Plant-Safety-Network 20240514 084446 0000

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

INTERNET ACCESS

TECHNOLOGY
FILE SHARING
INTRODUCTION TO
WIRELESS NETWORK
GROUP 1
Magsino, Ryan
Reaño, Rodel
Delos Reyes, Wendel
Paz, Dave
Galola, Jim Henson
Hilario, Marielle Abby
THE INTERNET
Is a global digital
infrastructure that connects
millions of computers.
Is a worldwide public
network of computers on
which people can join and
use multiple services.
INTERNET
CONNECTION TYPE:
Dial-up connection to the
Internet requires no
infrastructure other than the
telephone network.
Broadband connection is the
most used form of Internet
because of its high access
speeds.
INTERNET ACCESS TECHNOLOGIES
Internet connection options vary by Internet Service Provider and by
region. Clients should consider some of the following factors before
selecting an Internet package and Internet connection type: connection
speed or bandwidth, cost, availability, reliability and convenience.
Different internet access technologies:
1. Digital Subscriber Line (DSL)
2. Cable
3. Cellular
4. Fiber Optic
5. Satellite
6. Fixed Wireless
DIGITAL SUBSCRIBER LINE (DSL)
Digital subscriber line (DSL) service is a family of technologies that
are used to provide internet connectivity over telephone lines
originally intended for analog voice.
DSL service can be delivered simultaneously with wired telephone
service on the same telephone line because DSL uses higher
frequency bands for data.
CABLE
Cable internet services are delivered over the same coaxial cables
that were originally installed for the purpose of delivering analog
video to television sets. Most cable internet providers use a standard
called DOCSIS (Data Over Cable Service Interface Specification),
which is an international
telecommunications standard that
allows for the addition of high-
bandwidth data transfer to an
existing coaxial cable TV system.
CELLULAR
Cellular service is a communications technology in which the last
link is delivered wirelessly, and the land area to be supplied with
radio service is divided into cells in a pattern dependent on terrain
and reception characteristics. There are four primary cellular
technologies that carry data; broadband categorized as 2G, 3G, 4G,
and 5G.
FIBER OPTIC
Fiber to the home is the fastest way to
deliver internet service to residences and
businesses. Internet backbones use fiber
optic cable as the last mile connection as
it removes any bottlenecks between the
end user and the internet backbones. All
other internet access technologies
leverage fiber optic cables to transmit
data until that fiber reaches their
infrastructure.
SATELLITE
Satellite internet access is provided by communications satellites in
Earth’s orbit. Traditional communications satellites are launched
into geosynchronous orbit at an altitude of 22,236 miles, which
entails a round trip latency of about a half a second for data flowing
through the satellite.
FIXED WIRELESS
Fixed wireless is the operation of wireless communication devices or
systems used to connect two fixed locations, such as between a
tower and a building. Although cellular companies now offer
services that could meet this definition, 2G/3G/4G/5G cellular
technologies are generally excluded from being categorized as fixed
wireless because cellular technology was designed for mobile
devices and has significant limitations when used for fixed locations.
Noncellular fixed wireless can use a variety of technologies and
frequencies.
FILE SHARING
File sharing is the public or private sharing of files or
folders on a computer connected to a network. Files can
easily be shared outside a network via removable media,
but the term file sharing almost always refers to sharing
files on a network.
File sharing allows several people to use the same file
data. Some users may be able to create and modify files
depending on access permissions, while others may only
have read access or even no access.
FILE SHARING
There are countless file sharing varieties, but most of the
file sharing systems available fall into one of two
categories -- operating system file sharing or internet file
sharing.
OPERATING SYSTEM FILE SHARING
Nearly any modern operating system provides integrated
file sharing capabilities. For example, Windows supports
file sharing using server message block (SMB). An
administrator can share a folder on Microsoft's Resilient
File System (ReFS), which makes the folder accessible
through the SMB protocol.
There are typically numerous additional features
available, although the specific sharing options vary by
operating system.
INTERNET FILE SHARING
There are several types of internet file sharing, which each
serve a specific purpose, but the most common include the
following:
Peer-to-peer (P2P) file sharing is a consumer-level
technology in which each participant's PC acts as a client
in a much larger file sharing network. When a participant
downloads files from this network, the P2P software
identifies where the data resides and then facilitates the
download process.
INTERNET FILE SHARING
Enterprise file sync and share services have gained
popularity for remote work because they enable files to
be saved in the cloud and accessed via a desktop or
mobile device. If the user updates a file or creates a new
file while working offline, that file is automatically
synchronized to the main storage repository the next
time the user is online. These storage services retain data
in a centralized location where the organization can
properly secure and back it up.
