0% found this document useful (0 votes)
2 views

NETWORK

The document provides an overview of computer networks, detailing their advantages and disadvantages, types (LAN, WAN, PAN), and key components such as routers, switches, and network protocols. It discusses data transmission methods, including packet switching and IP addressing, as well as security measures like authentication and encryption. Additionally, it covers network topologies and the differences between wired and wireless networking, highlighting their respective benefits and drawbacks.

Uploaded by

shaambavy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

NETWORK

The document provides an overview of computer networks, detailing their advantages and disadvantages, types (LAN, WAN, PAN), and key components such as routers, switches, and network protocols. It discusses data transmission methods, including packet switching and IP addressing, as well as security measures like authentication and encryption. Additionally, it covers network topologies and the differences between wired and wireless networking, highlighting their respective benefits and drawbacks.

Uploaded by

shaambavy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

NETWORK

A collection of computers linked together to allow communication and the sharing of resources

ADVANTAGES DISADVANTAGES
 file sharing - users can share  cost- additional equipment is
files with other users needed to allow computers to
communicate
 hardware sharing - users can
share hardware, such as a  management - networks require
printer management by technical staff
such as a network manager
 communication - users can
communicate via email, chat,  spread of malware - viruses and
or by video other forms of malware can
easily spread across an
 roaming access - users can sign
improperly secured network
in to any computer on the
network and be able to access  hacking - once a device is
their files connected to another device, it
is possible that data may be
On larger networks, such as those used
accessed without the device
by businesses and schools, there are
owner's permission
additional benefits:

 centralised maintenance and


updates - network managers
can apply software updates
across a network, removing
the need for a user to worry
about having to do so
 centralised security - anti-virus
software and firewalls can be
implemented across a network,
helping to protect user files
from risks
 user monitoring - network
managers can monitor what
users do on a network
 levels of access - different users
can be given different access
rights, and this gives network
managers the ability to
generally restrict user access
to certain files, while granting
permission to specific users

THE INTERNET
It is INTERconnected NETworks
Collection of computers and networks not owned or managed by a group of
people
Anyone can access it
WHAT IS THE DIFFERENCE BETWEEN THE INTERNET AND WWW

LAN(Local Area Network)


-geographically contained within one site or building

-eg colleges,universities,small businesses,schools


-collection of computers and peripheral devices (eg printers and other devices
not needed for function but other uses)

WAN(Wide Area Network)


-collection of computers and networks often owned by a third-party carrier eg
BT
-uses cables, telephone lines, satellites and radio waves to connect them
-generally over a wider geographical area
-since it is under collective ownership it is much more expensive than LAN
-organisations with many branches tend to use WANS can cover over countries

PAN(Personal Area Network)


-spread over a very small area
-used to connect personal devices eg Bluetooth headphones to a phone

DATA TRANSMISSION
IP (internet protocol address) address
Unique identification number to each device connected in a network
When connecting to the internet your ISP provides you a unique ip address for
that session it changes from time to time
A node given a static address always keeps the same address. A node given a dynamic
address has a different address assigned to it each time it connects to the network
Static addresses make it easier for network managers to know what device is which
Dynamic makes it easier to allow more people than possible ip addresses onto the network
So if you go on the netework get an ip address then leave your ip address is free to be used
by someone else
Ipv4ipv6 more possible ip addresses for the wider usage of networks

Also links to the location of where you are

PACKET SWITCHING
-file is broken up into data packets
-each packet is labelled given a header given the IP address it is going to and
from, sequence number of the packet, number of packets, error checking data
etc)
The packets are sent to the destination and then rearranged according to the
labels it is given

NETWORK HARDWARE
NIC(Network Interface Cards)
Every device connecting to a network needs it
Uses a set of rules to determine how the connection should work
Most modern computers have these built in

MAC ADRESS(media access control )


-assigned to each NIC by the manufacturer
-your computer may have more than one mac address if it is connected to the
ethernet and one for wireless
-a mobile phone may have one for Bluetooth and wireless
-twelve hex digits to make it easier for humans to work with
-the first six identifies the manufacturer the second to five the serial number of
the device(identification number)
-every networked device has a unique unchanging MAC address

ROUTERS
-connection devices
-used to send data signals across the internet
-it recognises the available routes to transmit data and then the most suitable
one is chosen
-also commonly used in homes to route data from the LAN to the internet
-each router acts as a node data passes from router to router to the final
destination
-NORMALLY USED IN A WAN such as the internet
NODE-connection point that can receive and transmit data

SWITCHES
-component of LANs
-knows the MAC addresses of each individual device connected to the LAN
-when there is traffic the switch transfers data to the intended recipient
-hubs on the other hand transmit data packets to all computers switches cut
down unnecessary transmissions

WIRELESS NETWORKING
WIFI is wireless connection rather than physical wires
Wi-Fi is a family of protocols or rules that make wireless networking
run smoothly
Use radio waves to transmit signals
As long as it is in the range of a WAP (wireless access points) these
allow devices to connect wirelessly to a network It allows
standardized connections
Ap is connected to the router
Can be obstructed by walls or other electronic devices

