis in
not be easy to crack
case it has come into
(e.g. your favourite
the possession of
colour, name of a
another user illegally
pet).
or accidentally.
Passwords
Strong passwords
should contain:
• at least one upper case letter
• At least one lower case letter An example of a strong
• at least one numerical value password is:
• at least one other keyboard Sy12@#TT90kj=0
character (such as @, *, &
etc.).
Other authentication methods
» zero login
» biometrics
» magnetic stripes
» smart cards
» physical tokens
» electronic tokens.
What is Biometric
Authentication?
Zero login and biometrics
Technology It relies
standard that
allows users to on:
login to
computer
•biometrics
systems without •behavioural
the need to type patterns.
in a password.
Magnetic stripe
cards
The user’s interaction with a login system is used to prove that the user
has possession of the token.
Physical tokens contain internal clocks and when a PIN and other
authentication details are entered, then a one-time password (OTP) is
generated. The OTP is shown on a small screen.
The code changes on a regular basis and is usually only valid for less
than a minute.
Register On The New Mobile
App With Your E-Token Or
Hardware Token
Soft Token
Electronic tokens
When the website requests
Electronic (software) tokens
the user to authenticate
are software installed on a
who they are, the user
user’s device, such as a
opens the app on their
smartphone.
smartphone.
It is a substitute for
face-to-face
Video conferencing
conferences It is carried out in
is a communication
between a number real time and makes
method that uses
of people, who may use of some form of
both video and
be in a different part network.
sound.
of the country or
live overseas.
Introduction to
Video
Conferencing
Video Conference
Setup Basic
Requirements
Basic Hardware
Webcams
Microphones
Speakers.
Software used in video conferencing
Advantages of using video
conferencing
Not travelling
physically to meetings
It may be better to use reduces costs:
video conferencing • reduced travelling costs
It is possible to hold
than have delegates • no need to pay for hotel
conferences at short
travel to potentially accommodation or venue
notice. hire
unsafe places around
the world. • it also reduces the cost of
taking people away from
their work .
Disadvantages of using video
conferencing
Expensive to set up
Via a VOIP
A standard telephone • A computer (with built-in
(FOR audio microphones and speakers)
conferencing over a • External microphone and/or
standard telephone speakers
line) • An internet phone
• A standard phone.
Web Conferencing