0% found this document useful (0 votes)
296 views14 pages

4 Network-Building-Blocks

Networking allows computers and devices to be connected in order to share resources and communicate with each other. There are advantages like reduced costs, increased access to services and data sharing, as well as enabling collaboration across distances. However, networking also poses disadvantages such as vulnerability to unauthorized access from hackers and malicious software, as well as risks from snooping, eavesdropping and monitoring of network activity. Networks can be classified based on their geographical scope, organizational structure, physical topology, network links and bandwidth used.

Uploaded by

Salma Saleem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
296 views14 pages

4 Network-Building-Blocks

Networking allows computers and devices to be connected in order to share resources and communicate with each other. There are advantages like reduced costs, increased access to services and data sharing, as well as enabling collaboration across distances. However, networking also poses disadvantages such as vulnerability to unauthorized access from hackers and malicious software, as well as risks from snooping, eavesdropping and monitoring of network activity. Networks can be classified based on their geographical scope, organizational structure, physical topology, network links and bandwidth used.

Uploaded by

Salma Saleem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Network Building Blocks

CS101: Introduction to Computing

Fall 2017

Instructors:
Dr. Zahid Halim, Dr. S. Anwar, Engr. Zawar
Hussain, Engr. Usman Raza, Mr. Shahab Haider,
Ms. Laila Khalid & Dr. Ahmar Rashid.

Faculty of Computer Science and Engineering

GIK Institute of Engineering Sciences and


Technology
What is networking?
• In the world of computers, networking is the
practice of linking two or more computing
devices together for the purpose of sharing
data.
• Networks are built with a mix of computer
hardware and computer software.

http://compnetworking.about.com/cs/basicnetworking/f/whatsnetworking.htm
Advantages of Networking
• Sharing networked hardware can
– reduce costs (through shared printers, and etc.)
– provide access to a wide range of services and specialized peripheral
devices (such as scanners, photo printers, plotters and etc.)
• Sharing networked software can also reduce cost
– buying software licenses for the network is usually cheaper as compared to
buying individual license for each PC
• Sharing data on a network is easy
– data can be copied between networked devices much more easily and
efficiently as compared to between standalone devices using removable
storage media
• Networking enables people to work together regardless of time
and space
– email
– instant messaging
– online conferences and webcasts
Disadvantages/Challenges Posed by
Networking
• Vulnerability to unauthorized access.
– intruders from across the globe can access data stored
on the shared servers
– wireless networks can be tapped from a specially
equipped “snooping” computer in a car being driven by
a hacker
– vulnerability to malicious code
• e.g. Malicious code used by the hackers
– to monitor keystrokes
– capture passwords and login information
– Interrupt email and other private communications/trasmissions
– susceptible to an ever increasing number of works,
Trojan horses and etc.
Disadvantages/Challenges Posed by
Networking
• Trojan Horse
• A destructive program that attacks disguised as a harmless
application
• Unlike viruses, Trojan horses do not replicate themselves, but they
can be just as destructive.
• One of the most dangerous types of Trojan horse is a program that
claims to rid a computer of viruses but instead introduces viruses
onto the computer
• Eavesdropping
– Eavesdropping is the act of secretly listening to the private
conversation of others, such as a phone call, instant message, video
conference or etc. ,without their consent
– The term drives from the practice of actually standing under the eaves
of a house, listening to conversation inside.
Disadvantages/Challenges Posed by
Networking
• Snooping
– An authorized access to another person’s/company’s data.
– Similar to eavesdropping, though not limited to gaining access to data
during transmission
– Can also include

casual observance of an email that appears on another’s PC screen

watching what some someone else is typing

watching other PC(s) using remotely monitoring software

monitoring of the activities of the employees and track internet usage by
corporations
Edward Snowden is an American computer specialist
• collecting terrorism related information by the government
who worked for NSA contractors and said that he was an
– Can refer to any program or utility that performs monitoring function,
employee
e.g.
of the CIA and NSA before leaking details of
several top-secret
• snooper United
servers are used States
to capture andtraffic
network British government
for analysis
mass surveillance
• Snooping programs
protocol monitoring to theonpress
information a computer bus to ensure
efficient processing
http://en.wikipedia.org/wiki/Edward_Snowden
Network Classifications
• Networks can be classified based on
– geographical scope
• Network Technologies: WAN, MAN, LAN, PAN
– organizational structure
• Network Technologies: client /server, peer-to-peer
– physical topology
• Network Technologies: star, bus, ring, mesh, tree
– network links
• Network Technologies: twisted-pair cable, coaxial cable, fiber-optic
cable, RF signals, microwaves, infrared light, power line, phone line
– bandwidth
• Network Technologies: broadband, narrowband
– communication protocols
• Network Technologies: TCP/IP, SPX/IPX and etc.
Physical Topology
Star
Full Mesh
Topology
Topology

Bus Topology

Hybrid Topology
Tree backbone with bus networks Ring Topology
Geographical Scope
• Personal Area Network (PAN )
– typically a wireless interconnection of personal digital devices within
a range of about 30 feet
• Local Area Network (LAN)
– typically connects personal computers (wired/wireless) within a
small geographical area- a building or a small facility.
• Metropolitan Area Network (MAN)
– a public high network capable of voice and data transmission within
a range of 50 miles (80 km).
• e.g., local ISPs. cable television companies and etc.
• Wide Area Network (WAN)  Example: ? World Wide Web
– covers a large geographical area
– typically consists of several smaller subnetworks
– the subnetworks may use different platforms,
technologies/protocols.
LAN: Example
MAN: Example
WAN: Example
Organizational Structure
Client

Client

Client Server
Server

Client
Peer-to-Peer

Workstation Workstation Workstation

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy