You are on page 1of 57

NETWORKS

VIDEO ON HUB, SWITCH & ROUTER


FUNCTIONALITY

 https://www.youtube.com/watch?v=Ofjsh_E4HFY

 https://www.youtube.com/watch?v=O7CuFlM4V5
4
CH 4.COMPUTER NETWORKS
• A network is made up of two or more computers linked
together.
• Computers are connected to each other for the
following purpose :

Advantages are:
* Share devices between computers
* Share data between computers
* Share programs between computers
* Saves time & Cost of installation and maintenance
A Computer Network

Printer

Work Station

Fileserver
Hub/Switch
IMPORTANT TERMS
 Topology : The geometric arrangement of a computer system.
Common topologies include
 a bus, star, and ring. Hybrids of these are, star bus & star ring.

 Protocol : The protocol defines a common set of rules and signals that
computers on the network use to communicate.

 Architecture : Networks can be broadly classified as using either a


peer-to-peer or client/server architecture.
 One of the most popular architecture for LANs is called
 Ethernet. Another popular LAN architecture for PCs is the IBM token-ring
network.
 Nodes or workstations : Computers on a network are sometimes called
nodes or workstations.

 servers or file servers :Computers and devices that allocate resources for
a network are called servers or file servers.
TYPES OF NETWORKS
There are 3 types of computer network:
1. A local area network (LAN) –
computers are linked from office to office, or
building to building.
2. A metropolitan area network (MAN) – The
computers are further apart and are connected
(that is, in the same city).
3. A wide area network (WAN) – computers are
linked city to city, or country to country.
A Typical Local Area Network (LAN)

• A local area network is a computer network across


one building or site.

Printer

Work Station

Fileserver
Hub/Switch
Wireless Local Area Network (WLAN)
• A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi)
to connect computers instead of cables
• wireless switch or router(with or without anteena) is used
for sending and receiving data to the computers.
• WLANs are more difficult to make secure since other people
can also try to connect to the wireless network. So, it is very
important to have a good, hard-to-guess password for the WLAN
connections
Metropolitan Area Network (MAN)
• A Metropolitan Area Network (MAN) is a network system that covers area
of a single city.
• Usually, MAN connects more than one LANS in a city or town and covers
a smaller geographical area than a WAN.
• For example, a company may design a MAN by connecting all the LANs
in all its office throughout the city.
• The cable television, telephone companies OR local corporations use
MAN.
WIDE AREA NETWORK
 A wide area network is normally used to link groups of computers across
long distances.

 A multinational company in New York will have its own LAN, but to link
with its Japanese offices LAN, it will need to make use of a WAN.

 The WAN will be made up of telephone lines, radio and satellite links, all
run by the local public providers. These will have their own charges.

 Alternatively the company may pay for a permanent link between offices,
known as a leased line. The company pays a fixed rate for the
permanently open connection.
WIDE AREA NETWORK
DIFFERENCE B/W LAN,MAN & WAN

LAN MAN WAN


A local area network is a MAN is computer network A wide area network is
computer network across that connects more than normally used to link
one building or site. one LANS in a city or groups of computers
town and covers a smaller across long distances
geographical area than a such as city to city or
WAN country to country
LAN uses cables , switches MAN generally uses cables, WAN uses routers,
& hubs as a medium to telephone lines to connect bridges, and gateways
connect different systems on as medium to connect
different networks within city
network different systems on
network
LAN is more faster than MAN is slower than LAN but A WAN is usually slower
WAN in data transfer speed faster than WAN in data compared to LAN &
transfer speed MAN because it has lower
bandwidth
LAN is comparatively The setup cost of MAN is The setup cost of a WAN
cheaper than WAN in its more than the setup cost is more expensive than
network installation of LAN but cheaper than WAN a LAN & MAN
It is easier to expand a LAN Man is relatively complex WAN is complex than
than a WAN to expand than LAN. LAN to expand
DIFFERENCE B/W LAN,MAN & WAN
LAN WAN WLAN
Sometimes LAN is faster WAN is slower than both WLAN most of the times
than WLAN due to the WLAN and LAN are faster than WAN but
presence of wires sometimes slower due to
network failures.

A LAN is basically used A WAN is used for A WLAN is the same as


for a private network public internet LAN but it is without
such as a home. wires.

