0% found this document useful (0 votes)
18 views13 pages

Chapter 5 Networks

Chapter 5 discusses the fundamentals of networks, including the definition, requirements for connection, and methods for identifying devices. It covers components of wired and wireless systems, types of servers, and the benefits of Local Area Networks (LANs) and Client-Server networks. Additionally, it addresses data security measures such as encryption, firewalls, and access rights to protect network resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views13 pages

Chapter 5 Networks

Chapter 5 discusses the fundamentals of networks, including the definition, requirements for connection, and methods for identifying devices. It covers components of wired and wireless systems, types of servers, and the benefits of Local Area Networks (LANs) and Client-Server networks. Additionally, it addresses data security measures such as encryption, firewalls, and access rights to protect network resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CHAPTER 5: NETWORKS

 A network is created when two or more computers are connected together. Computers can
communicate with others and share resources such as hardware or Software and data.
 It does these by sending data in a packet which is a unit of data packaged together so that it
can travel cross a network.
Requirements for connecting to Networks
 Computers are required to fulfill certain conditions for them to connect to a network, so that
they all operate using standard protocols.
Protocols – refers to rules that allow the exchange and transmission of data between devices.
1. Network operating system –this allows computers to communicate on a network. It
provides additional functionality to a stand-alone Operating system, including
a) Passing user names and passwords to a server for checking when a user logs in.
b) Separating user accounts and ensuring that users cannot access each other’s files.
c) Providing access to network storage and resources such as networked printers.
Question:
1. Create a table to compare the features of a network operating system to a stand-
alone operating system.

How devices are identified on a network


 There are three methods used to identify devices on a network
1. Internet protocol (IP)
2. MAC address
3. Device name
a) Internet protocol (IP) – an IP address is a unique address that networked devices use
to send data to each other.
 Each piece of data that is sent across a network carries the IP address of the destination, so
that each device in the Network knows where to send it.
 IP address is made up of groups of numbers. There are two main versions of IP in use.
(i) IPv4 –uses four groups of up to three numbers separated by full stops e.g. 192.168.1.1
(ii) IPv6 - uses eight groups of up to four hexadecimal numbers separated by colons e.g.
1

(2001:odb8:0000:0042:0000:8a2e:0370:7334).
Page
 IP addresses can either be assigned by a network administrator or allocated dynamically by a
server running Dynamic Host Configuration Protocol (DHCP).
 Dynamically – means in a way that is open to change.
 DHCP server – is a networked computer that automatically assigns an IP address to other
computers when they join the network.

b) Mac address – Media Access Control addresses are universally unique identifiers
given to the network interface card (NIC).
 They are used in devices connected to LANs using Ethernet, Bluetooth or Wi-Fi.
 MAC addresses are assigned by NIC manufacturer and are considered to be fixed addresses.
 A MAC is usually made up of 6 pairs of characters. The first 3 pairs identify the
manufacturer and the remaining three uniquely identify the device.

Uses of MAC Addresses

2
Page
c) Device Name–is a descriptive name that helps users to identify computers on a
network. They are not unique and cannot be used for communication
 Hotspot – refers to a place in a building where there is a computer system with an access
point, which allows people in the building with a wireless computer or mobile phone to
connect to a service such as internet.

Components of wired and wireless systems


1. Cables – are used to connect devices in a wired network.
 Cat5e cables are used for Ethernet connections in homes and small businesses. These cables
are able to transfer data at 10 Mbits/s or 1 Gbits/s.
 They connect devices through their NICs. The NIC contains LEDs that signal network
activity.

 Cat6 cables can be used to transfer data at 10 Gbits/s. they are more expensive than cat5e and
only used by businesses.
 Fiber Optic Cables are flexible fibers. Each cable contains a glass thread that bounces light
signals between two devices further and faster that is possible with wire cables. They can
carry data at 40 Gbits/s over many kilometers without affecting signal quality.
3
Page
2. Wireless Access Point – allows devices with Wi-Fi connectivity to connect to a wired
network.
 They are times built into other hardware such as routers but can also available as standalone
devices that connect to a wired network using Ethernet cables.

3. Switch–connects devices on a network, has ports each of which can be connected to


devices using a cable. Connecting a wireless access point to a switch via a cable gives
wireless devices access to the wired network. A switch makes sure that data sent from
any device gets to the correct device on the network.

4
Page
4. Gateway – it connects two different types of network. For example, a LAN is connected
to a WAN using a gateway.
5. Router – it stores the addresses of all devices that are connected to it so that it can
forward network traffic to its destination using the quickest route.

5
Page
6. Booster – used to amplify a signal in a network so that its range can be extended. They
can be used for both wired and wireless connections.
 Wireless access points can be set to repeat mode in order to act as boosters for Wi-Fi signals.

7. Server –a computer that shares its resources with connected devices. Computers
connected to a server are known as clients. Resources shared by one or more servers
include printers, storage and applications.

