0% found this document useful (0 votes)
63 views24 pages

Chapter #1

Uploaded by

Akshay Rathod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views24 pages

Chapter #1

Uploaded by

Akshay Rathod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Uses of Computer Network

What is a Network?

A network is a set of devices (often referred to as nodes) connected by


communication links. A node can be a computer, printer, or any other
device capable of sending and/or receiving data generated by other nodes
on the network.

What is a Computer Network?

“Computer network’’ to mean a collection of autonomous computers


interconnected by a single technology. Two computers are said to be
interconnected if they are able to exchange information. The connection
need not be via a copper wire; fiber optics, microwaves, infrared, and
communication satellites can also be used. Networks come in many sizes,
shapes and forms, as we will see later. They are usually connected together
to make larger networks, with the Internet being the most well-known
example of a network of networks.

Applications of Computer Network


There are multiple applications of computer networks including: There are
multiple applications of computer networks including:
1. Business applications: Computer networks are often used by businesses to
ensure impact communication, to share resources, and to allow their
employees to access the whole system and applications from remote
locations.
2. Educational applications: Online networks are widely employed in
educational institutions allowing students to access educational
possibilities, share knowledge, and collaborate with their professors.
3. Healthcare applications: The healthcare sector has benefited a lot from the
computer networks, which are used to store and share patient details thus
allowing healthcare providers to provide more personalized treatment.
4. Entertainment applications: Besides that with computer networks, you can
entertain yourself with online games, streaming movies and music, or
utilization of social media.
5. Military applications: Military networks are often closed and not used for
general communication, which ensures the safety of military information.
6. Scientific applications: Scientific research heavily depends on computer
networks because they will help establish collaboration among researchers
and facilitate the sharing of data and information.
7. Transportation applications: Computer networks are used to monitor a
transit system in various ways, by managing the traffic, tracking vehicles as
well as even improving efficiency in transportation.
8. Banking and finance applications: The banks and finance sector are the
biggest users of computer networks to carry out transactional processing,
information sharing, and the provision of secure access to financial services.

Types of Computer Networks

There are mainly five types of Computer Networks

1. Personal Area Network (PAN)

2. Local Area Network (LAN)

3. Campus Area Network (CAN)

4. Metropolitan Area Network (MAN)

5. Wide Area Network (WAN)

1. Personal Area Network (PAN)

PAN is the most basic type of computer network. It is a type of network


designed to connect devices within a short range, typically around one
person. It allows your personal devices, like smart phones, tablets, laptops,
and wearable, to communicate and share data with each other. PAN offers
a network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy
maintenance and very low cost. This uses Bluetooth, IrDA, and Zigbee as
technology. Examples of PAN are USB, computer, phone, tablet, printer,
PDA, etc.

Types of PAN

 Wireless Personal Area Networks: Wireless Personal Area Networks are


created by simply utilising wireless technologies such as WiFi and
Bluetooth. It is a low-range network.

 Wired Personal Area Network: A wired personal area network is constructed


using a USB.

Advantages of PAN

 PAN is relatively flexible and provides high efficiency for short network
ranges.

 It needs easy setup and relatively low cost.

 It does not require frequent installations and maintenance

 It is easy and portable.

 Needs fewer technical skills to use.

Disadvantages of PAN

 Low network coverage area/range.


 Limited to relatively low data rates.

 Devices are not compatible with each other.

 Inbuilt WPAN devices are a little bit costly.

Applications of PAN

 Home and Offices

 Organizations and the Business sector

 Medical and Hospital

 School and College Education

 Military and Defense

2. Local Area Network (LAN)

LAN is the most frequently used network. A LAN is a computer network that
connects computers through a common communication path, contained
within a limited area, that is, locally. A LAN encompasses two or more
computers connected over a server. The two important technologies
involved in this network are Ethernet and Wi-Fi. It ranges up to 2km &
transmission speed is very high with easy maintenance and low cost.
Examples of LAN are networking in a home, school, library, laboratory,
college, office, etc.
Advantages of a LAN

 Privacy: LAN is a private network, thus no outside regulatory body controls


it, giving it privacy.

 High Speed: LAN offers a much higher speed(around 100 mbps) and data
transfer rate comparatively to WAN.

 Supports different transmission mediums: LAN support a variety of


communications transmission medium such as an Ethernet cable (thin
cable, thick cable, and twisted pair), fiber and wireless transmission.

 Inexpensive and Simple: A LAN usually has low cost, installation, expansion
and maintenance and LAN installation is relatively easy to use, good
scalability.

