You are on page 1of 55

Computer Networks

What is a computer network?


A computer network consists of 2 or more computers or
electronic devices such as printers that have been linked
together in order to share data.
Networks allow users to:
1. Share files
2. Send emails to each other
3. Share resources (like printers or scanners).
Computers on networks are usually connect using:
1. Cables (if the computers are linked together in the
same room/building)
2. Radio signals (Wi-Fi)
3. Telephone lines and satellites (for long-range
connections).
Computer Networks
Advantages of computer networks:
1. Resources such as printers, scanners and internet can be shared
2. Files and data can be shared
3. Easy to communicate with people on the network
(email, messaging, video-conferencing etc)
4. We can access our data from any computer (like your student:
drive at school)
5. Data can be backed up to a separate computer for security
Disadvantages of computer networks
1. If part of the network fails (i.e. a network cable is severed) –
this can cause the whole network to break down (data can't
pass through the damaged cable)
2. Viruses can spread across the network very easily and quickly
3. If a computer on the network is hacked into then all other
computers are prone to attack
4. Networks that use too few printers can see printing queues
develop (due to the amount of people trying to print)
Types of Computer Networks
There are four main types of computer networks:
∙ Local Area Networks LAN
∙ Wireless Local Area Networks WLAN
∙ Bluetooth.
∙ Wide Area Networks WAN
Local Area Networks LAN
• Local area networks (or LAN's) are usually located in a single
room or small building.
• An example of a LAN would be a school network. The
computers on the network would be confined to a classroom or
the school.
• A typical LAN would consist of several computers that are
connected to each other and can share resources such as printers
and scanners.
• Computers and devices on a LAN are connected using cables.
Types of Computer Networks
Advantages and disadvantages of LAN's:
Advantages disadvantages
The sharing of resources (such Easier spread of viruses
as expensive peripherals and throughout the whole network.
applications software).
Ease of communication between Increased security risk when
users. compared to stand-alone
computers.
Files and data can be shared Printer queues developing,
easily. which can be frustrating

LAN's can be monitored easily. Slower access to external


networks, such as the internet.
If the main server breaks down,
in most cases the network will
no longer function.
Types of Computer Networks
Wireless Local Area Network Wi-Fi
• WLAN's are similar to LAN's but they connect computers together
wirelessly instead of using cables
• Client computers or devices send and receive data using wireless NIC.
Types of Computer Networks
Wireless Local Area Network
Advantages disadvantages
Cheaper to set up than a LAN Security can be an issue as anyone
because you don't have to buy lots with a wireless enabled device can
of expensive cables. try to access the network.

Physically safer than a LAN Wireless signals can be unreliable


because there are no cables to trip as they sometimes suffer from
over. interference from other electronic
Easier to add more computers to the equipment.
network.

Devices such as printers and Data transfer around a wireless


scanners can be connected to the network is much slower compared
network easily. to a LAN.

Computers and devices can be used Some areas in the building may not
anywhere in the range of the APs. pick up the wireless signal.
Types of Computer Networks
Bluetooth (WPAN)
• Bluetooth is also known as a Wireless Personal Area Network
(WPAN).
• Bluetooth uses radio waves to transmit data over short distances
.
Types of Computer Networks
Advantages and Disadvantages of Bluetooth (WPAN)

Advantages disadvantages

Very easy to connect Bluetooth Limited signal range.


devices together.

Bluetooth signals are not easily Slow data transfer. Bluetooth is not
affected by other electrical devices suitable for transferring large files.
like Wi-Fi can be)

Works wirelessly so there are no Very unsecure connections and easy


messy cables needed to connect for hackers to break into.
devices.

Bluetooth uses very little power.


