1 Computer Network 2 Computer Network A Computer
- Slides: 34
1
Computer Network 2
Computer Network A Computer Network is a communication system that connect tow or more computers so they can exchange information and share resources. the most well-known computer network is the Internet. 3
Benefits of Computer Networks 4
Benefits of Computer Networks § Exchanging Information §Sharing of resources: • Software • hardware 7
CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 8
Types Of Networks According to Transport Media §Wired Networks §Wireless Networks 9
CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 10
Types Of Networks According to Geographical Area: §personal area network (PAN) 11
Types Of Networks According to Geographical Area: §Local Area Network (LAN) A local area network (LAN) is a computers network that interconnects computers within a limited area such as school, university or office building. LAN can span over a limited distance up to one mile. 12
Types Of Networks According to Geographical Area: §Metropolitan Area Network (MAN) These networks are considered larger than LAN as they connect several LANs in the same city and are usually used to connect organizations, companies, banks and government agencies. MAN can span over a distance up to 100 miles 13
Types Of Networks According to Geographical Area: §Wide Area Network (WAN) Wide area network (WAN) is a countrywide or worldwide network, which covers distances greater than 100 miles. It uses microwave relays and satellites to reach users over long distances. The widest of all WANs is the Internet, which spans the entire globe. 14
CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 15
Types Of Networks According to the network's Management System • Client-Server Network 16
17
Types Of Networks According to the network's Management System • Client-Server Network Client-server network systems use one computer (server) to coordinate and supply services to other computers (clients) in the network. The server provides access to resources such as web pages, databases, application software, and hardware. 18
Types Of Networks According to the network's Management System Peer-to-Peer Network 19
Types Of Networks According to the network's Management System Peer-to-Peer Network A peer-to-peer network system doesn't have a central computer (server). All nodes have equal authority and can act both as clients and servers. For example, when a file passes through many computers on a network, these computers act as both server and client. 20
Internet is a huge network of computer networks. The Internet can be termed as a network of networks. The Internet is the global network system of private, public, academic, business and government networks. 21
USES OF THE INTERNET §AS A SOURCE OF INFORMATION §SHOPPING §ENTERTAINMENT §Education §communication 22
INFORMATION SECURITY 23
The password: A Password is a set of characters used to get access to a computer, web page, network resource or data TIPS FOR CREATING PASSWORDS Creating a strong password is the responsibility of the owner. Below are the recommendations for creating a strong password: • The password should be difficult to guess. • The password should not be less than the length of 8 characters. • The password should contain a mixture of numbers, characters • The password should not contain the user's name. • The password should not contain the user's personal information, as name, street address, phone number, date of birth etc. 24
The password: TIPS FOR THE USE OF PASSWORD • Do not share your passwords with others. • Do not use the same password everywhere such as e-mail, bank account … • Do not keep a written record of passwords on a paper or in an e-mail • Avoid using the "Remember Password" option everywhere. 25
MALICIOUS SOFTWARE Malicious software, also known as Malware, is any program or file that is harmful to a computer or the privacy of users. The harm done by malware can vary from something slight as changing the author's name on a document to full access of your machine 26
TYPES OF MALICIOUS PROGRAMS Malware types can be categorized as follows: • Viruses • Worms • Spywares • Trojan Horse 27
Viruses A computer virus is a malicious program that attaches itself to a file or a program, enabling it to spread and infect different files. Viruses can be transmitted as attachments to an e-mail or in a downloaded file. Viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program 28
Worms are stand alone malicious software and do not require a host program or human help to spread. It replicates its functional copies and can consume system memory. 29
Spywares Spyware is classified as privacy-invasive software. The most common spyware function is to steal personal information and address book 30
Trojan Horse A Trojan is another type of malware. It is a harmful piece of software tha looks genuine. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files or activating and spreadin other malware). Trojans are also known to create back doors to give malicious user access to the system. 31
To stay protected from malicious software: • Avoid using the "auto-run" option in Windows OS for portable drives. • Use anti-spyware software, anti-virus software and scan and update regularly. • always be wary of strange e-mails, especially ones with attachments. • While browsing the Internet, always confirm what you click , download and install. 32
THE BACKUP §Local Backup §Internet Backup (Cloud Storage) EX : Drop Box , Google Drive and One Drive 33
COPYRIGHT 34
- Network topology in computer network
- Datagram networks
- Features of peer to peer network and client server network
- Network systems design using network processors
- Network centric computing and network centric content
- Circuit switching disadvantages
- Error detection and correction in computer networks
- Fddi
- The internet is a vast of computer
- Chordal ring
- Hdlc adalah
- Transmission media in computer network
- Transmission media in computer network
- Network computer definition
- Computer network a top down approach
- Uses of computer networks in business applications
- History of computer networks
- The internet is the largest computer network in the world
- Character stuffing in computer networks
- Fddi in computer network
- Frame format of fddi
- Fddi frame format
- Dynamic interconnection network in computer architecture
- What is vrc in computer network
- Computer network logo
- Computer network logos
- Chnm
- Rip table
- Computer network vulnerabilities
- Byte stuffing in networking
- Simultaneous access
- Arcnets
- Principles of network applications in computer networks
- Guided media
- What is choke packet