AIN1501 - Study Unit - 12
AIN1501 - Study Unit - 12
AIN1501 - Study Unit - 12
COMPONENTS OF
COMMUNICATION NETWORK
1 Introduction
A computer network, also referred to as a network, consists of two or more computers
or devices linked to one another by communication media, which facilitate
communication among these connected computers or devices. The purpose of networks
is to allow users to share resources, data and information, and to facilitate
communication. In this study unit, we will be looking at why computer networks are used,
as well as the various components of communication networks that enable
communication between the devices connected to the network (Booyse et al, 2017,
Unisa study guide).
Communication media enable signals to move from one point to another. These
communication media or channels are either cables or antennae that transmit signals
from one location to another. Communication media can also be split between wired and
wireless transmission (Booyse et al, 2017, Unisa study guide).
Wires and cabIes are media through which information can move from one network
device to another. The type of cable chosen for a network is related to the network’s
configuration (topology), protocol and size. Common wired mediums include
❖ Microwave transmission
Microwave transmissions are high-frequency signals
sent through the air using earth-based transmitters and
receivers.
❖ Satellite transmission
❖ Radio transmission
❖ Infrared transmission
Signals in the form of light waves are transmitted through the air
between devices, requiring line of sight for transmitting within short
distances of less than a few hundred metres (Booyse et al, 2017, Unisa
study guide).
➢ Firewalls are the most important part of a network with respect to security.
Firewalls can be either hardware or software. A network system
implementing a firewall does not need human interaction for data transfer
monitoring, as automated processes to reject access requests from unsafe
sources and to allow actions from recognised sources, can be set up. With
the increase in cyberattacks to steal data, plant viruses,and so on, firewalls play
a very important role in network security (Booyse et al, 2017, Unisa study
guide).
In this era of digital revolution, and the Internet of Things (IoT), technologies have
removed the digital barriers and accentuate the seamless exchange of data and
information among ubiquitous systems. Therefore, the challenge of information
theft, privacy, and confidentiality of data and information on the internet has become
a major dilemma for many users of several online platforms (Sarumi, Adetunmbi, &
Adetoye, 2020). The wireless technologies that are used to carry out public and
personal communication are vulnerable to various types of attacks, where attackers
can access signal to listen in or to cause damage on wireless networks (Intrusion
Detection and Prevention Systems in Wireless Networks, 2017). Network intrusion
detection systems are a viable approach to curb the menace of information theft
and other data security threats on the internet (Sarumi et al, 2020). According to
Duan, Wei, Fan, Yu & Hu (2020), Wi-Fi has been widely deployed to facilitate home
office, or even stadium-scale wireless access to the internet, and will be an
essential part of future wireless networks through being integrated with 5G cellular
networks. However, security threats are still a big concern for Wi-Fi due to the open-
share nature of the wireless medium and the easy access to Wi-Fi intrusion tools.
Therefore, these systems play a critical role in identifying attacks experienced in
order to apply further methods. According to Musa, Chakraborty, Abdullahi & Maini,
2021, computer networks are exposed to cyber-related attacks due to common
usage of the internet. As hackers become more prevalent and savvier, additional
tools to help protect network environment are needed. A key research issue in
securing networks is detecting intrusion. In 2008, Azad Tariq Bin stated that it helps
to recognise unauthorised usage and attack as a measure to ensure network
security. Intrusion detection is a strategy that is defined as the ability to monitor and
react to computer misuse. Many hardware and software products in the market
provide various levels of intrusion detection.
Over the years, various works were evaluated on different databases for detecting
illicit or abnormal behaviour using IDS. This culminated in proposing various
approaches to determine the most effective features to enhance the efficiency of
IDSs. Methods include machine learning-based (ML), Bayesian-based algorithms,
and Markov neural network, among others (Musa et al, 2021). This work was used
to develop new and sophisticated detection and prevention methods based on and
managed by combining smart techniques, including machine learning, data mining,
and game theory, using risk analysis and assessment techniques. Their role is thus
assisting wireless networks to remain secure and aiding system administrators to
effectively monitor their systems (Musa et al, 2021).
As new attacks emerge daily, IDSs play a key role in identifying possible attacks to
the system and giving proper responses (S Sen, 2015). This makes intrusion
detection an indispensable part of a security system. IDSs should adapt to these
new attacks and attack strategies, and continually improve.
A c t i v i t y 12.1
Wireless transmissions are part of our daily lives. Examples include using your cell
phone to call a friend to arrange to watch a movie on Netflix.
What role does wireless transmission play in your daily life? Give at least ten
examples and explain each.
Sharing files, data, and information: Networks enable authorised users to access
data and information stored on other computers in the network. The ability to
provide access to data and information on shared storage devices is an important
feature of many networks.
Go to the Discussion Forum for study unit 12. From the perspective of study unit
6 (Big data), which you have already studied, particularly looking at features,
sources, and problems of big data, discuss the statement above with your fellow
students.
5 Summary
The next study unit deals with network configurations, including network topologies
and geographical scope. Distributed processing, client server systems and cloud
computing will also be discussed.