Hardware and network technologies - CCEANetwork technologies

Hardware is the physical components of a computer system. When we connect computers together to share data, software and hardware we create a network.

Part ofDigital Technology (CCEA)Digital technology (compulsory)

Network technologies

When the robots finally destroy us, they will do so in a network

When we connect computers together to share data, software and hardware, we create a network. Network protocols (rules) are used to send files over the network as .

Packets contain information in the packets header, which allows them to be sent, received and reassembled in the correct order.

What is a network?

A network is when two or more computing devices are connected together in order to share data, files or hardware.

A network can be just two devices connected to share data; your smart phone connected to your smartwatch or wireless headphones can be considered a network.

A computer that is not connected to a network is called a stand-alone.

Icons showing the advantages and disadvantages of using networks

Network advantages

  • Users can share files and resources (e.g., hardware, software licences and processing power) with others
  • Site licences allow software to be installed across an organisation and can be cheaper than buying several individual copies
  • Users can access files and resources from another computer on the same network
  • Servers can be created to centrally control a number of operations and services on a network, such as security and file backup
  • Communications can be sent to any computer on the network
  • can be shared (printers, scanners and Network Attached Storage (NAS) drives) and potentially save money

Network disadvantages

  • Buying network cabling and file servers can be expensive
  • Managing a large network can be complicated, requiring training. A network manager may also need to be employed, adding to costs
  • Networks can be subject to internal security issues. Human users can often be a weak point – e.g., selecting weak passwords, leaving terminals unlocked and removing or misplacing data via personal storage devices
  • There is a danger of external unauthorised access through hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, e.g. a
  • Malware and viruses can be introduced from either internal or external sources and can spread from computer to computer. It may be difficult to control and eradicate this issue
  • Depending on the structure of the network, if an element of it fails this could cause the whole network to fail, or cause other issues for the rest of the network
  • A high amount of network traffic can cause the whole network to run slowly