SlideShare a Scribd company logo
Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter FourChapter Four
NetworksNetworks
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Learning ObjectivesLearning Objectives
 Understand the importance and use ofUnderstand the importance and use of
NetworksNetworks
 Understand the different types ofUnderstand the different types of
technologies necessary to establish atechnologies necessary to establish a
networknetwork
 Be exposed to several different types ofBe exposed to several different types of
networksnetworks
 Understand the necessity for networkUnderstand the necessity for network
security and several of the means ofsecurity and several of the means of
providing network security.providing network security.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Network BasicsNetwork Basics
 AA networknetwork is aboutis about
two or more peopletwo or more people
establishing a wayestablishing a way
to communicate.to communicate.
 There are formalThere are formal
and informaland informal
networks.networks.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Network BasicsNetwork Basics
 Networks are founded on the concept ofNetworks are founded on the concept of
client-server architectureclient-server architecture. Architecture. Architecture
refers to the design of a system orrefers to the design of a system or
technology.technology.
 The individual work station, called aThe individual work station, called a nodenode,,
is provided networking services by ais provided networking services by a
server.server.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Network BasicsNetwork Basics
 TheThe serverserver is a computer thatis a computer that
provides files, printers, andprovides files, printers, and
processing power to theprocessing power to the
individual workstations. Theindividual workstations. The
server is a special type ofserver is a special type of
computer linked into acomputer linked into a
network. It is used only tonetwork. It is used only to
manage the network, sharedmanage the network, shared
data, and shared resources.data, and shared resources.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Why Network?Why Network?
 Law enforcement agencies may haveLaw enforcement agencies may have
many buildings and offices in differentmany buildings and offices in different
physical locations. A network allows themphysical locations. A network allows them
to share computer, data, and informationto share computer, data, and information
resources. Much of the information usedresources. Much of the information used
by law enforcement comes from agenciesby law enforcement comes from agencies
outside their organization (e.g., DMV,outside their organization (e.g., DMV,
Corrections, other agencies, etc.).Corrections, other agencies, etc.).
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 Networks also provide organizations withNetworks also provide organizations with
the capability to back up data. If onethe capability to back up data. If one
computer fails, the network can take overcomputer fails, the network can take over
the processing load.the processing load.
Why Network?Why Network?
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Back to …..Back to …..
Analog and Digital SignalsAnalog and Digital Signals
An analog signal weakens as it travelsAn analog signal weakens as it travels
through wire because of the resistancethrough wire because of the resistance
the signal meets in thethe signal meets in the mediummedium that isthat is
carrying it (air, wire, coaxial cable).carrying it (air, wire, coaxial cable).
Digital signals are subject to the sameDigital signals are subject to the same
decrease in strength as analog signals.decrease in strength as analog signals.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Digital signals are the primary means ofDigital signals are the primary means of
transmitting data communications.transmitting data communications.
Digital signals have several advantagesDigital signals have several advantages
over analog:over analog:
 Fewer errors;Fewer errors;
 Can be transmitted at higher speedsCan be transmitted at higher speeds
 Peripheral devices are less complexPeripheral devices are less complex..
Back to …..Back to …..
Analog and Digital SignalsAnalog and Digital Signals
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 The analog wave is called aThe analog wave is called a baudbaud..
Bits are essentially added to theBits are essentially added to the
analog wave.analog wave.
 Public networks tend to run at aboutPublic networks tend to run at about
2,400 baud (waves) per second.2,400 baud (waves) per second.
Analog stuffAnalog stuff
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 Our technology adds more bits to eachOur technology adds more bits to each
baud generally in multiples of four.baud generally in multiples of four.
 A 2,400 baud analog signal that addsA 2,400 baud analog signal that adds
12 bits to each baud would give an12 bits to each baud would give an
effective transmission rate of 28,800effective transmission rate of 28,800
bits per second (BPS).bits per second (BPS).
Analog stuffAnalog stuff
This about
Modem Speed!
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
One of the schemes commonly used toOne of the schemes commonly used to
prevent data corruption isprevent data corruption is bit paritybit parity..
 Take a stream of binary, add up theTake a stream of binary, add up the
numbers, you get an odd or an even number.numbers, you get an odd or an even number.
 Add a digit at the end of the data to indicateAdd a digit at the end of the data to indicate
if the sum is odd or even.if the sum is odd or even.
 The receiving computer compares the sumThe receiving computer compares the sum
of the data stream to the bit parity digit.of the data stream to the bit parity digit.
Error DetectionError Detection
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Information travels between computersInformation travels between computers
in a network in one of three ways:in a network in one of three ways:
 Simplex transmissionSimplex transmission – information– information
travels in one direction onlytravels in one direction only
 Half-duplexHalf-duplex – information travels in– information travels in
both directions, one way at a timeboth directions, one way at a time
 Full duplexFull duplex – data is transmitted in– data is transmitted in
both directions simultaneouslyboth directions simultaneously
Data TransmissionData Transmission
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Designing a NetworkDesigning a Network
Look at three things:Look at three things:
 TheThe fastest throughput and responsefastest throughput and response
time possibletime possible
 TheThe least-cost pathleast-cost path – the data flows– the data flows
through the fewest devices possiblethrough the fewest devices possible
 Design reliabilityDesign reliability
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Things That ConnectThings That Connect
Networks accomplish data transfer with aNetworks accomplish data transfer with a
concept calledconcept called packet switchingpacket switching..
 Unused (available) portions of aUnused (available) portions of a
network are chosennetwork are chosen
 Data passes through the most efficientData passes through the most efficient
