1 / 68

Computer Networks

Computer Networks. Internet protocols and network hardware. Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers used for communication purposes.

kerri
Download Presentation

Computer Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Networks

  2. Internet protocols and network hardware Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers used for communication purposes. A network protocol is a standard method for transmitting data from one computer to another.

  3. Protocols/Services • Physical layer-data is transmitted bit by bit from one device to another e.g on modems • Data Link Layer: It acts upon requests for services from the physical and network layer e.gwifi and ethernet • Network/Internet layer: It is responsible for forwarding packets and routing e.g internet protocol • Transport layer: It divides data to be transmitted and adds the address of the source and destination address e.g UDP and TCP • Application: It consists of protocols that use the transport layer to deliver services to the network or Internet layer.

  4. Ethernet It refers to a basic set of protocols used to operate a local area network(LAN). It is made up of the following: • Devices that send and receive data such as PCs, printers and servers. • Network devices such as hubs, switches and routers. • Medium connecting devices such as twisted pair, fibre optic and coaxial cables.

  5. TCP/IP • Transmission Control Protocol(TCP) ensures that data is delivered correctly • Internet Protocol(IP) ensures that the data is delivered to the correct address. An IP address consists of 4 bytes which are given in decimal form • Techniques such as subnetting and local addressing are used to increase the number of addresses

  6. TCP/IP • TCP ensures that the correct number of packets reach the destination and that there are no duplicates as a result of retransmission. • Any duplicates are deleted • Each packet contains a destination address, source address and a sequence number which will be used for assembling the packets at the destination. • It is used on the www, e-mails and for file transfer.

  7. Handshaking • It refers to the exchange of signals between devices to establish a communication channel eg the rate of transfer, parity checking and interrupts to be used. • Parity can be odd or even. It refers to the total number of bits within a transmitted message. • The number of bits is checked to make sure that there are no errors in transmission

  8. UDP The UDP is a basic protocol. It is considered to be a connectionless service. No handshaking is required. It has no congestion control mechanisms. It is unreliable because packets of data may fail to reach the destination. It is still better suited for real-time transmissions e.g video on demand systems

  9. FTP FTP is used for the transfer of files when downloading and uploading files. FTP makes use of client-server systems. Clients have to log on in order to download files. SSL and SSH are used to enable encryption of files during transmission.

  10. HTTP HTTP is the protocol used for transmitting data across the internet/intranets. It uses a client-server system in which a browser makes a request using a URL. The URL is converted to an IP address. The server will then provide the required resources

  11. Telnet • Telnet is a network protocol used on the internet or within local area networks. It is used to enable a user to gain access to another computer and use the resources provided there. • It works at the same layer as FTP. The remote compter should have telnet client/server software. • Telnet has major security problems which has decreased its popularity. • It is still used for network diagnostics and troubleshooting problems.

  12. SSH • It allows data to be shared between two computers. It allows users to log in remotely and also uses encryption. • It uses uses public-key authentication. • Its main purpose is to log into a machine remotely and execute commands. It is therefore used by administrators.

  13. Network Hardware

  14. Network Hardware Devices used in a computer network

  15. Network Hub A hub is a devices that has a number of network devices or computers connected to it. When a hub receives data packets it broadcasts them to all computers on that network including itself. It does not read the data packets. Hubs that amplify the signal are called active hubs and those that do not amplify the signal are passive hubs.

  16. Switches A switch is more advanced than a hub. When hubs are used congestion may occur when several computers are transmitting data at the same time. The same packet of data is send to all the ports on the hub. In a switch the data from any computer is sent directly to its destination port without congesting the other ports unnecessarily. A switch uses address tables to find the correct port to send data packets. It stores the Media Access Control(MAC) address. It is used for connecting local computers and devices.

  17. Routers A router enables data to be sent transmitted between different networks e.g from a LAN to a WAN. It provides facilities for protocol conversion. It may also have a firewall installed. The router inspects packets of data and checks the IP address so that it can forward it to the correct network. The first part of an IP address is the network address which is then used for routing.

  18. Dedicated cabling • Twisted pair: two conducting wires twisted around each other which reduces magnetic interference and data loss • Coaxial: A conducting wire surrounded by a plastic non-conducting layer, then conducting material and a PVC • Fibre optic cable: Optic fibres which are individually coated by a plastic resin and sheathed in a plastic layer Networks that require fast speeds use twisted pair and fibre optic cables.

  19. Servers File Servers- Store user data. Users must log on to use the servers. Application Server-Distribute application software to client machines e.g the isams servers Other servers include print servers, e-mail servers, proxy servers etc One computer can be used as multiple servers. File servers make use of groups and access rights in order to manage security.

  20. Network cards A network interface card is a card that fits onto a computer’s motherboard. A network interface card may allow both wired and wireless communication.

  21. Network Types • Local Area Networks- These are house within a building or the same geographical area e.g schools, offices etc • The networks normally use switches/hubs • The switch is in turn connected to a broadband modem in order to connect to the internet.

  22. Network Topologies There are 3 main types of network topologies: The Ring Network The Star Network The Bus Network

  23. Network Topologies The Ring Network: Computers are connected together to form a ring shape so that none of them is more important than any of the others.

  24. Network Topologies The Ring Network: • Advantages: • They are cheap to expand. • The data flows around the network in one direction so it is fast. It performs better than a star network when traffic is heavy. • There is no reliance on a central computer. • Disadvantages: • If there are a lot of users on the network, it could slow down as all the data is sent along a single line. • If one computer in the ring stops working, the whole network stops. • Adding a new computer may cause disruptions to the network.

