0% found this document useful (0 votes)
174 views21 pages

Networks and The Effects of Using Them

This document provides an overview of computer networks, including their components, setup, and uses. It discusses how networks connect computers to allow sharing of resources like files, printers, and internet access. The key components that enable networking include network interface cards, cables, hubs, switches, routers, and servers. Servers provide centralized storage and services to client computers on the network. Setting up a small network requires configuring hardware like switches and wireless access points. Larger networks may involve additional hardware like bridges, proxies, firewalls, and gateways to connect multiple local networks together and to the internet. Proper use of networks provides benefits like collaboration and access to information, but also security risks that users must be aware of.

Uploaded by

Neetika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views21 pages

Networks and The Effects of Using Them

This document provides an overview of computer networks, including their components, setup, and uses. It discusses how networks connect computers to allow sharing of resources like files, printers, and internet access. The key components that enable networking include network interface cards, cables, hubs, switches, routers, and servers. Servers provide centralized storage and services to client computers on the network. Setting up a small network requires configuring hardware like switches and wireless access points. Larger networks may involve additional hardware like bridges, proxies, firewalls, and gateways to connect multiple local networks together and to the internet. Proper use of networks provides benefits like collaboration and access to information, but also security risks that users must be aware of.

Uploaded by

Neetika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Networks and the Effects of Using Them

Contents
1 Introduction........................................................................................................................................3
1.1 Uses of networks........................................................................................................................3
1.2 Advantages of using networks...................................................................................................3
1.3 Disadvantages of using networks...............................................................................................3
1.4 Points to note while using a computer connected to The Internet..............................................4
2 Networks............................................................................................................................................4
2.1 Computers in a network.............................................................................................................4
2.1.1 Client...................................................................................................................................4
2.1.2 Server..................................................................................................................................4
2.2 Network Hardware.....................................................................................................................5
2.2.1 Network Interface Card (NIC)............................................................................................5
2.2.2 Network Cable....................................................................................................................5
2.2.3 Hub......................................................................................................................................6
2.2.4 Switch..................................................................................................................................6
2.2.5 Bridge..................................................................................................................................6
2.2.6 Router..................................................................................................................................6
2.2.7 Proxy Server........................................................................................................................7
2.2.8 Firewall...............................................................................................................................8
2.2.9 Modem................................................................................................................................8
2.2.10 Gateway...........................................................................................................................9
2.3 Some Network Terminologies....................................................................................................9
2.3.1 MAC (Media Access Control) Address..............................................................................9
2.3.2 IP (Internet Protocol) Address............................................................................................9
2.3.3 Uniform Resource Locator (URL)....................................................................................10
2.4 Wi-Fi and Bluetooth.................................................................................................................10
2.4.1 Bluetooth...........................................................................................................................10
2.4.2 Wi-Fi.................................................................................................................................10
2.4.3 How to set up and configure a small network...................................................................11
2.5 Internet, Intranet, Extranet........................................................................................................12
2.6 Local Area Networks (LAN) and Wide Area Networks (WAN).............................................12
2.6.1 Local Area Networks........................................................................................................12
2.6.2 Wide Area Networks (WAN)............................................................................................13
2.6.3 Wireless LAN (WLAN)....................................................................................................14
2.7 Accessing the Internet..............................................................................................................14
3 Network Issues and Communication...............................................................................................15
1 Introduction
A network is two or more computers or other electronic devices connected together so that they can
exchange data. A network allows computers to:
 Share resources, like printer
 Share files
 Send messages to other computers on the network.

A network is typically setup using cables (wires), or via wireless signals.

NOTE: A computer that is not connected to any network is called a


standalone computer.

1.1 Uses of networks


 Make use of on-line services such as shopping (e-commerce) or banking
 Get access to a huge range of information for research
 Access different forms of entertainment (games, video, etc.)
 Join on-line communities (Instagram, Facebook, etc.)
1.2 Advantages of using networks
 Easily share files and data
 Share resources such as printers and Internet connections.
 Communicate with other network users (e mail, instant messaging, video conferencing, etc.)
 Store data centrally (using a file server) for ease of access and back up.
 Keep all of our settings (accessed using logins) centrally so we can use any workstation.
1.3 Disadvantages of using networks
 Greater risk of hackers
 Greater risk of viruses (spreading and disabling network)
 The significant cost of extra equipment
 When the network is down computers may not be able to access various functionalities, which
may render them unusable. For example, in absence of the network, one may not be able to
access files (think files stored on Google Drive), or take printouts.
 Print queues can be long
1.4 Points to note while using a computer connected to The Internet
 Be careful about revealing personal information
 Be careful to avoid suspect websites that might contain malware
 Be aware that information found on The Internet is not always accurate or reliable

