CHAPTER 4 NETWORKS AND EFFECTS OF USING THEM. (1)
CHAPTER 4 NETWORKS AND EFFECTS OF USING THEM. (1)
A network is two or more computers, or other electronic devices, connected together so that they can
exchange data.
How it Works
➢ When a data packet is received at one of its ports, the router inspects the IP address and
determines whether the data packet is meant for its own network or for another, external
network.
➢ If it’s meant for its own network, then the data packet is routed to the local switch or
hub.
➢ Otherwise, the data packet is transmitted to a different router that is to an external
network.
➢ Routers know where to send data packets by consulting a routing table.
➢ The routing table will contain information about the router’s immediate network -such as
computer addresses and information about other routers in its immediate vicinity.
➢ When a data packet reaches a router, it examines the IP address. Because the routing table
contains computer addresses of all the computers/devices on its network, it will be able to
work out that the data packet is intended for a computer on its network.
2. Network interface card (NIC)
✓ Used to connect individual computers/devices to a network.
✓ NICs come in two distinct types:
✓ Wired: cards that have ports which allow network cables to be plugged in directly.
✓ Wireless: cards that connect to networks using Wi-Fi signals
3. Hubs
✓ Hubs are hardware devices that can have a number of other devices connected to them.
✓ They are used primarily to connect devices together to form a local area network (LAN),
often in the same building.
✓ A hub will take a data packet received at one of its ports and broadcast it to every device
connected to it.
4.Switches
✓ Switches are ‘intelligent’ versions of hubs.
✓ As with hubs, they connect a number of devices together to form a LAN.
✓ However, unlike a hub, a switch stores the MAC addresses of all devices on the network.
✓ Each port on the switch connected to a device will have a matching MAC address called
a look-up table.
✓ Using the look-up table, a switch matches the MAC address of an incoming data packet
arriving at one of its ports, and directs it to the correct device.
✓ switches are more secure than hubs - because only the intended device is sent the data
✓ Do not waste bandwidth -because network traffic is reduced.
In summary:
» Both a hub and a switch are used to connect devices in a LAN.
» Both hubs and switches use data packets.
» Hubs send data packets to every device on the network; whereas switches send data packets
to a specific device only.
» Security is lower with hubs than with switches
» A switch uses a look-up table to determine the destination device
» Switches use MAC addresses to locate the destination device.
5. Bridges
Bridges are devices that connect one LAN to another LAN that uses the same protocol.
They are often used to connect together different parts of a LAN so that they can function as a
single LAN.
Differences between bridges and routers.
Data loss
➢ Actions from hackers gaining access to accounts or pharming attacks, for example could
lead to loss or corruption of data.
➢ Users need to be certain that sufficient safeguards exist to overcome these potentially
very harmful risks
There are a number of reasons for adopting intranets rather than using the
internet:
✓ Intranets are safer because there is less chance of external hacking or viruses.
✓ It is easier to prevent external links to, for example, certain websites.
✓ Companies can ensure that the information available is specific to their internal
audience’s needs.
✓ It is easier to send out sensitive messages in the knowledge that they will remain within
the company.
✓ Intranets offer better bandwidth than the internet, therefore there are fewer connection
limits than with the internet.
Typical uses of an intranet would be:
✓ Viewing internal web pages (e.g. company , schools, university's etc.)
✓ Internal e-mail and instant messaging between workers
✓ Sharing of internal documents
Extranets allow intranets to be extended outside the organisation, but with the same advantages
as an intranet;
Extranet allows, for example, trading partners to have controlled access to some information
(commercially-sensitive information is password protected).
INTERNET
Internet is Public (available to all users)
o Internet is network of networks
o Internet is global
o Internet has more information than an intranet
Typical uses of an internet would be:
✓ Viewing web pages
✓ Sending and receiving e-mail messages
✓ Sharing files
✓ Communicating using voice (VOIP) and video (video-conferencing)
✓ Playing multi-player games
✓ Streaming Video/audio Content
✓ Online Shopping/Banking
3. Smart cards
The chip on the smart card can store data such as name, security number, sex, date of birth and a
PIN. Smart cards can therefore be used as a security device.
As the owner of the card walks up to a security gate, readers on either side of the gate quickly
scan the security data stored on the RFID tag embedded in the card. The user will then be invited
to enter a PIN on the keypad. If all details match, then access will be allowed.
4. Physical tokens
A Physical Token enables authentication with the use of a small physical device
To access a system that uses a physical token, a user will enter their username and password into
the system, and then enter the security code generated by the token.
The physical token can be directly connected to the device that the user is trying to access or the
physical token will generate one time password (OTP) which is then entered into the system
manually
To obtain a one time password (OTP) the user will enter their personal identification number
(PIN) and any other authentication requirements into the physical token device. If all
requirements are satisfied then an internal clock will be used to generate the one time password
(OTP) which is displayed on its screen
To enhance security, the one time password (OTP) changes frequently and each code will only be
valid for a short period of time (usually within 1 minute).
Advantages of physical tokens include:
✓ Offline authentication
✓ Portable
Disadvantages of physical tokens include:
✓ Cost
✓ Loss or theft of the physical token
✓ Physical dependance.
Example of Physical Token Use:
A customer has logged on to the bank’s website. They get to a web page which requires some
form of authentication to prove who they are. To do this, they need to use a physical token
supplied by the bank:
✓ The customer inserts their debit card into the top of the token device (first authentication
step) and the device either recognizes the card as genuine or rejects it.
✓ The device then asks the customer to press ‘IDENTIFY’ and then enter their PIN (second
authentication step).