Computers in your house Connection to your ISP---- Computers in your house


networked together--------- -----------------------WLAN networked together
---LAN without a cable----------------
WLAN

10 meters to 1 km. 100kms to 1000 65 meters to 1.5


kilometers or more than Kilometers
that
TYPES OF SERVER
 File server A computer that stores and manages files for multiple
users on a network

 Web server A computer dedicated to responding to requests (from


the browser client) for web pages

 Proxy Server
 Isolates internal network computers from the internet.
 The user first access the proxy server and the proxy server
accesses the internet and retrieves the requested web page or
document. The user then gets a copy of that page from the proxy
server.
IF YOU WERE ASKED TO BUILD A SMALL,
INTERNET-CONNECTED NETWORK FROM
SCRATCH, WHAT WOULD YOU NEED TO DO?
You would need to buy some hardware & Software:
 Two or more than Two Computer Systems

 One or more switches / hubs - to link devices


together
 Network cables to connect devices to the switch,
etc.
 A separate wireless access point (or this could be
part of the switch) - to allow wireless devices (e.g.
laptops or smart-phones) to join the network
 A router to connect your LAN to the Internet
(WAN)
 A firewall to protect your network from hackers

 Complete AntiVirus Software with Internet


Security Software
IF YOU WERE ASKED TO BUILD A SMALL,
INTERNET-CONNECTED NETWORK FROM
SCRATCH, WHAT WOULD YOU NEED TO DO?
 Possibly a bridge if you already have a section of
network and you want your new network to connect to
it
 Server(s) to manage network functions such as
network security, network file storage, shared
resources (such as printers)
 You would need to organize some other things:
 Set up an account with an Internet Service Provider (ISP)
 Get an Internet connection installed from the ISP to your
location
 Configure various bits of hardware and software so that
everything worked with the network
NETWORK HARDWARE

 Additional Network Hardware Devices


 Network Interface Cards (NICs)
 Puts the data into packets and transmits packet onto the network.
 May be wired or wireless.

 Gateway
 Connects networks with different protocols like TCP/IP network and
IPX/SPX networks.
 Routers and Gateways often refer to the same device.

 Proxy server
 Isolates internal network computers from the internet.
 The user first access the proxy server and the proxy server accesses the
internet and retrieves the requested web page or document. The user then
gets a copy of that page from the proxy server.
COMMON NETWORK DEVICES

 Firewall A machine and its software that serve as a


special gateway to a network, protecting it from
inappropriate access
 Filters the network traffic that comes in, checking the
validity of the messages as much as possible and perhaps
denying some messages altogether
 Enforces an organization’s access control policy

 https://www.youtube.com/watch?v=_FZwVhPW_5Y
NETWORK HARDWARE
 HUB
 An unintelligent network device that sends one signal to all of the
computers connected to it.

 All computers/devices are competing for attention because it takes


the data that comes into a port and sends it out all the other ports in
the hub.

 A hub is the simplest of these devices. Any data packet coming


from one port is sent to all other ports. It is then up to the receiving
computer to decide if the packet is for it. Imagine packets going
through a hub as messages going into a mailing list.
NETWORK HARDWARE

 SWITCH
 Split large networks into small segments, decreasing the number of
users sharing the same network resources and bandwidth.
 Understands when two devices want to talk to each other, and
gives them a switched connection
 A switch steps up on a bridge in that it has multiple ports.
 A switch is an intelligent network device. When a packet comes
through a switch it is read to determine which computer to send the
data to.
 This leads to increased efficiency in that packets are not going to
computers that do not require them.
NETWORK HARDWARE

 BRIDGE
 Connects two LANs and forwards or filters data packets
between them.

 Creates an extended network in which any two workstations


on the linked LANs can share data.

 A bridge goes one step up on a hub in that it looks at the


destination of the packet before sending. If the
destination address is not on the other side of the bridge
it will not transmit the data.
 A bridge only has one incoming and one outgoing port.
NETWORK HARDWARE
 ROUTER
 A device that connects any number of
LANs.
 Uses standardized protocols to move
packets efficiently to their destination.
 More sophisticated than bridges, connecting
networks of different types (for example,
star and token ring)
 Forwards data depending on the Network
address (IP), not the Hardware (MAC)
address.
 Routers are the only one of these four
devices that will allow you to share a single
IP address among multiple network clients.
 Resides on Layer 3 of the OSI model.
VARIOUS WIRELESS TECHNOLOGIES
 Wi-Fi :
 Wi-Fi (short for "wireless fidelity") is used for wireless local area networks
(WLAN) and fully described in the 802.11 family of specifications which
provides interoperability.
 Wi-fi allows you to connect to the net at broadband speeds without
cables
 Wi-Fi network can be easy to access by unauthorized users if not
protected adequately.
 The activity of locating and exploiting security-exposed wireless LANs is
called war driving.
 Homes or Organizations that use a wireless LAN should secure the WLAN
by using Wired Equivalent Privacy (WEP) encryption standard, or Wi-
Fi Protected Access (WPA) or MAC address filtering.
 In contrast, the WiFi/802.11 wireless local area network standard is limited
in most cases to only 100 - 300 feet (30 - 100m).
VARIOUS WIRELESS TECHNOLOGIES
 Blue tooth :
 Bluetooth bandwidth is up to 2.1Mbps for version 2.0, and its range is only 10
meters (30 feet).

 Devices with a Bluetooth radio and an antenna can speak to each other with
little or no preparation.

 For example, conference attendees can readily transfer files across a table
using their Bluetooth-enabled notebooks.

 You can also send a file to a Bluetooth-enabled printer without downloading


drivers.

 Bluetooth may soon be a standard interface on many cell phones, handheld


computers, and even home appliances. Bluetooth operates at 2.4GHz.
Bluetooth vs. Wi-Fi
Bluetooth and WiFi are different standards for wireless communication.

Bluetooth technology is useful when transferring information between


two or more devices that are near each other when speed is not an issue,
such as telephones, printers, modems and headsets. It is best suited to low-
bandwidth applications like transferring sound data with telephones (i.e.
with a Bluetooth headset) or byte data with hand-held computers
(transferring files) or keyboard and mice.

Wi-Fi is better suited for operating full-scale networks because it enables a


faster connection, better range from the base station, and better security (if
configured properly) than Bluetooth.
Bluetooth Wifi
Frequency 2.4 GHz 2.4, 3.6, 5 GHz
Cost Low High
Bandwidth Low ( 800 Kbps ) High (11 Mbps )
Specifications Bluetooth SIG IEEE, WECA
authority
It is less secure Security issues are already being
Security
debated.
Mobile phones, mouse, keyboards, Notebook computers, desktop
office and industrial automation computers, servers, TV, Latest
Primary Devices
devices. Activity trackers, such mobiles.
as Fitbit and Jawbone.
Bluetooth adaptor on all the devices Wireless adaptors on all the devices of
Hardware
connecting with each other the network, a wireless router and/or
requirement
wireless access points
5-30 meters With 802.11b/g the typical range is 32
meters indoors and 95 meters (300 ft)
outdoors. 802.11n has greater range.
Range
2.5GHz Wi-Fi communication has
greater range than 5GHz. Antennas
can also increase range.
Power Low High
Consumption
Fairly simple to use. Can be used to It is more complex and requires
connect upto seven devices at a time. configuration of hardware and
Ease of Use
It is easy to switch between devices or software.
find and connect to any device.
Latency 200ms 150ms
Bit-rate 2.1Mbps 600 Mbps
WHAT IS INTRANET, EXTRANET &
INTERNET?
 Intranet
It is a private network that uses Internet protocols to securely share any
part of an organization's information or operational systems within that
organization mainly for employees.

 Extranet
It is a private network that uses internet protocols, network connectivity,
and possibly the public telecommunication system to securely share part
of an organization's information or operations with suppliers, vendors,
partners, customers or other businesses. An extranet can be viewed as
part of a company's Intranet that is extended to users outside the
company, usually via the Internet.

Internet:
It is a global system of interconnected computer networks that use the
standardized Internet Protocol Suite (TCP/IP) to serve billions of users
worldwide.
WHAT IS INTRANET, EXTRANET & INTERNET?

Report
School
Card
Website
System

School-Parent
Communicatio
n Portal
DIFFERENCE B/W INTERENT , INTRANET
VIRTUAL PRIVATE NETWORK (VPN)

Virtual Private Network is used by mobile company users


who frequently travel around or want to access their office
Computers while sitting at home. The connection to the
company network is serviced by some Internet Service
Provider (ISP) and is always. a secure connection just like a
private line connection.

“Nothing But the Intranet via the Internet”


INTERNETWORKING
(WORKING OF INTERNET)

Communication between networks is called internetworking

 The art and science of connecting individual local-area networks


(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.

Figure 15.1 Local-area networks connected across a distance to create a wide-area


network
INTERNETWORKING
(WORKING OF INTERNET)
Communication between networks is called internetworking

 The art and science of connecting individual local-area networks


(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.

 wide-area network are often connected through public networks, such


as the telephone system. They can also be connected through leased
lines or satellites.

