0% found this document useful (0 votes)
3 views

com net

A computer network connects multiple devices to share resources and communicate, utilizing both hardware (like routers and switches) and software (like network operating systems and protocols). The internet is a vast network of networks enabling various services such as email, social media, and online banking. Security challenges like hacking and malware necessitate protective measures like strong passwords and antivirus software.

Uploaded by

labaranlawan37
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

com net

A computer network connects multiple devices to share resources and communicate, utilizing both hardware (like routers and switches) and software (like network operating systems and protocols). The internet is a vast network of networks enabling various services such as email, social media, and online banking. Security challenges like hacking and malware necessitate protective measures like strong passwords and antivirus software.

Uploaded by

labaranlawan37
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

COMPUTER NETWORKS AND THE INTERNET

What is a Computer Network?

A computer network is a system that connects two or more computers and other devices (like

printers, scanners, phones, etc.) so they can share resources (e.g., files, internet access, applications)

and communicate with each other.

These connected devices can be in the same room, building, city, or even across the world.

Components of a Computer Network

A functioning network includes both hardware and software components.

1. Hardware Components:

 Computers/Devices – e.g., laptops, desktops, smartphones.

 Network Interface Cards (NICs) – allows devices to connect to the network.

 Switches – connects multiple devices in a local network.

 Routers – connects different networks and directs data between them.

 Cables – Ethernet cables (for wired connections).

 Wireless Access Points (WAPs) – provide wireless (Wi-Fi) connections.

2. Software Components:

 Network Operating System (NOS) – software that manages network resources (e.g.,

Windows Server).

 Protocols – rules that guide how data is transmitted (e.g., TCP/IP).

Types of Computer Networks

1. Local Area Network (LAN)

 Connects devices in a small geographical area like a single building.


 Fast, low cost, and often used in schools, cyber cafés, and offices.

Example:

An office where the receptionist, accountant, and manager all use computers connected via a

switch and share a common printer.

2. Wide Area Network (WAN)

 Covers a large area—between cities, states, or countries.

 Uses public infrastructure like telephone lines or satellites.

Example:

A bank with branches across different cities uses a WAN to link all its branches and access

customer data in real-time.

3. Metropolitan Area Network (MAN)

 Covers a city or campus and is bigger than a LAN but smaller than a WAN.

 Often used by local councils or institutions with multiple buildings.

Example:

A university with different faculties connected together across the campus.

4. Personal Area Network (PAN)

 Very small network typically for personal use.

 Covers a few meters using Bluetooth or USB.

Example:

Connecting your phone to your laptop via Bluetooth to send pictures.


Benefits of Computer Networks

Benefit Explanation

Resource Sharing Users can share printers, scanners, files, and internet.

Communication Emails, instant messaging, and video calls are possible.

Centralized Data Files stored on a server can be accessed by all users.

Management

Security and Centralized control allows better data protection.

Backup

Cost Savings Instead of buying individual printers or modems, resources are shared.

What is the Internet?

The Internet is a massive global network of networks that connects millions of private, public,

academic, business, and government devices around the world.

Through the internet, users can send emails, browse websites, stream videos, attend online classes,

and use social media.

Internet Services and Applications

Service Description Example

World Wide Web Collection of websites Browsing news on a site like punchng.com

(WWW) and web pages.

Email Sending and receiving Gmail, Yahoo Mail

electronic mail.

Social Media Online interaction and WhatsApp, Facebook, X

content sharing.
Search Engines Tools to find info on the Google, Bing

internet.

Online Banking Access to bank services Transferring money with a mobile banking app

via apps/web.

E-Learning Taking classes and doing Logging in to a student portal to access lecture notes

assignments online.

Video Conferencing Holding meetings online Attending a Zoom class or a Skype interview

in real-time.

Requirements for Internet Connection

To access the internet, the following are needed:

 A Device – e.g., smartphone, tablet, laptop.

 Internet Service Provider (ISP) – like MTN, Airtel, Spectranet, or Glo.

 Modem or Router – hardware that allows the connection.

 Browser or App – like Chrome, Opera Mini, or YouTube app.

Internet Protocols

Protocols are sets of rules that govern communication over the internet.

Protocol Purpose

HTTP/HTTPS Used for web browsing and secure connections.

FTP Transfers large files between computers.

TCP/IP Foundation of all internet communication.

SMTP/POP3/IMAP Email transmission and retrieval.


Common Terms and Concepts

Term Meaning

IP Address Unique address for a device on a network (like a

digital home address).

URL Uniform Resource Locator – web address (e.g.,

www.university.edu.ng).

Bandwidth Amount of data that can be transmitted over a

network.

Firewall A security system that controls incoming and

outgoing traffic.

Wi-Fi Wireless internet connection.

Hotspot A device or phone that shares its internet

connection with others.

Cybersecurity in Networks and Internet Use

With the benefits of networks and the internet come security challenges, including:

 Hacking – gaining unauthorized access to systems.

 Viruses and Malware – harmful software.

 Phishing – fake messages that trick users into revealing personal information.

 Data Breaches – unauthorized exposure of sensitive data.

Basic Protection Tips:

 Use strong passwords.

 Avoid clicking suspicious links.

 Install antivirus software.

 Keep your system updated.

You might also like