U-TECH (Understanding Technology) 2023 by Kris Ayre - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

Networking and Communications

Since the first discovery of connecting computers, networks have expanded in size and capability, considerably. In particular, networking speeds have increased dramatically, such that streaming internet data for many devices at high-speeds, is now possible. 30 years ago, this wasn't the case.

Transmitter and receiver hardware has grown exponentially, such that there are virtually no limitations in transfer speeds, including new wireless technologies which can transfer data at 2.5 terabits per second.

Networking

WAN and LAN

There are two (2) types of networks:

WAN: Wide Area Network

LAN: Local Area Network

Wide Area Networks are large or global networks such as an organisation or the internet.

Local Area Networks are smaller, ‘in-house’ or localised networks, such as inside an office or at home. Routers at your home or office, typically contain a LAN, with IP addresses allocated to the client who connects to the network via authentication and/or administration.

WAN

A WAN is called a Wide Area Network. WAN’s can be a company’s network of LAN’s throughout five (5) cities across the country, as an example. The whole wide connection of each city’s office makes it a WAN. The internet itself is an example of a WAN.

LAN

A LAN is called a Local Area Network, usually administered at a central point such as your home WiFi modem router using a web browser to access the router and administer network access for devices on to the LAN. A LAN can also be created and administered on a server to allow users to access the local network. LAN’s can connect to other LAN’s over an internet connection.

Internet

The internet is one big wide area network and allows users to 'network' or connect to resources in storage and to access services online that are accessible using the internet. Server technology and standalone devices such as firewall rack units and networking gear including modems and routers with wireless capabilities. Secure connection methodologies make connecting more secure and permits private connections remotely over physical distances.

VPN's & Secure Tunneling Technologies

Security matters! When using technology, the internet and networks, it is important to maintain some type of security. Any man-made object can be broken and such, so is live online information – it is breakable. In other words, using certain technologies can prevent you from any damage and avoid a situation that you do not want to be in. Damage can be in the form of time, money or resources and may be costly!

So therefore, it is a topic which should be considered as something serious in the computing world.

VPN's are Virtual Private Networks and allow for point-to-point connections over public networks, usually using encryption. If you use a VPN , this will allow you to bypass restricted or blocked internet services and/or websites.

VPN's come in commercial and open-source versions, depending on what you require or can manage. Paid software has its benefits and its pitfalls. Ease-of-use is convenient for the average user, but the sacrifice is that you have to send to the VPN provider company, some type of identification, which means that you are not 100% invisible.

The commonly used VPN tunneling technologies are listed in this section.

SSH

SSH stands for Secure Shell. SSH is an encrypted tunnel using the SSH protocol for online use.

It works by an SSH client piece of software which connects to an SSH server, using the tunneling SSH protocol to establish a connection to an SSH server.

L2TP

Layers 2 Tunneling Protocol, or, L2TP is used in conjunction with IPSec layer 3 protocol to secure the network transmission of information.

IPSec

IPSec is Internet Protocol Security which uses encryption to encapsulate (encode or hide) the packet of data transmitted through the tunnel.

SSTP (HTTPS protocol)

Secure Socket Tunneling Protocol is a VPN tunnel that uses SSL (Secure Sockets Layer) authentication with keys, encryption and data checking.

SSL

SSL is the Secure Sockets Layer and uses certificates along with TCP port 443 to secure connections and was invented by Netscape Communications in 1995 as a public release into its internet browser, 'Netscape.'  

TLS

TLS, or, Transport Layer Security, uses cryptography by implementing certificates and other algorithms to tighten security and ensure no data leaks occur. TLS also uses TCP port 443.

Wi-Fi

Wi-Fi (also known as, 'Wireless Fidelity") is registered as a trademark to the Wi-Fi Alliance, who certify authentic Wi-Fi functionality with their official certificates. It is used across the world in coffee shops, hotels, homes, offices and airports.

Wi-Fi is everywhere. These days, home WiFi is becoming an affordable standard. High-speed cable and/or fibre internet is the backbone for the WiFi service. WiFi LAN speeds have dramatically increased, within the local WiFi network - allowing users to access the WiFi Modem Router, much quicker than before.

IEEE 802.11 A/B/G/N/AC

Wi-Fi is categorised according to which bands they use. All Wi-Fi connections, are a part of the IEEE 802.11 standard.

Name

Standard

Transfer speeds
(Mbps = Megabits per second))

Radio Frequency

(Ghz = Gigahertz)

Wi-Fi 7

802.11be

1376-46120

2.4/5/6

Wi-Fi 6E

802.11ax

574-9608

6

Wi-Fi 6

802.11ax

574-9608

2.4/5

Wi-Fi 5

802.11ac

433-6933

5

Wi-Fi 4

802.11n

72-600

2.4/5

Wi-Fi 3

802.11g

6-54

2.4

Wi-Fi 2

802.11a

6-54

5

Wi-Fi 1

802.11b

1-11

2.4

Wi-Fi 0

802.11

1-2

2.4

 

Bluetooth

Bluetooth is a modern wireless technology using specific frequencies. It can be used to connect to a host device and transmit audio, video and provide internet connectivity. This type of connection is also called ‘Bluetooth tethering,’ which is categorised under ‘Mobile Hotspot and Tethering’ on mobile phones. Within that section, you will see the two (2) options: Bluetooth tethering and USB tethering.

