Computer Networks: Devices, LANs, WLANs, WANs

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the minimum number of computers required to form a network?

  • Four
  • One
  • Two (correct)
  • Three

Networks exclusively use wired connections.

False (B)

Which of the following is a primary advantage of using computer networks?

  • Greater difficulty in completing tasks if the network breaks
  • Necessity to only access reliable information
  • Easy sharing of files and data (correct)
  • Increased vulnerability to hackers

A major disadvantage of using networks is the vulnerability to ______.

<p>hackers</p> Signup and view all the answers

What is the function of client computers in a network?

<p>To enable users to do their work (D)</p> Signup and view all the answers

Servers in a network are typically less powerful than client computers.

<p>False (B)</p> Signup and view all the answers

Which of the following services is commonly provided by servers on a network?

<p>Central file storage (A)</p> Signup and view all the answers

What does LAN stand for?

<p>Local Area Network</p> Signup and view all the answers

Which characteristic best describes a Local Area Network (LAN)?

<p>Confined to one building or site (A)</p> Signup and view all the answers

LANs commonly use satellite links for connections due to their geographical size.

<p>False (B)</p> Signup and view all the answers

What is used to connect computers in a Wireless Local Area Network (WLAN) instead of cables?

<p>Radio signals (WiFi) (A)</p> Signup and view all the answers

The central device in a WLAN that sends and receives data is called a wireless ______ or router.

<p>switch</p> Signup and view all the answers

What is the main difference between a WAN and a LAN?

<p>WANs extend over a large geographical area (C)</p> Signup and view all the answers

A WAN is often created by independently setting up computers in different locations.

<p>False (B)</p> Signup and view all the answers

Which technology is commonly used in WANs due to the long distances involved?

<p>Optical fiber cables (A)</p> Signup and view all the answers

What is the primary purpose of Bluetooth technology?

<p>short-range wireless connections</p> Signup and view all the answers

Which of the following is a characteristic feature of Bluetooth technology?

<p>Low-power transmitters (B)</p> Signup and view all the answers

Bluetooth requires manual configuration to detect nearby devices.

<p>False (B)</p> Signup and view all the answers

Which of the following is a disadvantage of the bus network topology?

<p>Can be slow due to shared cable (B)</p> Signup and view all the answers

In a bus network, the computers are connected via a long, central ______.

<p>cable</p> Signup and view all the answers

What happens to a bus network if there is a break in the central cable?

<p>The network stops working (C)</p> Signup and view all the answers

How does a ring network topology handle a break in the cable differently than a bus network?

<p>cope with the break</p> Signup and view all the answers

What is the primary characteristic of a star network topology?

<p>All computers connect to a central device (B)</p> Signup and view all the answers

A star network continues to function if its central device breaks.

<p>False (B)</p> Signup and view all the answers

What device is typically at the center of a star network?

<p>Hub or Switch (D)</p> Signup and view all the answers

A ______ network combines two or more basic network topologies.

<p>hybrid</p> Signup and view all the answers

What is the main role of a Network Interface Card (NIC)?

<p>To enable a computer to connect to a network (C)</p> Signup and view all the answers

Modern computers always require an expansion card to have a network interface.

<p>False (B)</p> Signup and view all the answers

What is the fundamental function of a hub in a network hardware setup?

<p>To connect multiple computers together in a LAN (B)</p> Signup and view all the answers

Why are hub-based networks considered less secure?

<p>sends it to every computer</p> Signup and view all the answers

How does a switch differ from a hub in handling network traffic?

<p>A switch sends data only to the specific computer it is addressed to. (D)</p> Signup and view all the answers

Switches are generally less expensive than hubs.

<p>False (B)</p> Signup and view all the answers

What is a primary function of a router in computer networking?

<p>To connect two or more networks together (A)</p> Signup and view all the answers

A common use of a router is to join a local network (LAN) to the ______ (WAN).

<p>Internet</p> Signup and view all the answers

What additional functionality does a wireless router provide compared to a wired router?

<p>Wireless connectivity (C)</p> Signup and view all the answers

What is the main purpose of a proxy server?

<p>share a resource</p> Signup and view all the answers

What additional security benefits does a proxy server offer over a router?

<p>Ability to install additional software like anti-virus (C)</p> Signup and view all the answers

A bridge connects a LAN to a WAN, similar to a router.

<p>False (B)</p> Signup and view all the answers

What is the primary function of a firewall in network security?

<p>To block unauthorized connections (A)</p> Signup and view all the answers

A firewall is placed between your computer and the rest of the network to protect it from ______.

