Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
28 views5 pages

ICT Chapter 4 Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 5

Wireless local area network (WLAN)

Wireless LANs are similar to LANs, but there are no wires or cables. They provide wireless
network connection.
● APs are fixed in place to enable wireless network connections.
● Multiple APs are often necessary for seamless coverage in expansive areas.
● APs employ either spread-spectrum technology or infrared signals.
● Spread-spectrum spans 30 to 50 meters, whereas infrared is limited to 1-2 meters and
susceptible to blockages.
● APs mediate data exchange between WLANs and wired networks.
● End-users access WLANs via built-in wireless LAN adapters on their devices.
WIRELESS NETWORKING WIRED NETWORKING

It is easier to expand the networks and it is not Using cables produces a more reliable and
necessary to connect the devices using cables. stable network.

This gives devices increased mobility, as long Date transfer rates tend to be faster and there
as they are within range of the APs. will not be any ‘dead spots’

Safety improvement and increased flexibility.

Increased chance of interference from external Tends to be cheaper to set up and buy cabled
sources. networks.

Data is less secure than with wired systems. Cabled networks lose the ability to be mobile.

Data transmission rate is slower than cabled Having lots of wires can lead to a number of
networks. hazards, such as tripping hazards or over-
heating of connections.
Signals can be stopped by thick walls.

Wide area networks (WAN)


Wide area networks (WANs) are used where computers or networks are situated a long distance
from each other geographically (for example in a different city or country).
● LANs can be connected via a router to form WANs.
● ATMs in banks illustrate common WAN usage.
● WANs utilize public networks like telephone lines or satellites, or dedicated/leased lines
for security and cost-efficiency.
● WANs consist of end systems (e.g., computers) and intermediate systems (e.g., routers).
● WANs span significant distances, especially in multinational networks.
● Network sizes: WAN (100km to over 1000 km), MAN (1km to 100km), LAN (10m to 1km).
4.2 Network issues and communication
4.2.2 Passwords
Passwords are used in many instances when accessing the internet. For example:
● When accessing your email account
● When carrying out online banking
● Accessing social networking sites
There are many more instances where you might need passwords.
● Protecting passwords is done by anti-spyware software and changing them regularly.
● Avoid easily guessable passwords such as common words or personal information.
● Strong passwords should include capital letters, numbers, and special characters.
● Example of a strong password: Sy12@#TT90kj=0
● Example of a weak password: GREEN1

4.2.3 Other authentication methods


Passwords are one of the most common types of authentication, some of the other ways are:
● Xero login and biometrics
○ The FIDO Alliance and W3C introduced a new standard called Zero Login.
○ Zero Login relies on biometrics and behavioral patterns for user identification.
○ Biometric features like fingerprint and facial recognition are already used in
smartphones for authentication.
○ Behavioral patterns such as walking style and typing speed contribute to the user
profile.
○ Zero Login offers enhanced security and quicker access but raises concerns about
user monitoring, logout notification, and overall protection.
● Magnetic stripes
○ Magnetic stripe cards use tiny magnetic particles on a plastic film to store data, read
by swiping through a card reader.
○ Data on the stripe can include name, ID number, etc., used for security purposes like
building access.
○ Some cards incorporate holographic images to deter forgery, while others feature
user photographs for added security.
○ Advantages: Easy to use, cost-effective, can be deactivated remotely, and have
multiple applications.
○ Disadvantages: Less secure than biometric methods, prone to wear out, and
magnetic readers may fail to read cards on the first attempt.
● Smart cards
○ Smart cards store data like name and security number, functioning as contactless
security devices.
○ Require PIN entry for access.
● Physical tokens
○ Solid objects used for authentication, generating one-time passwords (OTPs) with
internal clocks.
○ In banking, customers use physical tokens for multi-factor authentication: insert
card, enter PIN, generate OTP, and use it to access the bank website.
○ Enhances security by requiring both the token device and the card with PIN.
○ Two types: disconnected (manual entry via keypad) and connected (transmit OTP
directly to computer via USB).
● Electronic tokens
○ Software installed on a user's device, like a smartphone, for authentication.
○ Generates a one-time password (OTP) valid for less than a minute.
○ Users open the app on their device when prompted by the website.
○ OTP, along with other authentication methods like PIN or biometrics, is entered on
the website.
○ Both the server and device have synchronized clocks for OTP generation.
○ Once verified, the user gains access to the website.

