0% found this document useful (0 votes)
6 views19 pages

Year 8 Networks

The document outlines the requirements and components necessary for connecting to networks, including protocols, network operating systems, and methods for identifying devices such as IP and MAC addresses. It details the components of wired and wireless networks, including routers, switches, and servers, as well as the Internet's structure and services. Additionally, it discusses Local Area Networks (LANs), their types, and the importance of network security measures to protect data and resources from unauthorized access.

Uploaded by

chaya.muyuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views19 pages

Year 8 Networks

The document outlines the requirements and components necessary for connecting to networks, including protocols, network operating systems, and methods for identifying devices such as IP and MAC addresses. It details the components of wired and wireless networks, including routers, switches, and servers, as well as the Internet's structure and services. Additionally, it discusses Local Area Networks (LANs), their types, and the importance of network security measures to protect data and resources from unauthorized access.

Uploaded by

chaya.muyuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Networks

Requirements of Connecting to Networks


Protocols
In order to connect to a network, computes need to fulfil certain
requirements so that they all operate using standard protocols.
Protocols are rules that allow the exchange and transmission of
data between devices.
Network Operating Systems
A network operating system allows a computer to communicate
on a network by providing additional functionality to a standalone
OS which includes:-
❖Passing usernames and passwords to a server for
authentication
❖Separating user accounts and ensuring users cannot access
each other’s files.
❖Providing access to a network storage and shared resources
such as networked printers.

Identifying Devices on a Network


▪ For devices to successfully communicate on the network,
there must be a way to uniquely identify each device.
▪ There are three main ways of uniquely identifying devices on
the network;
� Internet Protocol (IP) Address

� MAC Address

� Device Name
IP Addresses
▪ An IP address is a unique address that networked devices use
to send data to each other. Each piece of data sent across a
network carries an IP address of the destination host so that
each device on the network knows where to send it.
▪ IP addresses are made up of groups of numbers and are
categorized into two main versions:-
� IPv4 - Uses four groups of up to three numbers
separated by full stops e.g. 192.168.1.1.

It can store over 4billion addresses and was developed because of


the huge growth in number of connected devices.
� IPv6 – Uses eight groups of four hexadecimal
numbers separated by colons e.g.
f02e:0db8:0000:0042:0000:8a2e:0370:7334.
� IP addresses can either be assigned by a network
administrator or allocated dynamically by a server running
Dynamic Host Configuration Protocol (DHCP).
� A DHCP server is a networked computer that
automatically assigns an IP address to other computers when
they join the network.
� Commonly used with wireless devices such as
smartphones and tablets.

Media Access Control (MAC) ADDRESS


▪ These are universally unique identifiers given to the network
interface card (NIC) and are not dynamically allocated by
users or servers. They are used in devices connected to LANs
using Ethernet, Bluetooth or Wi-Fi. They are assigned by the
NIC manufacturer and are fixed addresses. It is made up six
pairs of characters, the first three identifies the manufacturer
and the remaining part uniquely identifies the device.MAC
addresses can be changed through a process called spoofing
which means using a MAC address of another device.

Uses of MAC Addresses


1)Restricting access to a network - MAC address filtering checks
the MAC address of devices attempting to gain access to a
network and grants only specified MAC addresses.
2)Identifying a device on a network – MAC addresses provide a
very unique way to identify each device that connects to a
network.
3)Tracking a device - Some companies track devices by checking
which WAP have been accessed by specific MAC address.
4)Assigning static or fixed addresses - Each time a device
connects to a network, it is identified by a DHCP server and
given the same IP address.

Device Name
A device name is a descriptive name that helps users to identify
computers on a network. They are not used by computers to
communicate with each other as they are not always unique i.e.
they can cause conflicts if data is sent to more than one device
with the same name for processing. You can change a device
name using tools in the devices operating system.

…………………………………………………………………Copy up till
here………………………………………………………………………………….