2 Networks
2.1 Computers in a network
2.1.1 Client
These are normal computers that we use to get our work done. The computers that we normally use are
all clients.
2.1.2 Server
Servers are special, powerful computers that provide ‘services’ to the client computers on the network.
These services might include:
 Providing a central, common file storage area (File Server)
 Sharing hardware such as printers
 Controlling who can or can’t have access the network
 Sharing Internet connections

Servers are built to be very reliable. This means that they are much more expensive that normal
computers. In a small network one server might provide all of these services. In a larger network there
might be many servers sharing the work.
NOTE: When we use a web browser, we are in fact using a web client.
When we type in the URL of a web page, we are actually providing the
address of a Web server. For example, www.Instagram.com is the
address of the Instagram’s web server. Our web browser/client asks
this server for the web page you want, and the server ‘serves’ the
page back to the browser/client for you to see.
2.2 Network Hardware
2.2.1 Network Interface Card (NIC)
A network interface device connects a computer to a network. Most
modern computers have NIC built into their motherboard.
Some computers have two NICs, one for
wired connections and another for wireless
connections. In a laptop, wireless radio
antenna is built into the side of the screen, so
that a long bit of plastic doesn’t stick out the side of the laptop.
2.2.2 Network Cable
To connect together different devices to make up a network, one needs cables or wireless technology.
Even though wireless connections have been around for a long time now, most networks make use of
data cables to establish computer networks.
Cables are still used in most networks, rather than using only wireless, because they can carry much
more data per second, and are more secure (less open to hacking).

The most common type of network cable in use today are copper
wires encased in plastic casing. Most come with plastic plugs on the ends that snap into sockets on the
network devices. Inside the cable are several copper wires (some used for sending data in one
direction, and some for the other direction).
2.2.3 Hub
A hub is a device that
can have a number of
computers or other
resources attached to it.
They are often used to
create a local network.
(See below, does it look
like a star to you?)
Whenever a computer
sends a message (fancy
name: data packet), the hub broadcasts the message to every device connected to the network. It is a
‘dumb’ device. It is not very secure. It is more or less rendered obsolete by newer, better hardware.
2.2.4 Switch
A switch is like a hub in that, it is a device that can
have a number of computers or other resources attached to
it to create a local network. It is more ‘intelligent’ than a
hub. It checks the data packet for the destination
address (MAC Address) and sends it only to the intended
device. It is more secure than a hub.

2.2.5 Bridge
A bridge is a device that connects two different local networks together, so that they behave as a single
local network.

2.2.6 Router
A router is a device that connects two or more different networks together. It is typically used to
connect a local network to the Internet or a larger network.
The router will typically have the Internet cable plugged into it, as well as a cable, or cables to
computers on the local network. Alternatively, the LAN connection might be wireless (WiFi), making
the device a wireless router. (A wireless router is actually a router and wireless switch combined)
When a message (data packet) arrives at a router, it inspects the data packet for its address (IP
Address). Since all the computers on the same network have the same IP Address, router can send the
data packet to the appropriate switch. The Switch then uses the MAC address to deliver the data packet
to destination computer. If MAC address doesn’t match, it passes on to another switch until the
appropriate switch is found.
2.2.7 Proxy Server
A proxy server is a computer
setup to share a resource,
usually an Internet
connection.
Other computers can request
a web page via the proxy
server. The proxy server will
then get the page using its
Internet connection, and pass
it back to the computer who
asked for it.
Proxy servers are often used
instead of router since additional
software can be easily installed on
the computer such as anti-virus,
web filtering etc.
2.2.8 Firewall
A firewall is a device, or a piece
of software that is placed between
your computer and the rest of the
network (where the hackers are!)
If you wish to protect your whole LAN from hackers out on the Internet, you would place a
firewall between the LAN and the Internet connection.
A firewall blocks
unauthorised
connections being made
to your computer or LAN.
Normal data is allowed
through the firewall (e.g.
e-mails or web pages) but
all other data is blocked.
NOTE: While there
are physical
firewall devices, for common uses, a software firewall suffices.
2.2.9 Modem
Internet is a vast network of different types of networks. Our computers access the internet over
telephone lines. Telephone lines carry analogue signals. This, however, presents a problem. Computers
work on digital signals, and need some devices to convert every analogue signal input into digital
signals. Modem is such a device for the internet.
Modem means Modulator demodulator. It is a device that converts computer’s digital signals into
analogue signals to travel over telephone lines. Conversely, it also converts analogue signals from
telephone lines to computer usable digital signals. These processes are called modulation and
demodulation respectively.

