Lecture notes complement 1 Chapters 6, 7 and 8 lecture notes complement for test 3 Dr. Nazih Abdallah - Modern business computer Internet 2 Internetworking: The basic idea behind Internet invention is connecting networks with each other creating a network of networks (MAN or WAN). This process is known as internetworking and several technological steps were already set up that guided to the Internet. Networks may have different topologies and different protocols and to connect them we need to set up a conversion or translation service between them. Connecting networks: Two similar networks (same protocol) are connected by means of a bridge whose job is to connect 2 or more segments and control packet flow between them. Two dissimilar networks (have different protocols) are connected by means of gateway device which provide assistance to make sure the message flows uniformly in both networks Network switch links segments of the network to bridges or gateways. Basic switches don’t process data. A switch that does process data is called multilevel switch because it will be working at a level 3 processing. Dr. Nazih Abdallah - Modern business computer Packet switching 3 Internetworking technology will be impossible with circuit switching that allows fewer messages to use the network pathways simultaneously. Packet switching, on the other hand, optimizes the use of network pathways by dividing each message into parcels of data called packets whose trips take short time. Packets are sent from A to B using most available pathways between them instead of only one like in circuit switching. Consider the following scenario of 9 packets going from A to B. Packet1 takes itinerary I1 Packet2 takes Itinerary I2 and so on… Packet9 takes Itinerary I9 Upon arrival to B, a guide will gather them regroup them and deliver them altogether one message as they initially were. An internetwork is basically a small Internet the biggest internetwork of all networks and internetworks is the Internet that controls our daily life (as individual, community, society, business, government and so on…) Dr. Nazih Abdallah - Modern business computer Internet protocol 4 Internet protocol TCP/IP (Transmission Control Protocol/Internet Protocol) was the right solution where each part fulfills a specific job making the process very fast to handle the huge number of exchanged packets: TCP (Transmission Control Protocol) is the part that takes care of the packet at the origin and destination making sure they are well prepared at the origin and assemble them prior to the correct delivery at the destination. TCP cuts the message into packets below 1500 bytes each because Ethernet protocol in LANs cannot take more than 1500 bytes. IP (Internet Protocol) is the part that takes care of addressing the packets and directs them thru their proper itineraries. Dr. Nazih Abdallah - Modern business computer Internet backbone 5 Internet backbone can be compared to human backbone or spine because it connects every internet host user to other users like human backbone connect to every organ and cell of the human body. This backbone comprises all fast and broad band networks and connections owned by major telecommunication companies (AT&T, Spirit, French telecom, Finn telecom, etc…) all around the world including: Under ocean cables installed by submarines and known as submarine cables that link most continents. Satellites owned and operated by large telecommunications companies because the private sector took over in 1994. Ground high speed telecommunication and networking infrastructure including wired and wireless infrastructure. Dr. Nazih Abdallah - Modern business computer Internet status 6 Nobody own the Internet, however big telecommunication companies own parts of the Internet backbone and make profit by charging use fees so Internet providers can be divided into 3 tiers: Tier 1: comprises huge ISP (Internet Service Provider) companies that don’t need to pay anything to access all nodes of the Internet. Qwest, AT&T, Verizon, sprint, French telecom, Finn telecom etc… Tier 2: comprises ISP companies that need to pay for some access from Tier 1 companies. Tier 3: Comprises ISP companies that lease Internet access from Tier 1 or Tier 2 companies provide services to subscribers and don’t own connections by themselves. Tier 1, Tier 2 and Tier 3 companies are all Internet service providers (ISP)s and that’s why the quality of Internet service is normally better with Tier 1 companies then Tier 2 then Tier 3. Dr. Nazih Abdallah - Modern business computer Internet access 7 Five most important characteristics of Internet access are: Reliability: Connection is available when needed without unexpected interruption due to coverage and weather Speed: Download speed and upload speed in Mbps. Cost should be reasonable and justified. Customer satisfaction oriented help and assistance service Free array of popular general information • • • • News Weather Gaming Travel and entertainment. ISP (Internet Service Provider) provides a modem (modulator demodulator) that is able to accommodate all services provided. Dr. Nazih Abdallah - Modern business computer Internet access methods 8 Dial-up connection: The first used method of access DSL (Digital Subscriber Line) Always On Internet service Provided by telephone companies and uses telephone lines. Because of switching technology provided by the ISP, you can use both the telephone and the Internet simultaneously. Fast Internet that may go up to 6 