Components Of Wired Systems


Physical Transmission Media - allows the transmission of data in a
network. It can be an Ethernet network cable, Coaxial copper
wires or Fiber cable. Fiber Optic cables are flexible fibre
containing a glass thread that bounces light signals between two
devices faster and further than an Ethernet cable an can also
carries data at 40 Gbits/s over many kms without affecting signal
quality.

Ethernet Cable

Coaxial Cable

Fibre Optic Cable


Components Of Wired Networks
▪ Routers - stores the addresses of all devices that are connected
to it so that it can forward network traffic to its destination
using the quickest route. Most routers used in homes include a
switch and a wireless access point. They also act as gateways,
connecting the LAN to the internet, which is a type of WAN.
Home routers are dynamically allocated an IP address by the
internet service provider (ISP).
▪ Gateway - A gateway connects two different types of network.
For example, a LAN is connected to a WAN using a gateway.
▪ Switch - connects devices on a network. It has ports, each of
which can be connected to a device using a cable. Connecting a
wireless access point to a switch via a cable gives wireless
devices access to the wired network. The switch makes sure
that data sent from any device gets to the correct device on the
network. For example, when printing a document, a laptop will
send data that includes the printer's IP address to the switch
and the switch then sends the data to the connected printer.
▪ Firewall - A firewall is hardware device or software that
protects your internal LAN network from any external attacks
from the internet.
▪ Booster – Used to amplify the signal in a network so that its
range can be extended. Wireless Access Points can be set to
repeater mode to act as a booster for Wi-Fi signals.
▪ Bridge - A bridge is a network device that typically links
together two different parts of a LAN.
▪ Modem – A device which converts analogue telephone signals
into digital computer signals.

Server
▪ This is a powerful computer on the network that shares its
resources with connected devices. Computers connected to a
server are known as clients.
▪ Types of servers;
1)A File Server stores all data and software that are shared in the
Network.
2)An e-mail server will store all e-mails and also receive all e-
mails then transmit them to each user.
3)A Proxy Server - a computer setup to share a resource, usually
an Internet connection.
4)Authentication Server – checks usernames and passwords
When a user logs in the network, if the password and
username are correct, then the client is allowed to access
resources on the network.
5)Application Server – Provides clients with access to
application softwares that are installed on the server.
6)Print Server – Manages printers in a network, dealing with
print requests from client computers and adding jobs to a
queue to avoid overloading the printer with requests.
7)- – this is where web pages are hosted. It enables client
computers to access the web pages even from outside the
LAN by using HTTP.
…………………………………………………………………Copy up till
here………………………………………………………………………………….

Components of Wireless Network


A wireless network is a network in which nodes are connected
without any physical media. The devices are able to communicate
with one another through wireless transmission techniques such
as wi-fi, Bluetooth, NFC, Infrared, etc.
Wireless networks use the following components;
1. Wireless Access Point (WAP)
2. Wireless Network Interface Card (WNIC)
3. Wireless repeaters or wireless range extender
4. Wireless Router
▪ Wireless Access Point (WAP) - It connects a group of wireless
devices together then links them to wired LAN. It conveys data
between connected wireless devices and one connected wired
device, such as a router or switch, thus allowing wireless
devices to communicate among themselves or with other wired
devices.
▪ Wireless Network Interface Card (WNIC) - It allows devices to
connect to a wireless network. Most new laptops are equipped
with internal WNICs.
▪ Wireless routers - A wireless router allows wireless LAN devices
to connect to a wired device such as a modem so as to connect
to internet. Some wireless routers come with a few LAN ports
the enable wired devices also to connect to the internet.
▪ Wireless repeaters (wireless range extender) - Is used to extend
the range or boost/amplify the signal of an existing wireless
network. They can be strategically placed to elongate a signal
area or allow for the signal to reach around barriers such as
those created in L-shaped corridors, Mountains and also tall
buildings.
▪ …………………………………………………………………Copy up till
here………………………………………………………………………………….

The Internet
▪ The Internet is a global system of interconnected computer
networks that use the standard Internet Protocol Suite of
protocols (TCP/IP) to serve billions of users worldwide.
▪ It is a network of networks that consist of millions of private
and public, academic, business, and government networks
that are linked by electronic and optical networking
technologies.
▪ The Internet carries a big amount of information resources
and services, most notably the inter-linked hypertext
documents called the World Wide Web (WWW). It also has
the infrastructure to support electronic mail.

