Computer Networks.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networks By the end of this session, you will:
INTRODUCTION TO COMPUTER NETWORKS CS-107 INTRODUCTION TO COMPUTING Aug-Dec,2010 Alak Roy Assistant Professor Dept. of CSE Royal Group of Institution .
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Bob Baker Communications Bob Baker September 1999.
Computer Networks & Security
Principles of Information Technology
LAN Local Area Network By Amal Wali 10DD.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
TYPES OF NETWORKS NETWORK CONFIGURATIONS /TOPOLOGIES TRANSMISSION MEDIA By B. Vialva.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Communications & Networks
LANs Cabling Topologies Segments and bridges Switches and routers.
Chapter 5 Networks Communicating and Sharing Resources
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
Characteristics of Communication Systems
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
TYPES OF NETWORKS PROTOCOLS NETWORK CONFIGURATIONS /TOPOLOGIES TRANSMISSION MEDIA By B. Vialva.
NETWORKS.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Living Online Module Lesson 23 — Networks and Telecommunication
Computers Are Your Future Eleventh Edition
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
UNIT -1. DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Networking… By: Allan Joe Next page.
Higher Computing Networking. Networking – Local Area Networks.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
ICT Unit 4: Network and the effects of using them
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Network System Security - Task 2. Russell Johnston.
Unit Communication Hardware
Network and hardware revision
Chapter Objectives In this chapter, you will learn:
INTRODUCTION TO COMPUTER NETWORKS
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Computer Technology Notes #4
Chapter 6 Networks Communicating and Sharing Resources
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Presentation transcript:

Computer Networks

Internet protocols and network hardware Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers used for communication purposes. A network protocol is a standard method for transmitting data from one computer to another.

Protocols/Services Physical layer-data is transmitted bit by bit from one device to another e.g on modems Data Link Layer: It acts upon requests for services from the physical and network layer e.g wifi and ethernet Network/Internet layer: It is responsible for forwarding packets and routing e.g internet protocol Transport layer: It divides data to be transmitted and adds the address of the source and destination address e.g UDP and TCP Application: It consists of protocols that use the transport layer to deliver services to the network or Internet layer.

Ethernet It refers to a basic set of protocols used to operate a local area network(LAN). It is made up of the following: Devices that send and receive data such as PCs, printers and servers. Network devices such as hubs, switches and routers. Medium connecting devices such as twisted pair, fibre optic and coaxial cables.

TCP/IP Transmission Control Protocol(TCP) ensures that data is delivered correctly Internet Protocol(IP) ensures that the data is delivered to the correct address. An IP address consists of 4 bytes which are given in decimal form Techniques such as subnetting and local addressing are used to increase the number of addresses

TCP/IP TCP ensures that the correct number of packets reach the destination and that there are no duplicates as a result of retransmission. Any duplicates are deleted Each packet contains a destination address, source address and a sequence number which will be used for assembling the packets at the destination. It is used on the www, e-mails and for file transfer.

Handshaking It refers to the exchange of signals between devices to establish a communication channel eg the rate of transfer, parity checking and interrupts to be used. Parity can be odd or even. It refers to the total number of bits within a transmitted message. The number of bits is checked to make sure that there are no errors in transmission

UDP The UDP is a basic protocol. It is considered to be a connectionless service. No handshaking is required. It has no congestion control mechanisms. It is unreliable because packets of data may fail to reach the destination. It is still better suited for real-time transmissions e.g video on demand systems

FTP FTP is used for the transfer of files when downloading and uploading files. FTP makes use of client-server systems. Clients have to log on in order to download files. SSL and SSH are used to enable encryption of files during transmission.

HTTP HTTP is the protocol used for transmitting data across the internet/intranets. It uses a client-server system in which a browser makes a request using a URL. The URL is converted to an IP address. The server will then provide the required resources

Telnet Telnet is a network protocol used on the internet or within local area networks. It is used to enable a user to gain access to another computer and use the resources provided there. It works at the same layer as FTP. The remote compter should have telnet client/server software. Telnet has major security problems which has decreased its popularity. It is still used for network diagnostics and troubleshooting problems.

SSH It allows data to be shared between two computers. It allows users to log in remotely and also uses encryption. It uses uses public-key authentication. Its main purpose is to log into a machine remotely and execute commands. It is therefore used by administrators.

Network Hardware

Network Hardware Devices used in a computer network

Network Hub A hub is a devices that has a number of network devices or computers connected to it. When a hub receives data packets it broadcasts them to all computers on that network including itself. It does not read the data packets. Hubs that amplify the signal are called active hubs and those that do not amplify the signal are passive hubs.

Switches A switch is more advanced than a hub. When hubs are used congestion may occur when several computers are transmitting data at the same time. The same packet of data is send to all the ports on the hub. In a switch the data from any computer is sent directly to its destination port without congesting the other ports unnecessarily. A switch uses address tables to find the correct port to send data packets. It stores the Media Access Control(MAC) address. It is used for connecting local computers and devices.