Mbps. Price is reasonable but much higher than dial-up connection service Cable TV: provides the connection as part of a package that includes TV channels and possible more services like Internet telephone Host must dial a number and wait until getting access. Very slow access impossible to deal with multimedia because it can only handle up to 56 Kbps Uses telephone line so you cannot use the telephone and access the Internet simultaneously (one service at a time) Service is ON only after you dial and be lucky to get connected Still used in some rural areas where there is no fast Internet yet. The least expensive service of all. Always ON connection A splitter modem is provided by the CTV provider that routes TV channels to the TV and Internet service to the computer or the wireless router if you want to install a WI-FI network. You can watch TV and access Internet and its services simultaneously. Very fast connection up to 8 Mbps and may reach up to 50 Mbps in case businesses want speed beyond what is offered for the public. Slightly higher cost than DSL Very reliable (not affected by weather condition. Satellite access: direct satellite access is provided by many companies that operate and manage satellites like HughesNet, My Blue Dish and Wild blue in the USA. Provide fast Internet in rural areas where only dial-up connection or no connection at all is available. Always ON connection Speed may go up to 18 Mbps. Very reliable Internet access Most expensive Internet service. Dr. Nazih Abdallah - Modern business computer VPN (Virtual Private Network) 9 Very important business network that use client server topology May have partly installed local structure. Operates using public networks (mainly the Internet) to exchange private data and make private communications To enforce and enhance communication security a protocol known as “Tunneling” protocol is used. Tunneling protocol usually does the following: Authenticate the client requesting communication to the VPN Create a secured tunnel (pathway). Complete and control the communication thru that tunnel. VPN is used by businesses to create connection possibilities for their Intranet and Extranet as we will see below. Dr. Nazih Abdallah - Modern business computer Intranet 10 Internetwork of many private networks in a company designed to accommodate teamwork and enhance communication and file sharing in a company Uses the Internet protocol TCP/IP Hi security network in a business. Only authorized executives, managers and employees can access it (no outsiders allowed in) An Intranet consists of: Internal e-mail system Database loaded with important information and news about the company and its working environment. Websites and some other services as needed. Secured and firewalled Internet access VPN connection to support remote access for company’s staff. Dr. Nazih Abdallah - Modern business computer Extranet 11 Internetwork like Intranet but with strictly controlled outside access Use VPN (Virtual Private Network) to connect with another network in a different organization. Extranets are widely used by medium and large companies because of the simplicity and convenience they add to business – customer relationship and easiness of communication between businesses. Dr. Nazih Abdallah - Modern business computer VAN (Value – Added Network) 12 considered as a competitor to the post office for business documents and file exchange between businesses. Privately owned highly secured network using private communication media Provides specific services known as VAN services like legal service or translation or accessing special database. Handles electronic mail and file transfer between businesses like EDI (Electronic Data Interchange) transactions. Businesses lease lines to connect to the network and need to install specific software for this purpose. Internet replaced many VANs lately and successfully introduced itself as much efficient and economic tool to replace the VAN. VAN use remains popular between businesses that are seeking high security level when exchanging files Dr. Nazih Abdallah - Modern business computer Search Engine 13 Search engine: like Google help the browser in finding website addresses for clients Software tool that finds related documents from diverse Internet sources using keywords Scour the Web with bots (automated programs) called spiders: Crawling Meta search engine allows users to run keyword searches on several search engines at once Synchronous communication: People communicate in real time exchanging thoughts in a flowing conversation Asynchronous communication: Allows participants to leave messages Dr. Nazih Abdallah - Modern business computer Chat & Instant messaging 14 Chat and Instant messaging Synchronous one-to-one text-based communication over the Internet Instant messaging software supports the following services Instant messages Chat Nudges, animated winks, and graphics Web links Image, sounds Files and file sharing Talk Streaming content Chat: Synchronous text messaging between two or more users Channels or chat rooms: Topic-related forums Virtual chat: Provides a virtual world to chat and interaction with others: Avatar provides 3D representation of yourself in the virtual world Dr. Nazih Abdallah - Modern business computer Other web services 15 Text messaging (Short Message Service or SMS): Method for sending short messages between cell phones: Not longer than 160 characters. Web Logs (Blogs): Sites created to express the views and opinions of