High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001.

Slides:



Advertisements
Similar presentations
By Taylor and Ed. Uses standard voice telephone lines Uses a modem to place a telephone call to another modem at a remote site Two major disadvantages.
Advertisements

Chador Wangdi Page 1of15. Analog (up to 56k/ dial up access) Using a modem connected to your PC, users connect to the internet when the computer dials.
Presented by: Eng. Karam Al-sofy
How to Set Up, Secure and Manage A Network
Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
TYPES; 1. Analog Analog 2. ISDN ISDN 3. B-ISDN B-ISDN 4. DSL DSL 5. ADSL ADSL 6. SDSL SDSL 7. VDSL VDSL 8. CABLE CABLE 9. Wireless Wireless 10. T-1 lines.
Networking at Home and Abroad
Types of Connection Dial up –adv : most easily available not expensive (need PNETs charge) –disadv : limited data transfer rate (max : 56 Kbps) when data.
Getting on the Internet
Module 1.3 Internet connection choices Theme: Let’s communicate.
3 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Getting Connected  First,you need to subscribe to an Internet service provider.
Communication Asad M. Nafees. Outline Digital Communication ISDN Digital Subscriber Line (DSL) Cable modems Satellite broadband Wireless Communication.
Comparison of Internet Connections Tara Paine. Dial up Connection  Hardware Needed  Modem  Transmission Medium  Telephone Line  Transmission Speed.
Nasca Internet Networking and Security viruses.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
ISP (INTERNET SERVICE PROVIDERS).  An ISP (or Internet Service Provider) is a company that offers users a connection to the internet. WHAT IS AN ISP?
SIR Area 2 Computers & Technology Dean Steichen March 2012.
Types of Internet Connections
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Power point presentation on internet Presentation by: Tenzin wangda.
The Internet is an international Network of Computers.
Networks Am I hooked up?. What is a network? A network is a group of 2 or more computers that are linked together either by wires or by a wireless means.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
Networking Types of Internet Connection
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
© Anthony J. Nowakowski, Ph.D. The Internet © Anthony J. Nowakowski, Ph.D. Internet A world wide connection of computers including EDC 601 Instructional.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
The Internet for SME’s What is ADSL? Asymmetric Digital Subscriber Line (ADSL) is high- speed digital connectivity over the existing, copper (or analogue)
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Telecommunications systems (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 12, Thursday 3/29/2007) T-1 Digital.
LaToya Poole CSC LaToya Poole CSC Dial-up Connection  Comcast Internet Services  Reliable Internet Connections  $ monthly charge.
1 Back to Slide 7. 2 Also called dial-up access, it is both economical and slow. Using a modem connected to your PC, users can connect to the Internet.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Copyright 2007 Jim Martin1 Broadband Internet Access Dr. Jim Martin
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
A Secure Home System By: Metin Tuzmen. User facts Most people do not know how to use a computer. Most people have disbelieves about computers There are.
NETWORKS.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
ASYNCHRONOUS Sends A letter at a time. The devices are not synchronised. The letter is framed by start and stop bits. The start bits are to ‘wake up’ the.
What is Inequality in Broadband Internet Access? Nowadays everyone is going for a broadband service leaving behind the dialup modems services. There are.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
Internet Security and Your Computer Welcome to Boot Camp.
Connecting to the Internet.
IT1001 Computer Hardware & System Operations Week 12 – Introduction to Internets.
Mr C Johnston ICT Teacher G055 - Lecture 04 Wide Area Network Services.
NetTech Solutions Protecting the Computer Lesson 10.
Introduction TO Network Administration
TOPIC 3 DATA TRANSMISSION AND NETWORKING MEDIA. INTERNET SERVICE PROVIDER (ISP) also known as Internet Access Provider (IAP) It is a company that offers.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 7B Data Communications.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
Internet Options By OTX-West. Discussion Points Technologies  Dial-Up  DSL  Cable Data Transfer Speeds  1 Kbps (Kilobit per second) = one thousand.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
ISPs (Internet Service Providers). What is an ISP? An ISP (or Internet Service Provider) is a company that offers users a connection to the internet.
CONNECTING TO THE INTERNET
Network Security Marshall Leitem 11/30/04
McGraw-Hill Technology Education
Chapter 7 Connecting to the Internet
ISPs (Internet Service Providers)
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
GETTING CONNECTED TO INTERNET
Introduction to Computers
Presentation transcript:

