12,13,14
12,13,14
These devices, also called nodes, can include computers, servers, smartphones, printers, and
other hardware components.
2. Data Sharing and Collaboration: Networks facilitate easy sharing of data and collaborative
work among users, improving productivity in business and academic environments.
3. Centralized Data Management: Networks allow centralized storage and management of data,
ensuring easier backups, better organization, and enhanced security.
4. Cost-Effectiveness: Shared resources reduce hardware and software costs, as multiple users
can access the same tools without needing individual copies.
5. Scalability: Networks are scalable, meaning they can grow with an organization’s needs by
adding more nodes or users without major structural changes.
6. Remote Access: Networks enable users to access files, applications, and services from
anywhere, supporting remote work and mobile computing.
1. Security Threats: Networks are vulnerable to cyberattacks such as hacking, malware, and
unauthorized access, requiring robust security measures.
2. Cost of Setup and Maintenance: Initial setup of a network, including hardware, software, and
infrastructure, can be expensive. Regular maintenance also incurs costs.
4. Dependence on the Network: If the network experiences downtime or failures, users may
lose access to resources and services, disrupting productivity.
5. Spread of Malware: A networked environment increases the risk of viruses and malware
spreading quickly across devices, affecting multiple users simultaneously.
6. Limitations: High traffic can lead to slow network performance, particularly if the bandwidth
is insufficient to handle the load.
7. Privacy Concerns: Sharing information across a network may raise privacy concerns,
especially if data is not adequately protected.
A wired network uses physical cables like Ethernet or fiber optics to connect devices, while a
wireless network relies on radio waves or wireless signals for communication. These two types
of networks differ significantly in their features, advantages, and limitations.
Wired networks offer greater speed and reliability compared to wireless networks. The use of
physical cables ensures stable connections with minimal interference, making them ideal for
data-intensive tasks like gaming, video streaming, or office setups. In contrast, wireless
networks are more prone to signal interruptions caused by obstacles, weather, or interference
from other devices. However, advances in wireless technologies like Wi-Fi 6 have narrowed the
performance gap in many scenarios.
One major advantage of wireless networks is their mobility. Users can connect and move freely
within the network’s coverage area without the constraints of physical cables. Wired networks,
on the other hand, limit mobility as devices must remain connected to cables, which can be
cumbersome in dynamic environments.
In terms of installation and cost, wired networks require more time, effort, and expense due to
the need for cabling, switches, and other hardware components. Wireless networks, being
cable-free, are simpler to set up and more cost-effective initially, although additional devices
like signal extenders may be required in large areas.
Security is another critical factor. Wired networks are generally more secure because physical
access to cables is required for unauthorized use. Wireless networks, however, are more
susceptible to hacking and eavesdropping if proper encryption protocols are not implemented.
Scalability is easier with wireless networks since adding new devices involves minimal effort. In
contrast, wired networks require additional cables and infrastructure, making scaling more
complex and expensive.
In conclusion, wired networks are best suited for scenarios requiring high-speed, reliable, and
secure connections, such as offices and fixed setups. Wireless networks excel in environments
where mobility, convenience, and ease of setup are prioritized, such as homes, public spaces,
and mobile workplaces.
Computer networks and the internet have revolutionized communication, business, and daily
life. However, they are also vulnerable to a variety of threats that can compromise data, disrupt
services, and harm individuals or organizations.
1. Malware: Malware, short for malicious software, includes viruses, worms, Trojans, and
ransomware. These programs are designed to harm, exploit, or disrupt computer systems. For
example, ransomware encrypts files and demands payment for their release, while viruses
replicate and spread, corrupting data and programs.
5. Insider Threats: Insider threats occur when employees or individuals with legitimate access
misuse their privileges to harm the network or steal sensitive data. This threat can arise from
malicious intent, negligence, or lack of awareness.
6. Data Interception and Theft: Attackers can intercept data being transmitted over a network,
particularly in unsecured or poorly encrypted systems. This can lead to theft of confidential
information such as personal data, financial details, or business secrets.
Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks (5th ed.). Pearson.