Networks and The Effects of Using Them
Networks and The Effects of Using Them
Contents
1 Introduction........................................................................................................................................3
1.1 Uses of networks........................................................................................................................3
1.2 Advantages of using networks...................................................................................................3
1.3 Disadvantages of using networks...............................................................................................3
1.4 Points to note while using a computer connected to The Internet..............................................4
2 Networks............................................................................................................................................4
2.1 Computers in a network.............................................................................................................4
2.1.1 Client...................................................................................................................................4
2.1.2 Server..................................................................................................................................4
2.2 Network Hardware.....................................................................................................................5
2.2.1 Network Interface Card (NIC)............................................................................................5
2.2.2 Network Cable....................................................................................................................5
2.2.3 Hub......................................................................................................................................6
2.2.4 Switch..................................................................................................................................6
2.2.5 Bridge..................................................................................................................................6
2.2.6 Router..................................................................................................................................6
2.2.7 Proxy Server........................................................................................................................7
2.2.8 Firewall...............................................................................................................................8
2.2.9 Modem................................................................................................................................8
2.2.10 Gateway...........................................................................................................................9
2.3 Some Network Terminologies....................................................................................................9
2.3.1 MAC (Media Access Control) Address..............................................................................9
2.3.2 IP (Internet Protocol) Address............................................................................................9
2.3.3 Uniform Resource Locator (URL)....................................................................................10
2.4 Wi-Fi and Bluetooth.................................................................................................................10
2.4.1 Bluetooth...........................................................................................................................10
2.4.2 Wi-Fi.................................................................................................................................10
2.4.3 How to set up and configure a small network...................................................................11
2.5 Internet, Intranet, Extranet........................................................................................................12
2.6 Local Area Networks (LAN) and Wide Area Networks (WAN).............................................12
2.6.1 Local Area Networks........................................................................................................12
2.6.2 Wide Area Networks (WAN)............................................................................................13
2.6.3 Wireless LAN (WLAN)....................................................................................................14
2.7 Accessing the Internet..............................................................................................................14
3 Network Issues and Communication...............................................................................................15
1 Introduction
A network is two or more computers or other electronic devices connected together so that they can
exchange data. A network allows computers to:
Share resources, like printer
Share files
Send messages to other computers on the network.
2 Networks
2.1 Computers in a network
2.1.1 Client
These are normal computers that we use to get our work done. The computers that we normally use are
all clients.
2.1.2 Server
Servers are special, powerful computers that provide ‘services’ to the client computers on the network.
These services might include:
Providing a central, common file storage area (File Server)
Sharing hardware such as printers
Controlling who can or can’t have access the network
Sharing Internet connections
Servers are built to be very reliable. This means that they are much more expensive that normal
computers. In a small network one server might provide all of these services. In a larger network there
might be many servers sharing the work.
NOTE: When we use a web browser, we are in fact using a web client.
When we type in the URL of a web page, we are actually providing the
address of a Web server. For example, www.Instagram.com is the
address of the Instagram’s web server. Our web browser/client asks
this server for the web page you want, and the server ‘serves’ the
page back to the browser/client for you to see.
2.2 Network Hardware
2.2.1 Network Interface Card (NIC)
A network interface device connects a computer to a network. Most
modern computers have NIC built into their motherboard.
Some computers have two NICs, one for
wired connections and another for wireless
connections. In a laptop, wireless radio
antenna is built into the side of the screen, so
that a long bit of plastic doesn’t stick out the side of the laptop.
2.2.2 Network Cable
To connect together different devices to make up a network, one needs cables or wireless technology.
Even though wireless connections have been around for a long time now, most networks make use of
data cables to establish computer networks.
Cables are still used in most networks, rather than using only wireless, because they can carry much
more data per second, and are more secure (less open to hacking).
The most common type of network cable in use today are copper
wires encased in plastic casing. Most come with plastic plugs on the ends that snap into sockets on the
network devices. Inside the cable are several copper wires (some used for sending data in one
direction, and some for the other direction).
2.2.3 Hub
A hub is a device that
can have a number of
computers or other
resources attached to it.
They are often used to
create a local network.
(See below, does it look
like a star to you?)
Whenever a computer
sends a message (fancy
name: data packet), the hub broadcasts the message to every device connected to the network. It is a
‘dumb’ device. It is not very secure. It is more or less rendered obsolete by newer, better hardware.
2.2.4 Switch
A switch is like a hub in that, it is a device that can
have a number of computers or other resources attached to
it to create a local network. It is more ‘intelligent’ than a
hub. It checks the data packet for the destination
address (MAC Address) and sends it only to the intended
device. It is more secure than a hub.
