Professional Documents
Culture Documents
Computers and devices can be used Some areas in the building may not
anywhere in the range of the APs. pick up the wireless signal.
Types of Computer Networks
Bluetooth (WPAN)
• Bluetooth is also known as a Wireless Personal Area Network
(WPAN).
• Bluetooth uses radio waves to transmit data over short distances
.
Types of Computer Networks
Advantages and Disadvantages of Bluetooth (WPAN)
Advantages disadvantages
Bluetooth signals are not easily Slow data transfer. Bluetooth is not
affected by other electrical devices suitable for transferring large files.
like Wi-Fi can be)
• IPv6 has been designed to allow the internet to grow in terms of the number
of hosts and potential increase in the amount of data traffic.
• IPv6 address consists of eight groups of hex digits separated by colons :
Types of networking devices
Routers
computer addresses that are stored by a router.
Media access control MAC addresses
• A number which uniquely identifies a device when it is connected to a
network.
• 6 pairs of hexadecimal digits
• MAC address is usually hard coded by manufacturer, never changes
• Its reliable method of identifying data senders and data receivers on a
network.
• Sometimes referred to as the physical address
• MAC address for an Ethernet NIC: 00:0a:95:9d:68:16
Types of networking devices
Data packets
A basic unit of communication data over a network.
Transmitted data, it is split up into a number of packets and each
packet is transmitted separately.
Internet Intranet
The term ‘Internet’ comes from The term ‘Intranet’ comes from the
the phrase International phrase Internal Restricted Access
Network. Network.
The internet is used to share Intranets are used to share data
data globally. locally and privately.
The internet is used to provide Intranets are used to provide
information that is relevant to a information which is relevant to a
wide range of people. single company or organization.
The internet can be accessed Intranets can only be accessed from
from anywhere as long as you within the company or organization
have an internet connection. that owns it, if you have a user ID
and a password
Internet is less secured Intranet is more secure than the
internet
Disadvantage of intranets;
1. They don’t have the same volume of information as the
internet
2. Intranets tend only to have one view whereas the internet
will provide different arguments from different people about
a topic.
3. Communication on the intranet is fine if the people who you
need to communicate with are also members of the
organization and have access to the intranet.
Extranet
• An extranet is an intranet that has been opened up to allow
external user access. Usually through VPNs.
• Access to an extranet is normally available through the
organization's website. A user logs in using an email address
and password that will notify the extra net that the user is an
authorized external user.
Extranets usually only allow certain information to be
accessed. For example:
ID Cards
• ID cards use a holographic image (hologram). These are designed to make
forgery of the card more difficult.
• Holographic images change colour or appear to have a moving object
when the image is viewed from different angles.
• Another form of security is to have a photographic image of the card user
printed on the card surface.
Passport
• The passport page containing the photograph is placed face down on a
reader
• A microchip embedded in the page is now read by a reader and the facial
image on the passport is also scanned in
• The owner of the passport now looks up at a digital camera and a
photograph is taken
• The photograph is converted into a digital format so that it can be
compared to the scanned facial image
• The data read from the microchip also compared to data stored on central
database
Smart cards
● Smart cards look like credit cards, and they contain a RFID tag (chip and
antenna) it can be read from a distance and does not have to be swiped
through a card reader.
● chip can be used to hold certain information such as can store data such
as name, security number, sex, date of birth and a PIN.