Professional Documents
Culture Documents
File Sharing and Remote Database Access: A computer network allows sharing
to remote database. You can easily access
the files stored on
of files and access
networking allows many people to work
various computers on a network. Also,
on the data stored in a database.
Simultaneously
allow people to communicate
Ease of Communication: Computer networks of
facilities. This makes the transmission
through emails and instant messaging
information easier, more efficient and less expensive.
1
TyPES OF COMPUTER NETwORKS
The following are the types of network based the
on geographical area covered or scale
of the network.
Local Area Network (LAN): A LAN is a
computer network that is limited to a
local area such as a laboratory, a school or
an office building.
NTER
LAN
PERASONAL AREA
NETWORK
PRINTER
ROUTER
SERVER XSTO
SWITCH
DOO
MAN
PRINTER OFFICE-B
SWITCH SERVER
ROUTER
OFFICE-A
Fig 1.3 MAN
2
Wide Area Network
(WAN): A WAN is a computer network that spans a wide
geographical area. A WAN may be spread across cities, countries and continents. A
WAN 1S tormed by connecting various LANs and MANs. The Internet is considered
to be the largest WAN.
LAN
LAN
WAN LAN
LAN
NETWORK TOPOLOGIES
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. The computers on a network are also referred to as nodes.
There four main types of topologies. They are:
are
Node
Bus
3
RingTopology: In ring topology,
each Node
computer is connected to two
other computers so as to form a closed
ring-like structure (ie. 1.6). In this
topology, data is transmitted in one
direction only. The disadvantage
of the ring network is that the
breakdown of any one computer on a
ring can disable the entire system or
network.
Star Topology: In star
all the
topology,
computers are connected to a
central computer or a central node
Fig. 1.0. The data to be exchanged
between any two computers Fig 1.6 Ring topology
passes
through the central node. The central
node controls all the activities of Central node
the nodes. More
computers can be
easily added to the network. The
breakdown of computers, except
the central node, does not affect the
Node
functioning of the network. However,
the failure of the central node disables
the communication across the entire
network.
MeshTopology: In mesh topology,
every computer 1s connected to every
other computer on the network. Full Fig 1.7 Star
topology
mesh topology (Fig. 1.8) is very expensive to
topology is implemented in which a computerimplement. Normally, partial mesh
is connected to a few other
inthe network (F'ig. 1.9). computers
Fig 1.8 Full mesh topology
Fig 1.9 Partial mesh topology
4
PROTOCOLS
TRANSMISSION MEDIA
Computers must be connected to each other to form a network. Computers can be
connected using wires/cables or they can be connected in a wireless manner.
Fig 1.10 Shielded twisted pair cable Fig 1.11 Unshielded twisted pair cable
5
Coaxial Cable (coax): lt is an electrical cable with a conductor at its centre
TTE T ) . The inner conduetor is surrounded by a tubular insulating layer. The
insulating layer is surrounded by a conductive layer called the shield, which is
finally covered with a thin insulating layer on the outside.
Copper wire
Outer plastic sheath
(conductor) Insulator Shield (insulating layer)
Glass core
Fig 1.12 Coaxial wire
6
Microwave tronsmiss on Fig 115 Microwave antenna
equipment.
Bluetooth and Wi-Fi are both wireless
technologies that use radio trequency waves to
create networks.
speed. Bluetooth
approx.) and medium transmission
be used to transfer songs or pictures
technology can
wired connection.
ANALOG SIGNAL
DIGITAL SIGNAL DIGITAL SIGNAL
8
Modems are used for connecting computers to the Internet. Modems are connected to
a computer and a telephone line (Fig. 1.22).
Phone
Fig 1.21 Modem Fig 1.22 Connection of modem
Hub: A hub is a device that is used to connect computers in a network (Fig. 1.2).
In a hub, when one computer sends data on the network, the hub simply forwards
the packets to all the other computers connected to it (Fig. 1.24). Each computer is
responsible for determining which packets are destined for it and which are to be
ignored.