<p>hackers</p> Signup and view all the answers

Flashcards

What is a Network?

Two or more computers connected together to exchange data.

Why Use Networks?

Share files and data, as printers and Internet connections. Communicate with other network users. Store data centrally (using a file server).

Why Not Use Networks?

The computer is vulnerable to hackers. If the network breaks, many tasks become very difficult. Your computer can more easily be attacked by a virus.

What are Clients?

Normal computers used to perform work on a network.

Signup and view all the flashcards

What are Servers?

Special, powerful computers that provide 'services' to client computers on a network.

Signup and view all the flashcards

Local Area Network (LAN)

A network confined to one building or site. Often a private network belonging to an business.

Signup and view all the flashcards

Wireless Local Area Network (WLAN)

A LAN that uses radio signals (WiFi) to connect computers instead of cables.

Signup and view all the flashcards

Wide Area Network (WAN)

A network that extends over a large area.

Signup and view all the flashcards

Bluetooth (Personal Area Network)

Wireless technology designed for short-range connections.

Signup and view all the flashcards

Bus Network

A long central cable connects all computers. If there is a break in the central bus cable, topology will stop working.

Signup and view all the flashcards

Ring Network

Each computer is connected to a loop of cable.

Signup and view all the flashcards

Star Network

Every computer is connected to a central device.

Signup and view all the flashcards

Hybrid Network

Combines two or more of the basic topologies.

Signup and view all the flashcards

Network Cable

Used to connect together different devices to make up a network.

Signup and view all the flashcards

Network Interface Card (NIC)

Any computer connected to a network, needs to have a network interface card.

Signup and view all the flashcards

Hub

A device that connects computers together to make a LAN.

Signup and view all the flashcards

Switch

A device that connects computers together to make a LAN, but is more 'intelligent' than a hub.

Signup and view all the flashcards

Router

A network device that connects together two or more networks.

Signup and view all the flashcards

Proxy Server

Computer setup to share a resource, using an Internet connection.

Signup and view all the flashcards

Bridge

A network device that links together two different parts of a LAN.

Signup and view all the flashcards

Firewall

A device or software placed between your computer and the rest of the network.

Signup and view all the flashcards

Modem

Device that joined the digital computer to the analogue telephone lines.

Signup and view all the flashcards

Https://

Hypertext transfer protocol secure. Set of rules/protocol to transfer web pages securely

Signup and view all the flashcards

WWW

World wide web. An information system that operates over the internet. Lets documents connect to other documents using hyperlinks

Signup and view all the flashcards

Script

A set of instructions for computer

Signup and view all the flashcards

Scripting language

A programming language such as JavaScript used to create a script.

Signup and view all the flashcards

URL

Uniform Resource Locator is another term for the name of a website

Signup and view all the flashcards

Browser

A type of software that allows you to go on the internet.

Signup and view all the flashcards

The Internet

An international network of computers that allows users to use email, browse the World Wide Web or to chat either by text or by voice.

Signup and view all the flashcards

Disadvantages of Intranet?

Limited resources when compared with the internet. Limited range of views offered

Signup and view all the flashcards

What is Extranet?

Limited external access via the internet. Limited information of relevance to specific external users

Signup and view all the flashcards

What is Intranet?

Internal to companies or organisations. Provide information that is relevant to the company or organisation.

Signup and view all the flashcards

IP Address

Internet Protocol address. Unique identifier. IP addresses must be different for each device on a network

Signup and view all the flashcards

Purpose of a routing table

Used to determine where data packets will be directed

Signup and view all the flashcards

FTP/File Transfer Protocol

Transfer files between computers or websites

Signup and view all the flashcards

Networks in Finance

Handle payments for materials, send invoices to customers, order new materials when stock gets low, pay the company's employees.

Signup and view all the flashcards

School management systems

School library, human resource, site management, finance. Administration and reporting to parents

Signup and view all the flashcards

Advantages : Booking systems

Individual seats and showings can be booked. Payment can be made online. Returning customers can have their details and preferences saved

Signup and view all the flashcards

Advantages: Banking system:

Money can be accessed from anywhere in the world where there are ATM machines

Signup and view all the flashcards

Disadvantages Banking system

Banks aren't familiar with local customers, increasing the chance of fraud

Signup and view all the flashcards

Study Notes

Objectives of Computer Networks

  • Describe the use of various devices used to set up computer networks
  • Describe the use of Wi-Fi and Bluetooth in networks
  • Define the terms LAN, WLAN, and WAN and identify their characteristics
  • Note the differences between LAN, WLAN, and WAN
  • Identify a variety of methods of communication over networks
  • Describe the advantages and disadvantages of the internet and intranets in business environments
  • Understand the advantages and disadvantages of accessing the internet using different types of computer
  • Understand and explain the need to use IDs and passwords
  • Understand and explain the need for confidentiality and data security on computer networks
  • Identify and explain the need for encryption and authentication techniques

What is a Network?

