Professional Documents
Culture Documents
Chapter 4 Network and The Effects of Using Them
Chapter 4 Network and The Effects of Using Them
A network is two or more computers, or other electronic devices, connected together so that they can
exchange data.
How it Works
⮚ When a data packet is received at one of its ports, the router inspects the IP address and
determines whether the data packet is meant for its own network or for another, external
network.
⮚ If it’s meant for its own network, then the data packet is routed to the local switch or
hub.
⮚ Otherwise, the data packet is transmitted to a different router that is to an external
network.
⮚ Routers know where to send data packets by consulting a routing table.
⮚ The routing table will contain information about the router’s immediate network -such as
computer addresses and information about other routers in its immediate vicinity.
⮚ When a data packet reaches a router, it examines the IP address. Because the routing
table contains computer addresses of all the computers/devices on its network, it will be
able to work out that the data packet is intended for a computer on its network.
2. Network interface card (NIC)
✔ Used to connect individual computers/devices to a network.
✔ NICs come in two distinct types:
✔ Wired: cards that have ports which allow network cables to be plugged in directly.
✔ Wireless: cards that connect to networks using Wi-Fi signals
3. Hubs
✔ Hubs are hardware devices that can have a number of other devices connected to them.
✔ They are used primarily to connect devices together to form a local area network (LAN),
often in the same building.
✔ A hub will take a data packet received at one of its ports and broadcast it to every device
connected to it.
4.Switches
✔ Switches are ‘intelligent’ versions of hubs.
✔ As with hubs, they connect a number of devices together to form a LAN.
✔ However, unlike a hub, a switch stores the MAC addresses of all devices on the network.
✔ Each port on the switch connected to a device will have a matching MAC address called
a look-up table.
✔ Using the look-up table, a switch matches the MAC address of an incoming data packet
arriving at one of its ports, and directs it to the correct device.
✔ switches are more secure than hubs - because only the intended device is sent the data
✔ Do not waste bandwidth -because network traffic is reduced.
In summary:
» Both a hub and a switch are used to connect devices in a LAN.
» Both hubs and switches use data packets.
» Hubs send data packets to every device on the network; whereas switches send data packets
to a specific device only.
» Security is lower with hubs than with switches
» A switch uses a look-up table to determine the destination device
» Switches use MAC addresses to locate the destination device.
5. Bridges
Bridges are devices that connect one LAN to another LAN that uses the same protocol.
They are often used to connect together different parts of a LAN so that they can function as a
single LAN.
Differences between bridges and routers.
Data loss
⮚ Actions from hackers gaining access to accounts or pharming attacks, for example could
lead to loss or corruption of data.
⮚ Users need to be certain that sufficient safeguards exist to overcome these potentially
very harmful risks
There are a number of reasons for adopting intranets rather than using the
internet:
✔ Intranets are safer because there is less chance of external hacking or viruses.
✔ It is easier to prevent external links to, for example, certain websites.
✔ Companies can ensure that the information available is specific to their internal
audience’s needs.
✔ It is easier to send out sensitive messages in the knowledge that they will remain within
the company.
✔ Intranets offer better bandwidth than the internet, therefore there are fewer connection
limits than with the internet.
Typical uses of an intranet would be:
✔ Viewing internal web pages (e.g. company, schools, university's etc.)
✔ Internal e-mail and instant messaging between workers
✔ Sharing of internal documents
Extranets allow intranets to be extended outside the organisation, but with the same advantages
as an intranet;
Extranet allows, for example, trading partners to have controlled access to some information
(commercially-sensitive information is password protected).
INTERNET
Internet is Public (available to all users)
o Internet is network of networks
o Internet is global
o Internet has more information than an intranet
3. Smart cards
The chip on the smart card can store data such as name, security number, sex, date of birth and a
PIN. Smart cards can therefore be used as a security device.
As the owner of the card walks up to a security gate, readers on either side of the gate quickly
scan the security data stored on the RFID tag embedded in the card. The user will then be invited
to enter a PIN on the keypad. If all details match, then access will be allowed.
4. Physical tokens
A physical token is a form of authentication in the form of a physical, solid object.
Physical tokens contain internal clocks and when a PIN and other authentication details are
entered, then a one-time password (OTP) is generated. The code changes on a regular basis and
is usually only valid for less than a minute.
Example of Physical Token Use:
A customer has logged on to the bank’s website. They get to a web page which requires some
form of authentication to prove who they are. To do this, they need to use a physical token
supplied by the bank:
✔ The customer inserts their debit card into the top of the token device (first authentication
step) and the device either recognizes the card as genuine or rejects it.
✔ The device then asks the customer to press ‘IDENTIFY’ and then enter their PIN (second
authentication step).
✔ A one-time password is then shown on the device screen – this is usually an eight-digit code.
✔ The customer now goes back to their bank web page and enters the eight-digit code.
✔ They are now given access to their account.
There are two types of physical tokens:
1. A disconnected physical token – this is the type described above, where a separate device is
used, requiring the user to key in data manually using a keypad
2. A connected physical token – this type of token transmits the generated one-time password
directly to a computer through a USB connection; the user does not need to manually enter data.
Electronic tokens
software (apps) installed on a user’s device (eg. smartphone)
When the website requests the user to authenticate who they are, the user opens the app on
their smartphone
OTP will be generated and sent to the phone and the user enters this OTP when prompted by
the website
both the website server and smartphone have synchronised clocks, they will generate the
same numbers.
Anti-virus
Allow all software and devices to be scanned for viruses
common features:
✔ check software or files before they are run
✔ compares a possible virus against a database of a known viruses
✔ carry out heuristic checking - types of behavior that could indicate a possible virus.
✔ Any possible files or programs which are infected are put into quarantine which:
– allows the virus to be automatically deleted, or
– allows the user to make the decision about deletion (it is possible that the
user knows that the file or program is not infected by a virus – this is known as a false
positive and is one of the drawbacks of anti-virus software)
✔ Needs to be kept up to date because new viruses are constantly being discovered.
✔ full system checks need to be carried out once a week
Video Conferencing
✔ Communication method that uses both video & sound
✔ Carried out in real-time
The basic hardware needed includes:
» Webcams
» Large monitors/television screens
» Microphones
» Speakers.
Software Needed
Few items to consider before a conference begins
✔ Agree on a time and date for the conference to take place.
✔ Delegates in each conference room must log into the video-conference.
✔ Set-up needs to be checked before the meeting goes live.
✔ Webcams need to be placed in the correct position so that all delegates are within visual
contact.
✔ Microphones need to be placed centrally so that all of the delegates can speak.
✔ One person to be the main contact in each conference room