AIN1501 - Study Unit - 12

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

S T U D Y U NIT 12

COMPONENTS OF
COMMUNICATION NETWORK

IN THIS STUDY UNIT

1 Introduction
A computer network, also referred to as a network, consists of two or more computers
or devices linked to one another by communication media, which facilitate
communication among these connected computers or devices. The purpose of networks
is to allow users to share resources, data and information, and to facilitate
communication. In this study unit, we will be looking at why computer networks are used,
as well as the various components of communication networks that enable
communication between the devices connected to the network (Booyse et al, 2017,
Unisa study guide).

2 Purpose of Communication Networks


Computer networks are used for various purposes:
➢ Facilitating communication: Networks enable people to communicate
efficiently and easily via e-mail, instant messaging, telephone, video
telephone calls, and video conferencing

➢ Sharing hardware: Networks enable computers connected to the network


to access and use hardware resources on the network, such as printing a
document on a shared network printer.

➢ Sharing files, data, and information: Networks enable authorised users to


access data and information stored on other computers in the network.
The ability to provide access to data and information on shared storage
devices is an important feature of many networks.

➢ Sharing software: Networks enable users to run application programs on


remote computers (Booyse et al, 2017, Unisa study guide).
Information preservation: Backups of information are shared and stored in multiple
locations for easy recovery if information is lost or corrupted in the case of a system
failure or as part of disaster recovery.

3 Components of Communication Networks


Components of communication networks include both the hardware and the software
needed to enable computer systems to communicate with one another. Refer to study
unit 4 to revise your understanding. In communication networks, a node is a connection
point. A physical network node is an active electronic device that is connected to a
network, which is capable of sending, receiving or forwarding information over a
communication medium (Booyse et al, 2017, Unisa study guide).

3.1 Communication media or channels

Communication media enable signals to move from one point to another. These
communication media or channels are either cables or antennae that transmit signals
from one location to another. Communication media can also be split between wired and
wireless transmission (Booyse et al, 2017, Unisa study guide).

3.2 Wired transmission

Wires and cabIes are media through which information can move from one network
device to another. The type of cable chosen for a network is related to the network’s
configuration (topology), protocol and size. Common wired mediums include

➢ twisted pair wire


➢ coaxial cable
➢ fibre optics
3.3 Wireless transmission

With wireless transmission, signals are broadcast as electromagnetic waves through


free air space. Wireless signals are transmitted by a transmitter and received by a
receiver. Wireless systems may be inexpensive because no wires need to be installed
to transmit the signal. Wireless transmissions are, however, susceptible to both
electromagnetic interference and physical interference. Common wireless media include
the following

❖ Microwave transmission
Microwave transmissions are high-frequency signals
sent through the air using earth-based transmitters and
receivers.

❖ Satellite transmission

Satellites use microwave radio to transmit


information and are capable of transmitting voice,
data and TV signals.

❖ Radio transmission

Radio transmissions are signals of electromagnetic waves,


which can travel through certain obstructions such as walls.
Radio transmissions can be used to transmit voice and data,
with both wireless LANs and cellular phones using radio
technology (Booyse et al, 2017, Unisa study guide).

❖ Infrared transmission

Signals in the form of light waves are transmitted through the air
between devices, requiring line of sight for transmitting within short
distances of less than a few hundred metres (Booyse et al, 2017, Unisa
study guide).

3.4 Specific hardware needed for communication

Networking hardware includes network interface cards, network cables or


communication mediums, switches and hubs, routers, modems, firewalls and other
related hardware needed for communication within a network.
➢ A network interface card (or network adapter) provides a physical
connection between the computer and the network cable or
communication medium.

➢ The communication medium or channel, as described in the previous


section, enables signals to move between locations.

➢ A switch or hub is a device that provides a central connection point for


cables from workstations, servers and peripherals. Switches are usually
active, which means that they electrically amplify the signal as it moves
from one device to another.

➢ A router translates information and allows communication from one


network to another. Routers choose the best path to transmit a signal,
based on the destination address and origin.

➢ Firewalls are the most important part of a network with respect to security.
Firewalls can be either hardware or software. A network system
implementing a firewall does not need human interaction for data transfer
monitoring, as automated processes to reject access requests from unsafe
sources and to allow actions from recognised sources, can be set up. With
the increase in cyberattacks to steal data, plant viruses,and so on, firewalls play
a very important role in network security (Booyse et al, 2017, Unisa study
guide).

