1 / 27

High Speed Internet Access At Home

High Speed Internet Access At Home. Broadband Technologies Security Concerns Hardware/Software Solutions. William Kramp 4/12/2001. Broadband Technologies. Cable MODEMS Digital Subscriber Line (DSL) Fixed Wireless Mobile Wireless Integrated Services Digital Network (ISDN). Cable MODEMS.

pekelo
Download Presentation

High Speed Internet Access At Home

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001

  2. Broadband Technologies • Cable MODEMS • Digital Subscriber Line (DSL) • Fixed Wireless • Mobile Wireless • Integrated Services Digital Network (ISDN)

  3. Cable MODEMS • Always “On”, shared connection. • Uses the Time-Warner cable connection. Doesn’t interfere with use of cable when watching TV. • Consumer Transfer Speeds: • Download: 2Mbps, Upload: 128Kbps • Commercial Transfer Speeds: • Download: 4Mbps, Upload: 768Kbps

  4. Download This is the speed at which files can be downloaded from the Internet. Examples: viewing a video feed, looking at web pages. Upload This is the speed at which files can be sent up to the Internet. Examples: sending E-mail to a friend, uploading a document to a web site. Transfer speeds

  5. Digital Subscriber Line (DSL) • Always “on”, dedicated connection to a provider. • Uses existing phone line. Doesn’t interfere with, or block the regular use of the phone. • Transfer speeds: • Speeds vary by service provider. Can range from 256Kbps to 8Mbps. • Symmetrical or asymmetrical connections

  6. Symmetrical The upload speed equals the download speed. Good if you are doing work from home. Asymmetrical The download speed is much greater then the upload speed. Good if only downloading from the Internet. Symmetrical vs Asymmetrical

  7. Fixed Wireless • Wireless Internet access to a fixed location (your home) without using cable or phone wires. • Symmetrical connections up to 10Mbps. • Not effected by adverse weather conditions. • Very reasonable rates compared to T1 or fractal T3 hardwire connections.

  8. Mobile Wireless • Current 2nd generation technology is not very fast or reliable. • Third generation (3G) technology will allow average speeds of 50-70Kbps on 144Kbps networks while moving. Speeds of 500Kbps on 2.4Mbps networks will be possible if stationary. • Expected timeframe for 3G rollout in US is 2004.

  9. Integrated Services Digital Network • ISDN has been around for about 15 years. • Speeds of 128Kbps, symmetrical available. • Charged by the minute, plus Internet access fee.

  10. Security Issues • Viruses • Denial of Service • Probing • Trojan horses • Spying

  11. Viruses • PC’s can be infected from many sources: • E-mail • Software on floppies • Software on CD’s • File sharing over a network • Internet downloads

  12. Denial of Service Attacks (DoS) • These are attacks against a system to make it unavailable to the user. • This is done by sending so much information, or junk, to ports on your PC. This causes the PC to overload, and stop functioning. • Famous DoS: Smurf attack

  13. Probing • Probing is the process of looking for ports, or services on a computer. • Well known ports: smtp (E-mail), http (web),etc. • Addresses easily spoofed. Meaning that the source address might be fake, a decoy. • If file and printer sharing is enabled, people could view, add or change files on your PC.

  14. Trojan Horses • Programs that say they are doing one thing, but are actually doing something else. • Usually allow people to remotely use your PC to attack, or access other computers on the Internet. • The trail will then lead back to you, and not the real perpetrator.

  15. Spying • Spying is where programs watch what you are doing and send out this information without your knowledge. • RealAudio, which provides audio and video streaming software for the Internet. Had their program sending reports to the company of what files were being transferred, but said it was just for quality control. Can now be disabled.

  16. Hardware/Software Solutions • Virus Scanners • Backups • Firewalls

  17. Virus Scanners • McAfee http://www.mcafee.com • Norton http://www.symantec.com • Virus Myths http://www.vmyths.com/ These will scan files and E-mail for viruses. But still be wary of opening programs or files that you didn’t request.

  18. Backups • Zip Drives – 100MB capacity. • CD-R Drives – 600MB capacity; write once. • CD-RW Drives – 600MB capacity; can be reused. • Jaz Drives – 1GB capacity. • Tape Drives – 8GB to 20GB storage capacity. Internal or external units available.

  19. Firewalls • Firewall software – Software that is installed on each computer to protect, and restrict access to its services. • Firewall appliance – A self-contained unit that protects the computers on an internal network from the outside (Internet). Will work with either a Road Runner MODEM or DSL connection.

  20. Firewall Software • ZoneAlarm http://www.zonelabs.com Free, for non-commercial use • BlackICE Defender http://netice.com • McAfee Personal http://www.mcafee.com • Norton Internet Sec. http://www.symantec.com

  21. Firewall Appliances • Linksys http://www.linksys.com • D-Link http://www.dlink.com • SonicWall http://www.sonicwall.com • SMC http://www.smc.com

More Related