Types of servers
(i) Authentication server – checks usernames and passwords to allow users to
access various resources.
(ii) Print server – manages multiple printers at a time, deals with print requests from
clients computers and adding jobs to a queue so that individual printers are not
overloaded with requests.
(iii) File server – allows users to access shared and private storage.
(iv) Application server – provides clients access to applications that can be run
directly from the server.
(v) Web server – process requests for data made via HTTP (Hypertext Transfer
Protocol).
6
Page
8. Internet Service Provider (ISP) – ISP’s provide connections to the telecommunications
infrastructure that forms the framework for the internet.
9. Web browser – type of application software used to request and display information
stored on web servers. Examples are Mozilla Firefox, Google Chrome, Internet Explorer,
Microsoft Edge, Opera and Safari.
10. Search engine–provides users with a way to find information in web pages stored on
web servers.
11. Filter software– prevents users from accessing inappropriate information. When a user
tries to access a web page, the address (URL-Uniform resource locator) and the contents
of the web pages are compared against two lists of URL’s and keywords stored in the
filter software’s Database. The two lists are blacklist and whitelist.
 The user is allowed to view the web pages if the results match anything in the whitelist and
prevent from viewing the web pages if the results match anything in blacklist. The user is
allowed to view the information if the results do not match anything in both the blacklist and
whitelists.
 Filter software can help schools and parents to protect children from accessing disturbing or
age-inappropriate content.
LOCAL AREA NETWORKS (LANS)
 A LAN is a network connected to a small area, such as a home or office network.
 Computers in a network can be connected using two different models.
a) Peer To Peer Networks – computers in this type of network share their resources with
other computers in a network but do not access servers.

7
Page
b) Client Server Network – this network uses servers to service requests made by clients.

BENEFITS OF USING LANS

1. Access to shared peripherals


2. Access to shared storage and data
3. Flexible access – i.e being able to access peripherals, storage and data from any
connected device.
4. Media streaming – including movies, music and gaming.
5. Communication – i.e being able to send messages and files to others on the network.
6. Shared access to the internet.
8
Page
Benefits Of Using Client – Server Networks
 There are several benefits of using client-server networks that are not available when using
peer to peer networks.
(i) Control of user access rights – users or groups of users can be given access to some
resources and restricted from accessing others.
(ii) Centralized administration – resources and user accounts can be managed by an
individual, or individual group of servers and administrators, ensuring support is
provided by people who have an overview of the network and avoid inexperienced users
creating problems for themselves or others.
(iii)Centralized backup – user data is protected from loss because backups can be
automated for all users.
(iv) Shared software – application servers can provide access to shared software and also
operating system.
(v) Shared storage and file access – the amount of storage available to users can be
managed centrally. Users can make files available to others and file permissions set to
individual files.
(vi) Roaming profiles – this is the ability to log into any computer in an office and see your
settings and files. This allows users to access data, applications, mail and printers from
any clients enabling them to work from any ware where there is a client.

SECURING DATA ON NETWORKS


 Security prevents unauthorized users from accessing network resources and data.
1. Logins and passwords – without correct login details the users cannot access the
network or its resources. Passwords are used to authenticate a user to the network.
Authenticate– means confirming the user is who they say they are.
2. Firewalls–it is used at the gateway to a network. It controls the network traffic to from a
network, particularly traffic from the internet.
 They prevent unauthorized users from accessing network devices and resources such as
storage.
 Firewalls re available as hardware or software that can be installed on computers to prevent
9

attacks from within networks.


Page
3. Encryption – the process of encoding, scrambling or jumbling data so that unauthorized
users are prevented from being able to understand it.
 One method used to encrypt text is called a Caesar cipher. It shifts each letter to the left by a
set number of places. The number of places by which the letter5s have been shifted is known
as the key.
 The figure below shows an example of using a Caesar cipher. The top raw is the original
alphabet, whereas the bottom row shows the alphabet after applying a Caesar cipher with a
shift of 4 places.

TYPES OF ENCRYPTION
a) Symmetric key encryption – this uses the same key at both ends of the process i.e. same
key is used to encrypt and decrypt the data.
b) Public key encryption – uses two mathematically related keys called key pair. One key
is used to encrypt data and the other to decrypt. A computer shares a public key with
other computers that wants to send its encrypted data.

10
Page
Wireless Encryption Protocol (WEP)

 Intercepting data in a wireless network is easier than in wired networks.


 Wireless Encryption Protocol (WEP) is used to secure data in a wireless data transfer. WEP
is the least secure method of wireless encryption since the same key is used by each device
on the network for every transfer.
 Therefore if an eavesdropper studies enough packets they can identify the key, providing
them with unlimited access to all data from every device on the wireless network.
Eavesdropper – refers to unauthorized person or piece of software that intercepts data from a
private communication.
Packet – a unit of data packaged to travel across a network.
Wi-Fi Protected Access (WPA)
 WPA provides better encryption than WEP.
 WPA generates a key for each device on the wireless network. New keys are also provided
for each data that is sent.
4. Virtual Private Network (VPN)
 VPN provides access to a private LAN from a remote location. The connection is created
using the infrastructure of a public network such as the internet.
 Data sent using VPN is encrypted so that it is secure if intercepted.
11

A VPN can be used by an individual to:


Page

I. Access their employer’s network while working from home.


II. Access computers in a different geographical location, to avoid the local restriction
on access to web content (such as due to censorship or geo-location rights
management)
III. Make secure payments
IV. Prevent surveillance of and access to their web activity

5. File access rights


Also known as file permissions .they can be sent for individual files, folders or drives and
they ensure that users are either allowed to read only or read and write to the file, folder
or drive.

6. Transaction logs- all networks activities can be recorded in a log file. Although this does
not secure, a transaction log can help to identify which computers and network devices
have been accessed. This allows administrators to identify unusual activity that might be
a threat to data security.
7. Backups-refers to a copy of one or more files. Backups are usually stored on a different
storage device to the original device.

CHAPTER 5 QUESTIONS

1. Which network device connects a LAN to a WAN(1)


2. Explain why public key encryption is more secure than symmetric key encryption(2)
3. State which security device controls traffic entering a network(1)
4. State two methods by which devices are identified to each other on a network(2)
5. Explain why IPv6 was used to replace IPv4(2)
6. State two uses of VPN (2)
7. State the reason why a booster is used in a network(1)
8. Describe how encryption secures data (3)
9. List three methods of securing data on a network(3)
10. State three benefits to users of using a local area network(3)
12
Page
Page 13

You might also like