0% found this document useful (0 votes)
7 views

(Week07 and Week08) Networking (Revised)

The document outlines the key features, operations, and components of connected networks, including the necessary devices and physical connections. It discusses the risks and benefits of using connected networks, as well as security measures to protect data and communications. Additionally, it covers different network types, standards, and protocols essential for establishing and maintaining network connections.

Uploaded by

mqkdncdkt9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

(Week07 and Week08) Networking (Revised)

The document outlines the key features, operations, and components of connected networks, including the necessary devices and physical connections. It discusses the risks and benefits of using connected networks, as well as security measures to protect data and communications. Additionally, it covers different network types, standards, and protocols essential for establishing and maintaining network connections.

Uploaded by

mqkdncdkt9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

SEHH1034

Week 7 & Week 8

Networking

Reference:

Module 10: Campbell, J. T., Ciampa, M., Clemens, B., Freund, S. M., Frydenberg, M.,
Hooper, R., Ruffolo, L. (2020). Technology for Success: Computer Concepts,
Cengage Learning.
Lesson Objectives
• Discuss the key features of connected networks and explore how
connections between networks are made
• Discuss risks and benefits with using a connected network
Key Features of Connected Networks
• Explain how a network operates
• Define the elements of a connected
network
• Identify the devices necessary to
create a network
• Explain the physical connections
between networks and network parts
• Explain the differences between
various types of networks
How a Network Operates
• A network is a system of two of more
devices linked by wires, cables, or a
telecommunications system
o Requires a combination of hardware and
software
• Some networks provide connections to the
Internet, which requires the services of an
Internet Service Provider (ISP)
o Enables the network to communicate with
other networks that are also connected to the
Internet
Elements of a Connected Network
• Hub: transfers all data to all devices
• Switch: transfers data only to the intended
recipient
• Router: device that connects two or more
networks
• Modem: communications device that
connects a communications channel to a
device
o Connects the network to the Internet through
an ISP
Devices Necessary to Create a Network
• Requires two or more devices that need to communicate, a way to
communicate, and the infrastructure to facilitate the communication
o A network interface card (NIC) is required for a computer to connect to a
network
o Cable modem/DSL modem
Devices Necessary to Create a Network
Network interface card (NIC)
Ethernet card
• Ethernet (IEEE 802.3) is a popular/standard
network using a bus topology
• NIC that supports Ethernet protocols
Devices Necessary to Create a Network
Wi-Fi : Wireless Fidelity (IEEE 802.11)
Wi-Fi card - a wireless NIC
Wireless access point - device that transmits and
receives wireless signals (e.g. the wireless router)
Devices Necessary to Create a Network

Digital subscriber line (DSL) provides high-speed Internet access


of phone lines
Devices Necessary to Create a Network
Cable Internet connection provides always-on broadband
Internet access using cable television infrastructure
Devices Necessary to Create a Network

Wired and
wireless network
Devices Necessary to Create a Network

Networked printer sharing


Physical Connections Between Networks (1 of 3)
Topology Details Network
arrangement
Bus All devices attach to a central cable, called a bus, which carries the
data. If the bus fails, the devices on the network will no longer be
able to communicate.

Network Ring Data travels from one device to the next in a sequential fashion. If
one device on the network fails, communication on the network could
Topologies cease to function. Ring networks are no longer common.

Star Each device on the network is attached to a central device such as a


server or switch. If the central device fails, the other devices will be
unable to communicate. If a connected device fails, all other devices
will still be able to communicate. Two or more star networks may be
joined together using a bus to form a tree topology. Tree topologies
often are used in schools and businesses.
Mesh All devices interconnect with each other. If a single device on the
network fails, the rest of the network will continue to function by
communicating via an alternate route. Two types of mesh topologies
are a full mesh topology (each device on the network is connected to
every other device on the network) and a partial mesh technology
(each device may or may not be connected to all other devices on
the network).
Physical Connections Between Networks (2 of 3)
Network Architecture
• Determines the logical design of
all devices on a network
o Client/server network
o Peer-to-peer (P2P) network

Cloud computing
• Provide computing services,
including data storage and apps,
via the Internet
Physical Connections Between Networks (2 of 3)

Client/server Peer-to-peer
network (P2P) network
Physical Connections Between Networks (3 of 3)
Geographic Reach
• Local area network (LAN) connects computers and devices in a limited
area
• Wide area network (WAN) connects devices in a large geographic region
• Metropolitan area network (MAN) is operated by a city or county
• Personal area network (PAN) connects personal digital devices within 30
feet via Bluetooth
• Body area network (BAN) small, lightweight biosensors implanted in the
body
Differences Between Various Types of Networks
Additional Network Types
Network type Description
Wired network Sends signals and data through cables, which may have to travel through floors and walls to
connect to other network devices. Wired networks tend to be more secure and transmit data
faster than wireless networks.
Wireless network Sends signals through airwaves, and usually do not require cables. Wireless networks tend to
be more convenient and easier to set up than wired networks, but can be less secure.
Wireless networks make it possible to connect devices in locations where physical wiring is
not possible or is difficult.

Intranet A private network for use by authorized individuals. Organizations use intranets to
communicate internally and can allow users to use a web browser to access data posted on
webpages. Intranets are preferable when data being transferred should not necessarily reach
the Internet.
Extranet Allows outsiders (such as customers, vendors, and suppliers) to access an organization’s
intranet. For example, an extranet might be used if a supplier needs to check a customer’s
inventory levels before deciding whether to ship additional product.
Virtual private network (VPN) A private, secure path across a public network that allows authorized users secure access to a
company or other network. A VPN can allow an individual to access an organization’s network
by using encryption and other technologies to secure the data transmitted along the path.
Risks and Benefits with Using a Connected Network

• Benefits: sharing resources without regard to


geographic location; easier communication
• Risks
o Malware can install itself without permission
and damage or steal data from a computer or
device
o Hackers can gain access to personal data
o Phishing
o Social engineering
o Denial of service (DoS) attack
• Distributed denial of service (DDoS) attack
• Zombie
How Unauthorized Network Use Threatens
Communications
• When hackers can connect to the same network as the computer they wish
to target, it is easier to obtain information
• Data also might be exposed by connecting to a fraudulent network
o When connecting to a public Wi-Fi network, one should not enter confidential
information on websites or send personal data in email
o Evil twin: hackers can capture personal information if the users transmit the
information via fraudulent Wi-Fi network.
How to Secure a Network
• Authentication
o User name and a strong password
o Biometrics
• Firewall
o Hardware firewalls
o Software firewalls
• Encryption
Secure Data Stored on a Network
• Network attached storage (NAS) devices are hard drives that connect
directly to a network and provide a centralized location for storing programs
and data on large and small networks
o Specify users who can view the files, as well as view and make changes to the
files
• Turn on network encryption so that information from files being transmitted
on the network cannot be intercepted by others
How to Encrypt a Network
• Encryption is the process of converting data so that it is unrecognizable
when it is transmitted on a network or stored on a storage device, except to
users who enter the correct password
• Ensure that wireless networks support encryption so that data cannot be
intercepted easily by others
o Encrypted wireless networks often use a wireless network key to encrypt data
sent between devices
Connecting to Different Types of Networks
• Network standards and protocols
• Connect to network devices
Network Standards and Protocols (1 of 3)

Network standard Common use in


Ethernet Most common wired networks
Power over Ethernet (PoE) Devices requiring network connectivity and power
to be supplied by the network
Phoneline/HomePNA and Powerline Networks using telephone lines to connect
computers and devices
Wi-Fi Home and small business networks
LTE Voice and data transmission on cellular networks
Network Standards and Protocols (2 of 3)
• Computers communicating with each other on a network must follow a
common set of rules for exchanging information, or protocols
o TCP/IP (Transmission Control Protocol/Internet Protocol)
• Cellular Networks: millions of people use their mobile phones to access the
Internet
o Cellular networks can provide Internet services in most locations where cellular
service is offered
o 4G and 5G networks provide higher speed data transmission
Network Standards and Protocols (3 of 3)

Close-Distance Network Protocols


Network protocol Common use
Bluetooth Devices communicating with each other over a short
range (usually less than 30 feet/9 meters)
RFID (radio frequency Radio signals transmitted through antennas, often
identification) found in tollbooth transponders or embedded chips in
animals
NFC (near field communication) Used in credit cards, smartphones, and tickets to
facilitate close-range communication
IrDA Remote controls or other data transmission within
close proximity
Connect to Network Devices (1 of 3)
• Setting up and connecting to a home wireless
network: may vary depending on the network
hardware, size of home, and devices to be
connected.
o Purchase a modem or separate wireless router and
connect it to your home’s Internet service
o Enable the wireless network
o Configure a name for the network
o Configure a wireless network key
o Enable each device’s wireless functionality
o On the device, search for and connect to the
wireless network
o Enter the wireless network key
Connect to Network Devices (2 of 3)
• Wi-fi hot spots: wireless networks
that are available in public places
• Mobile hot spots: enables one to
connect a phone, computer or other
device to the Internet through the
cellular network
o Many smartphones contain mobile
hotspot functionality, although cellular
providers may charge an extra fee to
use it, and any data transmitted or
received through the hotspot will be
added to the overall data usage
Connect to Network Devices (3 of 3)
• Safety Precautions for Wireless Networks
o Change the administrative password for the router
o Change the wireless network name from the default
o Enable encryption, and choose a secure wireless network key that is difficult to
guess
o Regularly change your wireless network key
o Regularly review the number of devices connect to the network
o Enable and configure the MAC address control feature
o Choose a secure location for the wireless router
o Regularly perform router firmware updates

You might also like