COMPUTER_NETWORKS[1]
COMPUTER_NETWORKS[1]
COMPUTER NETWORKING
ICT 321
Computer Networks
BY
DISADVANTAGES
Installation and configuration is difficult.
Cabling cost is more.
Bulk wiring is required.
TREE TOPOLOGY
MESH TOPOLOGY
FEATURES
Ideal if workstations are located in groups.
Used in Wide Area Network.
ADVANTAGES
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
DISADVANTAGES
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails, network fails.
CLASSIFICATION OF COMPUTER NETWORKS
BASED ON TECHNOLOGICAL ARRANGEMENT
1. PEER TO PEER MODEL
2. CLIENT SERVER MODEL
1. PEER TO PEER MODEL
In a P2P network, the "peers" are computer systems
which are connected to each other via the Internet.
Files can be shared directly between systems on the
network without the need of a central server. In other
words, each computer on a P2P network becomes a file
server as well as a client. The only requirements for a
computer to join a peer-to-peer network are an Internet
connection and P2P software. Examples of p2p software
include limewire, bittorrent. Most P2P programs are
focused on media sharing and P2P is therefore often
associated with software piracy and copyright violation.
ADVANTAGES AND DISADVANTAGES OF
P2P
ADVANTAGES
1. User friendly as users are allowed to control many parameters of the
operation e.g how many member connections to seek , which systems to
connect to, what services to offer, how many system resources to devote to
the network.
DISADVANTAGES
1. Uses of lot of bandwidth
2. Not secure because it bypasses firewalls and can be used to distribute
malware.
2.CLIENT SERVER MODEL
Client/server is a program relationship in which one program (the
client) requests a service or resource from another program (the
server). Although the client/server model can be used by programs
within a single computer, it is a more important concept for
networking. In this case, the client establishes a connection to the
server over a local area network (LAN) or wide-area network (WAN),
such as the Internet. Once the server has fulfilled the client's request,
the connection is terminated. Your Web browser is a client program
that has requested a service from a server; in fact, the service and
resource the server provided is the delivery of this Web page. Most
business applications use the client/server model as does the
Internet's main program, TCP/IP
CLASSIFICATION OF COMPUTER NETWORKS
BASED ON ADMINISTRATIVE ARRANGEMENT.
1. CENTRALISED SYSTEMS
2. DISTRIBUTED SYSTEMS
3. COLLABORATIVE SYSTEMS
CENTRALISED SYSTEMS
Centralized computing is a type of computing architecture where
all or most of the processing/computing is performed on a central
server. Centralized computing enables the deployment of all of a
central server's computing resources, administration and
management. The central server, in turn, is responsible for delivering
application logic, processing and providing computing resources
(both basic and complex) to the attached client machines.
Centralized computing is similar to a client/server architecture
where one or more client PCs are directly connected to a central
server.
CENTRALISED SYSTEMS
Advantages and disadvantages.
The benefits of a Centralized model are lower capital and
operational cost (minimal hardware at each site), security
(all data stored in a secured datacenter), less
administrative overhead (fewer resources needed since
all equipment is in one location), less backup complexity,
and greater control over potential risk areas such as
Internet access. The downside to a Centralized model is
that your remote site’s WAN connection is now a major
point of failure. Whether this is a point-to-point, MPLS, or
VPN connection, if this link goes down, that site now has
zero access to anything at the Datacenter.
DISTRIBUTED SYSTEMS
In a purely Distributed model, each site is self-sustained for the most
part. While some connectivity to the primary datacenter is required,
the remote site would host its own Email Server, manage its own
backups, control its own Internet access, and host its own Shared
Files.
DISTRIBUTED SYSTEMS
Advantages and Disadvantages
The benefit of a Distributed model is that each site can ‘survive’ on its own.
There is no Single Point of Failure in this regard. The downside to this
approach, obviously, is cost. Not only would this require additional
hardware and software costs, but you most certainly would require at least
a partial onsite presence at each location regardless of how many remote
management components are in place.
COLLABORATIVE SYSTEMS
A collaborative system has to do with a combination of
several interconnected systems connected together,
these systems often share resources and can either be
centralized or distributed.