Owing to improvements in wireless technology performance and technology becoming


more cost effective, current trends are to move from a wired to a wireless networking
environment. As discussed above, a wireless router is a router that includes the functions
of a wireless access point and a network switch. Such devices allow access to the internet
or a computer network without the need for a wired connection (Booyse et al, 2017,
Unisa study guide).
4 Dealing with Computer Network Intrusion

In this era of digital revolution, and the Internet of Things (IoT), technologies have
removed the digital barriers and accentuate the seamless exchange of data and
information among ubiquitous systems. Therefore, the challenge of information
theft, privacy, and confidentiality of data and information on the internet has become
a major dilemma for many users of several online platforms (Sarumi, Adetunmbi, &
Adetoye, 2020). The wireless technologies that are used to carry out public and
personal communication are vulnerable to various types of attacks, where attackers
can access signal to listen in or to cause damage on wireless networks (Intrusion
Detection and Prevention Systems in Wireless Networks, 2017). Network intrusion
detection systems are a viable approach to curb the menace of information theft
and other data security threats on the internet (Sarumi et al, 2020). According to
Duan, Wei, Fan, Yu & Hu (2020), Wi-Fi has been widely deployed to facilitate home
office, or even stadium-scale wireless access to the internet, and will be an
essential part of future wireless networks through being integrated with 5G cellular
networks. However, security threats are still a big concern for Wi-Fi due to the open-
share nature of the wireless medium and the easy access to Wi-Fi intrusion tools.
Therefore, these systems play a critical role in identifying attacks experienced in
order to apply further methods. According to Musa, Chakraborty, Abdullahi & Maini,
2021, computer networks are exposed to cyber-related attacks due to common
usage of the internet. As hackers become more prevalent and savvier, additional
tools to help protect network environment are needed. A key research issue in
securing networks is detecting intrusion. In 2008, Azad Tariq Bin stated that it helps
to recognise unauthorised usage and attack as a measure to ensure network
security. Intrusion detection is a strategy that is defined as the ability to monitor and
react to computer misuse. Many hardware and software products in the market
provide various levels of intrusion detection.

4.1 Intrusion detection technologies

The research in intrusion detection started in 1972 when James Anderson


published his report on the need for detection breaches in computer systems. Since
then, several monitoring systems such as Intrusion Detection systems (IDS),
Intrusion Prevention Systems (IPS), which are also called Intrusion, Detection, and
Prevention Systems (IDPS), have been proposed and implemented. IDPS
technology can be used to monitor and analyse signals for any infiltration to prevent
interception or other malicious intrusion. Consequently, several IDSs were
proposed by researchers (Musa et al, 2021).

Over the years, various works were evaluated on different databases for detecting
illicit or abnormal behaviour using IDS. This culminated in proposing various
approaches to determine the most effective features to enhance the efficiency of
IDSs. Methods include machine learning-based (ML), Bayesian-based algorithms,
and Markov neural network, among others (Musa et al, 2021). This work was used
to develop new and sophisticated detection and prevention methods based on and
managed by combining smart techniques, including machine learning, data mining,
and game theory, using risk analysis and assessment techniques. Their role is thus
assisting wireless networks to remain secure and aiding system administrators to
effectively monitor their systems (Musa et al, 2021).

As new attacks emerge daily, IDSs play a key role in identifying possible attacks to
the system and giving proper responses (S Sen, 2015). This makes intrusion
detection an indispensable part of a security system. IDSs should adapt to these
new attacks and attack strategies, and continually improve.

A c t i v i t y 12.1

Go to your e-tutor site and complete this activity.

Wireless transmissions are part of our daily lives. Examples include using your cell
phone to call a friend to arrange to watch a movie on Netflix.
What role does wireless transmission play in your daily life? Give at least ten
examples and explain each.

Sharing files, data, and information: Networks enable authorised users to access
data and information stored on other computers in the network. The ability to
provide access to data and information on shared storage devices is an important
feature of many networks.

Go to the Discussion Forum for study unit 12. From the perspective of study unit
6 (Big data), which you have already studied, particularly looking at features,
sources, and problems of big data, discuss the statement above with your fellow
students.

5 Summary

Computer networks allow communication and the sharing of resources (including


hardware, files, data and information), and enable software sharing and information
preservation. The components of communication networks include communication
media, specific hardware, data communication protocols, as well as software.

The next study unit deals with network configurations, including network topologies
and geographical scope. Distributed processing, client server systems and cloud
computing will also be discussed.

You might also like