Technology 7

advertisement
Technology 7
Peer-to-Peer Networks
Client-Server Networks
Nodes
Transmission Media
 Existing Wiring
 Twisted Pair
 Coaxial Cable
 Fiber-Optic Cable
 Wireless Connections
Data Transfer Rate (Bandwidth) -- Maximum Speed of Data Transfer
Throughput – Actual Speed of Data Transfer
Data Transfer Rate – Megabits per Second – Mbps (one million bits per second)
Network Adapters – devices that enable nodes to communicate
 External Network Adapters
 Network Interface Cards (NIC)
Packets
Network Navigation Devices
 Router – transfer packets of information between networks
 Switches – sends packets to selected nodes on the same network
Peer-to-Peer Networks
 Wired Ethernet Networks
 Wireless Ethernet Networks
 Power-Line Networks
Wired Ethernet Networks – IEEE 802.3 Standard
 Efficient Transfer of Data
 Complex Data Transfer Algorithms
 Fast, Reliable
 NIC Cards -- 1,000 Mbps Equipment
 Unshielded Twisted Pair (UTP) Cables - page 319 for details wrt specific UTP features
 Network Navigation Devices
 Repeaters – devices that amplify data signals
o required for cable runs over 328 feet
o maximum run limited to 600 feet
 Ethernet Switches
o sends packets to selected nodes on the same network

o sends a specific packet only to the node to which it should be sent
o keeps track of the data packets
o in conjunction with the NIC cards,
guides the data packets to their final destination
o keeps the network running efficiently
Hubs – retransmits data signals, ie., data packets to all nodes attached to it
Wireless Ethernet Networks – IEEE 802.11 (WiFi) Standard
See www.ieee.org for details wrt IEEE 802.11b, IEEE 802.11g standards
 Wireless Network Adapter Cards
o Transceiver
 converts electronic signals to &/or from radio signals
 transmit and receive radio signals
 Wireless Router
o Transceiver
 converts electronic signals to &/or from radio signals
 transmit and receive radio signals
 Range & Quality of Transmission
o Maximum Range 250 feet
o 802.11b & 802.11g devices transmit on a bandwidth of 2.4 GHz
o cell phones transmit on a bandwidth of 2.4 GHz
 Wireless Access Point Device – extends the range of a wireless network
o connect directly to the router
o connect to a node that is within range of the router
Power-Line Networks
HomePlug Power Line Alliance – www.homeplug.org
 Data Transfer Rate -- 200 Mbps
 Attach a Power-Line Network Adapter to each Node (computer)
 Plug the Power-Line Network Adapter into an electrical outlet
Historical Cost Analysis (page 327)
Cybercrime
 Hackers – anyone who unlawfully breaks into a computer system
 White-Hat Hackers (testing a systems vulnerabilities)
 Black-Hat Hackers (malicious intent)
o Financial Benefit
o Industrial Espionage
o International Governmental Espionage
 W32/Conficker.worm.gen.d
 Script Kiddies – use tools created by hackers to break into systems
 Packet Sniffer program that searches all packets traveling through a
specific node, looking for vital financial &/or other useful information, e.g.,
credit card numbers, bank account numbers & passwords, e-commerce
login names & passwords, social security numbers, birthdates, etc.





Copier Machines – hard drives – tax returns
Identity Theft (see page 336)
Trojan Horses
o Appears to do something useful or desirable
o Does something malicious in the background
o Installation of Backdoor Programs
o Zombie Computers
Denial of Service Attacks (DoS)
Distributed Denial of Service Attacks (DDoS)
o Hackers use numerous zombie computers to repeatedly request bogus
service from a service provider; the requests overwhelm the service
providers computer systems to the point where they shut down
Unrelated Topic
www.problogger.net is a site dedicated to helping bloggers earn money from their blog sites
Logical Ports
 Virtual, i.e., software, communication paths that allow a computer to
organize requests for information from other networks or computers
 Each port is numbered and assigned to a specific service
o HTTP – port 80
o Simple Mail Transfer Protocol (SMTP) – port 25
Firewalls
 Software Firewalls
o Norton Personal Firewall
o McAfee Firewall
o ZoneAlarm
o BlackICE PC Protection
 Hardware Firewalls – Network Address Translation (page 338-339)
o Linksys Routers
Routers without NAT cannot provided
Firewall Protection
o D-Link Routers
o Netgear Routers
 Security Test – www.grc.com
 Wireless Networks
o Firewall
o Change the Service Set Identifier, i.e., router name
o Disable the SSID Broadcast feature – keeps the router from
broadcasting the SSID
o Change the router password
o Security Protocols – Encryption Key Required for access
 Wired Equivalent Privacy (WEP) -- weaker encryption code
 Wi-Fi Protected Access (WPA) -- stronger encryption code
o Implement the Media Access Control feature
 each Network Adapter has a unique number assigned to it by the
manufacturer, the Media Access Control Number (MAC Address)
 restrict network access to designated MAC Address devices
o Apply Firmware Upgrades – router has a read-only memory chip with
software, i.e., firmware, written on it; manufacturers issue updates, i.e.,
“patches”; periodically check the manufacturer’s website and apply the
necessary upgrades
Viruses -- program fragments that
 attach to other programs
 attempt to hide within the host program
 replicate itself
 attach it’s replicates to other programs
 side affects
o malicious intent
o innocuous intent
 types of viruses
o Boot-Sector Viruses
 Master Boot Record is a program that executes whenever the
computer is started; this ensures that the virus is loaded into
memory before the virus protection programs become active
 Potentially very destructive, e.g., format t hard drive
o Logic Bombs -- triggered when certain conditions are met
o Time Bombs – triggered by the passage of time or on a certain date
o Script Viruses – series of commands embedded in websites
 automatically run when you visit the website
 Amazon.com scripts allow you to purchase items from the site
 E-mail website links – potential source of script viruses
o Macro Viruses –
 Macros are series of commands which may be attached to any MS
Office Product, e.g., MS Word
 Opening the infected document triggers the virus which then infects
other documents of the same type
o Encryption Viruses
 Virus searches for common data files, e.g., MS Word documents
 Encrypts the files with a complex encryption method
 Requests, via e-mail, payment of a fee for the encryption code and key

Worms – programs that travel between systems via network connections
o can run independently of a host program execution
o very active in spreading themselves
o exploits weaknesses in the Windows Operating System
o antivirus software is ineffective against worms
o firewalls with up to date patches applied are effective
Technology 8
EDGE – Enhanced Data Rate for Global Evolution & EVDO – Evolution Data Optimized
 data transfer rate ≥ 700 Kb/sec
hence improved multimedia access
 wide area coverage
 less interference – fewer dropped calls
Music File Formats
 MP3
 ACC
 WMA
Napster – P2P Sharing -- centralized index server
 Pre June 2002 – free downloads
 Post June 2002 – sells access to music files
Gnutella & Kazaa – P2P Sharing – facilitates connections between interested parties
Podcasting
PDA
 faster processors than cell phones
 more powerful than cell phones
 slightly larger than cell phones
 decreased battery life compared to cell phones
 synchronization of data files with computer system -- cradle
 synchronization of data files with other PDA’s
o IrDA wireless -- infrared waves
o Bluetooth wireless -- radio waves
 WAP – Wireless Application Protocol
Smartphones
 Palm Treo 700wz – PDA with the following capabilities added
o Cellphone
o EVDO
o Bluetooth
o PMP features – multimedia
 T-Mobile SDA – Cellphone with the following capabilities added
o Email access
o Internet access
New Gadgets
www.gizmodo.com
Tablet PC
 Portable computer
 Electronic clipboard – advanced handwriting recognition
 Digital Ink
o Pressure sensitive screen
o Hand drawn images
 stored as hand drawn picture images
 converted to & stored as rectified graphic images
 Software keyboard displayed on the screen
 Bluetooth or WiFi connectivity
 Docking Station
GPS – Global Positioning System -- 21 satellites
Notebooks
 Hot-swappable bays
 Battery Life Extension
o turn off computer when not in use
o install maximize amount of RAM
o turn off wireless capabilities when not in use
o charge batteries to maximum amount – don’t partially charge system
o minimize the use of DVD drives
 security lock
 portable surge protector
 collaboration software
o www.colligo.com
o Windows Meeting Space
Download