0% found this document useful (0 votes)
16 views3 pages

Research

Uploaded by

adnan3211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

Research

Uploaded by

adnan3211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MARIA 29598

“EXPLORING COMPUTER NETWORKS”

INTRODUCTION:
A computer is a great invention of the modern technology. It is generally a machine which has
capability to store large data value in its memory. Computer works using input (like keyboard)
and output (like printer) devices. It is very simple to handle the computer as its functioning is so
common that a child can handle it. It is a very reliable device which we can carry with us and use
anywhere and anytime. Computer allows us to make changes in the already stored data as well as
store new data. It is a new technology which is used in offices, banks, educational institutions,
etc.

NETWORK TYPES:

NETWORK TYPE DESCRIPTION EXAMPLE


Local area network (LAN) (LAN) is a collection of Home wifi networks,small
devices connected together in business networks.
one physical location such as
building,office or home.

Personal area network (PAN) A personal area network is a Connection between a


network concerned with the Bluetooth earpiece and a
exchange of information in smartphone.
the vicinity of a person.
MARIA 29598

Wireless local area network (WLAN) is a method of Home or office Wi-Fi


(WLAN) wirelessly distributing network.
network connectivity to
multiple devices within a
localized area.

Wide area network (WAN) (WAN) is the technology that A bank, including its branch
connects your offices, data offices and ATM machines.
centers, cloud applications,
and cloud storage together.

NETWORK SECURITY:
1. Computer Viruses
2. Computer Worms
3. Spywares

1. COMPUTER VIRUSES: 🖥️ A type of malicious software or malware, viruses are


one of the most common threats you face. Viruses hide behind files you’ve downloaded
and spread to devices and networks this way. The most likely entry point for viruses are
things you’ve recently downloaded, such as a malicious attachment, executables
downloaded from shady websites, or even content shared on social media.

2. COMPUTER WORMS: 🖥️ Although it’s the second type of malware on this list,
worms aren’t talked about very often. Yet, it’s one of the most common threats to your
network, next to viruses.Similar to viruses, worms replicate and spread from device to
device. However, unlike viruses, worms don’t need a host to spread.

3. SPYWARES: 🖥️ Spyware is specifically used to get sensitive data. Designed to lay


low and stay undetected for as long as possible, spyware is hard to detect and hard to get
rid of. The data it targets could be your internet history, login credentials, and even
your credit card details.

NETWORK DEVICES:
● HUB
● SWITCH
● ROUTER
MARIA 29598

FUNCTIONS OF NETWORK DEVICES:


➡️
● HUB A hub is a simple connectivity device that connects cables, forming a network
segment. It serves as a repeater for long-distance data and retransmits without filtering. It
handles both digital and analog data when configured appropriately.

➡️
● SWITCH A switch is more advanced than a hub. It intelligently forwards data
based on hardware addresses. Switches enhance network efficiency and security by
making forwarding decisions using TCP/IP protocol headers. Additionally, multilayer
switches can function as both a switch and a router.

➡️
● ROUTER Routers can filter and forward data using logical addresses like IP
addresses. They store network information, act as packet-filtering firewalls, and play a
vital role in controlling and optimizing network traffic.

CONCLUSION:
“Computer networking refers to interconnected computing devices that can
exchange data and share resources with each other. These networked devices
use a system of rules, called communications protocols, to transmit information
over physical or wireless technologies.”

You might also like