Chapter 4: Networks and the effect of using them.
Q1) What is a Modem?
Modem means “modular demodulator’ and is a device that converts (i.e., modulates) a
computer’s digital signal into an analogue signal for transmission over an existing telephone
line. It also de-modulates the analogue signal into a digital signal.
Q2) Explain the term A-Symmetric
The term A-Symmetric means that the modem is faster at downloading data then uploading
data.
(i.e., sending data)
Q3) Differentiate between hub and switch
Hubs and Switches are both hardware devices that cam have several devices or computers
connected to them. However, switches have are much more efficient in the way they
distribute data packets.
Q4) How does the switch forward data packets to the intended receiver?
Each device on a computer or a network has a MAC (Media Access control) address which
is uniquely identified by the switch. Data packets sent to switches having MAC addresses
which identifies the source of the data and additional addresses, identifying each device that
should receive the data.
Q5) What is a bridge?
Bridges are devices that connect one LAN to another LAN that uses the same protocol. They
are often used to connect different LANs so that they can function as one, single LAN.
Q6) What is the purpose off a router?
Routers enable data packets to be routed between the different networks, e.g. To Join a
LAN to a WAN. A router would typically have an internet cable plugged into it and several
connecting to a computer and other devices on the LAN. Routers normally sit behind a
firewall. The routers main function is to transmit internet transmission protocols between two
networks and allow private networks to be connected. Routers inspect the data packets sent
to it from any computer on any of the networks connected to it. Since every computer on the
same network has the same part of an internet protocol (IP) address, the router can send the
data packet to the appropriate switch and it will then be delivered using the MAC destination
address If the MAC address doesn't match any device on the network, it passes on to
another switch on the same network until the appropriate device is found.
Q7) Data Packets contain some information, list them:
- Some Form of header to identify the data packets
- The Sender’s IP address
- The Receiver’s IP address
- It shows how many data packets make up the whole ‘message’
- The identity number for each packet
Q8) How does a router ‘route’ data packet?
A router routes a packet across a network it it’s correct destination and allows the data
packet to be re-assembled it their correct order according to the identity number at the
receiving station. When a router routes a packet of data, it checks the destination IP address
against the stored routing table. The routing table stores the MAC address of the device, the
assigned IP address and the least time the IP address is assigned for. The bits forming the
destination IP address in the data packets are used to point to the correct route. The packet
is sent to a number of routers until it reaches its final destination.
Q9) What is an IP address?
Each device on tl1e internet is given a unique address known as its internet protocol (IP)
address. This is a 32-bit number that is usually written in the form:
109.108.158.1
-When are you assigned an IP address?
A home computer is given an IP address when it connects to the internet.
This is assigned by the ISP and is unique for that particular internet session.
The only IP addresses that remain fairly unchanged are the web servers.
An IP address can be used instead of typing in the full URL; for example,
bttp://109.108.158.1
would take you straight to the device containing web page corresponding to this address.
Q10) Difference between an Ip address and MAC address.
a MAC address is a unique number that identifies a device connected to the internet.
The IP address gives the location of a device on the internet, whereas the MAC address
identifies the device connected to the internet.
You can think of the IP as the address of the house you live in (it will have some unique way
of identifying it, such as a postcode or zone code). Using this example, the MAC address
can be thought of as a way of uniquely identifying each person living in that house. It is
possible to move to a new house (so your IP address will change) but the same people will
be living in the new house (so their MAC address will remain unchanged).
Q11) What is a WIFI?
A wireless transmitter (WAP) receives information from a network via its connection (e.g., a
broadband connection if the internet is used). This transmitter converts the received
information into radio waves and then transmits them.
A device (e.g., a computer) receives the radio waves via an installed wireless adaptor which
allows it to download the information from the data source.
This, of course, works in reverse when the device wishes to transmit data over the network.
-Advantages
Wi-Fi is best suited to operating full-scale networks since it offers much faster data transfer
rates, better range and better security than Bluetooth. A Wi-Fi enabled device (such as a
computer or smartphone) can access, for example, the internet wirelessly at any access
point (AP) or hot spot up to 100m away.
Q12) Explain Bluetooth.
Bluetooth sends and receives radio waves in a band of79 different frequencies
(known as channels). These are all centred on a 2.45 GHz frequency.
Devices using Bluetooth automatically detect and connect to each other, but they don't
interfere with other devices since each communicating pair uses a different channel (from
the 79 options).
When a device wants to communicate, it picks one of the 79 channels at random. If the
channel is already being used, it randomly picks another channel. This is known as spread-
spectrum frequency hopping.
To further minimise the risks of interference with other devices, the communication pairs
constantly change tl1e frequencies (channels) they are using (several times a second).
Note: - Bluetooth creates a secure wireless personal area network (WPAN) based on key
encryption.
Q13) How to setup and configure a small network?
a. Setting up an IP account for internet access.
b. Setting up the system (or buying appropriate hardware correctly configured) to allow
for wireless connectivity
c. Configuring all the hardware and software so that they work correctly together
d. If internet is required., ensuring that a high-speed broadband connection exists
e. Putting all the common software onto a server and also making sure that a network
licence has been acquired so that all network users can make use of the software
f. Setting up privileges so that each user can only access their own area or common
shared area
g. Setting up a network-manager-level of privilege do that they can monitor network
usage, change passwords, etc.
Q14) Should internet be policed?
Arguments in favour of some form of control:
•it would help to prevent illegal material being posted on websites (for example,
racist/prejudiced and pornographic material, terrorist activities, and so on)
•people find it much easier to discover information that can have serious consequences (for
example, how to be a hacker, how to make bombs, and so on); although most of this
information can be found in books, it is much easier to find it using a search engine
•it would help to prevent children and other vulnerable groups from being subjected to
undesirable websites
•it would help stop incorrect information being published on websites.
Arguments against some form of control:
• material published on websites is already available from other sources
• it would be very expensive to 'police' all websites and users would have to pick up
the bill
• it would be difficult to enforce rules and regulations on a global scale
• it can be argued that policing would go against freedom of information
• laws already exist to deal with those who post illegal material/ comments on
websites.
Q15) Main aspects of accuracy of information.
- reliability of information
•Information on the internet is more likely to be up to date than in books
(websites can be updated very quickly).
•It is much easier to get information from websites (search engines quickly link key
words together and find information that matches the criteria).
•There is a vast amount of information on the internet that is easier to locate than
using the indices in several books.
•Information could also be incorrect, inaccurate or even biased, since it doesn't go
through any checking process.
•There is a real risk of information overload, even if the search engines are used
properly; it is possible to get millions of hits, which may make it difficult to find the
relevant information.
- undesirability of certain websites
•There is always a risk of finding undesirable websites.
•There is also a risk of connecting to websites that are not genuine, which could lead
to a number of problems (such as undesirable web links, security risks, and so on).
•Security risks.
- security issues
Passwords are used in many instances when accessing the intemet, for example
when:
•accessing your email account
•carrying out online banking
•accessing social networking sites.
•run anti-spyware software to make sure that your passwords aren't being relayed
back to whoever put the spyware on your computer
• change passwords on a regular basis in case they have come into the
possession of another user illegally or accidentally
• passwords should not be easy to guess or break (for example, don't use your
favourite colour, name of a pet or favourite rock group); passwords are defined as
either 'strong' (hard to break or guess) or 'weak' (relatively easy to break or guess).
Strong passwords should contain:
• at least one capital letter
• at least one numerical value
• at least one other keyboard character (such as@, *, &).
An example of a strong password would be: Syl2@#TT90kj=0.
An example of a weak password would be: GREEN.
Q16. List ways for protecting your password. || You have your company’s website.
Employees have Login id and password. List some rules to protect their passwords from
hacker or any external threats.
• run anti-spyware software to make sure that your passwords aren't being relayed
back to whoever put the spyware on your computer
• change passwords on a regular basis in case they have come into the possession of
another user illegally or accidentally
• passwords should not be easy to guess or break (for example, don't use your
favourite colour, name of a pet or favourite rock group); passwords are defined as either
'strong' (hard to break or guess) or 'weak' (relatively easy to break or guess). Strong
passwords should contain:
• at least one capital letter
• at least one numerical value
• at least one other keyboard character (such as@, *, &).
An example of a strong password would be: Syl2@#TT90kj=0.
An example of a weak password would be: GREEN.
Q17. What is Authentication?
Authentication is used to verify that data comes from a secure and trusted source.
It works with encryption to strengthen internet security, for example.
User IDs and passwords are authentication techniques. Some forms of authentication
include:
• digital certificates (see Section 8.4.4 for more details)
• biometrics (see Section 8.4.4 for more details)
• magnetic stripe cards/id cards/passports.
Q18. What happens when somebody approaches passport control at an airport?
The passport page containing the photograph is places faced down on a reader. A microchip
embedded in the page is now read but a reader and the facial image on the passport is also
scanned in. The owner of the passport now looks up at a digital camera and a photo is
taken. This photograph in converted into a digital format so that it can be compared to the
scanned facial image. The data read from the micro-chip is also compared to data stored on
a central database. If either produces any differences, then the passport is rejected.
Q19) What data can be read by the RFID tag from the passport?
Biometric data, Country of Origin, date of birth, countries visited, Nationality, Gender, Full
Name, Address.
Q20) Features of an Anti-Vitus software:
• they check software or files before they are run or Loaded on a computer
• antivirus software compares a possible virus against a database of known viruses
• they carry out heuristic checking - this is the checking of software for types of behavior
mat could indicate a possible virus; this is useful if software is infected by a virus not yet on
the database
• any possible files or programs that are infected are put into quarantine that:
• allows the virus to be automatically deleted, or
• allows the user to make the decision about deletion (it is possible mat the user knows
that the file or program is not infected by a virus - this is known as a false positive and is one
of me disadvantages of antivirus software)
• antivirus software needs to be kept up to date since new viruses are constantly being
discovered
• full system checks need to be carried out once a week, for example, since some viruses
lie dormant and would only be picked up by this full system scan.
Q21) How to avoid viruses when accessing the internet?
One way to help prevent virus attacks when accessing websites on the
internet is to avoid unknown or suspicious-looking websites. If in doubt,
do not access me website - look for security indicators such as https or the padlock symbol
Also look out for odd behaviour in the URL. When accessing a new website, for example
from an advert in an email, copy and paste the URL into me address bar at the top of me
page rather than just clicking on the link in the email. This can help to avoid links to
bogus/fake websites.
It is also not advisable to open emails (or any attachments) from unknown sources.
Essentially, the best form of defence against malicious behaviour when making use of the
internet is to apply common sense.
Q22) How to stop data being obtained unlawfully ?
• don't leave personal information lying around on a desk when not attended
• lock filing cabinets at tl1e end of tl1e day or when tl1e room is unoccupied
• do not leave data on a computer monitor if it is unattended; log off from tl1e computer if
away from your desk for any length of time
• use passwords and user ids, which should be kept secure; passwords should be difficult to
guess/break and should be changed frequently (see earlier notes on passwords)
• make sure that anytl1ing sent in an email or fax (including attachments) is not of a sensitive
nature.
Q23) Traditional faxes VS Emails
Q24) List things to consider while using video Conference
• it is essential to agree a time and date for the conference to take place
• the delegates in each conference room must log in to the video conference system
• the video conference set-up needs to be checked before the meeting goes live
• webcams need to be placed in the correct position so that all the delegates in the room are
within visual contact (the webcams will capture the images and then transmit them to the other
delegates - they will see the images on their own large screens)
• microphones need to be placed centrally so that all of the delegates can speak
- the sound is picked up by the microphones and transmitted to the other delegates (they
hear the voices through speakers in their own conference room)
• it is important for one person to be the main contact in each conference room to make sure
that each delegate is able to be heard; this is particularly important if more than two video
conference rooms are linked up at the same time.
Q25) What is CODEC ?
CODEC can stand for coder-decoder or compression-decompression. The first is used to encode or
decode the digital data stream to allow data to be transmitted (encoded) and played back
(decoded). The second is used to compress the data before it is transmitted
and then decompress it again at the recei:ving conference room
Q26) What is an echo – cancellation ?
Echo cancellation software allows talking to take place in real time and permits the synchronisation
of communication. Microphones can pick up sound from the speakers
(i.e. creating an echo); this software copies received signals and checks for parts of the signal that
reappear but are delayed slightly. The reappearing parts are removed from the signal (i.e. the echo is
removed)
Q27) Which procedures need to be carried out when doing a phone conference?
1. The organiser of the phone conference is given two PINs by the phone company. One PIN is
the personal PIN (e.g. 2151) given to the organiser and the second PIN is the participants'
PIN (e.g. 8422).
2. The organiser contacts all of the participants and informs them of their PIN and the data
and time of the phone conference.
3. When the phone conference is about to start, the organiser dials the conference
phone number and, once he/she is connected, keys in his/her personal PIN
(2151 in this case).
4. The participants then call the same conference number to join in - once they get through
they each input the PIN given to them by the organiser (8422 in this case). ,without this
PIN, it will be impossible to join the phone conference.