Dual Speed Hub
10/100 Mbps
9
QUTA QUESTION
1. Fill in the blanks.
() A network that is imited to a small geographical area such as a laboratoru i
nown as a
(b) The Internet is an example of
(e) Central node dependency problem arises in networks with
topology
(d) A device that can convert digital signals into analog torm and vIce versa is knou
nown
(e) Adevice that is used to connect computers in a network is called
( A transmission medium that transmits data in the form of light signals is referu.
to as red
(gThe data is transmitted across the Internet in the form oflittle bundles are
lled
NETWORK SECURITY
A computer on a network can be accessed
by many users. Security measures have ta ho
taken to protect networks from unauthorised access and to prevent data or
information
theft.
Threats to Computers
Files can be shared between the computers on a network. This makes a
computer
vulnerable to attacks by viruses, worms, Trojan horses, etc., that can
easily spread
because of the underlying network. Let us discuss some of the common threats
to
computers.
Virus: A computer virus spreads itself from one computer to another and
interferes
with the normal operations of a computer. Viruses attach themselves to
any type
of file and spread when these infected files are copied to other
computers. People
unknowingly spread a computer virus by sharing infected files or sending e-mails
with viruses as attachments.
Worm: A worm is a computer program that uses
computer networks to send copies
of itself to other computers on a network. A virus
requires human action such as
transferring of an infected file to spread itself. A worm can spread without any
human action too. It replicates itself without the
knowledge of the user. Worms
can cause severe harm to a computer network such as
blocking
the and
network
reducing the speed of the network.
Trojan Horse: A computer program that appears to be a useful software but
actually causes damage once installed or executed on your computer system
is known Trojan horse or a Trojan. After getting installed, it allows
as a
10
unauthorised access to the computer. Trojan horses are very dangerous as they
allow your computer to be remotely controlled by someone else and can cause loss ol
personal and confidential information (Fg 1 2).
E-l
Fig 126 People can install Trojans onto your computer or send it via
e-mail attachments.
Viruses, worms and Trojan horses may harm the data or affect the performance and
the speed of a computer.
Data Theft: It is a very serious problem for
computer networks. People break into computer Quick Fact
networks to either disrupt their functioning or to Malware (malicious software)
steal confidential information. Hackers are the is a term used to describe all
computer experts who can break into computer types of unwanted software
systems and networks. There are two types of such as computer viruses
hackers-white hackers and black hackers. worms, Trojan horses and
spyware.
White hackers study and break into networks
to find and fix security loopholes. They offer their
services to corporations, public organisations and educational institutions to make
their networks more secure.
Black hackers or crackers have a criminal intention. Some examples are
cracking bank accounts in order to transfer money to their own accounts, stealing
confidential information and attacking the computer network of an organisation for
money.
LComputer Security
Antivirus Software: Every computer on a computer network must have an
antivirus software installed in it and it should be updated on a regular basis.
Antivirus software can be used to protect the computer from various types of
malware. Antivirus software can detect viruses, worms, etc., and warn you of their
presence in your computer. lt can als0 deactivate and clean up the computer of
malicious software.
11
There are various types of antivirus software such as AVG, Avira, Norton and
McAfee (Fe 127).
Ar
AVG
McAfee
AVIRA
Fig 127 Logos of some antivirus software
Firewall: A firewall is used to prevent unauthorised access to a
computer
network. A firewall can be implemented as a software, a hardware or a
of both. All data or messages combination
entering or leaving a computer network pass through
a firewall
(Fig 128).
A firewall examines each message and blocks those
that do not
meet the specified security criteria.
nternet
Undesirable
data
Firewall
Fig 1.28 Firewall (visual representation)
Recap Time
A computer network consists of two or more
computers that are linked
in order to share resources, such as printers, to exchange files and to allow
electronic communication.
Based on the geographical area covered, computer networks be
PAN, LAN, MAN and WAN.
can of four types
Topology refers to the layout pattern in which various computers are connected to one
another to form a network. For example, bus, star, ring and mesh are various types of
topologies being used to form networks.
12
a Protocol is a set of rules used by computers on the network to communicate with each
other.
Cables such as twisted pair, coaxial and fibre optic cables are examples of wired
network transmission media.
eRadio waves, microwaves and infrared waves are examples of wireless network
transmission media.
aBluetooth and Wi-Fi technologies make use of radio waves.
A Network Interface Card is a hardware device that stores the hardware address ofa
computer and enables it to communicate over the network.
a Modemis an electronic device that converts the digital signals of a computer into an
analog form and vice versa, so that the signals can travel over a telephone line.
Switch and hub are devices that connect computers in a network.
Hackers are the computer experts who break into computer systems and networks.
A computer virus is a computer program that can spread itself from one computer to
another and interferes with the normal operations of a computer.
A worm is a computer program that uses computer networks to send copies of itself to
other computers on the network.
A Trojan horse is a computer program that appears to be a useful software but actually
causes damage once installed or run on a computer.
An antivirus software can be used to protect the computer from different types of
malware such as viruses and worms. Some of the antivirus software are AVG, Avira,
Norton and McAfee.
A firewall is used to prevent unauthorised access to a computer network.
ANSWERS TO QUICK QUESTION
1. (a) LAN or Local Area Network (b) WAN or Wide Area Network
(c) Star (d) Modem
(e) Hub or Switch ( Optical fibre
g)Packets
13
Assessment Time
1Choose the correct answer.
(a)What is the importance of a computer network?
(i) It allows sharing of resources.
(i) It is an effective communication medium.
(iii) It lets users share files.
iv) All of the above.
(b) A network that
spans countries and continents is known as
) LAN. (i) MAN.
(i) WAN. (iv) PAN.
(c) A device used to
connect computers in a network is referred t0 as
(i) a firewall. i) CPU.
(iii) HTTTP. iv) a switch.
(d) A
topology in which every
computer is connected to every other computer is called
(1) ring topology. (ii) mesh topology.
(i) star topology. (iv) bus topology.
(e) It transmits data in the form of light rather than electronic
(i) Coaxial cable signals.
(i) Bluetooth
(ii) Optical fibre cable (iv) Twisted pair cable
() A computer network
organised around a person for communication between
such as phones and
personal devices
digital assistants is called
() PAN. i) LAN.
ii) MAN. (iv) WAN.
Fill in the blanks using the words given in the box.
MAN TCP/IP
Topology
Ring Bluetooth Firewall Infrared
Wi-Fi
Modulator-demodulator Protocol
(a) refers to the layout
connected to each other in
pattern in which the
computers are
network.
a
b) A. is formed when the computers
neighbourhood area.
are connected in a
(c) A. is used to prevent unauthorised access to a network.
(d) Modem stands for.
(e) is a set of rules used by
communicate with each other. computers on the network to
() and
waves. technologies make use of radio
waves are used for communication between a TV
remote control. set and its
14
the
(h) protocol is used to send data in the form of packets on
Internet.
() In. topology. each computer is connected to two other
computers so as to form a closed structure and the breakdown of any one computer
can disable the entire system.
Answer the following questions.
3 (a) Define the term 'computer network. What are its advantages
(b) State the types of computer networks based on the geographical area covered by
them.
(c) Write a note on twisted pair and coaxial cables.
(d) Give the advantages of optical fibre cables.
(e) What is a bus topology?
How is a hub different from a switch?
(g) Discuss some common threats to network security.
h) What is a firewall?
i) How is microwave transmission different from radiowave transmission
Activity Time
information about
1 Study the computer network used in your school computer lab and find
the following:
(a) the cable used for setting up the network
(b) the topology of the network
(c) the hub or the switch used in the network
eFind out the names oftwo companies that manufacture switches and modems.
A company has two offices in adjacent buildings. The computers in the two offices need to
be connected to one another for a very high speed connectivity
(a)What cable should be used to connect the computers in these two of+ices?
b) What type of network is formed when the computers in the two offices are connected
to form a network?
Teacher's Notes
E The teacher can discuss the evolution of networks with the students.
The teachercan show the transmission cables and other network devices being used in the
computer lab.
15