[go: up one dir, main page]

0% found this document useful (0 votes)
383 views9 pages

ICT CH-4 Notes

The document discusses different types of computer networks and network devices. It describes modems, hubs, switches, bridges, routers and their functions. It also discusses wireless networks like Wi-Fi and Bluetooth. Local area networks (LANs) connect devices within a building while wide area networks (WANs) connect multiple LANs over longer distances using devices like routers. The internet is the largest global network that allows users to access websites, email and share files using an internet browser.

Uploaded by

anish kanthethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views9 pages

ICT CH-4 Notes

The document discusses different types of computer networks and network devices. It describes modems, hubs, switches, bridges, routers and their functions. It also discusses wireless networks like Wi-Fi and Bluetooth. Local area networks (LANs) connect devices within a building while wide area networks (WANs) connect multiple LANs over longer distances using devices like routers. The internet is the largest global network that allows users to access websites, email and share files using an internet browser.

Uploaded by

anish kanthethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

NOTES

SEPTEMBER 2020
Chapter 4: Networks and the effects of using them
GRADE: 8 SUBJECT: ICT

Network Devices
Modems
• It stands for modulator demodulator.
• Converts computer’s digital signals (modulates it) into analogue for transmission through telephone
lines.
• Reverse this process- analogue signal from a telephone line into digital for a computer to process the
data. (Demodulates it)
• The main use is to connect to computer networks over long distances using existing telephone
lines.

Types of Modems
• Dial-up modems: operate at 60 kilobits/sec (slow compared to modern standards)
• (ADSL) asymmetric digital subscriber line modems operate at 11,000 kilobits/sec.
• Asymmetric: faster at downloading than uploading
• They don’t tie up the line while accessing the internet, which allows simultaneous internet access
and usage of telephone.
• Cable modems: allow cable TV users to receive TV signals as well as internet
access.

Network Hubs
• They are devices that can have multiple devices connected to them.
• Main task is to receive data from different ports and send it to each device
• The information will be received to the device whether it’s relevant, or not

Switches
• More efficient than hubs in distributing data.
• Each device has an access control media address MAC which identifies it uniquely
• MAC is a number unique to each device connected to the network (like fingerprints)
• Data sent will have a mac address which tells the source and receiving device.

Bridges

ICT /NOTES/NOVEMBER 2020 1


• It connects 2 different types of networks together e.g. a bus and star network
• It can only connect networks that use the same way for handling messages
• They do this by changing the form of message to suite the different type of network

Routers
• Acts like a bridge, yet can link between two or more networks
• Makes decisions on messages being passed between the networks
• Formats the messages making it suitable for the new network
• Reads information about the message and decides where the message should go and the best
route for it to get there
• Used to provide a connection between a network and the internet
• You need an ISP account to have access to the internet (internet server provider)

IP Address
An Internet Protocol (IP) address is a rational numerical address which is allocated to every single
computer and computer device that is a member of a given Transmission Control Protocol / Internet
Protocol (TCP/IP)-based network.

MAC Address
The Media Access Control (MAC) address is a binary number used to specify particular computer network
adapters. These numbers, also known as hardware addresses or physical addresses, are either installed
in the network hardware during the manufacturing process, or are saved in firmware, and intended to
never be altered.

What is the difference between IP address and MAC?

IP gives the location of each device connected to the Internet whereas the MAC address identifies the
device connected to the Internet.

HTTP Proxy Server


• Type of server that acts as a buffer between a WAN and a LAN.
• Retrieves web pages and passes them onto the computer that made a request.
• Stores any page retrieved on the server, which means that when a different computer requests the
same page it would be available.
• Speeds up the browsing process

Internet
• The Internet is a worldwide collection of networks.
• It allows for web browsing, gaming, file sharing, video and email.
• User can access by web browser.

Websites
• Web is made up of millions of websites and web pages
• Web pages are documents on a computer screen containing various multimedia and text, pictures
• A website consists of many of these pages linked together
Uniform Resource Locator (URL)

ICT /NOTES/NOVEMBER 2020 2


• Web browsers use URLs to retrieve files.
• They are standard way of locating on the internet
• Standard form: 4 numbers e.g. 194.106.220.19
• Also alphanumeric form: protocol://site address/path/filename
• Where; Protocol is usually http
• Site address consists of: computer name, domain name, domain type, and country code
• Path is the web page
• Filename is the item on the page

Accessing the Internet

Type of access with Description


Dial up internet access (dial up modem)

• Slowest type (60kbps)


• Connects via the telephone line dialling a number given by ISP
• Disadvantage: telephone line gets tied up while a dial up modem is in operation

Cable internet access (cable modem)


• Local cable television operators gives user access through cable networks
Internet access via DSL (broadband modem)
• Fastest download speed connections (at least 11000kbps)

Intranet
• It is an internal website that is setup internally for companies and can be accessed by employees for the
purpose of standard documents or information and many items of information and data.

