Professional Documents
Culture Documents
Network
ICT by Zin Lynn Htike 1
Network
◦ A network is created when two or more computers are connected together.
◦ Using a network, a computer can communicate with others and share resources such
as hardware, software and data.
◦ In order to connect to a network, computers need to fulfil certain requirements so that they all
operate using standard protocols.
◦ protocols are rules that allow the exchange and transmission of data between devices
◦ MAC addresses are used in devices connected to local area networks (LANs) using Ethernet,
Bluetooth or Wi-Fi.
◦ MAC addresses are assigned by the NIC manufacturer and are generally considered to be fixed
addresses.
◦ The first three pairs identify the manufacturer and the remaining pairs are assigned by the
manufacturer to uniquely identify the device.
Restricting or allowing access to a MAC address filtering checks the MAC address of devices attempting to
network gain access to a network and only grants access to devices with specified
MAC addresses
Identifying a device on a network Some Wi-Fi hotspots only provide free access for a certain length of time,
and they identify a device using its MAC address in order to work out
whether it is trying to access the hotspot for longer than the permitted time
Tracking a device Some companies and organisations track devices (and therefore their
users) by checking which wireless access points have been accessed by
specific MAC address
Assigning 'static' or 'fixed' IP Each time a device connects to a network, it is identified by a DHCP server
addresses (usually using its MAC) and given the same IP address as before
◦ When the computers are fairly close to one another say, in a single office or two buildings
that are separated by a road, they can be joined together either by cables or wireless means.
◦ These computers then form a Local Area Network (LAN).
◦ Once the computers are connected together into a LAN, many people (users) can share and
use the same resources at the same time. They can share files, software, hard disks and
peripherals such as a printer or CD-ROM. Users can also use the LAN to communicate with
each other by e-mail. Data can be transmitted very quickly between networked computers.
◦ To log onto a LAN, you usually need a user name and password. The user name identifies you
to the file server so that it can 'serve' you the correct files. The password ensures that the
user name really does belong to you.
◦ Many modern companies have offices, shops or factories in various locations around the
country, and for large corporations, across the world. Even though staff work in different
places, they often need to be able to access the same information no matter where they are.
◦ It would not be possible to connect computers in different buildings together using the LAN
cables. Imagine how many roads would need to be dug up to lay cables between a building in
London and one in Birmingham.
◦ Computers on LANs in one building can be connected to computers on LANs in another
building usually through the telephone system, often using a modem. They can also be
connected via fibre optic cables, microwave links or satellite.
◦ By linking LANs together, the network is no longer local to one building, it is now spread over
a wide area. It is known as a Wide Area Network (WAN)
◦ In a ring network layout, all of the computers are connected to one another in a
circle. The data passes from one computer to the next one and then all the way
around the ring layout until it reaches the destination computer
◦ In a star network layout, each workstation is connected by its own cable directly to
the server. Star networks are usually the layout of choice in schools and offices
because they tend to be the most reliable of the topologies.