2.2.5 Bridge
A bridge is a device that connects two different local networks together, so that they behave as a single
local network.
2.2.6 Router
A router is a device that connects two or more different networks together. It is typically used to
connect a local network to the Internet or a larger network.
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to
computers on the local network. Alternatively, the LAN connection might be wireless (WiFi), making
the device a wireless router. (A wireless router is actually a router and wireless switch combined)
When a message (data packet) arrives at a router, it inspects the data packet for its address (IP
Address). Since all the computers on the same network have the same IP Address, router can send the
data packet to the appropriate switch. The Switch then uses the MAC address to deliver the data packet
to destination computer. If MAC address doesn’t match, it passes on to another switch until the
appropriate switch is found.
2.2.7 Proxy Server
A proxy server is a computer
setup to share a resource,
usually an Internet
connection.
Other computers can request
a web page via the proxy
server. The proxy server will
then get the page using its
Internet connection, and pass
it back to the computer who
asked for it.
Proxy servers are often used
instead of router since additional
software can be easily installed on
the computer such as anti-virus,
web filtering etc.
2.2.8 Firewall
A firewall is a device, or a piece
of software that is placed between
your computer and the rest of the
network (where the hackers are!)
If you wish to protect your whole LAN from hackers out on the Internet, you would place a
firewall between the LAN and the Internet connection.
A firewall blocks
unauthorised
connections being made
to your computer or LAN.
Normal data is allowed
through the firewall (e.g.
e-mails or web pages) but
all other data is blocked.
NOTE: While there
are physical
firewall devices, for common uses, a software firewall suffices.
2.2.9 Modem
Internet is a vast network of different types of networks. Our computers access the internet over
telephone lines. Telephone lines carry analogue signals. This, however, presents a problem. Computers
work on digital signals, and need some devices to convert every analogue signal input into digital
signals. Modem is such a device for the internet.
Modem means Modulator demodulator. It is a device that converts computer’s digital signals into
analogue signals to travel over telephone lines. Conversely, it also converts analogue signals from
telephone lines to computer usable digital signals. These processes are called modulation and
demodulation respectively.
2.2.10 Gateway
A gateway is a network point or node in a computer network, a key stopping point for data on its way
to or from other networks. Thanks to gateways, we are able to communicate and send data back and
forth.
A node is a physical place (a computer or a modem or a router), where the data stops for either
transporting or reading/using. Here are a few node notes:
On the Internet, the node that's a stopping point can be a gateway or a host node.
A computer that controls the traffic your Internet Service Provider (ISP) receives is a node.
If you have a wireless network at home that gives your entire family access to the Internet, your
gateway is the modem (or modem-router combo) your ISP provides so you can connect to their
network.
Advantages
Resource sharing without being tethered to a fixed location
Less mess of cables, increased flexibility.
Adding new computers is very easy, as only minimal extra cabling and WLAN adapter are
required.
Disadvantages
Security is an issue, an unauthorised device may connect to an AP.
Interference may disturb the signal.
Data transfer rate is slower than wired LAN.
2.7 Accessing the Internet
Advantages and disadvantages of using a mobile phone to access the internet
Advantages Disadvantages
Portable, can be used anywhere as long as In absence of Wi-Fi hotspot, it may be expensive
network signal is available. to access internet using a mobile phone.
A person is more likely to have a mobile phone Display on mobile phones is smaller than other
at all times, rather than a laptop devices.
It is easier to use a mobile phone while on the Keyboard on mobile phones is very small and
move. provides no sensory feedback (other than
vibrations.)
Not all websites are mobile friendly.
Wireless signals are less reliable and slower than
wired signals
Advantages and disadvantages of using a laptop to access the internet
Advantages Disadvantages
More portable than a desktop Not as portable as a mobile
Laptop keypads are much easier and faster to use More prone to wear and tear.
than a mobile
Advantages and disadvantages of using a desktop to access the internet
Advantages Disadvantages
Tend to have powerful processors, so the speed Not portable due to all its parts
is fast.
Usually have stable internet connection as it is May require dongles to access wireless network
wired.
All web pages are accessible on desktop
Use of full-size keyboard, mouse and other
peripherals make is easy to use.
New type of Social Divide: Advent of internet has resulted in a new social divide – digital divide. It
is the division between people who are computer literate and who aren’t. With rapid progress in the
field. This divide is growing larger at a rapid rate.
Inappropriate Sites and accuracy of information
Given that internet is now all pervasive, it is best to be prudent while searching for information online.