  • A network consists of two or more computers or electronic devices
  • They are connected to facilitate data exchange
  • Networks allow computers to share files, exchange messages, and share resources like printers
  • Connections are typically made using cables, but can also be achieved through radio signals (Wi-Fi), telephone lines (with modems), or satellite links for long distances

Why Use Networks?

  • Networks facilitate easy sharing of files and data
  • Resources such as printers and Internet connections can be shared
  • Communication among network users is enhanced through email, instant messaging, and video conferences
  • Central data storage on a file server allows for easy access and backup
  • Workstations can access settings centrally managed
  • Online services like shopping (e-commerce) and banking become accessible
  • Access to a wide array of information is available for research purposes
  • Different forms of entertainment, including games and video, can be accessed
  • Online communities, such as MySpace and Facebook, can be joined

Why Not Use Networks?

  • Computers become more vulnerable to hackers
  • Network disruptions can make tasks difficult
  • The risk of virus attacks increases
  • Revealing personal information requires caution
  • Users must avoid potentially harmful websites that may contain malware
  • Information on the Internet may not always be accurate or reliable

Computers in a Network

  • Client computers, or workstations, are the computers users interact with for their work
  • Servers are powerful computers that provide services to client computers on the network
  • Server services include centralized file storage, sharing hardware such as printers, controlling network access, and sharing Internet connections

Types of Network

  • There are networks that don't involve computers

Local Area Network (LAN)

  • A LAN confines its network to one building or site
  • LANs are private networks belonging to an organization or business
  • LANs typically use cables or low-power radio (wireless) for connections because they are geographically small

Wireless Local Area Network (WLAN)

  • A WLAN is a LAN that uses radio signals (WiFi) instead of cables to connect computers
  • A wireless switch or router with antennas is at the center of the WLAN
  • The antennas send and receive data to the computers

Wide Area Network (WAN)

  • A WAN extends over a large area
  • A WAN is created by joining several LANs together, like when offices in different countries link their LANs
  • WANs often use optical fiber cables, satellite radio links, and microwave radio links

Bluetooth (Personal Area Network)

  • Bluetooth is a wireless networking technology designed for short-range connections
  • Bluetooth aims to eliminate the need for cables that connect computers to devices like printers, mice, and keyboards
  • Bluetooth devices use small, low-power radio transmitters and receivers
  • When devices are in range, they detect each other and can be paired

LAN Topologies

  • LAN topologies define the structure of a network

Bus Network

  • It uses a long, central cable called “bus' to connect all of the computers
  • Is cheap to install because it only requires one long cable
  • Communication can be slow because all computers share the same cable
  • A break in the central bus cable will halt the network

Ring Network

  • Each computer is connected to a loop of cable in a ring network
  • The network can manage a break in the ring cable, as all computers remain connected

Star Network

  • Each computer is connected to a central device
  • The central device is often a hub or switch and passes messages between the computers
  • It is expensive to install
  • It is very fast because each computer has its own cable
  • A central device impacts the workings of the entire network
  • The network will fail if the central device breaks
  • Is the most common network topology

Hybrid Network

  • A hybrid network combines two or more basic topologies

Networking Hardware

  • Cables are needed to connect different devices to create a network
  • Cables are still used in most networks to carry more data per second

Key Cable Network Types

  • Fiber optic cables
  • Coaxial cable
  • Unshielded twisted pair

Network Interface Card (NIC)

  • For a computer to connect to a network, it needs to have a network interface card (NIC)
  • Modern computers typically have NICs on the motherboard, but some may require an additional expansion card

Hub

  • A hub connects a number of computers to create a LAN
  • Hubs are found at at the center of a star network and have cables plugged into it from each computer
  • If a hub receives data, it resends it to every computer on the network, and is considered a “dumb” device
  • Hub-based networks are not very secure because everyone can listen in to communications

Switch

  • A switch connects computers to make a LAN
  • Switches are found at the center of a star network, and they have cables plugged into it from each computer
  • Switches are more 'intelligent' devices. When they receive a message, it checks who it is addressed to and only sends it to the specific computer
  • Networks that use switches are more secure than those that use hubs, but are also more expensive

Router

  • Routers connect two or more networks
  • They join a local network to the Internet

Proxy Server

  • Proxy servers share resources such as an Internet connection
  • Other computers request web pages via the proxy server and then it sends it back to the computer that asked for it
  • Used because additional software can be installed such as anti-virus and web filtering

Bridge

  • A bridge is a network device that links two parts of a LAN together
  • A router links a LAN to a WAN, such as the Internet
  • Bridges link independent parts of a LAN so it acts like a single LAN

Firewall

  • A firewall is a device or software that is positioned between your computer and other networks
  • Its purpose is to protect an entire LAN from hackers on the Internet
  • Firewalls block unauthorized connections and allow normal data to pass through

Modem

  • Modems were used to connect to the Internet via telephone lines
  • Telephone lines are designed to carry voices (analogue signals), not digital data
  • The solution was to use modems which convert data for transmission

Key Terms

  • The Digital to Analogue Converter (DAC) in the modem translates digital data into analogue signals for telephone lines
  • The Analogue to Digital Converter (ADC) in the modem translates analogue signals from telephone lines back into digital data
  • Modems convert computers to send signals from digital to analogue and from analogue to digital

Parts of a Webpage Address

Internet vs Intranet

  • A website address uses:
  • Top Level Domain
  • Second Level Domain
  • Subdomain
  • File name
  • File Path
  • Host name
  • Protocol

Key Terms

  • Https:// - Hypertext transfer protocol secure. A set of rules/protocol to transfer web pages securely.
  • WWW - World wide web. An information system that operates over the internet
  • Script - A set of instructions for computer Scripting language
  • URL - Uniform Resource Locator is another term for the name of a website
  • There is software that allows access to the internet
  • You can access a website via URL or IP address

The Internet

  • It's an international network that supports email, web browsing and text or voice chat

Internet vs Intranet: Webpages vs Websites

  • Webpages contain text, images, sound, animations, and video
  • Websites are linked together by hyperlinks that allow a user to navigate between webpages

Intranet Advantages

  • Data is relevant to the user
  • Data has been checked and validated by the organisation
  • Smaller size makes communication and searching for information faster
  • The structure will also be relevant to the organisation, so it will be easier for users to understand
  • Ensure that all material is safer and appropriate

Intranet Disadvantages

  • Limited resources when compared with the internet
  • Limited range of views offered
  • Expensive to setup and maintain as technicians need to be trained
  • Staff need to be trained to upload material
  • Limited access to/by customers and other organizations

Extranet vs Intranet

  • Extranets are private internal networks with limited external access via the internet.
  • Intranets are internal to companies or organizations
  • Extranets and intranets provide limited information of relevance to specific external users
  • Intranets block access to the internet to protect data
  • The data stored locally on an intranet is very secure
  • Extranets and intranets each have a layered method for access control

Internet vs Intranet (Differences)

  • Security, data safety, access policies, etc, differentiate an intranet from the public wide open internet
  • The data on an intranet is more relevant/reliable than information found on the internet

Internet vs Intranet (Similarities)

  • Both are communication systems and networks
  • Both use internet technologies and HTML to write the web pages
  • Both are information systems

Accessing the internet

Dial-Up:

  • Utilizes Dial-up Modems and a telephone line
  • The advantage is that it is very cheap and only requires access to a telephone line
  • The disadvantage is the slowest connection speed at 56 kbps while tying up the telephone line

Fibre Optic Cable

  • Utilizes a cable modem
  • The advantage is a very fast and stable connection that does not rely on the telephone line
  • The disadvantages are they are often available only in urban areas

Broadband (DSL)

  • Utilizes an ADSL Modem,
  • The advantages are fast connections with an “always on” service
  • One disadvantage is that heavy users can exceed limits
  • Broadband is delivered via telephone connections
  • The disadvantage is reduced speeds for users during peak demand

Mobile Broadband

  • Utilizes phone data plans and a mobile phone with data
  • Provides mobile access at any location for a fee

IP Address

  • Internet Protocol address
  • Consists of unique identifier
  • IP addresses must be different for each device on a network
  • All devices connected to the internet use IP addresses
  • This determines the electronic location of the device

Purpose of a Routing Table

  • Used to determine where data packets will be directed
  • Stores route information
  • Stores IP addresses