Benefits
• Safer and less chance of hacking
• Possible to prevent employees from accessing unwanted sites
• Companies ensure that info available is specific to their needs
• Easier to send sensitive messages that remain within a company

Comparison between Internet and Intranet

• Internet comes from – international network


• Intranet comes from – internal restricted access network
• Intranet is used to give local information whereas internet covers topics of global interest
• Intranet requires password entry and can be accessed from agreed points. Internet can be
accessed from anywhere provided the user has an ISP account
• Intranet is behind firewall which gives protection from hackers, not possible with internet due to
international scales
• Intranet information is usually stored on local servers which makes them secure

Common types of networks

ICT /NOTES/NOVEMBER 2020 3


• File servers: allow users to save and load data/files
• Applications servers: deal with distribution of applications software
• Printer servers: ensure printing from devices on the network is done in a queue
• Proxy servers: used as a buffer between WANs and LANs

Local area networks (LAN)


• Not over a large geographical area (e.g. in one building)
• Typical LAN will consist of a number of computers and devices
• Devices and computers will be connected to hubs or switches.
• One of the hubs or switches will usually be connected to a router and modem to allow the LAN to
connect to the internet
• In doing so it then becomes part of a wide area network

Advantages of Networking using LAN


• The sharing of resources
• Communication between users
• Network administrator can control and monitor all aspects of the network

Disadvantages of Networking using LAN


• Easier spread of viruses throughout the whole network
• Development of printer queues
• Slower access to external networks, such as the internet
• Increased security risk
• If main server breaks down, usually the networks will no longer function.

Wireless LANs (WLANs)


• Do not involve any wiring or cabling
• Provide wireless network connection overs a short distance
• They use radio or infrared signals instead of cables
• Devices known as Access Points (APs) are used for a larger range
• APs usually use spread spectrum technology (larger range)

Advantages
• All computers can access the same services and resources
• No cabling is involved
• The system is more flexible
• Adding new computers and devices is very easy
• Cost is reduced and safety is improved

Disadvantages
• Security is an issue
• Problems and interference can affect the signal
• The data transfer is slow than in the wired LAN
Wi-Fi

ICT /NOTES/NOVEMBER 2020 4


• Any system which allows you to connect to a network or computer through wireless communication
• Examples:
o WLANs
o PDAs
o Laptop computers
o Peripheral devices such as printers

Wi-Fi Hotspots
• Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send
signals
• Wi-Fi hotspots are places where you can access Wi-Fi (free or paid)
• Hotspots are found in public places like Airports, hotels and cafés
• War driving: The act of driving and searching for unsecured Wi-Fi hotspots
• This gives a risk to the Wi-Fi system

Bluetooth
• Bluetooth is an example of wireless personal area networking (WPAN) technology
• Spread spectrum transmission (radio waves) is used to provide wireless links between to
devices such as mobile phones and allow connection to the internet
• A small home network can be created with this system

• Example: Used to transfer photos from camera to a mobile phone


• It behaves like a mini-LAN

Wide area networks


• WAN is formed by a number of LANs being connected together through a router or a modem
• Some companies set up Private WANs, it is expensive however it comes with a much
enhanced security
• It is common to use an Internet service provider (ISP) for connections to the internet and
communicate via this network system
• Additional hardware is needed for a WAN: Routers, modems and proxy servers

Internet
• The Internet is a worldwide collection of networks.
• It allows for web browsing, gaming, file sharing, video and email.
• Users can access by web browser.

Websites
• Web is made up of millions of websites and web pages
• Web pages are documents on a computer screen containing various multimedia and text, pictures
• A website consists of many of these pages linked together

ICT /NOTES/NOVEMBER 2020 5


Network Security
User IDs
• To log on to a network, a user must type in a user ID
• User ID assigns user privilege once user logs in
• The top level privilege for a network is an administrator:
o Able to set passwords and delete files from server etc.
• User privilege may only allow to access their own work area

Passwords
• After typing in user ID, the user will be requested to type in their password.
• Generally, it is a combination of letters and numbers
• Passwords are shown as stars (***) so nobody overlooking it can see it.
• Many systems ask for password to be typed in twice as a verification check, in case of input
errors
• To help protect the system, user is has a finite number of attempts.
• If password is forgotten, administrator has to reset it
• If password is forgotten on a website, it will be sent to your e-mail