available meansavailable means
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
In networks, the connection point betweenIn networks, the connection point between
your computer and the network is commonlyyour computer and the network is commonly
aa modemmodem..
Modems have becomeModems have become asymmetric digitalasymmetric digital
subscriber line (ADSL).subscriber line (ADSL). The wordThe word
asymmetrical is used because these modemsasymmetrical is used because these modems
send data faster in one direction than thesend data faster in one direction than the
other.other.
Things That ConnectThings That Connect
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Most homes and offices have a dedicated copperMost homes and offices have a dedicated copper
wire running between them and the telephonewire running between them and the telephone
company’s central office.company’s central office.
 The copper wire can carry far more data than theThe copper wire can carry far more data than the
3,000 Hz signal of a typical telephone conversation3,000 Hz signal of a typical telephone conversation
 The copper wire can act as a purely digital high-speedThe copper wire can act as a purely digital high-speed
transmission channel (1 million bps).transmission channel (1 million bps).
 The same line can transmit both a telephoneThe same line can transmit both a telephone
conversation and the digital data.conversation and the digital data.
Asymmetric Digital SubscriberAsymmetric Digital Subscriber
Line -Line - DSLDSL
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Other waysOther ways
of connecting to a networkof connecting to a network
 Use aUse a hubhub
 Most hubs include aMost hubs include a switchswitch. A switch. A switch
determines how data will travel along itsdetermines how data will travel along its
path to the intended destination – to lookpath to the intended destination – to look
for the optimal routefor the optimal route
 AA routerrouter is like a switch. A router is ais like a switch. A router is a
bridge between two networks. Thebridge between two networks. The
router determines the best path betweenrouter determines the best path between
two different networkstwo different networks
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 AA remote switchremote switch is one that is at youris one that is at your
location but controlled by someone else atlocation but controlled by someone else at
different location.different location.
 AA trunktrunk is a circuit between different typesis a circuit between different types
of switching equipment.of switching equipment.
 MiddlewareMiddleware describes a software that isdescribes a software that is
used to connect different applications (theused to connect different applications (the
translator).translator).
Network TermsNetwork Terms
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Data CompressionData Compression
 Techniques to reduceTechniques to reduce
the size of data inthe size of data in
order to improveorder to improve
storage andstorage and
bandwidthbandwidth
(transmission)(transmission)
capacity.capacity.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
BandwidthBandwidth
 Refers to theRefers to the capacitycapacity ofof
the medium that carriesthe medium that carries
the signal.the signal.
 Analog bandwidth isAnalog bandwidth is
measured in Hz.measured in Hz.
 Digital bandwidth isDigital bandwidth is
measured in the numbermeasured in the number
of bits per second theof bits per second the
medium can carry.medium can carry.
 Determines the speed atDetermines the speed at
which data can be movedwhich data can be moved
through a networkthrough a network More bandwidth = more data, faster
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
ProtocolsProtocols
An agreement between people on howAn agreement between people on how
a transaction should take place.a transaction should take place.
Many networks use theMany networks use the TransmissionTransmission
Control Protocol/Internet ProtocolControl Protocol/Internet Protocol
(TCP/IP).(TCP/IP). Your computer must useYour computer must use
TCP/IP to go on the Internet.TCP/IP to go on the Internet.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Basic Network TypesBasic Network Types
 HierarchicalHierarchical - vertical- vertical
or tree structureor tree structure
 Local Area NetworkLocal Area Network
(LAN(LAN) - horizontal) - horizontal
network. Allows eachnetwork. Allows each
device on the networkdevice on the network
to receive everyto receive every
network transmission.network transmission.
 Star ConfigurationStar Configuration ––
All transmissionsAll transmissions
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 LANLAN is a network that operates inis a network that operates in oneone
specific location.specific location.
 Wide Area Network (WAN)Wide Area Network (WAN) is used tois used to
connect geographically separatedconnect geographically separated
networks together.networks together.
Basic Network TypesBasic Network Types
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Basic Network TypesBasic Network Types
 Wireless LocalWireless Local
Area NetworkArea Network
(WLAN)(WLAN) uses radiouses radio
waves to connectwaves to connect
among the mobileamong the mobile
node, mobilenode, mobile
computer, and thecomputer, and the
hardwired network.hardwired network.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Data SecurityData Security
 Could be called Network security orCould be called Network security or
Computer security.Computer security.
 What we are most trying toWhat we are most trying to protect isprotect is
the informationthe information contained in thecontained in the
various systems.various systems.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Physical Security is . . .Physical Security is . . .
Anything we do to physically protectAnything we do to physically protect
our systems and information:our systems and information:
 Placing servers, routers andPlacing servers, routers and
switching equipment behind lockedswitching equipment behind locked
doorsdoors
 Backing up data in one or moreBacking up data in one or more
locationlocation
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 FirewallFirewall - operates by controlling- operates by controlling
access to the network based upon theaccess to the network based upon the
contents of the data packets beingcontents of the data packets being
transmitted on the network.transmitted on the network.
 EncryptionEncryption - changing text or data- changing text or data
into a form that is unreadable withoutinto a form that is unreadable without
a key (secret code)a key (secret code)
Virtual Security is…..Virtual Security is…..
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Virtual Security is…..Virtual Security is…..
 Intrusion DetectionIntrusion Detection ––
security managementsecurity management
system that gatherssystem that gathers
and analyses infoand analyses info
from different part offrom different part of
the network. Scansthe network. Scans
network looking fornetwork looking for
user and systemuser and system
activity and anyactivity and any
pattern of abnormalpattern of abnormal
behavior.behavior.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to theGo to the Student ResourcesStudent Resources page atpage at
www.hitechcj.comwww.hitechcj.com