Types of Computer Networks
Differences between WiFi and Bluetooth
Types of Computer Networks
Similarities and Differences between WiFi and Bluetooth
Similarities
● Both WiFi and Bluetooth use wireless communications
● Both WiFi and Bluetooth use radio frequencies for
communication/radio waves
● Both WiFi and Bluetooth allow several devices to be
connected
● Both use security when sending data
Differences
● WiFi has faster data transfer rate
● WiFi has a greater range of transmission
● Bluetooth uses key matching encryption
● WiFi uses WEP and WPA security together
● WiFi can be broadcast
● Wifi connects more devices
Types of Computer Networks
how computers can use Bluetooth to connect to a device.
● Bluetooth sends and receives radio waves
● Enable Bluetooth Bluetooth searches for the other
devices
● Pairs the two devices
● Devices automatically detect and connect to each
other
Uses:
● Used for short distances
● Used for low-bandwidth applications, e.g. streaming
music
● Used when the speed of transmission is not critical
● Bluetooth can be used to create a secure Wireless
Personal Area Network
Types of Computer Networks
Wired LANs versus Wireless LANs
Types of Computer Networks
Wide Area Networks WAN
• Wide area networks are made up of computers and devices
that are connected over a large geographical area
• WAN's are created by connecting lots of LAN's and
individual computers together.
• Computers and devices can connect to a WAN using
telephone lines, fiber-optic cables and satellite signals.
• In order to connect your computer to a WAN you also need
a router or a modem.
Types of Computer Networks
Advantages and disadvantages of WAN
Advantages disadvantages
Computers can be connected over Security can be an issue as anyone
wide areas. (Across cities or even with access to the internet can
continents) potentially access any of the
computers on the network.
Files and data can be shared over a It's very easy to accidentally
large area. download viruses from a WAN onto
your computer.
People can use their Data is transferred across a WAN at
computers/devices to communicate a much slower rate than it is across
very quickly, over large areas. a LAN.
(Sending emails, discussion forums,
video conferencing etc.)
E-Commerce (shopping) websites Monitoring a WAN can be difficult
can be set up and accessed by because they have so many
people from all over the world. computers connected to them.
Types of networking devices
Network Interface Card (NIC)
Network Interface Cards are electronic cards used to
connect individual computers/devices to a network.
There are two types of network interface card:
1. Wired network interface card (Where cables are used
to connect computers)
2. Wireless network interface card (Where computers
are connected using Wi-Fi)
Types of networking devices
Network cable
• Network cables are plugged into a computers wired
network interface card and connects it to the network.
• Data is sent around the network via the network cable.
Cable holds advantages over wireless connections for two
reasons:
• Cables can transfer data faster than wireless
• Data transferred over cables is more secure than over
wireless (Hackers can't intercept data easily).
Types of network cables
Coaxial Cables. Twisted Pairs. Fiber Optic.
Types of networking devices
Hubs
What are hubs used for?
• Hubs allow computers and devices to plug into their ports
in order to connect to each other and share files, data and
resources.
• Hubs are 'non-intelligent' devices and they don't manage
any of the data that flows through them.
• The hub simply sends the data onto every computer/device
on the network. This means that every device on the
network will receive the same data whether they requested
it or not.
• This lack of data management makes networks that are
connected by hubs very slow because there is a lot of
unnecessary data flowing around.
Types of networking devices
Switch
What are switches used for?
• Switches are similar to hubs in that they connect
computers/devices to form a LAN. However, switches are
'intelligent' devices and transmit data around the network
more efficiently.
How do switches manage network data?
• Each network device has a Media Access Control (MAC)
address which uniquely identifies it.
• Data sent to the switch contains the MAC address of the
sending device and the MAC address of the receiving
device.
• The switch will check these addresses and only send the
data to the relevant device rather than to all devices.
Types of networking devices
Networking Hardware
The difference between a hub and a switch.
Types of networking devices
Bridge
• Bridges are used to connect (bridge) LAN's together.
• Bridges can connect different types of networks so that they
act as one single LAN and thus can communicate with each
other.
`
Types of networking devices
Routers
• Routers enable data to be sent (routed) between different
types of networks. Connect LAN (local area network) to a
WAN (wide area network).
• Routers are most commonly used to connect computers and
devices to the internet (WAN).
Types of networking devices
Routers
computer addresses that are stored by a router.
1. Internet protocol IP addresses
• IP address is a unique identifier set up by network manager/ISP
• Define the rules that must be agreed by senders and receivers of data
communicating through the internet.
• IP address identifies the location of a device on a network.
• Can change but should match the network it’s on
• IPv4 address consists of 4 numbers separated by full stops

