Sunteți pe pagina 1din 8

Understanding Networking Fundamentals

What Is Networking?

For such an extensive and involved subject, which includes so many different technologies,
hardware devices and protocols, the definition of networking is actually quite simple. A
network is simply a collection of computers or other hardware devices that are connected
together, either physically or logically, using special hardware and software, to allow them to
exchange information and cooperate. Networking is the term that describes the processes
involved in designing, implementing, upgrading, managing and otherwise working with
networks and network technologies.

Key Concept: A network is a set of hardware devices connected together, either physically
or logically to allow them to exchange information.

Networks are used for an incredible array of different purposes. In fact, the definitions above
are so simple for the specific reason that networks can be used so broadly, and can allow
such a wide variety of tasks to be accomplished. While most people learning about
networking focus on the interconnection of PCs and other true computers, you use various
types of networks every day. Each time you pick up a phone, use a credit card at a store, get
cash from an ATM machine, or even plug in an electrical appliance, you are using some type
of network.

In fact, the definition can even be expanded beyond the world of technology altogether: I'm
sure you've heard the term networking used to describe the process of finding an
employer or employee by talking to friends and associates. In this case too, the idea is that
independent units are connected together to share information and cooperate.

The widespread networking of personal computers is a relatively new phenomenon. For the
first decade or so of their existence, PCs were very much islands unto themselves, and
were rarely connected together. In the early 1990s, PC networking began to grow in
popularity as businesses realized the advantages that networking could provide. By the late
1990s, networking in homes with two or more PCs started to really take off as well.

This interconnection of small devices represents, in a way, a return to the good old days of
mainframe computers. Before computers were small and personal, they were large and
centralized machines that were shared by many users operating remote terminals. While
having all of the computer power in one place had many disadvantages, one benefit was
that all users were connected because they shared the central computer.

Individualized PCs took away that advantage, in favor of the benefits of independence.
Networking attempts to move computing into the middle ground, providing PC users with
the best of both worlds: the independence and flexibility of personal computers, and the
connectivity and resource sharing of mainframes. in fact, networking is today considered so
vital that its hard to conceive of an organization with two or more computers that would not
want to connect them together!

Source: http://www.tcpipguide.com/free/t_WhatIsNetworking.htm
Exploring the Benefits and Risks of Networked Computing

The Advantages (Benefits) of Networking

You have undoubtedly heard the the whole is greater than the sum of its parts. This phrase
describes networking very well, and explains why it has become so popular. A network isn't
just a bunch of computers with wires running between them. Properly implemented, a
network is a system that provides its users with unique capabilities, above and beyond what
the individual machines and their software applications can provide.

Most of the benefits of networking can be divided into two generic


categories: connectivity and sharing. Networks allow computers, and hence their users, to
be connected together. They also allow for the easy sharing of information and resources,
and cooperation between the devices in other ways. Since modern business depends so
much on the intelligent flow and management of information, this tells you a lot about why
networking is so valuable.

Here, in no particular order, are some of the specific advantages generally associated with
networking:

o Connectivity and Communication: Networks connect computers and the users of


those computers. Individuals within a building or work group can be connected
into local area networks (LANs); LANs in distant locations can be interconnected into
larger wide area networks (WANs). Once connected, it is possible for network users to
communicate with each other using technologies such as electronic mail. This makes
the transmission of business (or non-business) information easier, more efficient and
less expensive than it would be without the network.

o Data Sharing: One of the most important uses of networking is to allow the sharing of
data. Before networking was common, an accounting employee who wanted to
prepare a report for her manager would have to produce it on his PC, put it on a
floppy disk, and then walk it over to the manager, who would transfer the data to her
PC's hard disk. (This sort of shoe-based network was sometimes sarcastically called
a sneakernet.)

True networking allows thousands of employees to share data much more easily and
quickly than this. More so, it makes possible applications that rely on the ability of
many people to access and share the same data, such as databases, group software
development, and much more. Intranets and extranets can be used to distribute
corporate information between sites and to business partners.

o Hardware Sharing: Networks facilitate the sharing of hardware devices. For example,
instead of giving each of 10 employees in a department an expensive color printer
(or resorting to the sneakernet again), one printer can be placed on the network for
everyone to share.

o Internet Access: The Internet is itself an enormous network, so whenever you access
the Internet, you are using a network. The significance of the Internet on modern
society is hard to exaggerate, especially for those of us in technical fields.
o Internet Access Sharing: Small computer networks allow multiple users to share a
single Internet connection. Special hardware devices allow the bandwidth of the
connection to be easily allocated to various individuals as they need it, and permit an
organization to purchase one high-speed connection instead of many slower ones.