Dial UP Modem ADSL (Asymmetric Digital Subscriber Line) Modem


Speed: 60 Kbps Speed: 100 Mbps (with fibre optics cables)
20 Mbps (with old copper cables)
Tie up line while accessing internet. Do not tie up the line while accessing internet.
Can’t make a phone call.
Called asymmetric as the modem is faster at downloading data
than is it at uploading data.

2.2.10 Gateway
A gateway is a network point or node in a computer network, a key stopping point for data on its way
to or from other networks. Thanks to gateways, we are able to communicate and send data back and
forth.
A node is a physical place (a computer or a modem or a router), where the data stops for either
transporting or reading/using. Here are a few node notes:
 On the Internet, the node that's a stopping point can be a gateway or a host node.
 A computer that controls the traffic your Internet Service Provider (ISP) receives is a node.
If you have a wireless network at home that gives your entire family access to the Internet, your
gateway is the modem (or modem-router combo) your ISP provides so you can connect to their
network.

2.3 Some Network Terminologies


2.3.1 MAC (Media Access Control) Address
Each device or computer on a network has its own MAC address. This address uniquely identifies that
device over the network. Data packets sent to the network switch will have MAC address identifying
the source and the recipient(s) of the data packet.
2.3.2 IP (Internet Protocol) Address
IP is the address given to each device/network directly connected to the Internet. It is a 32-bit number
which is usually written like (192.128.1.1).
Devices within a local network that connect to the internet via a router, or any other gateway, share
one IP address. Our home computers are assigned a temporary IP address when our computer is
connected to the internet. Web servers however, have an unchanging (static) IP address.
NOTE: The IP address gives the location of a device connected to the
internet, while the MAC address uniquely identifies a device on the
internet. IP address can be thought of as your home address and MAC
address can be thought of as a way to uniquely identify each member
of the household. So, when you move houses, the address (IP address)
will change by the house members (MAC address) remains the same.
2.3.3 Uniform Resource Locator (URL)
A URL address, allow the access to a specific resource on a web server. It’s often a domain name
followed by the page name. For example, https://en.wikipedia.org/wiki/URL.

2.4 Wi-Fi and Bluetooth


Wi-Fi and Bluetooth are wireless connection technologies. They both use radio waves to transfer data
over short distances.
2.4.1 Bluetooth
Because Bluetooth uses radio waves, unlike a remote control (that uses infrared rays), there is no need
for a clear line of sight to connect two devices using Bluetooth.
Bluetooth sends and receives radio waves in a band of 79 frequencies. Each of which is called a
channel. They are centred around frequency 2.45GHz.
Bluetooth devices autodetect each other, and communicate with each other on a channel randomly
chosen. In case that channel is being used, they randomly choose another frequency. This is called
spectrum to spectrum hopping. While the devices are communicating, they constantly change the
channel they are using.
Bluetooth is useful to transfer data when:
1. devices are close together.
2. data transfer speed is not critical, like while transferring a file from mobile to laptop.
3. low bandwidth applications are being used, like a wireless headphone.
2.4.2 Wi-Fi
Wi-Fi is a wireless networking technology that allows devices like computers (laptops and desktops),
mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to
interface with the Internet. It also allows these devices to exchange information with one another,
creating a network.
A wireless transmitter is connected to a network (in case of internet, it is connected to broadband). It
uses pre-existing rules of data transmission (Wireless Access Protocol-WAP) to transmit data in form
of radio signals.
A device receives these radio signals via a wireless adapter, which acts as an ADC and converts these
analog signals to digital signal. While transmitting data, reverse is also true.
Wi-Fi offers high speed, security and better range than Bluetooth. A device can access internet at any
access point (or hotspot) up to 100 m away.
Bluetooth Wi-Fi
1 Bluetooth was thus named for Dutch king Wi-Fi is a brand name created by a marketing
Harald Bluetooth. Idea being, it unites PC firm, Interbrand that’s meant to serve as an
to other devices, like the king united interoperability seal for marketing efforts. It is
Scandinavia. sometimes mistaken for Wireless Fidelity.
2 It requires Bluetooth adapter on all It requires wireless adapter on all devices and
devices for connectivity. wireless router for connectivity.
3 It consumes low power. It consumes high power.
4 Less secure in comparison to Wi-Fi. Provides better security than Bluetooth.
5 It is less flexible. A max of 7 devices can Wi-fi supports a large number of users
be connected. depending on the router used.
6 It transmits over frequencies centered Wi-Fi transmits over frequencies 2.4, 3.6 and
around 2.45 GHz. 5.0GHz.
7 Data transfer rate Data transfer rate
25Megabits/second (25Mbps) or 250Megabits/second (250Mbps) or
~3.1Megabytes/second (3.1MBps) ~31Megabytes/second (31MBps)
8 Its radio signal range is 10m – 30m. In Wi-Fi, this range is 100m.
9 Bluetooth require low bandwidth. Wi-Fi requires high bandwidth.
10 Uses key matching encryption for Uses WEP (Wireless Equivalent privacy) and
security. WPA (Wi-Fi protected access) for security.

