Chapter 4
Chapter 4
1|Page
Compiled by: Fatima Rizwan
For example, here the first six hex digits identify a device made
by Apple and the second set of six hex digits are the unique
serial number of the device itself.
Internet protocol (IP) addresses
Whenever a device like computer connects to the internet it is
given an internet protocol (IP) address. This is usually assigned
to the computer by the internet service provider (ISP).
Because the operation of the internet is based on a set of
protocols (rules), it is necessary to supply an IP address.
Internet protocols define the rules that must be agreed by
senders and receivers of data communicating through the
2|Page
Compiled by: Fatima Rizwan
3|Page
Compiled by: Fatima Rizwan
4|Page
Compiled by: Fatima Rizwan
Note:
• A switch uses a look-up table to determine the destination
device
• Switches use MAC addresses to locate the destination
device.
Bridges
Bridges are devices that connect one LAN to another LAN that
uses the same protocol (communication rules) so that they
can function as a single LAN.
6|Page
Compiled by: Fatima Rizwan
7|Page
Compiled by: Fatima Rizwan
3-Data is sent out using data packets 3- Data is sent out using data packets
5-A routing table is used to direct 5-Bridges do not make use of routing
data packets to the correct device tables
6-A router has more than two ports 6-A bridge has only two ports
8|Page
Compiled by: Fatima Rizwan
9|Page
Compiled by: Fatima Rizwan
10 | P a g e
Compiled by: Fatima Rizwan
Advantages:
• Wi-Fi offers much faster data transfer rates
• It gives better security than Bluetooth
• A Wi-Fi enabled device (such as a computer or
smartphone) can access, for example, the internet
wirelessly at any access point (AP) or ‘hot spot’ up to 100
metres away.
Disadvantages:
• Strength of signal is weaker
• Physical obstacles can interfere with signal/can cause
disconnection
Cloud computing (storage)
Cloud computing is a method of data storage where data is
stored on remote servers – there may be thousands of servers
in many different locations. The same data is stored on more
than one server in case of maintenance or repair, allowing
clients to access data at any time. This is known as data
redundancy. The physical environment of the cloud servers is
owned and managed by a hosting company.
There are three common cloud storage systems:
• Public cloud – this is a storage environment where the
customer and cloud storage provider are different
companies.
11 | P a g e
Compiled by: Fatima Rizwan
12 | P a g e
Compiled by: Fatima Rizwan
13 | P a g e
Compiled by: Fatima Rizwan
14 | P a g e
Compiled by: Fatima Rizwan
3-Radio waves are converted into data and the wireless router
responds by pairing
4-Wireless router checks if the password is correct.
15 | P a g e
Compiled by: Fatima Rizwan
16 | P a g e
Compiled by: Fatima Rizwan
• Magnetic stripes
• Smart cards
• Physical tokens
• Electronic tokens
Zero login
Zero login essentially relies on devices being smart and secure
enough to instantly recognize a user by a number of features
based on:
• Biometrics
• Behavioral patterns
Biometrics examples
• Fingerprint recognition
• Face recognition
Behavioral patterns example
• How you walk
• Your typing speed
• Your normal location
• How you swipe the screen
These behavioral patterns, coupled with biometric data, should
be enough to uniquely identify a user, and allow them into a
system without actually supplying any passwords or other
security information.
The advantages of zero login
17 | P a g e
Compiled by: Fatima Rizwan
18 | P a g e
Compiled by: Fatima Rizwan
19 | P a g e
Compiled by: Fatima Rizwan
20 | P a g e
Compiled by: Fatima Rizwan
21 | P a g e
Compiled by: Fatima Rizwan
22 | P a g e
Compiled by: Fatima Rizwan
23 | P a g e
Compiled by: Fatima Rizwan
Procedure
• The organizer of the audio/phone conference is given two
PINs by the phone company. One PIN is the personal PIN
(e.g. 2151) given to the organizer and the second PIN is the
participant’s PIN (e.g. 8422).
• The organiser contacts all of the participants and informs
them of their PIN and the date and time of the phone
conference.
• When the phone conference is about to start, the
organiser dials the conference phone number and, once
they are connected, keys in their personal PIN (2151 in this
case).
• The participants then call the same conference phone
number to join in – once they get through they each input
the PIN given to them by the organiser (8422 in this case).
Without this PIN, it would be impossible to join the phone
conference.
Note: The equipment required for an audio conference over a
standard telephone network normally just includes a standard
telephone.
Advantages of audio conference rather than video
conference?
Ans: 1-Audio conferencing doesn’t have time lag
2-Lip sync errors doesn’t occur in audio conferencing
3-It is less expensive
25 | P a g e
Compiled by: Fatima Rizwan
26 | P a g e
Compiled by: Fatima Rizwan
28 | P a g e
Compiled by: Fatima Rizwan