4.2.4 Anti-malware software


● Loaded onto computers to scan for viruses in software and devices.
● Essential for checking downloaded or transferred data.
● Runs in the background, constantly checking for virus attacks.
● Common features include:
● Pre-checking software/files before execution.
● Comparing against a database of known viruses.
● Conducting heuristic checks for potential virus behavior.
● Quarantining infected files/programs for deletion.
● Requires regular updates to keep up with new viruses.
● Weekly full system scans necessary to detect dormant viruses.

4.2.5 Electronic conferencing


There are three types of electronic conferencing:
● Video conferencing:
○ Combines video and sound for remote communication.
○ Used as an alternative to face-to-face meetings, enabling real-time interaction.
○ Basic hardware includes webcams, monitors/TV screens, microphones, and
speakers.
○ Considerations before a conference:
■ Agree on time and date.
■ Delegates must log into the system.
■ Check video-conference setup.
■ Position webcams for visual contact.
■ Place microphones centrally for clear audio transmission.
○ Designate a main contact in each room for effective communication, especially in
multi-room conferences.
○ Software also plays a crucial role in successful video conferencing.
SOFTWARE DESCRIPTION

WEBCAM AND It is important that the correct software is used to ensure that the
MICROPHONE DRIVERS webcam and microphone transmit their images and sound.

CODEC CODEC can stand for COder and DECoder. The first is used to
decode and the second is used to compress the data before it is
transmitted.

ECHO CANCELLATION This allows talking to take place in real time and permits the
SOFTWARE synchronization of communication.

● ADVANTAGES OF VIDEO CONFERENCING:


○ Easier access to documents and experts within the building.
○ Enables conferences to be arranged at short notice.
○ Reduces costs associated with travel, accommodation, and lost work time.
○ Safer alternative to traveling to potentially unsafe locations.
○ Environmentally friendly by reducing pollution from travel.
○ Connects people across different locations within an organization.
● DISADVANTAGES OF VIDEO CONFERENCING
○ Potential time lag in response/delays when talking
○ Images can jerk
○ It can be very expensive to set up in the first place
○ Time zone difference
○ Training of how to use the system can costly and time consuming
○ Demotivating for people who like international travel
○ If the network is bad the video conference can be almost unusable

● Audio conferencing:
○ Audio conferencing refers to meetings held between people using audio equipment.
○ Organizers and participants are given unique PINs by the phone company.
○ Organizers initiate the conference by dialing the conference number and entering
their PIN.
○ Participants join by calling the same number and inputting their respective PINs.
○ EQUIPMENT:
■ A computer (with built-in microphones and speakers
■ External microphone and/or speakers
■ An internet phone
■ A standard phone.
○ Using VoIP allows for group creation and communication via voice, instant
messaging, and video.
○ Users without internet access or a computer can join using telephone numbers.
○ Drawback: sound quality may vary based on the stability of the broadband
connection, leading to issues like dropouts, echoing, or noise interference.
● Web conferencing:
○ Web conferencing (often referred to as a webinar or webcasts) uses the internet to
permit conferencing to take place.
○ It allows the following meetings to take place:
■ Business meetings to discuss new ideas
■ Presentations
■ Online education or training.
○ The only requirement is a computer and a high-speed, stable internet connection.
○ Some of the main features include:
■ Slide presentations
■ Screen sharing
■ Possible to write on a ‘whiteboard’
■ Possible to transmit images or videos
■ Documents can be shared
■ Possible to chat verbally or using instant messaging throughout the
conference.
○ It is possible to have a conference using any device which allows these functions
(for example; tablets and smartphones permit this type of group communication).

You might also like