You are on page 1of 57

NETWORKS

VIDEO ON HUB, SWITCH & ROUTER


FUNCTIONALITY
 https://www.youtube.com/watch?v=Ofjsh_E4HFY

 https://www.youtube.com/watch?v=O7CuFlM4V54
CH 4.COMPUTER
•NETWORKS
A network is made up of two or more computers linked
together.
• Computers are connected to each other for the
following purpose :

Advantages are:
* Share devices between computers
* Share data between computers
* Share programs between computers
* Saves time & Cost of installation and maintenance
NETWORKED COMPUTER
Disadvantages
 If server crashes everybody has to stop working

 Poor security

 Increased cost
A Computer Network

Printer

Network Work Station


C able

Fileserver
Hub/Switch
IMPORTANT TERMS
 Topology : The geometric arrangement of a computer system. Common
topologies include
 a bus, star, and ring. Hybrids of these are, star bus & star ring.

 Protocol : The protocol defines a common set of rules and signals that
computers on the network use to communicate.

 Architecture : Networks can be broadly classified as using either a peer-


to-peer or client/server architecture.
 One of the most popular architecture for LANs is called
 Ethernet. Another popular LAN architecture for PCs is the IBM token-ring network.
 Nodes or workstations : Computers on a network are sometimes called
nodes or workstations.

 servers or file servers :Computers and devices that allocate resources for a
network are called servers or file servers.
TYPES OF NETWORKS
There are 3 types of computer network:
1. A local area network (LAN) –
computers are linked from office to office, or building
to building.
2. A metropolitan area network (MAN) – The
computers are further apart and are connected (that is,
in the same city).
3. A wide area network (WAN) – computers are linked
city to city, or country to country.
4. Wireless LAN
A Typical Local Area Network (LAN)

• A local area network is a computer network across one


building or site.

Printer

Network Work Station


C able

Fileserver
Hub/Switch
Wireless Local Area Network (WLAN)
• A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi) to
connect computers instead of cables
• wireless switch or router(with or without anteena) is used for sending
and receiving data to the computers.
• WLANs are more difficult to make secure since other people can also try
to connect to the wireless network. So, it is very important to have a good,
hard-to-guess password for the WLAN connections
WIDE AREA NETWORK
 A wide area network is normally used to link groups of computers
across long distances.
 A multinational company in New York will have its own LAN, but to link
with its Japanese offices LAN, it will need to make use of a WAN.
 The WAN will be made up of telephone lines, radio and satellite links, all
run by the local public providers. These will have their own charges.
 Alternatively the company may pay for a permanent link between
offices, known as a leased line. The company pays a fixed rate for the
permanently open connection.
WIDE AREA NETWORK
DIFFERENCE B/W LAN,MAN & WAN

LAN MAN WAN


A local area network is a MAN is computer network A wide area network is
computer network across that connects more than normally used to link
one building or site. one LANS in a city or groups of computers
town and covers a smaller across long distances
geographical area than a such as city to city or
WAN country to country
LAN uses cables , switches MAN generally uses cables, WAN uses routers,
& hubs as a medium to telephone lines to connect bridges, and gateways
connect different systems on as medium to connect
different networks within city
network different systems on
network
LAN is more faster than MAN is slower than LAN but A WAN is usually slower
WAN in data transfer speed faster than WAN in data compared to LAN &
transfer speed MAN because it has lower
bandwidth
LAN is comparatively The setup cost of MAN is The setup cost of a WAN
cheaper than WAN in its more than the setup cost is more expensive than
network installation of LAN but cheaper than WAN a LAN & MAN
It is easier to expand a LAN Man is relatively complex WAN is complex than
than a WAN to expand than LAN. LAN to expand
DIFFERENCE B/W LAN,MAN & WAN
LAN WAN WLAN
Sometimes LAN is faster WAN is slower than both WLAN most of the times
than WLAN due to the WLAN and LAN are faster than WAN but
presence of wires sometimes slower due to
network failures.
A LAN is basically used A WAN is used for A WLAN is the same as
for a private network public internet LAN but it is without
such as a home. wires.

