You are on page 1of 5

INTRODUCTION TO CYBER SECURITY

AND ETHICAL HACKING

Introduction to Computer Networks


____________________________________________

Objective: Materials Required:


After completing this lesson students will be ● Internet connection
able to:
● Develop a basic understanding about
computer networks
● Gain a clear idea about the functioning
procedures of different computer
networks
● Learn the basic differences between
distributed system and computer
network
Achieved Score: Activity Duration: 10 minutes

Trainer’s Sign: Total Duration: 120 minutes

1
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING

Introduction to Computer Networks


Computer Network – What is it exactly?

When a group of computers is integrated (or connected) together for sharing some
information or resources, the scenario is defined as Computer Network. In short,
connecting to different devices through a common structure for the purpose of
communicating and sharing resources is what Networking is all about.

The most common example of a network is the Internet. It's the network that connects
computers and systems from different geographical domains. On the other hand, there's
also something known as Intranet. This is again another example of a network, the only
difference being it connects devices within a specific geographical range or boundary.

Network = Shared Resources

The concept of networking is strongly based on sharing resources. In fact, it’s only through
interchanging information and sharing of resources that allows a network to grow and
popularize among the social circle.

Node

If you are working as a network operator, analyst, or anything else related to the stream,
you will often hear a common word ‘Node’. Well, Node is basically a term used to refer a
device that's connected to a network. It can be a computer, smartphone, printer, FAX
machine, etc. A device being addressed as a Node must have the power and capability to
send and receive data being generated through other nodes via a network (be it internet
or intranet). The connectivity links for the devices (or nodes) in a network are commonly
referred to as Communication Channels.

Computer network need not necessarily have to comprise of a system with single Control
Unit being connected to multiple other systems. If such a scenario happens, it can be best
referred to as Distributed System. You cannot address it as a Computer Network.

Differences between Computer Network and Distributed System

Computer Network: When different computers are interconnected through a common


technology (or you can say structure, base, etc), it forms a computer network.

Distributed System: When different computers are connected through a network but
they tend to appear as a Single Coherent System before the users, it’s referred to as
Distributed System. In a Computer Network, this coherent part is somewhat absent. If
you watch closely, World Wide Web or the Internet can be best referred to as a Distributed
System.

2
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING

Factors that define the quality of a computer network

A computer network must focus on certain factors to ensure superior performance. These
are:

● * Performance
● * Reliability
● * Security
Performance

The primary ways to measure the performance of a computer network are:

● * Transit time (referred to the total time taken for a message to travel from a
device to another)
● * Response time (referred to the time taken to provide a response to the inquiry)
Performance of a network can also be measured while focusing on the following conditions:

● * The capability of the connected hardware


● * Number of users on the network
● * The efficiency of the software tool being used
Reliability

How frequent the network failure occurs? Reliability is predicted by measuring the
frequency of the failures that happen to a network. Higher the number of failure less will
be the network’s reliability.

Security

How secure is the network? How secure are the data and information being accessed
through the network? As per the security parameters, a good network will always offer the
best of protection of data and information from any kind of unauthorized user accessibility.

Basic properties of a suitable network

A suitable and appropriate network must have the following qualities:

* Interpersonal Communication, where users can easily communicate with one


another via video conferencing, chat rooms, emails, etc.
* Sharing of resources, to ensure resources can be made available physically or
over a network through scanners, printers, etc.
* Sharing information to ensure that authorized users get the privilege to share
data and files through the network.

3
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING

Summary -

● A group of computers connected through a communication channel to share


information resources is defined as Computer Network.

● Distributed systems are similar to computer networks but they follow a coherent
approach to create a more concise and compact appeal before the users in regards to
sharing information and maintaining connectivity.

● The quality of a computer network is judged by its overall performance, reliability, and
security.

● The popularity of a network depends upon its interpersonal communication skills,


sharing of resources physically, and secured sharing of information.

_______________________________________________________________

Instructions: The progress of students will be assessed with the exercises


mentioned below.

MCQ

1. When collection of various computers seems a single coherent system to its client,
then it is called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned

2. Two devices are in network if


a) a process in one device is able to exchange information with a process in another
device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) None of the mentioned

3. In computer network nodes are


a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

4. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned

4
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING

5. A _______ is a device that forwards packets between networks by processing the


routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned

6. A list of protocols used by a system, one protocol per layer, is called


a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned

7. Network congestion occurs


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned

8. Which one of the following extends a private network across public networks?a) local
area network
b) virtual private network
c) enterprise private network
d) storage area network

9. When different computers are connected in a network, it is known as________


a) Distributed system
b) Basic computer network
c) Node
d) Intranet

10. Performance of a computer network depends on


a) Performance
b) Reliability
c) Security
d) All of the above

_______________________________________________________________________

MCQ Answers-

1.B, 2.A, 3.D, 4.A, 5.C, 6.B, 7.A, 8.B, 9.A, 10.D

You might also like