Professional Documents
Culture Documents
ALP 3 HANDOUT NOTE TERM 1 2021 - Computer Network
ALP 3 HANDOUT NOTE TERM 1 2021 - Computer Network
COMPUTER NETWORKS
Eric L. Dzimabi
COMPUTER NETWORKS
A computer network is two or more computers, or other electronic devices, connected together
so that they can exchange data. For example a network allows computers to share files, users to
message each other, a whole room of computers to share a single printer, etc. The Internet itself
can be considered a computer network
This ranges from school/home networks of only few computers to large networks such as the
internet (which effectively allows any computer connected to it to communicate with any other
computer similarly connected)
Network Media
How are computers joined together?
Network media refers to the communication channels used to interconnect nodes on a
computer network. Typical examples of network media include copper coaxial cable, copper
twisted pair cables and optical fiber cables used in wired networks, and radio waves used in
wireless data communications networks.
In data communication terminology, a transmission medium is a physical path between
the transmitter and the receiver i.e it is the channel through which data is sent from one
place to another
Network connections between computers are typically created using cables (wires for
connections in buildings or same room), radio signals (wireless / wi-fi), for very long
distances, through telephone lines (and modems) and satellite links.
There are two types of computers that make up a computer network. These are
1. Servers
2. Clients
A server is a powerful computer designed to process requests and deliver data or provide services
to another computer (or client) over the computer network (either internet or a local network.).
Servers control the network and tell the client computers what to do
A client computer is a computer that connects to and uses the resources of a server. It can be a
desktop PC or laptop.
Types of Network
Advantages of LAN
1. Sharing of resources (such as expensive peripherals and application software)
2. Saves cost as each computer on the LAN can share resources
3. Ease of communication between users
4. A network administrator to control and monitor all aspects of the network (eg.
Changing passwords, monitoring internet use ,etc)
Disadvantages of LAN
1. Easier to spread viruses throughout the whole network
2. Printer queues develop, which can be frustrating
3. Increased security risk when compared to stand-alone computers
4. If the main server breakdown , in most cases the network will no longer function
COMPONENTS OF LAN
To connect computers to a LAN, you require
1. A server (File, web, print)
2. Network interface card
3. Hub/switches
4. System software.
5. Network cables.
NETWORK TOPOLOGY
It is the physical arrangements of the nodes in a network. The nodes may be a computer or a
device like a printer.
There are four common types of LAN network topologies:
1. Ring network topology,
2. Bus network topology,
3. Star network topology,
4. Tree network topology.
Page 4 of 17
Ring networks Topology
In this topology, every computer in the network is connected in a ring, including the server.
Each device is connected to 2 other devices to for a ring.
Data is transmitted around the ring in one direction, and
each computer only retrieves the data which is relevant
to it. . This allows each computer to send and receive
data since they all have a unique identification/address
Advantages
1. Cheap to install compare to star network
2. No data collision since data travels in one
direction
3. Ring networks work well under heavy loading.
4. It is possible to create very large networks using
this topology.
Disadvantages
1. If there is a fault in the wiring between two computers then the whole network breaks
down.
2. Adding a new device or computer to the network can be difficult since it has to be
placed between two existing devices.
3. The whole network doesn’t work if a single computer in the network is switched off
4. Difficult to identify faults
5. Data must pass through every computer until it gets to its destination. This can make
the network slow
The ends of the line have terminators to prevent, for example, signal bounce, which would
cause data interference
Advantages
1. It is easy to add a new computer or device to the network.
2. If one device or computer fails, it does not affect the rest of the network.
3. Doesn’t need a hub or a switch
4. Requires less cabling than a star network. It therefore also saves on costs.
Disadvantages
1. It is difficult to isolate any fault on the network.
Page 5 of 17
2. If the central line has a fault, the whole network fails.
3. Its performance worsens noticeably as more and more devices/ computers are added.
4. Problem arises when more than one user wishes to send a message at the same time.
To overcome this, the workstation checks first whether the bus is busy. If busy, then
the workstation has to wait
Star Topology
In this topology, each computer or device is connected via a central hub or switch. Data is
sent to the hub which then sends out data along every cable to every computer or device
Advantages
1. If one computer or device fails, then the rest of the network or other computer is not
affected
2. Problems on the network are easy to identify and work can be carried out on a faulty
device without affecting the rest of the network.