Protocols associated with Internet/Intranet

  • HTTP/HyperText Transfer Protocol is used to transfer data between a webserver and the browser
  • HTTPS/ HyperText Transfer Protocol Secure variant, is a secure version with data transfer between a webserver and the browser
  • FTP/File Transfer Protocol transfers files between computers or websites
  • VOIP/Voice Over Internet Protocol makes phone calls over the internet
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security) Determines variables of the encryption
  • SMTP/Simple Mail Transfer Protocol A communication protocol for email
  • SLS/Service Level Specification is a protocol used on the internet

Computer Networks in Business Environments

  • Networks handle payments, send invoices, order materials, pay employees, deposit money and calculate finances

School management systems

  • Used for School library, human resources, site management, finance, and many other systems

Booking systems Advantages:

  • Individual seats and showings can be booked and payments can be made online
  • You do not have to visit the cinema/theatre to book
  • Returning customers details are saved, and theatres can plan ahead

Booking systems Disadvantages

  • Things can be booked quickly reducing options
  • Lack of Internet access can prevent bookings
  • System crashes or duplicates create transaction errors

Banking systems Advantages:

  • Accessed via ATM anywhere in the world and via internet
  • Transactions can be done remotely
  • Money moved between account quickly
  • payroll can be set to benefit employer and employee

Banking systems Disadvantages

  • Banks are distant reducing customer interaction
  • Fraud via electronics increases
  • Lack of Internet access reduces service benefits

Library system Advantages

  • Renewed remotely with reminders via email or text
  • Membership automated and cards not needed
  • Books borrowed from other libraries

Library system Disadvantages

  • People can miss out on books if they are renewed remotely
  • traditional browsing is less helpful if most books are not stored in store

Expert System

  • It's a computer software that attempts to act as a human expert on a particular subject area
  • They are often used to advise or advisee non-experts
  • Their function is used where expert is unavailable or might be to expensive to employ

How are expert systems created?

  • Experts a interviewed and their knowledge is collected.
  • Knowledge is organized and stored.
  • This allows the knowledge base to be searched by the user.

Explanation/User Inferface

  • This allows the user to communicate with the expert system
  • Includes, text boxes, Check boxes/ option buttons, and Submit buttons Finally the expert system is tested to make sure that the correct answers

Elements/parts of an Expert system

  • Inferface
  • The system allows the user to ask their query and receive a response.
  • Works like a search engine,
  • Follows rules to get answers from the knowledge base by reasoning.
  • Includes a Knowledge database with checked, stored and retrieved

What is a Rules Base

  • Made up of inference rules that are use reason and make decision Example: IF the country United Kingdom AND its name begins with W, THEN it must be Wales.
  • the system Explains to the user the reasoning behind the results they have been given.

Examples of Expert System

  • Mineral Prospecting system
  • Car engine fault diagnosis
  • Medical diagnosis systems
  • Chess and strategy game systems
  • Financial planning systems
  • Route scheduling for delivery vehicles
  • Plant and animal identification system

Case Studies on Expert Systems

  • Expert systems use analysis in the medical sector
  • Help troubleshoot problems in companies in the telecommunications industry
  • Assist finical planning systems
  • Used for analysis and quality in Manufacturing

Methods of Electronic Communication:

  • Email
  • Most common method of communication in business context
  • SMS text messaging Short Message Service is a designed for mobile phone networks around the world
  • Real time communication built into social networking applications
  • Video and audio conferencing
  • Internet-based system based on streaming live video and audio between users
  • Audio Conferencing
  • Audio technology to to access location world wide
  • The internet - Users can share electronic content with the others in the meeting. Voice Video and more over internet

Social Media and Networks

  • Blogs (weblog)
  • Online journals that are frequently updated
  • Content is presented in chronological order
  • Wikis use collaboration via online website tools
  • Any member of the wiki can add and edit content
  • Use of “Tweets” a messaging social media platform

Principles of Data Protection Act

  • There are rules that protect individual privacy when it comes to internet data.
  • There standards to ensure that Data kept is safe and lawful, accurate with limited transfer
  • Parental consent required for processing personal data of children including online services

Personal Data

  • Personal data is data relating to an individual/person that can be identified

Examples are Data protection

  • Name, address, date of birth, medical and criminal records
  • Religious or philosophical beliefs
  • Trade-union membership record, genetic data, IP address, racial identity

Key Point

  • The person can be identified so data as it links to them should safe
  • someone gets access to the data they can attack the user
  • it could lead to home burglaries since the user has revealed person data
  • It Protections are put in place

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Wi-Fi and Wireless Networks Chapter 30.1
80 questions
Wifi Seguridad y Autenticación
12 questions
Use Quizgecko on...
Browser
Browser