CLASSIFICATION OF COMPUTER
NETWORKS
BASED ON GEOGRAPHICAL ARRANGEMENT
1. LOCAL AREA NETWORKS
2. METROPOLITIAN AREA NETWORK
3. WIDE AREA NETWORKS
LOCAL AREA NETWORKS
The computers are geographically close together (that is, in the same
building). This type of computer network is operated under single
administrative system is generally termed as Local Area Network (LAN). A
LAN consists of a shared transmission medium and a set of hardware and
software for interfacing devices to the medium and regulating the orderly
access to the medium
LAN provides a useful way of sharing the resources between end users. The
resources such as printers, file servers, scanners, and internet are easily
sharable among computers.
LAN APPLICATIONS
1. Video Conferencing
2. Gaming servers
3. Remote Access controls
4. Personal computer LANS
5. Back end networks and storage area networks
6. High speed office network
NETWORK LAN TECHNOLOGIES
1. ETHERNET
Ethernet is a widely deployed LAN technology.
Ethernet shares media. Network which uses shared media has high
probability of data collision. Ethernet uses Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect
collisions. On the occurrence of collision in Ethernet, all its hosts roll
back, wait for some random amount of time, and then re-transmit
the data.
Ethernet connector is, THE network interface card equipped with 48-
bits MAC address. This helps other Ethernet devices to identify and
communicate with remote devices in Ethernet.
NETWORK LAN TECHNOLOGIES
Traditional Ethernet uses 10BASE-T specifications. The number 10 depicts
10MBPS speed, BASE stands for baseband, and T stands for Thick Ethernet.
10BASE-T Ethernet provides transmission speed up to 10MBPS and uses
coaxial cable or Cat-5 twisted pair cable with RJ-5 connector. Ethernet
follows star topology with segment length up to 100 meters. All devices are
connected to a hub/switch in a star fashion.
2. Fast-Ethernet
To encompass need of fast emerging software and hardware technologies,
Ethernet extends itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and
wirelessly too. It can provide speed up to 100 MBPS. This standard is named
as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It uses CSMA/CD
technique for wired media sharing among the Ethernet hosts and CSMA/CA
(CA stands for Collision Avoidance) technique for wireless Ethernet LAN.
NETWORK LAN TECHNOLOGIES
Fast Ethernet on fiber is defined under 100BASE-FX standard which provides
speed up to 100 MBPS on fiber. Ethernet over fiber can be extended up to
100 meters in half-duplex mode and can reach maximum of 2000 meters in
full-duplex over multimode fibers.
3. Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed
status only for 3 years till Giga-Ethernet introduced. Giga-Ethernet provides
speed up to 1000 mbits/seconds. IEEE802.3ab standardize Giga-Ethernet over
UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-Ethernet
over Fiber.
NETWORK LAN TECHNOLOGIES
4.Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared media in
Ethernet create one single Broadcast domain and one single Collision
domain. Introduction of switches to Ethernet has removed single collision
domain issue and each device connected to switch works in its separate
collision domain. But even Switches cannot divide a network into separate
Broadcast domains.
Virtual LAN is a solution to divide a single Broadcast domain into multiple
Broadcast domains. Host in one VLAN cannot speak to a host in another. By
default, all hosts are placed into the same VLAN
NETWORK LAN TECHNOLOGIES
5. VPN
A Virtual private network (VPN) extends a private network across a public
network, such as the Internet. It enables a computer or network-enabled
device to send and receive data across shared or public networks as if it
were directly connected to the private network, while benefiting from the
functionality, security and management policies of the private network. A
VPN is created by establishing a virtual point-to-point connection through
the use of dedicated connections, virtual tunneling protocols, or traffic
encryption. Major implementations of VPNs include OpenVPN and IPsec.
METROPOLITIAN AREA NETWORK
The Metropolitan Area Network (MAN) generally expands throughout a city
such as cable TV network. It can be in the form of Ethernet, Token-ring,
ATM, or Fiber Distributed Data Interface (FDDI).Metro Ethernet is a service
which is provided by ISPs. This service enables its users to expand their Local
Area Networks.
WIDE AREA NETWORKS
The computers are farther apart and are connected by telephone lines or
radio waves. The Wide Area Network (WAN) covers a wide area which may
span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks
provide connectivity to MANs and LANs. Since they are equipped with very
high speed backbone, WANs use very expensive network equipment.
WANs are widely used in banking. The financial markets are also heavily
dependent on wide area computer networks. They provide for remote
database access, which is the basis for airline reservations and home
banking. They also provide electronic mail or e-mail.