2.4.3 How to set up and configure a small network


Hardware and software to buy:
 Switches, Hubs and any other devices needed to link everything together in the network
 Data cables
 If a connection to internet is required, a router is also needed.
 A firewall (either software or hardware)
 Servers to manage security, store common software and files etc.
Other things to consider:
 Setting up IP address if internet access is required.
 Buying the devices to allow wireless connectivity, and setting them up.
 Configuring all the hardware and software so they work together properly.
 If internet is required, then ensuring a high-speed broadband connection exists
 Installing all the common software (apps) on a server and ensuring all the required licenses are
in place to allow users to access software in a network.
 Setting up privileges for different users (administrator, users etc). This allows users to access
parts of common area and their personal area on the network
 Setting up network manager level of privilege so that they can monitor network usage, change
passwords etc.
2.5 Internet, Intranet, Extranet

 Intranet is shared content accessed by members within a single organization.


 Extranet is shared content accessed by groups through cross-enterprise boundaries.
 Internet is global communication accessed through the Web.
The Internet, extranets, and intranets all rely on the same network technologies (TCP/IP).
However, they are different in terms of the levels of access they allow to various users inside
and outside the organization and the size of the network.
An intranet allows for restricted access to only members of an organization;
an extranet expands that access by allowing non-members such as suppliers and customers to
use company resources.
The difference between the Internet and extranets is that while the extranet allows limited
access to non-members of an organization, the Internet generally allows everyone to access all
network resources.
2.6 Local Area Networks (LAN) and Wide Area Networks (WAN)
2.6.1 Local Area Networks
Usually networks within a building (or small geographical location) constitute a LAN.
A LAN typically consists of several computers, and other devices (like printer) connected to hubs or
switches. One of the hubs is usually connected to a router and a modem, in case internet connectivity is
required.
Advantages
 Resource sharing
 Ease of communication between users
 A network administrator to control all aspects of network (Changing password, granting access
to resources, monitoring network usage)
Disadvantages
 Spread of viruses across the network
 Highly coveted resource like printer may end up with long queues
 Slower access to external resources like the internet.
 Increased security risk vis a vis a standalone computer
 If the main server breaks down, in most cases, the network won’t function.
2.6.2 Wide Area Networks (WAN)
A wide-area network (WAN) is a collection of local-area networks (LANs) or other networks that
communicate with one another. 
A WAN is essentially a network of networks, so Internet is the world’s largest WAN. Other than the
internet, banks, railways, defence forces, governments and large multinational corporations, all use
WANs.
WANs are spreads across large geographical areas. They may use public lines, or dedicated lines for
more security.
A typical WAN may consist of end systems and intermediate systems.
2.6.3 Wireless LAN (WLAN)
Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio waves instead
of cables for connecting the devices within a limited area forming LAN. Users connected by wireless
LANs can move around within this limited area such as home, school, campus, office building, railway
platform, etc.
Access points are connected to the wired network at fixed locations. Computers then connect to these
access points to connect to the network. APs may use either of the two methods to connect the devices
to the network:
1. Wideband radio frequency: spread spectrum technology: range – 30-50m
2. Infrared signals: range – 1-2m

Advantages
 Resource sharing without being tethered to a fixed location
 Less mess of cables, increased flexibility.
 Adding new computers is very easy, as only minimal extra cabling and WLAN adapter are
required.
Disadvantages
 Security is an issue, an unauthorised device may connect to an AP.
 Interference may disturb the signal.
 Data transfer rate is slower than wired LAN.
2.7 Accessing the Internet
Advantages and disadvantages of using a mobile phone to access the internet
Advantages Disadvantages
Portable, can be used anywhere as long as In absence of Wi-Fi hotspot, it may be expensive
network signal is available. to access internet using a mobile phone.
A person is more likely to have a mobile phone Display on mobile phones is smaller than other
at all times, rather than a laptop devices.
It is easier to use a mobile phone while on the Keyboard on mobile phones is very small and
move. provides no sensory feedback (other than
vibrations.)
Not all websites are mobile friendly.
Wireless signals are less reliable and slower than
wired signals
Advantages and disadvantages of using a laptop to access the internet

Advantages Disadvantages
More portable than a desktop Not as portable as a mobile
Laptop keypads are much easier and faster to use More prone to wear and tear.
than a mobile
Advantages and disadvantages of using a desktop to access the internet

Advantages Disadvantages
Tend to have powerful processors, so the speed Not portable due to all its parts
is fast.
Usually have stable internet connection as it is May require dongles to access wireless network
wired.
All web pages are accessible on desktop
Use of full-size keyboard, mouse and other
peripherals make is easy to use.

3 Network Issues and Communication


3.1 Network Security
Should internet be policed?
Currently, there is no governing body for the internet. However, there are several arguments to make
the case either way.
Yes, because:
 It would prevent illegal material (drugs, terrorists’ activities etc) from being posted online.
 It would block people from accessing such information that would have serious/grievous real-
world consequences. Using a search engine to find how to make a bomb is much easier than
looking for such information in a book.
 It would prevent minors from accessing/coming across information that they shouldn’t
 It would help stop spread of misinformation.
No, because:
 Material published online is already available in real world.
 It would be very expensive to police the internet.
 It would be difficult to enforce rules on a global scale, due to the enormity of the task as well as
differences in various cultures.
 Policing hinders freedom of expression and right to information
 Each country already has rules to deal with those who post illegal/wrong information.

New type of Social Divide: Advent of internet has resulted in a new social divide – digital divide. It
is the division between people who are computer literate and who aren’t. With rapid progress in the
field. This divide is growing larger at a rapid rate.
Inappropriate Sites and accuracy of information

Given that internet is now all pervasive, it is best to be prudent while searching for information online.
One must spend time to look for reliable information while searching via a search engine. Main
aspects to consider are: Reliability of information, undesirability of certain websites, and security
issues.

Reliability of Information
 It is easier to find information online rather than books.
 Information online tends to be more up to date than in books.
 It is easier to access vast amount of information online instead of accessing several books.
 There’s a high chance of coming across incorrect information online. Books go through a
thorough vetting process which may be missing online.
 One may face information overload online. It may become difficult to find relevant
information.

Undesirability of Certain Websites


 One may stumble upon undesirable websites
 One may end up visiting websites that are disingenuous intentionally or otherwise.
 There are several security risks involved with unregulated websites.

Security Issues
Passwords are the go-to tool on the internet to secure one’s account. We need passwords for almost
every website from social media to bank to corporates. There are a few points to note for passwords:
 Don’t use one password across platforms
 Don’t use personal information to create a password.
 Make sure your password has a healthy mix of capital letters, numbers, special characters and
small letters.
 Change your passwords regularly
 Don’t write down the passwords in a place easily accessible to others
 Run anti-spyware on the computer regularly to ensure that your passwords are not being
snooped upon.
3.2 Authentication
Authentication refers to verification data source. User IDs and passwords are used to authenticate
users. Others authentication techniques may be:
 Digital certificates
 Biometrics
 Magnetic strip cards/ID cards
 Contactless cards
 Passports (photograph, hologram, embedded RFID tag)
What happens when somebody approaches passport control at an airport?
Passport page containing the photograph is is placed face down on a
reader

A microchip embedded in the page is read, and photograph is


scanned.

A photograph of the passport holder is taken

Photograph is then converted to appropriate digital format to -


compared to the one in the scanned page.

The data readf rom the microchip is compared to the data stored in
the database.

3.3 Viruses
Viruses are computer programs that are attached to another program (such as a document). They can
replicate and spread after an initial execution on a target system where human interaction is required.
Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.
Antiviruses are the software that scan the system periodically (generally once a week with moderate
use) for presence of viruses. An antivirus may also be set to scan any incoming file (via internet
downloads or secondary storage devices.). They then delete or quarantine the suspicious files.
Viruses while browsing internet: One way to prevent virus attacks is to access only trustworthy sites.
Looks for https in the URL, and a padlock in the address bar. These are indicators that the website is
trustworthy. Also, when accessing new websites by clicking on links provided in email, or messages,
instead of clicking on them directly, copy the hyperlink and paste before you access it. This will allow
you to check the URL before accessing it.
Viruses from hardware devices: Always scan a hardware device that you connect to your computer.
3.4 Data Protection
Every country has its own data protection laws. Following are the points that a data protection act must
cover
 Data must be fairly and lawfully processed
 Data can only be processed for a stated purpose
 Data must be adequate, and relevant, not excessive
 Data must be accurate
 Data must not be kept for longer than necessary
 Data must be processed in accordance to data subject’s rights.
 Data must be kept secure.
 Data must not be transferred to another country unless they also have adequate data protection
There are certain precautions that individuals can take to safeguard themselves:
 Don’t leave personal information lying about unattended.
 Secure your physical files, under lock and key
 Keep computer monitor locked when you need to leave your computer on and unattended for
any length of time.
 Use user id and password, and change your password regularly.
 Make sure sensitive information is sent via a channel built for such information, and not email
or SMS.
3.5 Network Communication
3.5.1 Faxes
There are two ways to send a fax: a physical fax, where a dedicated
fax machine is attached to the phone line and is used to send fax to
the target fax machine; an electronic fax, that requires internet
to send the fax electronically.
A physical fax machine is connected to the phone line. One inserts a
paper in the machine which is scanned and transmitted via phone
line. This fax is received by destination fax machine that prints a
copy of the document.
Sending fax this way can be slow.
It keeps the phone line busy so,
while the operation is underway,
no other fax can be sent or
received.
In case of electronic fax, an email
is sent to an eFax number, once
that is received, the fax is printed
and an acknowledgement is sent to
the sender.

3.5.2 Electronic mail


Emails can be sent to and received
from any device connected to internet. For sending an email, one requires an account with an ISP
(internet service provider), and the recipient’s email address. Once sent, receiver can log in to their
email account and access their emails.
Traditional Fax Emails
Fairly easy to intercept a fax. Normally, a fax Emails are delivered to the recipient’s inbox.
machine is a shared resource in an office,
anybody can take the printed fax and leave.
Signatures on faxes are accepted in a court of Eliminates the need to print documents
law.
Quality of printed documents is poor Quality of documents is maintained.
If telephone line is busy, there may be delay is Document received may be edited, or copied.
sending the fax
It is a slow process. Documents can be sent from and received at any
devices connected to the internet
It is easier to send an email to multiple recipients
at the same time.
People are more likely to have access to email
than a fax machine.
3.5.3 Video Conferencing
Video conferencing is a communication method that uses both audio and video. It happens in real time.
One need following basic hardware for video conferencing:
 Webcam
 Monitors
 Microphone
 Speakers

Additionally, one also needs following software


 Webcam and microphone software drivers: the computer needs to have a software driver to
access any hardware device. Consequently, webcam and microphone drivers are essential for
accessing the hardware.
 CODEC: Coder-DECoder- it is used to encode or decode the message in order to transmit or
receive the data. Compression - DECompression – It is used to compress and decompress data
for efficient transmission

Points to note while video conferencing:


 Previously agreed upon data and time.
 Login to the video conferencing system
 Hardware must be checked beforehand
 Microphone must be placed centrally, or each delegate provided with their own microphones in
order to be heard.
 One person is made the contact person in each conference room who makes sure the video
conference is conducted properly.

Advantages
 No travel required.
 Saves time and cost
 No need to travel with sensitive documents
 No need to travel to potentially unsafe locations
 Easier access to experts
 Possible to hold a conference at a short notice.
 No need to share stationery/devices

Potential Issues
 Potential time lag
 Poor internet connection may affect the video quality.
 High Initial cost
 May require training delegates
 Different time zones
 If the main incentive of a job is international travel, video conferencing may be demotivating.
3.5.4 Audio Conferencing
Audio conferencing uses audio. People may use phones, or computers for audio conferencing. Audio
conferences held over the internet use VoIP (Voice over Internet Protocol)
3.5.5 Web Conferencing (Webinar)
Web conferences use internet to hold conference. Multiple computers are used in a webinar. It is
carried out in real time. Webinars find utility in education, corporate meetings, presentations etc.
Organiser of a webinar provides the participants link to the webinar. At the pre decided time, the
participants access the webinar using the URL provided already. Organiser may have to allow
participants to join, or they may be able to join automatically. Organiser may decide who is allowed to
speak.

You might also like