Sie sind auf Seite 1von 37

Lecture 8

Theme8.Computer networks. Network


communication technologies. Classification. Local
and regional networks. The internet. Research on
the Internet. E- mail

Лекция 8
Тема 8 Компьютерные сети. Технологии КС.
Классификация. Локальные и региональные КС.
Интернет. Поиск информации в Интернет. Электронная
почта
Networking hardware includes all computers,
peripherals, interface cards and other equipment
needed to perform data-processing and
communications within the network.
•Network Interface Card
• Hub
• Repeater
• Bridge
• Switch
• Gateway
•Network interface cards, commonly referred to as
NICs, are used to connect a PC to a network.
• The NIC provides a physical connection between the
networking cable and the computer's internal bus.
•A hub joins multiple computers (or other network
devices) together to form a single network.
• On this network, all computers can communicate
directly with each other.
• The networking hub is a junction box with several
ports in the back for receiving the Ethernet cables that
are plugged into each computer on the LAN.
•Since a signal loses strength as it passes along a cable,
it is often necessary to boost the signal with a device
called a repeater.
• A repeater is an electronic device that receives a signal,
cleans it of unnecessary noise, regenerates it, and
retransmits it at a higher power level so that the signal
can cover longer distances without degradation.
• A good example of the use of repeaters would be in a
local area network using a star topology with unshielded
twisted-pair cabling
A network switch is a small hardware device that joins
multiple computers together within one local area
network (LAN). Network switches appear nearly
identical to network hubs, but a switch generally
contains more intelligence than a hub.
• Unlike hubs, network switches are capable of
inspecting data packets as they are received,
determining the source and destination device of each
packet, and forwarding them appropriately.
• Allow several users to send information over a
network at the same time without slowing each other
down.
•A router is a device to interconnect SIMILAR
networks, e.g. similar protocols and workstations and
servers.
• A router is an electronic device that interconnects
two or more computer networks, and selectively
interchanges packets of data between them.
A bridge is a device that connects a local area network
(LAN) to another local area network that uses the same
protocol (for example, Ethernet or token ring).
• The function of a bridge is to connect separate
networks together. Bridges connect different networks
types (such as Ethernet and Fast Ethernet) or networks
of the same type.
• Bridges map the Ethernet addresses of the nodes
residing on each network segment and allow only
necessary traffic to pass through the bridge.
Gateways are used to interconnect two different
networks having different protocols.
• Networks using different protocols use different
addressing formats.
• A gateway is a network point that acts as an entrance
to another network.
• Gateways are also called protocol converters.
Types of Networks
Local Area Network (LAN)
This is one of the original categories of network, and one
of the simplest. LAN networks connect computers
together over relatively small distances, such as within a
single building or within a small group of buildings.
Wide Area Network (WAN)
This is another of the original categories of network, and
slightly more complex in nature. WAN networks connect
computers together over large physical distances,
remotely connecting them over one huge network and
allowing them to communicate even when far apart. The
Internet is a WAN, and connects computers all around the
world together.
Metropolitan Area Network – This is a network which is larger than a LAN
but smaller than a WAN, and incorporates elements of both. It typically
spans a town or city and is owned by a single person or company, such as a
local council or a large company.
Network topologies describe the ways in which the
elements of a network are mapped. They describe the
physical and logical arrangement of the network nodes.
The physical topology of a network refers to the
configuration of,cables, computers, and other
peripherals
Bus Topology

All the nodes (file server, workstations, and peripherals)


on a bus topology are connected by one single cable.
• A bus topology consists of a main run of cable with a
terminator at each end. All nodes (file server,
workstations, and peripherals) are connected to the
linear cable.
Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks

Disadvantages of Bus Topology


• The cable length is limited. This limits the number
of stations that can be connected.
• This network topology can perform well only for a
limited number of nodes
Ring Topology
In a ring network, every device has exactly two
neighbors for communication purposes.
• All messages travel through a ring in the same
direction.
• A failure in any cable or device breaks the loop and can
take down the entire network.
Advantage of Ring Topology
• Very orderly network where every device has access to
the token and the opportunity to transmit.
• Easier to Mange than a Bus Network
• Good Communication over long distances
• Handles high volume of traffic

Disadvantages of Ring Topology


• The failure of a single node of the network can cause
the entire network to fail.
• The movement or changes made to network nodes
affects the performance of the entire network
Star Topology
• In a star network, each node (file server, workstations, and
peripherals) is connected to a central device called a hub.
• The hub takes a signal that comes from any node and passes it
along to all the other nodes in the network.
• Data on a star network passes through the hub, switch, or
concentrator before continuing to its destination.
• The hub, switch, or concentrator manages and controls all
functions of the network.
• The star topology reduces the chance of network failure by
connecting all of the systems to a central node.
Advantages of Star Topology
• Easy to manage
• Easy to locate problems (cable/workstations)
• Easier to expand than a bus or ring topology.
• Easy to install and wire.
• Easy to detect faults and to remove parts.

Disadvantages of Star Topology


• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are
disabled.
• More expensive because of the cost of the
concentrators
Mesh Topology
In this topology, each node is connected to every other
node in the network.
• Implementing the mesh topology is expensive and
difficult.
• In this type of network, each node may send message
to destination through multiple paths.
• While the data is travelling on the Mesh Network it is
automatically configured to reach the destination by
taking the shortest route which means the least number
of hops.
Internet
The Internet is a world wide network
that connects millions of computers to
share and exchange data, news, opinions,
and research results. The Internet has new
information every day. To read information
on the Internet you need a program such as
Internet Explorer, Mozilla Firefox, Google
Chrome,Opera etc.

