Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
434 views13 pages

ICT Chapter4 Networks Notes

source: IGCSE ICT NOTES

Uploaded by

faryal khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
434 views13 pages

ICT Chapter4 Networks Notes

source: IGCSE ICT NOTES

Uploaded by

faryal khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
What is a Network? [A network is two oF more computers, or other electronic devices, [A computer thal is nat connected Io ‘connected topether so that they can exchange data. ‘2 netorkis knovn 3s 8 standalon computer Fer example 2 network alos computers to share files, users to ‘message cach ther, a whole room of computers to share a single printer, etc Network connections between computers are typically crested using ‘cables (res). However. connections can be crested using radio signals (wireless / wi, telephone lines (and modems) or even, for very long distances, va satellite inks, Why Use Networks? Using a computer connected to a network allows us to. + Easily share files and data ‘+ Share resourees such as printers and Internet connections ‘© Communicate with other network users (e-mail instant messaaing vyideo-canferencing, etc ) ‘+ Store data centrally (using a fle serve) for ease of access and back-up + Keep al of our setings centrally 50 we can use any workstation In paticular,f we use a computer connected to The ntemet, we can + Make use of online services such 3 shopping (¢-commerce) or banking + Get accesso a huge range of information for research + Access diferent forms of entertainment (games, video, tc) + Join online communities (¢ 9. MySpace, Facebook ec.) Why Not Use Networks? Using a computer connected to a network means that. + The computer is vulnerable to hackers « Ifthe network breaks, many tasks become very difficult + Your computer can more easily be attacked by a virus In particular, if we use a computer connected to The intemet + We have to be careful about revealing personal information = We have to be careful to avoid suspect websites that might contain malware + We have to be aware that information found on The Intemet is not always accurate or reliable Computers in a Network Computers connected together to create a network falll into two categories: servers and clients (workstations). Clients Client computers, or workstations, are the normal computers that people sit at to get their work done. Servers Servers are special, powerful computers that provide ‘services’ to the client computers on the network. ‘These services might include: * Providing 2 central, common file storage area + Sharing hardware such as printers * Controlling who can or can't have access the network + Sharing Internet connections Servers are built to be very reliable. This means that they are much more expen: re that normal computers. in a small network one server might provide all of these services. In a larger network there might be many servers sharing the work pes of Network Local Area Network (LAN) ‘A Local Area Network isa network confined to one building or site ten 2 LAN is 2 private network belonging ton cexganisation or business. Because LANs are geographicaly small, they Usually use eables or loo-povier radio (wireless) forthe connections. Wireless Local Area Network (WLAN) ‘A wireless LAN (WLAN) is 2 LAN that uses radio signals (WiFi) to connect compuiers instead of cables. e-) te cette HLA aioe echo pepe ie gece tcp are weno mary nt Ge) saves on wine coma. onion have @ wireless antenna bul nt the case ) = Ik is much more conveniant to use wireless & connections instead of running long wires allover 2 bling However, WLANs are more dificult to make secure since cther people | Typicaly. the range ofa wireless can also try to connect fo the wireless netwark So, iis very important fo cannecton is about 50m, butt have 9900s, hardto-guess password forthe WLAN connections, pends ho many was, t,o way. Wide Area Network (WAN) |A Wide Area Network isa network that extends over a large area |A.WAN is often create by Joining several LANs together, such 2s when fa business that has offices in diferent countries inks the ofee LANS together Because WANS ate often geographically spread over large areas and inks between computers are over long distances, they often use quite ‘exotic connections technologies: optical fibre (glass) cables, satellite ago links, microwave radio inks, etc The Internets an examnole ofa global WAN Ja facts the worlds [exgest WAN. Computers on the Intemational Space ‘Siaton ae inked tothe Infemet, $0 the you couks say the the Internet is now the first of planet WAN! Bluetooth (Personal Area Network) Bluetooth is 2 wreless networking tecmology designed for vety shortange connections (typically just afew metres) “The idea of Bluetooth is to gat rid ofthe need forall of those cables (e.g, USB cables) that connect our ‘computer to peripheral devices such as printers, mice, keyboards etc. Bluetooth devices contain smal, low-power radio ‘wansmiters and receivers. When devices are in range of other Bluetooth devices, they detect each other and canbe ‘pared (connected) “Typical uses of Bluetooth Because Bluetooth networking oly works over very sort distances, and + Connecting wireless keyboard to computer ith devices belonging fo one user, + Connecting wireless mouse toa computer nis type of networks sometimes + Using 2 wireless headset vn a mobile phone called 2 Personal Area Network’ Printing wirelessly fiom 2 computer or PDA ‘Transferring data | music from a computer ton MPS player ‘Transferring photos frum a phone / camera to another device Synchronising calendars on @ PDA and a computer AN Topologies ‘The word topology means ‘arrangement’, so when we talk about the topology of a network, we mean how the ctferent parts are arranged anc connected together ‘There are three common network topologies. Bus Network In this type of network, a long, central eable, the ‘bus! Is used to connect all ofthe computers together. Each computer has a short cable linking to the ‘bus’ ‘Abus network + Is cheap to install (ust one long cable) + Can be quite slow since all computers ‘share the Same cable when communicating + Will stop working there is @ break in the central bus cable, Ring Network In this type of network each computer is connected to 2 loop of eaable, the ring. (F you taok a bus newark and connected the ends ofthe bus cable together, you would have 2 ring network) ‘Aing network + Can cope with a break in the nng cable since all computers _are sil oined together (tis now a bus network) Star Network In this type of network every computer 18 connected to a central deviee, The device passes messages betvieen computers. At the centre of a star network you might use @ hub (cheap, but slower) ora switeh (more expensive, but faster) Astar network. + [5 quite expensive to instal (you have to buy lots of cable ‘and he eentral device) «+ Is very fast since each computer has its own cable which it doesrit needto share ‘+ Can eope with a broken eable (only one computer will be affected) ‘+ ll stop working the central device breaks «+ Isthe most common network topslogy Networking Hardware Network Interface Card (NIC) ‘Any computer that is to be connected 19 a network needs to have a networkinterface card (NC). Host modern computers have these devices bul nto the motherboard, but in some computers you fave to add an esta expansion card (small ‘ircuitboars) _£ Network Cable “To connect together different devices to make up a network, you need cables. Cables are stil used in most networis, rather than using only wireless, because they can cary much more data per second, and are more ‘secure (less open to hacking) ‘Some computers, such 3 laptops, ‘have two NICS. one for wired ‘connections. and one for wireless Connections (which uses radio signals ‘instead of wes) Ina laptop, the wireless rado antenna {s usualy bult to the side of the screen, $0 you don't need io have a Jeng bi of plastic stikang ut he side of your computer! The most common type of network cable cable in use today looks tke the fone shoun above, wih plastic plugs on the ends that snap into sockeis on the network devices Inside the cable are severs| copper tires (some used for senaing data fone direction, and some forthe other Hub ‘A hub is @ device that connects 2 number of computers together to make alan ‘The typical use of a hub is at the contre ofa star network (or as pat of | hnyonid network) the hub has cables plugged int fiom each computer. | Hubs are prety much obsolete now (you cant buy them any more), ae es o> ey er A hub is 9 dumb’ device’ itt receives a message, ft sends it 10 every computer on the network This means thet hub.based networks are not very secure - everyone can sten into communications, Switch A swich, Ike 2 nub, Is @ device that connects @ number of computers Together to make a LAN, ‘The bypica use of @ swich is at the centre of a star network (or 23 par of a hybrid network) - the swich has cables plugged ino i from each ‘computer. A swich (sa more Intelligent device than @ hub: i receives & ‘message, checks who is addressed to, and only sends i to that ‘specific computer. Because of this, networks that use sowthes are ‘more secure than those that use hubs, but also a litte more expensive Router [A rater io a network device that connects together two or more networks common use of routers to Join a nome or business network (LAN) 19 ‘the Internet (WAN “The router wil typically have theloternet cable phuggedinta &, as Well as a ‘cable, of cables fo computers onthe LAN Ateenaively the LAN connection might be wireless (WF, mating the device 2 wireless router (A wireless router 16 actualy 2 router and swreiess switch combined) Proxy Server A prony server is a computer setup to Share @ resource, usualy an Internet be easiy inctaled on the computer Such as enthvius, web itenng ete Bridge Atos sweat dice ht ob ke ato we een paneat = A frowal isa deviee, oF 6 pisco of software thats placed between your computer and tne rest ofthe network wnere the hackers are!) you would place 2 ftewall between the LAN and the Internet connection "Qo™ { —_ ose tee ey ® ‘A trewal blocks unauthorised connections beng made 2 your Computer or LAN. Normal data ts alowed tvough the frewal(e@.€-Malls maaan fo physical aces Crwab pages) but al ther data blocked ‘mewats can also be somvare Intact most computer operating [Systems nave a sonvare trewat butt nag Windous, Linux and t4ae OS) Modem Before the days of broadband Internet connections, most computers connected to the Internet via telephone lines (dial-up connections). The problem with using telephone lines is that they are designed to carry voices, which are analogue signals. They are not designed for digital GR WWW GR signal (voices) The solution was to use @ special device to join the digital computer to the anglogue telephone line. This device is known as a modem. A modem contains a DAC and an ADC The DAC in the modem is required so that the digital computer can send data down the analogue telephone line (it converts digital data into noises which is exactly what the telephone line is designed to carry.) The ADC in the modem is required so that the analogue signals (noises) that arrive via the telephone line can be converted back into digital data AW 0101101, o101101, = Modem| Modem Digital Analogue signal Digital Bat (sound & voices) data Bem cai -18 ‘An intranet is the name gven to a private network that provides similar services to The Internet: email messaging, wed pages, ete However, these senices are only for the users of the intranet — they ‘ate private, not public (unikeInlernet services which are generally publ) Businesses and other organisations olen have vanes or use by her employees. “Typical uses of an intranet would be + Viewing internal web pages (¢ 9. company calendars ete.) + Internal e-mail and instant-messaging belwaen workers + Sharing of internal documents, Setting Up a Small Network if you were asked to build a small, Intemet-connected network from scratch, what would you need to do? You would need to buy some hardware: + One or more switches / hubs - to link devices together + Network cables to connect devices to the switch, etc. * A separate wireless access point (or this could be part of the ‘switch) - to allow wireless devices (e.g. laptops or smart-phones) to join the network + Arouter to connect your LAN to the Internet (WAN) + A firewall to protect your network from hackers * Possibly a bridge if you already have a section of network and you want your new network to connect to it + Servers) to manage network functions such as network security, network file storage, shared resources (such as printers) You would need to organise some other things: + Set up an account with an Internet Service Provider (ISP) * Get an Internet connection instaled from the ISP to your location * Configure various bits of hardware and software so that everything worked with the network The Internet IsP Network & Data Security [As soon as your computer is connected 9 a network, you have to start thinking about seeurity secunty of your fies, information, etc. ‘A network allows a person who does to have physical access to your 4 computer (ey are rot siting in front off) fo gain access all the same. IF ( your computer is connected 10 a network, other people can connect 9 your computer {A person who gains unauthorised access to @ computer system is often called a hacker. Preventing Unauthorised Access There are a number of security measures that you can take to prevent hackers accessing your computer and all of the data stored on it Physical Security The first thing to make sure of is that no unauthorised people can physically access (sit down in front of) any of the computers on your network. For example, by keeping office doors locked Use a Username and Have a Good Password ‘The most common way to protect your computer's data is to setup user accounts with usernames and passwords. Anyone not having a username, or not knowing the correct password will be denied access. For this to be effective passwords must be chosen that are not easy to guess. Passwords should be a random combination of lowercase letters, uppercase letters and numbers (and symbols if this is allowed). © ‘Weak’ passwords: password, 123456, david, 27dec1992 + ‘Strong’ passwords: s63gRdd1, G66ewSdQ, gdr298763X Some computer systems replace the typing of usemames and passwords with other forms of user identification such as ID cards, fingerprint readers, voice-print recagnition, etc Always Install and Use a wall ‘A firewall is a device, or a piece of software that is placed between your computer / LAN and the rest of the network / WAN (where the hackers are!) You can read about firewalls in the Networking Hardware section. Securing Your Data Often we have data that is private or confidential This data needs to be protected from being viewed by unauthorised people. This is especially true ifthe data is to be sent via a public network such as The Internet, The best way to protect data is to encrypt it Data Encryption Encryption is the process of converting information into a form that is meaningless to anyone except holders of a ‘key’ For example, f Alice wants to send important, personal messages to Bob, she must go through the following steps. The encryption scheme shown here Is caled Symmetric Key, or Single cerns oe nad ie Seuon cae L CS Meeaerany beter schemes, The tey is voualy @ ver lng a sea as as yEnc saat ites stm hee Stites ‘ice must then give a copy of this key to Bob. She must make sure that nobody else can gett the key (So maybe Alice will visit Bob and give > him 3 copy of the key on 3. memory stick or floppy disc). Now that Bob has a copy of the key, each time Alice needs to send him @ ‘message she stars by encrypting & emee tects ising special eneryption software oma Encryption reatests* ang the seeret key, Software Penns eens ‘The encrypted message now looks like 4 jumble of random letters and numbers. Alce then sends the enerypted message to Bob, ‘Se can use a publ network the the Se anna Ineme, sce, even ff gets sen, the meee nce message cannot be read or Understood without the key When Bob receives the message, he uses special decryption software and loner ris copy of he eeert Key to decrypt eae the message Bod can now read the original message from Aice,

You might also like