Network and Security

Computer network protection consists of steps taken by companies or by such organisations, to detect unlicensed entry by external threats to deter them from doing so.Based on computer network complexity, various approaches to computer network security management have different criteria. For eg, a home office requires simple network protection, while large enterprises need high maintenance to deter malware threats from the network. Network Administrator manages network access to data and applications. A network administrator assigns the designated person the user ID and password.

Aspect of network security

Privacy: privacy implies secrecy with both the sender and the receiver. The message sent should only be delivered to the intended recipient, while the communication should be invisible to all users. Just the sender and recipient can understand the message as eavesdroppers can decrypt the message. Therefore, the code must be encrypted such that the message cannot be intercepted. This secrecy feature is widely used for safe correspondence.

Message reliability: Data integrity ensures that the information must reach the recipient precisely as it has been delivered. Data content does not alter during transmission, maliciously or accidentally, in a transit. When monetary transactions on the internet are increasing, data privacy is more and more important. For safe correspondence, data confidentiality must be maintained.

Authentication of the end-point: Authentication ensures that the recipient is certain of the identity of the sender, i.e. that no impostor has received a letter.

 

Non-repudiation: Non-repudiation ensures that the recipient must be able to show that the letter sent is from a certain source. The sender does not refuse to deliver a reply. The recipient has the responsibility of verifying the name. For eg, if a customer receives an application to move the money on a separate account, the bank may provide evidence that the customer has requested the transaction.

What is a Computer Network?

Computer networking is the process of interfacing two or more computer computers for the purposes of data sharing. Computer networks are designed of hardware and software combinations.

Features Of Computer network

Computer networks are used to perform certain functions by knowledge exchange.

 

  • Any of the topics used by networks include:
  • email, film, text messaging and other ways communication
  • Tools include printers, scanners and photocopiers sharing
  • Share files
  • Remote system applications and operating programmes
  • Enables network administrators to view and retain knowledge effectively

Computer Network Components

Computer network modules are the main components used for software installation. NIC, transform, wire, hub, router and modem are several essential network components. Any network modules can also be omitted depending on the type of network we need to add. The wireless network, for example, would not need a cable.

NIC(National interface card)

NIC is a system for communicating with another device. The network interface card holds the hardware addresses and this address is used by the protocol for the data-link layer to define the network device to move the data to a correct place.

Two types of NICs are available: NIC wireless and NIC wired.

Wireless NIC: Wireless NIC is used for all new laptops. With the Wireless NIC, the antenna that uses radio wave technologies is connected.

Wired NIC: the wired NIC cables are used for transferring data over a medium.

 

 

Hub –

Hub is a central device which divides the network link into several devices. If the machine asks for information from a computer, the request is sent to the hub. This request is sent by Hub to all the interconnected computers.

Router

 Router is a LAN connecting system to the internet. The router is used primarily to link the different networks or to connect the internet to many machines.

Switches-

Switch is a networking system that groups together all network equipment to transfer data to another device. It does not relay the message across the network, i.e. it transmits the message to the system on which it belongs. There’s a safer turn than Hub. Then we should conclude that the switch simply delivers a message from the source to the destination.

 

Modem –

Modem links the device via the current phone line to the internet. A modem is not compatible with the chipset of the unit. A modem is a different component of the motherboard’s PC slot.

 

 

Computer Network Uses

Resource sharing: Resource sharing involves sharing resource such as programmes, printers and data between network users without requiring the resource and user’s physical position.

Model Server-Client: In the server client model, computer networking is included. A server is a central device that is used by the system administrator to store and manage the records. Clients are computers used for securely accessing the details contained on the computer.

 

Medium of contact: The computer network acts as a means of communication between users. For example, an enterprise includes more than one machine with a regular communications email system used by workers.

 

E-commerce: The network of computers is essential in companies as well. We will do this on the internet. Amazon.com, for example, does its business through the internet, i.e. does its business via the internet.