What Is A Network
What Is A Network
What Is A Network
Store data centrally (using a file server) for ease of access and back-up
4. Computers in a Network
Clients
Client computers, or workstations, are the normal computers that people sit at to get their work done.
Servers
Servers are special, powerful computers that provide ‘services’ to the client computers on the network.
Sharing Internet connections
Servers are built to be very reliable. This means that they are much more expensive that normal computers.
In a small network one server might provide all of these services. In a larger network there might be many servers
sharing the work.
Because LANs are geographically small, they usually use cables or low-power radio
(wireless) for the connections.
At the centre of the WLAN is a wireless switch or router - a small box with one
or two antennas sticking out the back - used for sending and receiving
data to the computers. (Most laptops have a wireless antenna built into
the case.)
A WAN is often created by joining several LANs together, such as when a business that has offices in different
countries links the office LANs together.
Because WANs are often geographically spread over large areas and links between computers are over long
distances, they often use quite exotic connections technologies: optical fibre (glass) cables, satellite radio
links, microwave radio links, etc.
The Internet is an example of a global WAN .In fact it is the world’s largest WAN.
Computers on the International Space Station are linked to the Internet, so the you could say the the Internet is now
the first off-planet WAN!
Bluetooth is a wireless networking technology designed for very short-range connections (typically just a few
metres).
The idea of Bluetooth is to get rid of the need for all of those cables (e.g. USB cables) that connect our computer to
peripheral devices such as printers, mice, keyboards, etc.
Bluetooth devices contain small, low-power radio transmitters and receivers. When devices are in range of other
Bluetooth devices, they detect each other and can be 'paired' (connected)
Because Bluetooth networking only works over very short distances, and with devices belonging to one user, this type
of network is sometimes called a 'Personal Area Network'
6. LAN Topologies | IGCSE ICT
The word topology means ‘arrangement’, so when we talk about the topology of a network, we mean how the
different parts are arranged and connected together.
Bus Network
A bus network…
Ring Network
A ring network…
Can cope with a break in the ring cable since all computers are still
joined together (it is now a bus network)
Star Network
At the centre of a star network you might use a hub (cheap, but slower) or
a switch (more expensive, but faster).
A star network…
Is very fast since each computer has its own cable which it doesn’t need to share
Can cope with a broken cable (only one computer will be affected)
Hybrid Network
E.g. A network that has several star networks linked togetheris a hybrid network
7. Networking Hardware
Any computer that is to be connected to a network, needs to have a network interface card (NIC).
Most modern computers have these devices built into the motherboard, but in some computers you have to add an
extra expansion card (small circuitboard)
Some computers, such as laptops, have two NICs: one for wiredconnections, and one
for wirelessconnections (which uses radio signals instead of wires)
In a laptop, the wireless radio antenna is usually built in to the side of the screen, so you
don't need to have a long bit of plastic sticking out the side of your computer!
Network Cable
Cables are still used in most networks, rather than using only wireless, because they can carry much more data per
second, and are more secure (less open to hacking).
The most common type of network cable cable in use today looks like the one shown above, with plastic plugs on the
ends that snap into sockets on the network devices.
Inside the cable are several copper wires (some used for sending data in one direction, and some for the other
direction).
Hub
Hubs are pretty much obsolete now (you can't buy them any more), having
been superseded by cheap switches.
Switch
A switch, like a hub, is a device that connects a number of computers together to make a LAN.
The typical use of a switch is at the centre of a star network (or as part of a hybrid network) - the switch has cables
plugged into it from each computer.
A switch is a more ‘intelligent’ device than a hub: if it receives a message, it checks who it is addressed to, and only
sends it to that specific computer. Because of this, networks that use switches are more secure than those that use
hubs, but also a little more expensive.
Router
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to computers on the LAN.
Alternatively, the LAN connection might be wireless (WiFi), making the device a wireless router. (A wireless router is
actually a router and wireless switch combined)
Routers are the devices that join together the various different networks that together make up the Internet.
These routers are much more complex than the one you might have in your home
Proxy Server
Other computers can request a web page via the proxy server. The proxy server will then get the page using its
Internet connection, and pass it back to the computer who asked for it.
Proxy servers are often used instead of router since additional softwarecan be easily installed on the computer such
as anti-virus, web filtering etc.
Bridge
Whereas a router is usually used to link a LAN to a WAN (such as the Internet), a bridge links independent parts of a
LAN so that they act as a single LAN.
Firewall
A firewall is a device, or a piece of software that is placed between your computer and the rest of the network
(where the hackers are!)
If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN
and the Internet connection.
A firewall blocks unauthorised connections being made to your computer or LAN. Normal data is allowed through
the firewall (e.g. e-mails or web pages) but all other data is blocked.
In addition to physical devices, firewalls can also be software.
