NETWORKS, COMMUNICATIONS, & SAFEGUARDS

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1 Chapter One Introduction to Computer Networks and Data Communications.
Introduction to Computer Administration. Computer Network - Basic Concepts Computer Networks Computer Networks Communication Model Communication Model.
TYPES OF COMPUTER NETWORKS
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Connecting LANs, Backbone Networks, and Virtual LANs
1 Kingdom of Saudi Arabia Prince Norah Bint Abdul Rahman University College of Computer Since and Information System NET201.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Copyright©2008 N.AlJaffan®KSU1 Chapter 8 Communications and Networks.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Computer Networks IGCSE ICT Section 4.
Basic Data Communication
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
Chapter 9A Network Basics.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Chapter 4 Computer Networks – Part 1
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
Introductionto Networking Basics By Avinash Kulkarni.
Networking By Nachiket Agrawal 10DD.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
DATA COMMUNICATION. Data Communication Data communication is the transmission of data from one location to the other. Data can be sent in two ways: directly.
TYPES OF NETWORKS PROTOCOLS NETWORK CONFIGURATIONS /TOPOLOGIES TRANSMISSION MEDIA By B. Vialva.
Basic Concepts of a Computer Network
NETWORKS.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Living Online Module Lesson 23 — Networks and Telecommunication
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
Networks.
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Topic 5: Basic Security.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Transferring Data Around. Networks Is a series of computer systems that are linked together so that they are able to share computer power or storage facilities.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Data Communication Networks
Higher Computing Networking. Networking – Local Area Networks.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Unit Communication Hardware
Edited by : Noor Al-Hareqi
Intro to MIS – MGS351 Network Basics
INTRODUCTION TO COMPUTER NETWORKS
CHAPTER 1 INTRODUCTION NETWORKING
Network Basics Extended Learning Module E
Edited by : Noor Al-Hareqi
NETWORKS, COMMUNICATIONS, & SAFEGUARDS
INTRODUCTION TO COMPUTER NETWORKS
Chapter 4: Data Communication and Networks
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Edited by : Noor Al-Hareqi
Computer Networks Lesson 2.
By Hussein Alhashimi.
Presentation transcript:

NETWORKS, COMMUNICATIONS, & SAFEGUARDS 4 Chapter

Chapter Topics 6.1 From the Analog to the Digital Age 6.2 Networks 6.3 Cyberthreats, Hackers, & Safeguards

6.1 From the Analog to the Digital Age

Digital Analog Computers use digital signals—0s and 1s, off and on. All the data that a computer processes is a series of 0s and 1s. Each signal is a bit. Analog But most phenomena in life are analog. Analog signals use wave variations. Sound, light, and temperature are analog forms. Traditional TV and radio use analog signals. Humans’ vision operates in analog mode. But analog data can be converted into digital form. Even though digital data is not as exact as analog data, it is easier to manipulate.

For data transmission over telephone lines and cables, modems are needed to convert analog data into digital data that computers can use. Modem is short for modulate/demodulate. Modems modulate (convert) a computer’s digital data to analog data, transmit it, then demodulate (reconvert) it back to digital data for the receiving computer.

Converting Reality to Digital Form: Tape recorders, voices, and musical instruments are analog; CDs are digital To burn a CD, the digital recording equipment must convert from analog to digital

6.2 Networks

A network is a system of interconnected computers, telephones, and/or other communications devices that can communicate with one another and share data Benefits of Networks Share peripheral devices, such as printers, scanners, disk drives Share programs and data Better communications, including email Access to shared databases

Some disadvantages of networks: Expense: The initial set up cost of a computer network can be high depending on the number of computers to be connected and the number of connecting devices and NICs . Security Issues: If a computer is on a network, a computer hacker can get unauthorized access by using different tools. Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected, too. Dependency on the Main File Server: If the main file server of a computer network breaks down, the entire system can become useless.

Main types of networks A wide area network (WAN) is a communications network that covers a wide geographic area, such as a country or the world. The best example of a WAN is the Internet. A metropolitan area network (MAN) is a communications network covering a city or a suburb. Many cellphone systems are MANs. A local area network (LAN) connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together. Philadelphia network is an example of LAN. (continued)

How Networks Are Structured: 1. Client/Server Consists of clients, which are computers that request data, and servers, which are computers that supply data. 2. Peer-to-Peer (P2P) All computers on the network are “equal” and communicate directly with one another, without relying on servers

Intranets & Extranets: use the Internet as their base Intranets—use infrastructure and standards of the Internet and the web, but for an organization’s internal use only Extranets—similar to intranets but allows use by selected outside entities, such as suppliers

Network linking devices: Switch— A device that connects computers to a network; sends data only to intended recipients Bridge—Interface device that connects same type of networks Gateway—Interface device that connects dissimilar networks Router—Device that directs messages among several networks, wired and/or wireless Backbone—Main Internet highway that connects all networks in an organization; includes switches, gateways, routers, etc.

Network topologies: Bus, Ring, Star, Mesh Bus – all nodes are connected to a single wire or cable Ring – all nodes are connected in a continuous loop Star – all nodes are connected through a central host Mesh – messages sent to the destination can take any possible shortest, easiest route to reach its destination. There must be at least two paths to any individual computer to create a mesh network. (Wireless networks are often implemented as a mesh, and the Internet is a mesh.)

Bus Network

Ring Network

Star Network

Ethernet The Ethernet communications protocol is embedded in software and hardware devices intended for building a local area network (LAN), and it is commonly used in star topologies.

6.3 Cyberthreats, Hackers, & Safeguards

Problem: Internet was begun to foster collaboration among universities and scientists. They trusted one another. No security was built into the Internet. Problem: The Internet is open-access and is used by criminals who take advantage of the lack of built-in safeguards. Problem: Most people connect to the Internet and use their computers in LANs. All it takes is one computer on a LAN that has been compromised for all computers on it to be vulnerable to malware and other threats.

Cyberthreats Denial of Service Attacks Viruses Consist of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate users Used to target particular companies or individuals Viruses Deviant program that hides in a file or a program on a disk, flash memory drive, in an e-mail, or in a web link that causes unexpected effects such as destroying or corrupting data

Cyberthreats (continued) Trojan Horses Programs that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spyware Backdoors and spyware allow others to access your computer without your knowledge Worms A program that copies itself repeatedly into a computer’s memory or disk drive May copy itself so much it crashes the infected computer

Cyberthreats (continued) How they spread Via e-mail attachments By infected disks and flash drives By clicking on infiltrated websites By downloading infected files from websites From one infected PC on a LAN to another

Cybervillains Hackers are either Computer people who enjoy learning about programming and computers People who gain unauthorized access to computers or networks, often for fun or just to see if they can

Online Safety Use antivirus software, and keep it current Install a firewall to monitor network traffic and filter out undesirable types of traffic and undesirable sites Don’t use the same password for multiple sites Don’t give out any password information Use robust passwords: Minimum 8 characters with letters, numbers, characters 4cats is not a good password; f0UrK@tTz is safer

Online Safety (continued) Install antispyware software Back up your data, so if your PC is attacked and must be reformatted, you can restore your data Never download from a website you don’t trust Consider biometric authentication

Online Safety (continued) Biometrics: science of measuring individual body characteristics Used in security devices Examples; hands, fingerprints, iris recognition, face recognition, voice recognition Now available on laptops