3. It is easy to expand the network.
4. Few data collision as each workstation has its own cable to the server
Disadvantages
1. If the central hub breaks down, the whole network crashes.
2. Expensive to install due to many cables
3. Usually needs experts to install. This can add to cost
4. Extra hardware like hub/switch needed. This adds to cost
5. Server crashed and no one can access their files
Page 6 of 17
WIDE AREA NETWORKS (WAN)
Wide Area Networks are used where
computers or networks are situated in a
long distance from each other
geographically (e.g. in a different city or
country or over 2km apart or
worldwide). A number of LANs in
different geographical regions can be
joined together using a router forms a
WAN. Example of a WAN is the
internet and network of ATMs used by
banks. Connection and communication
can be by telephone lines, satellite or
microwaves
Some Advantages of WAN
1. Computers can be connected over wide areas such as across cities or even continents
2. Files and data can be shared over a large area
3. People can use their computers to communicated very quickly over a large areas
(sending emails, discussion forums, video conferencing, etc)
Some Disadvantages of WAN
Page 7 of 17
Advantages of WLAN
1. All computers can access the same services and resources like printers, scanners,
internet access, from anywhere within the range of the APs
2. As there is no cabling there is improvement and increased flexibility to move around
or less likely to trip over cables
3. Adding new computers and services is very easy (all that is required is a WLAN
adapter)
4. the costs are reduced since extra cabling isn't needed
Disadvantages of WLAN
1. Problem of interference or Physical obstacles can interfere with signal/can cause
disconnection
2. Slow data transfer rate, compared to LAN
3. Can easily be hacked
BLUETOOTH (PERSONAL AREA NETWORK)
PAN is a wireless networking
technology designed for short-range
connections (typically just a few
meters). The idea of Bluetooth is to
get rid of the need to cables that
connect computers to peripheral
devices such as mouse, keyboard,
printers and so on
Page 8 of 17
Because Bluetooth networking only works over very short distances, and with devices
belonging to one user, this type of network is sometimes called a “Personal Area Network”
COMMON NETWORK DEVICES
1. Hub
2. Switch
3. Router
4. Network Interface Card (NIC)
5. Modem
6. Bridge
7. Network Cables
HUB
A hub is a hardware device that allows computers and
devices to plug into its ports in order to connect to each other
and share files, data and resources. Often they are used to
connect together a number of devices to form a LAN, eg a
Star Network Topology.
SWITCHES
Switches are similar to hubs, but they are more
efficient. Like hubs, Switches connect a number of
devices or computers together to form a LAN
Page 9 of 17
BRIDGE
ROUTER
A router enables data packets to be routed (or sent) between
the different networks (e.g. to join a LAN to a WAN). A Router
selects the best route to each data packet so that data travels as
quickly as possible to its destination
Page 10 of 17
MODEM
Modem is used to connect a computer or a network to the internet. Modem is
short term for “Modulator Demodulator”. This is device that converts a
computer’s digital signal into analogue signal (modulates) for transmission
over an existing telephone line
It also reverses this process and converts analogue signals from a telephone
line into digital signals (demodulates), to enable the computer to process the
data.Modems contain both ADC and DAC. Modems are essentially used to
allow computers to connect to networks (eg. Internets) over long distances
using existing telephone networks
NETWORK CABLES
Cables are used to connect together different devices to make up a network. They carry more
data-per-second than wireless technology hence they can transfer data faster than wireless,
and they are more secure (less open to hacking) than wireless connections
Page 11 of 17
PROXY SERVERS
A client connects to the proxy server, requesting some service, such as a file, connection, web
page, or other resource available from a different server and the proxy server evaluates the
request as a way to simplify and control its complexity and gets it for the client.
INTERNET AND INTRANET
INTERNET
This internet is a worldwide connection of computers and networks that allow users to send
and receive emails, chat online, transfer files from computer to computer (using FTP) or
browse the web
The web is part of the internet which the user can access through a web browser. The web
contains a wide range of information
Uses of the internet
1. View web pages on the WWW
2. Sending and receiving e-mail messages
3. Sharing files and information
4. Video conferencing and VOIP
5. Online banking
6. Play multi-player games
7. Listening to streamed music or watching streamed video
The World Wide Web (or the Web) is a collection of internet resources web documents,
hyperlinked text, audio, and video files, and remote sites that can be accessed and searched
by browsers based on standards such as HTTP and TCP/IP. To access the internet you need a
computer, router and an ISP
Page 12 of 17
INTRANET
The intranet is a computer network based on internet technology, but designed to meet the
internal needs for sharing information within a single organisation or company. Access to
an intranet is confined to a company or organisation and, unlike internet, is not available to
the general public
Intranets reside behind a firewall and are only accessible internally to members of the
company.
Intranet is behind a firewall, which gives Not possible to place a firewall on the
some protection against hackers, viruses, etc internet
Information is stored on local servers Information is stored on operator’s servers
Page 13 of 17
1. Dishonest staff/people may steal data in order to get back at the company
2. Theft of identity to steal others money
3. Spread of malicious software
4. Hackers may try to get access for fun
The first thing to do to ensure the security of the network is to keep the office doors locked to
prevent unauthorized people from physically accessing it.
Others are the use of:
1. User ID
2. Password (weak and strong)
3. Encryption
4. Authentication techniques (biometrics).
User ID usually goes with passwords. This assigns the user privileges once the logon
procedure is successful. For example, on a network, top level privilege would be for an
administrator, who is able to set passwords, delete files from the server, etc., whilst a user
privilege may only allow access to their own work area.
Password is a word or string of characters used for user authentication to prove identity or
access approval to gain access to a resource, which is to be kept confidential.
