Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
31 views

Lesson 3 Computer Networks

Uploaded by

Maricris
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Lesson 3 Computer Networks

Uploaded by

Maricris
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 62

Compute

r
NetworksLesson 3
Florliza M. Nastor
Topics

01 02
Introduction to
Network
Computer
Hardware
Networks

03 04
World Wide Web Network Security and
Business Implications
01
Introduction to
Computer
Networks
Computer Network
● is a system that connects two or
more computing devices for
transmitting and sharing
information. Computing devices
include everything from a mobile
phone to a server. These devices
are connected using physical
wires such as fiber optics, but
they can also be wireless.
Computer Network
● A system of interconnected devices that can communicate and share
resources (such as data, files, printers, and internet access) with each
other. These devices can include computers, servers, smartphones,
printers, and other electronic devices.

● The key purpose of a computer network is to enable communication


and resource sharing among these devices.
ARPANET (Advanced Research Projects
Agency Network)
● First computer network

● Developed in the late 1960s by the US Department of Defense's Advanced Research


Projects Agency (ARPA), now known as DARPA.

● It was designed as a communication system to allow researchers at various


universities and military institutions to share information efficiently and securely.

● ARPANET introduced the concept of packet switching, which breaks data into small
packets before transmitting it, then reassembles the packets at the destination. This
was a revolutionary method for transmitting data and is still used in modern
networking, including the internet.
Example of Computer Network
Home Wi-Fi Network
 A variety of devices like laptops, smartphones, smart TVs, tablets, printers, and
smart home devices (like thermostats or cameras) are connected.
 The central device, called a router, connects all these devices to the internet. It
receives data from the internet and distributes it to each device.
 Most devices are connected wirelessly via Wi-Fi, but some, like desktops or gaming
consoles, might use Ethernet cables for a more stable connection.
 Devices can share files with each other, such as sharing documents from a computer
to a printer, or streaming videos from a laptop to a smart TV.
 All devices share the same internet connection provided by the router.

This is a typical small-scale network designed to facilitate resource sharing and


communication within a home environment.
Example of Computer Network
Home Wi-Fi Network
 A variety of devices like laptops, smartphones, smart TVs, tablets, printers, and
smart home devices (like thermostats or cameras) are connected.
 The central device, called a router, connects all these devices to the internet. It
receives data from the internet and distributes it to each device.
 Most devices are connected wirelessly via Wi-Fi, but some, like desktops or gaming
consoles, might use Ethernet cables for a more stable connection.
 Devices can share files with each other, such as sharing documents from a computer
to a printer, or streaming videos from a laptop to a smart TV.
 All devices share the same internet connection provided by the router.

This is a typical small-scale network designed to facilitate resource sharing and


communication within a home environment.
Computer networks serve various purposes,
including:
●Resource Sharing: Users on a network can share hardware
resources (e.g., printers, storage devices) and software
resources (e.g., applications and databases).
● Communication: Networks enable communication through
email, messaging, video conferencing, and social media.
● Data Transfer: They allow the transfer of data and files
between devices, whether locally or globally.
● Internet Access: Networks provide access to the internet,
enabling users to browse websites and access online
services.
Components of Computer Network
● Nodes: Devices like computers, printers, and smartphones
that are connected to the network.
● Router: Directs traffic between different networks and
allows multiple devices to share a single internet connection.
● Switch: Connects multiple devices within a LAN and ensures
that data reaches its intended destination.
● Links: Links refer to the physical or wireless connections
between nodes. They can be wired (e.g., Ethernet cables) or
wireless (e.g., Wi-Fi).
Components of Computer Network
● Network Interface Cards (NICs): NICs are hardware
components that allow devices to connect to the network.
● Network Cables: Physical connections between devices in a
wired network.
● Wireless Access Points (WAP): Allows wireless devices to
connect to the network.
Types of Connections
● Wired: Using cables (like Ethernet) to physically connect
devices.

