NETWORK
NETWORK
A collection of computers linked together to allow communication and the sharing of resources
ADVANTAGES DISADVANTAGES
file sharing - users can share cost- additional equipment is
files with other users needed to allow computers to
communicate
hardware sharing - users can
share hardware, such as a management - networks require
printer management by technical staff
such as a network manager
communication - users can
communicate via email, chat, spread of malware - viruses and
or by video other forms of malware can
easily spread across an
roaming access - users can sign
improperly secured network
in to any computer on the
network and be able to access hacking - once a device is
their files connected to another device, it
is possible that data may be
On larger networks, such as those used
accessed without the device
by businesses and schools, there are
owner's permission
additional benefits:
THE INTERNET
It is INTERconnected NETworks
Collection of computers and networks not owned or managed by a group of
people
Anyone can access it
WHAT IS THE DIFFERENCE BETWEEN THE INTERNET AND WWW
DATA TRANSMISSION
IP (internet protocol address) address
Unique identification number to each device connected in a network
When connecting to the internet your ISP provides you a unique ip address for
that session it changes from time to time
A node given a static address always keeps the same address. A node given a dynamic
address has a different address assigned to it each time it connects to the network
Static addresses make it easier for network managers to know what device is which
Dynamic makes it easier to allow more people than possible ip addresses onto the network
So if you go on the netework get an ip address then leave your ip address is free to be used
by someone else
Ipv4ipv6 more possible ip addresses for the wider usage of networks
PACKET SWITCHING
-file is broken up into data packets
-each packet is labelled given a header given the IP address it is going to and
from, sequence number of the packet, number of packets, error checking data
etc)
The packets are sent to the destination and then rearranged according to the
labels it is given
NETWORK HARDWARE
NIC(Network Interface Cards)
Every device connecting to a network needs it
Uses a set of rules to determine how the connection should work
Most modern computers have these built in
ROUTERS
-connection devices
-used to send data signals across the internet
-it recognises the available routes to transmit data and then the most suitable
one is chosen
-also commonly used in homes to route data from the LAN to the internet
-each router acts as a node data passes from router to router to the final
destination
-NORMALLY USED IN A WAN such as the internet
NODE-connection point that can receive and transmit data
SWITCHES
-component of LANs
-knows the MAC addresses of each individual device connected to the LAN
-when there is traffic the switch transfers data to the intended recipient
-hubs on the other hand transmit data packets to all computers switches cut
down unnecessary transmissions
WIRELESS NETWORKING
WIFI is wireless connection rather than physical wires
Wi-Fi is a family of protocols or rules that make wireless networking
run smoothly
Use radio waves to transmit signals
As long as it is in the range of a WAP (wireless access points) these
allow devices to connect wirelessly to a network It allows
standardized connections
Ap is connected to the router
Can be obstructed by walls or other electronic devices
ADVANTAGES DISADVANTAGES
-physical free movement -wireless connections can cause
-no need to connect to a port to slower file transfers
share files and other resources -walls and physical obstruction
-saves expense, time and can disrupt wireless connections
inconvenience of laying cables -wireless networks are easier to
through walls, floors etc hack
-easy to add new devices into CRIMINAL ACTIVITY
the network -unauthorised user can use the
-instant transfer of data eg wireless connection hack into
uploading photos etc the network and cause damage
BANDWITH STEALING
-using internet connection
-outside intruders can slow the
network down
CONFIDENTIALITY
-if any network information is
not encrypted it can be taken
WIRED NETWORK
In modern networks, wired media use either twisted copper wiring, or fibre-optic cable. Each
wired medium has differing characteristics.
Fibre optic cables use data transmitted as light
BUS TECHNOLOGY
All nodes are connected to a direct central table
Known as the backbone
Data is sent up and down this backbone until the correct node
receives the data
All nodes receive all data frames (divided data) each node has to
determine If the message is meant for it using its MAC address
Only one node can successfully transmit at any one time which is fine
if the network is not too busy but if there is lots o f traffic and
collision the computer has to retransmit
As number of collisions increase the network slows down
ADVANTAGES DISADVANTAGES
-easy and in expensive to install -if main cable falls the whole
since there is less cabling than network does
star topology -as traffic increases so does
-no reliance on a central node performance
-only one computer at a time
can successfully transmit a data
frame (data collision can
otherwise occur when the data
is corrupted)
-data Is not very secure as all
nodes can see all transmissions
as it is along the same main
cable
Bus topologies are not widely used in modern networking as they are not well suited to
dealing with large amounts of data. They are used when a small, cheap and often temporary
network is needed that does not rely on very high data transfer speeds.
NETWORK PROTOCOLS
A set of rules that governs the transmission of data across a network
ETHERNET
-family of protocols widely used in LANs
-determines how data should be formatted for transmission
5. The right MAC address will open the frame, the others ignore
it. The switch will note which port is attached to that MAC
address.
NETWORK SECURITY
-networks are more vulnerable to hackers than standalone devices
because gaining access to one device can allow access to the others
-could result in data theft,corruption and malware damage
-security is necessary to prevent unauthorised access
AUTHENTICATION
1)password protection
-if same computer is used by more than one person
2)user access levels
-read only access when you can not edit files teachers might have
read write access
-some folders you cant even access
-data protection act says employers must keep personal data secure
so it is needed
2)ENCRYPTION
-used to protect data and prevent It being hackers or accesses
illegally
-sending data across a network can be risky encryption cant prevent
hacking but makes it unreadable unless a decryption tool is used
Plaintext: original message
Ciphertext: encrypted message
Key :formula or sequence used to encrypt
Sometimes the characters are shifted to a certain position
Eg Caesar cipher uses a simple key
3)FIREWALL
-device/software that monitors incoming and outgoing network
traffic and decides whether or not to block specific traffic based on a
set of security rules
Eg some firewalls may block data from certain ip addresses
-the network manager can decide what data traffic can come in and
what ports to keep closed
4) MAC address filtering
Since every device has a unique mac address it is possible to
determine what devices are allowed access
However though it identified permitted devices it does not identify
the user like authentication