• IPv6 has been designed to allow the internet to grow in terms of the number
of hosts and potential increase in the amount of data traffic.
• IPv6 address consists of eight groups of hex digits separated by colons :
Types of networking devices
Routers
computer addresses that are stored by a router.
Media access control MAC addresses
• A number which uniquely identifies a device when it is connected to a
network.
• 6 pairs of hexadecimal digits
• MAC address is usually hard coded by manufacturer, never changes
• Its reliable method of identifying data senders and data receivers on a
network.
• Sometimes referred to as the physical address
• MAC address for an Ethernet NIC: 00:0a:95:9d:68:16
Types of networking devices
Data packets
A basic unit of communication data over a network.
Transmitted data, it is split up into a number of packets and each
packet is transmitted separately.

header which contains:


1. The sender’s IP address
2. The receiver’s IP address
3. The sequence/identity number of the packet
4. The packet size
5. How many data packets make up the whole message.
Types of networking devices
How does a router send data between computers?
1. Routers send 'packets' of data between computers on
different networks.
2. Each data packet contains the IP address of the
computer/network that the data is being sent to.
3. IP addresses are stored in routing table
4. The router will use the IP address to work out the best route
in which to send the data to its destination.
5. The data will be received by routers on other networks which
will read the IP address and re-route the data until it ends up
at the exact device it was intended for.
6. data packet headers allows the data packets to be
reassembled in their correct order, according to the
sequence/identity number
Types of networking devices
Comparison of routers and bridges
Computer Networks
The internet: is a worldwide collection of networks which allows a subscriber to
send and receive emails, chat (using text or voice) or browse the world wide web.
The world wide web (WWW or web): is the part of the internet which made of
millions of websites and millions of web pages the user can access by a web
browser .
A web browser: is software that allows the user to display and interact with pages
and files from the web.
Websites
What Can We Use the Internet For?
The Internet provides the network connections that links computers together.
There are many ways that we can use these connections:
1. View web pages on the WWW (World-Wide Web)
2. Sending and receiving e-mail messages
3. Sharing files
4. Communicating using voice (VOIP) and video (video-conferencing)
5. Playing multi-player games
6. Listening to streamed music or watching streamed video
Computer Networks
• To start using the internet you need to set up two
programs: a browser, email
• A browser : is a program used to find and look at
information on the world wide web
• Email: a program which used to send and receive
messages over the internet.
• A browser allows you to ask for information in many
ways:
1. Typing the address for a website this address is called
Uniform Resource Locator URL
2. Using the links that are available on many sites on the
internet.
3. Using search engine.
Uniform Resource Locations
Web browsers use uniform resource locations (URLs) to retrieve files.
URLs area standard way of locating a resource on the internet; they are usually a
set of four numbers, e.g. 194.106.220.19.
It is difficult to remember numbers, an alphanumeric form is usually used which
has the format:
protocol://site address/path/filename
where:
1. protocol is usually http
2. site address consists of: host computer name, domain name, domain type
and the country code:
• computer name is usually www
• domain name is the name of the website
• domain type is commonly one of the following: .com, .org, .co, .net, .gov
• examples of country code include .uk, .us, .de, .cy
3. path is the web page
4. filename is the item on the webpage.
https://www.google.jo/maps/@31.6460684,36.45185,9z
Internet Service Provider
ISP is an organisation that supplies the connection to the internet as well as
providing services including:
• Storage on their server, where you can store your website
• Email facilities
• Instant messages where you can send short messages to your friends when
they are online
• Access to online shopping
• Access to news, sport, weather, financial pages, etc.
• It supply you with a wireless router allows you to
1. Share internet access
2. Share access to hardware devices such as printers and scanners
3. Share access to files held on different computers.
Intranets
An intranet is a private network based on internet technology that is
used inside an organisation and makes use of web pages, browsers and
other technology. It is designed to meet the internal needs for sharing
information within a single organization.
Why We Use the Intranet?
1. It is safer since there is less chance of external hacking or viruses.
2. It is possible to prevent employees from accessing unwanted
websites.
3. Companies can ensure that the information available is specific to
their needs.
4. It is easier to send out sensitive messages that will remain only
within the company.
Intranets
• To connect to an intranet, you must
have username and password
• Anyone without the correct login
details would be unable to connect.
• Login id's can also be used to
restrict users from accessing certain
parts of the intranet.
Comparing the internet with intranets:

