100%(1)100% found this document useful (1 vote) 434 views13 pagesICT Chapter4 Networks Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
What is a Network?
[A network is two oF more computers, or other electronic devices, [A computer thal is nat connected Io
‘connected topether so that they can exchange data. ‘2 netorkis knovn 3s 8 standalon
computer
Fer example 2 network alos computers to share files, users to
‘message cach ther, a whole room of computers to share a single
printer, etc
Network connections between computers are typically crested using
‘cables (res). However. connections can be crested using radio signals
(wireless / wi, telephone lines (and modems) or even, for very long
distances, va satellite inks,
Why Use Networks?
Using a computer connected to a network allows us to.
+ Easily share files and data
‘+ Share resourees such as printers and Internet connections
‘© Communicate with other network users (e-mail instant messaaing
vyideo-canferencing, etc )
‘+ Store data centrally (using a fle serve) for ease of access and
back-up
+ Keep al of our setings centrally 50 we can use any workstation
In paticular,f we use a computer connected to The ntemet, we can
+ Make use of online services such 3 shopping (¢-commerce) or
banking
+ Get accesso a huge range of information for research
+ Access diferent forms of entertainment (games, video, tc)
+ Join online communities (¢ 9. MySpace, Facebook ec.)Why Not Use Networks?
Using a computer connected to a network means that.
+ The computer is vulnerable to hackers
« Ifthe network breaks, many tasks become very difficult
+ Your computer can more easily be attacked by a virus
In particular, if we use a computer connected to The intemet
+ We have to be careful about revealing personal information
= We have to be careful to avoid suspect websites that might
contain malware
+ We have to be aware that information found on The Intemet is not
always accurate or reliable
Computers in a Network
Computers connected together to create a network falll into two categories:
servers and clients (workstations).
Clients
Client computers, or workstations, are the normal computers that
people sit at to get their work done.
Servers
Servers are special, powerful computers that provide ‘services’ to the
client computers on the network.
‘These services might include:
* Providing 2 central, common file storage area
+ Sharing hardware such as printers
* Controlling who can or can't have access the network
+ Sharing Internet connections
Servers are built to be very reliable. This means that they are much more
expen:
re that normal computers.
in a small network one server might provide all of these services. In a
larger network there might be many servers sharing the workpes of Network
Local Area Network (LAN)
‘A Local Area Network isa network confined to one
building or site
ten 2 LAN is 2 private network belonging ton
cexganisation or business.
Because LANs are geographicaly small, they
Usually use eables or loo-povier radio (wireless)
forthe connections.
Wireless Local Area Network (WLAN)
‘A wireless LAN (WLAN) is 2 LAN that uses radio
signals (WiFi) to connect compuiers instead of
cables. e-)
te cette HLA aioe echo
pepe ie gece
tcp are weno mary nt Ge)
saves on wine coma. onion
have @ wireless antenna bul nt the case ) =
Ik is much more conveniant to use wireless &
connections instead of running long wires allover 2
bling
However, WLANs are more dificult to make secure since cther people | Typicaly. the range ofa wireless
can also try to connect fo the wireless netwark So, iis very important fo cannecton is about 50m, butt
have 9900s, hardto-guess password forthe WLAN connections, pends ho many was, t,o
way.Wide Area Network (WAN)
|A Wide Area Network isa network that extends over a large area
|A.WAN is often create by Joining several LANs together, such 2s when
fa business that has offices in diferent countries inks the ofee LANS
together
Because WANS ate often geographically spread over large areas and
inks between computers are over long distances, they often use quite
‘exotic connections technologies: optical fibre (glass) cables, satellite
ago links, microwave radio inks, etc
The Internets an examnole ofa
global WAN Ja facts the worlds
[exgest WAN.
Computers on the Intemational Space
‘Siaton ae inked tothe Infemet, $0
the you couks say the the Internet is
now the first of planet WAN!
Bluetooth (Personal Area Network)
Bluetooth is 2 wreless networking tecmology
designed for vety shortange connections
(typically just afew metres)
“The idea of Bluetooth is to gat rid ofthe need forall
of those cables (e.g, USB cables) that connect our
‘computer to peripheral devices such as printers,
mice, keyboards etc.
Bluetooth devices contain smal, low-power radio
‘wansmiters and receivers. When devices are in
range of other Bluetooth devices, they detect each
other and canbe ‘pared (connected)
“Typical uses of Bluetooth Because Bluetooth networking oly
works over very sort distances, and
+ Connecting wireless keyboard to computer ith devices belonging fo one user,
+ Connecting wireless mouse toa computer nis type of networks sometimes
+ Using 2 wireless headset vn a mobile phone called 2 Personal Area Network’
Printing wirelessly fiom 2 computer or PDA
‘Transferring data | music from a computer ton MPS player
‘Transferring photos frum a phone / camera to another device
Synchronising calendars on @ PDA and a computerAN Topologies
‘The word topology means ‘arrangement’, so when we talk about the
topology of a network, we mean how the ctferent parts are arranged anc
connected together
‘There are three common network topologies.