Routers A router enables data to be sent transmitted between different networks e.g from a LAN to a WAN. It provides facilities for protocol conversion. It may also have a firewall installed. The router inspects packets of data and checks the IP address so that it can forward it to the correct network. The first part of an IP address is the network address which is then used for routing.

Dedicated cabling Twisted pair: two conducting wires twisted around each other which reduces magnetic interference and data loss Coaxial: A conducting wire surrounded by a plastic non-conducting layer, then conducting material and a PVC Fibre optic cable: Optic fibres which are individually coated by a plastic resin and sheathed in a plastic layer Networks that require fast speeds use twisted pair and fibre optic cables.

Servers File Servers- Store user data. Users must log on to use the servers. Application Server-Distribute application software to client machines e.g the isams servers Other servers include print servers, e-mail servers, proxy servers etc One computer can be used as multiple servers. File servers make use of groups and access rights in order to manage security.

Network cards A network interface card is a card that fits onto a computer’s motherboard. A network interface card may allow both wired and wireless communication.

Network Types Local Area Networks- These are house within a building or the same geographical area e.g schools, offices etc The networks normally use switches/hubs The switch is in turn connected to a broadband modem in order to connect to the internet.

Network Topologies The Ring Network The Bus Network The Star Network There are 3 main types of network topologies: The Ring Network The Bus Network The Star Network

Network Topologies The Ring Network: Computers are connected together to form a ring shape so that none of them is more important than any of the others.

Network Topologies The Ring Network: Advantages: Disadvantages: They are cheap to expand. The data flows around the network in one direction so it is fast. It performs better than a star network when traffic is heavy. There is no reliance on a central computer. Disadvantages: If there are a lot of users on the network, it could slow down as all the data is sent along a single line. If one computer in the ring stops working, the whole network stops. Adding a new computer may cause disruptions to the network.

Network Topologies The Bus (or line) Network: Computers are connected like bus stops on a main road. None of them is more important than any of the others. The spine has cables which connect to each network.

Network Topologies The Bus (Line) Network: Advantages: Disadvantages: It is cheap as it uses the least amount of cable. More computers can be added without disruption. If one of the devices fails the network will continue to function as normal No hubs/switches are required Disadvantages: With a lot of users, the network will be slow as data has to travel through the same central cable. Failure of the central cable will stop the network from working. It is difficult to troubleahoot when the whole network breaks down.

Network Topologies The Star Network: Computers are connected like a star to a central hub/switch/server/router.

Network Topologies The Star Network: Advantages: Disadvantages: If a cable fails, it will only affect one workstation. More computers can be added without disruption. Disadvantages: It is more expensive as it uses the most cabling. Failure of the central computer/network device will stop the network from working.

Hybrid Networks It is made up of star networks where each hub/switch is connected to one backbone. The backbone cable forms a bus-type network. The switches may also connect to each other forming multiple interconnected star networks.

Network Topologies The Hybrid Network: Advantages: Disadvantages: It employs the advantages of a star network and bus network More computers can be added without disruption. Disadvantages: Sections can stop working if a hub/switch breaks down. The whole network will not work if there is a fault in the spine.

Intranets Local Area Networks are used for creating intranets. An intranet can be defined as a private company network that makes use of internet technology. It is for the use of members of that organisation. Users are given usernames and passwords Dedicated telecommunication links may also be used for linking different locations such as fibre optic cable and telephone lines. It uses internet protocols.

Uses of Intranets Providing local e-mail Video conferences Sharing information Fast access to documents and statistics Sharing diaries Organising meetings Discussion forums Policy information

Local e-mail and Business Networks Intranets are very secure and businesses use them put up information that employees need to access. Intranets reduce paper costs Lan-based e-mail reduces the cost of printing An ISP can be used for providing the e-mail service

WLANs A WLAN uses either spread spectrum( a signal with an initially low bandwidth is spread to have a wider bandwidth) radio waves or infrared signals for communication. Computers or devices must have WNICs Devices can be added easily to the network problems with the WLANs include security issues, interference and poor speeds

Wi-fi Wifi is short for wireless fidelity. Data is transmitted into radio signals and then transmitted. The wireless router decodes the signal. The following hardware devices are used: Wireless Network Cards Wireless Routers Wireless Access Points

Wireless Network Cards It transmits data as radio waves. Most laptops a fitted with WNICs by manufacturers Desktop computers can also have these fitted Most mobile devices have wireless NICs

Wireless Router It converts data signals into radio signals as well as radio signals back to data signals. Features include: Wifi protected access(WPA), a complexi encryption system MAC address filtering and IP address filtering Invisible mode

Wireless Access Points They are used for connecting wireless devices to a wired network. They cover a limited area and number of computers. List Devices that have wireless capabilities:

Methods of Data transmission Spread spectrum radio waves are used for transmitting data by increasing its bandwidth.

Methods of Data transmission contd. The same random number generators are used by the receiver and sender to generate random frequencies and stay synchronised. It allows computers and other devices to communicate through walls. Another method is to use infrared signals. As it pulses on and off it willl be transmitting data in bits. It is secure because it cannot be used across walls. There is also no interference. The main disadvantage of the system is the lack of range.

WPAN Pg 141-143 Don’t have to do network security.

Network Security Network security is there to ensure that unauthorised users do not view data or understand it if they manage to intercept/access the data.

Physical Security This prevents users from gaining physical access to computers. This can be achieved by: -Securing Computer Rooms- All doors and windows should be locked when computers are not in use. Burglar alarms may also be used. Some Servers are lockable. CCTVs can also be used for deterring thieves. Pass cards can be used for giving users different times and levels of access. -Security Guards for patrolling and responding to alarms.

Software Security Most computer threats come from hackers who access computer systems remotely. The following methods may be used for preventing access: Firewall Encryption Digital Certification Authentication Techniques Anti-virus Software

Firewalls A firewall can be in the form of hardware or software or a combination of both. Firewalls prevent unwanted network traffic from accessing a computer network. Packets of data are inspected and if their ip address/network address is not wanted then they are prevented from accessing the computer network. Domains, words, phrases can be filtered out. Packets with these phrases are prevented from entering the system. At school we have a firewall that does this.

Encryption Encryption refers to encoding data by scrambling or encoding it. This is for preveting hackers from understanding data sfter intercepting it. The sending computer uses an encryption key for encoding data. The receiving computer has a decryption key for decoding it. Public key/Private key encryption is used. The sender computer uses the public key for encrypting data and the receiver will use a private key for decoding it.

Digital Certification Digital certificates are issued by a certification authority. The authority certifies that both receiving and sending computers are who they say they are. Once certified each one may get the public key of the other.

Authentication Techniques This can be achieved by using a for example a username and password, card and pin code, biometrics such as facial recognition and finger print scanners.

Anti-virus software It is used to find viruses and remove them. The anti-virus software has a database to remove known viruses. One way is to scan the hard disk or monitor ports for suspicious behaviour. Actions taken by viruses include the following: -Repair the files -Quarantine the file by not allowing any program to access it. -Delete the file Anti-virus software must be updated regularly. Antivirus definitions are becoming longer

Other Types Of Viruses Trojan horses Worms

User ID These are used for identifying users and must match a password in the database. Users can also be grouped and be given privileges. Users are given a limited number of attempts when logging in usually three attempts Good password policies must be maintained such as ?

Chip and PIN cards Chip and pin card readers are slotted into keyboards

Anti-spam This is software for rejecting unsolicited e-mails

Anti-pop-up software Pop up blockers are usually incorporated into the browser. It identifies part of html code that will open another window and prevents it from being executed.

Anti-spyware software Spyware software allows people to access and control your computer. It allows pop ups, changes browser settings. In its worst form it searches for user names and passwords. Anti-spyware software searches the hard disk for known spyware software and removes it. It needs constant updating. Key logging software may also be used to detect the keys presssed.

Wired Equivalent Privacy of information(WEP) and Wi-fi Protected Access(WPA) WEP is used for encrypting data on wireless networks but uses a weak key WPA uses stronger encryption keys and also includes user authentication

Electronic conferencing Hardware Requirements Electronic conferencing requires additional hardware such as microphones, earphones/speakers, webcams including in some cases phone handsets.

Software Requirements Conference Software VOIP software Instant messaging

Coference Software Compression Decompression software is used to reduce the size of the packets of data transmitted. The packets of data must be transmitted in real time. Echo cancellation software is used for keeping communication synchronised VOIP software may also be used for conducting telephone conferences.

VOIP Software It is cheaper than using conventional telephone lines. The software coverts the speech into digital data and compresses the audio data so that it can be transmitted in real time.

Instant Messaging It is the exchange of text messages across the internet in real time. Businesses and Institutions can also make use of IM on Local Area Networks.

Video Conferencing Advantages Meetings can be called at short notice No time spend on travelling No money spend on travelling No money spend on booking facilities It is environmentally friendly Meetings are kept shorter It is safer No payments for travelling time

Video Conferencing Disadvantages Confidential documents may need to be seen in their original form There is no direct eye contact Delegates may be put off by the camera Quality of the video depends on the bandwidth Transmission breakdowns may occur Environmental factors such as power cuts may also affect the video conference

Phone Conference Advantages Cheaper than a video conference because there are no webcams ot large screens Less bandwidth No need to worry about appearance

Phone Conference Disadvantages Documents cannot be seen Facial expressions cannot be seen Number of participants is limited Power cuts may interrup services

Instant messaging Advantages It is instant Saves time and money when resolving problems Easy to use

Instant messaging Disadvantages Users may be exposed to dangerous people It may lead to obescity It is disruprive in workplaces when used for socialising It may also pose a security risk when files are sent.

Uses Of Electronic Conferencing Businesses Schools Research Meetings