Networking (1)
Networking (1)
What is a network?
A computer network is a link of two or more computers in order to exchange data. In computer networks,
networked computing devices pass data to each other along data connections. Data is transferred in the form of
packets. The connections between nodes are established using either cable media or wireless media. The best-
known computer network is the Internet.
Advantages of a Network
1. Sharing devices such as printers saves money.
2. Centralized Software Management: Site (software) licences are likely to be cheaper than buying several
standalone licences.
3. Files can easily be shared between users.
4. Network users can communicate by email and instant messenger.
5. Security is good users cannot see other users files unlike on stand-alone machines.
6. Data is easy to backup as all the data is stored on the file server.
7. Speed: Networks provide a very rapid method for sharing and transferring files. Without a network, files are
shared by copying them to floppy disks, then carrying or sending the disks from one computer to another
which is time-consuming.
8. Cost: The network version of most software programs are available at considerable savings when compared
to buying individually licensed copies. Besides monetary savings, sharing a program on a network allows for
easier upgrading of the program.
9. Centralized data administration and support
10. It allows users to use programs that would otherwise be too large for the computer to run on its own.
11. They allow users to store more information as they can now store data on other computers on the network.
Disadvantages of a Network
1. Purchasing the network cabling and file servers can be expensive.
2. Managing a large network is complicated, requires training and a network manager usually needs to be
employed.
3. If the file server breaks down the files on the file server become inaccessible. Email might still work if it is
on a separate server. The computers can still be used but are isolated.
4. Viruses can spread to other computers throughout a computer network.
5. There is a danger of hacking, particularly with wide area networks. Security procedures are needed to
prevent such abuse, eg a firewall.
Components of a Network
A computer network comprises the following components:
1. A minimum of at least 2 computers
2. Cables that connect the computers to each other, although wireless communication is becoming more
common
3. A network interface device on each computer (this is called a network interface card or NIC)
4. A ‘Switch’ used to switch the data from one point to another. Hubs are outdated and are little used for new
installations.
5. Network operating system software (nos)
I. TYPES OF TRANSMISSION MEDIA
Classification
1. Conducted or guided media: Use a conductor such as a wire or a fiber optic cable to move the signal
from sender to receiver.
2. Wireless or unguided media: Use of waves of different frequencies and do not need a wire or cable
conductor to transmit signals.
b) coaxial cable
Outer Braided Copper
Jacket Shielding Plastic
Insulation
Copper
Conductor
c) Fibre Optic
2. Coaxial cable 1 to 9 km
3. Optical fibre 40 km
Advantages Disadvantages
easy to install If the main cable fails or gets damaged the whole
network will fail
cheap to install, as it doesn’t require much as more workstations are connected the performance
cable of the network will become slower because of data
collisions
Easy to add stations. Every workstation on the network "sees" all of the
data on the network – this is a security risk
Works well for small networks. Limited no of devices can be attached
The star Network
In a star network each device on the network has its own cable that connects to a switch or hub. A hub sends
every packet of data to every device, whereas a switch only sends a packet of data to the destination device.
Mesh Topology
In this type of topology, a host is connected to one or two or more than two hosts. This topology may have
hosts having point-to-point connection to every other hosts or may also have hosts which are having point to
point connection to few hosts only.
Advantages:
• Yields the greatest amount of redundancy (multiple connections between same nodes) in the event that
one of the nodes fail where network traffic can be redirected to another node.
• Network problems are easier to diagnose
Disadvantages
• The cost of installation and maintenance is high (more cable is required than any other configuration)
Tree Topology
A tree topology is a type of network topology that includes at least three specific levels in a topology hierarchy.
Tree topologies are valued for their scalability and accessibility for troubleshooting.
Daisy Chain
This topology connects all its hosts in a linear fashion. Similar to Ring topology, all hosts in this topology are
connected to two hosts only, except the end hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be Hybrid Topology. Hybrid
topology inherits merits and demerits of all the incorporating topologies.