 Internetworking can be extremely complex because it generally


involves connecting networks that use different protocols.
 Internetworking is accomplished with routers, bridges, and gateways.
INTERNET CONNECTIONS
 There are various technologies available that you can use
to connect a home computer to the Internet
 A phone modem converts computer data into an analog audio
signal for transfer over a telephone line, and then a modem at
the destination converts it back again into data
 A digital subscriber line (DSL) uses regular copper phone
lines to transfer digital data to and from the phone company’s
central office
 A cable modem uses the same line that your cable TV signals
come in on to transfer the data back and forth

• wide-area network are often connected through public networks, such as


the telephone system. They can also be connected through leased lines or
satellites.
• Internet service provider (ISP) A company that provides other companies
or individuals with access to the Internet
ADVANTAGES AND DISADVANTAGES OF INTERNET
Advantages Disadvantages
Sharing Information Viruses (slowdown computer & damages
valuable data & software)
Collection of Information Security Problems (hacking Confidential
data)
News Immorality (damage the character of
new generation)
Searching Jobs (create Employment) Filtration of Information

Advertisement (E-Commerce) Accuracy of Information

Communication Wastage of times

Entertainment English language problems

Online Education

Online Results

Online Airlines and Railway


Schedules
FAX

 Fax , sometimes called tele - copying, is the telephonic


transmission of scanned printed material (both text and images),
normally to a telephone number connected to a printer or other
output device. The original document is scanned with a fax
machine , which processes the contents (text or images) as a
single fixed graphic image, converting it into a bitmap, and then
transmitting it through the telephone system. The receiving fax
machine reconverts the coded image, printing a paper copy.
Before digital technology became widespread, for many decades,
the scanned data was transmitted as analog.
FAX
 Advantages
 Can be used as a legal document
 Documents can be very long

 Disadvantages
 Cannot be certain if correct person has received it
 Very slow transmission rates
 Not very good quality
 Documents cannot be edited easily
 Cannot send multimedia files
 Won’t be received if line is busy/receiving fax
machine switched off/out of paper
 Wastes/expense of ink/paper
E-MAIL
 Electronic mail, also known as email or e-mail, is a method of
exchanging digital messages from an author to one or more
recipients. Modern email operates across the Internet or
other compute r networks. Some early email systems required that
the author and the recipient both be online at the same time, in
common with instant messaging. Today's email systems are based
on a store-and-forward model. Email servers accept, forward,
deliver and store messages. Neither the users nor their computers
are required to be online simultaneously; they need connect only
briefly, typically to an email server, for as long as it takes to send or
receive messages.
EMAIL
 Advantages
 Can be confident message will only go to the correct
person (if addressed correctly)
 Fast transmission times
 Attachments can be downloaded and edited
 Easier to send large documents
 Disadvantages
 Can be slow turnaround times
 Some systems have limits to size of attachments
 Addresses more difficult to remember than phone
numbers
 Description of how phishing can occur
 Description of how viruses can be transmitted
VIDEO CONFERENCING
 It comprises of two or more people chatting or
presenting to another group of people talking through a
camera or WEBCAM through which the live video of
the person you are talking to…..
 It comprises of a microphone in which the person
speaks and the opposite person can hear. It is the top
way to communicate in today’s busy life
VIDEO CONFERENCING
 Advantages
 Workers can use own office so documents do not get lost in transit/bulky
documents/equipment
 do not have to be carried around
 Company can call meeting at short notice
 Employees can work from home
 Company does not have to pay travelling expenses
 Company does not have to pay hotel expenses
 Company does not have to pay for conference room facilities
 Travelling time is saved
 Might be dangerous to fly/travel
 Disabled people may find it difficult to travel
VIDEO CONFERENCING
 Disadvantages
 Takes time to train employees
 Difficult to call international meetings because of time
differences
 Initial cost of hardware
 Equipment can break down
 Strength of signal/bandwith/lipsync can be a
problem/connection can be lost/power cuts
 Loss of personal/social contact
 Takes time for workers to learn new technology
 Can’t sign documents
WHAT IS VOIP?
 VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-
based networks.

 Also Known As: Internet telephony, IP telephony

 VoIP has become popular largely because of the cost advantages to consumers over
traditional telepone networks. Most Americans pay a flat monthly fee for local
telephone calls and a per-minute charge for long-distance calls.

 VoIP calls can be placed across the Internet. Most Internet connections are charged
using a flat monthly fee structure.

 Using the Internet connection for both data traffic and voice calls can allow
consumers to get rid of one monthly payment. In addition, VoIP plans do not charge a
per-minute fee for long distance.

