SlideShare a Scribd company logo
1 of 38
Topic 4 Networks 4.1 Introduction This topic considers the various ways in which  computers can be connected to each other  to communicate, share data and peripherals. Four  categories of network are covered in the course: 1. LAN 3. Internet 4. Intranet 2. WAN
a.  Transmission media c.  Geographical spread d.  Functions b.  Bandwidth Network Characteristics In looking at the four categories of networks we will compare them using the following four characteristics: Refers to the  type of cabling or wireless  method used to transfer data.  Relates to the  speed  at which data can be transferred throughout the network. Looks at the  size of the area  which the network covers. Considers what  tasks  the network can carry out for the users.
[object Object],[object Object],[object Object],[object Object],LAN - Local Area Network a. Transmission media c. Geographical spread d. Functions b. Bandwidth Fibre-optic cable, Unshielded twisted pair(UTP) cable, co-axial cable (as used in a tv aerial.)  This depends on the cabling and hardware used. UTP cable allows data transfer at 10 – 100 Mbps Physical cabling is laid to connect the network.  Usually one building, school, office, factory.  Typically up to about two km. Peripheral sharing, electronic mail, data sharing.  http://fcit.usf.edu/network
[object Object],[object Object],[object Object],[object Object],WAN - Wide Area Network a. Transmission media c. Geographical spread d. Functions b. Bandwidth Telecommunications systems covering large areas.  Slower than LAN.  Depends on the link used. Modem dial-up up to 56 Kbps. ADSL up to 9 Mbps, dedicated line up to 45 Mbps. WANs can cover any size of area.  They use telecommunications which covers most of the earth. Electronic mail, data sharing, conferencing.
[object Object],[object Object],[object Object],[object Object],Internet a. Transmission media c. Geographical spread d. Functions b. Bandwidth Telecommunications systems covering large areas.  Same as WAN.  Depends on the link used. Modem dial-up up to 56 Kbps. ADSL up to 9 Mbps, dedicated line up to 45 Mbps. The Internet can cover any size of area.  They use telecommunications which covers most of the earth. Electronic mail, information sharing using WWW, File sharing using FTP.  An internet is a network of networks
[object Object],[object Object],[object Object],[object Object],Intranet a. Transmission media c. Geographical spread d. Functions b. Bandwidth Telecommunications systems covering large areas.  Slower than LAN.  Depends on the link used. Modem dial-up up to 56 Kbps. ADSL up to 9 Mbps, dedicated line up to 45 Mbps. Intranet can cover any size of area using telecommunications links which cover most of the earth.  The Council has its own intranet. An intranet is like the internet but confined to one organisation. Electronic mail, information sharing using WWW, File sharing using FTP.
Mainframe A  mainframe  is a very large computer which provides processing power and backing storage facilities to users working at  terminals . A  terminal  is a monitor and keyboard with little or no processing power and no storage facility. Mainframes  were popular for large scale computing ventures but many have been replaced by newer  client server  networks.
Mainframes  offer the following facilities: High capacity input/output . Can access and store data for thousands of users simultaneously Powerful processing capability .  Can process data for thousands of users simultaneously Centralised storage, processing and management  of large amounts of data. Comprehensive backup, recovery and security  for the system
Network of Computers Unlike a mainframe, a  network  is a  collection of independent computers  connected together. Each of the computers has its  own processing power  and  backing storage capability  and is capable of functioning as a standalone computer. In the Higher course we will look at  two  types of network: 1. Peer-to-peer network. 2. Client Server network.
Peer-to-Peer Network In a  peer-to-peer  network all the computers have  equal status . Each computer can choose to  share its resources  with the other computers.  Resources include printers, backing storage devices, data files. There is  no centralised backing storage  as each computer stores its own data and applications.  A system for backups is therefore difficult to implement. Security is difficult  to maintain as resources, user names and passwords are not centrally managed. Most  home networks  are peer to peer.
Client Server Network In a  Client Server  network some computers are  clients . People use these to access the network. Backing storage is centralised  and all user files are stored on a file server.  It is  easy to make backups  on the file server.  The server holds a database of all user names, passwords and access rights.  Security  is easy to maintain as it is  centrally managed . The  school network  is an example of a client server network. A  server  is a computer which  controls a resource  that is made available to clients on the network.  Resources might include  applications, data files, printers, email  or  internet access .
Client Server Network ,[object Object],[object Object],(continued) ,[object Object],Advantages of a client-server network ,[object Object],[object Object]
Types of Server File Server Stores users’ data files. Controls file access .  Each user has access to certain files. Controls the type of access . e.g. read only, write, create Print Server Handles  all  printing requests  from clients. Queues jobs ,  spools  them to disk and  sends to printer  when printer is ready. ,[object Object],[object Object],[object Object]
Web Server Requests for  internet access  including Web pages, email and file sharing are dealt with by this server. (continued) Types of Server Web Server advantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Topology The  topology  of a network refers to the shape of the network, how the computers are physically connected together. A  node  is any device which is attached to the network.  A  channel  is the way in which data is transferred from one node to another.  e.g. a  computer, printer, server, router. This could a cable or some form of wireless technology. Four  topologies are covered in the Higher Course. node Network topology diagrams must always be labelled with the words  node  and  channel channel
[object Object],[object Object],[object Object],[object Object],Bus Topology Used in LANS. All nodes are connected to a single channel. A communication from one node is seen by all the other nodes. Each node will recognise and accept communications which are addressed to it. or node channel
[object Object],[object Object],[object Object],[object Object],Bus Topology Node Failure Channel Failure There is typically a mechanism to bypass a failed node so failure of one node will only affect that node.  Rest of network will still function. A channel failure will cause the whole network to fail. or node channel
[object Object],[object Object],[object Object],[object Object],Star Topology Used in LANS. Each node has its own channel to the central node. The whole network depends on the proper functioning of the central node. Cabling cost is high because each node has its own channel but it is easy to extend the network. node channel
[object Object],[object Object],[object Object],[object Object],Star Topology Node Failure Channel Failure A failure of one node will only affect that node.  Failure of the central node will disable the entire network. A channel failure will only affect the outer node on that channel. node channel
[object Object],[object Object],[object Object],[object Object],Ring Topology Used in LANS. Channels and nodes form a ring.  Only one node can transmit at a time and data passes between nodes until it reaches its destination. The network has to be disrupted when a new node is added.  Designing and extending the network is more difficult than with a star network. node channel
[object Object],[object Object],[object Object],[object Object],Ring Topology Node Failure Channel Failure A channel failure will disable the entire network. There is typically a mechanism to bypass a failed node so a failure of one node will only affect that node.  node channel
[object Object],[object Object],[object Object],[object Object],Mesh Topology Used in WANS. e.g. telephone grid. There are alternative channels between nodes.  Several nodes can transmit at a time and data can be redirected when some channels are busy. The extra cabling makes this an expensive type of network to set up but it is very robust. node channel
[object Object],[object Object],[object Object],[object Object],Mesh Topology Node Failure Channel Failure The failure of one node will only affect that node.  A channel failure will have no effect as alternative channels are available.  It may, however, slow down traffic on the network.  node channel
Some  nodes  on a network are devices which are there to  manage the flow of data . Hubs, Switches & Routers When data is sent it includes a destination address. Each node on the network has its own address to uniquely identify it. ,[object Object],[object Object],[object Object],Three common devices used for managing the flow of data are:
Stackable hubs  with 8, 16 or 24 ports can be linked to form large LANS.  Nodes are connected to a  hub  via channels.  When data is received from a node it is  broadcast to all the other ports . It may also  amplify the signal  if long distances are involved. This is  inefficient  as the data is intended for only one of the other nodes. Hub ,[object Object],[object Object],[object Object]
A  switch  is sometimes known as an  intelligent hub . When data is received from a node it is examined and then  sent directly  to the destination known. Switches are more complex than hubs and are therefore  more expensive . This is  more efficient than a hub  as the data goes directly to the destination node. Switch ,[object Object],[object Object],[object Object]
Faster NIC(Network Interface Cards)  could also improve technical performance. How can you improve the technical performance of a network which uses a hub? A  Switch  would be  more efficient than a Hub  in that it doesn’t broadcast data to all nodes on the network Higher specification cabling  could improve technical performance. ,[object Object],[object Object],[object Object]
They connect  LANS to telecommunications lines  and the Internet. Routers  connect  different networks  together. They  control and manage the flow of data  over the different networks. They  cope with the differences  in  topologies  and  transmission media . They connect  smaller networks into larger internetworks. Router ,[object Object],[object Object],[object Object]
Each device  on a network  requires an interface  to allow it to connect. A  Network interface card (NIC)  is usually slotted into the motherboard of the device.   Wireless interface cards  can also be used.  These can use USB or PCMCIA cards to allow devices to connect. The NIC  converts the data  to and from a format that can be transmitted over the network .   Network Interface Card
Higher Bandwidth Technology is improving rapidly and improvements in bandwidth  increase the rate of data transfer .  Higher bandwidth allows the possibility of  transferring video, graphics and audio  and will allow live streaming of data. Network Trends ,[object Object],[object Object],[object Object]
Wireless Communications Wireless communication increases  flexibility of use  and is becoming more popular for home, office and public spaces. ,[object Object],[object Object],[object Object],Network Trends
There are many technical reasons for the increasingly widespread use of networks.  These include: ,[object Object],[object Object],Spread of Networks ,[object Object],[object Object]
[object Object],There is a standard protocol for communication – (TCP/IP) Spread of Networks Networking software is now built into common operating systems e.g. Windows Vista, Linux and Windows XP
Computer Networks & the Law The use of networks which can be local, national or even international poses  legal problems  for governments. Three  Acts in particular are relevant for possible network misuse. Computer Misuse Act This Act makes it  illegal to breach network security  for any reason. “ Hackers ” can be fined or imprisoned for gaining access and looking at or altering data and also for introducing viruses.
Computer Networks & the Law Copyright, Designs & Patents Act This Act makes it  illegal to make unauthorised copies of material . Offenders can be fined or imprisoned for being involved in this activity and  FAST (The Federation Against Software Theft) have had many companies and individuals prosecuted. It is very  easy  on a network  to transfer audio, video and text  at high speed.  This has led to a huge increase in the  unauthorised pirating  of music, films and books.
Computer Networks & the Law Data Protection Act(1998) The Act gives individuals( Data Subjects ) rights to: ,[object Object],[object Object],[object Object],[object Object],The principles of this Act also apply to network use. http://www.informationcommissioner.gov.uk/
Computer Networks & the Law Data Protection Act(1998) Organisations processing personal data (" controllers ") must comply with the data protection principles. These require data to be: ,[object Object],[object Object],[object Object],[object Object]
Computer Networks & the Law Data Protection Act(1998) ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th editionEnsign Handoko
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Shareitsvineeth209
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic conceptsMayank Jain
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network ServicesMohammed El Hedhly
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Prof. Maulik Trivedi
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkDuy Hoang Nguyen
 

What's hot (19)

Cn ppt
Cn  pptCn  ppt
Cn ppt
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic concepts
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network Services
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
network hardware
network hardwarenetwork hardware
network hardware
 
networking
networkingnetworking
networking
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 

Similar to Hcs Topic 4 Networks V2

Software Slides
Software SlidesSoftware Slides
Software Slidesiarthur
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317Khondoker Sadia
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHISowmya Jyothi
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 

Similar to Hcs Topic 4 Networks V2 (20)

Software Slides
Software SlidesSoftware Slides
Software Slides
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Hcs Topic 4 Networks V2

  • 1. Topic 4 Networks 4.1 Introduction This topic considers the various ways in which computers can be connected to each other to communicate, share data and peripherals. Four categories of network are covered in the course: 1. LAN 3. Internet 4. Intranet 2. WAN
  • 2. a. Transmission media c. Geographical spread d. Functions b. Bandwidth Network Characteristics In looking at the four categories of networks we will compare them using the following four characteristics: Refers to the type of cabling or wireless method used to transfer data. Relates to the speed at which data can be transferred throughout the network. Looks at the size of the area which the network covers. Considers what tasks the network can carry out for the users.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Mainframe A mainframe is a very large computer which provides processing power and backing storage facilities to users working at terminals . A terminal is a monitor and keyboard with little or no processing power and no storage facility. Mainframes were popular for large scale computing ventures but many have been replaced by newer client server networks.
  • 8. Mainframes offer the following facilities: High capacity input/output . Can access and store data for thousands of users simultaneously Powerful processing capability . Can process data for thousands of users simultaneously Centralised storage, processing and management of large amounts of data. Comprehensive backup, recovery and security for the system
  • 9. Network of Computers Unlike a mainframe, a network is a collection of independent computers connected together. Each of the computers has its own processing power and backing storage capability and is capable of functioning as a standalone computer. In the Higher course we will look at two types of network: 1. Peer-to-peer network. 2. Client Server network.
  • 10. Peer-to-Peer Network In a peer-to-peer network all the computers have equal status . Each computer can choose to share its resources with the other computers. Resources include printers, backing storage devices, data files. There is no centralised backing storage as each computer stores its own data and applications. A system for backups is therefore difficult to implement. Security is difficult to maintain as resources, user names and passwords are not centrally managed. Most home networks are peer to peer.
  • 11. Client Server Network In a Client Server network some computers are clients . People use these to access the network. Backing storage is centralised and all user files are stored on a file server. It is easy to make backups on the file server. The server holds a database of all user names, passwords and access rights. Security is easy to maintain as it is centrally managed . The school network is an example of a client server network. A server is a computer which controls a resource that is made available to clients on the network. Resources might include applications, data files, printers, email or internet access .
  • 12.
  • 13.
  • 14.
  • 15. Network Topology The topology of a network refers to the shape of the network, how the computers are physically connected together. A node is any device which is attached to the network. A channel is the way in which data is transferred from one node to another. e.g. a computer, printer, server, router. This could a cable or some form of wireless technology. Four topologies are covered in the Higher Course. node Network topology diagrams must always be labelled with the words node and channel channel
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Each device on a network requires an interface to allow it to connect. A Network interface card (NIC) is usually slotted into the motherboard of the device. Wireless interface cards can also be used. These can use USB or PCMCIA cards to allow devices to connect. The NIC converts the data to and from a format that can be transmitted over the network . Network Interface Card
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Computer Networks & the Law The use of networks which can be local, national or even international poses legal problems for governments. Three Acts in particular are relevant for possible network misuse. Computer Misuse Act This Act makes it illegal to breach network security for any reason. “ Hackers ” can be fined or imprisoned for gaining access and looking at or altering data and also for introducing viruses.
  • 35. Computer Networks & the Law Copyright, Designs & Patents Act This Act makes it illegal to make unauthorised copies of material . Offenders can be fined or imprisoned for being involved in this activity and FAST (The Federation Against Software Theft) have had many companies and individuals prosecuted. It is very easy on a network to transfer audio, video and text at high speed. This has led to a huge increase in the unauthorised pirating of music, films and books.
  • 36.
  • 37.
  • 38.