0% found this document useful (0 votes)
22 views

Topic Seven

Uploaded by

muzamilinc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Topic Seven

Uploaded by

muzamilinc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

TOPIC SEVEN:

TOPIC SEVEN: INFORMATION COMMUNICATION, SECURITY AND


BACKUP SYSTEMS

Learning Outcomes

By the end of this topic you should be able to:

a) Explain information communication,


b) Discuss networks
c) Explain factors affecting communication among devices,
d) Explain Information security and common controls

Topic Contents
7.1 Introduction
Information communication is transfer of information in form of
multimedia or any combination from source to destination point. It involves
combination of hardwares transmission channels i.e wired, bounded or
guided, wireless, unbounded or unguided, communication software, and
users. It comprises of infrastructure which involves networking and global
connection i.e internet.
7.2 COMPUTER NETWORKING
Network Terminologies:
Network: connection of more than one computer with the main purpose of
sharing computer resources.
Intranet: Internal corporate network that uses the infrastructure of the
Internet and the www.
Extranet: an extension of internal network (internet) to connect not only
internal personnel but also selected customers, suppliers, and other strategic
offices.
Node: any device that is attached to a network
Packet: fixed-length block of data for transmission. It also contains
instructions about the destination of the packet.
Kilobits per second (kbps): 1000 bits per second; an expression of data
transmission speeds.
7.2.1 Network Hardware
This involves the hardware components associated with networking namely:
i) Network Interface Card (NIC): - circuit board inserted into an
expansion slot in a microcomputer that enable it to send and receive
messages on a network.
 Physical NICs send and receive signal in form of electromagnetic
waves . Send and receive signal depend on card specification speed
e.g 10/100Mbps LAN card
 Wireless NICs - send and receive signal in form of waves.
Send and receive signal depend on card specification speed e.g M
wireless LAN card.
 Note: Compare the performance using these two method of data
transmission speed when sharing file using physical card and wireless
card

ii) Network media – Physical and wireless media_channels used for transmission
Physical media – used physical media
a.) Twisted Pair Wire: insulated copper wire, twisted around each other in pairs.
b.) Coaxial cable Solid copper wire transmit high frequency data with short distance
coverage
c.) Optical fiber – transmits packet in form light waves through fiber optical cabling
Wireless- non physical media used for transmission of waves
a. Radio waves- transmits from 3khz- 1 Ghz
b. Micro waves transmits from 1-300GHz
c. Infrared waves –transmits from -300GHz – 1THz
iii)Hubs/Repeaters: -used to connect together two or more network
segments of any media type. Hubs provide the signal amplification
required to allow a segment to be extended a greater distance. While
repeaters allow LANs to extend beyond normal distance limitations,
they still limit the number of nodes that can be supported.
iv) Bridges: - Bridges became commercially available in the early
1980s. At the time of their introduction their function was to connect
separate homogeneous networks. Subsequently, bridging between
different networks e.g. Ethernet and Token Ring - has also been
defined and standardized. Bridges are data communications devices
that operate principally at Layer 2 of the OSI reference model. As such,
they are widely referred to as data link layer devices. . As such, data
link layer devices main responsibilities include
a.) Framing:
b.) Physical addressing
c.) Flow Error control
d.) Access control
v) Routers: - Routers use information within each packet to route it
from one LAN to another, and communicate with each other and share
information that allows them to determine the best route through a
complex network of many LANs. Its core functions includes
a.) Share information that allows them to determine the best route
through a complex network of many LANs.
b.) All known networks addresses
c.) Instructions for connections to other networks
d.) The possible paths between routers or best effort.
e.) The costs of sending data over those paths by choosing the best
path (shortest path)

vi) Switches: - LAN switches are an expansion of the concept in LAN


bridging. They operate at Layer 2 (link layer) of the OSI reference
model, which controls data flow, handles transmission errors, provides
physical (as opposed to logical) addressing, and manages access to
the physical medium. Other roles includes
1. data flow,
2. handles transmission errors,
3. provides physical (as opposed to logical) addressing, and
4. Manages access to the physical medium.
5. Provide each pair of communicating devices with a fast
connection
6. Isolate communication so that it does not enter other portions
of the network
vii) Network Access Point (hotpot )