Computers in your house Connection to your Computers in your house


networked ISP---------------------------WLAN networked together
together------------LAN without a cable----------------
WLAN

10 meters to 1 km. 100kms to 1000 65 meters to 1.5


kilometers or more than Kilometers
that
TYPES OF SERVER
 File server A computer that stores and manages files for multiple
users on a network

 Web server A computer dedicated to responding to requests (from


the browser client) for web pages

 Proxy Server
 Isolates internal network computers from the internet.
 The user first access the proxy server and the proxy server
accesses the internet and retrieves the requested web page or
document. The user then gets a copy of that page from the proxy
server.
IF YOU WERE ASKED TO BUILD A SMALL,
INTERNET-CONNECTED NETWORK FROM
SCRATCH, WHAT WOULD YOU NEED TO
DO?
You would need to buy some hardware & Software:
 Two or more than Two Computer Systems

 One or more switches / hubs - to link devices together


 Network cables to connect devices to the switch, etc.
 A separate wireless access point (or this could be part of
the switch) - to allow wireless devices (e.g. laptops or
smart-phones) to join the network
 A router to connect your LAN to the Internet (WAN)
 A firewall to protect your network from hackers
 Complete AntiVirus Software with Internet Security
Software
IF YOU WERE ASKED TO BUILD A SMALL,
INTERNET-CONNECTED NETWORK FROM
SCRATCH, WHAT WOULD YOU NEED TO
DO?
 Possibly a bridge if you already have a section of network and
you want your new network to connect to it
 Server(s) to manage network functions such as network
security, network file storage, shared resources (such as
printers)
 You would need to organize some other things:
 Setup an account with an Internet Service Provider (ISP)
 Get an Internet connection installed from the ISP to your location
 Configure various bits of hardware and software so that everything
worked with the network
NETWORK HARDWARE
 Additional Network Hardware Devices
 Network Interface Cards (NICs)
 Puts the data into packets and transmits packet onto the network.
 May be wired or wireless.

 Gateway
 Connects networks with different protocols like TCP/IP network and
IPX/SPX networks.
 Routers and Gateways often refer to the same device.

 Proxy server
 Isolates internal network computers from the internet.
 The user first access the proxy server and the proxy server accesses the

internet and retrieves the requested web page or document. The user then
gets a copy of that page from the proxy server.
COMMON NETWORK DEVICES
 Firewall A machine and its software that serve as a special
gateway to a network, protecting it from inappropriate access
 Filtersthe network traffic that comes in, checking the validity of the
messages as much as possible and perhaps denying some messages
altogether
 Enforces an organization’s access control policy

 https://www.youtube.com/watch?v=_FZwVhPW_5Y
NETWORK HARDWARE
 HUB
 An unintelligent network device that sends one signal to all of the
computers connected to it.

 All computers/devices are competing for attention because it takes


the data that comes into a port and sends it out all the other ports in
the hub.

 A hub is the simplest of these devices. Any data packet coming


from one port is sent to all other ports. It is then up to the receiving
computer to decide if the packet is for it. Imagine packets going
through a hub as messages going into a mailing list.
NETWORK HARDWARE

 SWITCH
 Split large networks into small segments, decreasing the number
of users sharing the same network resources and bandwidth.
 Understands when two devices want to talk to each other, and
gives them a switched connection
 A switch steps up on a bridge in that it has multiple ports.
 A switch is an intelligent network device. When a packet comes
through a switch it is read to determine which computer to send the
data to.
 This leads to increased efficiency in that packets are not going to
computers that do not require them.
 Switch use MAC address.
NETWORK HARDWARE

 BRIDGE
 Connects two LANs and forwards or filters data packets
between them.

 Creates an extended network in which any two workstations


on the linked LANs can share data.