Bus Network
In this type of network, a long, central eable, the ‘bus! Is used to
connect all ofthe computers together. Each computer has a short cable
linking to the ‘bus’
‘Abus network
+ Is cheap to install (ust one long cable)
+ Can be quite slow since all computers
‘share the Same cable when communicating
+ Will stop working there is @ break in the
central bus cable,
Ring Network
In this type of network each computer is connected to 2 loop of
eaable, the ring. (F you taok a bus newark and connected the ends
ofthe bus cable together, you would have 2 ring network)
‘Aing network
+ Can cope with a break in the nng cable since all computers
_are sil oined together (tis now a bus network)
Star Network
In this type of network every computer 18 connected to a central
deviee, The device passes messages betvieen computers.
At the centre of a star network you might use @ hub (cheap, but
slower) ora switeh (more expensive, but faster)
Astar network.
+ [5 quite expensive to instal (you have to buy lots of cable
‘and he eentral device)
«+ Is very fast since each computer has its own cable which it
doesrit needto share
‘+ Can eope with a broken eable (only one computer will be
affected)
‘+ ll stop working the central device breaks
«+ Isthe most common network topslogyNetworking Hardware
Network Interface Card (NIC)
‘Any computer that is to be connected 19 a network needs to have a
networkinterface card (NC).
Host modern computers have these devices bul nto the motherboard, but
in some computers you fave to add an esta expansion card (small
‘ircuitboars)
_£
Network Cable
“To connect together different devices to make up a network, you need
cables.
Cables are stil used in most networis, rather than using only wireless,
because they can cary much more data per second, and are more
‘secure (less open to hacking)
‘Some computers, such 3 laptops,
‘have two NICS. one for wired
‘connections. and one for wireless
Connections (which uses radio signals
‘instead of wes)
Ina laptop, the wireless rado antenna
{s usualy bult to the side of the
screen, $0 you don't need io have a
Jeng bi of plastic stikang ut he side
of your computer!
The most common type of network
cable cable in use today looks tke the
fone shoun above, wih plastic plugs
on the ends that snap into sockeis on
the network devices
Inside the cable are severs| copper
tires (some used for senaing data
fone direction, and some forthe otherHub
‘A hub is @ device that connects 2 number of computers together to make
alan
‘The typical use of a hub is at the contre ofa star network (or as pat of |
hnyonid network) the hub has cables plugged int fiom each computer. | Hubs are prety much obsolete now
(you cant buy them any more),
ae
es
o>
ey er
A hub is 9 dumb’ device’ itt receives a message, ft sends it 10 every
computer on the network This means thet hub.based networks are not
very secure - everyone can sten into communications,
Switch
A swich, Ike 2 nub, Is @ device that connects @ number of computers
Together to make a LAN,
‘The bypica use of @ swich is at the centre of a star network (or 23 par
of a hybrid network) - the swich has cables plugged ino i from each
‘computer.
A swich (sa more Intelligent device than @ hub: i receives &
‘message, checks who is addressed to, and only sends i to that
‘specific computer. Because of this, networks that use sowthes are
‘more secure than those that use hubs, but also a litte more expensive
Router
[A rater io a network device that connects together two or more
networks
common use of routers to Join a nome or business network (LAN) 19
‘the Internet (WAN
“The router wil typically have theloternet cable phuggedinta &, as Well as a
‘cable, of cables fo computers onthe LAN
Ateenaively the LAN connection might be wireless (WF, mating the
device 2 wireless router (A wireless router 16 actualy 2 router and
swreiess switch combined)Proxy Server
A prony server is a computer setup to
Share @ resource, usualy an Internet
be easiy inctaled on the computer
Such as enthvius, web itenng ete
Bridge
Atos sweat dice ht ob ke ato we een
paneat =
A frowal isa deviee, oF 6 pisco of software thats placed between your
computer and tne rest ofthe network wnere the hackers are!)
you would place 2 ftewall between the LAN and the Internet
connection
"Qo™ { —_
ose tee
ey ®
‘A trewal blocks unauthorised connections beng made 2 your
Computer or LAN. Normal data ts alowed tvough the frewal(e@.€-Malls maaan fo physical aces
Crwab pages) but al ther data blocked ‘mewats can also be somvare
Intact most computer operating
[Systems nave a sonvare trewat butt
nag Windous, Linux and t4ae OS)Modem
Before the days of broadband Internet connections, most computers
connected to the Internet via telephone lines (dial-up connections).
The problem with using telephone lines is that they are designed to carry
voices, which are analogue signals. They are not designed for digital
GR WWW GR
signal (voices)
The solution was to use @ special device to join the digital computer to
the anglogue telephone line. This device is known as a modem.
A modem contains a DAC and an ADC
The DAC in the modem is required so that the digital computer can send
data down the analogue telephone line (it converts digital data into noises
which is exactly what the telephone line is designed to carry.)
The ADC in the modem is required so that the analogue signals (noises)
that arrive via the telephone line can be converted back into digital data
AW
0101101, o101101,
= Modem| Modem
Digital Analogue signal Digital
Bat (sound & voices) dataBem cai -18
‘An intranet is the name gven to a private network that provides similar
services to The Internet: email messaging, wed pages, ete
However, these senices are only for the users of the intranet — they
‘ate private, not public (unikeInlernet services which are generally publ)
Businesses and other organisations olen have vanes or use by her
employees.
“Typical uses of an intranet would be
+ Viewing internal web pages (¢ 9. company calendars ete.)
+ Internal e-mail and instant-messaging belwaen workers
+ Sharing of internal documents,
Setting Up a Small Network
if you were asked to build a small, Intemet-connected network from
scratch, what would you need to do?
You would need to buy some hardware:
+ One or more switches / hubs - to link devices together
+ Network cables to connect devices to the switch, etc.
* A separate wireless access point (or this could be part of the
‘switch) - to allow wireless devices (e.g. laptops or smart-phones) to
join the network
+ Arouter to connect your LAN to the Internet (WAN)
+ A firewall to protect your network from hackers
* Possibly a bridge if you already have a section of network and you
want your new network to connect to it
+ Servers) to manage network functions such as network security,
network file storage, shared resources (such as printers)
You would need to organise some other things:
+ Set up an account with an Internet Service Provider (ISP)
* Get an Internet connection instaled from the ISP to your location
* Configure various bits of hardware and software so that
everything worked with the networkThe Internet
IsP
Network & Data Security
[As soon as your computer is connected 9 a network, you have to start
thinking about seeurity secunty of your fies, information, etc.
‘A network allows a person who does to have physical access to your 4
computer (ey are rot siting in front off) fo gain access all the same. IF (
your computer is connected 10 a network, other people can connect 9 your
computer
{A person who gains unauthorised access to @ computer system is often
called a hacker.
Preventing Unauthorised Access
There are a number of security measures that you can take to prevent
hackers accessing your computer and all of the data stored on it
Physical Security
The first thing to make sure of is that no unauthorised people can
physically access (sit down in front of) any of the computers on your
network.
For example, by keeping office doors lockedUse a Username and Have a Good Password
‘The most common way to protect your computer's data is to setup user
accounts with usernames and passwords. Anyone not having a
username, or not knowing the correct password will be denied access.
For this to be effective passwords must be chosen that are not easy to
guess. Passwords should be a random combination of lowercase letters,
uppercase letters and numbers (and symbols if this is allowed).
© ‘Weak’ passwords: password, 123456, david, 27dec1992
+ ‘Strong’ passwords: s63gRdd1, G66ewSdQ, gdr298763X
Some computer systems replace the typing of usemames and passwords
with other forms of user identification such as ID cards, fingerprint
readers, voice-print recagnition, etc
Always Install and Use a
wall
‘A firewall is a device, or a piece of software that is placed between your
computer / LAN and the rest of the network / WAN (where the hackers are!)
You can read about firewalls in the Networking Hardware section.
Securing Your Data
Often we have data that is private or confidential This data needs to be
protected from being viewed by unauthorised people. This is especially
true ifthe data is to be sent via a public network such as The Internet,
The best way to protect data is to encrypt it
Data Encryption
Encryption is the process of converting information into a form that
is meaningless to anyone except holders of a ‘key’
For example, f Alice wants to send important, personal messages to Bob,
she must go through the following steps.The encryption scheme shown here
Is caled Symmetric Key, or Single
cerns oe nad ie
Seuon
cae L
CS Meeaerany beter schemes,
The tey is voualy @ ver lng a sea as as yEnc
saat ites stm hee Stites
‘ice must then give a copy of this
key to Bob. She must make sure that
nobody else can gett the key
(So maybe Alice will visit Bob and give >
him 3 copy of the key on 3. memory
stick or floppy disc).
Now that Bob has a copy of the key,
each time Alice needs to send him @
‘message she stars by encrypting & emee
tects
ising special eneryption software oma Encryption reatests*
ang the seeret key, Software Penns
eens
‘The encrypted message now looks like
4 jumble of random letters and
numbers.
Alce then sends the enerypted
message to Bob,
‘Se can use a publ network the the Se anna
Ineme, sce, even ff gets sen, the meee
nce message cannot be read or
Understood without the key
When Bob receives the message, he
uses special decryption software and loner
ris copy of he eeert Key to decrypt eae
the message
Bod can now read the original
message from Aice,