 An access point is a device that creates a wireless local area


network, or WLAN, usually in an office or large building.
 An access point connects to a wired router, switch, or hub via an
Ethernet cable, and projects a Wi-Fi signal to a designated area.
 serves to join or "bridge" wireless clients to a wired Ethernet network.
 centralize all WiFi clients on a local network in so-called
"infrastructure" mode.
 may connect to another access point, or to a wired Ethernet router.
 create one WLAN that spans a large area.
 Each access point typically supports up to 255 client computers.
Example
A company provide web page design and web hosting services and its office
is located on two different floors of a commercial building. Its network
infrastructure is shown below

The web server stores the web page produced by the company for their
customer. The file server supports daily business needs.
i) Suggest two types of network devices that can be used for device B.
Explain briefly their difference, in terms of the performance in this
network.
ii) The company decides to improve the network by the following actions.
State and explain the devices to be added as well as the locations in
the network.
a) Add device for better security
b) Replace certain devices for better traffic management.

7.2.2 Network Topology


Define the manner in which network devices are organized. Four common
LAN topologies exist:
i) Mesh Topology
 Every device has a dedicated point-to-point link to every other device
 The dedicated link carries traffic only between the two devices it
connects.
 The number of physical links needed in a fully connected mesh
network with n nodes are, n(n - 1).
 If each physical link allows communication in both directions (duplex
mode), we can divide the number of links by 2.
 To accommodate that many links, every device on the network must
have (n – 1) input/output (I/O) ports to be connected to the other n - 1
stations.

Advantages
1. The dedicated links guarantees that each connection can carry its
own data load, thus eliminating the traffic problems that can occur
when links must be shared by multiple devices.
2. A mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
3. Privacy Or Security. When every message travels along a dedicated
line, only the intended recipient sees it.
4. Point-to-point links make fault identification and fault isolation easy.
Traffic can be routed to avoid links with suspected problems. This helps
to discover the precise location of the fault and aids in finding its cause
and solution.
Disadvantages
1. Installation and reconnection are difficult. Every device must be
connected to every other device. So large amount of cabling and the
number of I/O ports are required.
2. The sheer bulk of the wiring can be greater than the available space
(in walls, ceilings, or floors) can accommodate.
3. The hardware required to connect each link (I/O ports and cable) can
be prohibitively expensive.

ii) A Bus Topology: - Linear LAN architecture in which transmissions


from network stations propagates the length of the medium and are
received by all other stations. Many nodes can tap into the bus and
begin communication with all other nodes on that cable segment. A
break anywhere in the cable will usually cause the entire segment to
be inoperable until the break is repaired.

Advantages:
Ease of installation. Backbone cable can be laid along the most
efficient path, then connected to the nodes by drop lines of various
lengths.
Disadvantages:
1. Difficult reconnection and fault isolation. A bus is usually designed
to be optimally efficient at installation. It can therefore be difficult to
add new devices. Signal reflection at the taps can cause degradation in
quality.
2. A fault or break in the bus cable stops all transmission, even between
devices on the same side of the problem. The damaged area reflects
signals back in the direction of origin, creating noise in both directions.

iii) A Ring Topology: - LAN architecture in which all devices are


connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of
it.

Advantages:
1. Easy to install and reconfigure:
 Each device is linked to only its immediate neighbors (either
physically or logically). To add or delete a device requires
changing only two connections.
2. A signal is circulating at all times (token) if one device does not receive
a signal within specified period, it can issue an alarm.
 The alarm alerts the network operator to the problem and its
location
Disadvantages:
 Unidirectional traffic: A break in the ring (such as a disabled station)
can disable the entire network.
iv) A Star Topology: - LAN architecture in which the endpoints on a
network are connected to a common central hub, or switch, by
dedicated links. 10BaseT Ethernet uses a star topology, generally with
a computer being located at one end of the segment, and the other
end being terminated with a hub. The primary advantage of this type
of network is reliability - if one "point-to-point" segments has a break,
it will only affect the nodes on that link; other computer users on the
network continue to operate as if that segment were non-existent.

Advantages
1. A star topology is less expensive than a mesh topology
2. Each device needs only one link and one I/O port to connect it to any
number of others.
3. Robustness: . If one link fails, only that link is affected. All other links
remain active. This factor also lends itself to easy fault identification
and fault isolation.
Disadvantages
1. Dependency of the whole topology on one single point, the hub. If the
hub goes down, the whole system is dead.
2. More cabling is required in a star than in some other topologies (such
as ring or bus) but not like in mesh topology
v) A Tree Topology: - LAN architecture that is identical to the bus
topology, except that branches with multiple nodes are possible in this
case.
Hybrid Topology
 It compose of combination of more than one type of topologies.
 Mostly this type topology is practically used in real working network.
 It is impossible to implement only one type of topology in practical
working network.
 We can have a main star topology with each branch connecting several
stations in a bus topology as shown in the following figure.

7.2.3 Network Protocol


Definitions of common sets of rules and signals that specify how computers
on a network communicate. Ethernet and Token Ring are examples of
network cabling standards, whilst TCP/IP is the predominant network
communications protocol. Regulate the following characteristics of a
network:
c) access method,
d) allowed physical topologies,
e) types of media,
f) connections and
g) Speed of data transfer.

Other most used protocols include:


i) TCP/IP: - Short for Transport Control Protocol/ Internet Protocol where
Transmission Control Protocol ensures the reliability of data
transmission across Internet connected networks and Internet Protocol
standard dictates how packets of information are sent out over
networks.
 provides full transport-layer services to applications
 a reliable stream connection-oriented protocol it
 It adds connection-oriented and reliability features to the
services of IP.
ii) NetBEUI: - Short for NETBios Enhanced User Interface and is used by
network operating systems allowing the computer to communicate
with other computers utilizing the same protocol.
iii) DHCP: - Short for Dynamic Host Configuration Protocol, DHCP is a
protocol used to assign an IP address to a device connected to a
network automatically.
iv) HTTP: - Short for HyperText Transfer Protocol, HTTP is a set of
standards that let users of the World Wide Web, to exchange
information found on web pages.
v) FTP: - Short for File Transfer Protocolis a standard way to transfer files
between computers.
vi) PPP: - Short for Point-to-Point Protocol, PPP is a communication
protocol that enables a user to utilize their dialup connection
(commonly a modem) to connect to other network protocols like TCP/IP
etc.
vii) Ethernet: - Also referred as Ethernet II or Fast Ethernet. It is a
communications protocol that enables computers on a local-area
network to share information with one another at rates of 100 million
bits per second instead of the standard 10 million BPS.
7.2.4 Types of Network
Networks are categorized principally in three sizes namely;
i) Wide Area Network (WAN): - communications network that covers a
wide geographical are, such as a state or a country. E.g internet
ii) Metropolitan Area Network (MAN): - communication network
covering a geographic area the size of a city.
iii)Local Area Network (LAN): - privately owned communication
network that servers users within a confined geographical area.
7.2.4.1 Types of LAN
LANs are of two principal types:
i) Client/Server LAN: - consist of requesting microcomputers, called
clients, and supplying devices that provide a service, called servers.
ii) Peer-to-Peer: - one in which all microcomputers on the network
communicate directly with one another without relying on a server.
Advantages of Networks
i) Sharing of peripheral devices e.g. printers, HDD, scanners, etc.
ii) Sharing of programs and data
iii) Better communications e.g. e-mail.
iv) Security of information
v) Access to databases
Disadvantages of Networks
i) The main disadvantage of networks is that users become dependent
upon them. For example, if a network file server develops a fault, then
many users may not be able to run application programs and get
access to shared data. To overcome this, a back-up server can be
switched into action when the main server fails. A fault on a network
may also stop users from being able to access peripherals such as
printers and plotters. To minimize this, a network is normally
segmented so that a failure in one part of it does not affect other parts.
ii) Another major problem with networks is that their efficiency is very
dependent on the skill of the systems manager. A badly managed
network may operate less efficiently than non-networked computers.
iii) Also, a badly run network may allow external users into it with little
protection against them causing damage. Damage could also be
caused by novices causing problems, such as deleting important files.
All these could be summarized as below:
1. If a network file server develops a fault, then users may not be able to
run application programs
2. A fault on the network can cause users to loose data (if the files being
worked upon are not saved)
3. If the network stops operating, then it may not be possible to access
various resources
4. Users work-throughput becomes dependent upon network and the skill
of the systems manager
5. It is difficult to make the system secure from hackers, novices or
industrial espionage
6. Decisions on resource planning tend to become centralized, for
example, what word processor is used, what printers are bought, e.t.c.
7. Networks that have grown with little thought can be inefficient in the
long term.
8. As traffic increases on a network, the performance degrades unless it
is designed properly
9. Resources may be located too far away from some users
10. The larger the network becomes, the more difficult it is to
manage ,control and secure.
7.3 Factors Affecting Communication among Devices
i) Transmission rate i.e. frequency (the amount of data that can be
transmitted on a channel) and bandwidth (the difference between the
highest and lowest frequencies).
ii) Line configurations i.e. point to point (line directly connects the
sending and receiving devices, such as a terminal with a central
computer) vs. multipoint (a single line that interconnects several
communication devices to one computer).
iii) Serial (bits are transmitted sequentially, one after the other) vs.
Parallel Transmission (bits are transmitted through separate lines
simultaneously).
iv) Direction of transmission i.e. simplex (data can travel in only one
direction), half-duplex (data travels in both directions but only in one
direction at a time), and full duplex (data is transmitted back and forth
at the same time).
v) Transmission mode i.e. asynchronous (data is sent one byte or
character at a time) vs. synchronous (data is sent in blocks).
vi) Packet switching i.e. a technique for dividing electronic messages into
packets for transmission over a wide area network to their destination
through the moist expedient route.
vii) Protocols i.e. set of conventions governing the exchange of data
between hardware and /or software component in a communication
network.

Key features of information communication systems


 High Data Rates: The inclusion of MIMO antenna Techniques along
with flexible sub-channelization schemes, advanced coding and
modulation all enable the mobile WiMAX technology to support peak
D/L data rates up to 63 Mbps per sector and peak U/L data rates up to
28 Mbps per sector in 10MHz channel.
 Quality of service (QoS): The fundamental premise of the IEEE
802.16 MAC architecture is QoS. It defines Service Flows which can
map to Different Service code points or MPLS flow labels that enable
end-to-end IP based QoS. Additionally, sub-channelization and MAP-
based signaling schemes provide a flexible mechanism for optional
scheduling of space, frequency and time recourse over the air interface
on a frame-by-frame basis.
 Scalability: Despite an increasingly globalized economy, spectrum
resources for wireless broadband worldwide are still quite desperate in
its allocations. Mobile WiMAX technology therefore, is designed to be
able to scale to work in different channelization from 1.25MHz to
20MHz to comply with varied worldwide requirements as efforts
proceed to achieve spectrum harmonization in the longer term. This
also allows diverse economies to realize the multi-faceted benefits of
the Mobile WiMAX technology for their specific geographic needs such
as providing affordable internet access in rural settings versus
enhancing the capacity of mobile broadband access in metro and
suburban areas.
 Security: The features provided for Mobile WiMAX security aspects are
best in class with EAP-based authentication, AES-CCM-based
authenticated encryption, and CMAC and HMAC based control message
protection schemes. Support for a diverse det of users credentials
exists including SIM/USIM cards, Smart Cards, Digital Certificates, and
Username/Password schemes based on the relevant EAP methods for
the credential type.
 Mobility: Mobile WiMAX supports optimized handover schemes with
latencies less than 50 milliseconds to ensure real-time application such
as VoIP perform without service degradation. Flexible key management
schemes assure that security is maintained during handover.
7.6 THE INTERNET
7.6.1 Internet Terminologies
Internet: - global connection of computers using TCP/IP protocol for the
purpose of communication and / or connecting different networks
IP: - Short for Internet Protocol, the IP is an address of a computer or other
network device on a network using IP or TCP/IP.
WWW: -interconnected system of sites, or servers, of the Internet that store
information in multimedia form and share and a hypertext form that link
similar word or phrases between sites.
Hypertext Markup Language (HTML): - set of instructions, called tags or
markups, that are used for documents on the web to specify document
structure, formatting, and link the document.
Web browser: - software that translates HTML documents and allow a user
to view a remote web page e.g. Internet explorer.
Web page: -document in hypertext markup language (HTML), that is on a
computer connected to the Internet.
Home Page: - the first screen of a web site.
Web site: - Internet location of a computer or server on which a hyperlinked
document (web-page) is stored
Web Surfing: - a user’s action of moving from one web page to another by
using the computer mouse to click on the hypertext links.
Search Engines: - type of search tool that allows the use to find specific
document through keyword searches or menu choices.
Uniform Resource Locator (URL): - address those points to specific
resource on the web.
Electronic Mail (E-MAIL): - system in which computer users, linked by
wired or wireless communication lines, may use their keyboard to post
messages and their display screens to read responses.
Internet Service Provider (ISP): - local or national company that provides
unlimited public access to the Internet and the web.
7.6.2 Types of Connectivity
Internet connectivity can be divided into two major parts namely:
 Wired Internet connection
 Wireless Internet connection
Wired Internet connection this involves the use of physical cabling to and
can be achieved through:
 Dial-up connection – this involves the use of telephone lines to dial
in to ISPs network for Internet access.
 Dedicated link access connection – this involve the use of
permanent Telkom line for an uninterrupted Internet access. The
connection can be analog (i.e. use of modems) or digital (i.e. use of
DSL, Router/DTU, Web-ranger etc.).
Wireless Internet connection this involves non-usage of physical cabling
and can be achieved through:
 Satellite connection – this involve transmitting packets by use of
satellite dish for both downloading and uploading.
 Infrared Rays Transmission – this involves use of infrared rays to
transmit packets.
7.6.3 Uses of the Internet
 Communication – through the use of e-mail, chat one can send
and receive information.
 E-commerce – online transaction enables a user to shop, order,
and even pay for an item by using electronic cards.
 Education (E-learning) – virtual learning centers depend on the
Internet to transmit educational materials and lectures. Research
materials are also available on the net.
 Entertainment – Internet make it possible for users to enjoy
games, irrespective of distance. Music and video sites also
supplement entertainment.
 Video – conferencing – Educational fora also uses the Internet to
hold meetings and hence effect discussion and sharing of views and
experiences.
 Networking – through the use of VPN (Virtual Private Networks e.g.
IPsec) technology, several networks can be connected to one
another. Remote administration is also possible.
 Web-advertising – several companies display their ware on the
Internet.
Impacts of the Internet
There are positive and negative impacts associated with the Internet.
Positive:
 Fast delivery of information
 Inexpensive customer base expansion
 Availability of vast source of information
 Source of employment
Negative:
 Illicit or malicious programs are spreads easily.
 Hackers, Crackers and/or Trojans breach the goodwill of data privacy
and confidentiality.
Topic review Questions

i) In early 2024, XYZ company approached you, with strong business and technical
backup to design and deploy a wireless zone for its infrastructure in Location:-PQR
and environs. Benefiting from superb networking and business professionals,
improved wireless hardware, progress in internetworking and bigger market
together with team to design a high availability network in line with regulatory
constraints. Security and encryption added to network neutrality and flexibility as
unique sales properties of the network. Bandwidth was limited at the VPN tunnel
level. Based on the operating experience of company PQR, MNX was selected as the
vendor to supply switches, firewall and routers for this exercise. After this project was
finished you managed to be appointed as an administrator.
a. Discuss briefly what was is being carried out in this project
b. Briefly explain the roles or benefits of the newly completed project.
c. Explain is the significance of “internet VPN” in a geographical dispersion
a) You are interested in starting your own Music Store, XYZ-Muzik store, in a suburban area of
your town. You need to design and build a network and computing solution for your stores.
You have done some initial planning and you will start with two stores (but you plan to add
two more stores across town within one year). Your store will sell new and used music and
allow customers to get “online” in your stores and download music. You also will offer
classes on how to setup music downloads and configure MP3 devices. You took computer
networking courses in college and you feel you can tackle this solution yourself. Upon initial
planning, you have identified the following requirements for your network:
(i) That you need to centralize how this music is stored to facilitate effective
storage and retrieval county wide.
(ii) Provides adequate security for all of the MP3 music and documents stored
county wide
Required:

(i) Based on your understanding extrapolate the benefits of (i)


(ii) Describe what security mechanisms might be needed to secure what is stored as is described
in (ii) above
(iii) Based on the answer you give in (ii), discuss main two drawbacks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy