![Peer-To-Peer Networks](https://data.docslib.org/img/3a60ab92a6e30910dab9bd827208bcff-1.webp)
<p> Technology 7</p><p>Peer-to-Peer Networks Client-Server Networks Nodes</p><p>Transmission Media Existing Wiring Twisted Pair Coaxial Cable Fiber-Optic Cable Wireless Connections</p><p>Data Transfer Rate (Bandwidth) -- Maximum Speed of Data Transfer Throughput – Actual Speed of Data Transfer Data Transfer Rate – Megabits per Second – Mbps (one million bits per second)</p><p>Network Adapters – devices that enable nodes to communicate External Network Adapters Network Interface Cards (NIC)</p><p>Packets</p><p>Network Navigation Devices Router – transfer packets of information between networks Switches – sends packets to selected nodes on the same network</p><p>Peer-to-Peer Networks Wired Ethernet Networks Wireless Ethernet Networks Power-Line Networks</p><p>Wired Ethernet Networks – IEEE 802.3 Standard Efficient Transfer of Data Complex Data Transfer Algorithms Fast, Reliable NIC Cards -- 1,000 Mbps Equipment Unshielded Twisted Pair (UTP) Cables -- page 319 for details wrt specific UTP features Network Navigation Devices Repeaters – devices that amplify data signals o required for cable runs over 328 feet o maximum run limited to 600 feet Ethernet Switches o sends packets to selected nodes on the same network o sends a specific packet only to the node to which it should be sent o keeps track of the data packets o in conjunction with the NIC cards, guides the data packets to their final destination o keeps the network running efficiently Hubs – retransmits data signals, ie., data packets to all nodes attached to it</p><p>Wireless Ethernet Networks – IEEE 802.11 (WiFi) Standard See www.ieee.org for details wrt IEEE 802.11b, IEEE 802.11g standards Wireless Network Adapter Cards o Transceiver . converts electronic signals to &/or from radio signals . transmit and receive radio signals Wireless Router o Transceiver . converts electronic signals to &/or from radio signals . transmit and receive radio signals Range & Quality of Transmission o Maximum Range 250 feet o 802.11b & 802.11g devices transmit on a bandwidth of 2.4 GHz o cell phones transmit on a bandwidth of 2.4 GHz Wireless Access Point Device – extends the range of a wireless network o connect directly to the router o connect to a node that is within range of the router</p><p>Power-Line Networks HomePlug Power Line Alliance – www.homeplug.org Data Transfer Rate -- 200 Mbps Attach a Power-Line Network Adapter to each Node (computer) Plug the Power-Line Network Adapter into an electrical outlet</p><p>Historical Cost Analysis (page 327)</p><p>Cybercrime Hackers – anyone who unlawfully breaks into a computer system White-Hat Hackers (testing a systems vulnerabilities) Black-Hat Hackers (malicious intent) o Financial Benefit o Industrial Espionage o International Governmental Espionage . W32/Conficker.worm.gen.d Script Kiddies – use tools created by hackers to break into systems Packet Sniffer program that searches all packets traveling through a specific node, looking for vital financial &/or other useful information, e.g., credit card numbers, bank account numbers & passwords, e-commerce login names & passwords, social security numbers, birthdates, etc. Copier Machines – hard drives – tax returns Identity Theft (see page 336) Trojan Horses o Appears to do something useful or desirable o Does something malicious in the background o Installation of Backdoor Programs o Zombie Computers Denial of Service Attacks (DoS) Distributed Denial of Service Attacks (DDoS) o Hackers use numerous zombie computers to repeatedly request bogus service from a service provider; the requests overwhelm the service providers computer systems to the point where they shut down</p><p>Unrelated Topic www.problogger.net is a site dedicated to helping bloggers earn money from their blog sites</p><p>Logical Ports Virtual, i.e., software, communication paths that allow a computer to organize requests for information from other networks or computers Each port is numbered and assigned to a specific service o HTTP – port 80 o Simple Mail Transfer Protocol (SMTP) – port 25</p><p>Firewalls Software Firewalls o Norton Personal Firewall o McAfee Firewall o ZoneAlarm o BlackICE PC Protection Hardware Firewalls – Network Address Translation (page 338-339) o Linksys Routers Routers without NAT cannot provided o D-Link Routers Firewall Protection o Netgear Routers Security Test – www.grc.com Wireless Networks o Firewall o Change the Service Set Identifier, i.e., router name o Disable the SSID Broadcast feature – keeps the router from broadcasting the SSID o Change the router password o Security Protocols – Encryption Key Required for access . Wired Equivalent Privacy (WEP) -- weaker encryption code . Wi-Fi Protected Access (WPA) -- stronger encryption code o Implement the Media Access Control feature . each Network Adapter has a unique number assigned to it by the manufacturer, the Media Access Control Number (MAC Address) . restrict network access to designated MAC Address devices o Apply Firmware Upgrades – router has a read-only memory chip with software, i.e., firmware, written on it; manufacturers issue updates, i.e., “patches”; periodically check the manufacturer’s website and apply the necessary upgrades</p><p>Viruses -- program fragments that attach to other programs attempt to hide within the host program replicate itself attach it’s replicates to other programs side affects o malicious intent o innocuous intent types of viruses o Boot-Sector Viruses . Master Boot Record is a program that executes whenever the computer is started; this ensures that the virus is loaded into memory before the virus protection programs become active . Potentially very destructive, e.g., format t hard drive o Logic Bombs -- triggered when certain conditions are met o Time Bombs – triggered by the passage of time or on a certain date o Script Viruses – series of commands embedded in websites . automatically run when you visit the website . Amazon.com scripts allow you to purchase items from the site . E-mail website links – potential source of script viruses o Macro Viruses – . Macros are series of commands which may be attached to any MS Office Product, e.g., MS Word . Opening the infected document triggers the virus which then infects other documents of the same type o Encryption Viruses . Virus searches for common data files, e.g., MS Word documents . Encrypts the files with a complex encryption method . Requests, via e-mail, payment of a fee for the encryption code and key</p><p> Worms – programs that travel between systems via network connections o can run independently of a host program execution o very active in spreading themselves o exploits weaknesses in the Windows Operating System o antivirus software is ineffective against worms o firewalls with up to date patches applied are effective Technology 8</p><p>EDGE – Enhanced Data Rate for Global Evolution & EVDO – Evolution Data Optimized data transfer rate ≥ 700 Kb/sec hence improved multimedia access wide area coverage less interference – fewer dropped calls</p><p>Music File Formats MP3 ACC WMA</p><p>Napster – P2P Sharing -- centralized index server Pre June 2002 – free downloads Post June 2002 – sells access to music files</p><p>Gnutella & Kazaa – P2P Sharing – facilitates connections between interested parties </p><p>Podcasting</p><p>PDA faster processors than cell phones more powerful than cell phones slightly larger than cell phones decreased battery life compared to cell phones synchronization of data files with computer system -- cradle synchronization of data files with other PDA’s o IrDA wireless -- infrared waves o Bluetooth wireless -- radio waves WAP – Wireless Application Protocol</p><p>Smartphones Palm Treo 700wz – PDA with the following capabilities added o Cellphone o EVDO o Bluetooth o PMP features – multimedia T-Mobile SDA – Cellphone with the following capabilities added o Email access o Internet access</p><p>New Gadgets www.gizmodo.com Tablet PC Portable computer Electronic clipboard – advanced handwriting recognition Digital Ink o Pressure sensitive screen o Hand drawn images . stored as hand drawn picture images . converted to & stored as rectified graphic images Software keyboard displayed on the screen Bluetooth or WiFi connectivity Docking Station</p><p>GPS – Global Positioning System -- 21 satellites</p><p>Notebooks Hot-swappable bays Battery Life Extension o turn off computer when not in use o install maximize amount of RAM o turn off wireless capabilities when not in use o charge batteries to maximum amount – don’t partially charge system o minimize the use of DVD drives security lock portable surge protector collaboration software o www.colligo.com o Windows Meeting Space</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-