Encryption
• The conversion of data to code by encoding it
• Done by using encryption software
• Since data is encoded, it appears meaningless to a hacker
• This technique does not prevent illegal access
• Necessary to use decryption software to decode the data
• Used to protect sensitive data e.g. banking details
• Encryption keys are complex algorithms which makes codes almost unbreakable

Spyware

 Spyware is software that gathers user information through their network connections without
them being aware that this is happening
 Once spyware is installed, it monitors all key presses and transmits the information back to the
person who sent out the spyware
 This software can install other spyware software, read cookies and personal information

Weak and Strong passwords

 Strong passwords: A random mix of alphabets (uppercase and lowercase), numbers and
keyboard symbols (@%&*^etc.)
 Weak passwords: Easy to guess eg username, date of birth or 1234556 etc.

ICT /NOTES/NOVEMBER 2020 6


Authentication techniques
 These are the ways in which a computer user can prove who they are
 Magnetic Stripes: Card swiped through a magnetic stripe reader that authenticates the user
after reading iron-based magnetic particles on a band of magnetic material on the card
 ID cards: Usually a photo ID with a QR or barcode that authenticates the user
 Passwords: Have an RFID chip on it that responds to a signal sent by a RFID reader that
sends information about the passport holder to the computer system
 Physical Tokens
 Retina scans
 Iris scans
 Face Recognition
 Finger print scanning

Data Protection Act

Failure to abide to rules can lead to fines or imprisonment


Rules
1. Data must be Fairly and lawfully processed
2. Data can only be processes for the stated purpose
3. Data must be *Adequate*, Relevant and not Excessive
4. Data must be Accurate
5. Data must not be kept longer than necessary(short time)
6. Data must be processed in accordance with the data subject’s right
7. Data must be kept Secure
8. Data must not be transferred to another country unless(Domestic) they have adequate
protection

Guidelines
 Do not leave personal information lying around
 Lock all filing cabinets when leaving an office
 Do not leave computer without locking or logging off
 Protect passwords
 Change passwords regularly
 Do not fax or email anything of sensitive nature

Communication Methods

Fax (Facsimile)
• A system that scans documents electronically and converts them into a bit map image (a bit is a
binary digit and is a 1 or a 0)
• Then transmitted as a series of electrical signals through the telephone network
• Receiving fax machine converts the electronic image and prints it out on paper
• It is also possible to generate fax signals from a computer to allow documents to be sent to a fax
machine
• This saves printing out the document first and then passing it through the fax machine
• Fax/modem software in the computer converts the image into a form fax machines can recognized

Physical Faxing: dedicated fax machine connected via telephone line that copies and electronically
sends files to the dialled recipient

ICT /NOTES/NOVEMBER 2020 7


Electronic Faxing/Online Faxing: Uses the internet to send documents through computers

Email
• Another method for sending text and attachments from one computer to another over a network

Advantages
• Speed of sending and receiving replies is quick
• Low cost (no stamps, paper etc.)
• Not needing to leave home to send the mail

Disadvantages
• Possibility of virus threats and hacking
• Need for the email address to be correct
• Inability to send bulky objects via emails

Web-conferencing

Video Conferencing
• This is a method of communication between people at 2 or more separate locations
• It is done in real time and makes use of LAN, if internal, or WAN if through the internet.
• Uses hardware like; webcam, microphones, speakers and monitors
• It also uses special software like CODEC converts and compresses analogue data into digital data
to send down digital lines.

How it works
• Delegates at one end speak into a microphone and look into the webcam.
• The other delegates can see them and hear them using speakers and monitors,
• However there are several problems with these as the conference call often lags and quality is not
always high.
• Also, as travelling tickets increase in price, terrorists can use this way of communicating with each
other, increasing risk.

Audio-Conferencing

 Same as video-conferencing but without webcam


 VOIP is often used
 VOIP (Voice over internet protocol) is a method used
to talk to people over internet
 VOIP converts sound (picked up by a microphone) into discrete digital packets that can be
sent to a destination via internet
• The biggest advantage is that it is free and can be used all over the world
• The biggest disadvantage is that sound quality is usually bad.

ICT /NOTES/NOVEMBER 2020 8


Security Issues
• Identity and service theft
• Viruses and malware
• Spamming (sending junk mail)
• Phishing attacks (the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam user in different ways

ICT /NOTES/NOVEMBER 2020 9

You might also like