Disadvantages of LAN

 The initial setup costs of installing Local Area Networks are high because
there is special software required to make a server.

 Communication devices like an Ethernet cable, switches, hubs, routers,


cables are costly.

 LAN administrator can see and check personal data files as well
as Internet history of each and every LAN user. Hence, the privacy of the
users are violated

 LANs are restricted in size and cover only a limited area

 Since all the data is stored in a single server computer, if it can be accessed
by an unauthorized user, can cause a serious data security threat.

3. Campus Area Network (CAN)

CAN is bigger than a LAN but smaller than a MAN. This is a type of
computer network that is usually used in places like a school or colleges.
This network covers a limited geographical area that is, it spreads across
several buildings within the campus. CAN mainly use Ethernet technology
with a range from 1km to 5km. Its transmission speed is very high with a
moderate maintenance cost and moderate cost. Examples of CAN are
networks that cover schools, colleges, buildings, etc.
Advantages of CAN

 Speed: Communication within a CAN takes place over Local Area Network
(LAN) so data transfer rate between systems is little bit fast than Internet.

 Security: Network administrators of campus take care of network by


continuous monitoring, tracking and limiting access. To protect network
from unauthorized access firewall is placed between network and internet.

 Cost effective: With a little effort and maintenance, network works well by
providing fast data transfer rate with multi-departmental network access. It
can be enabled wirelessly, where wiring and cabling costs can be managed.
So to work with in a campus using CAN is cost-effective in view of
performance

4. Metropolitan Area Network (MAN)

A MAN is larger than a LAN but smaller than a WAN. This is the type of
computer network that connects computers over a geographical distance
through a shared communication path over a city, town, or metropolitan
area. This network mainly uses FDDI, CDDI, and ATM as the technology with
a range from 5km to 50km. Its transmission speed is average. It is difficult
to maintain and it comes with a high cost. Examples of MAN are
networking in towns, cities, a single large city, a large area within multiple
buildings, etc.
Advantages of MAN

 MAN offers high-speed connectivity in which the speed ranges from 10-
100 Mbps.

 The security level in MAN is high and strict as compared to WAN.

 It support to transmit data in both directions concurrently because of dual


bus architecture.

 MAN can serve multiple users at a time with the same high-speed internet
to all the users.

 MAN allows for centralized management and control of the network,


making it easier to monitor and manage network resources and security.

Disadvantages of MAN

 The architecture of MAN is quite complicated hence, it is hard to design


and maintain.

 This network is highly expensive because it required the high cost to set up
fiber optics.

 It provides less fault tolerance.

 The Data transfer rate in MAN is low when compare to LANs.

5. Wide Area Network (WAN)

WAN is a type of computer network that connects computers over a large


geographical distance through a shared communication path. It is not
restrained to a single location but extends over many locations. WAN can
also be defined as a group of local area networks that communicate with
each other with a range above 50km. Here we use Leased-Line & Dial-up
technology. Its transmission speed is very low and it comes with very high
maintenance and very high cost. The most common example of WAN is the
Internet.

Advantages of WAN

 It covers large geographical area which enhances the reach of organization


to transmit data quickly and cheaply.

 The data can be stored in centralized manner because of remote access to


data provided by WAN.

 The travel charges that are needed to cover the geographical area of work
can be minimized.

 WAN enables a user or organization to connect with the world very easily
and allows to exchange data and do business at global level.

Disadvantages of WAN

 Traffic congestion in Wide Area Network is very high.

 The fault tolerance ability of WAN is very less.


 Noise and error are present in large amount due to multiple connection
point.

 The data transfer rate is slow in comparison to LAN because of large


distances and high number of connected system within the network.

Network technology- from local to global

Key: Network Types & Descriptions

1. Internet (Color: Black)

o Definition: Global Network System

o Description: A decentralized global system of


interconnected computer networks. The vast “network of networks” that
facilitates global communication and information exchange.
2. WAN (Color: Blue)

o Definition: Wide Area Network

o Description: Connects multiple LANs, often on an international scale,


allowing for data communication across vast distances. Commonly used by
businesses to connect branches globally.

3. MAN (Color: Red)

o Definition: Metropolitan Area Network

o Description: Encompasses a city or metropolitan region, integrating


multiple LANs. Ideal for city-wide applications like CCTV and metropolitan
Wi-Fi coverage.

4. LAN (Color: Green)

o Definition: Local Area Network

o Description: Operates within a limited area, such as an office or home.


Facilitates quick data transfers and seamless access to shared resources.

5. PAN (Color: Yellow)

o Definition: Personal Area Network

o Description: Connects personal devices within an individual’s close


proximity. Perfect for syncing devices like smartphones and wearable tech.

6. VPN (Color: Grey)

o Definition: Virtual Private Network

o Description: Creates a secure, encrypted tunnel through the internet. Allows


remote access to LANs and provides privacy during web browsing.

7. Cloud Network (Color: Sky Blue)

o Definition: Cloud-based Network Technology

o Description: Facilitates data storage, access, and processing


through cloud servers. Offers scalability and accessibility from anywhere
with internet connectivity.

8. Point-to-Point or P-P (Color: Dark grey)

o Definition: Point-to-Point Network


o Description: Establishes a direct, dedicated link between two devices.
Favored for secure, high-speed data transfer across short distances.

9. Multi-Point or M-P (Color: Purple)

o Definition: Multi-Point Network

o Description: Supports multiple users accessing data systems via a shared


connection. Ideal for large organizations needing scalability and enhanced
security.

10. SDN (Color: Orange)

o Definition: Software-defined Network

o Description: Modernizes networking by centralizing command


through software, allowing for dynamic adjustments and efficient resource
allocation

Understanding the Network Types Diagram

At the heart of the diagram lies the Internet circle, symbolizing the global
backbone of interconnected networks. This centralized depiction reinforces
the Internet’s pivotal role in networking and global communication.

Around this primary circle, smaller circles represent different types of


networks:

 Cloud: Represents the modern infrastructure where data is stored and


managed on remote servers and is accessed via the Internet. It highlights
the evolving nature of network technology, bridging traditional hardware
setups and virtual platforms.

 MAN (Metropolitan Area Network): Spanning a city or metropolitan area, it


serves as a medium between LAN and WAN, interconnecting multiple LANs
within a larger but confined geographical space.
 SDN (Software-defined Network): Embodies the evolution of network
management, where software centralization enables dynamic resource
allocation, improved responsiveness, and enhanced network flexibility.

 WAN (Wide Area Network): Signifies broader connectivity, linking LANs


across vast distances, even continents. It serves as a primary mode
of communication for multinational corporations and entities with
widespread geographical operations.

Encircling the main Internet circle, the VPN circle is placed overlapping the
Internet towards the North-East. This placement suggests VPN’s role as an
overlay network, providing secure, encrypted tunnels within the broader
Internet, essential for private and secure communication.

Lastly, connected to the LAN via uni-directional arrows are PAN, Point-to-
Point, and Multi-Point networks. These arrows, pointing towards LAN,
emphasize LAN’s central role in these networks. While PAN addresses
personal space connectivity, Point-to-Point ensures direct, simple
connections between two devices. In contrast, Multi-Point thrives in
complexity, enabling multiple devices to share a single connection.

The bi-directional arrows linking the central Internet circle to the


surrounding network types underline the reciprocal flow of data and
interconnectedness of these networks in the vast digital ecosystem.

Network protocols

A network protocol is a set of rules that govern data communication


between different devices in the network. It determines what is being
communicated, how it is being communicated, and when it is being
communicated. It permits connected devices to communicate with each
other, irrespective of internal and structural differences.

How do Network Protocols Work?

It is essential to understand how devices communicate over a network by


recognizing network protocols. The Open Systems Interconnection
(OSI), the most widely used model, illustrates how computer systems
interact with one another over a network. The communication mechanism
between two network devices is shown by seven different layers in the OSI
model. Every layer in the OSI model works based on different network
protocols. At every layer, one or more protocols are there for network
communication. To enable network-to-network connections, the Internet
Protocol (IP), for instance, routes data by controlling information like the
source and destination addresses of data packets. It is known as a network
layer protocol.

Types of Network Protocols

In most cases, communication across a network like the Internet uses


the OSI model. The OSI model has a total of seven layers. Secured
connections, network management, and network communication are the
three main tasks that the network protocol performs. The purpose of
protocols is to link different devices.

The protocols can be broadly classified into three major categories:

 Network Communication

 Network Management

 Network Security

1. Network Communication

Communication protocols are really important for the functioning of a


network. They are so crucial that it is not possible to have computer
networks without them. These protocols formally set out the rules and
formats through which data is transferred. These protocols handle syntax,
semantics, error detection, synchronization, and authentication. Below
mentioned are some network communication protocol:

Hypertext Transfer Protocol(HTTP)

It is a layer 7 protocol that is designed for transferring a hypertext between


two or more systems. HTTP works on a client-server model, most of the
data sharing over the web is done through using HTTP.

Transmission Control Protocol(TCP)

TCP layouts a reliable stream delivery by using sequenced


acknowledgment. It is a connection-oriented protocol i.e., it establishes a
connection between applications before sending any data. It is used for
communicating over a network. It has many applications such
as emails, FTP, streaming media, etc.

User Datagram Protocol(UDP)

It is a connectionless protocol that lay-out a basic but unreliable message


service. It adds no flow control, reliability, or error-
recovery functions. UPD is functional in cases where reliability is not
required. It is used when we want faster transmission, for multicasting and
broadcasting connections, etc.

Border Gateway Protocol(BGP)

BGP is a routing protocol that controls how packets pass through the router
in an independent system one or more networks run by a single
organization and connect to different networks. It connects the endpoints
of a LAN with other LANs and it also connects endpoints in different LANs
to one another.

Address Resolution Protocol(ARP)

ARP is a protocol that helps in mapping logical addresses to the physical


addresses acknowledged in a local network. For mapping and maintaining a
correlation between these logical and physical addresses a table known as
ARP cache is used.

Internet Protocol(IP)

It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that they
can reach their destination.

Dynamic Host Configuration Protocol(DHCP)

it’s a protocol for network management and it’s used for the method of
automating the process of configuring devices on IP networks.
A DHCP server automatically assigns an IP address and various other
configurational changes to devices on a network so they can communicate
with other IP networks. it also allows devices to use various services such
as NTP, DNS, or any other protocol based on TCP or UDP.

2. Network Management

These protocols assist in describing the procedures and policies that are
used in monitoring, maintaining, and managing the computer network.
These protocols also help in communicating these requirements across the
network to ensure stable communication. Network management protocols
can also be used for troubleshooting connections between a host and a
client.

Internet Control Message Protocol(ICMP)

It is a layer 3 protocol that is used by network devices to forward


operational information and error messages. ICMP is used for reporting
congestions, network errors, diagnostic purposes, and timeouts.

Simple Network Management Protocol(SNMP)

It is a layer 7 protocol that is used for managing nodes on an IP network.


There are three main components in the SNMP protocol i.e., SNMP agent,
SNMP manager, and managed device. SNMP agent has the local
knowledge of management details, it translates those details into a form
that is compatible with the SNMP manager. The manager presents data
acquired from SNMP agents, thus helping in monitoring network glitches,
and network performance, and troubleshooting them.

Gopher

It is a type of file retrieval protocol that provides downloadable files with


some description for easy management, retrieving, and searching of files.
All the files are arranged on a remote computer in a stratified manner.
Gopher is an old protocol and it is not much used nowadays.

File Transfer Protocol(FTP)

FTP is a Client/server protocol that is used for moving files to or from a host
computer, it allows users to download files, programs, web pages, and
other things that are available on other services.

Post Office Protocol(POP3)

It is a protocol that a local mail client uses to get email messages from a
remote email server over a TCP/IP connection. Email servers hosted by ISPs
also use the POP3 protocol to hold and receive emails intended for their
users. Eventually, these users will use email client software to look at their
mailbox on the remote server and to download their emails. After the email
client downloads the emails, they are generally deleted from the servers.

Telnet
It is a protocol that allows the user to connect to a remote computer
program and to use it i.e., it is designed for remote
connectivity. Telnet creates a connection between a host machine and a
remote endpoint to enable a remote session.

3. Network Security

These protocols secure the data in passage over a network. These protocols
also determine how the network secures data from any unauthorized
attempts to extract or review data. These protocols make sure that no
unauthorized devices, users, or services can access the network data.
Primarily, these protocols depend on encryption to secure data.

Secure Socket Layer(SSL)

It is a network security protocol mainly used for protecting sensitive data


and securing internet connections. SSL allows both server-to-server and
client-to-server communication. All the data transferred through SSL is
encrypted thus stopping any unauthorized person from accessing it.

Hypertext Transfer Protocol(HTTPS)

It is the secured version of HTTP. this protocol ensures secure


communication between two computers where one sends the request
through the browser and the other fetches the data from the web server.

Transport Layer Security(TLS)

It is a security protocol designed for data security and privacy over the
internet, its functionality is encryption, checking the integrity of data i.e.,
whether it has been tampered with or not, and authentication. It is
generally used for encrypted communication between servers and web
apps, like a web browser loading a website, it can also be used for
encryption of messages, emails, and VoIP.
Reference models

Reference Model offers a means of standardization which is acceptable


worldwide. Since people using the computer network are located over a
wide physical range and their network devices might have heterogeneous
architecture. In order to provide communication among heterogeneous
devices, we need a standardized model i.e. a reference model, which would
provide us way how these devices can communicate regardless their
architecture.

We have two reference models such as OSI model and TCP/IP reference
model, however, the OSI model is a hypothetical one but the TCP/IP is
absolutely practical model.

OSI Model

OSI is acronym of Open System Interface. This model is developed by


the International organization of Standardization (ISO) and therefore also
referred as ISO-OSI Model.

The OSI model consists of seven layers as shown in the following diagram.
Each layer has a specific function, however each layer provide services to
the layer above.
We’ll describe OSI layers “top down” from the application layer that directly
serves the end user, down to the physical layer.

7. Application Layer

The application layer is used by end-user software such as web browsers


and email clients. It provides protocols that allow software to send and
receive information and present meaningful data to users. A few examples
of application layer protocols are the Hypertext Transfer Protocol (HTTP),
File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer
Protocol (SMTP), and Domain Name System (DNS).

6. Presentation Layer

The presentation layer prepares data for the application layer. It defines
how two devices should encode, encrypt, and compress data so it is
received correctly on the other end. The presentation layer takes any data
transmitted by the application layer and prepares it for transmission over
the session layer.

5. Session Layer

The session layer creates communication channels, called sessions, between


devices. It is responsible for opening sessions, ensuring they remain open
and functional while data is being transferred, and closing them when
communication ends. The session layer can also set checkpoints during a
data transfer—if the session is interrupted, devices can resume data transfer
from the last checkpoint.

4. Transport Layer

The transport layer takes data transferred in the session layer and breaks it
into “segments” on the transmitting end. It is responsible for reassembling
the segments on the receiving end, turning it back into data that can be
used by the session layer. The transport layer carries out flow control,
sending data at a rate that matches the connection speed of the receiving
device, and error control, checking if data was received incorrectly and if
not, requesting it again.

3. Network Layer

The network layer has two main functions. One is breaking up segments
into network packets, and reassembling the packets on the receiving end.
The other is routing packets by discovering the best path across a physical
network. The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.

2. Data Link Layer

The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames
and sends them from source to destination. This layer is composed of two
parts—Logical Link Control (LLC), which identifies network protocols,
performs error checking and synchronizes frames, and Media Access
Control (MAC) which uses MAC addresses to connect devices and define
permissions to transmit and receive data.

1. Physical Layer

The physical layer is responsible for the physical cable or wireless


connection between network nodes. It defines the connector, the electrical
cable or wireless technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and 1s, while
taking care of bit rate control.

Advantages of OSI Model

The OSI model helps users and operators of computer networks:

 Determine the required hardware and software to build their network.

 Understand and communicate the process followed by components


communicating across a network.

 Perform troubleshooting, by identifying which network layer is causing an


issue and focusing efforts on that layer.

TCP/IP Model

TCP/IP Reference Model is a four-layered suite of communication protocols.


It was developed by the DoD (Department of Defence) in the 1960s. It is
named after the two main protocols that are used in the model, namely,
TCP and IP. TCP stands for "Transmission Control Protocol" and IP stands
for "Internet Protocol".

The four layers in the TCP/IP protocol suite are −

1. Host-to- Network Layer −It is the lowest layer that is concerned with the
physical transmission of data. TCP/IP does not specifically define any
protocol here but supports all the standard protocols.
2. Internet Layer −It defines the protocols for logical transmission of data over
the network. The main protocol in this layer is Internet Protocol (IP) and it is
supported by the protocols ICMP, IGMP, RARP, and ARP.

3. Transport Layer − It is responsible for error-free end-to-end delivery of


data. The protocols defined here are Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP).

4. Application Layer − This is the topmost layer and defines the interface of
host programs with the transport layer services. This layer includes all high-
level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.

The following diagram shows the layers and the protocols in each of the
layers −
What is Standards?

Standards are the set of rules for data communication that are needed for
the exchange of information among devices. It is important to follow
Standards which are created by various Standard Organizations like IEEE,
ISO, ANSI, etc.

Types of Standards

During data communication, a number of standards may be used


simultaneously at the different layers. The commonly used standards at
each layer are −

 Application layer − HTTP, HTML, POP, H.323, IMAP

 Transport layer − TCP, SPX

 Network layer −IP, IPX

 Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay

 Physical layer −RS-232C (cable), V.92 (modem)

 De Facto Standard: The meaning of the work ” De Facto ” is ” By Fact ” or


“By Convention” These are the standards that have not been approved by
any Organization but have been adopted as Standards because of their
widespread use. Also, sometimes these standards are often established by
Manufacturers.
For example : Apple and Google are two companies that established their
own rules for their products which are different. Also, they use some same
standard rules for manufacturing their products.

 De Jure Standard: The meaning of the word “De Jure” is “By Law” or “By
Regulations” Thus, these are the standards that have been approved by
officially recognized bodies like ANSI, ISO, IEEE, etc. These are the standards
that are important to follow if it is required or needed.
For example : All the data communication standard protocols like SMTP,
TCP, IP, UDP etc. are important to follow the same when we need them.
What Is Network Policy

https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-
network-policy.html

Network policy is a collection of rules that govern the behaviors of network


devices. Just as a federal or central government may lay down policies for
state or districts to follow to achieve national objectives, network
administrators define policies for network devices to follow to achieve
business objectives.

Benefits of network policy

A network that runs on policies can be automated more easily and


therefore respond more quickly to changing needs. Many common tasks,
such as adding devices and users and inserting new applications and
services, can now be easily accomplished. Well-defined policies can benefit
a network in the following ways:

 Align the network with business needs

 Provide consistent services across the entire infrastructure

 Bring agility through greater automation

 Make performance dependable and verifiable

An even bigger advantage to enterprises is the security gains from policy.


By granularly defining policies that give users and devices the least amount
of access to resources that they need to do their jobs, you can better
protect sensitive data. Violations can be caught and mitigated quickly. Such
zero-trust security measures reduce risk, contain threats, stop lateral
movement of malware, and help verify regulatory compliance.

Social issues for networks


UNAUTHORISED ACCESS

Unauthorised access on a network is when someone gains access to a


network using someone else’s credentials or through other illegal methods.
Accessing a network, website, account or service that you do not have
permission to access is illegal.

This is why having usernames and passwords and setting up access rights
for routers and other connection devices are important. Access to secure
data on the network should also be controlled.
Authentication works to protect your personal information from unwanted
access. You can protect your computer by setting up a username and
password that you will need to enter each time you start it up.

You can also set up authentication for your smartphone and tablet. New
types of authentication, beyond usernames and passwords, have made it
possible for you to easily secure your devices and access them yourself.
New types of authentication include biometrics (fingerprint-unlock or face-
unlock) screen-lock patterns and PINs.

In this unit, you will build on your knowledge of authentication by looking


at what unauthorised network access is and its negative consequences, how
networks must be used ethically and why AUPs (in schools and other
environments) are drawn up. We will also discuss network safety and
security issues, especially when it comes to BYOD environments and the
privacy issues surrounding networks.
ETHICAL USE OF NETWORKS

Since networks are used by a wide range of people, they must be used
responsibly and ethically. Anything negative that any user does on a
network can reflect negatively on the company, school or organisation
whose network they are using. This is why most organisations set
up acceptable use policies (AUPs) for those people who will be using their
networks, especially when it comes to what users can and cannot do on the
internet.

The chances are very high that your school has an AUP that you had to read
and then sign or acknowledge in some way. This section will look at the
basics of AUPs for schools and what guidelines they should contain. The
AUP is there to protect the users (and the organisation) when they use ICT
facilities and when they are online.
ACCEPTABLE USE POLICIES OF SCHOOLS

In a school, an AUP can cover a wide range of computing devices and


networks and is a contract between the user (learner) and the organisation
(school) that outlines what the user can and cannot do on a particular
network.

Below are some guidelines that should be in AUPs:


 A list of basic netiquette rules, including not sending spam or hoax
emails and how users should communicate using email or social media
websites

 What may or may not be accessed online using the school’s ICT facilities.
This could include restricting access to social media websites

 How much information users may download from the internet (for example,
no live streaming or downloads larger than a certain file size)

 Guidelines on respecting copyright, intellectual property laws and privacy,


as well as how to avoid plagiarism

 When and how portable storage devices can be used

 Restrictions on what software can be installed on the school’s computing


devices

 What to do if users find that they have become the victims of identity theft,
cyber-stalking and cyber-bullying, and what to do if their devices become
infected with viruses or malware

 Clear descriptions of what will happen to a user who breaks the rules
outlined in the AUP

Each school will have its own AUP depending on the computing devices,
services and access they provide.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy