data communication and networking fundamentals
TRANSCRIPT
-
7/29/2019 Data Communication and Networking Fundamentals
1/38
Introduction to IT Concepts
Labanan Subion Trillanes
Chapter Objectives:
At the end of the chapter, learners should be able to:
1. Know the basic network communication fundamentals.
2. Know the latest in network communication technology.
3. Know how to connect and share internet connectivity.
1. Know the different computer threats related to network communication.
BriefContent:
Lesson 1: Networking Fundamentals
a. Computer Networks
b. Structure of the OSI Model and Benefits
Lesson 2: Network Architecture
a. Decentralized and Centralized Network Architecture
b. Types of Networks
Lesson 3: Network Components
a. Networking Topologies
b. Networking Standards
c. Networking Devices and Equipments
Lesson 4: Wireless Networking and Broadband Technology
a. Wireless Networking Fundamentals
b. Broadband Technology Fundamentals
c. Types of Broadband Access
Lesson 5: Computer Security Issuesa. Computer Threats and Viruses
b. Computer Safeguards and Security Solutions
Chapter 2 Computer Networks and Security
-
7/29/2019 Data Communication and Networking Fundamentals
2/38
Introduction to IT Concepts
Labanan Subion Trillane
LESSON 1: NETWORKING FUNDAMENTALS
The history of computer networking
started in the advancement of telecommunication
systems. Calculations machine communication in
the earlier years was nearly impossible but in the
late 19th century, it was made possible by
ARPANET, the first operational network
developed by DARPA of the United States
Department of Defense. Today, computer
networking is the core of modern communication
system.
A. COMPUTER NETWORKA computer network is simply a connection between two or more computers that are
physically connected to one another so they may be able to communicate. Below is a summary of
the main functions of computer networking.
NETWORKING FUNCTIONS DESCRIPTION
Sharing of Resources Computer networking enables the sharing of resources such as
programs, applications and hardware devices which is effective to
reduce costs and also improves the efficiency of work.
Exchange of Information Computer networking enables the exchange of information where it ismade possible to exchange text and voice data, and multimedia
content such as videos and images.
In computer networking, it is important to consider the following:
Speed Cost Security
-
7/29/2019 Data Communication and Networking Fundamentals
3/38
Introduction to IT Concepts
Labanan Subion Trillane
Availability Scalability Reliability
B. THE STRUCTURE OF OPEN SYSTEM INTERCONNECT (OSI)
Figure 3.2.1-1: System Unit
The OSI (Open System Interconnect), is networking standard developed by the
International Standard Organization (ISO) that defines the interoperability and between devices
and software. The OSI model is used as a reference for teaching network communication conceptas shown in the figure. Below is a summary of the different layers of the OSI model and its
description.
OSI LAYER DESCRIPTION
[7] Application Layer that defines the syntax and language used by programs to communicate with
other programs in a computer system.
[6] Presentation Layer that manages the way data are represented and encoded when transmitted.
[5] Session Layer that provides communication coordination in an orderly manner in either one-wayor two-way communication.
[4] Transport Layer that is responsible for the validity and integrity of transmission.
[3] Network Layer that establishes the route between the sender and receiver.
[2] Data Link Layer that is responsible for the node-to-node validity and integrity of data transmission.
[1] Physical Layer that is responsible for passing data onto and receiving them from a connection
-
7/29/2019 Data Communication and Networking Fundamentals
4/38
Introduction to IT Concepts
Labanan Subion Trillane
ARPANET Advance Research Project Agency Network is the first
operational network developed by DARPA of theUnited States Department of Defense.
DARPA Defense Advance Research Project Agency is amilitary agency of United States Department ofDefense that fathered the development of Internetand computer networking.
Computer Network is simply a connection between two or morecomputers that are physically connected to oneanother so they may be able to communicate.
OSI (Open System Interconnect) is networking standard developed by the InternationalStandard Organization (ISO) that defines theinteroperability and between devices and software.
ISO (International Standard Organization) is the worlds largest organizing body that formulates,develops and publishes international standards.
1. The history of computer networking started in the advancement of telecommunication systems.
2. Calculations machine communication in the earlier years was nearly impossible but in the late 19 thcentury, it was made possible by ARPANET, the first operational network developed by DARPA ofthe United States Department of Defense.
3. A computer network is simply a connection between two or more computers that are physicallyconnected to one another so they may be able to communicate.
4. Computer Networking have to main functions namely Sharing of Resource (enables the sharingof resources such as programs, applications and hardware devices which is effective to reducecosts and also improves the efficiency of work.) and Exchange of Information (enables the
exchange of information where it is made possible to exchange text and voice data, and multimediacontent).
5. The OSI (Open System Interconnect), is networking standard developed by the InternationalStandard Organization (ISO) that defines the interoperability and between devices and software.
6. The OSI Model is subdivided into 7 Layers namely Application, Presentation, Session, Transport,Network, Data Link, and Physical Layer.
medium such as cables.
Terminologies to Remember:
Lesson Summary:
-
7/29/2019 Data Communication and Networking Fundamentals
5/38
Introduction to IT Concepts
Labanan Subion Trillane
LESSON 2: NETWORK ARCHITECTURE
Network Architecture is the overall design of
a communication network. It is a framework used to
specify the networks physical component, functional
configuration, operational principles and procedures.
Network architecture provides assistance or guidelines
used to implement high quality network communication
and also used to assist network activities such as
troubleshooting, security management, and disaster
recovery.
Network architectures are classified according to the way in which they are controlled and
manipulated. There are two ways to control and manipulate computers in a network, these are decentralized
or centralized.
A. DECENTRALIZED AND CENTRALIZED NETWORK ARCHITECTURE
DECENTRALIZED ARCITECTURE
A type of network architecture that directly communicates with every other node in a
computer network. P2P (Peer-to-Peer) is an example of this type of network architecture. P2P
refers to a computer network that allows sharing of resources and information without a central
server. Computers connected in P2P can act as a client or server for the other computers in a
network.
Figure 3.2.2-1: Peer-to-Peer Network
ADVANTAGES DISADVANTAGES
Less Expense No central repository
Easy Setup No Security
Independence
-
7/29/2019 Data Communication and Networking Fundamentals
6/38
Introduction to IT Concepts
Labanan Subion Trillane
CENTRALIZED ARCHITECTURE
A type of network architecture that provides central network control and allows user to
simultaneously share the same resources available from it central repository called the server.
There are two important roles in centralized computer network architecture; these are the
client and the server. Client(s) are individual workstations used to accomplish task and
specific requests by the user. A Serveris a computer that provides information or resources to
the client computers on the network. An example of this kind of networking architecture is the
Internet. Once the user connects to the Internet through its workstation by using a web
browser, it is functioning as a client computer. Once connected, the server, serves up
information displayed in your browser.
Figure 3.2.2-2: Centralized Network
B. TYPES OF NETWORKS
Network architectures can also be classified according to the way they are connected and
the range of its coverage. Below are the other types of network architectures.
LAN (LOCAL AREA NETWORK)
Characteristics:
A computer network that is mostly confined to
a single building or group of buildings.
Uses Peer-to-Peer or Client-Server
architecture. Can be wired or wireless.
Capable of transmitting data at very fast rates
compare to WAN.
Figure 3.2.2-3: Local Area Network
ADVANTAGES DISADVANTAGES
Centralized Expense
Scalability Maintenance
Flexibility Dependence
Interoperability
Accessibility
-
7/29/2019 Data Communication and Networking Fundamentals
7/38
Introduction to IT Concepts
Labanan Subion Trillane
WAN (WIDE AREA NETWORK)
Characteristics:
A computer network that spans a large
geographical area.
Consists of two or more LANs.
Uses routers and public communication links.
Mostly built by particular private organizations
or ISPs.
The biggest WAN example is the Internet.
Figure 3.2.2-4: Wide Area Network
PAN (PERSONAL AREA NETWORK)
Characteristics:Is a computer network used for communication
among computer devices which are close to one person
such as mobile phones and personal digital assistants
(PDA). Personal Area Network may be wired (using
USB cables) and wireless (using IrDA or Bluetooth
technology).
Figure 3.2.2-5: Personal Area Network
MAN (METROPOLITAN AREA NETWORK)
Characteristics:
Is a computer network that cover a broader
geographical area for communication often uses
transmission facilities provided by telephone
companies.
Figure 3.2.2-6: Metropolitan Area Network
CAN (CAMPUS AREA NETWORK)
A type of computer network that connects two or more LANs limited to a specific
geographical area such as college campus or industrial complex.
-
7/29/2019 Data Communication and Networking Fundamentals
8/38
Introduction to IT Concepts
Labanan Subion Trillane
Network Architecture is the overall design of a communication network. It isa framework used to specify the networks physicalcomponent, functional configuration, operational
principles and procedures.
P2P (Peer-to-Peer) refers to a computer network that allows sharing ofresources and information without a central server.
Client(s) in computer networks are individual workstations usedto accomplish task and specific requests by the user.
Server is a computer that provides information or resourcesto the client computers on the network.
LAN (LOCAL AREA NETWORK) is a computer network that is mostly confined to a
single building or group of buildings. Also refers tocomputer network.
WAN (WIDE AREA NETWORK) is a computer network that spans a largegeographical area usually consisting of two or moreLANs.
PAN (PERSONAL AREA NETWORK) is a computer network used for communicationamong computer devices which are close to oneperson such as mobile phones and personal digitalassistants (PDA).
PDA (PERSONAL DIGITAL ASSISTANT) is a mobile device that functions as personalinformation management device.
MAN (METROPOLITAN AREA NETWORK) is a computer network that cover a broadergeographical area for communication often usestransmission facilities provided by telephonecompanies.
CAN (CAMPUS AREA NETWORK) is type of computer network that connects two ormore LANs limited to a specific geographical areasuch as college campus or industrial complex.
Terminologies to Remember:
-
7/29/2019 Data Communication and Networking Fundamentals
9/38
Introduction to IT Concepts
Labanan Subion Trillane
1. Network Architecture is the overall design of a communication network. It is a framework used tospecify the networks physical component, functional configuration, operational principles andprocedures.
2. Network architecture provides assistance or guidelines used to implement high quality networkcommunication and also used to assist network activities such as troubleshooting, securitymanagement, and disaster recovery.
3. Network architectures are classified according to the way such as Decentralized Network (A typeof network architecture that directly communicates with every other node in a computer networkthat allows sharing of resources and information without a central server.) and CentralizedNetwork (A type of network architecture that provides central network control and allows user tosimultaneously share the same resources available from it central repository called the server.) inwhich they are controlled and manipulated.
4. Centralized Network architecture have two major component, the Client (are individualworkstations used to accomplish task and specific requests by the user) and the Server (acomputer that provides information or resources to the client computers on the network).
5. Computer Network architecture can also be classified according to its range or geographicalcoverage of communication such LAN (Local Area Network), MAN (Metropolitan AreaNetwork), PAN (Personal Area Network), CAN (Campus Area Network) and WAN (Wide AreaNetwork).
6. Local Area Network is computer network that is mostly confined to a single building or group ofbuildings. Can be wired or wireless and Capable of transmitting data at very fast rates compare toWAN. A typical setup of this network is used in homes and offices.
7. Metropolitan Area Network is a computer network that cover a broader geographical area forcommunication often uses transmission facilities provided by telephone companies. A typical setupfor this network is used in branch offices.
8. Personal Area Network is a computer network used for communication among computer deviceswhich are close to one person such as mobile phones and personal digital assistants (PDA).Personal Area Network may be wired (using USB cables) and wireless (using IrDA or Bluetoothtechnology). A typical setup of this network is used for short distance sharing and exchanging ofinformation such as photo sharing.
9. Campus Area Network is a type of computer network that connects two or more LANs limited to a
specific geographical area such as college campus or industrial complex.
10. Wide Area Network is a type of computer network that spans a large geographical area consistingof two or more LANs. It uses routers and public communication links mostly built by particularprivate organizations or ISPs. A typical setup of this network is the Internet.
Lesson Summary:
-
7/29/2019 Data Communication and Networking Fundamentals
10/38
Introduction to IT Concepts
Labanan Subion Trillane
LESSON 3: NETWORK COMPONENTS
In order to fully build a high quality computer network, it is necessary to understand the different
networking components such as networking equipments and devices, transmission media and network
connections.
A. NETWORKING TOPOLOGY
Topology in network communication is the layout or pattern on how computer are interconnected
to each other. Computers connected in a network can be physically (how computers are connected) or
logically (method used to pass information) patterned using topology.
BUS
A type of computer network topology in
which client devices or computers are
connected via a shared communication line
called bus.
Figure 3.2.3-1: Bus Topology Architecture
Advantage(s):
Failure of one device does not affect the overall network.
Allows a high rate of data transmission.
Easy to implement and extend.
Disadvantage(s):
Limited cable length and number of devices can be handled.
Performance of data transmission is degraded when new devices are attached. A break in cable (bus) can disable the entire network.
-
7/29/2019 Data Communication and Networking Fundamentals
11/38
Introduction to IT Concepts
Labanan Subion Trillane
STAR
A type of computer network topology in
which devices and client computers are
connected to a line concentration devices
called hub or switch. This network
architecture is commonly used in home or
office networking.
Figure 3.2.3-2: Star Topology Architecture
Advantage(s):
Problems can easily be identified and troubleshoot.
Easy to implement, manage and extend.
Disadvantage(s):
Fully dependent on a concentration device.
Requires more cable length and may lessen the performance if cable lengths are
long.
Expensive due to the use of concentration devices.
RINGA type of computer network topology in
which devices and client computers are
connected on a single path of transmission
forming a ring.
s
sFigure 3.2.3-3: Ring Topology Architecture
Advantage(s):
Performs better under a high network load.
Disadvantage(s):
One malfunction device or workstation can disable the entire network
-
7/29/2019 Data Communication and Networking Fundamentals
12/38
Introduction to IT Concepts
Labanan Subion Trillane
MESH
A type of computer network topology that is
a combination of a ring and a star topology
but does not have any concentration
devices attached. The Internet works
employs the Mesh Topology. Data can
travel in the shortest and easiest route to
reach its destination.
Figure 3.2.3-4: Mesh Topology Architecture
Advantage(s):
Can be expanded without disruption to current user in the network.Disadvantage(s):
Requires more cables than other topologies.
Implementation is complicated.
TREE
A type of computer network topology that is a full
combination of bus and star topology which branch
out the network in many ways. This type of networkarchitecture helps a branch or office to identify its
relevant system in their own network and yet
connected to a bigger network.
Figure 3.2.3-5: Tree Topology Architecture
Advantage(s):
All devices or client computer can access to the larger and their immediate network.
Topology commonly used in branched out networks.
Supported by network and hardware vendors.
Disadvantage(s):
Difficult to configure and Implementation is complicated.
Dependent on the trunk called Backbone.
-
7/29/2019 Data Communication and Networking Fundamentals
13/38
Introduction to IT Concepts
Labanan Subion Trillane
B. NETWORKING STANDARDS
There are various networking standard developed by IEEE and ISO each specifying a
certain a type of network cable, topology and access control to used in designing and implementing
network communication. Ethernet is the common networking standard.
ETHERNET Standards
Ethernet is the most popular international standard specification for computer networking.
It was jointly developed and formulated by DEC, Intel, Xerox and the IEEE Committee. Below
is a table that summarizes the different types of Ethernet Standards.
Type Standards Speed Length Topology Cable Application
Ethernet
10BASE5 10Mbps 500m BusCoaxial
(10mm)Connects
computers10BASE2 10Mbps 185m BusCoaxial
(5mm)
10BASE-T 10Mbps 100m Star Twisted-Pair
FastEthernet 100BASE-TX 100Mbps 100m Star Twisted-Pair Connects
high-speed
computers100BASE-FX 100Mbps 2km Star Fiber Optic
GigabitEthernet
1000BASE-T 1000Mbps 100m Star Twisted-Pair
Backbone
1000BASE-CX 1000Mbps 25m Star Twisted-Pair
1000BASE-LX
1000Mbps 550m
Star
Multi-Mode
Fiber Optic
1000Mbps 5kmSingle-Mode
Fiber Optic
1000BASE-SX 1000Mbps 550m Star
Multi-Mode
Fiber Optic
Due to the recent demand for increase in network capacity and speed in handling more
data such as voice and image, Fast Ethernet and Gigabit Ethernet Standards are being used
for faster performance and faster speed.
-
7/29/2019 Data Communication and Networking Fundamentals
14/38
Introduction to IT Concepts
Labanan Subion Trillane
OTHER NETWORK STANDARDS
StandardsStandards
Organization
Transmission
Media
Speed Characteristics
FDDI
(FiberDistributedDataInterface)
ANSI
(America
National
Standard
Institute)
Fiber Optic Cable 100Mbps
A dual ring
topology that is
capable of
communicating
even if there are
interruptions in the
network cable.
WirelessNetworking
IEEE 802.11
CommitteeRadio Waves 1-540Mbps
A standard for
wireless
communication
providing freedom
of movement.
Figure 3.2.3-7: FDDI Patch cord
Figure 3.2.3-6: An FDDI Structure
-
7/29/2019 Data Communication and Networking Fundamentals
15/38
Introduction to IT Concepts
Labanan Subion Trillane
C. NETWORKING DEVICES AND EQUIPMENTS
Network equipments and devices required to build a computer network is summarized
below.
Equipments Image Characteristics
LAN Boards
(Transceivers)
An expansion card or adapter card that is used
for connecting personal computer to a
network. It is also known as the LAN Card or
the NIC (Network Interface Card).
Relay Devices
A network communication device used
primarily to expand the network coverage of
computer networks.
Cables
A transmission media used for connecting
computers and equipment that connects to a
LAN.
NIC (Network Interface Card)
Network Adapters are devices connected to or installed in network nodes that enable the
nodes to communicate with each other and to access the network. Some network adapters
take the form of external devices that plug into an available USB port and other network
adapters are installed inside computers and peripherals as expansion cards. These adapters
are referred to as network interface cards (NICs).
-
7/29/2019 Data Communication and Networking Fundamentals
16/38
Introduction to IT Concepts
Labanan Subion Trillane
RELAY DEVICES
Relay Devices are devices used mainly to expand the network. It helps data flow possible
in the entire network. Below is a summary of the various types of relay devices.
Device Image Networking Symbol Characteristics
Hub
A device that is a common
connection point for devices in a
network.
Repeater
A device that is used to replicate
and regenerate signals, and extend
the range of the network beyond the
allowable length of transmission
media.
Switch
A device that is used to filter and
forward data packets between
transmission media.
Bridge
A device that is used to connect two
or more networks having two the
same transmission media in the
same network.
Router
A device that is used to forward data
packets along networks.
-
7/29/2019 Data Communication and Networking Fundamentals
17/38
Introduction to IT Concepts
Labanan Subion Trillane
HUB
o A common connection point for devices in a network.
o Works at Physical Layer of the OSI Layer.
o Broadcasts a packet once arrived at one port.
o Broadcast feature causes network congestion.
o In reality, hub is a repeater with multiple ports.
Advantages:
Cheap
Can connect different media types.
Disadvantages:
Extends the collision domain.
Cannot filter information.
Broadcasts packets to all connected segments.
REPEATER
o A network device used to regenerate or replicate a signal.
o Works at Physical Layer of the OSI Layer.
o Allows the connection of network segments.
o Extends the network beyond the maximum length of a single segment.
o Connects segments of the same network, even if they use different media.
o Relays messages to its original quality.
Advantages:
Can connect different types of media.
Can extend a network in terms of distance.
Does not increase network traffic.
Disadvantages:
Extends the collision domain. Cannot filter data.
Cannot connect different network architecture.
Limited number only can be used in network.
-
7/29/2019 Data Communication and Networking Fundamentals
18/38
Introduction to IT Concepts
Labanan Subion Trillane
SWITCH
o A device that filters and forwards packets between LAN segments.
o Works at Data Link Layer and sometimes at the Network Layer of the OSI Layer.
o Supports any packet protocol.
o Acts like a Hub, but filters like a Bridge.
o Keeps track of MAC Addresses of all attached devices.
Advantages:
Limits the collision domain.
Can provide bridging.
Can be configured to limit broadcast domains.
Disadvantages:
More expensive than a Hub or a Bridge.
Configuration of additional functions can be very complex.
BRIDGE
o A device that connects two LANs, or two segments of the same LAN.
o Works at Data Link Layer of the OSI Layer.
o Filters packets. Does not forward packets right away by examining the MAC
Address.
o Forwards packets whose destination address is on a different segment from its
own.
o Divides a network into multiple collisions, so reducing the number of collisions.
o Uses a Spanning Tree Protocol to decide whether to pass a packet on to a
different network segment.
Advantages:
Limits collision domain.
Can extend network distances. Can connect to different types of media and architectures.
Disadvantages:
Broadcast packets cannot be filtered.
More expensive than a repeater.
Slower than a repeater due to additional processing of packets.
-
7/29/2019 Data Communication and Networking Fundamentals
19/38
Introduction to IT Concepts
Labanan Subion Trillane
ROUTER
o A device that forwards packets along networks.
o Works at Network Layer of the OSI Layer in an intelligent manner.
o Connects two or more networks (e.g. LANs, MANs, WANs, ISPs).
o Located at gateway or could be the gateway itself.
o Serves as NAT/Firewall for the network.
o Uses headers and forwarding tables to determine the best path for forwarding
the packets.
o Uses protocols to communicate with other.
Advantages:
Limits collision domain.
Can function in LAN or WAN.
Connects differing media and architectures.
Can determine the best path for packets.
Can filter broadcast.
Disadvantages:
Expensive
Must use routable protocols.
Can be difficult to configure its routing.
Slower than a Bridge.
CABLES
All network nodes (computers and peripherals) are connected to each other and to
the network by transmission media. A transmission medium establishes a communications
channel between the nodes on a network and can take several forms:
1. Networks can use existing wiring to connect nodes.2. Wireless networks use radio waves instead of wires or cable to connect nodes.
-
7/29/2019 Data Communication and Networking Fundamentals
20/38
Introduction to IT Concepts
Labanan Subion Trillane
In order for computers and peripheral devices to be connected in a computer network,
network cables are being utilized. Below is a summary of the several types of transmission
media.
Transmission
Media Image Characteristics
CoaxialCable
A cable that is composed of copper core
surrounded by an insulating layer. This
type of cable is resistant to external
noise.
Twisted-PairCable
A cable that is composed of several
pairs of copper cores and are twisted inpairs.
Fiber
OpticCable
A cable that is composed of quartz glass
or plastic fiber, which makes the cable
thin and lightweight. This type of cable
can transmit signals without
deterioration. It supports a wider rangeof transmission speed ranging from
10Mbps to 1Gbps.
RadioWaves
A transmission media that uses radio
waves to transmit and receive data
packets used in wireless networking
technology.
-
7/29/2019 Data Communication and Networking Fundamentals
21/38
Introduction to IT Concepts
Labanan Subion Trillane
Topology is the layout or pattern on how computer areinterconnected to each other.
Bus is a form of communication line used for exchangingdata. It also refers to the path of transmission.
Star is a type of computer network topology in whichdevices and client computers are connected to lineconcentration devices
Ring is a type of computer network topology in whichdevices and client computers are connected on asingle path of transmission forming a ring
Mesh is a type of computer network topology that is a
combination of a ring and a star topology but does nothave any concentration devices attached
Tree is a type of computer network topology that is a fullcombination of bus and star topology which branchout the network in many ways.
Backbone is a part of computer networking infrastructure used toprovide connection between workstations of differentnetworks.
IEEE Institute of Electrical and Electronics Engineer is a
non-profit association that develops, formulate andestablish electronic standards.
ANSI (America National Standard Institute) non-profit organization that develops, formulate andestablish consensus standards
Ethernet is the most popular international standardspecification for computer networking
FDDI (Fiber Distributed Data Interface) is a networking standard that uses fiber optic cablesfor data transmission.
Network Adapters are devices that enable the nodes to communicatewith each. These adapters are referred to as networkinterface cards (NICs).
Relay Devices are devices used mainly to expand the network. Ithelps data flow possible in the entire network.
Terminologies to Remember:
-
7/29/2019 Data Communication and Networking Fundamentals
22/38
Introduction to IT Concepts
Labanan Subion Trillane
1. Topology in network communication is the layout or pattern on how computer are interconnectedto each other. Computers connected in a network can be physically (how computers areconnected) or logically (method used to pass information) patterned using topology.
2. Basic Computer Topologies are Bus (client devices or computers are connected via a sharedcommunication line), Star (devices and client computers are connected to a line concentrationdevices), Ring (devices and client computers are connected on a single path of transmissionforming a ring), Mesh (is a combination of a ring and a star topology but does not have anyconcentration devices attached) and Tree (is a full combination of bus and star topology whichbranch out the network in many ways).
3. Networking standard developed by IEEE and ISO specifies a certain a type of network cable,topology and access control to be used in designing and implementing network communication.
4. Ethernet is the most popular international standard specification for computer networking. It was
jointly developed and formulated by DEC, Intel, Xerox and the IEEE Committee. Ethernet havethree standards which determine the transmission speed of networking namely the Ethernet, FastEthernet and Gigabit Ethernet.
5. Other networking standards are the FDDI (Fiber Distributed Data Interface - topology that iscapable of communicating even if there are interruptions in the network cable) and WirelessNetworking (standard for wireless communication providing freedom of movement).
6. Network communication equipments and devices required to build a computer network are LANBoards (devices connected to or installed in network nodes that is used to communicate), RelayDevices (devices used mainly to expand the network and helps data flow possible in the entirenetwork) and Cables or Transmission Medium (transmission medium or channel used to
establishes a communications between the nodes in a network and can take several forms).
7. Relay Devices are devices used mainly to expand the network. These devices are Hub (devicethat is a common connection point for devices in a network), Switch (device that is used to filterand forward data packets between transmission media), Bridge (device that is used to connect twoor more networks having two the same transmission media in the same network), Routers (devicethat is used to forward data packets along networks) and Repeaters (device that is used to extendthe range of data transmission).
8. Transmission Medium is a channel used for connecting devices or peripherals to establishnetwork communication. The common transmission medium are the following, Coaxial (cable thatis composed of copper core surrounded by an insulating layer which is resistant to external noise),
Twisted-Pair (cable that is composed of several pairs of copper cores and are twisted in pairstypically used in LANs), Fiber Optics (cable that is composed of quartz glass or plastic fiber thatsupports wider range of transmission speed) and Radio Waves (transmission media that usesradio waves to transmit and receive data packets used in wireless networking technology).
Lesson Summary:
-
7/29/2019 Data Communication and Networking Fundamentals
23/38
Introduction to IT Concepts
Labanan Subion Trillane
LESSON 4: WIRELESS AND BROADBAND TECHNOLOGY
Over the recent years in the advancement oftelecommunication system, Wireless communication hadplayed a vital role in the means of transmitting data in a long
range coverage that are impossible to implement with the useof wires or cables. Wireless technology enabled us to shareinformation and resources in a wider range.
In this lesson, wireless and broadband technologywill be discussed including its fundamentals and the basicapplications of wireless and broadband technology.
A. WIRELESS NETWORKING FUNDAMENTALS
Wireless Fidelity, or Wi-Fi, is a brand namelicensed by the Wi-Fi Alliance to describe wireless LANS(WLAN) based on the IEEE 802.11 family of specifications.
Wi-Fi was developed as a method for mobiledevices, such as laptops and personal digital assistants(PDAs), to connect to corporate LANS or the public Internet.Wi-Fi also allows connectivity in peer-to-peer mode, whichenables devices to connect directly with each other. Inpractice, Wi-Fi provides a wireless bridge to Ethernet LANs
and the public Internet.
Basic Wi-Fi Operation
A Wi-Fi network contains one or more Access Points (APs). The area in which clients arein range of the radio signal of the APs is commonly called a hotspot. APs are identified by clientsby their Service Set Identifier (SSID), which is periodically broadcast by the AP. A client initiates aconnection with the AP, which may or may not be accepted depending upon what connectioncriteria have been set. Various degrees of security and encryption can be used over the wirelessconnection. Most APs serve as bridges to an Ethernet LAN, converting Ethernet frames to 802.11frames for transmission over the radio.
Figure 3.2.4-1: Basic Wireless LAN Structure
-
7/29/2019 Data Communication and Networking Fundamentals
24/38
Introduction to IT Concepts
Labanan Subion Trillane
WLAN Topologies
Below is a summary of the Wireless LAN Topology.
WLAN Standards
Below is a summary of the Wireless LAN Standards.
Topology Image Characteristics
AdHoc
Also referred to as Peer-To-Peer
Mode or Independent Basic Service
Set (IBSS).
Wireless devices communicate
directly with each other.
Doesnt use Access Points.
Useful for establishing a network
where wireless infrastructure does
not exist or where services are not
required
Infrastructure
An Access Point is present for
wireless devices to communicate
with each other referred to as a
Basic Service Set (BSS).
Two or more BSSs that form a
single subnetwork is called an
Extended Service Set (ESS)
Standard Frequency Speed Security Pros, Cons and Characteristics
IEEE
802.11
2.4 GHZ 1 - 2 Mbps WEP, WPA Specifications have been extended
to 802.11b.
-
7/29/2019 Data Communication and Networking Fundamentals
25/38
Introduction to IT Concepts
Labanan Subion Trillane
IEEE802.11a
5 GHZ 25 - 54 Mbps WEP, WPA -8 available channels
-Less potential RF Interference
-Supports multimedia voice, videoand large image application better
than 802.11b
-Shorter range than 802.11b
-Not interoperable with 802.11bIEEE802.11b
2.4 GHz 5 - 11 Mbps WEP, WPA -Not interoperable with 802.11a
-Requires fewer APs than 802.11afor coverage of large area.
-High speed access to data at up to300 ft. from AP
-14 available channels, 11 channelscan be used in the US due to FCCregulation
-3 non-overlapping channels
IEEE802.11g
2.4 GHz 25 - 54 Mbps WEP, WPA -Improve security enhancementsover 802.11
-Compatible with 802.11b
-14 available channels, 11 channelscan be used in the US due to FCCregulation
-3 non-overlapping channels
IEEE802.11n
2.4 GHZ Up to 200Mbps
WEP, WPA -Compatible with 802.11b and802.11g but less throughput
-Uses technology known as MIMO
-Do Spatial Multiplexing techniquefor increased data throughput
Supports multimedia voice, videoand large image application betterthan any 802.11x device
-
7/29/2019 Data Communication and Networking Fundamentals
26/38
Introduction to IT Concepts
Labanan Subion Trillane
Advanced WLAN Standards
IEEE 802.11f - Inter Access Point Protocol
The protocol is designed for theenforcement of unique association
throughout an Extended Service Set andfor secure exchange of station's securitycontext between the current AP and thenew AP during the handoff period.
Figure 3.2.4-2: IEEE 802.11f Structure
IEEE 802.11e Wireless Multimedia
It offers quality of service (QoS)
features, including the prioritization of data,voice, and video transmissions.
802.11 is an IEEE standard thatallows devices such as laptop computersor cellular phones to join a wireless LANwidely used in the home, office and somecommercial establishments.
Figure 3.2.4-3: Wireless Multimedia Structure
WLAN Basic Requirements
The following are the basic wireless components used to build and setup a wirelesscommunication network.
A wireless LAN Card or wireless PCMCIA for workstations An Access Point A good wireless link or signal Security
Figure 3.2.4-4: Wireless Network Devices
-
7/29/2019 Data Communication and Networking Fundamentals
27/38
Introduction to IT Concepts
Labanan Subion Trillane
Factors Affecting the WLAN Range
Although access points can transmit signals up to 60 feet away in an area with manywalled barriers or as much as 500 feet away in a large open area, the range is affected by thefollowing factors:
Building materials such as steel and drywall can shorten the range of the radio signals. Physical layout of the area can interfere with the signals and cause them to be dropped. Electronic noise from cell phones, microwave ovens, or other devices on the same
frequency can interfere with the transmission of the signals. Range is inversely proportional to data rate, so the faster that the signals are sent, the
less distance they will travel.
B. BROADBAND TECHNOLOGY FUNDAMENTALS
Definitions:
It is a fast connection to the Internet that is always on.
It means sending and receiving data and information of up to 40X faster than a standarddial-up connection.
It is the Information Superhighway. High quality audio and video are possible unlike in dial-up connection.
Figure 3.2.4-5: Wireless Broadband Technology
Benefits of Broadband Technology
Broadband technology offers a wide range of benefits as listed below.
Benefits
Increase usage of the Internet.
Enhances businesses.
-
7/29/2019 Data Communication and Networking Fundamentals
28/38
Introduction to IT Concepts
Labanan Subion Trillane
Promotes the development of Information Technology companies.
Facilitates E-Government.
Encourages telecommuting.
Enriches education and integrated learning.
Promotes tourism.
Allows teleconferencing.
Permits telemedicine.
Stimulates E-Commerce.
Allows entertainment and other creative content.
Makes more accessible the vast amount of information and media
content on the Internet.
-
7/29/2019 Data Communication and Networking Fundamentals
29/38
Introduction to IT Concepts
Labanan Subion Trillane
C. TYPES OF WIRELESS BROADBAND ACCESS
Below is a summary of the wireless broadband architecture and its characteristics.
WIRED BROADBAND ACCESS
DSL (Digital Subscriber Line)
Works by splitting existingtelephone line signal into two (voiceand data) Mostly asymmetric Mostly up to 1.5 Mbps but canoffer up to 8 Mbps Distance-sensitive therefore notavailable everywhere
Cable
Works by splitting existing cableline signal into two (video and data) Internet speed is just like DSL mostly bundled with cable TVservice though not distant sensitive, butlimited on areas cover
Fiber Optics
higherbandwidth is offered compare to DSL or Cable less susceptible to interference Thinner and lighter Data can be transmitted digitally
BPL (Broadband Power Line) or Power Line Internet
Internet transmitted over utility power lines. Two main categories: In-house and
Access From 256 Kbps to 2.7 Mbps speedon In-house.
-
7/29/2019 Data Communication and Networking Fundamentals
30/38
Introduction to IT Concepts
Labanan Subion Trillane
WIRELESS BROADBAND ACCESS
Satellite
Location sensitive Currently, it is slower in both uplink and downlink
Viable option for remote areas
3G (Third Generation)
Works in wireless air interfaces Mobile Internet connection Up to 384 Kbps when stationary or moving inpedestrian speed, up to 128 Kbps when in car,and up to 2 Mbps in fixed application
Wi-Fi (Wireless Fidelity) For laptops with wireless cards, PDAs, etc.
Works in 2.4 GHz and 5 GHz carrier Several standards are implemented Prone to interference
Fixed Wireless
Situated in fixed location (home or office) Also uses 2.4 GHz and 5 GHz carrier frequency Point-to-point transmission uses air as medium Does not require satellite feeds or local phoneservice Cheap, fast Internet and multimedia access through radio links
WiMAX (Worldwide Interoperability for Microwave Access)
Based on IEEE 802.16 standard, alsocalled Wireless MAN. Types of WiMAX: 802.16-2004 (fixedWiMAX) and 802.16-2005 (mobile WiMAX) Maximum bandwidth to offer is 70 Mb Bandwidth throughput depends ondistance (50 km is the maximum)
-
7/29/2019 Data Communication and Networking Fundamentals
31/38
Introduction to IT Concepts
Labanan Subion Trillane
Wireless Fidelity (Wi-Fi) was developed as a method for mobile devices, suchas laptops and personal digital assistants (PDAs), toconnect to corporate LANS or the public Internet.
APs (Access Point) is a device used wireless network managementusually a router with wireless capability.
Hotspot is the area in which clients are in range of the radiosignal of the APs.
SSID (Service Set Identifier) are identifier used access point used to identifywireless device
WLAN (Wireless LAN) is a wireless network infrastructure for connectingvarious wireless enabled devices.
Ad Hoc is a wireless network topology for connecting twowireless devices usually in P2P.
Infrastructure is a wireless networking topology used for connectingtwo or more wireless enabled device.
DSL (Digital Subscriber Line) is a type of wired broadband access usually offeredby telephone companies.
BPL (Broadband Power Line) is a type of wired broadband access using electricpower line to provide internet connectivity and
networking capability.
3G (Third Generation) is a type of wireless broadband access provided bymobile phone carriers for internet connectivity.
Fixed Wireless is a type of wireless broadband access provided bymobile phone carriers for internet connectivity using afixed antenna.
WiMAX Worldwide Interoperability for Microwave Access is atype of wireless broadband access used mostly inlarge geographical area also referred as wireless
MAN.
Terminologies to Remember:
-
7/29/2019 Data Communication and Networking Fundamentals
32/38
Introduction to IT Concepts
Labanan Subion Trillane
1. Over the recent years in the advancement of telecommunication system, Wireless communicationhad played a vital role in the means of transmitting data in a long range coverage that areimpossible to implement with the use of wires or cables.
2. Wireless Fidelity, orWi-Fi, is a brand name licensed by the Wi-Fi Alliance to describe wirelessLANS (WLAN) based on the IEEE 802.11 family of specifications. Wi-Fi was developed as amethod for mobile devices, such as laptops and personal digital assistants (PDAs), to connect tocorporate LANS or the public Internet.
3. A Wi-Fi network contains one or more Access Points (APs). The area in which clients are in rangeof the radio signal of the APs is commonly called a hotspot. APs are identified by clients by theirService Set Identifier(SSID), which is periodically broadcast by the AP.
4. Wireless networking can be categorized into two topology namely the Ad Hoc (wireless networktopology for connecting two wireless devices usually in P2P) and Infrastructure (wireless
networking topology used for connecting two or more wireless enabled device).
5. Networking Standards used in wireless LAN are IEEE802.11 (1 - 2 Mbps), IEEE802.11a (25 - 54Mbps), IEEE802.11b (5 - 11 Mbps), IEEE802.11g (25 - 54 Mbps), IEEE802.11n (Up to 200 Mbps),IEEE802.11f(- Inter Access Point Protocol is designed for the enforcement of unique associationthroughout an Extended Service Set and for secure exchange of station's security context betweenthe current AP and the new AP during the handoff period) and IEEE802.11e (Wireless Multimediaoffers quality of service (QoS) features, including the prioritization of data, voice, and videotransmissions).
6. Wireless broadband technology offers a vast benefits from education, to businesses, togovernment, to health care and many more.
7. Wireless broadband is categorized according to the transmission medium it uses and its accessusually categorized into Wired and Wireless Access.
8. Wired Broadband Access can have several form using a wired transmission medium such asDSL (Digital Subscriber Line is a type of wired broadband access usually offered by telephonecompanies), Cable (mostly bundled with cable TV service), Fiber Optics (uses fiber optic cablesthat has large transmission speed), and BPL (Broadband Power Line is a type of broadbandaccess transmitted over utility power lines).
9. Wireless Broadband Access can have several form using a wired transmission medium such asSatellite (Location sensitive and covers a larger geographical area), 3G Third Generation (a type
of wireless broadband access provided by mobile phone carriers for internet connectivity),Wireless Fidelity (a type of broadband access that uses connect to corporate LANs), FixedWireless (Situated in fixed location using fixed antenna) and WiMax (Worldwide Interoperabilityfor Microwave Access is a type of wireless broadband access used mostly in large geographicalarea also referred as wireless MAN).
Lesson Summary:
-
7/29/2019 Data Communication and Networking Fundamentals
33/38
Introduction to IT Concepts
Labanan Subion Trillane
LESSON 5: COMPUTER SECURITY ISSUES
In computer networking, one of the major issuesto be concerned and addressed properly is the security ofsharing information and resources. In computer security
threat is a possible danger that might exploit network andcomputer vulnerabilities that can cause harm.
In this lesson, computer threats like securityvulnerabilities and viruses will be discussed accordinglyfollowed by the different safeguards techniques andremedies for such damages caused by an attack.
A. COMPUTER THREATS AND VIRUSES
A computer threat is exactly the same as if someone tries to threaten you but the thing ishappening in a computer system that may be real or a hoax. If a computer threat is a real in naturethis can be a virus, a spyware or a malware that may be destructive to your computer system.
HACKERS
A hacker is defined as anyone who breaks into a computer system (whether anindividual computer or a network) unlawfully. Hackers can gain access to computers directly orindirectly. Direct access involves sitting down at a computer and installing hacking software. Themost likely method a hacker will take to access a computer is indirectly through its Internetconnection. When connected to the Internet, your computer is potentially open to attack byhackers.
TYPES OF HACKERS
o White-Hat Hackers
A type of hacker that breaks into system just for the challenge tothemselves that dont wish to steal information or destroy a computersystem, educated themselves as experts who are performing a servicefor the society be helping companies realize the vulnerabilities thatexists in their systems.
o Black-Hat Hackers
A type of hacker that breaks into system that uses their knowledge todestroy and steal information.
o Script Kiddies
A type of hacker that uses tools created by other skilled hackers topenetrate security vulnerabilities.
-
7/29/2019 Data Communication and Networking Fundamentals
34/38
Introduction to IT Concepts
Labanan Subion Trillane
VIRUSES
A computer virus is a computer program that attaches itself to another computerprogram (known as the host program) and attempts to spread it to other computers when filesare exchanged. Viruses normally attempt to hide within the code of a host program to avoiddetection. Viruses, by definition, have a method to spread.
HOW COMPUTERS ARE BEING INFECTED
Figure 3.2.5-1: Computer Virus Infection Method
If a computer is exposed to a file infected with a virus, the virus will try to copyitself and infect a file on your computer. If you never expose your computer to new files, itwill not become infected. However, this would be the equivalent of a human being living ina bubble to avoid catching viruses. Sharing disks is a common source of virus infection,as is e-mail. Just opening an e-mail message will not infect your computer with a virus.Downloading or running a file that is attached to the e-mail is how your computerbecomes infected.
-
7/29/2019 Data Communication and Networking Fundamentals
35/38
Introduction to IT Concepts
Labanan Subion Trillane
TYPES OF COMPUTER VIRUSES
o Some viruses are hidden on Web sites in the form of scripts. Scripts are miniprograms that are often used to perform legitimate functions on Web sites.However, some scripts are malicious. For example, say you receive an e-mailencouraging you to visit a Web site full of useful programs and information.
Unbeknownst to you, clicking a link to display a video runs a script that infectsyour computer with a virus.
o Macro virusesare attached to documents (such as Word files) that use macros.A macro is a short series of commands that usually automates repetitive tasks.However, macro languages are now so sophisticated that viruses can be writtenwith them. E-mail viruses use the address book in the victims e -mail system todistribute the virus.
o Trojan Horses enter the computer as legitimate programs chosen for downloadby the user, often as something for free. Attached is hidden code that infects thecomputer once the desired program is loaded. Since they enter at the users
request, virus-detection software often misses them.
CLASSIFICATION OF COMPUTER VIRUSES
Viruses can also be classified by the methods they take to avoid detection byantivirus software:
o Polymorphic viruseschange their own code (or periodically rewrite themselves)to avoid detection. Most polymorphic viruses infect one certain type of file (.exefiles, for example).
o Multipartite viruses are designed to infect multiple file types in an effort to fool
the antivirus software that is looking for them.
o Stealth viruses temporarily erase their code from the files where they reside andhide in the active memory of the computer. This helps them avoid detection ifonly the hard drive is being searched for viruses.
