Computer Networks
Computer Networks
Computer Networks
https://www.youtube.com/watch?v=O7CuFlM4V54
CH 4.COMPUTER
•NETWORKS
A network is made up of two or more computers linked
together.
• Computers are connected to each other for the
following purpose :
Advantages are:
* Share devices between computers
* Share data between computers
* Share programs between computers
* Saves time & Cost of installation and maintenance
NETWORKED COMPUTER
Disadvantages
If server crashes everybody has to stop working
Poor security
Increased cost
A Computer Network
Printer
Fileserver
Hub/Switch
IMPORTANT TERMS
Topology : The geometric arrangement of a computer system. Common
topologies include
a bus, star, and ring. Hybrids of these are, star bus & star ring.
Protocol : The protocol defines a common set of rules and signals that
computers on the network use to communicate.
servers or file servers :Computers and devices that allocate resources for a
network are called servers or file servers.
TYPES OF NETWORKS
There are 3 types of computer network:
1. A local area network (LAN) –
computers are linked from office to office, or building
to building.
2. A metropolitan area network (MAN) – The
computers are further apart and are connected (that is,
in the same city).
3. A wide area network (WAN) – computers are linked
city to city, or country to country.
4. Wireless LAN
A Typical Local Area Network (LAN)
Printer
Fileserver
Hub/Switch
Wireless Local Area Network (WLAN)
• A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi) to
connect computers instead of cables
• wireless switch or router(with or without anteena) is used for sending
and receiving data to the computers.
• WLANs are more difficult to make secure since other people can also try
to connect to the wireless network. So, it is very important to have a good,
hard-to-guess password for the WLAN connections
WIDE AREA NETWORK
A wide area network is normally used to link groups of computers
across long distances.
A multinational company in New York will have its own LAN, but to link
with its Japanese offices LAN, it will need to make use of a WAN.
The WAN will be made up of telephone lines, radio and satellite links, all
run by the local public providers. These will have their own charges.
Alternatively the company may pay for a permanent link between
offices, known as a leased line. The company pays a fixed rate for the
permanently open connection.
WIDE AREA NETWORK
DIFFERENCE B/W LAN,MAN & WAN
Proxy Server
Isolates internal network computers from the internet.
The user first access the proxy server and the proxy server
accesses the internet and retrieves the requested web page or
document. The user then gets a copy of that page from the proxy
server.
IF YOU WERE ASKED TO BUILD A SMALL,
INTERNET-CONNECTED NETWORK FROM
SCRATCH, WHAT WOULD YOU NEED TO
DO?
You would need to buy some hardware & Software:
Two or more than Two Computer Systems
Gateway
Connects networks with different protocols like TCP/IP network and
IPX/SPX networks.
Routers and Gateways often refer to the same device.
Proxy server
Isolates internal network computers from the internet.
The user first access the proxy server and the proxy server accesses the
internet and retrieves the requested web page or document. The user then
gets a copy of that page from the proxy server.
COMMON NETWORK DEVICES
Firewall A machine and its software that serve as a special
gateway to a network, protecting it from inappropriate access
Filtersthe network traffic that comes in, checking the validity of the
messages as much as possible and perhaps denying some messages
altogether
Enforces an organization’s access control policy
https://www.youtube.com/watch?v=_FZwVhPW_5Y
NETWORK HARDWARE
HUB
An unintelligent network device that sends one signal to all of the
computers connected to it.
SWITCH
Split large networks into small segments, decreasing the number
of users sharing the same network resources and bandwidth.
Understands when two devices want to talk to each other, and
gives them a switched connection
A switch steps up on a bridge in that it has multiple ports.
A switch is an intelligent network device. When a packet comes
through a switch it is read to determine which computer to send the
data to.
This leads to increased efficiency in that packets are not going to
computers that do not require them.
Switch use MAC address.
NETWORK HARDWARE
BRIDGE
Connects two LANs and forwards or filters data packets
between them.
Wi-Fi is better suited for operating full-scale networks because it enables a faster
connection, better range from the base station, and better security (if configured
properly) than Bluetooth.
Bluetooth Wifi
Frequency 2.4 GHz 2.4, 3.6, 5 GHz
Cost Low High
Bandwidth Low ( 800 Kbps ) High (11 Mbps )
Specifications Bluetooth SIG IEEE, WECA
authority
Security It is less secure Security issues are already being debated.
Mobile phones, mouse, keyboards, office Notebook computers, desktop computers,
Primary Devices and industrial automation devices. Activity servers, TV, Latest mobiles.
trackers, such as Fitbit and Jawbone.
Bluetooth adaptor on all the devices Wireless adaptors on all the devices of the
Hardware
connecting with each other network, a wireless router and/or wireless
requirement
access points
5-30 meters With 802.11b/g the typical range is 32
meters indoors and 95 meters (300 ft)
outdoors. 802.11n has greater range.
Range
2.5GHz Wi-Fi communication has greater
range than 5GHz. Antennas can also
increase range.
Power Consumption Low High
Fairly simple to use. Can be used to connect It is more complex and requires
upto seven devices at a time. It is easy to configuration of hardware and software.
Ease of Use
switch between devices or find and connect
to any device.
Latency 200ms 150ms
Bit-rate 2.1Mbps 600 Mbps
WHAT IS INTRANET, EXTRANET &
INTERNET?
Intranet
It is a private network that uses Internet protocols to securely share any part
of an organization's information or operational systems within that
organization mainly for employees.
Extranet
It is a private network that uses internet protocols, network connectivity, and
possibly the public telecommunication system to securely share part of an
organization's information or operations with suppliers, vendors, partners,
customers or other businesses. An extranet can be viewed as part of a
company's Intranet that is extended to users outside the company, usually via
the Internet.
Internet:
It is a global system of interconnected computer networks that use the
standardized Internet Protocol Suite (TCP/IP) to serve billions of users
worldwide.
WHAT IS INTRANET, EXTRANET &
INTERNET?
Report
School
Card
Website
System
School-Parent
Communication
Portal
DIFFERENCE B/W INTERENT , INTRANET
VIRTUAL PRIVATE NETWORK
(VPN)
Virtual Private Network is used by mobile company users
who frequently travel around or want to access their office
Computers while sitting at home. The connection to the
company network is serviced by some Internet Service
Provider (ISP) and is always. a secure connection just like a
private line connection.
Online Education
Online Results
Disadvantages
Cannot be certain if correct person has received it
Very slow transmission rates
Not very good quality
Documents cannot be edited easily
Cannot send multimedia files
Won’t be received if line is busy/receiving fax machine
switched off/out of paper
Wastes/expense of ink/paper
E-MAIL
Electronic mail, also known as email or e-mail, is a method of
exchanging digital messages from an author to one or more
recipients. Modern email operates across the Internet or
other compute r networks. Some early email systems required that
the author and the recipient both be online at the same time, in
common with instant messaging. Today's email systems are based on
a store-and-forward model. Email servers accept, forward, deliver and
store messages. Neither the users nor their computers are required to
be online simultaneously; they need connect only briefly, typically to
an email server, for as long as it takes to send or receive messages.
EMAIL
Advantages
Can be confident message will only go to the correct
person (if addressed correctly)
Fast transmission times
Attachments can be downloaded and edited
Easier to send large documents
Disadvantages
Can be slow turnaround times
Some systems have limits to size of attachments
Addresses more difficult to remember than phone numbers
Description of how phishing can occur
Description of how viruses can be transmitted
VIDEO CONFERENCING
It comprises of two or more people chatting or presenting to
another group of people talking through a camera or WEBCAM
through which the live video of the person you are talking to…..
It comprises of a microphone in which the person speaks and the
opposite person can hear. It is the top way to communicate in
today’s busy life
VIDEO CONFERENCING
Advantages
Workers can use own office so documents do not get lost in transit/bulky
documents/equipment
do not have to be carried around
Company can call meeting at short notice
Employees can work from home
Company does not have to pay travelling expenses
Company does not have to pay hotel expenses
Company does not have to pay for conference room facilities
Travelling time is saved
Might be dangerous to fly/travel
Disabled people may find it difficult to travel
VIDEO CONFERENCING
Disadvantages
Takes time to train employees
Difficult to call international meetings because of time differences
Initial cost of hardware
Equipment can break down
Strength of signal/bandwith/lipsync can be a problem/connection can be
lost/power cuts
Loss of personal/social contact
Takes time for workers to learn new technology
Can’t sign documents
WHAT IS VOIP?
VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-
based networks.
Also Known As: Internet telephony, IP telephony
VoIP has become popular largely because of the cost advantages to consumers over
traditional telepone networks. Most Americans pay a flat monthly fee for local telephone
calls and a per-minute charge for long-distance calls.
VoIP calls can be placed across the Internet. Most Internet connections are charged
using a flat monthly fee structure.
Using the Internet connection for both data traffic and voice calls can allow consumers to
get rid of one monthly payment. In addition, VoIP plans do not charge a per-minute fee
for long distance.
Example : Skype Messenger
HOW TO PREVENT UNAUTHORIZED ACCESS
TO YOUR DATA ON NETWORK?
Physical Security (Computer Trolley or keeping office doors locked)
WHAT YOU KNOW (Use a Username and Have a Good Password)
WHAT YOU HAVE: ( Use of ID Cards, Smart Cards)
WHAT IS UNIQUE TO YOU : ( Installation of Biometric Systems
(fingerprint readers, Retina Scanner, face & voice-print recognition,
etc. )
Install and Use a Firewall
Data Encryption
ENCRYPTION
Encryption is the process of converting information into a form that is
meaningless to anyone except holders of a ‘key’.
Causes data to be scrambled/encoded
Requires an encryption key/software to encrypt