What Is A Network
What Is A Network
• The power of one computer is not restricted to one room, but can be
made available anywhere.
• Video Games
Advantages
• When the server ‘goes down’ the entire network may not operate,
users may not have access to files and applications - loss of
productivity can be significant.
• In some networks (ring topology) a broken cable can stop the entire
network.
• Networks are targets for hackers and viruses- the files stored on a
network can be accessed, stolen and edited more easily than files
stored on an individual computer.
• A virus that enters the network can spread to every computer on the
network - appropriate procedures need to be implemented to
maintain security.
Protocols
• A protocol is a set of rules that
governs the transfer of data between
computers.
Direction
Simultaneous
Examples
Simplex Half Duplex Full Duplex
• For example, a 2400 baud might transmit at 4800 bps. Here one electrical
signal is roughly equal to two bits.
• It does not need a fixed physical connection between the source and the
destination.
• There are networks of all shapes and sizes using wire or wireless
transmission.
LAN
• A local area network (LAN) is a network on one site, such as within a
building or group of buildings.
• Where and when have each of the listed network topologies been
used?
WAN
• A wide area network (WAN) is a network that covers a very large area.
• A WAN may use a private leased line, the normal telephone network or a combination
of both.
• It offers higher transmission speeds and more accurate transfer of data than those
available through the Public Switched Telephone Network (PSTN).
• PSTN links are relatively cheap if computers do not require constant connection.
• A VPN aims to provide an organisation with the same capabilities as a LAN but at a much lower
cost.
• It uses encryption and other security measures to ensure only authorised users have access to
the VPN.
• Encryption is the process of coding data and decryption the process of changing it back.
• Data is coded, transmitted and then converted back to its original form.
• Encryption is used to prevent data from being intercepted during transmission and to maintain
the privacy of the VPN.
Research Task
• VPNs were once in the realm of large organisations, secretive
government departments and hackers. They have now become a
product that is commonly advertised to the average home user.
• What purpose would a home user have for the use of a VPN?
• User identification is the ability to identify the user to the network and
to confirm their identity. A user is identified by entering a user ID and
confirms their identity by entering a valid password.
• Access controls restrict users those files and resources they need to
perform their job. When connecting to a network a certain level of
access is granted. This is done during a process of logging on.
• Data encryption is used to prevent data from being intercepted during
transmission. Encryption is the process of coding data and decryption the
process of changing it back. It is the most effective way to achieve data
security during the transmission of data. Data is coded, transmitted, and
then converted back to its original form.
• Firewalls are used on a network to check all incoming data for the purpose
of verification and authentication. A firewall aims to protect the network from
hackers trying to access sensitive information.
• Alice puts her secret message in a box, and locks the box using a
padlock to which she has a key. She then sends the box to Bob
through regular mail. When Bob receives the box, he uses an
identical copy of Alice’s key (which he has somehow obtained
previously, maybe by a face-to-face meeting) to open the box and
read the message. Bob can then use the same padlock to send his
secret reply.
• First, Alice asks Bob to send his open padlock to her through regular
mail, keeping his key to himself. When Alice receives it she uses it to
lock a box containing her message and sends the locked box to Bob.
Bob can then unlock the box with his key and read the message from
Alice. To reply, Bob must similarly get Alice’s open padlock to lock the
box before sending it back to her.
• Bob and Alice never need to send a copy of their keys to each other.
This prevents a third party from copying a key while it is in transit,
compromising all future messages sent between Alice and Bob.
Client Server and Peer to Peer
• These are not to be confused with LANS and WANs or star, bus and
ring layouts.
• Instead, client server and peer to peer networks are more to do with
how files and data are stored on the network and how they are
accessed or retrieved by the person using the network.
Client-Server Network
• With a client server network the files will not be stored locally, instead they will be
stored on a specialised computer called a server.
• If you are using a client server network then you will have a user account and you
will have to log on with a user name and password.
• This is to identify you to the server so that it knows which files belong to you and
can then make them available to you.
• To allow security systems to check that you are actually who you say you are and
that the account belongs to you.
• The 'clients' rely on servers to do their job and fetch the files that the users require
and manage the tasks and peripherals that the user wants to access.
Client-Server Network
Advantages Disadvantages
Does not need an expensive server because Files and folders cannot be centrally
individual workstations are used to access the
files
backed up
No need for specialist staff such as network technicians because Files and resources are not centrally organised into a specific 'shared
each user sets their own permissions as to which files they are area'. They are stored on individual computers and might be difficult to
willing to share. locate if the computer's owner doesn't have a logical filing system.
Much easier to set up than a client-server Ensuring that viruses are not introduced to the network
network - does not need specialist knowledge is the responsibility of each individual user