You are on page 1of 124

NETWORKS AND THE

EFFECTS OF USING THEM


Compiled by S.O Ajala
Introduction to
Computer Networks
Lesson 1
Objectives
Define computer networks

Explain how the following work:


• network interface card (NIC)
• media access control (MAC) address
• internet protocol (IP) address
• data packet.
Network Components - Endpoint,
NIC, LAN Cable, Connector,
Switch, Router | TechTerms
What is NIC or
Network Interface
Card or Network Card
MAC Address
Explained
Network interface card (NIC)

Each NIC is given a unique


A network interface card An NIC turns binary data
hardwired (or hard-coded)
(NIC) is needed to allow a into an electrical signal
media access control
device to connect to a that allows access to a
(MAC) address at the
network. network.
manufacturing stage.

WNIC (Wireless NIC)


When installed in a wireless connectivity,
device, this uniquely utilising an antenna to
identifies that device. communicate with
networks via microwaves.
Media access control (MAC)
address

MAC address is a The MAC address is


number which uniquely made up of 48 bits
identifies a device when which are shown as six
it is connected to a groups of hexadecimal
network. digits.

The MAC address is


sometimes referred to
as the physical address
because it uniquely
identifies a device.
Internet protocol (IP) addresses

Internet protocols
Whenever a define the rules that
This is usually
computer connects must be agreed by
assigned to the
to the internet it is senders and
computer by the
given an internet receivers of data
internet service
protocol (IP) communicating
provider (ISP).
address. through the
internet.
Internet protocol (IP) addresses

An IP address essentially
identifies the location of a
device on a network.

Unlike the MAC address which


remains constant, the IP
address changes each time you
log in at different locations.
IPv4 (32bits)

IPv6 (128bits)
Data packets
Data is moved around networks in
the form of data packets.

Whenever a user sends some data, it


is split up into a number of packets

Each packet is transmitted


separately.
Packet Header
Packets of data will usually have a
header which contains:
• the sender’s IP address
• the receiver’s IP address
• the sequence/identity number of the packet
• the packet size .
• how many data packets make up the whole
message.
A Packet's Tale. How Does
the Internet Work?
Network Devices Lesson 2
Objectives

Describe how a hub, a


switch, a bridge and a
router work.
Compare and contrast a
hub and a switch; a
bridge and a router.
Relate the pictures to
Network Devices
Hub, Switch, & Router
Explained - What's the
19 difference
Hubs
Hubs are hardware devices that can have a number of
other devices connected to them.

They are used primarily to connect devices together to


form a local area network (LAN), often in the same
building.

A hub will take a data packet received at one of its ports


and broadcast it to every device connected to it.
Because
• Hubs are not very
data packets secure.
are
delivered to • There is unnecessary
every device traffic on the network,
which results in reduced
on the
bandwidth.
network:
Switches

Switches are They connect a number


‘intelligent’ versions of of devices together to
hubs. form a LAN.

Each port on the switch


A switch stores the MAC connected to a device
addresses of all devices will have a matching
on the network. MAC address (called a
look-up table).
In summary

A hub and a switch are used Hubs and switches use data
to connect devices in a LAN packets

Hubs send data packets to


every device on the
network; whereas switches
send data packets to a
specific device only
In summary
A switch uses a
Security is lower
look-up table to
with hubs than
determine the
with switches
destination device

Switches use MAC


addresses to locate
the destination
device.
Bridges

Bridges are devices that connect one LAN to another LAN


that uses the same protocol (communication rules).

They are often used to connect together different parts


of a LAN so that they can function as a single LAN.

Unlike routers, bridges cannot communicate with other


external networks, such as the internet.
Hub, Switch or
Router_ Network
30 Devices Explained
Routers

Routers are used to


route data packets It can do this because Routers are used to
from one network to each router has its own join a LAN to the
another network, IP address. internet.
based on IP addresses.
How Routers Work

When a data packet is received at one of its ports, the router


inspects the IP address and determines whether the data packet is
meant for its own network or for another, external network.

If the data packet is meant for its own network, then the data
packet is routed to the local switch or hub.

Otherwise, the data packet is transmitted to a different router (and


therefore to an external network).
Routers know where to
send data packets by When a data packet reaches
Routers do not store the
consulting a routing table a router, it examines the IP
MAC addresses of devices
(stored on the router’s address.
RAM).

The router does not need


the MAC address because The switch can then use its
the data packet will be sent look-up table to send the
by the router to the switch data packet to the correct
on the recipient local device.
network.
Packet Forwarding

Suppose computer C1
Data packets are sent
wishes to send data to
from C1 to R1.
computer C10:

R1 checks the IP
addresses and notes the The data packets are
data packets are not then forwarded onto
intended for any devices the internet (R0).
on Network 1.
The IP address (in R4 recognises that
the header of the the IP address of
data packet) each data packet
matches that of R4; refers to Network
this ensures that 4, and forwards
each data packet is them to S4 which
eventually then directs each
forwarded to R4. data packet to C10.
Comparison of routers and bridges
Questions
Mention two characteristics of a hub.

Differentiate between how a hub and a


switch work?

What is the difference between a bridge


and a router?
Task
Research
and form a •Cables
pictorial •MODEMS
note on the •ADC
following •DAC
networking
•NIC
devices:
Wi-Fi and
Bluetooth

Lesson 3
Objectives
Explain how Bluetooth and WiFi
technologies work.

Compare and contrast Bluetooth and Wi-


Fi technologies.

Evaluate Bluetooth and Wi-Fi


technologies.
Why is
Bluetooth
called
Bluetooth?
Both Wi-Fi and Bluetooth offer
wireless communication between
devices.

They both use electromagnetic


radiation as the carrier of data
transmission.
Bluetooth Explained |
All you need to know!
How Bluetooth Works
Bluetooth sends and
receives radio waves in These are all centred on
a band of 79 different a frequency of 2.45
frequencies (known as GHz.
channels).

Devices using When a device wants to


Bluetooth communicate, it picks
automatically detect one of the 79 channels
and connect to each at random to pair with
other. another device.
How Bluetooth Works
Once paired,
If the to minimise Bluetooth
channel the risks of This is uses key
is already interference known as encryption
being with other spread- to create a
devices, the secure
used, it devices spectrum wireless
randomly constantly frequenc personal
picks change the y area
another channels hopping. network
they are (WPAN).
channel. using
Bluetooth is useful:

Transferring data The speed Low-bandwidth


between two or applications (for
more devices of data example, when
which are very transmissi sending music
close together files from a
(less than 30 on is not mobile phone to
metres distance) critical a headset).
Wi-Fi
Wi-Fi sends and receives radio waves in
several different frequency bands (2.4
GHz and 5 GHz)

Each band is is further split into channels.

The 5GHz band has a faster data transfer


rate but a shorter signal range.
How does WiFi work - Easy Explanation
Wi-Fi

Wi-Fi is best suited to A Wi-Fi enabled device


operating full-scale (such as a computer or
networks because it smartphone) can access,
offers much faster data for example, the internet
transfer rates, better wirelessly at any access
range and better security point (AP) or ‘hot spot’
than Bluetooth. up to 100 metres away.
Bluetooth vs WiFi -
What's the difference?
Comparison of Wi-Fi and Bluetooth connectivity
How far?
What are the characteristics of Bluetooth
technology?

What are the advantages of Bluetooth


technology compared to Wi-Fi’s?

Interference, which is better equipped


against and why? Bluetooth or Wi-Fi?
Questions

Evaluate
Bluetooth and
Wi-Fi technology
(8marks)
Cloud Computing
(storage)
Lesson 4
Objectives
Explain the meaning of cloud
computing.

List different types of cloud


computing.

Evaluate the advantages and


disadvantages of cloud computing.
What is Cloud Computing?

Cloud computing is
The same data is
a method of data
stored on more
storage where
than one server
data is stored on
(Data redundancy)
remote servers.
Cloud Computing
Explained
3 Types of Cloud Storage

Public cloud – this is a storage environment where the customer/client


and cloud storage provider are different companies.

Private cloud – this is storage provided by a dedicated environment


behind a company firewall; customer/client and cloud storage provider
are integrated and operate as a single entity.

Hybrid cloud – this is a combination of the two previous environments;


some data resides in the private cloud and less-sensitive/less-
commercial data can be accessed from a public cloud storage provider.
Private Cloud Storage

It is dedicated solely to one organization.

The organization has complete control over the cloud storage environment,
including the hardware, software, and network infrastructure.

It is hosted within the organization's own data center or a third-party data


center.

It is typically used by organizations that require high levels of security,


compliance, and customization.
Example of Private Cloud
Storage
A hospital stores patient records on a private cloud
storage solution. The hospital has complete control
over the cloud storage environment, ensuring the
security and confidentiality of the patient records. \

The hospital's IT team manages the cloud storage


infrastructure, including the hardware, software,
and network infrastructure.
Public Cloud Storage
The cloud storage provider
It refers to a type of cloud owns and operates the
storage infrastructure that infrastructure, and
is shared among multiple customers pay for the
organizations. storage and services they
use.

Public cloud storage is often


used for applications that
require a scalable and
flexible storage solution.
Example of Public Cloud Storage

A startup company stores The startup can easily scale


its website data on a public up or down the storage
cloud storage solution capacity depending on its
provided by a major cloud needs, and it only pays for
service providers the storage it uses.
Hybrid Cloud Storage

It allows For example, an


organizations to organization can
It is a
use both private use private cloud
combination of
and public cloud storage for its
private and public
storage solutions sensitive data and
cloud storage
to achieve the public cloud
solutions.
best of both storage for its less
worlds. sensitive data.
Example of Hybrid Cloud
Storage

A retail company uses a hybrid cloud storage solution to store its sales
data. The company stores its sensitive sales data, such as customer
payment information, on a private cloud storage solution.

The company stores its less sensitive sales data, such as customer
demographics, on a public cloud storage solution.

This allows the company to maintain high levels of security and


compliance for its sensitive data while also benefiting from the scalability
and flexibility of public cloud storage for its less sensitive data.
Public Cloud vs
Private Cloud vs
Hybrid Cloud
Advantages of cloud computing (storage)

Customer/client files stored There is no need for a


in the cloud can be accessed customer/client to carry an
at any time, from any external storage device with
device, anywhere in the them, or even use the same
world, as long as internet computer, to store and
access is available. retrieve information.

The cloud provides the user


with remote backup of data.
Advantages of cloud computing (storage)

If a customer/client has
The cloud system offers
a failure of their hard
almost unlimited
disk or backup device,
storage capacity (at a
cloud storage will allow
price!).
recovery of their data.
Benefits of Using
Cloud Storage
Disadvantages of
Cloud Computing
Disadvantages of cloud
computing (storage)
If the customer/client has a
slow or unstable internet
Security aspects of storing connection, they could have
data in the cloud. many problems accessing or
downloading their
data/files.

The potential failure of the


Costs can be high if a large
cloud storage company is
storage capacity or high
always possible – this poses
download/upload data
a risk of loss of all backup
transfer is required.
data.
Advantages (Remote Access)
Because the cloud is
controlled by
You do not have to external companies,
You do not need to pay for large storage they will ensure that
carry memory sticks capacity on your your files are backed
around with you. computer/tablet or up and therefore
mobile phone. reduce the possibility
of losing
The ability to irreplaceable data.
synchronise (sync) Cloud storage is also
files ensures they are ideal for
automatically collaboration
updated across all purposes.
devices.
Data security using cloud
storage/computing

What physical security exists regarding the building where


the data is housed?

How good is the cloud service provider’s resistance to


natural disasters or power cuts?

What safeguards exist regarding personnel who work for the


cloud service company? Can they use their authorisation
codes to access confidential data for monetary purposes?
Task
Network Types Lesson 5
Objectives

List different types of networks.

Explain devices used in each of the


networks.

Compare and contrast each of the


network types.
Network Types: LAN, WAN,
PAN, CAN, MAN, SAN, WLAN
Local area network (LAN)

Local area networks


(LANs) are usually
within one building
or geographically
near each other.
Advantages
they permit easy
They allow the sharing
communication
of resources such as
between users of the
hardware and software.
LAN.

They use a network


administrator that
ensures security and
use of the LAN is
constantly monitored.
Disadvantages
Easier spread of viruses throughout the
whole network

Queues for shared resources (such as a


printer) which can be frustrating

Slower access to external networks


Disadvantages

Increased security risk If the main server


when compared to breaks down, the
stand-alone network will no longer
computers function properly.
Wireless local area
network (WLAN)
Wireless LANs (WLANs) provide wireless network
communications over fairly short distances using radio or
infrared signals instead of using cables.

Access points (APs), are connected into a wired network


at fixed locations for devices to connect wirelessly.

The APs use either spread-spectrum technology or


infrared.
Wireless local area
network (WLAN)

The AP receives and transmits data


between the WLAN and the wired
network structure.

End-users access the WLAN through


wireless LAN adapters which are built
into their devices.
Wired versus Wireless
It is easier to
increased
expand the
mobility,
networks

increased
safety
chance of
improvement
interference
Wired versus Wireless

Data
It is possible
transmission
for signals to
Data is less rate is still
be stopped
secure slower than
by thick
for cabled
walls
networks.
Wired versus Wireless

More reliable and Data transfer rates


stable network. tend to be faster.

Can lead to a
Lose the ability for
number of hazards,
devices to be
such as tripping
mobile
hazards,
Wide area networks (WANs)
Wide area networks (WANs) are used where computers or
networks are situated a long distance from each other
geographically (for example, in a different city or country).

If a number of LANs are joined together using a router,


then they can form a WAN.

WANs usually make use of some public communications


network (such as telephone lines or satellites),
Network issues and
communication Lesson 6
Objectives

Explain the features of a


good password.

Describe different
authentication methods.
Password
A strong password is a
combination of characters
(letters, numbers, symbols) that
is difficult to guess or crack by
an attacker using automated
tools or dictionary-based
attacks.
Features of Strong
Passwords

Change passwords
Passwords should
on a regular basis in
not be easy to crack
case it has come into
(e.g. your favourite
the possession of
colour, name of a
another user illegally
pet).
or accidentally.
Passwords
Strong passwords
should contain:
• at least one upper case letter
• At least one lower case letter An example of a strong
• at least one numerical value password is:
• at least one other keyboard Sy12@#TT90kj=0
character (such as @, *, &
etc.).
Other authentication methods
» zero login
» biometrics
» magnetic stripes
» smart cards
» physical tokens
» electronic tokens.
What is Biometric
Authentication?
Zero login and biometrics

Technology It relies
standard that
allows users to on:
login to
computer
•biometrics
systems without •behavioural
the need to type patterns.
in a password.
Magnetic stripe
cards

The cards have a magnetic stripe on the reverse side (made up


of tiny magnetic particles on a plastic film).

The stripe is read by swiping it through a card reader. Data such


as name, ID number, sex, and date of birth may be contained
on a magnetic stripe when used as a security device to allow
entry to a building, for example. Access will only be allowed if
the scanned data matches data in a database.
Advantages of magnetic stripe cards

They are easy to use.

It is not an expensive technology.

Magnetic cards can be remotely deactivated (if lost


or stolen).

The cards can be multi-purpose (for example, door key


cards, network access cards or used in vending machines to
buy food or drink).
Disadvantages of magnetic stripe
cards
Less secure than, for example, biometric
methods (no encryption is used and the
stripe contents can be copied fairly easily).

The cards wear out with a lot of use.

Magnetic readers often fail to read the cards


on first attempt.
What is a 2FA
hardware
token?
Physical tokens
A physical (or hardware) token is a form of authentication in the form of
a physical, solid object.

The user’s interaction with a login system is used to prove that the user
has possession of the token.

Physical tokens contain internal clocks and when a PIN and other
authentication details are entered, then a one-time password (OTP) is
generated. The OTP is shown on a small screen.

The code changes on a regular basis and is usually only valid for less
than a minute.
Register On The New Mobile
App With Your E-Token Or
Hardware Token
Soft Token
Electronic tokens
When the website requests
Electronic (software) tokens
the user to authenticate
are software installed on a
who they are, the user
user’s device, such as a
opens the app on their
smartphone.
smartphone.

The user enters this OTP


The app generates a one- when prompted by the
time password (OTP) which website, together with some
is valid for less than a other form of
minute. authentication, such as PIN,
touch ID or face ID.
ELECTRONIC
CONFERENCING Lesson 7
Objectives

Describe the features of video,


audio and web conferencing.

List their advantages and


disadvantages.
Video conferencing

It is a substitute for
face-to-face
Video conferencing
conferences It is carried out in
is a communication
between a number real time and makes
method that uses
of people, who may use of some form of
both video and
be in a different part network.
sound.
of the country or
live overseas.
Introduction to
Video
Conferencing
Video Conference
Setup Basic
Requirements
Basic Hardware
Webcams

Large monitors/television screens

Microphones

Speakers.
Software used in video conferencing
Advantages of using video
conferencing

Not travelling
physically to meetings
It may be better to use reduces costs:
video conferencing • reduced travelling costs
It is possible to hold
than have delegates • no need to pay for hotel
conferences at short
travel to potentially accommodation or venue
notice. hire
unsafe places around
the world. • it also reduces the cost of
taking people away from
their work .
Disadvantages of using video
conferencing

Time lag in responses/delays when talking.

Images can jerk

Expensive to set up

Time zone differences

Cost of training people to use the equipments.

The whole system relies on a good network connection


Audio conferencing

Audio conferencing refers to meetings


held between people using audio
(sound) equipment.

Audio conferencing can be done over


the standard telephone network (often
referred to as a phone conference).
What is audio conferencing?
Audio Conferencing Procedures
Audio Conferencing
Equipment

Via a VOIP
A standard telephone • A computer (with built-in
(FOR audio microphones and speakers)
conferencing over a • External microphone and/or
standard telephone speakers
line) • An internet phone
• A standard phone.
Web Conferencing

Web conferencing (often referred to as a webinar or


webcasts) uses the internet to permit conferencing to take
place.

The only requirement is a computer and a high-speed,


stable internet connection.

To carry out web conferencing, each user either


downloads an application or logs on to a website from a
link supplied in an email from the conference organiser.
Web Conferencing vs. Video Conferencing
Main Features include:
Slide presentations
The host’s computer
using presentation
screen can be shared for
software can be posted
live presentations.
on the conference

It is possible for any


delegate to draw or
write on a ‘whiteboard’
using their own
keyboard or mouse.
Main Features include:
It is possible to transmit images or videos using
the webcam throughout the conference.

Documents can be shared online.

It is possible to chat verbally or by using


instant messaging throughout the conference.
Web Conferencing for Professional
Education

You might also like