You are on page 1of 55

NETWORKING

XENOTECH
AGENDA
LAN
WAN
PAN
CLIENT-SERVER
PEER TO PEER
Presentation title 3

LAN
1. The term local area network (LAN) is used to refer to a network that is
formed when devices in the same building or on a single site are
connected.

2. A network in your home, workplace, or school will be a LAN. Note that the
word 'local' doesn't refer to a specific geographical area, such as
neighborhood, city, or region.
Presentation title 4

LAN
Presentation title 5

LAN
1. The network shown above uses a central switch or hub, through which all
devices communicate.
2. In a larger organization such as your school or college, the LAN will be
far more sophisticated with multiple rooms and buildings interconnected.
3. One characteristic of a local area network is that the infrastructure
(cabling and network communication devices) will be owned and
maintained by the organization (or they may employ someone to do this
for them).
Presentation title 6

LAN
1. Each device on a network has a unique identifier, which is usually its IP
address.
2. The first part of this address is the network ID, which will be the same for
all of the devices on the network.
Presentation title 7

WAN
1. When two or more networks are connected across a large geographical
area, they form a wide area network (WAN).
2. There are many examples of WANs, such as a bank connecting all of its
cash machines together across the country, or regional police stations
connecting together to share information.
3. The largest example of a WAN is the internet.
Presentation title 8

WAN
Presentation title 9

PAN
1. A personal area network (PAN) is used to connect personal devices over
a very small area.
2. The most common technology used is Bluetooth, which uses short-range
radio signals, and limited transmission power, giving it a very short range
of up to 10 meters.
3. You will create a PAN when you connect a smart watch to a mobile
phone, or a wireless headset to your laptop.
Presentation title 10

PAN
Presentation title 11

CLIENT-SERVER
1. Client–server networks allow you to access your files and emails from
any authorized device.
2. Server based networks provide centralized control over network
resources including security.
3. The computers used for servers usually have faster CPUs, more memory
and larger hard drives.
4. Server operating systems are designed to handle multiple requests for
shared resources.
5. Valid username and password combinations can access network
resources.
Presentation title 12

CLIENT-SERVER
Presentation title 13

SERVER
A server is a program on a computer that shares resources with, or provides
services to, any authorized client. Most servers will run 24 hours a day, 7
days a week, so that a client can send a request for resources at any time.
There are many types of server:
•File servers store and provide files.
•Web servers store and provide webpages.
•Email servers store and forward emails. Some email servers filter out spam.
•Database servers store databases, run queries, and allow data to be
manipulated.
•Print servers provide printing services across the network and manage print
queues.
Presentation title 14

CLIENT
A client is a program that typically runs on a device used by an end-user
such as a laptop or mobile phone.
A client sends a request to the server. The server processes the request
and then sends a response back to the client.
For example, when you want to view a webpage, you will use a web browser
(which is a web client). The browser will request the page from a web server.
The server will send the page back to the browser and the page will be
displayed.
Presentation title 15

PEER TO PEER
1. In a peer-to-peer network, there are no central servers
2. Every computer can be configured to share its resources
3. Peers communicate directly with each other
4. In a peer-to-peer network, computers must be switched on to share
resources
Presentation title 16

PEER TO PEER
Presentation title 17

PEER TO PEER
VS
CLIENT SERVER
Setup cost Servers will need to be set No additional devices are
up and configured. These needed.
will generally be high-
performance computers
capable of supporting a
large number of users.
Physical security Servers can be located in On peer-to-peer networks,
secure rooms. They do not workstations may be at
need to be physically multiple different
accessible to every user. It locations, and are difficult
is easier to monitor a to oversee.
server room (e.g. by
CCTV) than to monitor
every device on the
network.
Presentation title 18

PEER TO PEER
VS
CLIENT SERVER
Backups Most important files are In a peer-to-peer network,
stored on servers. It is individual users are likely
therefore much easier to to be responsible for
make sure that all of backing up their own
these files are backed up. data.