The Internet Protocols


Protocols are used by applications to transfer data across the
internet e.g.
▪ IMAP (Internet Message Access Protocol) for managing email.

▪ FTP (File Transfer Protocol) for sending files over the network.

▪ SSH (Secure Shell) for secure remote logins into a network

▪ VoIP (Voice Over Internet Protocol) enables voice call services


done over the internet. E.g. Skype
▪ XMPP (Extensible Messaging Presence Protocol) used for
messaging services like WhatsApp.
▪ HTTP (Hypertext Transfer Protocol) used for the www

Requirements for Connecting to the Internet


In order to access the online services provided by servers and data
centres, users must have a connection to the internet. Users also
need software that allows them to use and work with the services
effectively and safely.
1. Web browser – Application used to request and display
information stored on web servers. E.g. Mozilla Firefox,
Google Chrome, Internet Explorer® or Microsoft Edge,
Opera", and Safari®9
2. Internet Service Provider (ISP) - provide connections to the
telecommunications infrastructure that forms the framework
for the internet. Commercial ISPs charge subscription fees for
access to the internet. Some ISPs provide free access as part
of community schemes, which aim to provide internet access
to groups of residents who either do not have or do not want
access to commercial ISPs.
3. Search Engine – Provide users with a way of finding
information in web pages stored on web servers. Users enter
keywords that describe the information they want to find and
the search engine will compare the keywords with those in its
database and return results that are closest to the given
keywords.
4. Filter Software – Prevent users from accessing inappropriate
information. When accessing a web, the URL and contents of
the web are compared against two lists (Whitelist and
Blacklist) of URLs and keywords stored in the filter software’s
database.
▪ If the results match anything in the blacklist, the user will
be denied access to the web page.
▪ If the result matches anything in the whitelist, the user will
be allowed to view the web page
▪ If the result does not match anything in either the blacklist
or the whitelist, the user will be allowed to view the
information.

Internet Services
1. World Wide Web (WWW) - interlinked hypertext documents
(Web pages) stored on the webserver to be accessed via the
Internet.
2. E-mail - is a service provided by the internet to enable users
to send and receive messages quickly and securely through
an electronic or computer channel.
3. News groups - is a service that provides a repository for
messages posted from many users at different locations.
4. Internet forum - is a web application for holding discussions
and posting user-generated content. They are also referred to
as Web forums, message boards, discussion boards,
discussion groups, discussion forums, bulletin boards, or
simply forums.
5. Chat rooms – is an internet service that gives users a way of
communicating by sending text messages to people in the
same chat-room in real-time. Some chat rooms such as
Yahoo! use both text and voice simultaneously.
6. Instant messaging (IM) - is a form of real-time
communication between two or more people based on typed
text conveyed via computers connected over a network.
7. Search engines - A search engine is an information retrieval
system designed to help find information stored on the www.
Search engines help to minimize the time required to find
information and the amount of information which must be
consulted, akin to other techniques for managing information
overload. Other kinds of search engines include enterprise
search engines, which search on intranets, desktop search
engines, and mobile search engines.
8. Internet filter software – is a service that gives one the ability
to control content displayed, block websites and set up
passwords. Powerful services like email filtering, popup
blocking and chat room monitoring are just some of the tools
available with today's internet filter software, each designed
to protect against and counteract the tactics of aggressive
malicious online companies.

Local Area Networks (LANs)


A LAN is a network that connects digital devices that are in a
small geographical area like a building or group of buildings
that are close to each other.
Benefits of Using LANs
▪ Access to shared peripherals

▪ Access to shared storage and data

▪ Flexible access i.e. being able to access peripherals,


storage and data from any connected device.
▪ Media streaming

▪ Facilitates communication

▪ Shared access to the internet.


Types of LANs
Devices in a LAN can be connected using these two types of
models.
❖Client-server (server-based) Network

❖Peer-to-peer

Peer to Peer LANs


▪ Devices are connected together so that users can share
resources and information with one another without the
control of the server.
▪ There is no central location for authenticating users, storing
files, or accessing resources thus users must remember which
computers in the workgroup have the shared resource or
information that they want to access.
▪ It also means that users must log on to each computer to
access the shared resources on that computer.
▪ In most peer-to-peer networks, it is difficult for users to track
where information is located because data is generally stored
on multiple computers.
▪ This makes it difficult to back up critical business information,
and it often results in small businesses not completing
backups.
▪ Often, there are multiple versions of the same file on
different computers in the workgroup.

Client-Server LANs
▪ In a server-based network, the server is the central location
where users share and access network resources.
▪ This dedicated computer controls the level of access that
users have to shared resources.
▪ Shared data is in one location, making it easy to back up
critical business information.
▪ Each computer that connects to the network is called a client
computer.
▪ In a server-based network, users have one user account and
password to log on to the server and to access shared
resources.
▪ Network Server Operating Systems are designed to handle
the load when multiple client computers access server-based
resources.

Benefits of Using Client-Server LANs


▪ Control of user access rights – Users can be given access to
some resources and restricted from accessing others.
▪ Centralized administration – Resources and user accounts can
be managed by a server or administrators hence avoiding
problems in the network.
▪ Centralized Backup – User data is protected from loss
because backups can be automated for all users in the
network.
▪ Shared software – Application servers can provide access to
shared software.
▪ Shared storage and file access – The amount of storage
available to users can be managed centrally.
▪ Roaming profiles – Ability to log into any computer in an
office and see your settings and files hence allowing users to
access data, applications and printers from any client.

Securing Data on the Network


Network security refers to any activities designed to prevent
unauthorized users from accessing network resources and data.
Specifically, these activities protect the usability, reliability,
integrity, and safety of your network and data. Effective network
security targets a variety of threats and stops them from entering
or spreading on your network. Many network security threats
today are spread over the Internet. The most common include:
▪ Viruses, worms, and Trojan horses

▪ Spyware and adware

▪ Zero-day attacks, also called zero-hour attacks

▪ Hacker attacks

▪ Denial of service attacks

▪ Data interception and theft

▪ Identity theft
Network Security Components Include:
1)Updated Anti-virus and anti-spyware – to prevent attacks to
your computer from viruses and malware.
2)Intrusion Prevention Systems (IPS) - to identify fast-spreading
threats, such as zero-day or zero-hour attacks
3)Virtual Private Networks (VPNs) - to provide secure remote
access to a private LAN.
4)Log-ins and passwords - this is where users are required to
provide a secret code before logging into the network
5)Setting of Firewalls – firewall is a device or set of devices
configured to permit or deny information in or out of the
network based upon a set of rules and other criteria.
6)File access rights
7)Transaction logs
8)Backups
9)Encryption

Benefits of Network Security


1)Your company is protected against business disruption, which
helps keep employees productive.
2)Network security helps your company meet mandatory
regulatory compliance.
3)Because network security helps protect your customers' data,
it reduces the risk of legal action from data theft.
4)It helps protect a business's reputation.
5)Customer trust - A strong security stance assures customers
that sensitive information, such as credit card numbers or
confidential business details, will not be accessed and
exploited. Your business partners will feel more confident
sharing data such as sales forecasts or pre-release product
plans
6)Mobility - Strong network security lets your employees safely
access your network from the road or from home without
introducing viruses or other threats.
7)Improved productivity - An effective network security
program can boost productivity across your organization.
Employees spend less time on non-productive tasks such as
sifting through spam or dealing with viruses
8)Reduced costs - Network downtime is costly to all types of
businesses. By ensuring your network and your Internet
connection are safely up and running, you can be sure that
customers can reach you when they need you.

Drawbacks of Network Security


1)Cost – expensive to set up the hardware and software
components.
2)Inconvenience – repetitive task of entering and confirming
passwords can be cumbersome.
3)False sense of security – some admins will stop checking on
the logs when they have implemented the security features in
their networks hence risks of attacks.

You might also like