Professional Documents
Culture Documents
Networks Part 2
Networks Part 2
Storage is in
accessing Stored at a hard
through network drive
connection
It is paid storage
that ask for Synchronized
upgrades and and updated
rent
Pros Cons
cloud services
If a device is lost, need a fast
damaged, or internet
stolen the files or connection
programs are still
safe
Sending
There are information over a
probability issues network always
when operating carries risks,
precaution such as
system is changed encryption are
taken
Bandwidth
Bandwidth is the amount
of data that can flow into a Unicast vs Multicast
network. In other words, Multicast allows a signal to
it’s be sent to multiple devices
the number of bits a at once. Unicast, on the
computer other hand, limits each
receives per second. transmission to a single
receiver.
Streaming
Buffering
TCP vs UDP When streaming, a computer
TCP and UDP are protocols for stores
transmitting data. Unlike UPD, a bit of data ahead of what is
TCP establishes a link between already playing. Buffering
computers, making it slower prevents
but more reliable and secure. irregular, jerky playback by
controlling the rate of live stre
Advantages Disadvantages
A good internet
Users don’t have to connection is
wait for a long needed throughout
download to finish. the streaming
process.
To watch a video
Streaming is
again, users have to
especially useful
start streaming
for mobile devices.
from scratch.
It helps prevent
It can end up
piracy as there are
costing more, as it
no
eats
files to copy and
up bandwidth.
paste.
If a provider
Content quality
decides to remove
can be adapted to
content,
the
it can’t be accessed
network speed.
again.
Worms Spyware
Similar to viruses, worms tag along Spyware is a general term
with legitimate downloads. They’re for any program that tracks
self-replicating and can spread data without permission.
through networks, often via Examples include keyloggers
automated email spam. Unlike (programs that track what keys
viruses, worms are stand-alone are pressed in order to gain
software. They don’t need human access to passwords and other
triggers and are only installed on information) or programs that copy
each computer once. browser history and Google searches.
Viruses
are tiny pieces of code that sneak in by
attaching themselves to pre-existing
files, such as email attachments. The Trojans
goal of a virus is to spread to as many
files on as many systems as possible.
They corrupt data and slow down
Malware Named after the Greek tale of
the Trojan Horse, a trojan is a
operating systems malicious program that looks
safe. Once downloaded, the
Rootkits
Rootkits hide inside an operating trojan installs its payload on
system. They gain root (administrator) the computer. This could be a
access to a computer and modify keylogger, a backdoor, or any
critical files, which can lower security
and let in other types of malware. As
number of malicious programs.
they hide inside operating systems,
they are difficult to detect and destroy.