Week 7 & Week 9 Networking SEHH1034 PDF

Document Details

CureAllGardenia

Uploaded by CureAllGardenia

null

2020

null

Campbell, J. T., Ciampa, M., Clemens, B., Freund, S. M., Frydenberg, M., Hooper, R., Ruffolo, L.

Tags

networking computer networking computer concepts technology

Summary

This document details the concepts of networking. It discusses various aspects of networks such as network topologies, types of networks and the components of network including hardware and software. The summary of this document details networking concepts for students in an Information Technology programme.

Full Transcript

SEHH1034 Week 7 & Week 9 Networking Reference: Module 10: Campbell, J. T., Ciampa, M., Clemens, B., Freund, S. M., Frydenberg, M., Hooper, R., Ruffolo, L. (2020). Technology for Success: Computer Concepts, Cengage Learning. Lesson Objectives Discuss the key features of connected networks and...

SEHH1034 Week 7 & Week 9 Networking Reference: Module 10: Campbell, J. T., Ciampa, M., Clemens, B., Freund, S. M., Frydenberg, M., Hooper, R., Ruffolo, L. (2020). Technology for Success: Computer Concepts, Cengage Learning. Lesson Objectives Discuss the key features of connected networks and explore how connections between networks are made Discuss risks and benefits with using a connected network Key Features of Connected Networks Explain how a network operates Define the elements of a connected network Identify the devices necessary to create a network Explain the physical connections between networks and network parts Explain the differences between various types of networks How a Network Operates A network is a system of two of more devices linked by wires, cables, or a telecommunications system o Requires a combination of hardware and software Some networks provide connections to the Internet, which requires the services of an Internet Service Provider (ISP) o Enables the network to communicate with other networks that are also connected to the Internet Elements of a Connected Network Hub: transfers all data to all devices Switch: transfers data only to the intended recipient Router: device that connects two or more networks Modem: communications device that connects a communications channel to a device o Connects the network to the Internet through an ISP Devices Necessary to Create a Network Requires two or more devices that need to communicate, a way to communicate, and the infrastructure to facilitate the communication o A network interface card (NIC) is required for a computer to connect to a network o Cable modem/DSL modem Devices Necessary to Create a Network Network interface card (NIC) Ethernet card Ethernet (IEEE 802.3) is a popular/standard network using a bus topology NIC that supports Ethernet protocols Devices Necessary to Create a Network Wi-Fi : Wireless Fidelity (IEEE 802.11) Wi-Fi card - a wireless NIC Wireless access point - device that transmits and receives wireless signals (e.g. the wireless router) Devices Necessary to Create a Network Digital subscriber line (DSL) provides high-speed Internet access of phone lines Devices Necessary to Create a Network Cable Internet connection provides always-on broadband Internet access using cable television infrastructure Devices Necessary to Create a Network Wired and wireless network Devices Necessary to Create a Network Networked printer sharing Physical Connections Between Networks (1 of 3) Topology Details Network arrangement Bus All devices attach to a central cable, called a bus, which carries the data. If the bus fails, the devices on the network will no longer be able to communicate. Network Ring Data travels from one device to the next in a sequential fashion. If one device on the network fails, communication on the network could Topologies cease to function. Ring networks are no longer common. Star Each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate. Two or more star networks may be joined together using a bus to form a tree topology. Tree topologies often are used in schools and businesses. Mesh All devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route. Two types of mesh topologies are a full mesh topology (each device on the network is connected to every other device on the network) and a partial mesh technology (each device may or may not be connected to all other devices on the network). Physical Connections Between Networks (2 of 3) Network Architecture Determines the logical design of all devices on a network o Client/server network o Peer-to-peer (P2P) network Cloud computing Provide computing services, including data storage and apps, via the Internet Physical Connections Between Networks (2 of 3) Client/server Peer-to-peer network (P2P) network Physical Connections Between Networks (3 of 3) Geographic Reach Local area network (LAN) connects computers and devices in a limited area Wide area network (WAN) connects devices in a large geographic region Metropolitan area network (MAN) is operated by a city or county Personal area network (PAN) connects personal digital devices within 30 feet via Bluetooth Body area network (BAN) small, lightweight biosensors implanted in the body Differences Between Various Types of Networks Additional Network Types Network type Description Wired network Sends signals and data through cables, which may have to travel through floors and walls to connect to other network devices. Wired networks tend to be more secure and transmit data faster than wireless networks. Wireless network Sends signals through airwaves, and usually do not require cables. Wireless networks tend to be more convenient and easier to set up than wired networks, but can be less secure. Wireless networks make it possible to connect devices in locations where physical wiring is not possible or is difficult. Intranet A private network for use by authorized individuals. Organizations use intranets to communicate internally and can allow users to use a web browser to access data posted on webpages. Intranets are preferable when data being transferred should not necessarily reach the Internet. Extranet Allows outsiders (such as customers, vendors, and suppliers) to access an organization’s intranet. For example, an extranet might be used if a supplier needs to check a customer’s inventory levels before deciding whether to ship additional product. Virtual private network (VPN) A private, secure path across a public network that allows authorized users secure access to a company or other network. A VPN can allow an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path. Risks and Benefits with Using a Connected Network Benefits: sharing resources without regard to geographic location; easier communication Risks o Malware can install itself without permission and damage or steal data from a computer or device o Hackers can gain access to personal data o Phishing o Social engineering o Denial of service (DoS) attack Distributed denial of service (DDoS) attack Zombie How Unauthorized Network Use Threatens Communications When hackers can connect to the same network as the computer they wish to target, it is easier to obtain information Data also might be exposed by connecting to a fraudulent network o When connecting to a public Wi-Fi network, one should not enter confidential information on websites or send personal data in email o Evil twin: hackers can capture personal information if the users transmit the information via fraudulent Wi-Fi network. How to Secure a Network Authentication o User name and a strong password o Biometrics Firewall o Hardware firewalls o Software firewalls Encryption Secure Data Stored on a Network Network attached storage (NAS) devices are hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks o Specify users who can view the files, as well as view and make changes to the files Turn on network encryption so that information from files being transmitted on the network cannot be intercepted by others How to Encrypt a Network Encryption is the process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password Ensure that wireless networks support encryption so that data cannot be intercepted easily by others o Encrypted wireless networks often use a wireless network key to encrypt data sent between devices Connecting to Different Types of Networks Network standards and protocols Connect to network devices Network Standards and Protocols (1 of 3) Network standard Common use in Ethernet Most common wired networks Power over Ethernet (PoE) Devices requiring network connectivity and power to be supplied by the network Phoneline/HomePNA and Powerline Networks using telephone lines to connect computers and devices Wi-Fi Home and small business networks LTE Voice and data transmission on cellular networks Network Standards and Protocols (2 of 3) Computers communicating with each other on a network must follow a common set of rules for exchanging information, or protocols o TCP/IP (Transmission Control Protocol/Internet Protocol) Cellular Networks: millions of people use their mobile phones to access the Internet o Cellular networks can provide Internet services in most locations where cellular service is offered o 4G and 5G networks provide higher speed data transmission Network Standards and Protocols (3 of 3) Close-Distance Network Protocols Network protocol Common use Bluetooth Devices communicating with each other over a short range (usually less than 30 feet/9 meters) RFID (radio frequency Radio signals transmitted through antennas, often identification) found in tollbooth transponders or embedded chips in animals NFC (near field communication) Used in credit cards, smartphones, and tickets to facilitate close-range communication IrDA Remote controls or other data transmission within close proximity Connect to Network Devices (1 of 3) Setting up and connecting to a home wireless network: may vary depending on the network hardware, size of home, and devices to be connected. o Purchase a modem or separate wireless router and connect it to your home’s Internet service o Enable the wireless network o Configure a name for the network o Configure a wireless network key o Enable each device’s wireless functionality o On the device, search for and connect to the wireless network o Enter the wireless network key Connect to Network Devices (2 of 3) Wi-fi hot spots: wireless networks that are available in public places Mobile hot spots: enables one to connect a phone, computer or other device to the Internet through the cellular network o Many smartphones contain mobile hotspot functionality, although cellular providers may charge an extra fee to use it, and any data transmitted or received through the hotspot will be added to the overall data usage Connect to Network Devices (3 of 3) Safety Precautions for Wireless Networks o Change the administrative password for the router o Change the wireless network name from the default o Enable encryption, and choose a secure wireless network key that is difficult to guess o Regularly change your wireless network key o Regularly review the number of devices connect to the network o Enable and configure the MAC address control feature o Choose a secure location for the wireless router o Regularly perform router firmware updates

Use Quizgecko on...
Browser
Browser