Sei sulla pagina 1di 10

Chapter 3.

10 – Common Network Environments, Connectivity and


Security Issues

Hardware devices used in data communication in network systems

Switch
Router
Bridge
Modem

What is a switch?

This is a device which helps many terminals to use the same communication line at different
times.

What is a router?

A router is usually used to connect two or more independent and dissimilar networks (such as
LANs and WANs) which continue to function separately. Router directs data along different
routes according to the intended destination. Routers use network addresses and the addresses of
other routers to create a route between two networks. Router does this by maintaining a table of
addresses of computers connected in the network. Routers act as connections between public
networks such as the Internet and private networks such as intranets.

LAN WAN

Internet
Router Router

How does the router route data in a network?


2

Router receives a network level data packet.


It checks the destination address (IP address) of the data packet
The data packet is sent to the appropriate network

What is a bridge?

A bridge is used to link two LANs. It can control access from one part of the network to the
other.

Segment 1 Segment 2

Bridge

How does the bridge handle data in a network?

1. Sending node sends data onto its network segment


2. Data arrives at the bridge and is buffered
3. If the destination device is on the same segment as the sending device then
The data is discarded
ELSE
The data is passed to the other segment
ENDIF

Why the bridge is a useful network device?

1. Bridge can increase the number of stations in a network


2. Bridge helps the network to be treated as a single LAN
3. Bridge helps the manageability of the network
4. Bridge helps the security of the network
5. Bridge helps the reliability of the network because the segments are separated

Disadvantages of bridges
3

Bridges can become overloaded


Bridges cause delays in network transmission

What is a modem?

A modem is a device which converts digital signals it receives to analog form and analog signals
it receives to digital form.

What is the Internet?

The Internet is the global network of many other networks and computers, which communicate
data using data transmission media such as telecommunication lines, satellites and cables.

What are the services available in the Internet?

1. The World Wide Web


2. Electronic mail
3. File transfer
4. Chat rooms and instant messaging

What is World Wide Web?

World Wide Web is a collection of interconnected documents and other resources available in the
Internet, which are linked by hyperlinks and URLs.

What is HTTP?

HTTP (hypertext transfer protocol) is the protocol, which is used to communicate between Web
servers and Web browsers. The function of HTTP is to support the transfer of HTML documents.
HTTP functions in the application layer of the OSI reference model.

How HTTP works?

• HTTP establishes a connection between the Web browser (client) and the Web server
• Negotiates settings and establishes parameters for the session
• Provides for the orderly transfer of HTML content
• Closes the connection with the Web server

What is HTML?

HTML is a computer language, which is used to describe the layout and the format of a document
It is used to create Web pages by including multimedia components such as pictures, sound,
video and animations
4

HTML includes tags which provide instructions about how to display various components in the
document and to provide links to other files and web pages.

HTML features used for designing web pages

1. Tags used to Mark the beginning and end of a heading. Each heading tag represents a different
heading level. Example: <Header> My Page </Header>

2. Tags used to include spaces and blank lines between texts. Example: <Br> My &nbsp; Page

3. Tags used to indicate where illustrations are to be inserted into the text such as:
Changing the font color and size of the text <Font color=”Red” size =”18”> My Page
Making the font of the text bold. Example: <B> My Page
Underlining the text. Example: <U> My Page
Italicizing the text. Example: <I> My Page

4. Tags used to specify an image file within a Web page.


Example: <IMG source=”d:\horse.bmp”> My Page

5. Tags used to mark the beginning and end of a hypertext link.


Example: <A href="http://www.microsoft.Com"> Microsoft Home Page

6. Tags used to insert frames and tables. Tables help dividing the page into different areas.

What is IP address?

IP address is a 32-bit numeric address assigned to a network computer which is used by another
computer to identify the latter.

What is URL?

URL is the address of a web page stored in a web server. It has the format

http://www.bcs.org.uk

What is domain name system (DNS)?

DNS is the name resolution method used on the Internet. DNS divides the namespace into
hierarchical entities called domains.

Web Transactions

1. A Web server provides an online catalog accessible from the Web. A user browses through the
product offerings from a remote location across the Internet.

2. The user decides to buy a product and clicks a “Buy This Product” link on the Web page.
5

3. The server and browser establish a secure connection. At this point, the browser sometimes
displays a message that says something like “You are now entering secure area…” Different
browsers have different methods for indicating a secure connection. Netscape Navigator, for
instance, displays a golden key.

4. After the connection is established, some form of authentication usually follows. On most
transaction sites, the buyer establishes some form of user account with the vendor. This is
partly for security reasons and partly for convenience (so the user can track the status of
purchases). The user account information also lets the vendor track the behavior of the user and
correlate the user’s demographic information and purchase history. This logon step requires the
Web server to contact some form of back end database server, either to establish a new account
or to check the credentials for logon to an existing account.

5. After the user id logged in, the server (or some application working on the server back end)
must verify the credit card authority. Often this credit card authority is a commercial service
affiliated with the credit card company.

6. If the transaction is approved, notice of the purchase and mailing information is transmitted to
the vendors fulfillment department and the transaction application attend to the final details of
confirming the purchase with the user and updating the user’s account profile.

What is email?

This is sending and receiving messages via suitable networks such as the Internet

How email works?

SMTP
Sender’s
Computer Email server

SMTP

Internet

SMTP
Recipient’s
Computer Destination
POP3 or IMAP4 Email
Server

What are the typical facilities of email which would help the user to manage the message?
6

1. Reply - Allows the user to compose a response which is automatically sent to original
correspondent by remembering address

2. Filing - storing the message for future use in a selection of user designed files

3. Forwarding - Making a copy of the message and Forwarding it to another person by using his
or her addresses

4. Multiple forwarding - Sending copy of message to many recipients by using address book

5. Automatic deletion - Removes mail from message box after it has been sent to the recipient to
free up space

6. Blocking - If message is unsolicited and no further messages wanted from that source. Then
the
provider will block future messages from that address

What are the features of email that a manager of a company finds useful when managing a
team of salesmen working in a wide geographical area?

1. An email message is stored in the destination mail server until the recipient is ready to read it.
This helps the sales representative not to be interrupted during a sale

2. Messages can be duplicated and each message can be sent to a number of recipients at a time

3. May want to send a message about a new product or an offer to a representatives in a particular
Area

4. Messages can be forwarded without the need for copying them as messages may be received
from one department and need passing on to another

5. Messages can be encrypted. Therefore stops a rival firm learning trade secrets

6. Positive responses can be given to show that a message has been delivered. Therefore can act
as proof that an employee actually received an instruction

7. Attachments can be used which enables the manager to send brochures to the team about new
Product

What are examples of email readers?

Pine, Eudora, Internet Explorer, Netscape Communicator

What are the functions of an email reader?

1. Sends outgoing messages to an outgoing email server using SMTP


2. Collects incoming email messages from an email server using POP3 or IMAP4
3. Serves as a user interface for reading, managing and composing email messages
7

How Web-based email is implemented?

Web-based email servers do not require an email reader. The user simply visits the Web site with
an Internet browser and accesses the email through a web interface. Therefore the recipient can
access his email from any computer that can reach the Internet.

What is spam?

Spam means receiving mass-mail email messages that clutter the mailboxes of the Internet users.

What is FTP?

1. FTP is a widely used protocol that enables a user to transfer files between two computers on a
TCP/IP network.
2. The user runs an FTP client application on one computer and the other computer runs an FTP
server program.
3. Many FTP client programs are command-line based but graphical versions are available as
well.
4. FTP is used primarily to transfer files although it can perform other functions such as creating
directories, removing directories and listing files.

What is chat room?

A chat room is a form of conferencing using any technology ranging from real-time online chat
over instant messaging and online forums to full graphical social environments.

What are the advantages in using the Internet in conducting a business?

1. The cost of advertising is less as the advertising is done via web sites
2. Can attract a large customer base from all over the world\
3. The company gets the payments for the goods and services as the customers pay for the goods
as they order them
4. Allows for centralized warehousing and distribution
5. Easy to Communicate with the customers
6. Easy to communicate with suppliers
7. Client can have access to his account to check the status of the processing of his order

What is intranet?

An intranet is a private computer network that uses Internet protocols (HTTP and FTP) and
network connectivity to securely share part of an organization's information or operations with its
employees.
8

Advantages of using an intranet

1. The web site will be accessed only by qualified people.


2. Higher proportion of hits to web site will be from interested parties
2. Has a greater chance of finding interesting information because of the smaller number of web
sites available
3. Less chance of coming across misleading or hoax sites
4. Research departments can keep the research results restricted
5. Sensible discussion groups can be set up
6. Allows fast access to data due to the smaller amount of data available
7. Access to the data or the membership can be controlled

Disadvantages of using an intranet

1. A person may lose the chance of sensible comment if he does not have access to the intranet

What is extranet?

An extranet is a private network that uses Internet protocols, network connectivity, and possibly
the public telecommunication system to securely share part of an organization's information or
operations with suppliers, vendors, partners, customers or other businesses.

An extranet can be viewed as part of a company's Intranet that is extended to users outside the
company (Example: normally over the Internet).

What are the problems that can arise due to the confidential nature of the data at a Web
site which allows customer to order and pay for goods

Problems

1. Hackers stealing personal contact details


2. Hackers stealing financial details such as credit card numbers and bank account numbers
3. Hackers stealing data from customer and order databases
4. Workers misusing customer’s personal and financial data by stealing them to other companies
5. Some potential customers could be put off by worries about the use of data

Solutions

1. Use of firewalls
2. Use of packet switching instead of circuit switching
3. Validation of the data at the destination computer by using check digit and parity check
4. Encryption of data using the following techniques:
(a) Public key encryption – which ensures data confidentiality but provides no authentication
(b) Digital signature – which ensures authentication of the data but provides no confidentiality
(c ) Digital certificate – ensures confidentiality of the data but does not provide authentication
5. use of passwords to enter the databases
6. Subjecting workers to data protection legislation and confidentiality contracts
7. Not allowing the workers to bring portable storage devices to the work place
9

8. Company publishing a code of conduct to increase the confidence of the customers

What is data encryption?

Encryption is the process altering data systematically to make it impossible understand to


unauthorized users. Data is encrypted by the sender. The data then travels over the network in
coded, unreadable form. The receiving computer then decrypts data in order to read it.

In what ways the encryption can be helpful in data transmission?

Encryption can be used to ensure confidentiality, authentication and integrity in data


transmission.

What is confidentiality in relation to data transmission?

Confidentiality is making sure that the data will not be read be read by any other person other
than the intended receiver.

What is authentication in relation to data transmission?

Message authentication is the method of ensuring that the message is coming from the person it
claims to be from

What is integrity in relation to data transmission?

Integrity is making sure that data has not been tampered with in transit.

What is encryption algorithm?

The encryption algorithm is essentially a set of mathematical steps used to transform the data
into its unreadable form.

What is the key of an encryption algorithm?

The unique and secret part of the encryption process is called the key. The key is a large number
that is used within the algorithm as a variable. The result of the encryption process depends on
the value of the key. Therefore as long as the value of the key is kept secret, unauthorized users
will not be able to read the data even if they have the necessary decryption software.

How encryption is used to maintain confidentiality of messages?


10

This is done by using two keys known as public key and private key, public key to encrypt the
data and the private key to decrypt the data.

Two methods that can be used to provide confidentiality are public key encryption and digital
certificate.

How encryption is used to maintain authentication of messages?

1. By using a digital signature which is created by using a private key which can only be done by
the owner of the key.

2. By using a digital certificate obtained from an authority such as VeriSign Inc.

Summary

Public key encryption provides confidentiality to data in transit but it does not provide
authenticity

Digital signature provides authenticity to data in transit bit it does not provide confidentiality

Digital certificate provides both confidentiality and authentication to data in transit

How partitioning is used to distribute data on a network?

Part of the data in the database is held locally because it is important for the use of that particular
machine.

How duplication is used to distribute data on a network?

Copy of the entire database sent to and used by other machines

What are the implications to both the data and the network manager of duplicating the
data?

1. Many copies of data available in many machines means that database is always backed up

2. It helps to increase the speed of response to user requests

3. Centralized database is rarely up to date

4. Data is less secured because of multiple copies in many machines

5. Heavy responsibility on network managers to ensure data consistency

Potrebbero piacerti anche