Saturday, 30 April 2016

Salt Spray Adventures: The Solution

Salt Spray Adventures requires a network solution that allows employees to manage their bookings via email, their website and to manage keeping correct records of their tours to keep everyone safe.

Salt Spray Adventures requires a Wide Area Network that includes an Intranet where each employee must have a personal account to access their emails and the server that manages their accounts.

Since there are three locations where tour guides must access their intranet that are across town, it's important that connection to their Internet Service Provider is available at each location either by cable or by wifi.

This will enable cheap access for tour guides to be in contact with the office regardless of whether they area the boathouse or at the lighthouse.

Please see the diagram below includes all protocols, software, transmission mediums and hardware device required for this solution. Please note that wifi is available in all three locations to allow the tour guides to continue to use their tablets.


Students who thought Optical Fibre backbone dug into the streets of Byron Bay for over 2km was a reasonable solution need to look at these videos that offers a distinction between a LAN and a WAN: 



Wednesday, 27 April 2016

Away again.... soz!


Hi Guys,

You have HEAPS to do!

Network SAC due Friday 29th April
Network Topic Test Friday 6th May
Chapter 4 Questions (even numbers only)

Dermott????  Where are the Questions?????



Network Stuff's

Hey, I found a very helpful link for those who are finding it hard to differentiate or understand network Stuff's:
http://www.bensbookmarks.com/types_networks_lan_wan_intranet_osi_model.htm

Make sure you subscribe to Tech4K: https://www.youtube.com/c/Tech4K

Tuesday, 26 April 2016

Collabartion and Communication

Collaboration and Communication

Digital System- Software/Hardware that processes digitalised data.
I will finish this soon!

Referencing Examples (ACA)

Here is a list of examples of ACA style refencing:
http://pitt.libguides.com/c.php?g=12108&p=64730

Research- Primary and Secondary Data

Research- Primary and Secondary Data 

Primary data- collected yourself

Secondary data- Already published data

How do we collect Primary data?

Primary- Surveys, Observations, Questionnaires, Interviews, Focus groups

Secondary- Newspapers, internet- identified as appropriate reliable sources, authorities, academic journals, textbooks, case studies.

Referencing Secondary Source

Example-
High school students at Hume Grammar have used p2p networks such as pirate bay for the purpose of pirating movies and music. (You found this out through primary research methods)

Indent for quote- “A growing number of students in Australia illegally pirate movies” (Author(year)

References (Bibliography)
Author, year, name of text

Example -
We found that, like many students around Australia,that Hume Grammar students pirate movies.( Author, Year)
                                                                          |                                 |
                                                                     Authors info               Your info

Need to be aware of at least ONE referencing style that allows you to identify your sources including-

Book-  Author,(year) Name of book, Publishing information

Website- Name of website, (Year (when the site was published), Retrieved (when the site was visited)


Book chapers- Author,C., (Year), Name f chapter, Name of book,page numbers, publishing details.

Thursday, 21 April 2016

Iron Five!


Security

Security

Networks provide opportunity for threat to data all the time!.

Deliberate threats include the following malware- Viruses, Adware, Hacking (So 1980s), Keyloggers, Spyware, Worms, Trojans, Logic Bombs and Phishing.

Viruses- Embed in programs to be malicious (Deleting Files).

Spyware- Sends your data to a 3rd party.

Key loggers- Counts and records key strokes.

Adware- Embeds into programs (mostly browsers) to display advertising.

Logic Bomb- Triggered by an event to do something malicious.

Worm- Fills the transmission medium with copies of itself to slow down connections.

Hacking (80s stuff)- Accessing data without authorization 

Trojan- Appearing to be a game or something we want- but it isn't.

Phishing- Email scam promising business rewards to gain financial information.
                                                                                          
Security Measures
Firewalls determain what passes through the network. It can be a physical firewall such as NetGear proxy server or it can be software such as windows and mac OS firewalls. It has controls where you can set the rules of what can enter the network.

-Passwords and accounts user ID's 
-Controls the access of an individual 
- Four digit pin how many combinations (10,000 to the power of negative 10(4)

Hey Guys, this is Tech4K and today i'm going to be uncovering the truth about the difference between IPv4 and IPv6 by attaching a link below:

Network Communication Standard

Network Communication Standard

IEEE - Institute Of Electrical and Electronic Engineers

This organisation sets the standards for data communication.

Each company who makes communication devices or transmission medium need to adhere to these standards or rule (aka Protocol).

These protocol set the standards for -The way a device connects to a medium (Wifi, Ethernet)
                                                          -Transmissions medium
                                                          -Speed of data
                                                          -Physical technology

Protocols
- are the rules on how 2 devices can communicate 

Type 1: Ethernet uses the transmission medium to move packets that contain data about the receiving and sending devices as way of checking for errors.

Ethernet 
-Ethernet- 10mbps
-Fast Ethernet- 100mbps
-Gigabit Ethernet- 1Gbps

Ethernet/Tcp/IP- uses packets, while bit streaming, is also used to display video online.
(Large)   (Smaller
                to cope with 
                different kinds
               of mediums)
Tcp/IP- Transmission control protocol Internet Protocol

These govern the transfer data across the internet.

It uses an IP Address. Each IP address is a unique identifier of an internet connected device.It is a series of four numbers and each number is between 0-25.
IP Addresses: 192... (Homes)
                       172... (Private devices)
                         10... (School/larger organisations)

802.11 Standard (Wireless Protocol)
These rules govern the connection between physical devices via radio waves in the band of 60 GHz frequency.



Tuesday, 19 April 2016

Away today

Sorry I'm away today... reason=tonsils!

Dermott - Your Chapter questions are still not posted. Please do this PRONTO!
 Jackson and Rahul - Please fix your posts!
Bunmi - Nice job!
John- Fantastic job!

Attention all Knights of the Round Table:

Your Quest: Finish Chapter 3 Questions, read the final sections on Security, Legal and Ethical Implications and on Friday you will receive your reward. John of course will receive double of that you will get because of his lovely work in putting the work we did in class 2 times in a row!


Dragons are required/slain/stored.



Monday, 18 April 2016

Network Security

Threats




Security Measures

Interesting facts about Passwords:


Why an 8 Character Password is harder to crack: http://math.stackexchange.com/questions/739874/how-many-possible-combinations-in-8-character-password


Making a strong password: http://help.virginmedia.com/system/selfservice.controller?CMD=VIEW_ARTICLE&ARTICLE_ID=3779&CURRENT_CMD=SEARCH&CONFIGURATION=1001&PARTITION_ID=1&USERTYPE=1&LANGUAGE=en&COUNTY=us&VM_CUSTOMER_TYPE=Cable

Firewalls:



This is a good overview of Firewalls and a nice video on wireless networks that are unencrypted.
http://computer.howstuffworks.com/firewall.htm

So there are different types of Firewalls. This site provides an overview.
http://www.bu.edu/tech/about/security-resources/host-based/intro/



Protocols: Further Reading

Communications Standards: Trust good old Wikipedia to provide a good summary of Protocols: https://en.wikipedia.org/wiki/Communications_protocol

Ethernet Packets: Why are they so big? They carry a lot of data code for transportation:




IP Addresses - What do the numbers mean: https://en.wikibooks.org/wiki/A-level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/IP_addresses

How TCP/IP models is structured:

Network Basics: TCP/IP and OSI Network Model Comparisons: http://www.dummies.com/how-to/content/network-basics-tcpip-and-osi-network-model-compari.html




Network Devices

Devices
Strengths
Limitations
Transfer Rate
Data Storage
Cost
Security
Router
Connects LANs and WANs to Internet
Expensive
150Mbps-
1000Mbps
Built-in Data Storage
2Tb
$100-
$500
Firewall
Ethernet Cable
Cheap, simple to install
Slow
100 Mbps
n/a
77c per metere
n/a
Optical Fiber
Very Fast
Difficult to install, Costly
100 Gbps- 1 Petabit/s
n/a
$5 per meter per fibre
n/a
Switch
Interlinks devices and servers on LANs
Takes a lot of time to install
100 Mbps-
1Gbps
n/a
$50-
$500
Encryption
WAP/Extender
Allows for mobile connection
Expensive, Limited range and number of users
300 Mbps- 1.75Gbps
n/a
$600
WAP
Gateway/Proxy
Server
Manages access to email and files
Requires account profile
50Mbps-
1Gbps
1-50 Tb
$1000 - $5000
Password protection/ profiles
Laptop
Connects wirelessly
Slow/issues with connections
2 Mbit/s to 54 Mbit/s
1-2 Tb
$500-
$3000
Password access
PC
Connects easily and connection is steady
Not mobile
1000 Mbps
1-5 Tb
$500-
$3000
Password access

Wireless Transmission

 

Wireless Transmission

Advantages                                  Disadvantages

nonexpensive                             prone to interference
easy to install                             influenced by environment
covers a wide are                       sensitive


Wave Lengths

Wave length distance shows the of the wave. E.g. shorter wave length is more damaging.
 
Types of wireless transmission

Wifi: radio waves- long waves suseptable to interference, cheap easy tio use (Range 20-50m).

