Understanding Computer Networks: Protocols, Types, and Security
Computer Networks
Internet Protocols & Hardware
Internet communication relies on a set of rules and protocols, similar to how humans communicate. Internet hardware enables the connection.
- Examples: TCP, Ethernet, Handshaking, UDP, FTP, HTTP, Telnet, SSH. Network hubs, switches, routers, and dedicated cabling are examples of network hardware.
- Applications: Internet protocols are applied to network hardware to enhance security.
Network Types
LANs – Local Area Network
A LAN serves a local area, typically within a building or a group of buildings in a geographical area. Common LAN topologies include:
- Ring Networks: Each computer connects to its neighbors, transmitting data around the network. It performs well under heavy traffic but can crash if a connection fails.
- Bus Networks: Each device connects to a common spine. It is resilient to individual device failures but can be difficult to troubleshoot if the entire network fails.
- Star Networks: Each device connects to a central hub or switch. It is resilient to individual device failures, but the entire network crashes if the central hub fails.
- Hybrid/Tree Networks: Star networks connected to a common bus backbone. It combines the advantages of star and bus networks but can be difficult to wire.
Intranet
An intranet is a private network providing services similar to the internet, such as email, messaging, and web pages, but only for internal users. Businesses often use intranets for:
- Viewing internal web pages (e.g., company calendars)
- Internal email and instant messaging
- Sharing internal documents
WLANs – Wireless Local Area Connection
A WLAN behaves like a LAN but uses radio waves or infrared signals instead of wires. Security is a concern.
- Devices: Wi-Fi (wireless fidelity) enables network connections using radio waves.
- Laptops are optional but desirable for mobility.
- Wireless network interface controllers (WNICs) transmit data via radio waves.
- Wireless routers have antennas and lack cables.
- Wireless access points (WAPs) connect wireless devices to wired networks.
- Other devices include mobile phones, printers, PDAs, and portable media players.
- Data transmission methods include spread spectrum radio waves and infrared signals.
WPANs – Wireless Personal Area Network
A WPAN is a small network used by one person, typically using Bluetooth for functions like transferring photos.
MANs – Metropolitan Area Network
A MAN is similar to a LAN but covers a larger area, often owned by a consortium of users, extending across a city.
WANs – Wide Area Network
A WAN connects multiple LANs through routers or modems, covering a large geographical area.
- Modems convert digital data to analog for transmission through telephone lines.
- HTTP proxy servers act as buffers between WANs (like the internet) and LANs.
- The internet is a global WAN accessible to anyone.
- Extranets extend an organization’s intranet to selected external users.
- Email is the primary means of communication over the internet.
- Businesses use WANs to connect LANs and access the internet.
- VPNs use the internet or other WANs to transmit data, not a physically private network.
- Videoconferencing enables communication between different locations.
- Other applications include telephone call centers and online banking/shopping systems.
Network Security
Network security includes physical and software measures.
Physical Security
Procedures to prevent physical access to computers or server rooms.
- Securing computer rooms: Prevents unauthorized access to data.
- Security guards: Provided by security firms to protect computer facilities.
Software Security
Protects against intrusions into networked computer systems.
- Firewalls: Prevent unauthorized access, available in hardware or software forms.
- Encryption: Converts data into a code by scrambling or encoding it.
- Digital certification: Issued by trusted certificate authorities.
- Authentication techniques: User IDs and passwords to identify users.
- Anti-Virus: Removes viruses, Trojan horses, and worms.
- Chip and PIN cards: Used for logging on by inserting the card and entering a PIN.
- Anti-spam: Rejects unwanted emails.
- Anti-pop-up software: Blocks pop-up messages.
- Anti-spyware software: Prevents unauthorized access and control of computers.
- Wired equivalent privacy (WEP): Code for WLAN access.
- Wi-Fi protected access (WPA): Enhanced encryption over WEP with longer keys.
Electronic Conferencing
Hardware
Telephones, webcams, microphones, speakers.
Types of Software
- Conference software: Compresses audio and video into data packets for network transmission using codecs.
- VOIP software: Enables phone conversations over the internet.
- Instant messaging: Real-time text message exchange over the internet.
Uses
- Businesses: Videoconferencing saves money and time, but some employees find it time-consuming. It is used for quick meetings with low assistance. Phone conferencing and instant messaging are less common.
- Schools: Videoconferencing connects students from different countries, promoting cultural understanding. Phone conferencing helps disabled students. Instant messaging is common among teenagers but not used in schools.
- Research meetings: Videoconferencing is used for small classes with limited discussion. Telephone conferencing helps researchers stay in touch with supervisors.
Types
Videoconferencing
Advantages: No travel time or costs, immediate meetings, environmentally friendly.
Disadvantages: No direct eye contact, low video/audio quality, power cuts can interrupt.
Phone conferencing
Advantages: Lower cost, simple equipment, good sound quality, no need to worry about appearance.
Disadvantages: No facial expressions, documents cannot be seen, limited participants.
Instant messaging
Advantages: Instantaneous, cheap, saves time and money for businesses.
Disadvantages: Can distract teenagers, risky due to unknown contacts and virus spread.