USB

Universal Serial Bus cables are hard-wired connections and can also provide internet connectivity. This is particularly useful for notebooks (laptops), tablets or iPads so that they can connect to your mobile phone for internet access. As explained above in Bluetooth tethering, the USB tethering option is in the same section in/on your mobile phone, under Settings/Connections/Mobile Hotspot and Tethering.

Cables

Cat 5e - 100 MHz Speed and Performance Cabling for LAN's

Category 5a,b,c were the industry standard in high-speed LAN cabled network cabling systems of our time, in use from around the year 2000. They can transfer data at a rate of between 1-5 Gbps (Gigabits per second).

Cat 6a - 500 MHz Speed and Performance Cabling for LAN's

-100 metres in length capability and the new industry standard in fast networking. Cat 6 is faster and travels further in metres, than Category 5 series LAN networking cabling, used across offices, factories, governments and homes across the world. Category 6 ethernet cables can transfer data at a rate of 10 Gbps

Fibre Optic

Fibre optic cable transfers data at speeds of up to 100 Gbps.

RJ11 Telephone

RJ11 is an old standard in connectivity for telephones into socket walls and into the back of or underneath telephones. It contains 4 pins and is still the most common world-standard for telephone connections. Both telephone cables with a plug and telephones with a socket, use the RJ11 plug/socket connectivity standard.

RJ45 LAN

RJ45 is the standard for LAN connections using Cat 5e and Cat 6a cabling.

These connectors use 8 pin plug and jack connectors for LAN (ethernet) connections coupled with Cat 5e or Cat 6a cabling.

Modems

Modems normally connect to the internet via a standard telephone line and connector (RJ11).

Routers

A router is a device which allocates IP addresses to users who are logged into the LAN or WAN. They have developed over the years to become more than just an IP address allocation service device - they have become a kind of all-in-one device, offering a firewall, port configuration tool, hacker detection, time zones, filtering and more. Modern routers are quite function-packed devices and are getting more and more full of features as technology improves. Once upon a time, a router was a separate device to an ADSL internet modem, but nowadays the WiFi box, modem and router are a 3-in1 single device box. Times have changed quite dramatically and WiFi modem routers are now cheap, fast and secure.

Hubs

A hub is a simple (or basic) version of a switch (see Switches below). A hub is a hardware device which has multiple RJ45 LAN Port sockets for computers to access a network such as a LAN.
Hubs are used for computers to connect together usually with ethernet cables, within a LAN.

Switches

Switches are sophisticated hubs, able to transmit data across multiple networks and can manage IP connections (addresses) from connected networkable devices effectively and efficiently without dropouts or clashes on the network between devices, thereby allowing devices to stay connected to a network or networks (LAN or WAN) without connection problems. Therefore, switches are the preferred choice when selecting between a hub and a switch for a network, because they offer more network interoperability, flexibility and stability, allowing for better management of the network.

Communications

Communications have come a very long way since the 1800’s. From telegraph wires to satellite internet dishes – the hardware or equipment used to communicate, has changed considerably.

Wired to wireless is the evolution of communications during the past 250 years. Yes, it has changed tremendously already, however it may still change a lot more, in the future.
Communication quality has greatly improved in terms of: graphic resolution density, speed of delivery and retrieval. These are defined by modern technology such as touchscreen, Bluetooth computer mice, keyboards, scanners and printers. So yes, communication infrastructure working alongside the localised technologies and peripheral gadgets surrounding your desktop, notebook, tablet or smartphone allow people to communicate in a modern way.

Satellites, mobile phone towers, Wi-Fi, USB, ethernet, fax, email, microphones and speakers are all ways in which we communicate by interacting using  technology.

Things can be achieved using technology in our modern times. Technology allows us to perform  fast communication tasks.

With the ease of wireless and the robustness of wired, we are gradually changing towards a ‘wireless world.

As Bluetooth sound systems become popular throughout the world, wireless microphones and speakers have emerged and are now widespread in 2023. This allows people to use wireless techniques to talk, chat, sing, play music, watch movies or download anything from the internet.

Communication Variables

Technology

Wireless such as Mobile or Wi-Fi

Mobile Phone

Wi-Fi

Uses Radio Frequency (RF)

2G, 3G, 4G: 0.2-2.7 GHz;
5G: 3.3-4.2 GHz

2.4 GHz and 5 GHz

Satellite Radio Frequency

Mobile Phone

GPS

 

1. Mobile Phone: Radio Frequencies are 626.5 to 1660.5 MHz for the transmitter and 1525.0 to 1559.0 MHz for the receiver.

2. GPS:

L1 Band: 1575.42 MHz with a 15.345 MHz bandwidth

L2 Band: 1227.6 MHz with an 11 MHz bandwidth

L5 Band: 1176.45 MHz with a 12.5 MHz bandwidth

WAN (Wide Area Network) the internet outside

Optic fibre cable, telephone line cable and radio frequency using mobile phone tower transmitters and receivers

LANyour home or office WiFi Router

The 2 radio frequencies used for WiFi are the 2.4 GHz and 5 GHz bands (as above)

Input methodtouchscreen, keyboard or microphone (mic)

3.5 mm Jack Socket Audio In/Out

Bluetooth – headsets, conferencing speakers and entertainment systems (speakers, guitars etc.)

Radio Frequency 2.45 GHz