o Data Security and Management: In a business environment, a network allows the


administrators to much better manage the company's critical data. Instead of having
this data spread over dozens or even hundreds of small computers in a haphazard
fashion as their users create it, data can be centralized on shared servers. This
makes it easy for everyone to find the data, makes it possible for the administrators
to ensure that the data is regularly backed up, and also allows for the implementation
of security measures to control who can read or change various pieces of critical
information.

o Performance Enhancement and Balancing: Under some circumstances, a network can


be used to enhance the overall performance of some applications by distributing the
computation tasks to various computers on the network.

o Entertainment: Networks facilitate many types of games and entertainment. The


Internet itself offers many sources of entertainment, of course. In addition, many
multi-player games exist that operate over a local area network. Many home
networks are set up for this reason, and gaming across wide area networks (including
the Internet) has also become quite popular. Of course, if you are running a business
and have easily-amused employees, you might insist that this is really
adisadvantage of networking and not an advantage!

Key Concept: At a high level, networks are advantageous because they allow computers
and people to be connected together, so they can share resources. Some of the specific
benefits of networking include communication, data sharing, Internet access, data security
and management, application performance enhancement, and entertainment.

Well, if that list isn't enough to convince you that networking is worthwhile, then I
have no idea what it is you do with your computers! J At any rate, it's quite possible that
only some of the above items will match your particular circumstances, but at least one will
definitely apply to almost every situation, assuming you own or manage more than one
computer.

Source: http://www.tcpipguide.com/free/t_IntroductiontoNetworking.htm

The Disadvantages (Costs) of Networking

Now that I have portrayed the great value and many useful benefits of networking, I must
bring you crashing back to earth with that old nemesis of the realistic: TANSTAAFL. For those
who are not Heinlein fans, this acronym stands for There Aint No Such Thing As A Free
Lunch. Even though networking really does represent a whole that is greater than the sum
of its parts, it does have some real and significant costs and drawbacks associated with it.

Here are a few of the items that balance against the advantages of networking.
o Network Hardware, Software and Setup Costs: Computers don't just magically
network themselves, of course. Setting up a network requires an investment in
hardware and software, as well as funds for planning, designing and implementing
the network. For a home with a small network of two or three PCs, this is relatively
inexpensive, possibly amounting to less than a hundred dollars with today's low
prices for network hardware, and operating systems already designed for networks.
For a large company, cost can easily run into tens of thousands of dollarsor more.

o Hardware and Software Management and Administration Costs: In all but the smallest
of implementations, ongoing maintenance and management of the network requires
the care and attention of an IT professional. In a smaller organization that already has
a system administrator, a network may fall within this person's job responsibilities,
but it will take time away from other tasks. In more substantial organizations, a
network administrator may need to be hired, and in large companies an entire
department may be necessary.

o Undesirable Sharing: With the good comes the bad; while networking allows the easy
sharing of useful information, it also allows the sharing of undesirable data. One
significant sharing problem in this regard has to do with viruses, which are easily
spread over networks and the Internet. Mitigating these effects costs more time,
money and administrative effort.

o Illegal or Undesirable Behavior: Similar to the point above, networking facilitates


useful connectivity and communication, but also brings difficulties with it. Typical
problems include abuse of company resources, distractions that reduce productivity,
downloading of illegal or illicit materials, and even software piracy. In larger
organizations, these issues must be managed through explicit policies and
monitoring, which again, further increases management costs.

o Data Security Concerns: If a network is implemented properly, it is possible to greatly


improve the security of important data. In contrast, a poorly-secured network puts
critical data at risk, exposing it to the potential problems associated with hackers,
unauthorized access and even sabotage.

Most of these costs and potential problems can be managed; that's a big part of the job of
those who set up and run networks. In the end, as with any other decision, whether to
network or not is a matter of weighing the advantages against the disadvantages. Of course
today, nearly everyone decides that networking is worthwhile.

Key Concept: Networking has a few drawbacks that balance against its many positive
aspects. Setting up a network has costs in hardware, software, maintenance and
administration. It is also necessary to manage a network to keep it running smoothly, and
to address possible misuse or abuse. Data security also becomes a much bigger concern
when computers are connected together.

Source: http://www.tcpipguide.com/free/t_TheDisadvantagesCostsofNetworking.htm

Categorizing Different Kinds of Network


One way to categorize the different types of computer network designs is by their scope or
scale. For historical reasons, the networking industry refers to nearly every type of design as
some kind of area network. Common examples of area network types are:

LAN - Local Area Network


WLAN - Wireless Local Area Network
WAN - Wide Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or
sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area
Network
PAN - Personal Area Network
DAN - Desk Area Network
LAN and WAN were the original categories of area networks, while the others have gradually
emerged over many years of technology evolution.