Points of failure If a server fails, many If one device fails, it will


users will be affected. For have less impact. Most
example, if a file server users will be able to carry
fails, no-one will be able on with their work.
to access their files until
the service is restored.
Presentation title 19

QUIZ
Which one of the below statements is correct for the client–server networking
model?
a) A server can perform backup of data only if all the clients in the
network are switched on.
b) A server requests services to clients in order to process and display
their responses.
c) If the server is unable to provide a response the clients exchange
data directly with each other.
d) There can be different types of server with each type offering a
particular service.
Presentation title 20

QUIZ
Which one of the following statements is correct in relation to the peer-to-peer
networking model?

a) To join a peer-to-peer network, a device needs to share all of its


resources with the other devices in the network.
b) In a peer-to-peer network, a device needs to be switched on in order
to be able to share its resources with the other connected devices.
c) In a peer-to-peer network, the most powerful computer in the network
is responsible for backing up data.
d) Peer-to-peer networks are very secure because every device goes
through an authentication process before it joins the network.
Presentation title 21

QUIZ
Below are statements that highlight some of the differences between client–server and
peer-to-peer networking. Pick one statement that is not correct.

a) In a peer-to-peer network, a computer can act as both a client and a


server.
b) In a client-server model, all processing must be done in the server
side.
c) In a peer-to-peer network, any device can share resources with any
other device in the network.
d) Management of network security and maintenance is usually easier
in a client–server model.
WIRED & WIRELESS
NETWORK
XENOTECH
Presentation title 23

WIRED NETWORK
1. A typical wired network will comprise a range of devices that are
connected through a network Switch. Each device will be connected to
the switch by a cable. Many switches can be joined together to form a
larger network.

2. Most devices are cabled into switches using UTP cables. This type of
cable is usually resilient to interference.

3. The speed of an Ethernet network depends on the category of cable and


the other network components. For example, "gigabit Ethernet" requires
Cat-5e cable.
Presentation title 24

WIRELESS
NETWORK
1. A typical wireless local area network (WLAN) is based around a central
communications device called a wireless access point (WAP)
2. The range of a typical wireless network operating on the 2.4GHz band is
around 50m indoors, but this will depend on the properties of the building
such as wall thickness.
3. An open network is one that has been configured so that a password
(key) is not required. Open networks are not secure because your data
may not be encrypted
Presentation title 25

WIRED &WIRELESS
NETWORK
Speed Wired connections are As well as interference, most
usually faster than wireless wireless transmissions are
connections. Signals carried encrypted. This introduces a
over cables are less processing delay.
susceptible to interference so
there are fewer errors.

Security Wired networks are more Wireless networks are less


secure than wireless secure than wired networks.
networks. Data is transmitted Data can be intercepted by
over physical cables, which someone without them
are harder to tamper with in needing to be physically
order to intercept messages. connected to the network.
Presentation title 26

WIRED &WIRELESS
NETWORK
Range The range of a wired The range of a wireless
network is greater than network may be restricted
wireless. Copper cable will because signals can be
reliably carry signals for up obstructed by thick walls
to 100m. Fibre optic cables and other obstacles.
are capable of carrying
network signals over
distances of 100km or more.

Setup Fixed cabling is inflexible. Devices do not need to be


If a room layout is changed, used in a fixed location.
the network connection They can be located
points may no longer be in anywhere within range of a
the correct place. wireless access point.
Presentation title 27

WIRED &WIRELESS
NETWORK
Cost Wired networks can be More than one wireless
expensive to set up. Routers access point may be needed
or switches are required. if the building is large or
uses materials that block
mobile signals.
Presentation title 28

WIFI
1. Wi-Fi is a trademark of the Wi-Fi Alliance. This organization grants
certification to products that meet the Wi-Fi standard.
2. This ensures that products from different manufacturers can
communicate with each other.
3. Wireless networks use a specific range of radio wave frequencies (the
frequency band) to transmit data. Most WLAN devices will be dual-
band and will operate on:
• 2.4GHz
• 5.0GHz
Presentation title 29