ADVANTAGES DISADVANTAGES
-physical free movement -wireless connections can cause
-no need to connect to a port to slower file transfers
share files and other resources -walls and physical obstruction
-saves expense, time and can disrupt wireless connections
inconvenience of laying cables -wireless networks are easier to
through walls, floors etc hack
-easy to add new devices into CRIMINAL ACTIVITY
the network -unauthorised user can use the
-instant transfer of data eg wireless connection hack into
uploading photos etc the network and cause damage
BANDWITH STEALING
-using internet connection
-outside intruders can slow the
network down
CONFIDENTIALITY
-if any network information is
not encrypted it can be taken

WIRED NETWORK
In modern networks, wired media use either twisted copper wiring, or fibre-optic cable. Each
wired medium has differing characteristics.
Fibre optic cables use data transmitted as light

Twisted copper wire Fibre-optic cable

Cost Cheaper to purchase and More expensive to purchase and


install install

Maximum Up to 1 gigabit per second Over 40 terabits per second


transmission speed

Maximum distance for Up to 100 metres Over 2 kilometres


reliable
communication
Wired networks Wireless networks

Cost Installation costs can be Cheaper to set up, devices can


expensive connect if in the range of a
wireless access point

Installation Installation requires Installation is simple as most


technical knowledge and wireless devices will connect
space to install cables automatically

Maximum Up to 1 gigabit per second Up to 50 megabits per second


transmission speed for Ethernet

Maximum distance for Up to 100 metres for Up to 50 metres


reliable Ethernet - over 2 kilometres
communication for fibre optic

Security of More secure as a physical Less secure as wireless signal


connection connection is required to cannot be contained within a
intercept data building and no physical
connection is needed to
intercept data

Sopper wires are however affected by electromagnetic interference


and can go onto affect other wires and cause distorted transmissions
NETWORK TOPOLOGIES
Topologies are ways computers are connected together in different
layouts
STAR TOPLOGY
Nodes are connected to a switch and routes message to the correct
computer
ADVANTAGE DISADVANTAGE
-if one cable fails the other -costly due to lot of cabling and
workstations are not affected extra hardware such as the
-consistent performance even switch
when network is heavily used -if central switch fails the whole
-good security as data is only network goes down
received by node that needs it
-reliable

BUS TECHNOLOGY
All nodes are connected to a direct central table
Known as the backbone
Data is sent up and down this backbone until the correct node
receives the data
All nodes receive all data frames (divided data) each node has to
determine If the message is meant for it using its MAC address
Only one node can successfully transmit at any one time which is fine
if the network is not too busy but if there is lots o f traffic and
collision the computer has to retransmit
As number of collisions increase the network slows down
ADVANTAGES DISADVANTAGES
-easy and in expensive to install -if main cable falls the whole
since there is less cabling than network does
star topology -as traffic increases so does
-no reliance on a central node performance
-only one computer at a time
can successfully transmit a data
frame (data collision can
otherwise occur when the data
is corrupted)
-data Is not very secure as all
nodes can see all transmissions
as it is along the same main
cable

Bus topologies are not widely used in modern networking as they are not well suited to
dealing with large amounts of data. They are used when a small, cheap and often temporary
network is needed that does not rely on very high data transfer speeds.

NETWORK PROTOCOLS
A set of rules that governs the transmission of data across a network
ETHERNET
-family of protocols widely used in LANs
-determines how data should be formatted for transmission

1. Data is broken into frames which contain:


1. the source MAC address
2. the destination MAC address
3. some error checking data

2. Each node waits for the connection to be quiet before


attempting to transmit the data.

3. If two nodes happen to try transmitting at the same time,


each will wait for a random amount of time before trying
again.

4. If the switch doesn't know which port is linked to the


destination MAC address, it will broadcast it to all nodes.

5. The right MAC address will open the frame, the others ignore
it. The switch will note which port is attached to that MAC
address.

6. Any frames found to have an error in the data (using the


error checking data) will be discarded and re-requested.

NETWORK SECURITY
-networks are more vulnerable to hackers than standalone devices
because gaining access to one device can allow access to the others
-could result in data theft,corruption and malware damage
-security is necessary to prevent unauthorised access
AUTHENTICATION
1)password protection
-if same computer is used by more than one person
2)user access levels
-read only access when you can not edit files teachers might have
read write access
-some folders you cant even access
-data protection act says employers must keep personal data secure
so it is needed
2)ENCRYPTION
-used to protect data and prevent It being hackers or accesses
illegally
-sending data across a network can be risky encryption cant prevent
hacking but makes it unreadable unless a decryption tool is used
Plaintext: original message
Ciphertext: encrypted message
Key :formula or sequence used to encrypt
Sometimes the characters are shifted to a certain position
Eg Caesar cipher uses a simple key

3)FIREWALL
-device/software that monitors incoming and outgoing network
traffic and decides whether or not to block specific traffic based on a
set of security rules
Eg some firewalls may block data from certain ip addresses
-the network manager can decide what data traffic can come in and
what ports to keep closed
4) MAC address filtering
Since every device has a unique mac address it is possible to
determine what devices are allowed access
However though it identified permitted devices it does not identify
the user like authentication

You might also like