Introduction To Computer Networks And Communications PDF
Document Details
Floyd D. de Vela
Tags
Summary
This document provides an introduction to computer networks and communications, covering different types of networks (PAN, LAN, MAN, WAN). It also discusses the advantages, disadvantages, and topologies of each network type.
Full Transcript
INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS COMPUTER NETWORKS AND COMMUNICATIONS COGNATE/ELECTIVE COURSE 1 Floyd D. de Vela INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Computer Networks and Commun...
INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS COMPUTER NETWORKS AND COMMUNICATIONS COGNATE/ELECTIVE COURSE 1 Floyd D. de Vela INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Computer Networks and Communication A computer network is a group of computers that are connected together so that they can share resources such as data, printers, and applications. Computer networks can be small, such as a home network, or large, such as the internet. Computer networks and communication are essential for modern society. They allow people to communicate and share information with each other, regardless of their location. They also allow businesses to operate more efficiently and effectively. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Types of networks: Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Types of networks: PAN (Personal Area Network) LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network) Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS PAN (Personal Area Network) Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS PAN (Personal Area Network) A personal area network (PAN) is a computer network that connects devices within a limited area, such as a person's home or office. PANs are typically used to connect personal devices, such as computers, smartphones, and printers. PANs can be wired or wireless. Wired PANs use cables to connect devices, while wireless PANs use radio waves. PANs are becoming increasingly popular as more and more devices are becoming connected. PANs allow people to easily share files and data between devices, and they also allow people to connect to the internet without having to use a wired connection. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS PAN (Personal Area Network) Some of the most common PAN technologies are: Bluetooth: Bluetooth is a wireless technology that is used to connect devices within a short range, such as 10 meters. Bluetooth is commonly used to connect smartphones, laptops, and headsets. Wi-Fi: Wi-Fi is a wireless technology that is used to connect devices within a wider range, such as 100 meters. Wi-Fi is commonly used to connect laptops, smartphones, and tablets to the internet. Near-field communication (NFC): NFC is a wireless technology that is used to connect devices within a very short range, such as 4 centimeters. NFC is commonly used to make payments and to transfer data between devices. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS PAN (Personal Area Network) Here are some of the benefits of using a PAN: Convenience: PANs make it easy to connect devices and share files. Mobility: PANs allow you to take your devices with you and connect to the internet wherever you are. Security: PANs can be more secure than public networks, such as Wi-Fi. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS PAN (Personal Area Network) Here are some of the limitations of using a PAN: Range: PANs have a limited range, so they are not suitable for connecting devices that are far apart. Interference: PANs can be susceptible to interference from other devices, such as microwaves and cordless phones. Cost: PANs can be more expensive than other types of networks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS LAN (Local Area Network) Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS LAN (Local Area Network) A local area network (LAN) is a computer network that connects devices within a limited area, such as a home, office, or school. LANs are typically used to connect personal computers, printers, and other devices. LANs can be wired or wireless. Wired LANs use cables to connect devices, while wireless LANs use radio waves. LANs are becoming increasingly popular as more and more devices are becoming connected. LANs allow people to easily share files and data between devices, and they also allow people to connect to the internet without having to use a modem or router. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS LAN (Local Area Network) Here are some of the benefits of using a LAN: Speed: LANs can provide faster speeds than other types of networks, such as the internet. Reliability: LANs are more reliable than other types of networks, such as the internet. Security: LANs can be more secure than other types of networks, such as the internet. Cost: LANs can be more cost-effective than other types of networks, such as Wi-Fi. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS LAN (Local Area Network) Here are some of the limitations of using a LAN: Range: LANs have a limited range, so they are not suitable for connecting devices that are far apart. Interference: LANs can be susceptible to interference from other devices, such as microwaves and cordless phones. Cost: LANs can be more expensive than other types of networks, such as Wi-Fi. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS LAN (Local Area Network) Here are some examples of LANs: A home network that connects computers, printers, and other devices in a home. An office network that connects computers, printers, and other devices in an office. A school network that connects computers, printers, and other devices in a school. A university network that connects computers, printers, and other devices in a university. A hospital network that connects computers, printers, and other devices in a hospital. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS MAN (Metropolitan Area Network) Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS MAN (Metropolitan Area Network) A metropolitan area network (MAN) is a computer network that connects devices in a metropolitan area, such as a city or town. MANs are typically used to connect businesses, schools, and other organizations within a city. MANs can be wired or wireless. Wired MANs use cables to connect devices, while wireless MANs use radio waves. MANs are becoming increasingly popular as more and more devices are becoming connected. MANs allow people to easily share files and data between devices, and they also allow people to connect to the internet without having to use a modem or router. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS MAN (Metropolitan Area Network) Here are some of the benefits of using a MAN: Speed: MANs can provide faster speeds than other types of networks, such as LANs. Reliability: MANs are more reliable than other types of networks, such as LANs. Security: MANs can be more secure than other types of networks, such as LANs. Cost: MANs can be more cost-effective than other types of networks, such as LANs. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS MAN (Metropolitan Area Network) Here are some of the limitations of using a MAN: Range: MANs have a limited range, so they are not suitable for connecting devices that are far apart. Interference: MANs can be susceptible to interference from other devices, such as microwaves and cordless phones. Cost: MANs can be more expensive than other types of networks, such as LANs. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS MAN (Metropolitan Area Network) Here are some examples of MANs: A citywide network that connects businesses, schools, and other organizations within a city. A university network that connects buildings within a university campus. A hospital network that connects buildings within a hospital campus. A transportation network that connects traffic signals and other devices within a city. A utility network that connects power plants and other devices within a city. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS WAN (Wide Area Network) Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS WAN (Wide Area Network) A wide area network (WAN) is a computer network that covers a large geographical area, such as a country or continent. WANs are typically used to connect different LANs and MANs. WANs can be wired or wireless. Wired WANs use cables to connect devices, while wireless WANs use radio waves. The most common wired WAN technology is the leased line. Leased lines are dedicated connections that are leased from a telecommunications provider. The most common wireless WAN technology is the satellite. Satellites can transmit data over long distances, but they can be expensive. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS WAN (Wide Area Network) Here are some of the benefits of using a WAN: Reach: WANs can connect devices over a wide geographical area. Speed: WANs can provide faster speeds than other types of networks, such as LANs and MANs. Reliability: WANs are more reliable than other types of networks, such as LANs and MANs. Security: WANs can be more secure than other types of networks, such as LANs and MANs. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS WAN (Wide Area Network) Here are some of the limitations of using a WAN: Cost: WANs can be more expensive than other types of networks, such as LANs and MANs. Complexity: WANs can be more complex to manage than other types of networks, such as LANs and MANs. Latency: WANs can have higher latency than other types of networks, such as LANs and MANs. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS WAN (Wide Area Network) Here are some examples of WANs: The internet: The internet is a WAN that connects millions of computers around the world. A corporate network: A corporate network can connect different offices and facilities of a company. A university network: A university network can connect different buildings and campuses of a university. A government network: A government network can connect different agencies and departments of a government. A military network: A military network can connect different bases and facilities of a military. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network topologies Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network topologies A network topology is the physical or logical arrangement of the components of a computer network. It defines how devices are connected to each other and how they communicate. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network topologies Bus topology Ring topology Star topology Mesh topology Tree topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Bus topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Bus topology In a bus topology, all devices are connected to a single cable. This is a simple and cost-effective topology, but it can be difficult to troubleshoot if there is a problem with the cable. A bus topology is a network topology in which all devices are connected to a single cable. This is the simplest and most cost-effective topology, but it can be difficult to troubleshoot if there is a problem with the cable. In a bus topology, data is transmitted in one direction along the cable. When a device sends data, it broadcasts the data to all devices on the network. Only the intended recipient of the data will accept it. Bus topologies are commonly used in small networks, such as home networks and office networks. They are also used in some industrial networks Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Bus topology Here are some of the advantages of bus topology: Simple and cost-effective Easy to install Easy to expand Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Bus topology Here are some of the disadvantages of bus topology: Single point of failure: If the cable is damaged, the entire network will be down. Difficult to troubleshoot: If there is a problem with the network, it can be difficult to determine which device is causing the problem. Low bandwidth: As the number of devices on the network increases, the bandwidth decreases. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Ring topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Ring topology A ring topology is a network topology in which devices are connected in a circle. Data travels around the ring in one direction. This topology is reliable and easy to troubleshoot, but it can be difficult to add or remove devices In a ring topology, each device is connected to two other devices. One connection is used to send data, and the other connection is used to receive data. When a device sends data, it passes the data to the next device in the ring. The data continues to travel around the ring until it reaches the destination device. Ring topologies are commonly used in industrial networks and Token Ring networks. They are also used in some home networks and office networks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Ring topology Here are some of the advantages of ring topology: Reliable: Data travels around the ring in a single direction, so there is no collision. Easy to troubleshoot: If there is a problem with the network, it can be easily identified and repaired. Secure: Data can be encrypted as it travels around the ring. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Ring topology Here are some of the disadvantages of ring topology: Difficult to add or remove devices: When a device is added or removed from the ring, the data path must be reconfigured. Single point of failure: If one device on the ring fails, the entire network will be down. Low bandwidth: As the number of devices on the network increases, the bandwidth decreases. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Star topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Star topology A star topology is a network topology in which all devices are connected to a central device, such as a hub or switch. This is the most common topology for wired networks. It is easy to troubleshoot and add or remove devices. In a star topology, each device is connected to the central device using a point-to-point connection. This means that there is a dedicated connection between each device and the central device. The central device is responsible for routing data between the devices on the network. When a device sends data, it sends the data to the central device. The central device then forwards the data to the destination device. Star topologies are commonly used in home networks, office networks, and enterprise networks. They are also used in some industrial networks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Star topology Here are some of the advantages of star topology: Easy to troubleshoot: If there is a problem with a device on the network, it can be easily isolated and repaired. Easy to add or remove devices: When a device is added or removed from the network, the central device can be easily reconfigured. Reliable: If one device on the network fails, the other devices on the network will not be affected. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Star topology Here are some of the disadvantages of star topology: Single point of failure: If the central device fails, the entire network will be down. Expensive: The central device can be more expensive than other types of network topologies. Not as secure as other topologies: Data can be intercepted as it travels between the devices and the central device. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Mesh topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Mesh topology A mesh topology is a network topology in which each device is connected to every other device. This is a more complex topology than the others, but it is also the most reliable. It is often used for wireless networks. In a mesh topology, each device has two or more connections to other devices. This means that there are multiple paths for data to travel between any two devices on the network. Mesh topologies are commonly used in wireless networks, such as Wi-Fi networks. They are also used in some industrial networks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Mesh topology Here are some of the advantages of mesh topology: Reliable: If one device on the network fails, the other devices on the network can still communicate with each other. Scalable: The network can be easily expanded by adding new devices. Secure: Data can be encrypted as it travels between the devices. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Mesh topology Here are some of the disadvantages of mesh topology: Complex: Mesh topologies can be more complex to design and manage than other topologies. Expensive: Mesh topologies can be more expensive to implement than other topologies. Not as efficient as other topologies: Data may have to travel more than one hop to reach its destination. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Mesh topology Here are some examples of mesh topology: Wi-Fi: Wi-Fi networks often use a mesh topology. Wireless sensor networks: Wireless sensor networks often use a mesh topology. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Tree topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Tree topology A tree topology is a network topology in which devices are connected in a hierarchical manner. This is a hybrid of the star and bus topologies. It is easy to troubleshoot and add or remove devices. In a tree topology, there is a central device, such as a hub or switch, that connects multiple star networks. Each star network is called a branch. The devices on each branch are connected to the central device using a point-to-point connection. This means that there is a dedicated connection between each device and the central device. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Tree topology The central device is responsible for routing data between the branches on the network. When a device sends data, it sends the data to the central device. The central device then forwards the data to the destination branch. Tree topologies are commonly used in home networks, office networks, and enterprise networks. They are also used in some industrial networks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Tree topology Here are some of the advantages of tree topology: Easy to troubleshoot: If there is a problem with a device on the network, it can be easily isolated and repaired. Easy to add or remove devices: When a device is added or removed from the network, the central device can be easily reconfigured. Reliable: If one device on the network fails, the other devices on the network will not be affected. Scalable: The network can be easily expanded by adding new branches. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Tree topology Here are some of the disadvantages of tree topology: Single point of failure: If the central device fails, the entire network will be down. Expensive: The central device can be more expensive than other types of network topologies. Not as secure as other topologies: Data can be intercepted as it travels between the devices and the central device. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Hybrid topology A hybrid topology is a network topology that combines two or more of the basic topologies, such as the bus, ring, star, and mesh topologies. This is done to take advantage of the strengths of each topology and to minimize the weaknesses. Hybrid topologies are often used in large networks that need to be scalable, reliable, and secure. They can also be used in networks that need to be able to handle a lot of traffic. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Hybrid topology Star-bus topology Mesh-star topology Tree-mesh topology Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network devices Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network devices A network device is a hardware component that is used to connect devices to a network and to facilitate the flow of data between them. It can be either wired or wireless. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network devices Here are some of the most common network devices: Access point Modem Hub Switch Router Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Access point Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Access point An access point (AP) is a device that creates a wireless network. It is used to connect devices to the internet wirelessly. Access points are typically connected to a wired network, such as a router or switch. When a device connects to an access point, the access point sends the device's data to the wired network. The wired network then sends the data to its destination. Access points can be either indoor or outdoor. Indoor access points are typically used in homes and businesses. Outdoor access points are typically used in large areas, such as parks and campuses. Access points can be either standalone or managed. Standalone access points are simple to set up and configure. Managed access points can be configured and managed remotely. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Access point Here are some of the benefits of using an access point: Convenience: Access points allow devices to connect to the internet wirelessly, without the need for cables. Flexibility: Access points can be placed anywhere in a building, providing coverage in areas that are not easily reached by wired networks. Security: Access points can be configured with security features, such as encryption, to protect data from unauthorized access. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Access point Here are some of the drawbacks of using an access point: Range: The range of an access point is limited, so it may not be able to provide coverage for an entire building. Interference: Access points can be susceptible to interference from other wireless devices, such as microwaves and cordless phones. Security: Access points can be hacked, so it is important to configure them with strong security features. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Modem Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Modem A modem is a device that converts data between digital and analog signals. It is used to connect a computer to the internet. Modems are used to transmit data over telephone lines, cable lines, or fiber optic cables. When a computer sends data to the internet, the modem converts the data into an analog signal that can be transmitted over the line. When the data arrives at the other end, the modem converts it back into a digital signal that the computer can understand. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Modem Here are some of the benefits of using a modem: Convenience: Modems make it easy to connect to the internet. They can be used with a variety of devices, such as computers, laptops, and smartphones. Speed: Modems can provide high-speed internet connections. This is important for activities such as streaming videos and downloading large files. Security: Modems can be configured with security features to protect your data from unauthorized access. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Modem Here are some of the drawbacks of using a modem: Cost: Modems can be expensive, especially for high-speed connections. Complexity: Modems can be complex to set up and configure. Malfunction: Modems can malfunction, which can disrupt your internet connection. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Hub Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Hub A hub is a network device that connects multiple devices together in a single network. It does not filter or forward data, but simply repeats any data it receives to all connected devices. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Hub Hubs are a simple and inexpensive way to connect devices to a network. However, they have several limitations, including: Broadcast traffic: All data that is sent to any device on the hub is sent to all other devices on the hub. This can cause congestion and performance problems. Collisions: When two devices send data at the same time, a collision occurs. This results in the data being lost. Single point of failure: If the hub fails, all devices on the hub will be disconnected from the network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch A network switch is a device that connects multiple devices together in a network and filters and forwards data to the correct destination device. It is a more intelligent device than a hub and does not send data to all devices on the network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch Here are some of the features of a network switch: Ports: Switches have multiple ports, each of which can be connected to a device. Data rate: The data rate of a switch is the speed at which it can transmit data. Data rates for switches range from 10 megabits per second (Mbps) to 100 gigabits per second (Gbps). Compatibility: Switches must be compatible with the type of network that you are using. For example, an Ethernet switch must be used with an Ethernet network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch Features: Switches can have a variety of features, such as: VLAN support: VLANs allow you to create separate networks within a single physical network. Security features: Security features can help to protect your network from unauthorized access. Management features: Management features allow you to configure and manage the switch remotely. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch Here are some of the benefits of using a network switch: Performance: Switches can improve the performance of a network by reducing broadcast traffic and collisions. Security: Switches can be more secure than hubs because they can filter data and prevent unauthorized access. Manageability: Switches can be easily managed remotely, which can save time and effort. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Switch Here are some of the drawbacks of using a network switch: Cost: Switches can be more expensive than hubs. Complexity: Switches can be more complex to set up and configure than hubs. Malfunction: Switches can malfunction, which can disrupt your network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network Services Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network Services Network services are a set of functions that are provided by a network. They allow devices to communicate with each other and to access resources on the network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network Services Some of the most common network services include: File sharing: File sharing services allow users to share files with each other on the network. Print sharing: Print sharing services allow users to share printers on the network. Email: Email services allow users to send and receive email messages. Web browsing: Web browsing services allow users to access websites on the internet. Remote access: Remote access services allow users to access their devices or files on the network from a remote location. Voice over IP (VoIP): VoIP services allow users to make voice calls over the network. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network Services Video conferencing: Video conferencing services allow users to hold video calls over the network. Network security: Network security services protect the network from unauthorized access and attacks. Floyd D. de Vela Cyber Security INTRODUCTION TO COMPUTER NETWORKS AND COMMUNICATIONS Network Services Here are some of the benefits of using network services: Improved communication: Network services allow users to communicate with each other more easily and efficiently. Increased productivity: Network services can help users to be more productive by allowing them to share files, access resources, and collaborate on projects. Enhanced security: Network services can help to improve the security of a network by providing protection from unauthorized access and attacks. Reduced costs: Network services can help to reduce costs by allowing users to share resources and by providing centralized management of network devices. Floyd D. de Vela Cyber Security