[go: up one dir, main page]

0% found this document useful (0 votes)
15 views4 pages

4 Computer Networks Notes

Uploaded by

archanapatil9077
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

4 Computer Networks Notes

Uploaded by

archanapatil9077
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Computer Networks Chapter 4 1|Page

What is a Network?
A network is two or more computers, or other electronic devices, connected together so that they
can exchange data.
For example a network allows computers to share files, users to message each other, a whole room
of computers to share a single printer, etc.
Network connections between computers are typically created using cables (wires). However,
connections can be created using radio signals (wireless / wi-fi), telephone lines (and modems) or
even, for very long distances, via satellite links.

Why Use Networks?

Using a computer connected to a network allows us to…


• Easily share files and data
• Share resources such as printers and Internet connections
• Communicate with other network users (e-mail, instant messaging, video-conferencing, etc.)
• Store data centrally (using a file server) for ease of access and back-up
• Keep all of our settings centrally so we can use any workstation
In particular, if we use a computer connected to The Internet, we can…
• Make use of on-line services such as shopping (e-commerce) or banking
• Get access to a huge range of information for research
• Access different forms of entertainment (games, video, etc.)
• Join on-line communities (e.g. MySpace, Facebook, etc.)

Why Not Use Networks?

Using a computer connected to a network means that…


• The computer is vulnerable to hackers
• If the network breaks, many tasks become very difficult
• Your computer can more easily be attacked by a virus
In particular, if we use a computer connected to The Internet…
• We have to be careful about revealing personal information
• We have to be careful to avoid suspect websites that might contain malware
• We have to be aware that information found on The Internet is not always accurate or reliable

Computers in a Network

Clients
Client computers, or workstations, are the normal computers that people sit at to get their work done.
Servers
Servers are special, powerful computers that provide ‘services’ to the client computers on the
network.

These services might include:


• Providing a central, common file storage area
• Sharing hardware such as printers
• Controlling who can or can’t have access the network
• Sharing Internet connections
Computer Networks Chapter 4 2|Page
Networking Hardware

Network Interface Card (NIC): Any computer that is to be connected to a network, needs to have a
network interface card (NIC).Most modern computers have these devices built into the motherboard,
but in some computers you have to add an extra expansion card (small circuitboard)

Network Cable
To connect together different devices to make up a network, you need cables.

Cables are still used in most networks, rather than using only wireless, because they can carry much
more data per second, and are more secure (less open to hacking).
Hub
A hub is a device that connects a number of computers together to make a LAN.

The typical use of a hub is at the centre of a star network (or as part of a hybrid network) - the hub
has cables plugged into it from each computer.
A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the network. This
means that hub-based networks are not very secure - everyone can listen in to communications.
Switch
A switch, like a hub, is a device that connects a number of computers together to make a LAN.

The typical use of a switch is at the centre of a star network (or as part of a hybrid network) - the
switch has cables plugged into it from each computer.
A switch is a more ‘intelligent’ device than a hub: if it receives a message, it checks who it is addressed
to, and only sends it to that specific computer. Because of this, networks that use switches are more
secure than those that use hubs, but also a little more expensive.
Router
A router is a network device that connects together two or more networks.
A common use of a router is to join a home or business network (LAN) to the Internet (WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to
computers on the LAN.
Proxy Server
A proxy server is a computer setup to share a resource, usually an Internet connection.

Other computers can request a web


page via the proxy server. The proxy
server will then get the page using its
Internet connection, and pass it back to
the computer who asked for it.
Proxy servers are often used instead of
router since additional software can be
easily installed on the computer such as
anti-virus, web filtering etc.

Bridge
A bridge is a network device that typically links together two different parts of a LAN
Computer Networks Chapter 4 3|Page
Firewall
A firewall is a device, or a piece of
software that is placed between your
computer and the rest of the network
(where the hackers are!)
A firewall blocks unauthorised
connections being made to your
computer or LAN. Normal data is
allowed through the firewall (e.g. e-
mails or web pages) but all other data is
blocked.
Modem
Before the days of broadband Internet
connections, most computers connected to the
Internet via telephone lines (dial-up
connections).

The problem with using telephone lines is that


they are designed to carry voices, which are analogue signals. They are not designed for digital data.
The solution was to use a special device to join the digital computer to the analogue telephone line.
This device is known as a modem.A modem contains a DAC and an ADC.
What Can We Use the Internet For?
The Internet provides the network connections that links computers together. There are many ways
that we can use these connections:
• View web pages on the WWW (World-Wide Web)
• Sending and receiving e-mail messages
• Sharing files
• Communicating using voice (VOIP) and video (video-conferencing)
• Playing multi-player games
• Listening to streamed music or watching streamed video

Intranets: An intranet is the name given to a private network that provides similar services to The
Internet: e-mail, messaging, web pages, etc.

However, these services are only for the users of the intranet – they are private, not public (unlike
Internet services which are generally public).
Businesses and other organisations often have intranets for use by their employees.

Typical uses of an intranet would be:

• Viewing internal web pages (e.g. company calendars, etc.)


• Internal e-mail and instant-messaging between workers
• Sharing of internal documents.

As soon as your computer is connected to a network, you have to start thinking about security – security of
your files, information, etc.

A network allows a person who does to have physical access to your computer (they are not sitting in front of
it) to gain access all the same. If your computer is connected to a network, other people can connect to your
computer.
A person who gains unauthorised access to a computer system is often called a hacker.
Computer Networks Chapter 4 4|Page
Preventing Unauthorised Access
There are a number of security measures that you can take to prevent hackers accessing your computer and
all of the data stored on it:

Physical Security
The first thing to make sure of is that no unauthorised people can physically access (sit down in front of) any
of the computers on your network. For example, by keeping office doors locked.

Use a Username and Have a Good Password


The most common way to protect your computer’s data is to setup user accounts with usernames and
passwords. Anyone not having a username, or not knowing the correct password will be denied access.
For this to be effective passwords must be chosen that are not easy to guess. Passwords should be a random
combination of lowercase letters, uppercase letters and numbers (and symbols if this is allowed):

• ‘Weak’ passwords: password, 123456, david, 27dec1992


• ‘Strong’ passwords: s63gRdd1, G66ew$dQ, gdr298783X

Some computer systems replace the typing of usernames and passwords with other forms of user
identification such as ID cards, fingerprint readers, voice-print recognition, etc.
Always Install and Use a Firewall
A firewall is a device, or a piece of software that is placed between your computer / LAN and the rest of the
network / WAN (where the hackers are!)

You can read about firewalls in the Networking Hardware section.

Securing Your Data

Often we have data that is private or confidential. This data needs to be protected from being viewed by
unauthorised people. This is especially true if the data is to be sent via a public network such as The Internet.
The best way to protect data is to encrypt it.

Types of Network

Local Area Network (LAN) (refer text book)


Wireless Local Area Network (WLAN) (refer text book)
Wide Area Network (WAN) (refer text book)

Bluetooth (Personal Area Network)


Bluetooth is a wireless networking technology designed for
very short-range connections (typically just a few metres).

The idea of Bluetooth is to get rid of the need for all of those
cables (e.g. USB cables) that connect our computer to
peripheral devices such as printers, mice, keyboards, etc.

Bluetooth devices contain small, low-power radio


transmitters and receivers. When devices are in range of
other Bluetooth devices, they detect each other and can be 'paired' (connected).

You might also like