● Wireless: Uses radio waves (like Wi-Fi) to connect devices


without physical cables.
Types of Computer Networks
● PAN
● LAN
● WAN
● CAN
● MAN
● SAN
● WLAN

Note: watch the video for description of each


networks
Protocols
● are a set of rules and conventions that devices on a network
follow to communicate effectively. Examples include TCP/IP
(Transmission Control Protocol/Internet Protocol) for
internet communication and HTTP (Hypertext Transfer
Protocol) for web browsing.
● These protocols ensure that devices from different
manufacturers or systems can communicate with each
other effectively. Without network protocols, data exchange
between computers and other devices would be chaotic and
inefficient.
Network Topology
● refers to the arrangement or layout of various
elements (links, nodes, devices) in a computer
network. It defines how devices are connected and
how data is transmitted between them. Network
topology plays a critical role in network performance,
reliability, and scalability.
Common Network Topology
● Bus
● Star
● Ring
● Mesh
● Hybrid
● Tree
● Point to Point
● Fully Connected
BUS Topology
● All devices are connected to a single
central cable (called a bus). Data is
transmitted along this central bus, and
each device listens for messages
addressed to it.
● It's simple and cost-effective but can be
problematic if the central cable fails
because the entire network can be
affected. Performance degrades as more
devices are added.
● Example: Used in early Ethernet networks
and small home or office networks.
Star Topology
● All devices are connected to a central
device, such as a switch or hub. Data is
sent from the device to the central hub,
which then forwards it to the destination
device.
● It's easy to set up, and if one
cable or device fails, it doesn't
usually affect the rest of the
network. Adding new devices is simple and
doesn’t disrupt the network.

● Example: Commonly used in home networks


and small to medium-sized business networks.
Ring Topology
● Devices are connected in a circular fashion, where
each device is connected to two other devices,
forming a ring. Data travels in one direction, and
each device processes and forwards the data until
it reaches its destination.
● Equal access to the network for all devices. Easy to
predict data traffic. Failure of a single device can
disrupt the entire network. Troubleshooting can be
challenging. Performance decreases as the number
of devices increases.
● Example: Used in some types of LANs and older
Token Ring networks.
Mesh Topology
● Every device is connected to every other device,
either directly or indirectly. Data can be
transmitted through multiple paths, providing high
redundancy and reliability.
● Extremely reliable; failure of one link doesn’t affect
the entire network. High redundancy and fault
tolerance. Complex to set up and manage.
Requires a lot of cabling and can be expensive

● Example: Used in large-scale, high-reliability


networks like data centers and military
communication systems.
Hybrid Topology
● Hybrid topologies combine two or
more of the above basic topologies to
create a network that suits specific
needs.

● For example, a network might use a


star topology in one office and a ring
topology in another, connected via a
router.
Tree Topology
● Also known as a hierarchical topology, it
combines characteristics of a star and bus
topology.

● Devices are organized into layers or levels,


with a central hub connecting multiple star-
configured networks.

● This topology is often seen in large-scale


networks like those of corporations or
universities.
Point-to-Point Topology
● In a point-to-point topology,
there's a direct link between
two devices, such as two
routers or two computers.

● It's commonly used in WAN


(Wide Area Network)
connections and dedicated
communication links.
Fully Connected Topology
● In a fully connected topology, every
device is directly connected to every
other device.

● This is the most redundant and fault-


tolerant topology but is impractical
for large networks due to the high
number of connections required.
02
Network Hardware
Network Hardware

●It consists of the physical devices required to


set up and manage a computer network. These
devices allow computers, servers, and other
networked devices to communicate, share data,
and access resources.
Router
 Function: A router directs data
packets between different
networks (e.g., between a home
network and the internet).
 Purpose: Connects multiple
devices to the internet and directs
network traffic.
 Example: Home Wi-Fi routers
connect devices like phones and
laptops to the internet.
Switch
 Function: A switch connects multiple
devices within a Local Area Network (LAN)
and ensures that data is sent to the
correct destination within the network.
 Purpose: Efficiently manages
communication between devices by
reducing unnecessary data transmission.
 Example: Used in offices or home
networks to connect computers, printers,
and servers.
Modem
 Function: Converts digital signals from a computer
into analog signals for transmission over telephone or
cable lines, and vice versa.
 Purpose: Provides access to the internet by connecting
your local network to your Internet Service Provider
(ISP).
 Types:
o DSL Modem: Uses phone lines for data
transmission.
o Cable Modem: Uses cable lines for data
transmission.
 Example: The device provided by your ISP for internet
access.
Network Interface Card (NIC)
 Function: A hardware component that
allows a computer or other device to
connect to a network.

