[go: up one dir, main page]

0% found this document useful (0 votes)
132 views3 pages

IGCSE Network Notes

The document provides an overview of computer networks, including types such as LAN, WAN, WLAN, and PAN, along with essential hardware like routers and switches. It discusses network topologies, advantages and disadvantages of networks, common protocols, and the differences between wired and wireless networks. Additionally, it covers network security threats and measures, as well as cloud computing and virtual networks.

Uploaded by

banyu.fidzuno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views3 pages

IGCSE Network Notes

The document provides an overview of computer networks, including types such as LAN, WAN, WLAN, and PAN, along with essential hardware like routers and switches. It discusses network topologies, advantages and disadvantages of networks, common protocols, and the differences between wired and wireless networks. Additionally, it covers network security threats and measures, as well as cloud computing and virtual networks.

Uploaded by

banyu.fidzuno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IGCSE Computer Science: Network Notes

1. Introduction to Networks
A network is a collection of computers and devices connected to share resources and communicate.

Types of Networks:
- LAN (Local Area Network): Covers a small area (e.g., home, school, office).
- WAN (Wide Area Network): Covers a large geographical area (e.g., the Internet).
- WLAN (Wireless LAN): Uses wireless technology (e.g., Wi-Fi) instead of cables.
- PAN (Personal Area Network): Used for personal devices (e.g., Bluetooth connections).

2. Network Hardware
Essential Hardware:
- Router: Directs data between networks and provides internet access.
- Switch: Connects devices within a LAN and efficiently directs data.
- Hub: Broadcasts data to all devices in a network (less efficient than a switch).
- Modem: Converts digital signals to analog for internet access.
- Network Interface Card (NIC): Allows a device to connect to a network.
- Access Point (AP): Enables wireless connections in a WLAN.

3. Network Topologies
Types of Network Structures:
- Bus: Single main cable; cost-effective but prone to failure.
- Star: Central switch/hub; reliable but requires more cables.
- Ring: Data moves in a loop; efficient but difficult to expand.
- Mesh: Every device is connected to others; highly reliable but expensive.

4. Advantages & Disadvantages of Networks


Advantages:
- Easy file and resource sharing.
- Centralized backups and security.
- Faster communication (e.g., emails, messaging).
- Shared internet access reduces cost.
Disadvantages:
- Security risks (e.g., hacking, viruses).
- Maintenance costs.
- Network failures can affect all connected devices.

5. Network Protocols
A protocol is a set of rules that govern data transmission.

Common Protocols:
- TCP/IP (Transmission Control Protocol/Internet Protocol): Basis of internet communication.
- HTTP/HTTPS (Hypertext Transfer Protocol/Secure): Used for web browsing.
- FTP (File Transfer Protocol): Transfers files over a network.
- POP3/IMAP/SMTP: Email communication protocols.
- Wi-Fi (IEEE 802.11): Wireless networking standard.

6. Wired vs Wireless Networks


Wired:
- More secure and reliable.
- Faster data transmission.
- Requires physical cables (less flexible).

Wireless:
- No cables needed, allowing mobility.
- Easier to expand.
- Can be less secure and slower.

7. Network Security
Security Threats:
- Hacking: Unauthorized access.
- Malware: Viruses, worms, spyware.
- Phishing: Fake emails/websites tricking users.
- Data interception: Unauthorized data access during transmission.
Security Measures:
- Firewalls: Block unauthorized access.
- Encryption: Secures transmitted data.
- Strong passwords & authentication: Prevents unauthorized access.
- Antivirus software: Detects and removes malware.
- Access control: Restricts user permissions.

8. Cloud Computing & Virtual Networks


Cloud Computing:
- Uses remote servers for storage and processing.
- Examples: Google Drive, Dropbox, Microsoft OneDrive.

Virtual Networks:
- Uses software to create separate network sections.
- Allows secure remote access (e.g., VPN).

You might also like