0% found this document useful (0 votes)
71 views

Chapter 5 Network

A network allows computers to communicate and share resources. Devices connect to a network using a network operating system and unique identifiers like IP addresses and MAC addresses. Wired networks rely on cables like Cat5e and fibre optic to connect devices, while wireless uses WiFi and access points. Common network components include switches, routers, servers, and gateways. Users can access the internet through an ISP and use browsers and search engines to find and view online information.

Uploaded by

Mr. Jack 1106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Chapter 5 Network

A network allows computers to communicate and share resources. Devices connect to a network using a network operating system and unique identifiers like IP addresses and MAC addresses. Wired networks rely on cables like Cat5e and fibre optic to connect devices, while wireless uses WiFi and access points. Common network components include switches, routers, servers, and gateways. Users can access the internet through an ISP and use browsers and search engines to find and view online information.

Uploaded by

Mr. Jack 1106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 77

Chapter 5

Network

Yuet Wah College


Network
A network is created when two or more
computers are connected together.
Using a network, a computer can
communicate with others and share
resources, such as hardware, software
and data.
Requirements For Connecting to Networks
In order to connect to a network,
computers need to fulfill certain
requirements so that they all operate
using standard protocols.
Protocols: rules that allow the exchange
and transmission of data between
devices.
Network Operating Systems
A network operating system allows a
computer to communicate on a network.
It provides additional functionality to a
stand-alone operating system including:
Network Operating Systems
 passing usernames and passwords to a
server for checking when a user logs in.
 separating user accounts and ensuring
that users cannot access each other’s
files
 providing access to network storage and
shared resources such as networked
printers.
How devices are identified on a network
There are three methods used to identify
devices on a network:
• Internet Protocol (IP)
• MAC address
• device name.
Internet Protocol (IP)
An IP address is a unique address that
networked devices use to send data to
each other.
Each piece of data that is sent across a
network carries the IP address of the
destination, so that each device in the
network know where to send it.
Internet Protocol (IP)
IP addresses are made up groups of numbers.
There are two main versions of IP in use.
IPv4 uses four groups of up to three numbers
separated by full stops. (e.g. 192.168.1.1)
IPv6 uses eight groups of four hexadecimal
numbers separated by colons. (e.g.
2001:0db8:0000:0042:0000:8a2e:0370:7334)
Internet Protocol (IP)
IP addresses can either be assigned by a
network administrator or allocated
dynamically by a user running Dynamic
Host Configuration Protocol (DHCP).
DHCP server: a networked computer that
automatically assigns an IP address to
other computers when they join the
network.
Internet Protocol (IP)
MAC Address
Unlike IP addresses, which can be
dynamically allocated by users or server,
media access control (MAC) addresses are
universally unique identifiers given to the
network interface card (NIC).
MAC Address
MAC addresses are used in devices
connected to local area networks (LANs)
using Ethernet, Bluetooth or Wi-Fi.
MAC addresses are assigned by the NIC
manufacturer and are generally
considered to be fixed addresses.
MAC Address
A MAC address is usually made up of six
pairs of characters. The first three pairs
identify the manufacturer and the
remaining pairs are assigned by the
manufacturer to unique identify the
device.
MAC Address
00 16 01 AF 12 F6

Manufacture’s unique NIC specific address


identifier
Uses of MAC Address
USE EXAMPLE
Restricting or allowing MAC address filtering checks the MAC address of devices attempting
access to a network to gain access to a network and only grants access to devices with
specified MAC addresses
Identifying a device on Some Wi-Fi hotspots only provide free access for a certain length of
a network time, and they identify a device using the MAC address in order to
work out whether it is trying to access the hotspot for longer than the
permitted time
Tracking a device Some companies and organisations track devices ( and therefore their
users) by checking with wireless access points have been accessed by
specific MAC address
Assigning ‘static’ or Each time a device connects to a network, it is identified by a DHCP
‘fixed’ IP addresses server (usually using its MAC) and given the same IP address as
before.
Device Name
A device name is a descriptive name that
helps users to identify computers on a
network.
Device names are not used by computers
to communicate with each other as they
are not always unique. This means that
they could cause conflicts if data was sent
to more than one device with the same
name for processing.
Components of Wired and Wireless Systems
Wired and wireless systems can be made
up of a variety of components.
Components of Wired and Wireless Systems
Cables are used to connect devices in a
wired network.
In homes and small business, Cat5e
cables are used for Ethernet connections.
These cables are able to transfer data to
10 Mbit/s, 100 Mbit/s or 1 Gmbit/s.
Components of Wired and Wireless Systems
Cat5e cable connects devices through
their NICs. The device’s NIC allows the
computer to exchange data with other
networked through their NICs. The
device’s NIC allows the computer to
exchange data with other networked
computers.
Components of Wired and Wireless Systems
Cat6 cables can be used to transfer data
at 10 Gbit/s. These are more expensive
than Cat5e cables and are usually only
used by business.
Components of Wired and Wireless Systems
Fibre optic cables are flexible fibres. Each
firbre optic cable contains a glass thread
that bounces light signals between two
devices faster and further than is possible
with wire cables.
Components of Wired and Wireless Systems
Fibre optic cables can now carry data at
40 Gbit/s over many kilometres without
affecting signal quality.
Components of Wired and Wireless Systems
Fibre optic cables are expensive. This
means that they are used by
telecommunications companies and by
organisations that need very fast data
transfer speeds, such as science and
engineering laboratories, hospitals, banks,
school and universities.
Components of Wired and Wireless Systems
A wireless access point allows devices
with Wi-Fi connectivity to connect to a
wired network.
They are often built into other hardware,
such as routers, but they are also
available as stand-alone devices that
connect to a wired network using
Ethernet cables.
Components of Wired and Wireless Systems
Components of Wired and Wireless Systems
A switch connects devices on a network.
It has ports, each of which can be
connected to device using a cable.
Components of Wired and Wireless Systems
Connecting a wireless access point to a
switch via a cable gives wireless devices
access to the wired network.
The switch makes sure that data sent
from any device gets to the correct device
to the network.
Components of Wired and Wireless Systems

