Académique Documents
Professionnel Documents
Culture Documents
Advantages of a network
● share resources
● share storage
● improve Communications
● Share software
Disadvantages of a network
● Systems are more sophisticated and complex
● Cost effective
● Less secure
Interspace: Interspace is a client or server software program that allows multiple users to
communicate online with the real time audio, video and text chat in dynamic 3D
environment.
Nodes: The term nodes refer to the computers that are attached to a network and are
seeking to share resources of the network (also called as workstations).
Server: A computer that facilitates the sharing of data, Software and Hardware resources
(eg. printers modems etc.) on the network is termed as a server.
Network interface unit (NIU): A network interface unit is an interpreter that helps establish
communication between the server and workstations.
Bandwidth: it refers to the difference between the highest and lowest frequencies of a
transmission channel.
It is directly proportional to the amount of data transfer did not receive per unit time.
Crosstalk: The bleeding of a signal from one wire to another and which can corrupt signal
and cause network errors.
Coaxial cable: this type of cable consists of a solid wire Core surrounded by one or more
foil or wire shields, each separated by some kind of plastic insulator.
It is widely used for television signals it provides the cheap means of transporting multi -
channel television signals around Metropolitan areas.
Radio wave:
● Used on mountains
● As a dial up connection
● Economic
Satellite:
● Fastest
● Wireless
● Efficient
Infrared: Used in
● TV remote
● Garage doors
● Wireless speakers
Types of networks:
● Local Area Network (LAN) 100m
● Metropolitan Area Network (MAN) < 250 km
● Wide Area Network (WAN) > 250 km
● Personal Area Network (PAN) 10m
LAN WAN
Star topology:
● Advantages
○ Ease of service
○ One device per connection
○ Centralised control/problem diagnosis
○ Simple access protocols
● Disadvantages
○ Long cable length
○ Difficult to expand
○ Central node dependency
● Disadvantages
○ Fault diagnosis is difficult
○ Fault isolation is difficult
○ Nodes must be intelligent
○ Repeat configuration
● Advantages
○ Short cable length
○ No wiring, closet space required
○ Suitable for optical Fibres
● Disadvantages
○ Node failure causes Network failure
○ Difficult to diagnose faults
○ Network reconfiguration is difficult
Modem: It is a computer peripheral that allows you to connect and communicate with other
computers via telephone lines.
Hub: It is a hardware device used to connect several computers together Hubs can either
be active or passive.
Switch: It is a device that is used to segment networks into different subnetworks.
Repeater: it is a network device that amplifies and restore signals for long distance
transmission. They are required after every 100m.
Bridge: It is a network device that establishes an intelligent connection between two local
networks.
Wi-Fi card: It is either an internal or external LAN adapter with a built in wireless radio and
antenna.
Mobile Computing: It means that the computing device is not continually connected to the
base or central Network.
GPRS: It is a technology for radio transmission of small packets of data esp. between device
and Internet.
Web Browser: It is a www client that navigates through the world wide Web and displays
Web pages.
Web Server: It is a www server that responds to the requests made by web browsers.
Protocol: It is a set of rules that two or more machines follow to exchange information.
URL: It specifies the distinct address for each resource on the internet. An internet address
which is character based is called Domain Name.
Web Scripting
Client side Scripting Server side Scripting
script code is downloaded and executed at The script is executed at the server end
client end and the result is sent to a client end
Services are secure as they do not have Have access to files and databases but
access to files and databases have security considerations when sending
sensitive information
Affected by the processing speed of user’s Affected by the processing speed of the
computer host server
Protection Methods
● Authorization: it determines whether the service provided has granted access to the
web service to the requestor. It is done by asking the user a legal login-id.
● Authentication: It ensures that each entity involved in using a web service - the
requested, the provider and the broker is what it actually claims to be.
● Biometric Systems: It is the most secure level of authorisation.
● Firewall: a system designed to prevent unauthorised access to or from a private
network is called firewall. It can be implemented in both hardware and software or a
combination of both.
Cookies: Cookies are messages that a web server transmits to a web browser so that the
web server can keep track of the user's activity on a specific website.
The Crackers are the malicious programmers who break into security systems whereas
Hackers are more interested in gaining knowledge about computer systems and possibly
using this knowledge for playful pranks.
Cyberlaw: it is a generic term which refers to all the legal and regulatory aspects of Internet
and the world wide web.
IT Amendment Act 2008
Cyber Crimes
● Tampering with computer source documents
● Hacking
● Publishing of information which is obscene in electronic form
● Child pornography
● Accessing protected system
● Breach of confidentiality and privacy
Intellectual property: It may be defined as a product of intellect that has commercial value,
including copyrighted property such as literary or artistic works, and ideational property.
Computer virus: It is a malicious program that requires a host and is designed to make a
system sick.
Trojan horse: It is a code hidden in a program such as a game or spreadsheet that looks
safe to run but has hidden side effects.
MAGIC Mobile Multimedia, Anywhere, Global mobility solutions over, Integrated wireless
and Customized services