Learning Outcomes
Students should be able to:
• Describe the function of the following network resources: network interface card, network cables, switch and router;
• Describe the following network topologies: Bus, Star, Ring;
•Describe the advantages and disadvantages of using a network in an organisation.
• Explain how networks and data can be protected using encryption, passwords, levels of access, backup and firewalls;
• Describe the role of a protocol in data transfer;
• Describe the purpose of the following protocols: File Transfer Protocol (FTP), HyperText Transfer Protocol (HTTP) and HyperText Transfer Protocol Secure (HTTPS).
A network is a collection of computers connected together to share data, information, software and hardware. The devices can be connected through wires or wirelessly using technologies such as Wi-Fi or Bluetooth.
LAN
A LAN is a local area network this is a relatively small network confined to one geographical area or site. For example a school, a hospital, a shopping centre or a office building.
WAN
A WAN is a wide area network this is a network spread out across a large georgraphical area. The internet is an example of a WAN.
Network interface card Any computer that is connected to the network by a cable must have a network interface card (NIC). The card allows the computer and the file server to communicate with each other. A network interface card will have a port for a network cable to be plugged into. Laptops will contain a wireless network interface card which will allow the laptop to connect wirelessly to a router but will often also have a port to allow a user to connect a network cable.
Cables within a local area network are typically copper based, these are used to connect computers in a network together so they can communicate (send/recieve data). There are some different types e.g. coaxial cable (has two conductors, a central single strand and several strands braided together and wrapped around the central strand), and twisted pair (insulated copper wires twisted together with an earth wire).
A switch or switched hub is a connection point for a group of computers. The computers will be connected to the switch using network cables and the switch will be connected to the file server. The purpose of the switch is to organise communication between the file server and the computers on the network. When two computers are both connected to a switch, the computers can send data to each other through the switch.
A router is a sophisticated switched hub. It will hold information about the addresses of computers attached to the network and forwards data to the correct computers efficiently. They are usually used as gateways where a LAN is connected to a larger network (e.g. the internet). When used as a gateway, a router will monitor traffic and can limit access for certain sites or users.
A bus network has each of the devices connected directly to a main communications line, called a bus, along which signals are sent. Twin cable, for example coaxial cable, is usually used as the bus. The use of a bus network is suitable for small networks, as it is cost effective to implement on a small scale. If the bus cable has to carry traffic for a large number of devices, the efficiency of the network will drop. An additional disadvantage is that the network is dependent on the bus cable, and a fault in it will cause the network to fail. This type of network is less secure than a star network, because each device has access to the bus, and data could be intercepted during transmission.
A star network has all the network components connected to one central computer, which is often used as the file server. The computer at the centre of the star network is sometimes referred to as a hub, nexus or central node. The network is therefore reliant on the central node, and if it malfunctions the whole network will fail. Conversely, the advantage is that if one of the computers is not working, the rest will not be affected. This network is more expensive to install than a ring network because it usually requires more cabling and a file server capable of servicing the network requests from each computer.
A ring network has each of the devices on the network connected to a ring communications line around which signals are sent. This type of network can be implemented in two ways. Traffic around the network can pass through the network interface of each device, which may require that all devices are functional for traffic to flow. Alternatively, the network devices can be connected to the central ring by spurs, which allows the system to continue to work even when some devices are not switched on.
Encryption is when the data being transmitted is scrambled, to unscramble it and put it into it's original form you need the encryption key. If data is intercepted whilst being transmitted the data cannot be understood.
These can be used to limit the rights of different users on a network/system. Each user will be assigned a certain type of account and therefore only allowed to perform certain actions in line with their job. The network admin will usually have the ability to set and change levels of users where necessary.
A secure password should be used to help keep the network safe. A good password will be at least 8 characters long and have a mixture of upper/lower case letters, numbers and symbols.
Bad Password=liverpoolfc
Good Password=L1v3rPo0lFc£££*
Digital data can easily be corrupted by virus or other malicous programs. Pen Drives can be lost and buildings sometimes catch fire. It is therefore very important to create a backup of Digital Data. The backup should be kept in a different location than the original source in case of theft/fires etc...