In fact most computer operating systems have a software firewall built in (e.g. Windows, Linux and Mac OS)
Modem
Before the days of broadband Internet connections, most computers connected to the Internet via telephone
lines (dial-up connections).
The problem with using telephone lines is that they are designed to carry voices, which are analogue signals. They
are not designed for digital data.
The solution was to use a special device to join the digital computer to the analogue telephone line. This device is
known as a modem.
The DAC in the modem is required so that the digital computer can send data down the analogue telephone line (it
converts digital data into noises which is exactly what the telephone line is designed to carry.)
The ADC in the modem is required so that the analogue signals (noises) that arrive via the telephone line can be
converted back into digital data.
The reason telephone lines were used is that almost every building in the world is already joined to every other via
the telephone system.
Using the telephone system for connecting computers meant that people didn’t have to install new wires to their
houses and offices just for computer use.
In the last few years however, this is exactly what people have done. Special cables have been installed just for
Internet access.
These special cables are designed to carry digital data, so no modem is required.
If you have ever used a dial-up connection, you have probably heard the noises sent by the modem down the
telephone line.
The Internet is a world-wide network that has grown and evolved from an experimental network (ARPANet) created
by the US military back in the 1960s. Over the years, as more and more computers and networks have connected to
this network, it has grown into the Internet that we know today.
The Internet connects millions of people, and thousands of businesses, governments, schools, universities and other
organisations.
The Internet provides the network connections that links computers together. There are many ways that we can use
these connections:
Sharing files
Playing multi-player games
An intranet is the name given to a private network that provides similar services to The Internet: e-mail, messaging,
web pages, etc.
However, these services are only for the users of the intranet – they are private, not public (unlike Internet services
which are generally public).
A separate wireless access point (or this could be part of the switch) - to allow wireless devices (e.g. laptops
or smart-phones) to join the network
Possibly a bridge if you already have a section of network and you want your new network to connect to it
For any network that is more complex than a small home network, there is a lot to do.
It's not just a case of buying the parts and connecting them together...
Etc...
Networks are pretty complex thing to set-up. The people who do this are called Network Engineers. It's a very
interesting technical job, if you like that sort of thing!
11.Network & Data Security | IGCSE ICT
As soon as your computer is connected to a network, you have to start thinking about security – security of your
files, information, etc.
A network allows a person who does to have physical access to your computer (they are not sitting in front of it)
to gain access all the same. If your computer is connected to a network, other people can connect to your
computer.
A person who gains unauthorised access to a computer system is often called a hacker.
There are a number of security measures that you can take to prevent hackers accessing your computer and all of
the data stored on it:
Physical Security
The first thing to make sure of is that no unauthorised people can physically access (sit down in front of) any of the
computers on your network.
The most common way to protect your computer’s data is to setup user accounts with usernames and passwords.
Anyone not having a username, or not knowing the correct password will be denied access.
For this to be effective passwords must be chosen that are not easy to guess. Passwords should be a random
combination of lowercase letters, uppercase letters and numbers (and symbols if this is allowed):
Strong passwords are often hard to remember. Here is a good method for creating a password that is very strong,
but also easy to remember:
mfficic
Change some letters to similar numbers: I to 1, o to 0, s to 5, etc. and make some letters (e.g. the first and last)
uppercase…
Mff1c1C
A random-looking mixture of letters and numbers. As long as you like chocolate ice cream you will never forget your
password!
A firewall is a device, or a piece of software that is placed between your computer / LAN and the rest of the
network / WAN (where the hackers are!)
Often we have data that is private or confidential. This data needs to be protected from being viewed
by unauthorised people. This is especially true if the data is to be sent via a public network such as The Internet.
Data Encryption
Encryption is the process of converting information into a form that is meaningless to anyone except holders of a
‘key’.
For example, if Alice wants to send important, personal messages to Bob, she must go through the following steps...
Military leaders as far back as roman times have used encryption to protect important messages sent to their armies,
messages that must be kept secret from the enemy.
If the messenger was caught by the enemy, the message, being encrypted, remained secret because they didn’t know
the code to decrypt it.
First Alice needs to generate a secret ‘key’.
The encryption scheme shown here is called Symmetric Key, or Single Key encryption.
There are many better schemes, such as Public Key Encryption, but the one shown here is the easiest to understand!
Alice must then give a copy of this key to Bob. She must make sure that nobody else can get to the key
(So maybe Alice will visit Bob and give him a copy of the key on a memory stick or floppy disc).
Now that Bob has a copy of the key, each time Alice needs to send him a message she starts by encrypting it using
special encryption software and the secret key.
The encrypted message now looks like a jumble of random letters and numbers.
She can use a public network like the Internet, since, even if it gets stolen, the encrypted message cannot be read or
understood without the key.
When Bob receives the message, he uses special decryption softwareand his copy of the secret key to decrypt the
message.