One must spend time to look for reliable information while searching via a search engine. Main
aspects to consider are: Reliability of information, undesirability of certain websites, and security
issues.
Reliability of Information
It is easier to find information online rather than books.
Information online tends to be more up to date than in books.
It is easier to access vast amount of information online instead of accessing several books.
There’s a high chance of coming across incorrect information online. Books go through a
thorough vetting process which may be missing online.
One may face information overload online. It may become difficult to find relevant
information.
Security Issues
Passwords are the go-to tool on the internet to secure one’s account. We need passwords for almost
every website from social media to bank to corporates. There are a few points to note for passwords:
Don’t use one password across platforms
Don’t use personal information to create a password.
Make sure your password has a healthy mix of capital letters, numbers, special characters and
small letters.
Change your passwords regularly
Don’t write down the passwords in a place easily accessible to others
Run anti-spyware on the computer regularly to ensure that your passwords are not being
snooped upon.
3.2 Authentication
Authentication refers to verification data source. User IDs and passwords are used to authenticate
users. Others authentication techniques may be:
Digital certificates
Biometrics
Magnetic strip cards/ID cards
Contactless cards
Passports (photograph, hologram, embedded RFID tag)
What happens when somebody approaches passport control at an airport?
Passport page containing the photograph is is placed face down on a
reader
The data readf rom the microchip is compared to the data stored in
the database.
3.3 Viruses
Viruses are computer programs that are attached to another program (such as a document). They can
replicate and spread after an initial execution on a target system where human interaction is required.
Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.
Antiviruses are the software that scan the system periodically (generally once a week with moderate
use) for presence of viruses. An antivirus may also be set to scan any incoming file (via internet
downloads or secondary storage devices.). They then delete or quarantine the suspicious files.
Viruses while browsing internet: One way to prevent virus attacks is to access only trustworthy sites.
Looks for https in the URL, and a padlock in the address bar. These are indicators that the website is
trustworthy. Also, when accessing new websites by clicking on links provided in email, or messages,
instead of clicking on them directly, copy the hyperlink and paste before you access it. This will allow
you to check the URL before accessing it.
Viruses from hardware devices: Always scan a hardware device that you connect to your computer.
3.4 Data Protection
Every country has its own data protection laws. Following are the points that a data protection act must
cover
Data must be fairly and lawfully processed
Data can only be processed for a stated purpose
Data must be adequate, and relevant, not excessive
Data must be accurate
Data must not be kept for longer than necessary
Data must be processed in accordance to data subject’s rights.
Data must be kept secure.
Data must not be transferred to another country unless they also have adequate data protection
There are certain precautions that individuals can take to safeguard themselves:
Don’t leave personal information lying about unattended.
Secure your physical files, under lock and key
Keep computer monitor locked when you need to leave your computer on and unattended for
any length of time.
Use user id and password, and change your password regularly.
Make sure sensitive information is sent via a channel built for such information, and not email
or SMS.
3.5 Network Communication
3.5.1 Faxes
There are two ways to send a fax: a physical fax, where a dedicated
fax machine is attached to the phone line and is used to send fax to
the target fax machine; an electronic fax, that requires internet
to send the fax electronically.
A physical fax machine is connected to the phone line. One inserts a
paper in the machine which is scanned and transmitted via phone
line. This fax is received by destination fax machine that prints a
copy of the document.
Sending fax this way can be slow.
It keeps the phone line busy so,
while the operation is underway,
no other fax can be sent or
received.
In case of electronic fax, an email
is sent to an eFax number, once
that is received, the fax is printed
and an acknowledgement is sent to
the sender.
Advantages
No travel required.
Saves time and cost
No need to travel with sensitive documents
No need to travel to potentially unsafe locations
Easier access to experts
Possible to hold a conference at a short notice.
No need to share stationery/devices
Potential Issues
Potential time lag
Poor internet connection may affect the video quality.
High Initial cost
May require training delegates
Different time zones
If the main incentive of a job is international travel, video conferencing may be demotivating.
3.5.4 Audio Conferencing
Audio conferencing uses audio. People may use phones, or computers for audio conferencing. Audio
conferences held over the internet use VoIP (Voice over Internet Protocol)
3.5.5 Web Conferencing (Webinar)
Web conferences use internet to hold conference. Multiple computers are used in a webinar. It is
carried out in real time. Webinars find utility in education, corporate meetings, presentations etc.
Organiser of a webinar provides the participants link to the webinar. At the pre decided time, the
participants access the webinar using the URL provided already. Organiser may have to allow
participants to join, or they may be able to join automatically. Organiser may decide who is allowed to
speak.