ETHERNET
1. Ethernet is a standard that refers to a family of wired computer
networking technologies and protocols that are commonly used in local
area networks.
2. The standard is developed and maintained by the Institute of Electrical
and Electronics Engineers (IEEE).
3. Physical connections are made between computer devices and/or
infrastructure devices (hubs, switches, routers) using copper or fiber optic
cable. The specification of the cable will make a difference to the speeds
that can be achieved on the network.
Presentation title 30

BLUETOOTH
1. Bluetooth is a standard that is used for networks that exchange data over
very short distances.
2. The central device in a Bluetooth network can communicate with up to
seven other devices over a typical distance of 10m.
3. Bluetooth is designed to use very little power.
4. Bluetooth is widely used to connect devices on a personal area network
Presentation title 31

SWITCH & HUB


1. Networks are made up of many devices. To allow these devices to be
connected in a way that makes cabling easier, hubs or switches are
used. Hubs and switches can look very similar, but they behave very
differently.
2. A hub will simply repeat messages to all connected devices. This is
inefficient because it sends data to places other than its intended
destination.
3. A switch only sends a message to its intended destination device.
4. The switch builds up a table with the MAC address of every device that is
connected to each of its ports. When a signal is received, the data is
analyzed to determine the destination MAC address. The data is then
sent to the port connected to the device with the MAC address.
Presentation title 32

HUB
Presentation title 33

SWITCH
Presentation title 34

DIFFERENCES
Presentation title 35

ROUTER
1. Where communication happens between two separate networks, a
router is required to connect the networks.
2. On the wider internet, core routers are used to forward packets to their
destination along the backbone of the internet. These routers examine
the destination of each packet and consult a routing table of known
networks.
3. The table indicates which connection is best to use to send the packet
towards its intended destination.
Presentation title 36

ROUTER
Presentation title 37

MULTI FUNCTION
DEVICE
1. Internet service providers usually supply a network access device to
domestic customers, making it as simple as possible to connect home
devices to the internet. Confusingly, network access devices are known
by a variety of names, e.g. home hub or broadband hub. Many people
just refer to them as "the router".

2. Network access devices typically contain a wireless access point (WAP),


a router, a modem, and a switch. The switch will usually have between
two and four ports, labelled 'LAN' or 'Ethernet'; these can be used to
connect devices using UTP cable.

3. The connector to the telephone line is usually labelled 'broadband' or


'internet'. There may also be a port labelled WAN. This is used if a
separate modem is needed, and for other types of network connection.
Presentation title 38

MULTI FUNCTION
DEVICE
Presentation title 39

MULTI FUNCTION
DEVICE
1. Network access devices can also control access to a network using the
MAC addresses of the devices that are trying to connect to that network.
2. A list of approved devices is maintained on the network access device,
and the access device will only allow connections from devices with
approved MAC addresses.
3. If a device has a MAC address that isn't listed and it attempts to connect
to the access device, the access device will deny the connection.
Presentation title 40

NETWORK
INTERFACE CARD
1. A network interface controller (NIC) is a hardware device that is used to
connect a device to a network.
2. Communicating across a network requires electronic digital data to be
transferred between points. The NIC converts the data that is to be sent
into appropriate signals that can be carried across the medium:
• In a wired network, these signals will be voltages through a wire, or
pulses of light through a fiber
• In a wireless network, the signals will be modulated radio waves
Presentation title 41

NETWORK
INTERFACE CARD
Presentation title 42

NETWORK
INTERFACE CARD
1. The NIC in the sending device is responsible for converting digital data
into these signals. At the receiving end, the NIC will receive the signals
and convert them back into the corresponding digital data.
2. Network interface controllers are sometimes also referred to as network
interface cards. This stems from the fact that in the past, the controller
might have been a separate hardware device that would have been
plugged into an expansion slot on the motherboard, rather than being an
integrated component.
3. Each NIC has a unique identifier called a Media Access Control (MAC)
address. It is 48 bits long, and is usually referred to in hexadecimal
notation, for example: cd:f1:24:e4:89:a1. The MAC address is allocated
by the manufacturer and cannot be changed.
Presentation title 43

ACCESS POINT

1. A wireless access point enables wireless devices to connect to a local


network.
2. In a small wireless network in someone's home, the wireless access point
will be built into the network access device (home hub) that is provided
by the internet service provider. This allows devices to connect wirelessly
and may also allow two or three wired connections.
3. In a larger network, you may find stand-alone wireless access points that
are connected by cable to a switch that is part of a wired network.
Presentation title 44

ACCESS POINT
Presentation title 45

QUIZ
A --------------------repeats messages to all connected devices on a network.
This is inefficient because it sends data to places other than its intended
destination.
A   -------------------- only sends a message to its intended device on a network.
Presentation title 46

QUIZ
Which of the following is not a component that is used to communicate
across a local area network?
a) UTP (Ethernet) cable
b) Wireless NIC
c) Switch
d) Modem
Presentation title 47

QUIZ
A large company with offices in different cities has many interconnected
networks. There is a hardware fault on one of the office networks that means
that none of the computers on one network can communicate with each
other. Devices on other networks can still communicate with each other.
Which is the most likely hardware fault?
a) The modem has broken.
b) The NICs have lost their configuration settings.
c) A switch connecting computers in the affected office has broken.
d) The router in the affected office has been switched office
Presentation title 48

QUIZ
Which network hardware device has a unique identifier called a media
access control (MAC) address?
a) Network interface controller (NIC)
b) Router
c) Hub
Presentation title 49

QUIZ
An international fashion brand with shops and offices in different cities has
many interconnected networks. In one of the offices there is a hardware fault
and none of the computers can communicate with each other. Devices in
other shops and offices can still communicate with each other. Which option
is the most likely hardware fault?
a) A switch connecting computers in the affected office has broken.
b) The router in the affected office has been switched off.
c) The modem has broken.
d) The NICs have lost their configuration settings.
Presentation title 50

QUIZ
An internet  ---------------will often supply a network access device, also known
as a ---------------. Part of this device will incorporate a   --------------- to connect
to the internet.

a) Router
b) Home Hub
c) Internet Service Provider
Presentation title 51

TCP/IP
1. When network connected devices communicate with each other, a set of
rules must be followed — these rules are known as protocols. The
internet uses many different protocols; without these rules, different
devices would have no way of communicating with each other.
2. Network protocols are organized as a sequence of layers through which
the data is passed. The sequence of layers can be visualized as sitting
on top of each other to form a stack. This is called a protocol stack.
3. The TCP/IP network protocol stack is the stack that is used on the
Internet. It is divided up into four layers that sit one on top of the other.
Some literature divides the bottom layer into two, creating a five layer
model.
Presentation title 52

TCP/IP
1. When network connected devices communicate with each other, a set of
rules must be followed — these rules are known as protocols. The
internet uses many different protocols; without these rules, different
devices would have no way of communicating with each other.
2. Network protocols are organized as a sequence of layers through which
the data is passed. The sequence of layers can be visualized as sitting
on top of each other to form a stack. This is called a protocol stack.
3. The TCP/IP network protocol stack is the stack that is used on the
Internet. It is divided up into four layers that sit one on top of the other.
Some literature divides the bottom layer into two, creating a five layer
model.
Presentation title 53

MODEM
1. A modem is used to modulate the electrical signal, i.e. to change the
signal so that it can be sent through a cable that uses a different
technology.
2. Historically, modems were used to modulate the digital electrical signals
coming from computer systems so that they could be transmitted over
telephone wires in an analogue form.
3. These were superseded by ADSL modems, which connected to the same
telephone lines but used new electronics at the exchange of data.
Presentation title 54

MODEM
THANK YOU

You might also like