Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
15 views

What Is A Network

A network connects computers and devices together to share resources and transfer data. The main types of networks are local area networks (LANs) within a building, and wide area networks (WANs) connecting multiple LANs over larger distances. Common networking technologies include Ethernet for LANs using cables, and virtual private networks (VPNs) using encryption over the public internet for WANs. Different network topologies like star, ring and bus define the physical layout of connected devices.

Uploaded by

Isaac Flint
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

What Is A Network

A network connects computers and devices together to share resources and transfer data. The main types of networks are local area networks (LANs) within a building, and wide area networks (WANs) connecting multiple LANs over larger distances. Common networking technologies include Ethernet for LANs using cables, and virtual private networks (VPNs) using encryption over the public internet for WANs. Different network topologies like star, ring and bus define the physical layout of connected devices.

Uploaded by

Isaac Flint
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Networking Systems

Information and Software Technology


What is a network?

• A network is a number of computers and their peripheral devices


connected together in some way.

• The Internet is a connected set of networks that links millions of


computers.

• The role of a network is to transfer data from one location to another.


Why use a network?

• Data stored on one computer can be obtained by people using


other computers, often thousands of kilometres away.

• The power of one computer is not restricted to one room, but can be
made available anywhere.

• Video Games
Advantages

• Networks enable users to share peripheral devices such as printers,


hard disks and Internet access - reduces costs and allows more
people to access the equipment.

• Networks may enable users to share applications through a site


licence or network licence. Network licences cost less per user than
purchasing multiple copies of the software. Faster and easier to
install or update the network software.
• Networks provide a very fast method for sharing and transferring
files.

• Data stored on a file server can be accessed from any computer on


the network increasing efficiency and productivity.

• Networks secure files by restricting access to authorised users.

• The entire network can be backed up on a regular basis, it is not


dependent on users backing up their files.

• Firewalls can be used to protect data on the network from hackers.


Disadvantages
• The initial costs of network installation can be significant. Servers,
network devices, cables and network software can be expensive.

• A technician or team of technicians is usually required for installation


and this adds to the cost.

• Maintenance of a network requires considerable time and expertise


(network administrator).

• When the server ‘goes down’ the entire network may not operate,
users may not have access to files and applications - loss of
productivity can be significant.
• In some networks (ring topology) a broken cable can stop the entire
network.

• Networks are targets for hackers and viruses- the files stored on a
network can be accessed, stolen and edited more easily than files
stored on an individual computer.

• A virus that enters the network can spread to every computer on the
network - appropriate procedures need to be implemented to
maintain security.
Protocols
• A protocol is a set of rules that
governs the transfer of data between
computers.

• A protocol defines how a link is


established, how data is transmitted
and how errors are detected and
corrected.

• When the same protocols are used,


different types of computers and
devices can communicate with each
other.
Research Task
• Research the following network protocols: TCP/IP, IPX/SPX, NetBEUI
and AppleTalk.

• What does each acronym stand for?

• When and where are each of these protocols used?

• Outline an advantage and disadvantage of each protocol.

• Which of these protocols are still in use today?

• Why do you think some of these protocols have been discontinued?


• TCP/IP (Transmission Control Protocol/Internet Protocol) is a standard for data
transmission and error detection across the Internet. The TCP standards
inform the receiving computer what is inside the data packet and the IP
standard tells the computer where and how to send the data packet.

• IPX/SPX (Internetwork Packet Exchange/ Sequenced Packet Exchange) is a


standard used for data transmission in local area networks (LAN) that use the
Novell NetWare operating system (discontinued in 2009).

• NetBEUI (NetBios Extended User Interface) is a standard used for data


transmission in local area networks in versions of Windows prior to Windows 7.

• AppleTalk is a set of local area network standards for Apple Macintosh


computers. It was built into all Apple computers and Apple laser printers.
Data Transmission

• All data on a network is transferred using a data transmission mode,


a data transmission rate and a data transmission medium.
Data Transmission Modes

• The data transmission mode describes the direction of data flow.

