Professional Documents
Culture Documents
XENOTECH
AGENDA
LAN
WAN
PAN
CLIENT-SERVER
PEER TO PEER
Presentation title 3
LAN
1. The term local area network (LAN) is used to refer to a network that is
formed when devices in the same building or on a single site are
connected.
2. A network in your home, workplace, or school will be a LAN. Note that the
word 'local' doesn't refer to a specific geographical area, such as
neighborhood, city, or region.
Presentation title 4
LAN
Presentation title 5
LAN
1. The network shown above uses a central switch or hub, through which all
devices communicate.
2. In a larger organization such as your school or college, the LAN will be
far more sophisticated with multiple rooms and buildings interconnected.
3. One characteristic of a local area network is that the infrastructure
(cabling and network communication devices) will be owned and
maintained by the organization (or they may employ someone to do this
for them).
Presentation title 6
LAN
1. Each device on a network has a unique identifier, which is usually its IP
address.
2. The first part of this address is the network ID, which will be the same for
all of the devices on the network.
Presentation title 7
WAN
1. When two or more networks are connected across a large geographical
area, they form a wide area network (WAN).
2. There are many examples of WANs, such as a bank connecting all of its
cash machines together across the country, or regional police stations
connecting together to share information.
3. The largest example of a WAN is the internet.
Presentation title 8
WAN
Presentation title 9
PAN
1. A personal area network (PAN) is used to connect personal devices over
a very small area.
2. The most common technology used is Bluetooth, which uses short-range
radio signals, and limited transmission power, giving it a very short range
of up to 10 meters.
3. You will create a PAN when you connect a smart watch to a mobile
phone, or a wireless headset to your laptop.
Presentation title 10
PAN
Presentation title 11
CLIENT-SERVER
1. Client–server networks allow you to access your files and emails from
any authorized device.
2. Server based networks provide centralized control over network
resources including security.
3. The computers used for servers usually have faster CPUs, more memory
and larger hard drives.
4. Server operating systems are designed to handle multiple requests for
shared resources.
5. Valid username and password combinations can access network
resources.
Presentation title 12
CLIENT-SERVER
Presentation title 13
SERVER
A server is a program on a computer that shares resources with, or provides
services to, any authorized client. Most servers will run 24 hours a day, 7
days a week, so that a client can send a request for resources at any time.
There are many types of server:
•File servers store and provide files.
•Web servers store and provide webpages.
•Email servers store and forward emails. Some email servers filter out spam.
•Database servers store databases, run queries, and allow data to be
manipulated.
•Print servers provide printing services across the network and manage print
queues.
Presentation title 14
CLIENT
A client is a program that typically runs on a device used by an end-user
such as a laptop or mobile phone.
A client sends a request to the server. The server processes the request
and then sends a response back to the client.
For example, when you want to view a webpage, you will use a web browser
(which is a web client). The browser will request the page from a web server.
The server will send the page back to the browser and the page will be
displayed.
Presentation title 15
PEER TO PEER
1. In a peer-to-peer network, there are no central servers
2. Every computer can be configured to share its resources
3. Peers communicate directly with each other
4. In a peer-to-peer network, computers must be switched on to share
resources
Presentation title 16
PEER TO PEER
Presentation title 17
PEER TO PEER
VS
CLIENT SERVER
Setup cost Servers will need to be set No additional devices are
up and configured. These needed.
will generally be high-
performance computers
capable of supporting a
large number of users.
Physical security Servers can be located in On peer-to-peer networks,
secure rooms. They do not workstations may be at
need to be physically multiple different
accessible to every user. It locations, and are difficult
is easier to monitor a to oversee.
server room (e.g. by
CCTV) than to monitor
every device on the
network.
Presentation title 18
PEER TO PEER
VS
CLIENT SERVER
Backups Most important files are In a peer-to-peer network,
stored on servers. It is individual users are likely
therefore much easier to to be responsible for
make sure that all of backing up their own
these files are backed up. data.
QUIZ
Which one of the below statements is correct for the client–server networking
model?
a) A server can perform backup of data only if all the clients in the
network are switched on.
b) A server requests services to clients in order to process and display
their responses.
c) If the server is unable to provide a response the clients exchange
data directly with each other.
d) There can be different types of server with each type offering a
particular service.
Presentation title 20
QUIZ
Which one of the following statements is correct in relation to the peer-to-peer
networking model?
QUIZ
Below are statements that highlight some of the differences between client–server and
peer-to-peer networking. Pick one statement that is not correct.
WIRED NETWORK
1. A typical wired network will comprise a range of devices that are
connected through a network Switch. Each device will be connected to
the switch by a cable. Many switches can be joined together to form a
larger network.
2. Most devices are cabled into switches using UTP cables. This type of
cable is usually resilient to interference.
WIRELESS
NETWORK
1. A typical wireless local area network (WLAN) is based around a central
communications device called a wireless access point (WAP)
2. The range of a typical wireless network operating on the 2.4GHz band is
around 50m indoors, but this will depend on the properties of the building
such as wall thickness.
3. An open network is one that has been configured so that a password
(key) is not required. Open networks are not secure because your data
may not be encrypted
Presentation title 25
WIRED &WIRELESS
NETWORK
Speed Wired connections are As well as interference, most
usually faster than wireless wireless transmissions are
connections. Signals carried encrypted. This introduces a
over cables are less processing delay.
susceptible to interference so
there are fewer errors.
WIRED &WIRELESS
NETWORK
Range The range of a wired The range of a wireless
network is greater than network may be restricted
wireless. Copper cable will because signals can be
reliably carry signals for up obstructed by thick walls
to 100m. Fibre optic cables and other obstacles.
are capable of carrying
network signals over
distances of 100km or more.
WIRED &WIRELESS
NETWORK
Cost Wired networks can be More than one wireless
expensive to set up. Routers access point may be needed
or switches are required. if the building is large or
uses materials that block
mobile signals.
Presentation title 28
WIFI
1. Wi-Fi is a trademark of the Wi-Fi Alliance. This organization grants
certification to products that meet the Wi-Fi standard.
2. This ensures that products from different manufacturers can
communicate with each other.
3. Wireless networks use a specific range of radio wave frequencies (the
frequency band) to transmit data. Most WLAN devices will be dual-
band and will operate on:
• 2.4GHz
• 5.0GHz
Presentation title 29
ETHERNET
1. Ethernet is a standard that refers to a family of wired computer
networking technologies and protocols that are commonly used in local
area networks.
2. The standard is developed and maintained by the Institute of Electrical
and Electronics Engineers (IEEE).
3. Physical connections are made between computer devices and/or
infrastructure devices (hubs, switches, routers) using copper or fiber optic
cable. The specification of the cable will make a difference to the speeds
that can be achieved on the network.
Presentation title 30
BLUETOOTH
1. Bluetooth is a standard that is used for networks that exchange data over
very short distances.
2. The central device in a Bluetooth network can communicate with up to
seven other devices over a typical distance of 10m.
3. Bluetooth is designed to use very little power.
4. Bluetooth is widely used to connect devices on a personal area network
Presentation title 31
HUB
Presentation title 33
SWITCH
Presentation title 34
DIFFERENCES
Presentation title 35
ROUTER
1. Where communication happens between two separate networks, a
router is required to connect the networks.
2. On the wider internet, core routers are used to forward packets to their
destination along the backbone of the internet. These routers examine
the destination of each packet and consult a routing table of known
networks.
3. The table indicates which connection is best to use to send the packet
towards its intended destination.
Presentation title 36
ROUTER
Presentation title 37
MULTI FUNCTION
DEVICE
1. Internet service providers usually supply a network access device to
domestic customers, making it as simple as possible to connect home
devices to the internet. Confusingly, network access devices are known
by a variety of names, e.g. home hub or broadband hub. Many people
just refer to them as "the router".
MULTI FUNCTION
DEVICE
Presentation title 39
MULTI FUNCTION
DEVICE
1. Network access devices can also control access to a network using the
MAC addresses of the devices that are trying to connect to that network.
2. A list of approved devices is maintained on the network access device,
and the access device will only allow connections from devices with
approved MAC addresses.
3. If a device has a MAC address that isn't listed and it attempts to connect
to the access device, the access device will deny the connection.
Presentation title 40
NETWORK
INTERFACE CARD
1. A network interface controller (NIC) is a hardware device that is used to
connect a device to a network.