 Example : Skype Messenger


HOW TO PREVENT UNAUTHORIZED ACCESS TO YOUR
DATA ON NETWORK?
 Physical Security (Computer Trolley or keeping
office doors locked)
 WHAT YOU KNOW (Use a Username and Have a
Good Password)
 WHAT YOU HAVE: ( Use of ID Cards, Smart Cards)
 WHAT IS UNIQUE TO YOU : ( Installation of
Biometric Systems (fingerprint readers, Retina
Scanner, face & voice-print recognition, etc. )
 Install and Use a Firewall
 Data Encryption
ENCRYPTION
Encryption is the process of converting information into a form
that is meaningless to anyone except holders of a ‘key’.

 Causes data to be scrambled/encoded


 Requires an encryption key/software to encrypt

 Requires a decryption key/encryption software to


decrypt
 Results in data which is not
understandable/readable
 protects sensitive data

 from being understood if falls in to the wrong


hands.
AUTHENTICATION
Describe three types of authentication technique they
could use an
 User ID and password
 Benefit – each user ID could be unique/only user will
know the password/data can only be
 accessed by person who knows the password/Password can
be changed frequently to avoid
 hackers guessing them/Unsuccessful logins can throw you
out of the system
 Drawback – user might forget password/keylogging
software can be used to intercept it
 Biometrics
 Benefit – each user has unique biometrics
 Drawback – equipment is expensive to buy/may be
difficult or expensive to get equipment to user
AUTHENTICATION
 Magnetic/chip card with PIN
 Benefit – Hacker needs to have the card and know the PIN
 Drawback – can lose the card/can forget PIN

 TAN (Transaction authentication number )


 Benefit – Always changing so a hacker would not be able to
use it even if they intercepted it when user typed it in.
 Drawback – need to have card and remember PIN and use
it within a short period of time.
WHAT IS USERNAME & PASSWORD WITH THEIR PURPOSES?

 A username is a name that uniquely identifies someone on a computer system.

 A username is almost always paired with a password. This username/password


combination is referred to as a login, and is often required for users to log in to
websites.

 Most usernames can contain letters and numbers.

 Many websites allow users to choose a username so that they can customize
their settings or set up an online account. (Bank website for accessing your
banking information.

 You may need to choose a username in order to post messages to a certain


message board on the Web.

 E-mail services, such as Hotmail require users to choose a username in order to


use the service
THE EIGHT DATA PROTECTION ACT
PRINCIPLES
 The act contains eight “Data Protection Principles”.
These specify that personal data must be:1.
Processed fairly and lawfully.
 Obtained for specified and lawful purposes.
 Adequate, relevant and not excessive.
 Accurate and up to date.
 Not kept any longer than necessary.
 Processed in accordance with the “data subject’s” (the
individual’s) rights.
 Securely kept.
 Not transferred to any other country without
adequate protection in situ.
Thank You
REFER MORE IN DETAIL ON THE FOLLOWING WEBSITE :
HTTP://WWW.IGCSEICT.INFO/THEORY/4/INDEX.HTML
OSI LAYERS
 The layers and their functions in a nutshell are:
1. Physical – When signal is placed on the physical medium (wire,
etc.)
2. Data link-- When data is broken down into packets, converts
packets to signal, physical addressing (MAC)
3. Network – Logical addressing, routes packets to their
destination
4. Transport – Ensures delivery of packets
5. Session – Establishes and manages session, ensures stable
connection between sender and receiver
6. Presentation – Formats data (demodulation, compression,
encryption), converts packets back to usable/readable data
7. Application – Initiates request (i.e. HTTP), initiates and
manages file transfers (FTP), opens received message (SMTP)
WHAT IS PROTOCOL?
 Protocol offers the process for communicating for
hardware.
Protocol specifies the following:
1. Format of messages
2. Meaning of messages
3. Rules for exchange
4. Procedures for handling problems
The need for protocols are due to the following:
1. Packets may be lost
2. Data may be corrupted
3. Packets may be duplicated
4. Packets may be delivered out of order
5. Need mechanisms to distinguish multiple devices,
applications, and copies of single applications in a network
WHAT IS ELECTRONIC SCABBING?
 Suppose a company has two branches, one in city
A and other in city B. One day employees of B
started a strike. Hence all the work in B is in
pending. So the managers or other executives
send the work through internet to branch A and
the employees of that branch will complete the
work. This practice is commonly known
as electronic scabbing.

You might also like