MULTIMEDIA NETWORKING
When we’re trying to build better software to remove malware from your
machine, the main things that we are interested in is how it got into your
computer and how it is continuing to work. The malware will generally fit
into one of the following categories.
Virus – this is a term that used to be generic. Any bad software used to be a
virus; however, we use the term “malware” now. We use the word “virus” to
describe a program that self-replicates after hooking itself onto something
running in Windows®.
Delivery/Infection Methods
Worm – a worm is another kind of self-replicating program but generally
doesn’t hook itself onto a Windows process. Worms generally are little
programs that run in the background of your system.
Trojan – software that you thought was going to be one thing, but turns out
to be something bad. Named for the fabled “Trojan Horse” that appeared
to be a gift but in fact carried a dangerous payload.
1. PING
2. TRACEROUTE
3. IPCONFIG
4. NSLOOKUP
5. NETSTAT
6. IP CALCULATOR
7. SPEEDTEST.NET
8. PATHPING
9. ROUTE
A COMPUTER VIRUS
A computer virus is a type of malicious software program ("malware") that,
when executed, replicates by reproducing itself (copying its own source
code) or infecting other computer programs by modifying them.[1]
Infecting computer programs can include as well, data files, or the "boot"
sector of the hard drive. When this replication succeeds, the affected areas
are then said to be "infected" with a computer virus.
Virus parts
1. Infection mechanism
Infection mechanism (also called 'infection vector'), is how the virus spreads or
propagates. A virus typically has a search routine, which locates new files or
new disks for infection.
2. Trigger
The trigger, which is also known as logic bomb, is the compiled version that
could be activated any time an executable file with the virus is run that
determines the event or condition for the malicious "payload" to be activated
or delivered such as a particular date, a particular time, particular presence of
another program, capacity of the disk exceeding some limit, or a double-click
that opens a particular file.
Virus parts
3. Payload
The "payload" is the actual body or data that perform the actual malicious
purpose of the virus. Payload activity might be noticeable (e.g., because it
causes the system to slow down or "freeze"), as most of the time the
"payload" itself is the harmful activity, or some times non-destructive but
distributive, which is called Virus hoax.
Phases in the Life Cycle of a Computer
Virus
1. Dormant phase
The virus program is idle during this stage. The virus program has managed to
access the target user's computer or software, but during this stage, the virus
does not take any action. The virus will eventually be activated by the "trigger"
which states which event will execute the virus, such as a date, the presence of
another program or file, the capacity of the disk exceeding some limit or the
user taking a certain action (e.g., double-clicking on a certain icon, opening
an e-mail, etc.). Not all viruses have this stage.
2. Propagation phase
The virus starts propagating, that is multiplying and replicating itself. The virus
places a copy of itself into other programs or into certain system areas on the
disk. The copy may not be identical to the propagating version; viruses often
"morph" or change to evade detection by IT professionals and anti-virus
software. Each infected program will now contain a clone of the virus, which
will itself enter a propagation phase.
Phases in the Life Cycle of a Computer
Virus
3. Triggering phase
A dormant virus moves into this phase when it is activated, and will now
perform the function for which it was intended. The triggering phase can be
caused by a variety of system events, including a count of the number of times
that this copy of the virus has made copies of itself.
4. Execution phase
This is the actual work of the virus, where the "payload" will be released. It can
be destructive such as deleting files on disk, crashing the system, or corrupting
files or relatively harmless such as popping up humorous or political messages
on screen.
OTHER TYPES OF MALWARE
Computer "worms",(Worm ware)
Ransomware,
Trojan horses,
key loggers
Rootkits
Spyware
Adware
Malicious Browser Helper Object (BHOs)
Delivery/Infection Methods
When we’re trying to build better software to remove malware from your
machine, the main things that we are interested in is how it got into your
computer and how it is continuing to work. The malware will generally fit
into one of the following categories.
Virus – this is a term that used to be generic. Any bad software used to be a
virus; however, we use the term “malware” now. We use the word “virus” to
describe a program that self-replicates after hooking itself onto something
running in Windows®.
Delivery/Infection Methods
Worm – a worm is another kind of self-replicating program but generally
doesn’t hook itself onto a Windows process. Worms generally are little
programs that run in the background of your system.
Trojan – software that you thought was going to be one thing, but turns out
to be something bad. Named for the fabled “Trojan Horse” that appeared
to be a gift but in fact carried a dangerous payload.