 A bridge goes one step up on a hub in that it looks at the


destination of the packet before sending. If the
destination address is not on the other side of the bridge
it will not transmit the data.
 A bridge only has one incoming and one outgoing port.
NETWORK HARDWARE
 ROUTER
 A device that connects any number of LANs.
 Uses standardized protocols to move packets
efficiently to their destination.
 More sophisticated than bridges, connecting
networks of different types (for example, star and
token ring)
 Forwards data depending on the Network address
(IP), not the Hardware (MAC-Media Access
Control) address.
 Routers are the only one of these four devices that
will allow you to share a single IP address among
multiple network clients.
 Resides on Layer 3 of the OSI model.
VARIOUS WIRELESS TECHNOLOGIES
 Wi-Fi :
 Wi-Fi (short for "wireless fidelity") is used for wireless local area networks
(WLAN) and fully described in the 802.11 family of specifications which provides
interoperability.
 Wi-fi allows you to connect to the net at broadband speeds without cables
 Wi-Fi network can be easy to access by unauthorized users if not protected
adequately.
 The activity of locating and exploiting security-exposed wireless LANs is called
war driving.
 Homes or Organizations that use a wireless LAN should secure the WLAN by
using Wired Equivalent Privacy (WEP) encryption standard, or Wi-Fi
Protected Access (WPA) or MAC address filtering.
 In contrast, the WiFi/802.11 wireless local area network standard is limited in
most cases to only 100 - 300 feet (30 - 100m).
VARIOUS WIRELESS TECHNOLOGIES
 Blue tooth :
Bluetooth bandwidth is up to 2.1Mbps for version 2.0, and its range is only 10
meters (30 feet).
Devices with a Bluetooth radio and an antenna can speak to each other with
little or no preparation.
For example, conference attendees can readily transfer files across a table
using their Bluetooth-enabled notebooks.
You can also send a file to a Bluetooth-enabled printer without downloading
drivers.
Bluetooth may soon be a standard interface on many cell phones, handheld
computers, and even home appliances. Bluetooth operates at 2.4GHz.
Bluetooth vs. Wi-Fi
Bluetooth and WiFi are different standards for wireless communication.

Bluetooth technology is useful when transferring information between two or more


devices that are near each other when speed is not an issue, such as telephones,
printers, modems and headsets. It is best suited to low-bandwidth applications like
transferring sound data with telephones (i.e. with a Bluetooth headset) or byte data with
hand-held computers (transferring files) or keyboard and mice.

Wi-Fi is better suited for operating full-scale networks because it enables a faster
connection, better range from the base station, and better security (if configured
properly) than Bluetooth.
Bluetooth Wifi
Frequency 2.4 GHz 2.4, 3.6, 5 GHz
Cost Low High
Bandwidth Low ( 800 Kbps ) High (11 Mbps )
Specifications Bluetooth SIG IEEE, WECA
authority
Security It is less secure Security issues are already being debated.
Mobile phones, mouse, keyboards, office Notebook computers, desktop computers,
Primary Devices and industrial automation devices. Activity servers, TV, Latest mobiles.
trackers, such as Fitbit and Jawbone.
Bluetooth adaptor on all the devices Wireless adaptors on all the devices of the
Hardware
connecting with each other network, a wireless router and/or wireless
requirement
access points
5-30 meters With 802.11b/g the typical range is 32
meters indoors and 95 meters (300 ft)
outdoors. 802.11n has greater range.
Range
2.5GHz Wi-Fi communication has greater
range than 5GHz. Antennas can also
increase range.
Power Consumption Low High
Fairly simple to use. Can be used to connect It is more complex and requires
upto seven devices at a time. It is easy to configuration of hardware and software.
Ease of Use
switch between devices or find and connect
to any device.
Latency 200ms 150ms
Bit-rate 2.1Mbps 600 Mbps
WHAT IS INTRANET, EXTRANET &
INTERNET?
 Intranet
It is a private network that uses Internet protocols to securely share any part
of an organization's information or operational systems within that
organization mainly for employees.

 Extranet
It is a private network that uses internet protocols, network connectivity, and
possibly the public telecommunication system to securely share part of an
organization's information or operations with suppliers, vendors, partners,
customers or other businesses. An extranet can be viewed as part of a
company's Intranet that is extended to users outside the company, usually via
the Internet.

Internet:
It is a global system of interconnected computer networks that use the
standardized Internet Protocol Suite (TCP/IP) to serve billions of users
worldwide.
WHAT IS INTRANET, EXTRANET &
INTERNET?
Report
School
Card
Website
System

School-Parent
Communication
Portal
DIFFERENCE B/W INTERENT , INTRANET
VIRTUAL PRIVATE NETWORK
(VPN)
Virtual Private Network is used by mobile company users
who frequently travel around or want to access their office
Computers while sitting at home. The connection to the
company network is serviced by some Internet Service
Provider (ISP) and is always. a secure connection just like a
private line connection.

“Nothing But the Intranet via the Internet”


INTERNETWORKING
(WORKING OF INTERNET)

Communication between networks is called internetworking

 The art and science of connecting individual local-area networks


(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.

Figure 15.1 Local-area networks connected across a distance to create a wide-area


network
INTERNETWORKING
(WORKING OF INTERNET)
Communication between networks is called internetworking

 The art and science of connecting individual local-area networks


(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.

 wide-area network are often connected through public networks, such


as the telephone system. They can also be connected through leased
lines or satellites.