There are two types
1. Weak password
2. Strong password
A weak password is a password that is easy to guess. They contain only words or numbers.
They are usually the names of people or places
A strong password is a password that is difficult to guess. The consist of texts (upper cases
and lower cases), numbers and special characters.
ENCRYPTION is the converting of data into a code by scrambling it or encoding it. This is
done by employing encryption software (or an encryption key). Since the data is all jumbled
up it appears meaningless to a hacker or anyone who illegally accesses the data. It should be
stressed that this technique does not prevent illegal access, it only makes the data useless to
somebody if they don’t have the necessary decryption software (or decryption key). It is used
to protect sensitive data (such as a person’s banking details).
AUTHENTICATION TECHNIQUES
As shown above, there are many ways in which a computer user can prove who they are.
This is called authentication, and a type of authentication is used in the banking example
that follows. Most systems adopt the following authentication logic:
something you know – e.g. PIN/password
Page 14 of 17
something belonging to you – e.g. your bank card
something unique to you – e.g. your fingerprints.
At least two of these are needed at the moment when a user has to prove who they are.
For example, the following banking example uses:
something you know – surname, reference number, PIN, date last logged on
something belonging to you – card put into card reader to produce the 8-digit code.
In future, the third feature will be introduced (such as a fingerprint scanner attached to a
computer to uniquely identify the user).
COMMUNICATION METHODS
Many methods of communication using networks exist. These include
1. Fax,
2. Email,
3. Video conferencing and
4. VOIP.
FAX
The term fax is short for the word ‘facsimile’. With this system, documents are scanned
electronically and converted into a bit map image (a bit is a binary digit and is a 1 or a 0).
This is then transmitted over a telephone line as a series of electrical signals through the
telephone network. The receiving fax machine converts this electronic image and prints it out
on paper.
Fax/modem software in the computer converts the image into a form recognised by a fax
machine. However, this is not as efficient as the email system where the electronic copy is
sent and is then stored electronically thus permitting the document to be edited, for example.
Advantages
1. Fax documents cannot be hacked whilst it is being transmitted
2. Fax documents cannot be affected by viruses
3. Fax signed documents are legally accepted
Disadvantages
1. Paper can jam in the fax machine
2. Receiving fax line may be engaged continually
3. Receiving fax may be out of paper
4. Fax document can be sent to one place at a time
5. There is loss of quality in transmission (not so clear)
EMAIL
This is an electronic method for sending text and attachments from one computer to another
over a network
The advantages of using email include:
1. the speed of sending and receiving replies using the email system
2. the low cost, since stamps, paper and envelopes are not needed
3. not needing to leave home to send the mail.
Disadvantages include:
1. the possibility of virus threats and hacking
2. the need for the email address to be completely correct
Page 15 of 17
3. the inability to send bulky objects via emails.
VIDEO CONFERENCING
This is a communication method that uses both video and sound. It is a substitute for face-to-
face conferences between a number of people, who may be in a different part of the country
or live overseas. It is carried out in real time and makes use of some form of network. The
delegates at one end speak into a microphone and look at a webcam. The other delegates can
see them and hear them using large monitors and speakers
Hardware includes:
1. Webcam
2. Large monitors/television screens
3. Microphones
4. speakers
Potential issues with video conferencing
1. Potential time lag in responses (delays when talking)
2. Jerking images
3. Very expensive to set up in the first place
4. Difference in time zones can cause scheduling problems
5. Training cost
6. Bad network connection can make the conference unsuccessful
Advantages of Video conferencing
1. Possibility of holding conferences at short notices (conference date can be set up
within a few hours as no person needs to travel far)
2. Not travelling physically to meeting reduces travelling cost
3. Helps people with disability
4. No need to pay for hotel accommodation or venue hire
5. Reduces the cost of taking people away from their work for 2 or 3 days to travel
(people are still paid their wages even though they were not in the office, so this is a
large hidden cost)
6. Better to use video conferencing than have delegates travel to potentially unsafe
places around the world
The system also uses special software such as:
1. CODEC, which converts and compresses analogue data into digital data to send down
digital lines
2. Echo cancellation software, which allows talking in real time and synchronises
communications.
Page 16 of 17
Advantages
1. is that it is either free (if the talking is done computer to computer, i.e. both computers
have VOIP telephones or use their built-in/plugged-in microphones and speakers) or
at a local rate to anywhere in the world
2. No telephone line is needed. To work in real time this system requires a broadband
ISP.
3. Can include video
Disadvantages
1. Are usually sound quality (echo and ‘weird sounds’ are both common faults).
2. Not as reliable as normal phone calls, so cannot be relied upon for emergency calls.
3. Security is also a main concern with VOIP, as it is with other internet technologies.
The most prominent security issues over VOIP are:
i. identity and service theft
ii. viruses and malware (malicious software)
iii. spamming (sending junk mail)
iv. phishing attacks (the act of sending an email to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam them.
Page 17 of 17