More Related Content

What's hot

Bluetooth
BluetoothBluetooth
Bluetooth
Aniruddha Gupta
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
Attaullah Sahil-MBA
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
sher1242
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
ijtsrd
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
 
4 g technology
4 g technology4 g technology
4 g technology
sureshjogesh48
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
Sopon Tumchota
 
Pan
PanPan
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking
shrinivasgnaik
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
RANVIJAY GAUR
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
guestac67362
 
Bq4301381388
Bq4301381388Bq4301381388
Bq4301381388
IJERA Editor
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
Baji Babu
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Mohammad Shoeb Quraishi
 
Bluetooth
BluetoothBluetooth
Bluetooth
Ujju146
 
Network
NetworkNetwork
Communication technology
Communication technologyCommunication technology
Communication technology
Abhishek Curtis
 
Data Communication and Internet
Data Communication and InternetData Communication and Internet
Data Communication and Internet
Anuradha Udunuwara
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
Manshi Raj
 

What's hot (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
4 g technology
4 g technology4 g technology
4 g technology
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Pan
PanPan
Pan
 
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
 
Bq4301381388
Bq4301381388Bq4301381388
Bq4301381388
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Network
NetworkNetwork
Network
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Data Communication and Internet
Data Communication and InternetData Communication and Internet
Data Communication and Internet
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
 

Similar to Networks

Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
IOT introduction
IOT introductionIOT introduction
IOT introduction
xinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
Inxee
 
Modules1
Modules1Modules1
Modules1
websec69
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic concepts
Mayank Jain
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
mraheel205
 
ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminar
mshufeldt
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
SazidHossain9
 
