Chapter 5 Networks
Chapter 5 Networks
A network is created when two or more computers are connected together. Computers can
communicate with others and share resources such as hardware or Software and data.
It does these by sending data in a packet which is a unit of data packaged together so that it
can travel cross a network.
Requirements for connecting to Networks
Computers are required to fulfill certain conditions for them to connect to a network, so that
they all operate using standard protocols.
Protocols – refers to rules that allow the exchange and transmission of data between devices.
1. Network operating system –this allows computers to communicate on a network. It
provides additional functionality to a stand-alone Operating system, including
a) Passing user names and passwords to a server for checking when a user logs in.
b) Separating user accounts and ensuring that users cannot access each other’s files.
c) Providing access to network storage and resources such as networked printers.
Question:
1. Create a table to compare the features of a network operating system to a stand-
alone operating system.
(2001:odb8:0000:0042:0000:8a2e:0370:7334).
Page
IP addresses can either be assigned by a network administrator or allocated dynamically by a
server running Dynamic Host Configuration Protocol (DHCP).
Dynamically – means in a way that is open to change.
DHCP server – is a networked computer that automatically assigns an IP address to other
computers when they join the network.
b) Mac address – Media Access Control addresses are universally unique identifiers
given to the network interface card (NIC).
They are used in devices connected to LANs using Ethernet, Bluetooth or Wi-Fi.
MAC addresses are assigned by NIC manufacturer and are considered to be fixed addresses.
A MAC is usually made up of 6 pairs of characters. The first 3 pairs identify the
manufacturer and the remaining three uniquely identify the device.
2
Page
c) Device Name–is a descriptive name that helps users to identify computers on a
network. They are not unique and cannot be used for communication
Hotspot – refers to a place in a building where there is a computer system with an access
point, which allows people in the building with a wireless computer or mobile phone to
connect to a service such as internet.
Cat6 cables can be used to transfer data at 10 Gbits/s. they are more expensive than cat5e and
only used by businesses.
Fiber Optic Cables are flexible fibers. Each cable contains a glass thread that bounces light
signals between two devices further and faster that is possible with wire cables. They can
carry data at 40 Gbits/s over many kilometers without affecting signal quality.
3
Page
2. Wireless Access Point – allows devices with Wi-Fi connectivity to connect to a wired
network.
They are times built into other hardware such as routers but can also available as standalone
devices that connect to a wired network using Ethernet cables.
4
Page
4. Gateway – it connects two different types of network. For example, a LAN is connected
to a WAN using a gateway.
5. Router – it stores the addresses of all devices that are connected to it so that it can
forward network traffic to its destination using the quickest route.
5
Page
6. Booster – used to amplify a signal in a network so that its range can be extended. They
can be used for both wired and wireless connections.
Wireless access points can be set to repeat mode in order to act as boosters for Wi-Fi signals.
7. Server –a computer that shares its resources with connected devices. Computers
connected to a server are known as clients. Resources shared by one or more servers
include printers, storage and applications.
Types of servers
(i) Authentication server – checks usernames and passwords to allow users to
access various resources.
(ii) Print server – manages multiple printers at a time, deals with print requests from
clients computers and adding jobs to a queue so that individual printers are not
overloaded with requests.
(iii) File server – allows users to access shared and private storage.
(iv) Application server – provides clients access to applications that can be run
directly from the server.
(v) Web server – process requests for data made via HTTP (Hypertext Transfer
Protocol).
6
Page
8. Internet Service Provider (ISP) – ISP’s provide connections to the telecommunications
infrastructure that forms the framework for the internet.
9. Web browser – type of application software used to request and display information
stored on web servers. Examples are Mozilla Firefox, Google Chrome, Internet Explorer,
Microsoft Edge, Opera and Safari.
10. Search engine–provides users with a way to find information in web pages stored on
web servers.
11. Filter software– prevents users from accessing inappropriate information. When a user
tries to access a web page, the address (URL-Uniform resource locator) and the contents
of the web pages are compared against two lists of URL’s and keywords stored in the
filter software’s Database. The two lists are blacklist and whitelist.
The user is allowed to view the web pages if the results match anything in the whitelist and
prevent from viewing the web pages if the results match anything in blacklist. The user is
allowed to view the information if the results do not match anything in both the blacklist and
whitelists.
Filter software can help schools and parents to protect children from accessing disturbing or
age-inappropriate content.
LOCAL AREA NETWORKS (LANS)
A LAN is a network connected to a small area, such as a home or office network.
Computers in a network can be connected using two different models.
a) Peer To Peer Networks – computers in this type of network share their resources with
other computers in a network but do not access servers.
7
Page
b) Client Server Network – this network uses servers to service requests made by clients.
TYPES OF ENCRYPTION
a) Symmetric key encryption – this uses the same key at both ends of the process i.e. same
key is used to encrypt and decrypt the data.
b) Public key encryption – uses two mathematically related keys called key pair. One key
is used to encrypt data and the other to decrypt. A computer shares a public key with
other computers that wants to send its encrypted data.
10
Page
Wireless Encryption Protocol (WEP)
6. Transaction logs- all networks activities can be recorded in a log file. Although this does
not secure, a transaction log can help to identify which computers and network devices
have been accessed. This allows administrators to identify unusual activity that might be
a threat to data security.
7. Backups-refers to a copy of one or more files. Backups are usually stored on a different
storage device to the original device.
CHAPTER 5 QUESTIONS