INTERNET FILE SHARING
Portal websites, such as Microsoft's SharePoint Online,
allow users to share files and folders with co-workers
and, in some cases, people residing outside of the
organization via a shared link. These portal-based file
sharing services provide real-time, collaborative access
through a web browser or mobile app, which means users
can access files from anywhere, using nearly any device.
INTRODUCTION TO WIRELESS NETWORKS
How Wireless Networks Work
Wireless networking, or WiFi, is a very popular wireless
networking technology today. There are more than several
hundreds of millions of WiFi devices. In this chapter, we will
explore the basics of wireless networking, including the different
types of wireless networks, how they work, and the standards that
govern them.
Essentially, a wireless network allows devices to remain linked to
the network without any cables attached, providing greater
convenience and mobility for the user.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Network Topologies
The two basic modes (also referred to as topologies) in which
wireless networks operate are referred to as infrastructure and
ad-hoc networks.
INFRASTRUCTURE WIRELESS NETWORK
A typical example of an infrastructure network would be cellular
phone networks, which have to have a set infrastructure (i.e.,
network towers) to function.
AD-HOC WIRELESS NETWORK
A typical example of an ad-hoc network is connecting two or more
laptops (or other supported devices) to each other directly
without any central access point, either wirelessly or using a
cable.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Networking Standards
Several wireless networking standards are included in the 802.11
family of standards. These standards are developed by the
Institute of Electrical and Electronics Engineers (IEEE) and define
the specifications for a range of wireless LAN (Wi-Fi)
technologies, some of which are designed for short-range
communication, while others are optimized for longer ranges.
The range of an 802.11 technology depends on factors such as
frequency band, modulation schemes, transmit power, and the
environment in which it is deployed.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Frequency Bands
The choice of frequency band and channel affects the
performance and interference of wireless networks. Performance
refers to the speed and quality of wireless communication, while
interference refers to the unwanted signals that disrupt or
degrade wireless communication.
As mentioned before, higher frequency bands and channels offer
higher performance, and lower frequency bands and channels
offer lower interference. Wireless network administrators balance
these factors and choose the best frequency band and channel
for their network.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Security Standards
Authentication verifies the identity of wireless devices and users
before allowing them to join the network.
Encryption scrambles the wireless data so that only authorized
parties can read it.
Access control regulates the permissions and privileges of
wireless devices and users on the network.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Security Standards
Below is a history of the most common wireless security methods
and protocols:
Wired Equivalent Privacy (WEP): This was the first wireless
security protocol, introduced in 1999. It uses a static
encryption key that is shared between the wireless devices
and the access point (AP). However, WEP can be easily
cracked and hacked by various tools and methods. WEP is no
longer recommended and should never be used.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Security Standards
Below is a history of the most common wireless security methods
and protocols:
Wi-Fi Protected Access (WPA): This was an interim wireless
security protocol, developed in 2003 to replace WEP. It uses a
dynamic encryption key that changes for each packet, based on
the Temporal Key Integrity Protocol (TKIP). WPA is more secure
than WEP, but it still has some vulnerabilities and limitations,
such as the use of a weak encryption algorithm (RC4), the
susceptibility to dictionary attacks, and the lack of backward
compatibility with some older devices.
INTRODUCTION TO WIRELESS NETWORKS
Wireless Security Standards
Below is a history of the most common wireless security methods
and protocols:
Wi-Fi Protected Access 2 (WPA2): This is the current industry
standard for wireless security, established in 2004. It uses a
strong encryption algorithm (AES) that is considered
unbreakable by today’s standards. WPA2-Personal is suitable
for home and small office networks, where a common
passphrase is used to authenticate all wireless devices and
users.
INTRODUCTION TO WIRELESS NETWORKS
PROS and CONS of Wireless Networking

Advantages: Disadvantages:
Increased efficiency Security attacks
Access and availability Installation problems
Flexibility Inconsistent coverage
Cost savings Slow transmission speeds
New opportunities
REFERENCES
https://www.slideshare.net/actanimation/internet-technology-27832777
https://merit.edu/community/moonshot/framework/chapter-6-internet-
access-technologies/
https://www.techtarget.com/searchmobilecomputing/definition/file-
sharing
https://filecamp.com/blog/file-sharing-software-for-team-collaboration/
https://utsa.pressbooks.pub/networking/chapter/introduction-wireless/
https://www.nibusinessinfo.co.uk/content/pros-and-cons-wireless-
networking
THANK
YOU!
PRESENTED BY GROUP 1

You might also like