 
Blutooth: radio waves - short waves- relys on peripherals and NFC tagging with chips (Range 10m).

 
Cellular Radio: System for moblie phones - broadcast for mobile phones (200kb/s-2mb/s).

 
Microwaves: Directional, short waves - needs line of sight for transfer- faster with optical fibre. 


Networking

NETWORKING

1 or a 0 = bit
8 bits = 1 byte
Each letter, symbol, value = 1 byte

          Router --> Identify each node - calculations about where to send a packet of data
          Switch --> makes connections from nodes to the Server or Router

Data in transfer is broken into packets.
          Example:      a   <– 8 bits      email   <- 100’s of bits

BUT: In data transfer we deal in bits per second. A packet is a group of bits that will be transferred across a network to be collected and put back together on the receiving device.

Types of Networks:
          Client/Server – Server is the device that manages the data while clients receive data.
          Peer/Peer – All devices share data equally.


Network Architecture

Cables

     Twisted Pair: very cheap to produce, but has a lower bandwidth, not very hard to tap into.
     Coaxial Cable: much higher bandwidth, high speed, more expensive, hard to tap into.
     Fiber Optic Cable: extremely high speed and bandwidth, very expensive, very hard to tap into.


Transmission

     Wireless: very easy to tap into, covers a large proximity, easy to setup and install.
     Bluetooth: covers a smaller radius, lower bandwidth, very useful, cheap.
     NFC: extremely easy to tap into, not as cheap, very useful, requires direct contact.

Sunday, 17 April 2016

Communication Software


Communication Software

- Instruction for data transmission from a sending device to a receiving device via transmission medium.

NOS (Network Operating System)
(eg) 
-Windows 
-Novell
- Linux (Open Switch)
-Dell/HP
-Open NOS (Open Source)

These systems help establish connections between clients and servers securely.

NOS organizes, controls and coordinates data from servers to allow files to be shared and also to manage movement of emails, password access, internet access, file storage and backup and printer access.

NOS is important on a network to; manage user profiles (adding and deleting users), perform maintenance, manage files and devices and to also manage security. 


Network Analysis Tool (Utilities)

Monitor use; number of user; speed; what files are being accessed; event logs (what errors can occur); analysis traffic; ports and protocols.

(Network analysis tools monitors how the network functions)

Network Functions

NOS allows for management and control of a network while the network analysis tool monitors analyses how it's being used.

Voip (Voice Over Internet Protocol)
(eg)
-Software example (Skype)

Software that manages audio and video transfer in real time across broadband, NBN, ADSL 2, access a phone number or make calls for free for members.

Web Browser

Web browsers retrieve files using a universal reasource locator (url) which is the address of the file. The address contains the domain name servers (DNS) that points the browser to where the file is located.




http://    - Hypertext transfer protocol- the rules for transferring Html

https://  - Hypertext transfer protocol-  the rules for transferring encrypted Html

ffs://      - file transfer protocol- the rules for uploading and downloading to a server

Email- Software that allows for text and other data to be sent to an email server that holds the domain of the receivers. The Client server network is required within a LAN or access to the internet.

Cloud Storage- allows for individual profiles to upload and download all types of files that can be accessed over the internet, making it easy to access without carrying data physically.(eg Dropbox, Weiyum and one annoying one of windows users OneDrive)


Thursday, 14 April 2016

Network Dragon Storage Example


1.      Create a NETWORK DIAGRAM for Daenerys Dragon Storage’s Computer Network Solution.
·          Prepare a table that lists the strengths and limitations of various communications technology that could be used in this solution. The table should include comparisons between data transfer rate, data storage options, cost, security and reliability of these networks. (You will need to look up current details online)
·          Design a network diagram for a suitable network with a wireless component and represent its configuration and interactions between components using an appropriate software tool. Remember a network diagram does not necessarily follow the floor layout of a building.

·          Annotate the representation to show how their design is secure, indicating how potential risks are minimised.



Network Software & Protocols

Introduction to data Communications and Networking 
This video is an excellent overview of the entire topic.
https://www.youtube.com/watch?v=mYWsllbszYQ


NOS 
This video outlines the purpose of a Network Operating System
http://study.com/academy/lesson/network-operating-systems-nos-windows-novell-net-ware.html

Network Analysis Tools
It is difficult to find non-professional standard information on this topic. If you find a video or site you think is better - please post it here.
https://technet.microsoft.com/en-us/library/bb962047.aspx
https://www.youtube.com/watch?v=G4GYAsCZAGI


Networking Communication Standards (Protocols)
This video is a simple explaination of network protocols. Pity most of his other videos are in Spanish.
https://www.youtube.com/watch?v=eU41Ekv5yIw