 Purpose: Provides physical access to a


network and is responsible for
transmitting and receiving data.

 Example: Found in desktops, laptops,


servers, and some printers.
Access Point (AP)
 Function: An access point allows
wireless devices to connect to a wired
network using Wi-Fi.

 Purpose: Extends the range of a


wireless network and allows wireless
devices to connect.

 Example: Used in homes, offices, and


public places like airports or cafes to
provide Wi-Fi access.
Hub
 Function: A basic networking device that
connects multiple devices in a LAN and
broadcasts data to all connected devices.

 Purpose: Acts as a simple connection point


for network devices, though it lacks
efficiency in managing data transmission.

 Example: Mostly used in small, older


networks.
Firewall
 Function: A device or software that
monitors and controls incoming and
outgoing network traffic based on
predefined security rules.

 Purpose: Protects the network from


unauthorized access and potential threats
such as malware or hacking attempts.

 Example: Hardware firewalls are often part


of routers; software firewalls are installed
on individual devices.
Cables
 Function: Physical media used to connect network devices.
 Types:
o Twisted Pair (Ethernet): Commonly used in LANs for
wired connections.
o Coaxial Cable: Used for older network setups and cable
TV.
o Fiber Optic Cable: Transmits data as light signals for long
distances and high-speed connections.
 Purpose: Transmits data between devices in a network.
 Example: Ethernet cables (Cat5, Cat6) are used for wired
network connections.
Cables
03
World Wide Web
World Wide Web
 Often referred to as the "Web" or "WWW," is a global information
system that provides a vast and interconnected collection of
documents, multimedia content, and services accessible via the
internet. It has transformed the way people access and share
information, conduct business, communicate, and interact with
digital content.

 The World Wide Web was created by Sir Tim Berners-Lee, a British
computer scientist, in 1989 while working at CERN, the European
Organization for Nuclear Research. It was originally conceived as a
way for scientists to share research documents and findings.
Key components of the World Wide
Web
●Web Browsers
●Web Pages
●Websites
●Hyperlinks
●URL
●Web Servers
Web Browsers
 Software applications that allow users to
access and display web pages.

 Some popular web browsers include Google


Chrome, Mozilla Firefox, Microsoft Edge, and
Apple Safari.
Web Pages
● A web page is a single document on the internet, which can
contain text, images, videos, and other multimedia content.

● It is written in HTML (HyperText Markup Language) and can be


accessed using a web browser (like Chrome or Firefox) through a
specific URL.

● Each web page is part of a website and is often connected to other


pages via hyperlinks.
Websites
● A website is a collection of related web pages grouped together under a
single domain name (e.g., www.google.com).

● It often serves a broader purpose or function and can have multiple web
pages linked together, such as a homepage, contact page, about page, etc.

● Websites are often categorized by their purpose (e.g., news websites, e-


commerce websites, educational websites).

● Example: Google is a website, and its search results, Gmail, and other
services are individual web pages within the Google website.
Hyperlinks
●Hyperlinks, often referred to simply as "links," are
clickable elements within web pages that connect
one web page to another. They are the foundation
of the web's interconnected structure, allowing
users to navigate between pages and websites.
Uniform Resource Locator (URL)
●URLs are web addresses that specify the location of
a web resource on the internet.
Example https://www.example.com/about
●Here's how it breaks down:
 https: The protocol used (HyperText Transfer Protocol Secure).
 www.example.com: The domain name, which points to the website's
server.
 /about: The specific path to a web page within the website (in this case,
the "About" page).
Web Servers
●Are specialized computers or software that
store and deliver web content to users' web
browsers upon request. When a user enters a
URL or clicks a link, their browser sends a
request to a web server, which then sends back
the requested web page.
Web 2.0 and Social Media
●The term "Web 2.0" describes a shift in web
usage characterized by user-generated content,
interactivity, and social networking. Social
media platforms like Facebook, Twitter, and
Instagram are prominent examples of Web 2.0
technologies.
E-Commerce
●The Web has revolutionized commerce,
allowing businesses to sell products and
services online through e-commerce platforms
and digital payment systems.
Mobile Web
●The proliferation of smartphones and tablets
has led to the growth of the mobile web, where
websites and web applications are optimized for
mobile devices.
Mobile Web
●The proliferation of smartphones and tablets
has led to the growth of the mobile web, where
websites and web applications are optimized for
mobile devices.
04
Network Security
and Business
Implications
Network Security and Business
Implications
●Network security is a critical aspect of
modern business operations, and its
implications extend far beyond just
protecting data and systems. It plays a
central role in ensuring business
continuity, safeguarding reputation,
complying with regulations, and
supporting innovation.
Data Protection and Privacy
● Implication: Ensuring the security and privacy of
sensitive data is a top priority. Data breaches can
lead to legal consequences, financial losses, and
damage to a company's reputation.

● Business Impact: Data breaches can result in


fines, lawsuits, loss of customer trust, and
diminished market value.
Business Continuity
● Implication: Network security helps prevent
disruptions caused by cyberattacks or system
failures. Unplanned downtime can lead to lost
revenue and productivity.

● Business Impact: A secure network reduces the


risk of downtime and minimizes the financial
losses associated with it.
Regulatory Compliance
● Implication: Many industries are subject to
regulations requiring the protection of sensitive
data. Network security is essential for meeting
compliance requirements.

● Business Impact: Non-compliance can result in


severe penalties, legal actions, and damage to a
company's reputation.
Reputation Management
● Implication: A data breach or security incident can
tarnish a company's reputation. Trust is crucial in
business, and customers and partners expect their
data to be protected.

● Business Impact: A damaged reputation can lead


to customer attrition, difficulty attracting new
customers, and strained relationships with
partners.
Competitive Advantage
●Implication: Companies with strong network
security measures in place can use security as
a selling point and gain a competitive edge.

●Business Impact: A reputation for security can


attract customers and partners concerned
about data protection.
Intellectual Property Protection
● Implication: Intellectual property (IP) is a valuable
asset for many businesses. Network security
safeguards IP from theft or unauthorized access.

● Business Impact: Unauthorized access to IP can


result in loss of competitive advantage and
potential legal actions.
Innovation and Digital
Transformation
● Implication: As businesses embrace digital
transformation, network security is vital for
protecting new technologies, IoT devices, and
cloud-based solutions.

● Business Impact: A secure environment


encourages innovation, allowing businesses to
explore new technologies with confidence.
Supply Chain Security
● Implication: Supply chains are interconnected,
and weak security in one part can affect the entire
chain. Ensuring suppliers have robust security
measures is crucial.

● Business Impact: Supply chain disruptions due to


security incidents can lead to production delays
and increased costs.
Cost Management
● Implication: While implementing strong security
measures incurs costs, the cost of not having
security can be much higher due to potential data
breaches or cyberattacks.

● Business Impact: Proactive security measures can


help control long-term costs associated with
cybersecurity incidents.
Incident Response and Recovery
●Implication: Having an incident response plan
is essential. Rapid response and recovery can
mitigate the damage from a security breach.

●Business Impact: Efficient incident response


can reduce the overall impact of a security
incident.
●Network security is not just a technical issue
but a critical business concern that directly
affects a company's bottom line, reputation,
and ability to remain competitive. Businesses
that invest in strong network security
measures can protect themselves against
potential risks while ensuring smooth and
secure operations.
Thanks
Do you have any questions?
youremail@freepik.com
+91 620 421 838
yourwebsite.com

CREDITS: This presentation template


was created by Slidesgo, including
icons by Flaticon and infographics &
images by Freepik
Please keep this slide for attribution

You might also like