an individual Originally used as online journals, but as they became more mainstream, tools were developed to aid users in creating blogs and RSS reader is a tool used to subscribe to a blog Dr. Nazih Abdallah - Modern business computer Viruses and Worms Virus Program that attaches itself to a file Spreads to other files, and delivers a destructive action called a payload Time bomb: Virus that delivers payload on a specific time (birthday of celebrity, anniversary of an incident, etc…) Logic bomb: delivers payload on specific conditions (click a link, open a file, boot, etc…) Trojan horses Appear to be harmless programs When they run, they install programs on the computer that can be harmful Backdoor Trojans open ports on the computer for hackers access. Worm : Acts as a free agent, replicating itself numerous times in an effort to overwhelm systems causing denial of service attack on a network (traffic jam). War driving: Driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks. 16 Defending Against Viruses and Worms Antivirus software uses several techniques to: Find viruses: 2 steps: Detect the virus presence using Checksum of the file. Checksum is the actual number of bytes in the file saved by the AV software and compared to the new number. If the numbers are different there should be a virus. Find the identity of the virus by comparing its signature to the available list of virus signatures. AV then removes them if possible or quarantine them until they can be removed. Keep additional viruses from infecting the system 17 Information Security and Vulnerability Organizational information Compromised information can lead to Loss of market share Business failure Business intelligence Process of gathering information in the pursuit of business advantage Competitive intelligence Concerned with information about competitors Counterintelligence Concerned with protecting your own information from access by your competitors 18 National and Global Security Cyber-terrorism Uses attacks over the Internet to intimidate or harm a population United States Computer Emergency Readiness Team (US-CERT) Monitors the security of US networks and the Internet Responds to attacks National Strategy to Secure Cyberspace Prevent cyber-attacks against US infrastructure Reduce national vulnerability to cyber-rattack Minimize damage and recovery time 19 Threats to Information Security: Hackers, Crackers, Intruders, and Attackers System penetration: Someone subverting the security of a system without authorization Hackers, crackers, intruders, and attackers Hackers convene every year in Las Vegas the convention is nicknamed HOPE (Hackers On Planet Earth): Media, businesses and government specialists attend the convention to be aware of new hacking and security advances . White-hat hacker: No criminal intention, Don’t make money THEY MAY BE HIRED BY BUSINESSES TO CHECK AND CONSOLIDATE THEIR NETWORK SECURITY (in this case they make legally money). Black-hat hacker: Criminal intention, make money (cracker). Gray-hat hacker: Can be either one Script kiddie: Try to gain access to a network using scripts of other hackers. Computer forensics Process of examining computer equipment to determine if it has been used for illegal, unauthorized, or unusual activities 20 Machine-Level Security Common forms of authentication Something you know Something you have Password or personal identification number (PIN) ID cards, smartcards, badges, keys, Something about you Unique physical characteristics such as fingerprints 21 ID Devices and Biometrics Biometrics The science and technology of authentication by scanning and measuring a person’s unique physical features Facial pattern recognition Uses mathematical technique to measure the distances between 128 points on the face Retinal scanning Analyzes the pattern of blood vessels at the back of the eye Fingerprint scan Increasingly common method for access to secure areas, logging onto computers, and even validating credit 22 Encrypting Stored Data Encryption Uses high-level mathematical functions and computer algorithms to encode data Files Can be encrypted “on the fly” as they are being saved, and decrypted as they are opened Encryption and decryption Tend to slow down computer slightly when opening and saving files 23 Backing up Data Files Backup software typically provides the following options Select the files and folders you wish to back up Choose the location to store the archive file (back-up location must be away from actual system location) Choose whether to back up all files (a full backup), or just those that have changed since the last backup (an incremental backup) Mirroring Creating a copy of the file system or a portion of it Real-time mirroring: As files are saved, they are automatically updated in the mirrored back-up copy. 24 Scams, Spam, Fraud, and Hoaxes Virus hoaxes E-mail that warns of a virus that doesn’t exist In some cases, just a nuisance, but they can cause great harm in other cases Hoax may ask you to delete a “virus” file that is actually an uninfected, important system file Deleting such a file may make your computer unusable 25 Scams, Spam, Fraud, and Hoaxes Defending against scams, spam, fraud, and hoaxes Awareness and common sense Do not click links sent by e-mail Type URLs directly into the browser Examine Web addresses to make sure they are legitimate Do not believe virus alerts sent through e-mail unless they come from a reputable source Use spam filters 26
© Copyright 2026 Paperzz