A firewall is a mixture of hardware and software which analyses network traffic. This can be used to analyse the data flow within a network and stop any suspicous activty. This will keep a network safe from hackers.
A protocol is simply an agreed way of performing a certain task. Having protocols in ICT is important as it means all manufacturers and countries around the world will communicate digital data in the same way. Without these it would be much more difficult for the internet, which is a global network to operate effectively.
A protocol is simply an agreed method of doing something. Protocols manage the speed of transmission, size of the message and error checking. Protocols decide how two computers will send and receive messages. Data packets travel between the computers from one router to the next. This is known as packet switching.
FTP is built for transferring both single and bulk files. It is an agreed standard way of moving files from one computer to another. One server will have an FTP server application that is consistently listening for transfer requests. The computer will have an FTP client that sets up the connection to the server. The user will have a username and password to access the server. Once the connection is set up files can either be downloaded or uploaded.
HTTP is the protocol used by the World Wide Web. It defines how messages are formatted and transmitted. It decides what actions Web servers and browsers should respond to. It is the set of rules used for transferring text, graphics, images, sound, video and multimedia files on the World Wide Web. As soon as a web browser opens the user is using HTTP as all webpages begin with HTTP. HTTP runs on top of the TCP/IP protocols (Transmission Control Protocol/Internet Protocol). This is suitable when the data being transferred is not overly sensitive.
HTTP with a Secure Socket Layer. A secure socket layer is a standard security technology for establishing an encrypted link between a computer and a server (usually a web server). Having a secure socket layer means that users can safely use the internet without their data or files being corrupted or stolen, for example when using online banking. This helps to protect information like usernames,passwords and account details.
By using a network, it is possible to share peripheral devices such as printers and scanners. In addition to being more environmentally friendly, this helps to reduce costs.
Users can access their files from any workstation, allowing flexible working environments. This is particularly useful in schools, where students and teachers might want to access their work from different rooms.
Software can also be shared, as software licences can be purchased for the whole site, rather than stand-alone licences for each computer or device.
The use of a network allows users to communicate easily using a variety of methods including email, instant messaging and video conferencing.
A network that runs using a file server has the benefit of providing the users with a central back-up of all files. This is advantageous to the organisation, as lost files could impact on the efficient running of a company, for example an organisation losing customer address details would hold back delivery of their product.
Use of a file server provides a level of security by ensuring that users access their own files when they log on, but not files belonging to other users. This would not be the case if the organisation relied on stand-alone machines because files could be saved locally and accessible to all.
Along with centralising files, networks centralise some of the processes carried out within an organisation, for example virus protection can be managed consistently rather than on each individual computer or device.
The initial costs of installing a network for an organisation can be high, as it might require the purchase of cabling and at least one file server.
The running costs can also be high for large networks, and the organisation may decide that they require a network manager to ensure the smooth and efficient use of the network resources.
There are risks while using a network. The reliance on a file server to provide access to software and files could mean that a failure in the server will result in widespread breakdown. For this reason, in large networks, multiple servers are used and may be housed in separate parts of a building.
While efforts can be made to secure a network against viruses, a breach could give a virus or hacker access across other computers. Procedures can be put in place to help minimise these risks, for example, the use of a firewall.
Keywords
Possible Exam Questions
1.Describe the functions of the following network resources.
A. A switch
B. A router [4]
2 Matt’s employer uses a LAN to connect the company’s workstations together.
(i) What is a LAN? [2]
(ii) State two advantages of connecting computers together on a network.[2]
Advantage 1
Advantage 2
3. Draw an explain the Star Network[4]
B.Give one advantage and disadvantage of the Star network[2]
4.Draw and explain the Bus Network.[4]
B.Give one advantage and disadvantage of the Bus network[2]
5. Draw and Explain the Ring network [2]
B.Give one advantage and disadvantage of the Ring network[2]
6. Explain the role of a server in a network[2]
7.Explain the purpose of 3 pieces of hardware associated with networks[6]
1.
2.
3.
8. A company is thinking of installing a network. What are the main benefits and concerns they need to consider[6]
9. Why is File Transfer Protocol (FTP) important?[2]
10. Explain the difference between HTTP and HTTPS[4].
11. Encrypting data is advised when it is being transferred across a network. How does it help keep data secure? [2 Marks]