Internet Intranet
The term ‘Internet’ comes from The term ‘Intranet’ comes from the
the phrase International phrase Internal Restricted Access
Network. Network.
The internet is used to share Intranets are used to share data
data globally. locally and privately.
The internet is used to provide Intranets are used to provide
information that is relevant to a information which is relevant to a
wide range of people. single company or organization.
The internet can be accessed Intranets can only be accessed from
from anywhere as long as you within the company or organization
have an internet connection. that owns it, if you have a user ID
and a password
Internet is less secured Intranet is more secure than the
internet
Disadvantage of intranets;
1. They don’t have the same volume of information as the
internet
2. Intranets tend only to have one view whereas the internet
will provide different arguments from different people about
a topic.
3. Communication on the intranet is fine if the people who you
need to communicate with are also members of the
organization and have access to the intranet.
Extranet
• An extranet is an intranet that has been opened up to allow
external user access. Usually through VPNs.
• Access to an extranet is normally available through the
organization's website. A user logs in using an email address
and password that will notify the extra net that the user is an
authorized external user.
Extranets usually only allow certain information to be
accessed. For example:

1. A school's Virtual Learning Environment VLE may


allow parents to access their child's marks, attendance
data and reports.
2. A doctor's surgery may be able to access a local
hospital's extranet to make an appointment for a patient.
3. A company may provide tracking information on
deliveries it is making to customers.
Cloud
● Cloud computing is the delivery of computing services ”servers, storage,
databases, networking, software, analytics and more” over the Internet.
● Cloud providers are Companies offering these computing services.
● hosting company takes all responsibility for storing the data, managing
the data, securing the data and backing up the data.
● Examples of cloud storage for personal use include:
1. OneDrive
2. Google Drive
3. Dropbox
4. Box
● Data access times are limited by the bandwidth available to the hosting
company and other users who may be accessing data on the same servers
at the same time.
● Some cloud storage options allow synchronization to a computer, so the
cloud acts as a backup to the data stored on the computer.
Common cloud system
Public cloud: this is a storage environment where the customer/client and
cloud storage provider are different companies.
Private cloud: this is storage provided by a dedicated environment behind a
company firewall; customer/client and cloud storage provider are integrated
and operate as a single entity.
Hybrid cloud: this is a combination of the two previous environments
Advantages
● files stored in the cloud can be accessed at any time, from any device,
anywhere in the world
● There is no need to carry an external storage device
● The cloud provides the user with remote backup of data
● It allows recovery of data.
● The cloud system offers almost unlimited storage capacity
● The ability to synchronize files
Disadvantages
● Using slow or unstable internet connection lead to problem accessing or
downloading files.
● Cost can be high if a large storage capacity is required
Data security / loss using cloud storage/computing
● What physical security exists regarding the building where the data is
housed?
● How good is the cloud service provider’s resistance to natural disasters
or power cuts?
● What safeguards exist regarding personnel who work for the cloud
service company?
● There is a risk that important and irreplaceable data could be lost from
cloud storage facilities.
Undesirability of certain websites
• There is always a risk of finding undesirable websites.
• There is also a risk of connecting to websites that are not genuine" which
could lead to a number of problems (such as undesirable web links,
security risks, and so on).
• Security risks.
Security issues
Password is used when accessing your email, online banking, accessing social
networking sites.
Ways to protect passwords:
1. Using anti-spyware
2. Changing password on a regular basis
3. Password should be hard to guess or break
Strong password should contain:
1. At least one capital letter
2. At least one numerical value
3. At least on special character
Authentication
Authentication is used to verify that data comes from a secure and trusted
source.
User ID: is a name that used to identify the person to the computer.
Password: is a code word used to prove to the OS that the person really is
who they say they are.
Order of action for the operating system when someone logs on:
1. The OS looks up the user ID in the table of user IDs
2. The OS is then given a list from the table of all the files and folders on
the system which this user is allowed to have access to and the software
and hardware they are allowed to use.
3. The OS then waits for the input of the password
4. If the password matches the password held by the OS for that person,
then they are given access to thing that the table says they are allowed to
use.
Some forms of authentication include:
• digital certificates
• Biometrics
• magnetic stripe cards, ID cards, smart cards, passports.
Some forms of authentication include:
• ID cards
• Passports.
• Smart cards
• Digital certificates
• zero login
• Biometrics
• Magnetic stripe cards
• Physical tokens
• Electronic tokens.