01 overview
01 overview01 overview
01 overview
Taye Tolu Mekonnen
 
Data Communications,Data Networks
Data Communications,Data NetworksData Communications,Data Networks
Data Communications,Data Networks
Srinivasa Rao
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
Naqeeb Ullah Kakar
 
01 overview
01 overview01 overview
01 overview
Nguyễn Toàn
 
The internet final
The internet finalThe internet final
The internet final
Rex Springfields Aguirre
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse site
omkhedekxr
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
cheqala5626
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Write My Thesis Paper Thornton
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
Tushar Rajput
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 

Similar to Networks (20)

Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
Beekman5 std ppt_09
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
Modules1
Modules1Modules1
Modules1
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic concepts
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminar
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
01 overview
01 overview01 overview
01 overview
 
Data Communications,Data Networks
Data Communications,Data NetworksData Communications,Data Networks
Data Communications,Data Networks
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
 
01 overview
01 overview01 overview
01 overview
 
The internet final
The internet finalThe internet final
The internet final
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse site
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 

More from Hi Tech Criminal Justice

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
Hi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
Hi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
Hi Tech Criminal Justice
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
Hi Tech Criminal Justice
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
Hi Tech Criminal Justice
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
Hi Tech Criminal Justice
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
Hi Tech Criminal Justice
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
Hi Tech Criminal Justice
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
Hi Tech Criminal Justice
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
Hi Tech Criminal Justice
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
Hi Tech Criminal Justice
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
Hi Tech Criminal Justice
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
Hi Tech Criminal Justice
 
Wiretaps
WiretapsWiretaps
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
Hi Tech Criminal Justice
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
Hi Tech Criminal Justice
 

More from Hi Tech Criminal Justice (20)

