Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 53

Networks and the effects of using

them
What is a network?
• A computer network consists of two or more
computers or electronic devices such as printers
that have been linked together in order to share
data

• Computers not connected to a network are


known as stand-alone computers
What do networks enable us
to do?
 they allow the sharing of resources such as hardware (e.g. printers
and scanners) and software (e.g. word processors and photo editing
software)
 they permit easy communication between users of the LAN (e.g. by
using simple text messaging between computers on the network)
 they use a network administrator that ensures security and use of the
LAN is constantly monitored (e.g. the administrator can maintain
passwords and also monitor data traffic within the network)
Important Network terms
NIC
MAC address
IP address
Data packet
Network interface card

A network interface card (NIC) is needed to


allow a device to connect to a network.

 Each NIC is given a unique hardwired (or hard-coded) media


access control (MAC) address at the manufacturing stage.
When installed in a device, this uniquely identifies that
device.
MAC address
• The media access control (MAC) address is a number
which uniquely identifies a device when it is
connected to a network

• The MAC address is sometimes referred to as the


physical address because it uniquely identifies a
device. MAC addresses are useful when trying to
identify
IP Address
• Whenever a computer connects to the internet it is given an internet
protocol (IP) address. This is usually assigned to the computer by the
internet service provider (ISP).

• Internet protocols define the rules that must be agreed by senders


and receivers of data communicating through the internet. An IP
address essentially identifies the location of a device on a network.
Difference between MAC and
IP
• This means that if you are using your laptop at home, it will have been
given an IP address when it connected to the internet. If you now take
your laptop to a coffee shop, and log into the internet again, it will be
assigned a new IP address. Unlike the MAC address which remains
constant, the IP address changes each time you log in at different
locations
Data Packet
• Data is moved around networks in the form of data packets.
• Whenever a user sends some data, it is split up into a number of
packets and each packet is transmitted separately.
• Packets of data will usually have a header which contains:
» the sender’s IP address
» the receiver’s IP address
» the sequence/identity number of the packet (this is to ensure that all the
packets can be reassembled into the correct order once they reach the
destination)
» the packet size (this is to ensure the receiving station can check if all of the
packets have arrived intact)
» how many data packets make up the whole message.
Differentiate between hub
and Switch
Hubs Switch
Hubs
Hubs are Hardware devices that can have a number of
other
devices
They areconnected to themto connect devices together to form a
used primarily
local
area network (LAN). Often in the same building
A hub will take a data packet received at on of its ports
and
broadcast it to every device connected to it
Hubs
Hubs
Because data packets are delivered to every device in the
network : not very secure because every device will receive every
1. hubs are
data packet
2. there will be unnecessary traffic on the network, result
in
reduces bandwidth
Switches
Switches are Intelligent versions of hubs. They connect a number
of
devices together to form a LAN, However, unlike a hub, a switch
stores the MAC
Each port on theaddress of all devices
switch connected willon the anetwork.
have matching
MAC
address called a look-up table.
Port number MAC address
1 A4-00-22-a4-fe-d1
Switches
Using the look-up table, a switch matches the MAC address of
an
incoming data packet arriving at one of its ports, and directs it
to
the correct device.
Port number MAC address
1 A4-00-22-a4-fe-d1
Switches
Switches
Switches are more secure than hubs, and do not waste bandwidth

Hubs and switches are used to exchange data within their own
network (LAN) they are unable to exchange data with outside
networks (such as the internet) because a device is needed to read
IP addresses.
Hubs Switch

- both hubs and switch are used to connect devices in a


LAN
- both
Hubshubs
send and
dataswitches
packets use data packets
to every device on the network,
switches send data packets to a specific device only
whereas
- Security is lower with hubs than with switches
- A switch uses a look-up table to determine the destination
- switches use Mac addresses to locate the destination device
Bridges

Unlike routers, bridges cannot communicate with other


external
networks such as internet.
Routers
Routers are used to route data packets from one network to
another network. Based on IP addresses.
It can do this because each router has its own IP address.

Routers are used to join a LAN to the


internet.
Routers- how routers work
.When a data packet is received at one of its ports, the router
inspects the IP address and determines whether the data packet
is
meant for its own network or for another, external network
.If the data packet is meant for its own network then the data
packet is routed to the local switch or hub
.Routers know where to send data packets by consulting a
routing
table (stored on the router’s RAM)
Routing table
.The routing table will contain information about the
router’s
immediate
.When network
a data packet (reaches
computer addresses)
a router, it examines the IP address.
.Routers do not store the MAC addresses, only IP addresses for
all
computers on its network
Comparison between routers and bridges
Router Bridge
The main objective of a router is to The main objective of a bridge is
connect various types of network to
together connect LANs together
Routers can scan a device’s IP address Bridges scan a device’s MAC
address
A routing table is used to direct data Bridges do not make use of
packets
routing to the correct device tables
A router more than two ports A bridge has only two ports
Wi-Fi and
Bluetooth
Both offer wireless communication between devices.
They use electromagnetic radiation as the carrier of
data
transmission
Both Wi-Fi and Bluetooth can be used to enable devices
to
communicate
Describe wirelessly.in how Bluetooth and Wi-Fi both
the differences
operate
Bluetooth

It sends and receives radio waves in a band of 79 different


frequencies
known as
Devices channels.
use These
Bluetooth are centered
automatically on aand
detect frequency
connectofto2.45
eachGHz
other.
But they do not interfere with other devices because each
communicating pair uses a different channel
To minimize the risk of interference with other devices, the devices
constantly change the channel they are using several times a second
this
is known as (Spread spectrum frequency hopping)
Bluetooth

