What I learned from Molyneux and Drew in the book "Technology for the Rest of Us"
I will discuss the two new topics I learned after reading Molyneux’s “Computer Networks” and Drew’s “Wireless Local Area Networks” chapters from the book, Technology for the Rest of Us. From Molyneux, I learned about partial and full mesh network architectures and the OSI Reference Model concept. From Drew, I learned about the 802.11 Standard for LAN’s, and about WLAN security protocols.
From Molyneux, I learned that a full-mesh network is when each device is interconnected, while in a partial mesh network, devices do not need to be connected to every other device (p 4). To show the benefits of a partial mesh network, Molyneux gives the illustration of a phone network in a full mesh network scenario: every time a new phone is added to the network, it would require a connection “to all other phones in the country” (p 4). Because of this, Molyneux points out that full mesh network designs are usually constrained to small applications (p 4). Therefore, besides feasibly, a major benefit of a partial mesh network is cost reduction because not all devices require connections (p 5).
Molyneux also introduced me to the concept of the OSI Reference Model of network design. This model provides the basis “for comparison and teaching purposes” of all other networking protocols (p 9). This model is multilayered and includes the physical, data link, network, transport, session, presentation, and application levels. Because of this, most information professionals specialize in one layer because “each involves its own technologies, is complex, and requires different skills” (p 9). Molyneux has also proposed a “Layer 8” for libraries whose decision making is
From Drew I learned about the 802.11 Standard for LAN’s, which Drew characterizes as “the most important event in the growth of WLAN’s” (p 16). This standard was adopted in 1997 by the Institute of Electrical and Electronics Engineers (IEEE) and it “describes the protocols and sets a common framework for all developers” (p 16). This standard guarantees purchasers “greater bandwidth” and manufacturers’ compliance with the standard so that devices can “talk with each other no matter what the brand” (p 16).
Drew also taught me about WLAN security including VPN, WEP, WPA and TKIP protocols. VPA means virtual private network, and this protocol requires network authentication before accepting users onto the network and data encryption during transmition (p18). WEP means Wired Equivalency Privacy and this protocol uses an algorithm or “key” for data encryption that is “built into” most access points; it is also the most widely used security protocol (p18). WPA means Wi-Fi protected access and this protocol has been “designed to overcome the basic weaknesses of WEP by providing improved encryption of data and by improving authorization routines” (p19). This protocol requires a password or “preshared key” that the “access point and client use…to generate new keys on other devices on the network” (p 19). And finally, TKIP means Temporal Key integrity Protocol, and it is an algorithm that “provides improved security recognition of the origin of the data being transmitted or received, and greatly improved authentication” (p 19). Drew taught me that security protocols for WLAN’s are important for a secure network so that data can’t be captured and new protocols are being continually developed for even greater security.
References:
Robert E. Molyneux, "Computer Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 1-14 (Westport, Connecticut: Libraries Unlimited, 2005).
Wilfred Drew, Jr., "Wireless Local Area Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 15-22 (Westport, Connecticut: Libraries Unlimited, 2005).
From Molyneux, I learned that a full-mesh network is when each device is interconnected, while in a partial mesh network, devices do not need to be connected to every other device (p 4). To show the benefits of a partial mesh network, Molyneux gives the illustration of a phone network in a full mesh network scenario: every time a new phone is added to the network, it would require a connection “to all other phones in the country” (p 4). Because of this, Molyneux points out that full mesh network designs are usually constrained to small applications (p 4). Therefore, besides feasibly, a major benefit of a partial mesh network is cost reduction because not all devices require connections (p 5).
Molyneux also introduced me to the concept of the OSI Reference Model of network design. This model provides the basis “for comparison and teaching purposes” of all other networking protocols (p 9). This model is multilayered and includes the physical, data link, network, transport, session, presentation, and application levels. Because of this, most information professionals specialize in one layer because “each involves its own technologies, is complex, and requires different skills” (p 9). Molyneux has also proposed a “Layer 8” for libraries whose decision making is
“about what the networks will be used for [which] is a function decided outside the OSI Model- it is related to what the mission of the institution is and how networks can advance that mission” (p 10).
From Drew I learned about the 802.11 Standard for LAN’s, which Drew characterizes as “the most important event in the growth of WLAN’s” (p 16). This standard was adopted in 1997 by the Institute of Electrical and Electronics Engineers (IEEE) and it “describes the protocols and sets a common framework for all developers” (p 16). This standard guarantees purchasers “greater bandwidth” and manufacturers’ compliance with the standard so that devices can “talk with each other no matter what the brand” (p 16).
Drew also taught me about WLAN security including VPN, WEP, WPA and TKIP protocols. VPA means virtual private network, and this protocol requires network authentication before accepting users onto the network and data encryption during transmition (p18). WEP means Wired Equivalency Privacy and this protocol uses an algorithm or “key” for data encryption that is “built into” most access points; it is also the most widely used security protocol (p18). WPA means Wi-Fi protected access and this protocol has been “designed to overcome the basic weaknesses of WEP by providing improved encryption of data and by improving authorization routines” (p19). This protocol requires a password or “preshared key” that the “access point and client use…to generate new keys on other devices on the network” (p 19). And finally, TKIP means Temporal Key integrity Protocol, and it is an algorithm that “provides improved security recognition of the origin of the data being transmitted or received, and greatly improved authentication” (p 19). Drew taught me that security protocols for WLAN’s are important for a secure network so that data can’t be captured and new protocols are being continually developed for even greater security.
References:
Robert E. Molyneux, "Computer Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 1-14 (Westport, Connecticut: Libraries Unlimited, 2005).
Wilfred Drew, Jr., "Wireless Local Area Networks," in Technology for the Rest of Us: A Primer on Computer Technologies for the Low-tech Librarian, ed. Nancy Courtney, 15-22 (Westport, Connecticut: Libraries Unlimited, 2005).

0 Comments:
Post a Comment
<< Home