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Networks

  • 1. Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter FourChapter Four NetworksNetworks
  • 2. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Learning ObjectivesLearning Objectives  Understand the importance and use ofUnderstand the importance and use of NetworksNetworks  Understand the different types ofUnderstand the different types of technologies necessary to establish atechnologies necessary to establish a networknetwork  Be exposed to several different types ofBe exposed to several different types of networksnetworks  Understand the necessity for networkUnderstand the necessity for network security and several of the means ofsecurity and several of the means of providing network security.providing network security.
  • 3. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Network BasicsNetwork Basics  AA networknetwork is aboutis about two or more peopletwo or more people establishing a wayestablishing a way to communicate.to communicate.  There are formalThere are formal and informaland informal networks.networks.
  • 4. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Network BasicsNetwork Basics  Networks are founded on the concept ofNetworks are founded on the concept of client-server architectureclient-server architecture. Architecture. Architecture refers to the design of a system orrefers to the design of a system or technology.technology.  The individual work station, called aThe individual work station, called a nodenode,, is provided networking services by ais provided networking services by a server.server.
  • 5. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Network BasicsNetwork Basics  TheThe serverserver is a computer thatis a computer that provides files, printers, andprovides files, printers, and processing power to theprocessing power to the individual workstations. Theindividual workstations. The server is a special type ofserver is a special type of computer linked into acomputer linked into a network. It is used only tonetwork. It is used only to manage the network, sharedmanage the network, shared data, and shared resources.data, and shared resources.
  • 6. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Why Network?Why Network?  Law enforcement agencies may haveLaw enforcement agencies may have many buildings and offices in differentmany buildings and offices in different physical locations. A network allows themphysical locations. A network allows them to share computer, data, and informationto share computer, data, and information resources. Much of the information usedresources. Much of the information used by law enforcement comes from agenciesby law enforcement comes from agencies outside their organization (e.g., DMV,outside their organization (e.g., DMV, Corrections, other agencies, etc.).Corrections, other agencies, etc.).
  • 7. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  Networks also provide organizations withNetworks also provide organizations with the capability to back up data. If onethe capability to back up data. If one computer fails, the network can take overcomputer fails, the network can take over the processing load.the processing load. Why Network?Why Network?
  • 8. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Back to …..Back to ….. Analog and Digital SignalsAnalog and Digital Signals An analog signal weakens as it travelsAn analog signal weakens as it travels through wire because of the resistancethrough wire because of the resistance the signal meets in thethe signal meets in the mediummedium that isthat is carrying it (air, wire, coaxial cable).carrying it (air, wire, coaxial cable). Digital signals are subject to the sameDigital signals are subject to the same decrease in strength as analog signals.decrease in strength as analog signals.
  • 9. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Digital signals are the primary means ofDigital signals are the primary means of transmitting data communications.transmitting data communications. Digital signals have several advantagesDigital signals have several advantages over analog:over analog:  Fewer errors;Fewer errors;  Can be transmitted at higher speedsCan be transmitted at higher speeds  Peripheral devices are less complexPeripheral devices are less complex.. Back to …..Back to ….. Analog and Digital SignalsAnalog and Digital Signals
  • 10. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  The analog wave is called aThe analog wave is called a baudbaud.. Bits are essentially added to theBits are essentially added to the analog wave.analog wave.  Public networks tend to run at aboutPublic networks tend to run at about 2,400 baud (waves) per second.2,400 baud (waves) per second. Analog stuffAnalog stuff
  • 11. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  Our technology adds more bits to eachOur technology adds more bits to each baud generally in multiples of four.baud generally in multiples of four.  A 2,400 baud analog signal that addsA 2,400 baud analog signal that adds 12 bits to each baud would give an12 bits to each baud would give an effective transmission rate of 28,800effective transmission rate of 28,800 bits per second (BPS).bits per second (BPS). Analog stuffAnalog stuff This about Modem Speed!
  • 12. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo One of the schemes commonly used toOne of the schemes commonly used to prevent data corruption isprevent data corruption is bit paritybit parity..  Take a stream of binary, add up theTake a stream of binary, add up the numbers, you get an odd or an even number.numbers, you get an odd or an even number.  Add a digit at the end of the data to indicateAdd a digit at the end of the data to indicate if the sum is odd or even.if the sum is odd or even.  The receiving computer compares the sumThe receiving computer compares the sum of the data stream to the bit parity digit.of the data stream to the bit parity digit. Error DetectionError Detection
  • 13. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Information travels between computersInformation travels between computers in a network in one of three ways:in a network in one of three ways:  Simplex transmissionSimplex transmission – information– information travels in one direction onlytravels in one direction only  Half-duplexHalf-duplex – information travels in– information travels in both directions, one way at a timeboth directions, one way at a time  Full duplexFull duplex – data is transmitted in– data is transmitted in both directions simultaneouslyboth directions simultaneously Data TransmissionData Transmission
  • 14. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Designing a NetworkDesigning a Network Look at three things:Look at three things:  TheThe fastest throughput and responsefastest throughput and response time possibletime possible  TheThe least-cost pathleast-cost path – the data flows– the data flows through the fewest devices possiblethrough the fewest devices possible  Design reliabilityDesign reliability
  • 15. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Things That ConnectThings That Connect Networks accomplish data transfer with aNetworks accomplish data transfer with a concept calledconcept called packet switchingpacket switching..  Unused (available) portions of aUnused (available) portions of a network are chosennetwork are chosen  Data passes through the most efficientData passes through the most efficient available meansavailable means