 Internetworking can be extremely complex because it generally


involves connecting networks that use different protocols.
 Internetworking is accomplished with routers, bridges, and gateways.
INTERNET CONNECTIONS
 There are various technologies available that you can use to
connect a home computer to the Internet
 A phone modem converts computer data into an analog audio signal for
transfer over a telephone line, and then a modem at the destination
converts it back again into data
 A digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone company’s central office
 A cable modem uses the same line that your cable TV signals come in on
to transfer the data back and forth

• wide-area network are often connected through public networks, such as


the telephone system. They can also be connected through leased lines or
satellites.
• Internet service provider (ISP) A company that provides other companies
or individuals with access to the Internet
ADVANTAGES AND DISADVANTAGES OF
INTERNET
Advantages Disadvantages
Sharing Information Viruses (slowdown computer & damages
valuable data & software)
Collection of Information Security Problems (hacking Confidential data)

News Immorality (damage the character of new


generation)
Searching Jobs (create Employment) Filtration of Information

Advertisement (E-Commerce) Accuracy of Information

Communication Wastage of times

Entertainment English language problems

Online Education

Online Results

Online Airlines and Railway Schedules


FAX

 Fax , sometimes called tele - copying, is the telephonic


transmission of scanned printed material (both text and images),
normally to a telephone number connected to a printer or other
output device. The original document is scanned with a fax
machine , which processes the contents (text or images) as a
single fixed graphic image, converting it into a bitmap, and then
transmitting it through the telephone system. The receiving fax
machine reconverts the coded image, printing a paper copy.
Before digital technology became widespread, for many decades,
the scanned data was transmitted as analog.
FAX
 Advantages
 Canbe used as a legal document
 Documents can be very long

 Disadvantages
 Cannot be certain if correct person has received it
 Very slow transmission rates
 Not very good quality
 Documents cannot be edited easily
 Cannot send multimedia files
 Won’t be received if line is busy/receiving fax machine
switched off/out of paper
 Wastes/expense of ink/paper
E-MAIL
 Electronic mail, also known as email or e-mail, is a method of
exchanging digital messages from an author to one or more
recipients. Modern email operates across the Internet or
other compute r networks. Some early email systems required that
the author and the recipient both be online at the same time, in
common with instant messaging. Today's email systems are based on
a store-and-forward model. Email servers accept, forward, deliver and
store messages. Neither the users nor their computers are required to
be online simultaneously; they need connect only briefly, typically to
an email server, for as long as it takes to send or receive messages.
EMAIL
 Advantages
 Can be confident message will only go to the correct
person (if addressed correctly)
 Fast transmission times
 Attachments can be downloaded and edited
 Easier to send large documents

 Disadvantages
 Can be slow turnaround times
 Some systems have limits to size of attachments
 Addresses more difficult to remember than phone numbers
 Description of how phishing can occur
 Description of how viruses can be transmitted
VIDEO CONFERENCING
 It comprises of two or more people chatting or presenting to
another group of people talking through a camera or WEBCAM
through which the live video of the person you are talking to…..
 It comprises of a microphone in which the person speaks and the
opposite person can hear. It is the top way to communicate in
today’s busy life
VIDEO CONFERENCING
 Advantages
 Workers can use own office so documents do not get lost in transit/bulky
documents/equipment
 do not have to be carried around
 Company can call meeting at short notice
 Employees can work from home
 Company does not have to pay travelling expenses
 Company does not have to pay hotel expenses
 Company does not have to pay for conference room facilities
 Travelling time is saved
 Might be dangerous to fly/travel
 Disabled people may find it difficult to travel
VIDEO CONFERENCING
 Disadvantages
 Takes time to train employees
 Difficult to call international meetings because of time differences
 Initial cost of hardware
 Equipment can break down
 Strength of signal/bandwith/lipsync can be a problem/connection can be
lost/power cuts
 Loss of personal/social contact
 Takes time for workers to learn new technology
 Can’t sign documents
WHAT IS VOIP?
 VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-
based networks.
 Also Known As: Internet telephony, IP telephony
 VoIP has become popular largely because of the cost advantages to consumers over
traditional telepone networks. Most Americans pay a flat monthly fee for local telephone
calls and a per-minute charge for long-distance calls.
 VoIP calls can be placed across the Internet. Most Internet connections are charged
using a flat monthly fee structure.
 Using the Internet connection for both data traffic and voice calls can allow consumers to
get rid of one monthly payment. In addition, VoIP plans do not charge a per-minute fee
for long distance.
 Example : Skype Messenger
HOW TO PREVENT UNAUTHORIZED ACCESS
TO YOUR DATA ON NETWORK?
 Physical Security (Computer Trolley or keeping office doors locked)
 WHAT YOU KNOW (Use a Username and Have a Good Password)
 WHAT YOU HAVE: ( Use of ID Cards, Smart Cards)
 WHAT IS UNIQUE TO YOU : ( Installation of Biometric Systems
(fingerprint readers, Retina Scanner, face & voice-print recognition,
etc. )
 Install and Use a Firewall
 Data Encryption
ENCRYPTION
Encryption is the process of converting information into a form that is
meaningless to anyone except holders of a ‘key’.
 Causes data to be scrambled/encoded
 Requires an encryption key/software to encrypt