High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001

Broadband Technologies  Cable MODEMS  Digital Subscriber Line (DSL)  Fixed Wireless  Mobile Wireless  Integrated Services Digital Network (ISDN)

Cable MODEMS  Always “On”, shared connection.  Uses the Time-Warner cable connection. Doesn’t interfere with use of cable when watching TV.  Consumer Transfer Speeds:  Download: 2Mbps, Upload: 128Kbps  Commercial Transfer Speeds:  Download: 4Mbps, Upload: 768Kbps

Transfer speeds Download  This is the speed at which files can be downloaded from the Internet. Examples: viewing a video feed, looking at web pages. Upload  This is the speed at which files can be sent up to the Internet. Examples: sending E- mail to a friend, uploading a document to a web site.

Digital Subscriber Line (DSL)  Always “on”, dedicated connection to a provider.  Uses existing phone line. Doesn’t interfere with, or block the regular use of the phone.  Transfer speeds:  Speeds vary by service provider. Can range from 256Kbps to 8Mbps.  Symmetrical or asymmetrical connections

Symmetrical vs Asymmetrical Symmetrical  The upload speed equals the download speed. Good if you are doing work from home. Asymmetrical  The download speed is much greater then the upload speed. Good if only downloading from the Internet.

Fixed Wireless  Wireless Internet access to a fixed location (your home) without using cable or phone wires.  Symmetrical connections up to 10Mbps.  Not effected by adverse weather conditions.  Very reasonable rates compared to T1 or fractal T3 hardwire connections.

Mobile Wireless  Current 2 nd generation technology is not very fast or reliable.  Third generation (3G) technology will allow average speeds of 50-70Kbps on 144Kbps networks while moving. Speeds of 500Kbps on 2.4Mbps networks will be possible if stationary.  Expected timeframe for 3G rollout in US is 2004.

Integrated Services Digital Network  ISDN has been around for about 15 years.  Speeds of 128Kbps, symmetrical available.  Charged by the minute, plus Internet access fee.

Security Issues  Viruses  Denial of Service  Probing  Trojan horses  Spying

Viruses  PC’s can be infected from many sources:   Software on floppies  Software on CD’s  File sharing over a network  Internet downloads

Denial of Service Attacks (DoS)  These are attacks against a system to make it unavailable to the user.  This is done by sending so much information, or junk, to ports on your PC. This causes the PC to overload, and stop functioning.  Famous DoS: Smurf attack

Probing  Probing is the process of looking for ports, or services on a computer.  Well known ports: smtp ( ), http (web),etc.  Addresses easily spoofed. Meaning that the source address might be fake, a decoy.  If file and printer sharing is enabled, people could view, add or change files on your PC.

Trojan Horses  Programs that say they are doing one thing, but are actually doing something else.  Usually allow people to remotely use your PC to attack, or access other computers on the Internet.  The trail will then lead back to you, and not the real perpetrator.

Spying  Spying is where programs watch what you are doing and send out this information without your knowledge.  RealAudio, which provides audio and video streaming software for the Internet. Had their program sending reports to the company of what files were being transferred, but said it was just for quality control. Can now be disabled.

Hardware/Software Solutions  Virus Scanners  Backups  Firewalls

Virus Scanners  McAfeehttp://  Nortonhttp://  Virus Mythshttp:// These will scan files and for viruses. But still be wary of opening programs or files that you didn’t request.

Backups  Zip Drives – 100MB capacity.  CD-R Drives – 600MB capacity; write once.  CD-RW Drives – 600MB capacity; can be reused.  Jaz Drives – 1GB capacity.  Tape Drives – 8GB to 20GB storage capacity. Internal or external units available.

Firewalls  Firewall software – Software that is installed on each computer to protect, and restrict access to its services.  Firewall appliance – A self-contained unit that protects the computers on an internal network from the outside (Internet). Will work with either a Road Runner MODEM or DSL connection.

Firewall Software  ZoneAlarm Free, for non-commercial use  BlackICE Defenderhttp://netice.com  McAfee Personalhttp://  Norton Internet Sec.

Firewall Appliances  Linksyshttp://  D-Linkhttp://  SonicWallhttp://  SMChttp://