  25. Network Topologies The Bus (or line) Network: Computers are connected like bus stops on a main road.None of them is more important than any of the others. The spine has cables which connect to each network.

  26. Network Topologies The Bus (Line) Network: • Advantages: • It is cheap as it uses the least amount of cable. • More computers can be added without disruption. • If one of the devices fails the network will continue to function as normal • No hubs/switches are required • Disadvantages: • With a lot of users, the network will be slow as data has to travel through the same central cable. • Failure of the central cable will stop the network from working. • It is difficult to troubleahoot when the whole network breaks down.

  27. Network Topologies The Star Network: Computers are connected like a star to a central hub/switch/server/router.

  28. Network Topologies The Star Network: • Advantages: • If a cable fails, it will only affect one workstation. • More computers can be added without disruption. • Disadvantages: • It is more expensive as it uses the most cabling. • Failure of the central computer/network device will stop the network from working.

  29. Hybrid Networks It is made up of star networks where each hub/switch is connected to one backbone. The backbone cable forms a bus-type network. The switches may also connect to each other forming multiple interconnected star networks.

  30. Network Topologies The Hybrid Network: • Advantages: • It employs the advantages of a star network and bus network • More computers can be added without disruption. • Disadvantages: • Sections can stop working if a hub/switch breaks down. • The whole network will not work if there is a fault in the spine.

  31. Intranets Local Area Networks are used for creating intranets. An intranet can be defined as a private company network that makes use of internet technology. It is for the use of members of that organisation. Users are given usernames and passwords Dedicated telecommunication links may also be used for linking different locations such as fibre optic cable and telephone lines. It uses internet protocols.

  32. Uses of Intranets • Providing local e-mail • Video conferences • Sharing information • Fast access to documents and statistics • Sharing diaries • Organising meetings • Discussion forums • Policy information

  33. Local e-mail and Business Networks • Intranets are very secure and businesses use them put up information that employees need to access. • Intranets reduce paper costs • Lan-based e-mail reduces the cost of printing • An ISP can be used for providing the e-mail service

  34. WLANs A WLAN uses either spread spectrum( a signal with an initially low bandwidth is spread to have a wider bandwidth) radio waves or infrared signals for communication. Computers or devices must have WNICs Devices can be added easily to the network problems with the WLANs include security issues, interference and poor speeds

  35. Wi-fi Wifi is short for wireless fidelity. Data is transmitted into radio signals and then transmitted. The wireless router decodes the signal. The following hardware devices are used: Wireless Network Cards Wireless Routers Wireless Access Points

  36. Wireless Network Cards • It transmits data as radio waves. Most laptops a fitted with WNICs by manufacturers • Desktop computers can also have these fitted • Most mobile devices have wireless NICs

  37. Wireless Router It converts data signals into radio signals as well as radio signals back to data signals. Features include: • Wifi protected access(WPA), a complexi encryption system • MAC address filtering and IP address filtering • Invisible mode

  38. Wireless Access Points They are used for connecting wireless devices to a wired network. They cover a limited area and number of computers. List Devices that have wireless capabilities:

  39. Methods of Data transmission • Spread spectrum radio waves are used for transmitting data by increasing its bandwidth.

  40. Methods of Data transmission contd. The same random number generators are used by the receiver and sender to generate random frequencies and stay synchronised. It allows computers and other devices to communicate through walls. Another method is to use infrared signals. As it pulses on and off it willl be transmitting data in bits. It is secure because it cannot be used across walls. There is also no interference. The main disadvantage of the system is the lack of range.

  41. WPAN • Pg 141-143 Don’t have to do network security.

  42. Network Security Network security is there to ensure that unauthorised users do not view data or understand it if they manage to intercept/access the data.

  43. Physical Security This prevents users from gaining physical access to computers. This can be achieved by: -Securing Computer Rooms- All doors and windows should be locked when computers are not in use. Burglar alarms may also be used. Some Servers are lockable. CCTVs can also be used for deterring thieves. Pass cards can be used for giving users different times and levels of access. -Security Guards for patrolling and responding to alarms.

  44. Software Security Most computer threats come from hackers who access computer systems remotely. The following methods may be used for preventing access: Firewall Encryption Digital Certification Authentication Techniques Anti-virus Software

  45. Firewalls A firewall can be in the form of hardware or software or a combination of both. Firewalls prevent unwanted network traffic from accessing a computer network. Packets of data are inspected and if their ip address/network address is not wanted then they are prevented from accessing the computer network. Domains, words, phrases can be filtered out. Packets with these phrases are prevented from entering the system. At school we have a firewall that does this.

  46. Encryption Encryption refers to encoding data by scrambling or encoding it. This is for preveting hackers from understanding data sfter intercepting it. The sending computer uses an encryption key for encoding data. The receiving computer has a decryption key for decoding it. Public key/Private key encryption is used. The sender computer uses the public key for encrypting data and the receiver will use a private key for decoding it.

  47. Digital Certification Digital certificates are issued by a certification authority. The authority certifies that both receiving and sending computers are who they say they are. Once certified each one may get the public key of the other.

  48. Authentication Techniques This can be achieved by using a for example a username and password, card and pin code, biometrics such as facial recognition and finger print scanners.

  49. Anti-virus software It is used to find viruses and remove them. The anti-virus software has a database to remove known viruses. One way is to scan the hard disk or monitor ports for suspicious behaviour. Actions taken by viruses include the following: -Repair the files -Quarantine the file by not allowing any program to access it. -Delete the file Anti-virus software must be updated regularly. Antivirus definitions are becoming longer

  50. Other Types Of Viruses • Trojan horses • Worms

More Related