• It is either simplex, half duplex or full duplex.


Simplex Half Duplex Full Duplex

Direction

Simultaneous

Examples
Simplex Half Duplex Full Duplex

Direction One way Both ways Both ways

No, only ever No, one way at a Yes, both ways,


Simultaneous
one way. time. all the time.

Radio or Telephone, most


Walkie Talkie or
Examples television computer
intercom.
broadcast. communication.
Data Transmission Rates
• Data transmission rate is the speed of data transfer.

• It is measured by the number of bits per second or its baud rate.

• Bits per second (bps)—the number of bits transmitted in one second.

• Common units of measurement for transmission speed are kilobits


(Kbps), megabits (Mbps), gigabits (Gbps) or terabits (Tbps) per
second.

• Bits per second is also called the bit rate.


• Baud rate—the maximum number of electrical signals transmitted in one
second.

• It is different to bits per second as an electrical signal can contain more


than one bit of data.

• For example, a 2400 baud might transmit at 4800 bps. Here one electrical
signal is roughly equal to two bits.

• The speed of data transmission is determined by the device and the


bandwidth.

• The bandwidth is the quantity of information that can be sent through a


transmission medium.
Data Transmission - Wired
• Wire transmission transfers the data through wires and cables.

• These cables must be protected from damage, they take up space


and can be difficult to install.

• However, wire transmission can carry large amounts of data with


little interference from other signals.

• Wire transmission includes twisted-pair cable, coaxial cable or


optical fibre cable.
Data Transmission - Wireless
• Wireless transmission moves the data through air and space.

• It does not need a fixed physical connection between the source and the
destination.

• Wireless networks allow devices to communicate using radio waves,


microwave and satellite.

• Wireless networks are installed without digging, drilling or running cables.

• However, wireless transmission transfers data at slower speeds and has


problems in maintaining signal quality compared to wire transmission.
Research Task
• Research and create a report on the following data transmission
media: twisted-pair cable, coaxial cable, optical fibre cable, radio
waves, microwave and satellite.

• Provide an explanation of where each of these methods are used and


their relative advantages and disadvantages.

• Provide an image (where possible) of the cable or equipment used


when networking with each system.

• What do you think is likely to happen in the future in reference to data


transmission media - wired, wireless, mixed etc?
Network Basics

• A network is a number of computers and their peripheral devices


connected together in some way.

• Each device on a network is called a node.

• There are networks of all shapes and sizes using wire or wireless
transmission.
LAN
• A local area network (LAN) is a network on one site, such as within a
building or group of buildings.

• A LAN is often a collection of computers and peripheral devices.

• LANs enable users to share resources and communicate with each


other more effectively.

• These tasks are completed using a network operating system (NOS).

• The physical arrangement of the devices on a LAN is called the


network topology.
• There are many possible network topologies, such as star, bus and
ring.
Research Task

• What are the comparative advantages and disadvantages of each of


the following network topologies?

• Ring, bus and star.

• What network topology is used at this school?

• Where and when have each of the listed network topologies been
used?
WAN
• A wide area network (WAN) is a network that covers a very large area.

• It is often made up of a collection of LANs.

• A WAN may use a private leased line, the normal telephone network or a combination
of both.

• A private leased line is dedicated to the network.

• It offers higher transmission speeds and more accurate transfer of data than those
available through the Public Switched Telephone Network (PSTN).

• PSTN links are relatively cheap if computers do not require constant connection.

• However, the link is not guaranteed and can be interrupted.


VPN
• A virtual private network (VPN) is a private network carrying encrypted data across the Internet.

• It uses the PSTN and the Internet to create an organisation’s network.

• A VPN aims to provide an organisation with the same capabilities as a LAN but at a much lower
cost.

• It uses encryption and other security measures to ensure only authorised users have access to
the VPN.

• Encryption is the process of coding data and decryption the process of changing it back.

• Data is coded, transmitted and then converted back to its original form.

• Encryption is used to prevent data from being intercepted during transmission and to maintain
the privacy of the VPN.
Research Task
• VPNs were once in the realm of large organisations, secretive
government departments and hackers. They have now become a
product that is commonly advertised to the average home user.

• What purpose would a home user have for the use of a VPN?

• Is the use of a VPN an admission of guilt in terms of illegal online


activity?

• How could governments and authorities manage illegal online


activity as the use of VPNs become more and more common?
• Home users often employ a VPN for the following purposes:

• To enable access to media from services like Netflix or BBC Player,


in countries where those services are blocked.

• To download media using torrents or Usenet and prevent tracking of


their illegal activity.

• They want to avoid government internet censorship e.g. China, NSA.


Components of Networks

• A server is a computer that provides resources to other computers


on the network.

• The server provides access to files, applications or peripheral


devices.

• There are different types of servers, such as the following:


• A file server is a controlling computer in a network that stores the
programs and data shared by users.

• A print server is a computer in a network that controls one or more


printers. If the printer is busy the data to be printed is stored in the
print server as a queue.

• A mail server is a computer in a network that provides email


facilities. It stores incoming mail for distribution to users and
forwards outgoing mail.
• A web server is a computer in a network that stores and distributes
web pages. When you browse the Internet you are travelling from
one web server to another.

• A workstation is a personal computer on a network. It has memory,


storage and processing capabilities. They access a server for files
and applications but process the data themselves.
• A hub is a central connecting device in a network. Each node is
connected directly to the hub. They receive a data packet from one
node and send that data packet to all nodes on the network.

• A switch is an intelligent hub that only sends data to a specific node.


The switch looks at the address of the data packet and sends it to
that address. A switch reduces the volume of traffic on a network
compared to a hub.
• A router is a very intelligent hub that directs (routes) data packets to
and from other networks. A router maintains a table of the available
routes and their conditions. It uses this table to determine the best
route for a given data packet. Routers are often used to connect to
the Internet.

• A bridge is a device to link two similar networks. It often connects


networks that use the same protocol such as Ethernet. A bridge
examines each data packet on a network and forwards any data
packets addressed to a connected network.
• A gateway is a link between two different types of networks. It
converts different protocols and transfers data between the two
networks. For example, a gateway could be used to convert a TCP/IP
packet to an IPX packet. A gateway acts as the door between the
networks. All the data must pass through the gateway to reach the
other network.

• A repeater is used to rebuild a fading signal to its original strength


and shape before transmitting it onwards. For example, the data sent
along a UTP cable becomes unreadable after about 100 metres. A
repeater would be installed every 100 metres to rebuild the signal. A
repeater ensures that the data is received as it was sent.
• A network interface card (NIC, pronounced ‘nick’) is an expansion
card that allows a device to be connected to a network. NICs are
installed into servers, workstations and some other devices. A NIC is
usually given a unique address so that it can be identified on the
network.
Device Image Usage/Key Feature
File Server
Print Server
Mail Server
Web Server
Workstation
Hub
Switch
Router
Bridge
Gateway
Repeater
NIC
Data Security
• Data security is a series of safeguards to protect data. There is a
range of security techniques that apply to networks:

• User identification is the ability to identify the user to the network and
to confirm their identity. A user is identified by entering a user ID and
confirms their identity by entering a valid password.

• Access controls restrict users those files and resources they need to
perform their job. When connecting to a network a certain level of
access is granted. This is done during a process of logging on.
• Data encryption is used to prevent data from being intercepted during
transmission. Encryption is the process of coding data and decryption the
process of changing it back. It is the most effective way to achieve data
security during the transmission of data. Data is coded, transmitted, and
then converted back to its original form.

• Firewalls are used on a network to check all incoming data for the purpose
of verification and authentication. A firewall aims to protect the network from
hackers trying to access sensitive information.

• Anti-virus software is used to scan the network for a range of well-known


viruses. There is no guarantee that antivirus programs will stop every virus,
as new viruses are always appearing. However, if the network uses the
latest virus definition files, problems will be minimised.
Research Task
• Data encryption is a critical component of modern networking.

• A Caesar Cipher is one of the simplest forms of encryption.

• Research how this encryption works and send a message to a


classmate.

• Can you find any problems or weaknesses with this encryption


method?

• How could these problems or weaknesses be overcome?


• Symmetric key algorithms use related or identical encryption keys
for both encryption and decryption.

• Alice puts her secret message in a box, and locks the box using a
padlock to which she has a key. She then sends the box to Bob
through regular mail. When Bob receives the box, he uses an
identical copy of Alice’s key (which he has somehow obtained
previously, maybe by a face-to-face meeting) to open the box and
read the message. Bob can then use the same padlock to send his
secret reply.

• What are some potential problems with this system?


• Asymmetric key algorithms use different keys for encryption and
decryption—this is usually referred to as Public-key Cryptography.

• First, Alice asks Bob to send his open padlock to her through regular
mail, keeping his key to himself. When Alice receives it she uses it to
lock a box containing her message and sends the locked box to Bob.
Bob can then unlock the box with his key and read the message from
Alice. To reply, Bob must similarly get Alice’s open padlock to lock the
box before sending it back to her.

• Bob and Alice never need to send a copy of their keys to each other.
This prevents a third party from copying a key while it is in transit,
compromising all future messages sent between Alice and Bob.
Client Server and Peer to Peer

• These are not to be confused with LANS and WANs or star, bus and
ring layouts.

• Instead, client server and peer to peer networks are more to do with
how files and data are stored on the network and how they are
accessed or retrieved by the person using the network.
Client-Server Network
• With a client server network the files will not be stored locally, instead they will be
stored on a specialised computer called a server.

• If you are using a client server network then you will have a user account and you
will have to log on with a user name and password.

• This is to identify you to the server so that it knows which files belong to you and
can then make them available to you.

• To allow security systems to check that you are actually who you say you are and
that the account belongs to you.

• The 'clients' rely on servers to do their job and fetch the files that the users require
and manage the tasks and peripherals that the user wants to access.
Client-Server Network
Advantages Disadvantages

All files are stored in a central A specialist network operating


location system is needed
Network peripherals are The server is expensive to
controlled centrally purchase
Backups and network security is Specialist staff such as a network
controlled centrally manager is needed
Users can access shared data If any part of the network fails a
which is centrally controlled lot of disruption can occur
Peer to Peer Networks
• This type of network is where two or more computers are connected
together without needing a file server to be part of the network.

• A peer to peer network can be as simple as two people in the same


room temporarily connecting their computers via a Universal Serial
Bus to enable them to transfer or share files directly with one
another.

• It can also include a more permanent network where say half-a-


dozen computers in a small office are connected together with
copper cables.
Peer to Peer Networks
• This type of network means that every PC, once connected to the
network is acting both as a server and a client. There is no need for
a special network operating system.

• Access rights to files, folders and data is controlled by setting the


sharing permissions on individual machines.

• Permissions can be set to allow complete access to every file, folder


and document stored on your system or just for particular things.
Peer to Peer Networks
Advantages Disadvantages

Because each computer might be being accessed by


No need for a network operating system others it can slow down the performance for the user

Does not need an expensive server because Files and folders cannot be centrally
individual workstations are used to access the
files
backed up
No need for specialist staff such as network technicians because Files and resources are not centrally organised into a specific 'shared
each user sets their own permissions as to which files they are area'. They are stored on individual computers and might be difficult to
willing to share. locate if the computer's owner doesn't have a logical filing system.

Much easier to set up than a client-server Ensuring that viruses are not introduced to the network
network - does not need specialist knowledge is the responsibility of each individual user

If one computer fails it will not disrupt any other part of


There is little or no security besides the permissions.
the network. It just means that those files aren't available
Users often don't need to log onto their workstations.
to other users at that time.

You might also like