Basics of Networking

 Networking

A computer networking is a process of connecting two more than two computers with the purpose to share data, provide technical support, and to communicate (especially for the business purpose.

Internet is the technology that is used to connect different computer systems (located in different geographic location). Networking technology has revolutionized the world and created a new arena for the overall development of every nation.

Advantages of Networking

Let us now discuss the advantages of networking. The advantages are described below −

Facility of Technical Support

Because of having computer networking, a person sitting in the United States of America provides technical support to a person sitting in a remote part of India.

Easy Sharing of Data

With the help of networking, it is very simple to share all formats of digital data from one computer system to another (irrespective of their geographic location).

Easy Sharing of Hardware Resource

With the help of networking, it has now become very simple to share the expensive resources including storage space, processor, fax, etc.

Easy Sharing Software

Through the networking system, it is easy to share and install the software from one computer system to another computer system.

Easy to Decentralize Data Processing

Through the networking system, it is very simple to decentralize the data processing system. It ultimately helps to control, secure, and manage the important data.

Easy to Communicate

With the help of networking, the communication system has now become highly efficient, frugal, and fast. The different modes of communication are text chatting, video chatting, emails, etc.

Types of Network

In this section, we will discuss the different types of network. The types are described below −

  • Local Area Network (LAN)
  • Metropolitan Area Network (MAN)
  • Wide Area Network (WAN)

Local Area Network

Local Area Network or simply LAN is the technique of interconnecting a few computers located in a given premise. It is normally used for a single business office or a residential apartment.

The major purpose of such interconnectivity is to establish a communication system in order to make the work easier.

However, in such connectivity, some other devices can also be attached such as laser printers, fax machine, etc.

Metropolitan Area Network

Metropolitan Area Network or simply MAN is a system of network that normally covers a large metropolitan area (city part).

It provides high speed Internet services throughout the area covered within the network.

Wide Area Network

Wide Area Network or simply WAN is a system of network that covers a large geographical area across the world.

The services of WAN are provided by public (government) agencies as well as private agencies. The network also provides the facility to access databases located remotely.

Data Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)


These are explained as following below.

1. Simplex Mode 
In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices on a link can transmit, the other can only receive. The simplex mode can use the entire capacity of the channel to send data in one direction. 
Example: Keyboard and traditional monitors. The keyboard can only introduce input, the monitor can only give the output. 

2. Half-Duplex Mode 
In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa. The half-duplex mode is used in cases where there is no need for communication in both directions at the same time. The entire capacity of the channel can be utilized for each direction. 
Example: Walkie-talkie in which message is sent one at a time and messages are sent in both directions


3. Full-Duplex Mode 
In full-duplex mode, both stations can transmit and receive simultaneously. In full_duplex mode, signals going in one direction share the capacity of the link with signals going in another direction, this sharing can occur in two ways: 

  • Either the link must contain two physically separate transmission paths, one for sending and the other for receiving.
  • Or the capacity is divided between signals traveling in both directions. 
  • Example: Telephone Network in which there is communication between two persons by a telephone line, through which both can talk and listen at the same time. 

  • Wireless Networks

  • Computer networks that are not connected by cables are called wireless networks. They generally use radio waves for communication between the network nodes. They allow devices to be connected to the network while roaming around within the network coverage.

Advantages of Wireless Networks

  • It provides clutter-free desks due to the absence of wires and cables.
  • It increases the mobility of network devices connected to the system since the devices need not be connected to each other.
  • Accessing network devices from any location within the network coverage or Wi-Fi hotspot becomes convenient since laying out cables is not needed.
  • Installation and setup of wireless networks are easier.
  • New devices can be easily connected to the existing setup since they needn’t be wired to the present equipment. Also, the number of equipment that can be added or removed to the system can vary considerably since they are not limited by the cable capacity. This makes wireless networks very scalable.
  • Wireless networks require very limited or no wires. Thus, it reduces the equipment and setup costs.

Examples of wireless networks

  • Mobile phone networks
  • Wireless sensor networks
  • Satellite communication networks
  • Terrestrial microwave networks
  • Network Security Risks

    Here are some five most common network security threats you need to be vigilant about:

    1. Phishing

    This type of online fraud is designed to steal sensitive information, such as credit card numbers and passwords. Phishing attacks impersonate reputable banking institutions, websites, and personal contacts, which come in the form of immediate phishing e-mails or messages designed to look legitimate.

    2. Computer Viruses

    These are pieces of software designed to spread from one computer device to another. Mostly they are downloaded from particular websites or sent as e-mail attachments with the intent of infecting your computer as well as other computers on your contact list through systems on your network. They can disable your security settings, send spam, steal and corrupt data from your computer, and even delete every single thing on your hard drive.

    3. Malware/Ransomware

    Malware is a malicious software mostly used by criminals to hold your system, steal your confidential data, or install damaging programs in your device without your knowledge. It spreads spyware, Trojans, and worms through pop-up ads, infected files, bogus websites, or e-mail messages.

    On the other hand, ransomware is a type of malware where the cyber-criminals lock your device through a bad app or phishing e-mails then request a ransom to unlock the device. It can hinder you from running applications, encrypting your files, and even from completely using your device.

    4. Rogue Security Software

    This is malicious software that deceives users by making them believe that their security measures are not up-to-the-minute or their computer has a virus. They then offer to help you install or update the user’s security settings by asking you to pay for a tool or download their program to help do away with the alleged viruses. This can lead to the installation of actual malware in your device.

    5. Denial-Of-Service Attack 

    A denial-of-service attempts to hinder legitimate users from accessing services or information from a website. It happens when malicious attackers overload a website with traffic. It is carried out by one computer and its internet connection, which may enable the intruder to access your credentials. A distributed denial-of-service is similar to the denial-of-service but is harder to overcome. This is because it is launched from different computers that are distributed all over the globe. The network from these compromised computers is called a botnet.


Comments

Popular posts from this blog

Computer Hardware and It's Peripherals

Internet

Social Impact of Computer on Society