✓ A one-time password is then shown on the device screen – this is usually an eight-digit code.
✓ The customer now goes back to their bank web page and enters the eight-digit code.
✓ They are now given access to their account.
Anti-virus
▪ Anti-Malware (also known as Anti-Virus software) is designed to protect devices against
viruses and malicious software.
▪ Anti-malware has 3 mains purposes, detect, prevent and remove malicious software.
▪ Anti-Malware is installed onto a computer system and will operate in the background.
common features:
✓ check software or files before they are run
✓ compares a possible virus against a database of a known viruses
✓ carrying out Heuristic checking
– This is the identification of potential threats within a file from behavioral patterns and
characteristics rather than just relying on a database of known viruses.
✓ Any possible files or programs which are infected are put into quarantine which:
– allows the virus to be automatically deleted, or
– allows the user to make the decision about deletion (it is possible that the
user knows that the file or program is not infected by a virus – this is known as a false
positive and is one of the drawbacks of anti-virus software)
✓ Needs to be kept up to date because new viruses are constantly being discovered.
✓ full system checks need to be carried out once a week
Worked example
Give two examples of how Anti-Malware protects devices against malicious software
[4]
✓ Regular updates by the Anti-Malware software will keep an up-to-date list of threats
✓ If any of the threats are detected on the device, the Anti-Malware software will
quarantine the files.
✓ Anti-Malware software will scan external storage media when they are connected to
the device.
✓ Preventing viruses from being transferred from storage media onto the device.
Video Conferencing
✓ Communication method that uses both video & sound
✓ Carried out in real-time
The basic hardware needed includes:
» Webcams
» Large monitors/television screens
» Microphones
» Speakers.
Software Needed
Few items to consider before a conference begins
✓ Agree on a time and date for the conference to take place.
✓ Delegates in each conference room must log into the video-conference.
✓ Set-up needs to be checked before the meeting goes live.
✓ Webcams need to be placed in the correct position so that all delegates are within visual
contact.
✓ Microphones need to be placed centrally so that all of the delegates can speak.
✓ One person to be the main contact in each conference room
A motor car company has some designers based in London and some in Beijing. The cost
of travel between the two cities is very high, so when they wish to meet to discuss new
products they use video-conferencing.
The designers all have PCs with a keyboard and a mouse in order to take part in video-
conferencing.
a. Name three other devices used to input or output data which would be needed to
take part in the video-conference.[3]
Three of:
✓ Webcam / video camera [1]
✓ Speakers / headset / headphones [1]
✓ Large monitor / television / data projector [1]
✓ Microphone [1]
Three from:
✓ Time lag / lip sync caused by the image not being synchronised with the sound [1]
✓ Poor picture quality caused by the speed of connection / quality of the hardware [1]
✓ More likely to have poorer sound quality caused by the quality of the hardware /
connection [1]
✓ Confidential material about the new cars may have to be signed / viewed in person [1]
✓ The new car may have to be viewed in person [1]
✓ Hardware breakdown stops the conference taking place [1]
✓ Communication breakdown stops the conference taking place [1]
✓ Different time zones will mean the conference has to take place at inconvenient times[1]
Audio conferencing
Audio conferencing refers to meetings held between people using audio/sound equipment.
Audio conferencing can be done over the standard telephone network also referred to as a
phone conference.
Hardware required
✓ A Standard phone
✓ Internet Phone
✓ Computer (with in-built microphone and speakers)
✓ External microphone and/or speakers
Characteristics
✓ Voice communication only (no video)
✓ Audio is in real time
✓ Call management options (mute etc)
✓ Participants of the audio conference can be many miles apart or even in a different
country
Uses
✓ On the go business meetings
✓ Allows a hybrid collection of devices such as standard telephones, smartphones
and laptops (providing it is a VoIP call)
Advantages
✓ Attendees do not have to travel to the event
✓ Convenience
✓ Cost saving
✓ Better for the environment
✓ Anyone within the company can attend regardless of location
✓ Events can be held at short notice as travel is not required
✓ Allows other members outside of the organisation to attend easily without having
to visit on premises
✓ Audio conferencing is more cost effective as it requires less bandwidth and less
expensive equipment.
✓ Audio conferencing can integrate with many other devices and tools for
communication.
✓ Audio conferencing provides a higher level of security as users are not sharing a
screen.
Disadvantages
Hardware Required
✓ Computer (requires webcam, microphone and speakers)
Characteristics
✓ Allows both sound and video
✓ Participants of the web conference can be many miles apart or even in a different country
✓ Audio and video are real time allowing users to interact with each other
✓ Allows virtual breakout rooms for teams of participants
✓ Screen and slide presentations
✓ Instant messaging
✓ Document sharing
Uses
✓ Distance learning and education
✓ Online presentations
✓ Online team collaboration
✓ Interviews
✓ Customer support
✓ Virtual events
Advantages
✓ Attendees do not have to travel to the event
✓ Convenience
✓ Cost saving
✓ Better for the environment
✓ Anyone within the company can attend regardless of location
✓ Events can be held at short notice as travel is not required
✓ Allows other members outside of the organisation to attend easily without having to visit on
premises
✓ Web conferencing software often allows recording and playback features to allow members
to review the event
✓ Enhanced visual presentations compared to video conferencing
✓ Real time collaboration
Disadvantages
✓ Requires a strong and stable network connection
✓ Security and privacy concerns
✓ Distractions from other activities on the device
✓ Those using the system may need to be trained to use it effectively which can:
▪ Take time
▪ Be costly
✓ Dependent on users being technically savvy and having suitable devices/network
connections.