A switch allows multiple devices to send data to each other


Components of Wired and Wireless Systems
A gateway connects two different types of
network.
For example, a LAN connected to a WAN
using a gateway.
Components of Wired and Wireless Systems
A router stores the addresses of all
devices that are connected to is so that it
can forward network traffic to its
destination using the quickest route.
Components of Wired and Wireless Systems
Most routers used in home include a
switch and a wireless access point.
They also act as gateways, connecting the
LAN to the internet, which is a type of
WAN.
Components of Wired and Wireless Systems
A booster is used amplify the signal in a
network so that its range can be
extended.
Components of Wired and Wireless Systems
A server is a computer that shared its
resources with connected devices.
Computers connected to a server are
known as clients.
Resources that can be shared by one or
more servers include printers, storage and
applications.
Components of Wired and Wireless Systems
An authentication server checks
usernames and passwords.
When a user successfully logs in, the
client receives and electronic certificate
that it can then use to access various
resources, including applications and
storage.
Components of Wired and Wireless Systems
A printer server manages multiple
printers at a time, dealing with print
requests from client computers and
adding jobs to queue so that individual
printers are not overloaded with
requests.
Components of Wired and Wireless Systems
File server allow uses to access shared
and private storage.
Application server provide clients with
access to applications that can be run
directly form the server.
Components of Wired and Wireless Systems
Web servers process requests for data
made via Hypertext Transfer Protocol
(HTTP).
Together, all of the content stored on all
web servers is known as the World Wide
Web (www). Client computers often
access web serers from outside the LAN to
which the server is connected.
Connecting to and using the Internet
In order to access the online services
provided by servers and data centres,
users must have a connection to the
internet. Users also need software that
allows them to use and work with the
services effectively and safely.
Connecting to and using the Internet
To connect to the internet, users need to
subscribe to an ISP (Internet Service
Provider).
Connecting to and using the Internet
Connecting to and using the Internet
ISPs provide access via mobile telephone
networks and landline telephone
networks.
Commercial ISPs charge subscription fees
for access to the Internet. Some ISPs
provide free access as part of the
community schemes.
Connecting to and using the Internet
Connecting to and using the Internet
A web browser is a type of software
application used to request and display
information stored on web servers.
E.g. Mozilla, Firefox, Google Chrome,
Internet Explorer, Edge, Opera and Safari.
Connecting to and using the Internet
A search engine provides users with a way
to find information in web pages stored
on web browsers.
Connecting to and using the Internet
Users enter keywords that describe the
information they want to find. The search
engine then compares the keywords with
those in its database of web pages and
returns the results that are the closet
match to the given keywords.
Connecting to and using the Internet
Filter software prevents users from
accessing inappropriate information.
Connecting to and using the Internet
When a user tries to access a webpage, URL: (Uniform resource
locator): a website
the address (URL) and/or the contents of addresses
the web page are compared against two
lists of URLs and keywords stored it the
software’s database.
The two lists are the blacklist and the
whitelist.
Connecting to and using the Internet
If the results match anything in the blacklist, the
user will be prevented from viewing the web
page.
If the result matches anything in the whitelist,
then the user will be alloed to view the web
page.
If the result does not match anything in either
the blacklist or the whitelist, the user will be
allowed to view the information.
Connecting to and using the Internet
Administrators can add URLs to the
blacklist and whitelist. The blacklist an be
updated during software updates.
Filter software can help schools and
parents to protect children from accessing
disturbing or age-inappropriate content.
Local Area Networks
A LAN is a network contained to a small
area, such as a home or office network.
Computers in a network can be
connected using one of two different
models:
 Peer-to-peer
 Client-server
Local Area Networks
Computers in a peer-to-peer network
share their resources with other
computers in the network, but they do
not access servers.
Local Area Networks
Some networks use servers. A network
that uses servers and clients is called a
client-server network.
Benefits of Using LAN
 access to shared peripherals
 access to shared storage and data
 flexible access (i.e. being able to access peripherals,
storage and data from any connected device)
 media streaming (including movies music and
gaming)
 communication (i.e. being able to send messages
and files to others on the network)
 shared access to the internet.
Benefits of Using Client-Server Networks
There are several benefits of using client-
server networks that are not available
when using a peer-to-peer network.
