ICT CH-4 Notes
ICT CH-4 Notes
SEPTEMBER 2020
Chapter 4: Networks and the effects of using them
GRADE: 8 SUBJECT: ICT
Network Devices
Modems
• It stands for modulator demodulator.
• Converts computer’s digital signals (modulates it) into analogue for transmission through telephone
lines.
• Reverse this process- analogue signal from a telephone line into digital for a computer to process the
data. (Demodulates it)
• The main use is to connect to computer networks over long distances using existing telephone
lines.
Types of Modems
• Dial-up modems: operate at 60 kilobits/sec (slow compared to modern standards)
• (ADSL) asymmetric digital subscriber line modems operate at 11,000 kilobits/sec.
• Asymmetric: faster at downloading than uploading
• They don’t tie up the line while accessing the internet, which allows simultaneous internet access
and usage of telephone.
• Cable modems: allow cable TV users to receive TV signals as well as internet
access.
Network Hubs
• They are devices that can have multiple devices connected to them.
• Main task is to receive data from different ports and send it to each device
• The information will be received to the device whether it’s relevant, or not
Switches
• More efficient than hubs in distributing data.
• Each device has an access control media address MAC which identifies it uniquely
• MAC is a number unique to each device connected to the network (like fingerprints)
• Data sent will have a mac address which tells the source and receiving device.
Bridges
Routers
• Acts like a bridge, yet can link between two or more networks
• Makes decisions on messages being passed between the networks
• Formats the messages making it suitable for the new network
• Reads information about the message and decides where the message should go and the best
route for it to get there
• Used to provide a connection between a network and the internet
• You need an ISP account to have access to the internet (internet server provider)
IP Address
An Internet Protocol (IP) address is a rational numerical address which is allocated to every single
computer and computer device that is a member of a given Transmission Control Protocol / Internet
Protocol (TCP/IP)-based network.
MAC Address
The Media Access Control (MAC) address is a binary number used to specify particular computer network
adapters. These numbers, also known as hardware addresses or physical addresses, are either installed
in the network hardware during the manufacturing process, or are saved in firmware, and intended to
never be altered.
IP gives the location of each device connected to the Internet whereas the MAC address identifies the
device connected to the Internet.
Internet
• The Internet is a worldwide collection of networks.
• It allows for web browsing, gaming, file sharing, video and email.
• User can access by web browser.
Websites
• Web is made up of millions of websites and web pages
• Web pages are documents on a computer screen containing various multimedia and text, pictures
• A website consists of many of these pages linked together
Uniform Resource Locator (URL)
Intranet
• It is an internal website that is setup internally for companies and can be accessed by employees for the
purpose of standard documents or information and many items of information and data.
Benefits
• Safer and less chance of hacking
• Possible to prevent employees from accessing unwanted sites
• Companies ensure that info available is specific to their needs
• Easier to send sensitive messages that remain within a company
Advantages
• All computers can access the same services and resources
• No cabling is involved
• The system is more flexible
• Adding new computers and devices is very easy
• Cost is reduced and safety is improved
Disadvantages
• Security is an issue
• Problems and interference can affect the signal
• The data transfer is slow than in the wired LAN
Wi-Fi
Wi-Fi Hotspots
• Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send
signals
• Wi-Fi hotspots are places where you can access Wi-Fi (free or paid)
• Hotspots are found in public places like Airports, hotels and cafés
• War driving: The act of driving and searching for unsecured Wi-Fi hotspots
• This gives a risk to the Wi-Fi system
Bluetooth
• Bluetooth is an example of wireless personal area networking (WPAN) technology
• Spread spectrum transmission (radio waves) is used to provide wireless links between to
devices such as mobile phones and allow connection to the internet
• A small home network can be created with this system
Internet
• The Internet is a worldwide collection of networks.
• It allows for web browsing, gaming, file sharing, video and email.
• Users can access by web browser.
Websites
• Web is made up of millions of websites and web pages
• Web pages are documents on a computer screen containing various multimedia and text, pictures
• A website consists of many of these pages linked together
Passwords
• After typing in user ID, the user will be requested to type in their password.
• Generally, it is a combination of letters and numbers
• Passwords are shown as stars (***) so nobody overlooking it can see it.
• Many systems ask for password to be typed in twice as a verification check, in case of input
errors
• To help protect the system, user is has a finite number of attempts.
• If password is forgotten, administrator has to reset it
• If password is forgotten on a website, it will be sent to your e-mail
Encryption
• The conversion of data to code by encoding it
• Done by using encryption software
• Since data is encoded, it appears meaningless to a hacker
• This technique does not prevent illegal access
• Necessary to use decryption software to decode the data
• Used to protect sensitive data e.g. banking details
• Encryption keys are complex algorithms which makes codes almost unbreakable
Spyware
Spyware is software that gathers user information through their network connections without
them being aware that this is happening
Once spyware is installed, it monitors all key presses and transmits the information back to the
person who sent out the spyware
This software can install other spyware software, read cookies and personal information
Strong passwords: A random mix of alphabets (uppercase and lowercase), numbers and
keyboard symbols (@%&*^etc.)
Weak passwords: Easy to guess eg username, date of birth or 1234556 etc.
Guidelines
Do not leave personal information lying around
Lock all filing cabinets when leaving an office
Do not leave computer without locking or logging off
Protect passwords
Change passwords regularly
Do not fax or email anything of sensitive nature
Communication Methods
Fax (Facsimile)
• A system that scans documents electronically and converts them into a bit map image (a bit is a
binary digit and is a 1 or a 0)
• Then transmitted as a series of electrical signals through the telephone network
• Receiving fax machine converts the electronic image and prints it out on paper
• It is also possible to generate fax signals from a computer to allow documents to be sent to a fax
machine
• This saves printing out the document first and then passing it through the fax machine
• Fax/modem software in the computer converts the image into a form fax machines can recognized
Physical Faxing: dedicated fax machine connected via telephone line that copies and electronically
sends files to the dialled recipient
Email
• Another method for sending text and attachments from one computer to another over a network
Advantages
• Speed of sending and receiving replies is quick
• Low cost (no stamps, paper etc.)
• Not needing to leave home to send the mail
Disadvantages
• Possibility of virus threats and hacking
• Need for the email address to be correct
• Inability to send bulky objects via emails
Web-conferencing
Video Conferencing
• This is a method of communication between people at 2 or more separate locations
• It is done in real time and makes use of LAN, if internal, or WAN if through the internet.
• Uses hardware like; webcam, microphones, speakers and monitors
• It also uses special software like CODEC converts and compresses analogue data into digital data
to send down digital lines.
How it works
• Delegates at one end speak into a microphone and look into the webcam.
• The other delegates can see them and hear them using speakers and monitors,
• However there are several problems with these as the conference call often lags and quality is not
always high.
• Also, as travelling tickets increase in price, terrorists can use this way of communicating with each
other, increasing risk.
Audio-Conferencing