B. COMPUTER SAFEGUARDS AND SECURITY SOLUTIONS
FIREWALLS
Firewalls are software programs or hardware devices designed to keepcomputers safe from hackers. By using a firewall, you can close off open logical ports to
invaders and potentially make your computer invisible to other computers on the Internet.Most Operating Systems installed, also includes a firewall that is simple but reliable touse.
The most popular software firewalls for the home include Norton PersonalFirewall, McAfee Firewall, ZoneAlarm, and BlackICE PC Protection. You can also buy andconfigure hardware firewall devices if opted.
-
7/29/2019 Data Communication and Networking Fundamentals
36/38
Introduction to IT Concepts
Labanan Subion Trillane
ANTIVIRUS AND ANTI-MALWARE SOFTWARES
The best defense against viruses is to install antivirus software, which isspecifically designed to detect viruses and protect your computer and files from harm.
Most antivirus software looks for virus signatures in files. Signatures are portions
of the virus code that are unique to a particular computer virus. Antivirus software scansfiles for these signatures and thereby identifies infected files and the type of virus that isinfecting them.
SECURITY SOLUTIONS AND PROTECTION
If youre keeping a wired network secure with a firewall, youre fairly safe frommost hacker attacks. However, wireless networks have wide ranges, including areasoutside of your house. This makes it possible for a hacker to access your network withoutyou even knowing it. Because your packets of information are being broadcast through
the airwaves, a hacker can intercept and decode information from your transmissions thatmay allow him to bypass your firewall.Others may steal your bandwidth and crimes can be committed through your network.Therefore, to secure a wireless network, you should take the following additionalprecautions:
1. Change Your Network Name (SSID): Each wireless network has its own name toidentify it. Unless you change this name when you set up your router, the router usesa default network name that all routers from that manufacturer use. Hackers know thedefault names and access codes for routers.
2. Disable SSID Broadcast: Most routers are set up to broadcast their SSID so other
wireless devices can find them. If your router supports disabling SSID broadcasting,turn it off. This makes it more difficult for a hacker to detect your network.
3. Change the Default Password on Your Router: Hackers know the default passwordsof most routers, and if they can access your router, they can probably break into yournetwork.
4. Turn on Security Protocols: Most routers ship with security protocols such as WiredEquivalent Privacy(WEP) or Wi-Fi Protected Access (WPA). Both use encryption toprotect data in your wireless transmissions. WPA is a stronger protocol than WEP, soenable WPA if you have it; enable WEP if you dont.
5. Implement Media Access Control: Each network adapter on your network has aunique number assigned to it by the manufacturer. This MAC address is a numberprinted right on the network adapter. Many routers allow you to restrict access to thenetwork to only certain MAC addresses.
6. Apply Firmware Upgrades: Your router has read-only memory that has softwarewritten to it. This software is known as firmware. Periodically, as bugs are found in thefirmware, manufacturers issue patches. Periodically check the manufacturers Website and apply any necessary upgrades to your firmware.
-
7/29/2019 Data Communication and Networking Fundamentals
37/38
Introduction to IT Concepts
Labanan Subion Trillane
Computer Threat threat is a possible danger that might exploit networkand computer vulnerabilities that can cause harm.
Hacker is defined as anyone who breaks into a computersystem (whether an individual computer or a network)unlawfully.
White-Hat Hacker is a type of hacker that breaks into system just for thechallenge to themselves that dont wish to stealinformation or destroy a computer system
Black-Hat Hacker is a type of hacker that breaks into system that usestheir knowledge to destroy and steal information.
Script Kiddies is a type of hacker that uses tools created by other
skilled hackers to penetrate security vulnerabilities.
Computer Virus is a computer program that is harmful to a computersystem that can destroy files and information.
Scripts are mini programs that are often used to performlegitimate functions on Web sites. However, somescripts are malicious.
Macro is a short series of commands that usually automatesrepetitive tasks.
Firewalls are software programs or hardware devices designedto keep computers safe from hackers.
Antivirus is a computer program that is best suited to protectcomputer system from virus and security threats.
Terminologies to Remember:
-
7/29/2019 Data Communication and Networking Fundamentals
38/38
Introduction to IT Concepts
1. In computer networking, one of the major issues to be concerned and addressed properly is thesecurity of sharing information and resources. In computer security threat is a possible dangerthat might exploit network and computer vulnerabilities that can cause harm.
2. A hacker is defined as anyone who breaks into a computer system (whether an individualcomputer or a network) unlawfully.
3. Hackers can gain access into computer system in two different ways such as Direct Access(involves sitting down at a computer and installing hacking software) and Indirect Access (usuallyusing the internet to exploit computer security).
4. Hackers can be categorized into three types namely White-Hat Hackers (a hacker that breaks intosystem just for the challenge to themselves that dont wish to steal information or destroy acomputer system), Black-Hat Hackers (a hacker that breaks into system that uses their knowledgeto destroy and steal information) and Script Kiddies (a hacker that uses tools created by other
skilled hackers to penetrate security vulnerabilities).
5. Computer virus is a computer program that attaches itself to another computer program (knownas the host program) and attempts to spread it to other computers when files are exchanged.Viruses normally attempt to hide within the code of a host program to avoid detection.
6. Computer virus can be categorized into three types namely Scripts (mini programs that are oftenused to perform legitimate functions on Web sites), Macro Virus (virus attached to a document filethat executes short series of commands that usually automates repetitive tasks) and Trojan Horse(a computer virus that acts as a legitimate program that posses security threats).
7. Computer virus can also be classified according the way it hides to avoid detection. It can be
classified as Polymorphic Virus (change their own code or periodically rewrite themselves toavoid detection), Multipartite Virus (designed to infect multiple file types in an effort to fool theantivirus software)and Stealth Virus (temporarily erase their code from the files where they resideand hide in the active memory of the computer).
8. Computers can be safeguarded using different software and hardware such as the Firewalls (aresoftware programs or hardware devices designed to keep computers safe from hackers that closesopen logical ports to invaders and potentially make your computer invisible to other computers onthe Internet) and Antivirus Programs (the best guard and defense against viruses).
Lesson Summary: