NETWORK
A collection of computers linked together to allow communication and the sharing of resources
ADVANTAGES DISADVANTAGES
file sharing - users can share cost- additional equipment is
files with other users needed to allow computers to
communicate
hardware sharing - users can
share hardware, such as a management - networks require
printer management by technical staff
such as a network manager
communication - users can
communicate via email, chat, spread of malware - viruses and
or by video other forms of malware can
easily spread across an
roaming access - users can sign
improperly secured network
in to any computer on the
network and be able to access hacking - once a device is
their files connected to another device, it
is possible that data may be
On larger networks, such as those used
accessed without the device
by businesses and schools, there are
owner's permission
additional benefits:
centralised maintenance and
updates - network managers
can apply software updates
across a network, removing
the need for a user to worry
about having to do so
centralised security - anti-virus
software and firewalls can be
implemented across a network,
helping to protect user files
from risks
user monitoring - network
managers can monitor what
users do on a network
levels of access - different users
can be given different access
rights, and this gives network
managers the ability to
generally restrict user access
to certain files, while granting
permission to specific users
THE INTERNET
It is INTERconnected NETworks
Collection of computers and networks not owned or managed by a group of
people
Anyone can access it
WHAT IS THE DIFFERENCE BETWEEN THE INTERNET AND WWW
LAN(Local Area Network)
-geographically contained within one site or building
-eg colleges,universities,small businesses,schools
-collection of computers and peripheral devices (eg printers and other devices
not needed for function but other uses)
WAN(Wide Area Network)
-collection of computers and networks often owned by a third-party carrier eg
BT
-uses cables, telephone lines, satellites and radio waves to connect them
-generally over a wider geographical area
-since it is under collective ownership it is much more expensive than LAN
-organisations with many branches tend to use WANS can cover over countries
PAN(Personal Area Network)
-spread over a very small area
-used to connect personal devices eg Bluetooth headphones to a phone
DATA TRANSMISSION
IP (internet protocol address) address
Unique identification number to each device connected in a network
When connecting to the internet your ISP provides you a unique ip address for
that session it changes from time to time
A node given a static address always keeps the same address. A node given a dynamic
address has a different address assigned to it each time it connects to the network
Static addresses make it easier for network managers to know what device is which
Dynamic makes it easier to allow more people than possible ip addresses onto the network
So if you go on the netework get an ip address then leave your ip address is free to be used
by someone else
Ipv4ipv6 more possible ip addresses for the wider usage of networks
Also links to the location of where you are
PACKET SWITCHING
-file is broken up into data packets
-each packet is labelled given a header given the IP address it is going to and
from, sequence number of the packet, number of packets, error checking data
etc)
The packets are sent to the destination and then rearranged according to the
labels it is given
NETWORK HARDWARE
NIC(Network Interface Cards)
Every device connecting to a network needs it
Uses a set of rules to determine how the connection should work
Most modern computers have these built in
MAC ADRESS(media access control )
-assigned to each NIC by the manufacturer
-your computer may have more than one mac address if it is connected to the
ethernet and one for wireless
-a mobile phone may have one for Bluetooth and wireless
-twelve hex digits to make it easier for humans to work with
-the first six identifies the manufacturer the second to five the serial number of
the device(identification number)
-every networked device has a unique unchanging MAC address
ROUTERS
-connection devices
-used to send data signals across the internet
-it recognises the available routes to transmit data and then the most suitable
one is chosen
-also commonly used in homes to route data from the LAN to the internet
-each router acts as a node data passes from router to router to the final
destination
-NORMALLY USED IN A WAN such as the internet
NODE-connection point that can receive and transmit data
SWITCHES
-component of LANs
-knows the MAC addresses of each individual device connected to the LAN
-when there is traffic the switch transfers data to the intended recipient
-hubs on the other hand transmit data packets to all computers switches cut
down unnecessary transmissions
WIRELESS NETWORKING
WIFI is wireless connection rather than physical wires
Wi-Fi is a family of protocols or rules that make wireless networking
run smoothly
Use radio waves to transmit signals
As long as it is in the range of a WAP (wireless access points) these
allow devices to connect wirelessly to a network It allows
standardized connections
Ap is connected to the router
Can be obstructed by walls or other electronic devices
ADVANTAGES DISADVANTAGES
-physical free movement -wireless connections can cause
-no need to connect to a port to slower file transfers
share files and other resources -walls and physical obstruction
-saves expense, time and can disrupt wireless connections
inconvenience of laying cables -wireless networks are easier to
through walls, floors etc hack
-easy to add new devices into CRIMINAL ACTIVITY
the network -unauthorised user can use the
-instant transfer of data eg wireless connection hack into
uploading photos etc the network and cause damage
BANDWITH STEALING
-using internet connection
-outside intruders can slow the
network down
CONFIDENTIALITY
-if any network information is
not encrypted it can be taken
WIRED NETWORK
In modern networks, wired media use either twisted copper wiring, or fibre-optic cable. Each
wired medium has differing characteristics.
Fibre optic cables use data transmitted as light
Twisted copper wire Fibre-optic cable
Cost Cheaper to purchase and More expensive to purchase and
install install
Maximum Up to 1 gigabit per second Over 40 terabits per second
transmission speed
Maximum distance for Up to 100 metres Over 2 kilometres
reliable
communication
Wired networks Wireless networks
Cost Installation costs can be Cheaper to set up, devices can
expensive connect if in the range of a
wireless access point
Installation Installation requires Installation is simple as most
technical knowledge and wireless devices will connect
space to install cables automatically
Maximum Up to 1 gigabit per second Up to 50 megabits per second
transmission speed for Ethernet
Maximum distance for Up to 100 metres for Up to 50 metres
reliable Ethernet - over 2 kilometres
communication for fibre optic
Security of More secure as a physical Less secure as wireless signal
connection connection is required to cannot be contained within a
intercept data building and no physical
connection is needed to
intercept data
Sopper wires are however affected by electromagnetic interference
and can go onto affect other wires and cause distorted transmissions
NETWORK TOPOLOGIES
Topologies are ways computers are connected together in different
layouts
STAR TOPLOGY
Nodes are connected to a switch and routes message to the correct
computer
ADVANTAGE DISADVANTAGE
-if one cable fails the other -costly due to lot of cabling and
workstations are not affected extra hardware such as the
-consistent performance even switch
when network is heavily used -if central switch fails the whole
-good security as data is only network goes down
received by node that needs it
-reliable
BUS TECHNOLOGY
All nodes are connected to a direct central table
Known as the backbone
Data is sent up and down this backbone until the correct node
receives the data
All nodes receive all data frames (divided data) each node has to
determine If the message is meant for it using its MAC address
Only one node can successfully transmit at any one time which is fine
if the network is not too busy but if there is lots o f traffic and
collision the computer has to retransmit
As number of collisions increase the network slows down
ADVANTAGES DISADVANTAGES
-easy and in expensive to install -if main cable falls the whole
since there is less cabling than network does
star topology -as traffic increases so does
-no reliance on a central node performance
-only one computer at a time
can successfully transmit a data
frame (data collision can
otherwise occur when the data
is corrupted)
-data Is not very secure as all
nodes can see all transmissions
as it is along the same main
cable
Bus topologies are not widely used in modern networking as they are not well suited to
dealing with large amounts of data. They are used when a small, cheap and often temporary
network is needed that does not rely on very high data transfer speeds.
NETWORK PROTOCOLS
A set of rules that governs the transmission of data across a network
ETHERNET
-family of protocols widely used in LANs
-determines how data should be formatted for transmission
1. Data is broken into frames which contain:
1. the source MAC address
2. the destination MAC address
3. some error checking data
2. Each node waits for the connection to be quiet before
attempting to transmit the data.
3. If two nodes happen to try transmitting at the same time,
each will wait for a random amount of time before trying
again.
4. If the switch doesn't know which port is linked to the
destination MAC address, it will broadcast it to all nodes.
5. The right MAC address will open the frame, the others ignore
it. The switch will note which port is attached to that MAC
address.
6. Any frames found to have an error in the data (using the
error checking data) will be discarded and re-requested.
NETWORK SECURITY
-networks are more vulnerable to hackers than standalone devices
because gaining access to one device can allow access to the others
-could result in data theft,corruption and malware damage
-security is necessary to prevent unauthorised access
AUTHENTICATION
1)password protection
-if same computer is used by more than one person
2)user access levels
-read only access when you can not edit files teachers might have
read write access
-some folders you cant even access
-data protection act says employers must keep personal data secure
so it is needed
2)ENCRYPTION
-used to protect data and prevent It being hackers or accesses
illegally
-sending data across a network can be risky encryption cant prevent
hacking but makes it unreadable unless a decryption tool is used
Plaintext: original message
Ciphertext: encrypted message
Key :formula or sequence used to encrypt
Sometimes the characters are shifted to a certain position
Eg Caesar cipher uses a simple key
3)FIREWALL
-device/software that monitors incoming and outgoing network
traffic and decides whether or not to block specific traffic based on a
set of security rules
Eg some firewalls may block data from certain ip addresses
-the network manager can decide what data traffic can come in and
what ports to keep closed
4) MAC address filtering
Since every device has a unique mac address it is possible to
determine what devices are allowed access
However though it identified permitted devices it does not identify
the user like authentication