Week 5 Presentation Robert Francis.
Analog to Digital Age Network Architectures Networks Wired Communication Media Wireless Communication Media Cyberthreats, Hackers, & Safeguards Summary.
[Audio] Analog and digital data are both means of transmitting information. Although they have the same end goal they have their differences. Analog is a continuous signal used in FM radios, certain sensors, and touch screens. Digital signals are time separated for digital modulation. Common uses are CDs & DVDs. A modem is a device used to convert digital formatting into analog for transmission purposes..
Network Architectures. Network architecture refers to the infrastructure of a computer network. This includes two or more physical components connected either by wireless or wired means..
Networks. Three types of Networks are: Local Area Network (LAN) – Local Area Networks are a collection of computers or devices that are connected with each other. It is usually smaller scale and used in education departments, small offices, or home setups. LANS are no longer limited to just wire connectivity. Metropolitan Area Network (MAN) – Metropolitan Networks are also bigger than LANs but not as big as WANs. They cover areas as big as a city or town. Wide Area Network (WAN) – Wide Area is utilized in larger businesses and Global connectivity. Its considerably bigger then LANS & MANS. The internet is an example of a WAN..
Wired Communication Media. Wired communication is media that is used to transfer information from source to destination. Wired is considered more reliable and stable then its wireless counterpart. Common examples of wired connections are by means of fiber optics, co-ax, and twisted pair cables. Fiber optics are advanced transmission wires that can send data in huge volumes. Co-axial is the most typical cable. It is used in television and ethernet connections. Twisted pair is two wires or cables intertwined with one used as a ground and the other for transmissions..
Wireless Communication Media. Wireless Communication is transmission of signals without the use of any physical cables. It is commonly transferred using Infrared, Radio, or Microwaves. Infrared is very short ranged and cannot make its way through objects. It is used in T.V.s, remote devices, and now commonly mice/keyboard’s. Radio waves are used in cars frequently for music broadcasts, cordless phones, and other communication devices. Microwaves required two antennas aligned for sending and receiving. They are unidirectional and thus only capable in one direction. Commonly used in mobile phones and also T.V. distribution..
Cyberthreats, Hackers, & Safeguards. A Cyberthreat is the malicious intent to gain unwanted access, damage, or way to seek vulnerable information. Viruses, malware, and phishing scams are common ways of going about this. A Hacke r is the skilled individual utilizing their expertise to break into, exploit, or search for ways to gain access to sensitive data. There are several categories of Hackers such as White Hat, Black Hat, Grey Hat, and others. It is hard to 100% stop all threats but there is many good practices in Safeguarding that can help limit it. Use an antivirus software and keep it updated. Do not use common passwords and change them routinely. Limit what is posted on social media. Use a VPN for public WIFI and strengthen your security anytime on public networks..
Summary. Analog to Digital Age – The difference in signals is analog is continuous vs time separated. A modem converts digital to analog. Network Architectures – Two or more components connected wired or wirelessly. Networks - Local (LAN), Metro (MAN), Wide (WAN) Wired Communication Media –Coax, Twisted, Fiber optics cables. More reliable and stable. Wireless Communication Media – Infrared, Radio, Microwaves. More prone to security risks. Cyberthreats, Hackers, & Safeguards – Viruses, Malware, and phishing scams are commonly used by hackers to gain unauthorized access to devices. Use antivirus software. Update passwords frequently. Do not join unknown networks..
Sources. Wikimedia Foundation. (2022, September 26). Network architecture. Wikipedia. Retrieved January 7, 2023, from https://en.wikipedia.org/wiki/Network_architecture Singh, C. (2019, April 12). Types of computer network: LAN, man and wan . BeginnersBook . Retrieved January 7, 2023, from https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/ Wired communication media . GeeksforGeeks . (2023, January 6). Retrieved January 7, 2023, from https://www.geeksforgeeks.org/wired-communication-media/ EC-Council. (2022, October 11). What are the most important types of cyberthreats? . Cybersecurity Exchange. Retrieved January 7, 2023, from https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-threat-intelligence-program/#:~:text=A%20cyberthreat%20is%20a%20malicious,%2Dservice%20(DoS)%20attacks. Wikimedia Foundation. (2022, December 24). Hacker . Wikipedia. Retrieved January 7, 2023, from https://en.wikipedia.org/wiki/Hacker.