  • 16. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo In networks, the connection point betweenIn networks, the connection point between your computer and the network is commonlyyour computer and the network is commonly aa modemmodem.. Modems have becomeModems have become asymmetric digitalasymmetric digital subscriber line (ADSL).subscriber line (ADSL). The wordThe word asymmetrical is used because these modemsasymmetrical is used because these modems send data faster in one direction than thesend data faster in one direction than the other.other. Things That ConnectThings That Connect
  • 17. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Most homes and offices have a dedicated copperMost homes and offices have a dedicated copper wire running between them and the telephonewire running between them and the telephone company’s central office.company’s central office.  The copper wire can carry far more data than theThe copper wire can carry far more data than the 3,000 Hz signal of a typical telephone conversation3,000 Hz signal of a typical telephone conversation  The copper wire can act as a purely digital high-speedThe copper wire can act as a purely digital high-speed transmission channel (1 million bps).transmission channel (1 million bps).  The same line can transmit both a telephoneThe same line can transmit both a telephone conversation and the digital data.conversation and the digital data. Asymmetric Digital SubscriberAsymmetric Digital Subscriber Line -Line - DSLDSL
  • 18. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Other waysOther ways of connecting to a networkof connecting to a network  Use aUse a hubhub  Most hubs include aMost hubs include a switchswitch. A switch. A switch determines how data will travel along itsdetermines how data will travel along its path to the intended destination – to lookpath to the intended destination – to look for the optimal routefor the optimal route  AA routerrouter is like a switch. A router is ais like a switch. A router is a bridge between two networks. Thebridge between two networks. The router determines the best path betweenrouter determines the best path between two different networkstwo different networks
  • 19. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  AA remote switchremote switch is one that is at youris one that is at your location but controlled by someone else atlocation but controlled by someone else at different location.different location.  AA trunktrunk is a circuit between different typesis a circuit between different types of switching equipment.of switching equipment.  MiddlewareMiddleware describes a software that isdescribes a software that is used to connect different applications (theused to connect different applications (the translator).translator). Network TermsNetwork Terms
  • 20. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Data CompressionData Compression  Techniques to reduceTechniques to reduce the size of data inthe size of data in order to improveorder to improve storage andstorage and bandwidthbandwidth (transmission)(transmission) capacity.capacity.
  • 21. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo BandwidthBandwidth  Refers to theRefers to the capacitycapacity ofof the medium that carriesthe medium that carries the signal.the signal.  Analog bandwidth isAnalog bandwidth is measured in Hz.measured in Hz.  Digital bandwidth isDigital bandwidth is measured in the numbermeasured in the number of bits per second theof bits per second the medium can carry.medium can carry.  Determines the speed atDetermines the speed at which data can be movedwhich data can be moved through a networkthrough a network More bandwidth = more data, faster
  • 22. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo ProtocolsProtocols An agreement between people on howAn agreement between people on how a transaction should take place.a transaction should take place. Many networks use theMany networks use the TransmissionTransmission Control Protocol/Internet ProtocolControl Protocol/Internet Protocol (TCP/IP).(TCP/IP). Your computer must useYour computer must use TCP/IP to go on the Internet.TCP/IP to go on the Internet.
  • 23. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Basic Network TypesBasic Network Types  HierarchicalHierarchical - vertical- vertical or tree structureor tree structure  Local Area NetworkLocal Area Network (LAN(LAN) - horizontal) - horizontal network. Allows eachnetwork. Allows each device on the networkdevice on the network to receive everyto receive every network transmission.network transmission.  Star ConfigurationStar Configuration –– All transmissionsAll transmissions
  • 24. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  LANLAN is a network that operates inis a network that operates in oneone specific location.specific location.  Wide Area Network (WAN)Wide Area Network (WAN) is used tois used to connect geographically separatedconnect geographically separated networks together.networks together. Basic Network TypesBasic Network Types
  • 25. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Basic Network TypesBasic Network Types  Wireless LocalWireless Local Area NetworkArea Network (WLAN)(WLAN) uses radiouses radio waves to connectwaves to connect among the mobileamong the mobile node, mobilenode, mobile computer, and thecomputer, and the hardwired network.hardwired network.
  • 26. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Data SecurityData Security  Could be called Network security orCould be called Network security or Computer security.Computer security.  What we are most trying toWhat we are most trying to protect isprotect is the informationthe information contained in thecontained in the various systems.various systems.
  • 27. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Physical Security is . . .Physical Security is . . . Anything we do to physically protectAnything we do to physically protect our systems and information:our systems and information:  Placing servers, routers andPlacing servers, routers and switching equipment behind lockedswitching equipment behind locked doorsdoors  Backing up data in one or moreBacking up data in one or more locationlocation
  • 28. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  FirewallFirewall - operates by controlling- operates by controlling access to the network based upon theaccess to the network based upon the contents of the data packets beingcontents of the data packets being transmitted on the network.transmitted on the network.  EncryptionEncryption - changing text or data- changing text or data into a form that is unreadable withoutinto a form that is unreadable without a key (secret code)a key (secret code) Virtual Security is…..Virtual Security is…..
  • 29. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Virtual Security is…..Virtual Security is…..  Intrusion DetectionIntrusion Detection –– security managementsecurity management system that gatherssystem that gathers and analyses infoand analyses info from different part offrom different part of the network. Scansthe network. Scans network looking fornetwork looking for user and systemuser and system activity and anyactivity and any pattern of abnormalpattern of abnormal behavior.behavior.
  • 30. Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Go to theGo to the Student ResourcesStudent Resources page atpage at www.hitechcj.comwww.hitechcj.com