2. Communicating across a network requires electronic digital data to be
transferred between points. The NIC converts the data that is to be sent
into appropriate signals that can be carried across the medium:
• In a wired network, these signals will be voltages through a wire, or
pulses of light through a fiber
• In a wireless network, the signals will be modulated radio waves
Presentation title 41
NETWORK
INTERFACE CARD
Presentation title 42
NETWORK
INTERFACE CARD
1. The NIC in the sending device is responsible for converting digital data
into these signals. At the receiving end, the NIC will receive the signals
and convert them back into the corresponding digital data.
2. Network interface controllers are sometimes also referred to as network
interface cards. This stems from the fact that in the past, the controller
might have been a separate hardware device that would have been
plugged into an expansion slot on the motherboard, rather than being an
integrated component.
3. Each NIC has a unique identifier called a Media Access Control (MAC)
address. It is 48 bits long, and is usually referred to in hexadecimal
notation, for example: cd:f1:24:e4:89:a1. The MAC address is allocated
by the manufacturer and cannot be changed.
Presentation title 43
ACCESS POINT
ACCESS POINT
Presentation title 45
QUIZ
A --------------------repeats messages to all connected devices on a network.
This is inefficient because it sends data to places other than its intended
destination.
A -------------------- only sends a message to its intended device on a network.
Presentation title 46
QUIZ
Which of the following is not a component that is used to communicate
across a local area network?
a) UTP (Ethernet) cable
b) Wireless NIC
c) Switch
d) Modem
Presentation title 47
QUIZ
A large company with offices in different cities has many interconnected
networks. There is a hardware fault on one of the office networks that means
that none of the computers on one network can communicate with each
other. Devices on other networks can still communicate with each other.
Which is the most likely hardware fault?
a) The modem has broken.
b) The NICs have lost their configuration settings.
c) A switch connecting computers in the affected office has broken.
d) The router in the affected office has been switched office
Presentation title 48
QUIZ
Which network hardware device has a unique identifier called a media
access control (MAC) address?
a) Network interface controller (NIC)
b) Router
c) Hub
Presentation title 49
QUIZ
An international fashion brand with shops and offices in different cities has
many interconnected networks. In one of the offices there is a hardware fault
and none of the computers can communicate with each other. Devices in
other shops and offices can still communicate with each other. Which option
is the most likely hardware fault?
a) A switch connecting computers in the affected office has broken.
b) The router in the affected office has been switched off.
c) The modem has broken.
d) The NICs have lost their configuration settings.
Presentation title 50
QUIZ
An internet ---------------will often supply a network access device, also known
as a ---------------. Part of this device will incorporate a --------------- to connect
to the internet.
a) Router
b) Home Hub
c) Internet Service Provider
Presentation title 51
TCP/IP
1. When network connected devices communicate with each other, a set of
rules must be followed — these rules are known as protocols. The
internet uses many different protocols; without these rules, different
devices would have no way of communicating with each other.
2. Network protocols are organized as a sequence of layers through which
the data is passed. The sequence of layers can be visualized as sitting
on top of each other to form a stack. This is called a protocol stack.
3. The TCP/IP network protocol stack is the stack that is used on the
Internet. It is divided up into four layers that sit one on top of the other.
Some literature divides the bottom layer into two, creating a five layer
model.
Presentation title 52
TCP/IP
1. When network connected devices communicate with each other, a set of
rules must be followed — these rules are known as protocols. The
internet uses many different protocols; without these rules, different
devices would have no way of communicating with each other.
2. Network protocols are organized as a sequence of layers through which
the data is passed. The sequence of layers can be visualized as sitting
on top of each other to form a stack. This is called a protocol stack.
3. The TCP/IP network protocol stack is the stack that is used on the
Internet. It is divided up into four layers that sit one on top of the other.
Some literature divides the bottom layer into two, creating a five layer
model.
Presentation title 53
MODEM
1. A modem is used to modulate the electrical signal, i.e. to change the
signal so that it can be sent through a cable that uses a different
technology.
2. Historically, modems were used to modulate the digital electrical signals
coming from computer systems so that they could be transmitted over
telephone wires in an analogue form.
3. These were superseded by ADSL modems, which connected to the same
telephone lines but used new electronics at the exchange of data.
Presentation title 54
MODEM
THANK YOU