Advantages:
• Improves sharing of data and programs across the network
• Offers reliable communication between nodes
Disadvantages:
• Difficult and costly to install and maintain
• Difficult to troubleshoot network problems
Fax machines
Fax machines convert images to signals that can be sent over a telephone line to a receiving machine. They are
extremely popular in offices. They can scan the image of a document and print the image on paper.
Microcomputers use fax/modem circuit boards to send and receive fax messages.
Shared resources
Shared resources are communication networks that permit microcomputers to share expensive hardware such as
laser printers, chain printers, disk packs and magnetic tape storage. Several microcomputers linked in a network
make shared resources possible. The connectivity capabilities of shared resources provide the ability to share
data located on a computer.
Online services
Online services are business services offered specifically for microcomputer users. Well-known online service
providers are America Online (AOL), AT&T WorldNet, CompuServe, Africa Online, Kenyaweb, UUNET,
Wananchi Online and Microsoft Network.Typical online services offered by these providers are:
- Teleshopping- a database which lists prices and description of products. You place an order, charge
the purchase to a credit card and merchandise is delivered by a delivery service.
- Home banking – banks offer this service so you can use your microcomputer to pay bills, make loan
payments, or transfer money between accounts.
- Investing – investment firms offer this service so you can access current prices of stocks and bonds.
You can also buy and sell orders.
- Travel reservations – travel organizations offer this service so you can get information on airline
schedules and fare, order tickets, and charge to a credit card.
- Internet access – you can get access to the World Wide Web.
NETWORK SECURITY
Common Attacks
Wire tapping: listening a link to get access to cleartext data and passwords
Impersonation: to get unauthorized access to data or to create unauthorized e-mails, orders, etc.
Denial-of-service: to render network resources non-functional
Replay of messages: to get access to and change information in transit
Guessing of passwords: to get access to information and services that would
normally be denied (dictionary attack)
Guessing of keys: to get access to encrypted data and passwords (brute-force attack, chosen ciphertext attack,
chosen plaintext attack)
Viruses, trojan horses and logic bombs: to destroy data
Though these attacks are not exclusively specific to TCP/IP networks, they should be considered potential
threats to anyone who is going to base his/her network on TCP/IP, which is what the majority of enterprises,
organizations and small businesses around the world are doing today. Hackers (more precisely, crackers) do
likewise and hence find easy prey.
Passwords: Make sure that passwords are enforced to be of a minimum length (typically six to eight characters),
to contain at least one numeric character, to be different from the user ID to which they belong, and to be
changed at least once every two months.
User IDs: Make sure that every user has a password and that users are locked out after several logon attempts
with wrong passwords (typically five attempts). Keep the passwords to superuser accounts (root, supervisor,
administrator, maint, etc.) among a very limited circle of trusted system, network and security administrators.
System defaults: Make sure that default user IDs are either disabled or have passwords that adhere to the
minimum requirements stated above. Likewise, make sure that only those services are enabled that are required
for a system to fulfill its designated role.
Physical access: Make sure that access to the locations where your systems and users physically reside is
controlled appropriately. Information security begins at the receptionist, not at the corporate firewall.
Help desk: Make sure that callers are properly identified by help desk representatives or system administrators
before they give out "forgotten" passwords or user IDs. Social engineering is often the first step to attack a
computer network.
Solutions to Security Issues
A combination of several such solutions should be considered in order to guarantee a certain level of safety and
security.
Integrity checking and message authentication codes (MACs): to protect against the improper alteration
of messages.
Non-repudiation: to make sure that an action cannot be denied by the person who performed it
Frequent key refresh, strong keys and prevention of deriving future keys: to protect against breaking of
keys (crypto-analysis)
Address concealment: to protect against denial-of-service attacks
Content inspection: to check application-level data for malicious content before delivering it into the secure
network