Professional Documents
Culture Documents
Computer Network
Computer Network
Computer networking refers to interconnected computing devices that can exchange data
and share resources with each other.
N. LOKEDIA 1
2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a computer network that connects
computers through a common communication path, contained within a limited area, that is,
locally. A LAN encompasses two or more computers connected over a server. The two
important technologies involved in this network are Ethernet and Wi-fi. It ranges up to
2km & transmission speed is very high with easy maintenance and low cost.
Examples of LAN are networking in a home, school, library, laboratory, college, office, etc.
N. LOKEDIA 2
4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer
network that connects computers over a geographical distance through a shared
communication path over a city, town, or metropolitan area. This network mainly uses
FDDI, CDDI, and ATM as the technology with a range from 5km to 50km. Its transmission
speed is average. It is difficult to maintain and it comes with a high cost.
Examples of MAN are networking in towns, cities, a single large city, a large area within
multiple buildings, etc.
N. LOKEDIA 3
Paramet PAN LAN CAN MAN WAN
ers
Full Personal Area Local Area Campus Metropolitan Wide Area
Name Network Network Area Area Network
Network Network
Technolo Bluetooth, Ethernet & Ethernet FDDI, Leased Line,
gy IrDA,Zigbee Wifi CDDi. ATM Dial-Up
Range 1-100 m Upto 2km 1 – 5 km 5-50 km Above 50 km
Transmis Very High Very High High Average Low
sion
Speed
Ownershi Private Private Private Private or Private or
p Public Public
Maintena Very Easy Easy Moderate Difficult Very Difficult
nce
Cost Very Low Low Moderate High Very High
The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
An example of a MAC address:
o Microsoft has an OUI of 00-15-5D,
o a new laptop straight out of a Microsoft production line could have a MAC
address of “00-15-5D-45-1B-3F”
Hubs
Hubs are devices that allow several other devices to be connected to them
N. LOKEDIA 4
Hubs are generally much cheaper than switches but:
o When a hub receives a data packet it will broadcast it to every device on the
network
This creates two potential issues:
o As the information is being broadcast to every device it will make unnecessary
traffic especially if there are a large number of devices
o As every device will receive the data packet, security may be a concern
Switches
Switches are also used to connect several devices together just like a hub; however,
rather than sending data packets to all devices on the network, the switch will only
send the data to its intended device
1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
3 00-4B-17-7C-A2-C9
N. LOKEDIA 5
When a switch receives a data packet, it examines the destination MAC address of
the box and looks up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to
the corresponding port
Bridges
Bridges are used to connect two networks or network segments to create a single
larger network
An important note is that a bridge cannot communicate with external networks such
as the internet like a router can
ROUTER
CLOUD COMPUTING
N. LOKEDIA 6
Security of computer network
1. Encryption: encryption is a process of turning information and data(text)
from readable form(plain text) into unreadable form(cypher text) that only the
intended recipient can decrypt and read.
The most common method of encryption us is asymmetric encryption that uses
two different keys- public key and private key
2. Firewall: they are software or hardware devices that block unauthorized
access to a computer network.
3. Authentication: it is a process of proving to be true, genuine or valid. The
primary method of authentication is Password.
Password; it is a secret word that most be use to gain access to a place.
Strong password.
Contain both number and letters, special characters
Should be at least eight character long
Contain upper and lower case letter
Must never be written down
Change regularly
Never be share with somebody
a. Physical Identification: This technique includes machine-readable
badges(symbols), cards, or smart cards. In some companies, badges are
required for employees to gain access to the organization’s gate. In
many systems, identification is combined with the use of a password
i.e the user must insert the card and then supply his /her password. This
kind of authentication is commonly used with ATMs. Smart cards can
enhance this scheme by keeping the user password within the card
itself. This allows authentication without the storage of passwords in
the computer system. The loss of such a card can be dangerous.
b. Biometrics: This method of authentication is based on the unique
biological characteristics of each user such as fingerprints, voice or
face recognition, signatures, and eyes.
A scanner or other devices to gather the necessary data about the user.
Software to convert the data into a form that can be compared and stored.
A database that stores information for all authorized users.
c. Facial Characteristics – Humans are differentiated on the basis
of facial characteristics such as eyes, nose, lips, eyebrows, and
chin shape.
d. Fingerprints – Fingerprints are believed to be unique across the
entire human population.
e. Hand Geometry – Hand geometry systems identify features of
the hand that includes the shape, length, and width of fingers.
f. Retinal pattern – It is concerned with the detailed structure of
the eye.
g. Signature – Every individual has a unique style of handwriting,
and this feature is reflected in the signatures of a person.
N. LOKEDIA 7
h. Voice – This method records the frequency pattern of the voice
of an individual speaker.
i. Token-based authentication
ELECTRONIC CONFERENCE
Electronic conference is is meeting between individuals who are not in the same location
using communication technology
Audio conference: meeting with different people in different location to speak to each other
but can not see each other.
Video conference: meeting with different people in different location to speak to each other
and can see each other while talking
A web conference is an online meeting that involves audio and video
communication between people worldwide.
The three most cited types of web conferences are:
Webcasts
Webinars
Peer-level web meetings
A webcast is a live broadcast over the internet that does not allow for any
interaction with the audience.
You can usually connect to a web conference from your desktop, laptop,
tablet, or mobile device.
…………………………………………………………………………………………………..
N. LOKEDIA 8
Advantages and disadvantages of video and web conference
N. LOKEDIA 9