 Control of user access rights: Users, or
groups of users, can be given access to
some resources (such as storage or
printers) and restricted from accessing
others.
Benefits of Using Client-Server Networks
 Centralised administration: Resources
and user accounts can be managed by
an individual, or individual group of
servers and administrators. This ensures
that support can be provided by people
who have an overview of the network
and avoids inexperienced users creating
problem for themselves or others.
Benefits of Using Client-Server Networks
 Centralised backup: User data is
protected from loss because backups ca
be automated for all users. This makes
it more likely that backups will happen
than if individual users were asked to
complete backups themselves.
Benefits of Using Client-Server Networks
 Shared software: Application servers
can provide access to shared software.
Some servers can provide access to
operating systems.
Benefits of Using Client-Server Networks
 Shared storage and file access: The
amount of storage available to users
can be managed centrally. Sharing
storage means that users can make files
available to others. File permissions
can be set for individual files, folders or
drives, allowing users to enter read
only or read and write to different files.
Benefits of Using Client-Server Networks
 Roaming profiles: This is the ability to
log into any computer in an office and
see your settings and files. This allows
users to access data, applications, mail
and printers from any client, enabling
them to work from anywhere there is a
client.
Securing Data on Networks
Security prevents unauthorized users
from accessing network resources and
data.
Logins and Passwords
Users log in to computers on a network to
access cenrally managed resources.
Withut the correct login details, users
cannot access the network or its
resources.
Passwords are used to authenticate a user
to the network.
Firewalls
A firewall is used at the gateway to a
network. It controls the network traffic to
and from a network, particularity the
traffic from the internet.
Firewall prevent unauthorized users from
accessing network devices and resources,
such as storage.
Encryption
Encryption is the process of encoding,
scrambling or jumbling data so that
unauthorized users are prevented from
being able to understand it.
Encryption
One method used to encrypt text is called
Caesar cipher. This method shifts each
letter to the left by a set number of
places. The number of places by which
the letters have been shifted is known as
the key.
Encryption
A Caesar cipher is quite easy to crack, but
most modern encryption is much more
secure. There are two types of
encryption:
 symmetric key encryption
 public key encryption
Symmetric Key Encryption
Symmetric key encryption uses the same
key at both ends of the process, meaning
that the same key is used to encrypt and
decrypt the data.
Public Key Encryption
Public key encryption used two
mathematically related keys called a key
pair. One key is used to encrypted the
data and a different key is used to decrypt
it.
Public Key Encryption
A computer shares a public key with other
computers that want to send it encrypted
data. This public key is mathematically
related to a private key, which is not
shared.
Wireless Encryption Protocol (WEP)
It is easier to intercept data in a wireless
network than in a wired network.
Wireless Encryption Protocol (WEP) is
used to secure the wireless transfer of
data.
Wireless Encryption Protocol (WEP)
It is the least secure wireless data
encryption method. This is because every
device on the wireless network uses the
same key for every transfer. This means that
an eavesdropper studies enough packets,
they can identify the key, and this provides
them with unlimited access to all data from
every device on the wireless network.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a security
protocol designed to provide better
encryption than WEP. WPA generates a
new key for each device on the wireless
network. New keys are also provided for
each packet of data that is sent.
Virtual Private Network
A VPN provides access to a private LAN
from a remote location. The connection
to the LAN created using the
infrastructure of a public network like the
internet.
Data sent using a VPN is encrypted so that
it is secure if it is intercepted.
Virtual Private Network
Virtual Private Network
An individual might uses VPN to:
 Access their employer’s network when working
from home
 Access computers in a different geographical
location, perhaps to avoid the local restrictions
on acess to web content
 Make secure payments
 Prevent surveillance of and access to their web
activity.
File Access Rights
File access rights are also know as file
permissions. They can be set for
individual files, folders or drivers, and
they ensure that users are either allowed
to read only or allowed to read and write
to the file, folder or drive.
Transaction Logs
All network activity can be recorded in a
log file. Although this does not directly
secure network data, a transaction log
can help to identify which computers and
network devices have been accessed.
This can allow administrators to identify
any unusual activity that might be a
threat to data security.
Backups
A backup is copy of one or more files.
The backup or backups are usually stored
on a different storage device to the
original file.

You might also like