ID Cards
• ID cards use a holographic image (hologram). These are designed to make
forgery of the card more difficult.
• Holographic images change colour or appear to have a moving object
when the image is viewed from different angles.
• Another form of security is to have a photographic image of the card user
printed on the card surface.
Passport
• The passport page containing the photograph is placed face down on a
reader
• A microchip embedded in the page is now read by a reader and the facial
image on the passport is also scanned in
• The owner of the passport now looks up at a digital camera and a
photograph is taken
• The photograph is converted into a digital format so that it can be
compared to the scanned facial image
• The data read from the microchip also compared to data stored on central
database
Smart cards
● Smart cards look like credit cards, and they contain a RFID tag (chip and
antenna) it can be read from a distance and does not have to be swiped
through a card reader.
● chip can be used to hold certain information such as can store data such
as name, security number, sex, date of birth and a PIN.

It can be used in schools in the following ways:


● For registration of students
● For monitoring attendance at each lesson
● For payment for meals in the school canteen
● For access to the school site, buildings, and rooms to improve security
● For access to certain facilities such as the computer network, photocopier,
etc.
● To record borrowing and returning of school library books, digital
cameras, musical instruments, etc.
Zero login
● It means that we won't ever need to remember complicated passwords or
present identification to prove who we are.
● Our electronic devices will be intelligent and safe enough to identify us
right away based on:
○ Our voice.
○ Motions.
○ Facial features, and other unique features.
Physical tokens
● An additional device that is used to gain access to an electronically
restricted resource.
● It can be used in place of or in addition to a password.
There are two types of physical tokens:
1. Disconnected physical token
this is the type , requiring the user to key in data manually using a keypad
where a separate device is used to generate the password.
2. Connected physical token
this type of token transmits the generated one-time password directly to a
computer through a USB connection.
Example of disconnected physical token device used in banking:
A bank's website has been accessed by a client. they are asked to provide
some sort of identity verification. They require a tangible token provided by
the bank in order to accomplish this:
1. The customer inserts their debit card into the top of the token device, the
device either recognises the card as genuine or rejects it.
2. The device then asks the customer to press ‘IDENTIFY’ and then enter
their PIN
3. A one-time password is then shown on the device screen
4. The client now returns to the bank's website and inputs the eight-digit
code.
5. They are now given access to their account.
Electronic tokens
A bank's website has been accessed by a client. they are asked to provide
some sort of identity verification. They require a tangible token provided by
the bank in order to accomplish this:
1. The customer inserts their debit card into the top of the token device, the
device either recognises the card as genuine or rejects it.
2. The device then asks the customer to press ‘IDENTIFY’ and then enter
their PIN
3. A one-time password is then shown on the device screen
4. The client now returns to the bank's website and inputs the eight-digit
code.
5. They are now given access to their account.
Video Conferencing
● Is a live two-way communication method that uses both video and
sound transmissions over the internet.
● It is a substitute for face-to-face conferences between a number of
people, who may be in a different part of the country or live overseas.
● It is carried out in real time and makes use of some form of network.