23
Mankind Owe To Them.
Vinton Gray "Vint" Cerf. Sir Tim Berners-Lee.

The Father of Internet. The Father of WWW. 24


Basic terms on Internet.
• WWW –The world wide web is a service that is
provided on the internet and it is not same as the
Internet™
• Online – you are connected to the Internet by
telephone line or cable line.™
• Offline – you are using your computer but are not
connected to the Internet.
• Web site – a business, government or person’s page
on the Internet where you can put information for
people to read.
• Web page – one page of a web site

25
Basic terms on Internet
• Download – to get a program or files from the Internet and
put them in your computer.
• ™
Link – a word or a picture in a web site that takes you to
another web site when you click it.
• ™
Internet address – an address that you need to type to get to
a web site. All Internet addresses start with ‘http://’. Many
Internet addresses have ‘www’ as the first letters, but some
don’t. For example, this is an Internet address: www.cu.ac.bd
• ™
E-mail address – an E-mail address has a person’s name or
nick name followed by @ and then the Internet company’s
name. For example, this is an E-mail address
:Milanshiuli@gmail.com

26
Difference between INTERNET & WWW.

Internet WWW
1. Internet is a massive network of 1. WWW is a way of accessing information
networks, a networking infrastructure. over the medium of the internet.

2. It connects millions of computers 2.It is an information sharing model that is


together globally forming a network in built on the op internet.
which any computer can communicate with
any other computer as long as both are
connected to internet.
3. Information that travels over the internet 3. The web uses HTTP protocol, transmit
does so via a variety of languages known as data.
protocol.
4. It does not utilize web browsers. It is the 4. It is also utilizes browsers such as
structure on which WWW is based. internet explorer or firefox to access web
documents called web pages that are linked
via hyperlink.

27
Elements of web and mail address

• Web Address http://www.google.com/


http : Hyper Text Transfer Protocol
: Colon
// (Forward) Slash \\ Backward Slash
www : World Wilde Web
google : Domain Name
com : Top Level Domain

• Mail Address forkan.cu@gmail.com


forkan.cu user name
@ (at) Separator
gmail Domain Name
.com Top Level Domain

28
Internet Browser
A web browser is a software application for retrieving,
presenting, and traversing information resources on the World
Example: Wide Web.
1. Google Chrome
2. Mozilla Firefox
3. Safari
4.Opera
5. Internet Explorer
6. Netscape Browser
Popular web browsers
7. Maxthon
8. Foobar2000
9. YouTube Browser
10. Avant
29
Search Engines

• Google pipilika.com/
• Yahoo
• MSN
• Bing
• Ask
• Delta search

30
Domain Categories
.com for commercial organizations
.edu for educational institutions
.gov for government agencies
.mil for military installations
.net for network access provider
.org for non-profit organizations.

31
Cyber Crime
Types Of Cybercrime:
• Hacking
• Virus Dissemination
• Software Piracy
• Credit Card Fraud
• Phishing
• Cyber Stalking
• Cyber Defamation
• Threatening
• Salami Attack
• Net Extortion 32
VIRUS DISSEMINATION (ভাইরাস ছড়ান া)
Malicious software that attaches iitself to other software.
(virus, worms, Trojan Horse, Time bomb,Logic Bomb, Rabbit and
Bacterium are the malicious soft wares)
SOFTWARE PIRACY
Theft of software through the iillegal copying of genuine programs
or the counterfeiting and distribution of products intended to pass
for the original. Retail revenue losses world wide are ever
increasing due to this crime.
NET EXTORTION( হম ু কি প্রদা )
Copying the company’s confidential data in order to extort said
company for huge amount.
PHISHING
It is technique of pulling out confidential information from the
bank/financial institutional account holders by deceptive(প্রতার া
মুলি) means.
33
CYBER STALKING
The Criminal follows the victim by sending emails, entering the
chat rooms frequently.
CYBER DEFAMATION (অপবাদ মুলি বক্তবয)
The Criminal sends emails containing defamatory matters to all
concerned of the victim or post the defamatory matters on a
website. (disgruntled employee may do this against boss, ex-
boys friend against girl, divorced husband against wife etc)
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes would go unnoticed. Criminal makes
such program that deducts small amount like 2.50 per month
from the account of all the customer of the Bank and deposit
the same in his account. In this case no account holder will
approach the bank for such small amount but criminal gains
huge amount.
34
Safety on the Internet
• There is a lot of good information on the
Internet, but there is also some bad information.
If you go to a web site that you don’t like, leave
that web site and go to a better.
• Be very careful about giving your credit card
numbers on the Internet.
• Be very careful about giving personal
information on the Internet. The Internet is
usually not private
• Use internet security for virus.

35
File Extension
• Web browser:.html, .htm, .php, .asp,
.xml. etc.
• HTML : Hyper Text Markup Language
• PHP : Hypertext Preprocessor
• ASP : Active Server Pages
• XML: Extensible Markup Language

36
37

Das könnte Ihnen auch gefallen