 Requires a decryption key/encryption software to


decrypt
 Results in data which is not understandable/readable

 protects sensitive data

 from being understood if falls in to the wrong hands.


AUTHENTICATION
Describe three types of authentication technique they could use an
 User ID and password
 Benefit – each user ID could be unique/only user will know the
password/data can only be
 accessed by person who knows the password/Password can be
changed frequently to avoid
 hackers guessing them/Unsuccessful logins can throw you out of the
system
 Drawback – user might forget password/keylogging software can be
used to intercept it
 Biometrics
 Benefit– each user has unique biometrics
 Drawback – equipment is expensive to buy/may be difficult or
expensive to get equipment to user
AUTHENTICATION
 Magnetic/chip card with PIN
 Benefit
– Hacker needs to have the card and know the PIN
 Drawback – can lose the card/can forget PIN

 TAN (Transaction authentication number )


 Benefit – Always changing so a hacker would not be able to use it
even if they intercepted it when user typed it in.
 Drawback – need to have card and remember PIN and use it within
a short period of time.
WHAT IS USERNAME & PASSWORD WITH THEIR PURPOSES?

 A username is a name that uniquely identifies someone on a computer system.


 A username is almost always paired with a password. This username/password
combination is referred to as a login, and is often required for users to log in to
websites.
 Most usernames can contain letters and numbers.
 Many websites allow users to choose a username so that they can customize
their settings or set up an online account. (Bank website for accessing your
banking information.
 You may need to choose a username in order to post messages to a certain
message board on the Web.
 E-mail services, such as Hotmail require users to choose a username in order to
use the service
THE EIGHT DATA PROTECTION ACT
PRINCIPLES
 The act contains eight “Data Protection Principles”. These
specify that personal data must be:1. Processed fairly and
lawfully.
 Obtained for specified and lawful purposes.

 Adequate, relevant and not excessive.

 Accurate and up to date.

 Not kept any longer than necessary.

 Processed in accordance with the “data subject’s” (the


individual’s) rights.
 Securely kept.

 Not transferred to any other country without adequate


protection in situ.
Thank You
REFER MORE IN DETAIL ON THE FOLLOWING WEBSITE :
HTTP://WWW.IGCSEICT.INFO/THEORY/4/INDEX.HTML
OSI LAYERS
 The layers and their functions in a nutshell are:
1. Physical – When signal is placed on the physical medium (wire, etc.)
2. Data link-- When data is broken down into packets, converts packets
to signal, physical addressing (MAC)
3. Network – Logical addressing, routes packets to their destination
4. Transport – Ensures delivery of packets
5. Session – Establishes and manages session, ensures stable connection
between sender and receiver
6. Presentation – Formats data (demodulation, compression,
encryption), converts packets back to usable/readable data
7. Application – Initiates request (i.e. HTTP), initiates and manages file
transfers (FTP), opens received message (SMTP)
WHAT IS PROTOCOL?
 Protocol offers the process for communicating for hardware.

Protocol specifies the following:


1. Format of messages
2. Meaning of messages
3. Rules for exchange
4. Procedures for handling problems

The need for protocols are due to the following:


1. Packets may be lost
2. Data may be corrupted
3. Packets may be duplicated
4. Packets may be delivered out of order
5. Need mechanisms to distinguish multiple devices, applications, and
copies of single applications in a network
WHAT IS ELECTRONIC SCABBING?
 Suppose a company has two branches, one in city A and
other in city B. One day employees of B started a strike.
Hence all the work in B is in pending. So the managers
or other executives send the work through internet to
branch A and the employees of that branch will complete
the work. This practice is commonly known
as electronic scabbing.

You might also like