Besides the basic internet-connected computer Video Conferencing


hardware includes:
● Webcams
● Large monitors/television screens
● Microphones
● Speakers.
Before we begin video conferencing we should
• Agree a time and date for the conference to take place.
• Ensure the webcam, microphone, speakers are switched on.
• Ensure all hardware devices are connected
• Webcams must be positioned correctly. so the delegata can be seen.
• Position microphones in the middle so that each delegate can talk.
• Check speakers volume level.
• Check the internet connection.
Software used in video conferencing
Advantages
• It is possible to hold conferences at short notice.
• Not travelling physically to meetings reduces costs:
• reduced travelling costs
• no need to pay for hotel accommodation or venue hire
• it also reduces the cost of taking people away from their work
• Safer than travelling: it may be better to use video conferencing than have
delegates travel to potentially unsafe places around the world.

Potential issues with video conferencing


• Requires a good, fast, and reliable internet connection.
• Potential time lag in responses (delays when talking).
• Can be expensive to set up in the first place
• Time zone differences as the delegates live in different countries.
• Any sound in the conference can be picked up by microphones.
• Training people can be both costly and time consuming.
• Difficult to sign documents.
• Physical object cannot be handled
Audio conferencing
• Two or more people in different location using audio equipment to hold
an audio call, by dialing into a central system (standard telephone
network) that connects them
• It is possible to hold an audio conference using a computer with
microphone and speakers by using VoIP.
• It is possible to use an internet telephone plugged into the router.

Advantages of Audio conferencing over video conferencing


• Has no time lag
• Better sound quality
• No expensive hardware such as large monitor
• An internet connection is not necessary.
• Video conferences can have problems since they send and receive both
voice and sound, but audio conferences only send and receive voice.
The procedure to be carried out when doing a phone conference:
• The organizer of the phone conference is given two PINs by the phone
company. One PIN is the personal and the second PIN is for
participants.
• The organizer contacts all the participants and informs them of their PIN
and the data and time of the phone conference.
• When the phone conference is about to start, the organizer dials the
conference phone number and once he/she is connected, keys in his/her
personal PIN.
• The participants then call the same conference number to join in once
they get through, they each input the PIN given to them by the organizer
Web conferencing (webinar or webcasts)
A meetings held between people Usually there will be one host and many
participants that enables the real-time sharing of computer screens,
individual applications or web-based content among two or more
computers or mobile devices.
participants are usually sitting in front of computers, viewing other
people.
Traditionally, web conferencing only permitted one-way communication
“webcast”. However, it evolved to enable two-way communication.
Web conferencing allows the following types of meeting to take place:
• Business meetings to discuss new ideas
• Presentations
• Online education or training.
Requirement:
• A computer
• A high-speed, stable Internet connection.
To carry out web conferencing:
• Each user either downloads an application or logs on to a website from
a link supplied in an email from the conference organizer.
• The organizer can decide on who can speak at any time using the
control panel on their computer.
• If a participant wishes to speak, they raise a flag next to their name.
• Participant can post comments using instant messaging to all
participant to see at any time.
Some of the web conferencing main features include:
• Slide presentations using presentation software that can be posted on
the conference website in advance of the meeting
• It is possible for any participant to draw or write on a 'whiteboard'
using their own keyboard or mouse
• It is possible to transmit images or videos using the webcam
throughout the conference
• Documents can be shared by uploading them to the website before the
conference begins
• It is possible to chat verbally or by using instant messaging throughout
the conference.

You might also like