Note that these network types are a separate concept from network topologies such as bus,
ring and star.

See also - Introduction to Network Topologies

LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building will
contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group
of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a
single IP subnet.

In addition to operating in a limited space, LANs are also typically owned, controlled, and
managed by a single person or organization. They also tend to use certain connectivity
technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN,
spanning the Earth.

A WAN is a geographically-dispersed collection of LANs. A network device called


a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address
and a WAN address.

A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not
owned by any one organization but rather exist under collective or distributed ownership
and management. WANs tend to use technology likeATM, Frame Relay and X.25 for
connectivity over the longer distances.

LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet
Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the
modem, and all of the computers on the home network use LAN (so-calledprivate) IP
addresses. All computers on the home LAN can communicate directly with each other but
must go through a central gateway, typically a broadband router, to reach the ISP.

Other Types of Area Networks

While LAN and WAN are by far the most popular network types mentioned, you may also
commonly see references to these others:

Wireless Local Area Network - a LAN based on WiFi wireless network technology
Metropolitan Area Network - a network spanning a physical area larger than a LAN
but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single
entity such as a government body or large corporation.
Campus Area Network - a network spanning multiple LANs but smaller than a MAN,
such as on a university or local business campus.
Storage Area Network - connects servers to data storage devices through a
technology like Fibre Channel.
System Area Network - links high-performance computers with high-speed
connections in a cluster configuration. Also known as Cluster Area Network.

Source: http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm

Securing Computer Data

What is Computer Security?

Computer Security, the branch of Computer Science Risk Management, was introduced in
1970s. It is capable of properly addressing the security issues of computer that is why it is
named Security Engineering. Its purpose is to ensure that a particular system is preserved
from all kinds of cyber attack. Thus, computer security is the science that preserves data,
keep up interaction and ensure uninterrupted service.

Living in global world is neither easy nor safe. Security issues of computer are continually
debated because of their increasing significance and vulnerability. Everyday thousands of
confidential document and precious information is shred between users that are always at
the risk of hacking.
Earlier computer systems such as Atlas and MULTICS have been attacked far before the
formal demand of security. Computers security issues usually deals with process that can be
used to preserve and protect data that is shared between users, in not only theoretical but
also practical aspect.

What is CIA in computer security?

None can deny the luring fear of getting hacked by any genius at any time in the depths of
cyber space. The attack might rob of the important financial details of an individual and the
priceless data and details of any organization. Thats why computer science intervenes and
gives us a solution. The aim of computer security is CIA - to secure the confidentiality,
integrity and availability of all information stored in our computer.

Confidentiality
Confidentiality can be interpreted as privacy or secrecy. Security gap can range from
embarrassment to disaster.

Integrity
By integrity we mean that information is protected from all unauthorized changes that are
undetectable to authorized users. In most of the hacking cases, integrity of resources is
compromised.

Availability
Availability reflects that the information is accessible to the authorized users. In national
news we often heard f denial of service attacks; the unavailability of service is an attack of
availability.

Other Issues

There are also other concerns of the computer security such as access control and non-
repudiation. The maintenance of access control means that users can not only approach
those services and resources to which they are legitimately authorized but also those to
which their access is not denied.

In the realm of non-repudiation some concrete facts come such as a person who has
received certain email cannot deny that he received it and a person who has sent an email
can never deny that he has not sent it. Moreover, the canvas of computer security is very
broad. It also encompasses the issues of ethics and risk analysis along with special concern
to computer crime, remediation of attacks, prevention and detection. Identity and anonymity
are also areas of focus in the computer security.

Techniques for securing data


For securing computer data a number of techniques can be employed. Some of such
techniques are Authentic Technique, Automated Theorem and Cryptographic.

Why computer security?

The content of computer remains safe and sound as long as it is isolated. Once connected to
other computers via a network, a computer is exposed to all kinds of threats. With the
expansion of cyber space the threats have significantly multiplied and the need of securing
computer intensified. Thats why computer security came into being.
Indeed the prime concerns of securing computer are confidentiality, integrity and
authenticity but privacy matters most. For an everyday user privacy is as essential as
anything. While making an account with any of the web site the user may feel that there is
nothing to hide. Privacy is concerned with protecting the information of user even if it has
nothing sensitive in it. With the passage of time data sharing among companies and people
has improved; thats why the significance of computer security has multiplied. It gives you
all that is inevitable for your security in cyber space.

Source:http://www.wifinotes.com/computer-networks/security-issues-of-computer.html

S-ar putea să vă placă și