You are on page 1of 35

Computer networks are essential to most

organisations, enabling them to access their


information irrespective of its geographical location,
make efficient use of hardware and software
resources, and communicate effectively. Network
design, based on an understanding of protocols, is
fundamental to the way networks work. Such reliance
on networks in our society is founded on the
assumption that there are mechanisms for securing
access to them.
IAL Information Technology

Network models
 Network models are a computer architecture, implementable in either hardware
or software, meant to simulate biological populations of interconnected neurons.
These models, also known as multilayer connectionist models, process
information based on the pattern and strength of the connections among the
neuron-like units that compose them.

 A network protocol defines rules and conventions for communication between


network devices. Network protocols include mechanisms for devices to
identify and make connections with each other, as well as formatting rules
that specify how data is packaged into messages sent and received. Some
protocols also support message ​acknowledgment and data compression
designed for reliable and/or high-performance network communication.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Modern protocols for computer


networking all generally use packet
switching techniques to send and receive
messages in the form of packets - messages
subdivided into pieces that are collected and
re-assembled at their destination. Hundreds
of different computer network protocols have
been developed each designed for specific
purposes and environments.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Internet Protocols
 The Internet Protocol family contains  TCP/IP (Transmission Control
a set of related (and among the most Protocol/Internet Protocol)
widely used network protocols.  ARP (Address Resolution Protocol
 DHCP (Dynamic Host Configuration
Beside Internet Protocol (IP) itself,
Protocol
higher-level protocols
 DNS (Domain Name System)
like TCP, UDP, HTTP, and FTP all  FTP (File Transfer Protocol
integrate with IP to provide additional  HTTP (Hyper Text Transfer Protocol)
capabilities. Similarly, lower-level
Internet Protocols
like ARP and ICMP also co-exist with  Wireless Network Protocols
IP. In general, higher level protocols in Thanks to Wi-Fi, Bluetooth and LTE, wireless
the IP family interact more closely networks have become commonplace.
Network protocols designed for use on
with applications like Web browsers
wireless networks must support roaming
while lower-level protocols interact
mobile devices and deal with issues such as
with network adapters and other variable data rates and network security
computer hardware. Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 a. client-server
 client/server network. A computer network in which one centralized, powerful
computer (called the server) is a hub to which many less powerful personal
computers or workstations (called clients) are connected. The clients run
programs and access data that are stored on the server.
 In simplest form, a server is a connection point for several clients, that will
handle their requests. A client is software that (usually) connects to
the server to perform actions. The client provide a user interface that allows
users to carry out actions.

Client-Server Network: advantages and disadvantages

Advantages Disadvantages
Backups and network security is controlled Specialist staff such as a network manager is
centrally needed
Users can access shared data which is If any part of the network fails a lot of
Deepa Piyathilaka
centrally controlled disruption can occur
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 The client uses the network to send and receive


communications about its order, or request. The
server will take the request and make sure that
the request is valid. If everything checks out
okay, then the server will fetch the request and
serve the client.
 The server can make a request from the client as
well. It may want to check up on the status of
the client, or ask if it has received any security
patches, or if it still needs resources from the
server. If not, the server will close the connection
in order to free up network traffic.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Stands for "Peer to Peer." In a P2P


network, the "peers" are computer
systems which are connected to each
other via the Internet. Files can be
shared directly between systems on
the network without the need of a
central server. In other words, each
computer on a P2P network becomes
a file server as well as a client.

 A P2P network can be an ad hoc


connection—a couple of computers
connected via a Universal Serial Bus to
transfer files Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What are the advantages of peer to peer network?


 The advantages of peer to peer network are as follows: The main
advantage of peer to peer network is that it is easier to set up. In peer-to-
peer networks all nodes are act as server as well as client therefore no
need of dedicated server. The peer to peer network is less expensive.
 Peer learning. ... One of the most visible approaches to peer learning
comes out of cognitive psychology, and is applied within a "mainstream"
educational framework: "Peer learning is an educational practice in which
students interact with other students to attain educational goals."

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Direct computer communication


 Equal authority
 Individual resource sharing
 Users act as their own administrator
 May share resources
 May prevent access to resources
 Traditional model
 Two or more general purpose computers:
 Capable of sending and receiving information to and
from every other computer
 Environments
 Small home or office
 Large networks using the Internet
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Advantages
 Simple configuration
 Computers are in same general area
 No dedicated server or hierarchy
 Less expensive Compared to other network models
 Disadvantages
 No centralized storage
 Not flexible
 Difficult to expand (not scalable)
 Not necessarily secure
 Decentralized security model
 Security is maintained on each individual computer
 Not practical for large installations
 Usually 10 or fewer workstations
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Resource sharing method


 Modify file sharing controls
 User responsibility
 Lack centralized control Access may not be
uniform or secure
 Resource sharing on a simple peer-to-peer
network

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is the difference between peer to peer and


client server network?
 There's a huge difference between client/server and peer-to-
peer networks. For instance, a peer-to-peer network has no
central server. Each workstation on the network shares its files
equally with the others. ... Through client workstations, users
can access most files, which are generally stored on the server.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 An ad hoc network is a type of temporary


computer-to-computer connection. In ad hoc
mode, you can set up a wireless connection
directly to another computer without having
to connect to a Wi-Fi access point or router.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What does Ad Hoc Network mean?


 An ad hoc network is a network that is composed of
individual devices communicating with each other directly.
Many ad hoc networks are local area networks where
computers or other devices are enabled to send data
directly to one another rather than going through a
centralized access point.
 The idea of an ad hoc network is often unfamiliar to end
users who have only seen small residential or business
networks that use a typical router to send wireless signals
to individual computers.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 However, the ad hoc network is being used quite a bit in new types
of wireless engineering, although until recently it was a rather
esoteric idea. For example, a mobile ad hoc network involves mobile
devices communicating directly with one another. Another type of
ad hoc network, the vehicular ad hoc network, involves placing
communication devices in cars.

 Experts point out that for small local area networks, ad hoc
networks can be cheaper to build because they don’t require as
much hardware. However, others make the point that a large
number of devices can be difficult to manage without a larger and
more concrete infrastructure. Tech leaders are looking at ways to
enable more vibrant network functionality with these peer-to-peer
networks. Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Ad hoc networks are useful when you need to share files or other
data directly with another computer but don't have access to
a Wi-Fi network.
 More than one laptop can be connected to the ad hoc network,
as long as all of the adapter cards are configured for ad-hoc
mode and connect to the same SSID (service state identifier).
The computers need to be within 100 meters of each other.
 If you are the person who sets up the ad hoc network, when you
disconnect from the network, all the other users are also
disconnected. An ad hoc network is deleted when everyone on it
disconnects—which can be good or bad, depending on your
view; You can use an ad hoc wireless network to share your
computer's internet connection with another computer.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is tethering and


how do you enable tethering?

 Tethering is the practice of using a mobile device (such as a


smartphone) as a modem to connect another device, such as a
laptop or another mobile phone to the Internet. To do so, the
phone must have mobile data enabled.

 Tethering is one method of creating a mobile hotspot (an


ad hoc wireless access point).Tethering, or a personal hotspot as
it's sometimes called, can be an enormously useful way to get
devices, such as laptops and tablets, online when there's no Wi-Fi
available. Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is tethering?
 Tethering a 3G or 4G phone means connecting the phone to another device so
that the device can use the phone's internet connection to get online. This can be
achieved by using a USB connection, and have the phone act as a replacement for
a regular modem or router.
 Tethering can also be achieved using a wireless Wi-Fi connection or Bluetooth,
depending on the connectivity specifications of the equipment that is to be used.
Generally, if a device supports Wi-Fi you'll also be able to tether your phone to it
wirelessly.

 Can I use my phone to tether WIFI?


 yes you can most certainly share your phones wifi connection, with any computer
via USB even if your carrier restricts this. its a very simple app called Clockwork
Tether. install it on your phone. turn off your phones data (because it tethers
whatever is available) and connect to a wifi.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Tethering is one method of creating a mobile


hotspot .The practice is increasingly common
for travellers, out-of-office employees and
those who want access to an alternative to
the corporate network from within the
workplace

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

a. wireless – Wi-Fi
b. b. ZigBee®
c. c. Bluetooth®
d. d. cellular – Global System for Mobile (GSM)
communications (3G/4G)
e. e. infrared
f. f. ethernet.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Wi-Fi is the name of a


popular wireless networking technology that uses
radio waves to provide wireless high-speed
Internet and network connections. A common
misconception is that the term Wi-Fi is short for
"wireless fidelity," however this is not the
case. Wi-Fi is simply a trademarked phrase that
means IEEE 802.11x.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is a WiFi protocol?


 Designed to provide a WLAN with a level of security and
privacy comparable to what is usually expected of a wired LAN,
Wired Equivalent Privacy (WEP) is a securityprotocol, specified
in the IEEE( The Institute of Electrical and Electronics
Engineers is a professional association with its corporate
office in New York City)Wi-Fi standard, 802.11
 Wireless protocols; technologies including 802.11, WLAN,
WPA, WEP, Wi-Fi and wireless broadband; and deployment
issues such as access points, security and troubleshooting are
discussed in this guide designed to provide a basic
introduction to wireless protocols and technologies.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Zigbee is an IEEE 802.15.4-


based specification for a suite of high-level
communication protocols used to
create personal area networks with small, low-
power digital radios, such as for home
automation, medical device data collection, and
other low-power low-bandwidth needs,
designed for small scale projects which need
wireless connection. Hence, Zigbee is a low-
power, low data rate, and close proximity (i.e.,
personal area) wireless ad hoc network.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 The technology defined by the Zigbee specification is


intended to be simpler and less expensive than
other wireless personal area networks (WPANs), such
as Bluetooth or more general wireless networking such
as Wi-Fi. Applications include wireless light
switches, home energy monitors, traffic management
systems, and other consumer and industrial equipment
that requires short-range low-rate wireless data transfer.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 Bluetooth is a wireless technology standard for


exchanging data over short distances from fixed
and mobile devices, and building personal area
networks. Wikipedia
 Frequency: 2.45 GHz
 Developed by: Bluetooth Special Interest Group
 Physical range: Typically less than 10 m (33 ft),
up to 100 m (330 ft); Bluetooth 5.0: 40–400 m
(100–1,000 ft)
 Compatible hardware: Personal computers;
Smartphones; Gaming consoles; Audio devices
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is infrared network?


 IR wireless is the use of wireless technology in
devices or systems that convey data
through infrared (IR) radiation. Infrared is
electromagnetic energy at a wavelength or
wavelengths somewhat longer than those of
red light. ... IR wireless is used for short- and
medium-range communications andcontrol.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 A network is a group of two or more


computer systems connected together. 1.
Fast Ethernet. Twisted pair cable. The
fast Ethernet is a type of Ethernet
network that can transfer data at a rate of
100 Mbps using a twisted-pair cable or a
fiber-optic cable.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology

 What is Ethernet and what does it do?


 An Ethernet cable is the most common type
of network cable used on a wired network
whether at home or in any other business
establishment. This cable connects wired
devices together to the local network for file
sharing and Internet access.

Deepa Piyathilaka
PgD ,B.Sc. University of Colombo

You might also like