Bluetooth uses key encryption to create a secure wireless personal


area network (WPAN)
Uses of Bluetooth
.It is useful when transferring data between two or more devices
which are close
.When the speed of transmission is not critical
.For low bandwidth applications( example when sending music
files
from mobile phone to headset)
Wi-Fi
•Sends and receives radio waves in several different frequency bands
GHz and 5 GHz. The band is also split into channels. The 5 GHz band
2.4
ahas
faster transfer rate but a shorter signal
rate
•Wi-Fi is best suited to operating full-scale network because it
much faster data transfer , better range and better security
offers
Bluetooth
than

•A Wi-Fi enabled device (such as smartphones and laptops) can


the internet wirelessly at any access point (AP) or hot spot up to
access
meters
100
Wi-Fi and
Bluetooth
Feature Bluetooth WiFi
Transmission frequency 2.4 2.4, 3.6, 5.0 GHz
GHz
Data transfer rate 25 Mbits/second 250 Mbits/second
Maximum effective range 30 meters 100 meters
Maximum number of Up to 7 Depends on the router
devices
Type of data transmission Key matching encryption WEP (wireless
security
equivalent privacy) / WPA (Wi-
Fi
protected access)
Cloud computing (storage)
• It is a method of data storage where data is stored on
remote servers
• There may be thousands of servers in many
locations
different
• Data is stored on more than one server incase of
maintenance or repair, allowing clients to access data at
any
time(data redundancy)
• The physical environment of the cloud servers is
and managed by a hosting company
owned
Disadvantages of cloud computing
•Security aspects of storing data
•If the customer has slow or unstable internet connection, they
could have many problems accessing or downloading the data
•Costs can be high if a large storage capacity or
high
download/upload
•The dataoftransfer
potential failure the cloudis storage
requiredcompany is
always
possible- this poses a risk of loss of all backup data
Tablets, laptops and mobile phone manufacturers
encouraging customers to store or backup all their files
on to cloud storage. This has obvious advantages:
• don’t have to carry memory sticks around to access data
•Do not have to p for storage capacities for tablet or mobile
phone
•Reduce possibility
•Ability to of losing
synchronize data as they
files ensures data are
andautomatically
files are backed-up
updated
across
•For all devices purposes (several users allowed to edit
Collaboration
and
collaborate on a single file or document)
Types of Networks
•LAN
•WLAN
•WAN
•Internet
WLA
•N
most commercial LANs need several
Aps
to permit uninterrupted wireless
communications(Aps use either spread-
•spectrum technology
The AP receives andor infrared)data
transmits
between the WLAN and the wired
network structure. End-users access
the
WLAN through wireless LAN adapters
which are built into their devices
What are the advantages and disadvantages of
networked computers (LANs)?
(same advantages and disadvantages of networks)
Advantages disadvantages
• Allow the sharing of resources( hardware • Easier spread of viruses throughout the
and software) whole network
• They permit easy communication between • Queues for shared resources ( such
as users of the LAN (e.g using text messages) printers)
• They use a network administrator • Slower access to external network
that
ensures security and use of the LAN is
constantly monitored • Increased security risks when compared to
stand-alone computers
• If the main server breaks down, in many
types of network structures, the network
will no longer function properly
Compare wired LANs and Wireless

LANs Wireless networking
Wireless connectivity is often subject to
Wired networking
• Using cables produces a more reliable and
interference from external resources stable network
• No cabling, so there is a safety improvement • Having lots of wires can lead to a number of
and increased flexibility hazards, tripping hazards, over heating
connections leading to potential fire risk
• Gives devices increased mobility as long as they • Cabled networks use the lose the ability
forare within a range of the APs devices to be more mobile
• Data transmission rate is still slower than • Data transfer rate tend to be faster and there
forcabled networks will not be and dead spots
• Easier to expand the network (not necessary to • Setting up cabled networks tends to be
connect using cables)
cheaper overall

• Data is less secure than with wired systems,


easier to intercept radio waves than cables
• Possible for signals to be stopped by thick walls
(areas of signal length leading to drop out)
Authentication Methods
•IDs and passwords
•Zero login
•Biometrics
•Magnetic stripes
•Smart cards
•Physical tokens
•Electronic tokens
Network
communication
Web Audio
conferencing conferencing

Video
conferencing
Video conferencing

•Essential to agree a time and date for the conference to take place
•The delegates in each conference room must log into the video conference system
•Webcams need to be placed in the correct position
•Microphone needs to be placed centrally
•One person must be the main contact in each conference room
•Software plays an important role in a successful video
conference
Video conferencing
Advantages disadvantages

• Possible to hold conferences at short notice • Potential time lag/ delays when talking
• Not travelling physically to a meeting can result • Images can jerk due to poor connection
in :
• Expensive to set up (both hardware and
- Reduced travelling costs and time
- No need to pay for hotel accommodation software)
- Reduces the cost of taking people away from their • Different time zones if delegates live
in
work different countries
• Connects people who is far • Training people to use the system correctly
• Better in the case of unsafe places (time and money consuming)
• Demotivation and lack of personal contact
• The whole system relies on a good network
connection- if breaks down the conference is
unusable
Audio conferencing
Refers to meetings held between people using audio (sound equipment). Can
be done over the standard telephone network or the computer, as long as a
microphone and speakers are connected using VoIP
Procedure carried:
• Organizer is given two PINS
• Participants are informed with their PIN, time and date
• The organizer dials the conference phone number and keys in the personal
PIN
• The participants call the same conference number to join and input their
PIN
Web conferencing (Webinar)

You might also like