ICT IGCSE Chap 4 - Network
ICT IGCSE Chap 4 - Network
Section 1 – Chapter 4
2
3
Network Fundmental
▸ Computer network: group of computers connected by network device
▸ Data packet: Data is moved around networks in the form of data packets
Play
Hub
Router
Switch
Wireless NIC
NIC Modem 5
Types of the networks
LAN (Local area network) : A collection of
computers connected within one building
Use: hub/switch/NIC
Ex: house/office
NIC type
wired wireless
8
Hub Play
Sender Address
MAC: B1
Receiver Address
MAC: B2
Message
▸ Hub: is a network device that connect number of computers together to form a LAN in the same building
▸ Hub is dumb device
▸ Hub send data by broadcasting the packets to all computers in the network
▸ Flood the network with unnecessary packets that slow the network(one to many)
▸ Not secure
9
Bridage Sender Address
MAC: B1
Receiver Address
MAC: B2
Message
10
Switch
Sender Address Receiver Address
Message
MAC: 001 MAC: 003
▸ Switch: is a network device that connect number of computers together to form a LAN
▸ Switch is a smart device, it sends the packet only to the destination computer
▸ switch inspects incoming packet based on destination MAC address
And forward the packet to the destination computer.
▸ Secure and more efficient, do not waste bandwidth
▸ Switch learns which devices are connected to which ports
11
conclusion
hubs and switches are used to exchange data within their own local area networks.
They are unable to exchange data with outside networks (such as the internet).
To exchange data outside their own LAN, a device needs to be able to read an IP
address.
we need another device to allow communication with external networks. What is it?
12
2-Network devices for WAN
▸ WAN is two LAN or more are connected by router and there is a large distance
between them (several kilometers).
▸ Example: Companies / Bank with multi branches/ Internet
Router Modem
13
Router Sender MAC Receiver MAC
Sender IP
192.168.0.1
Receiver IP
172.116.5.36
Message
▸ Router :enable data packets to be routed between different LAN based on destination IP
address, for example to join a LAN to a Wide Area network (WAN) {ex: internet}
▸ Router receives a packet of data, it checks the destination IP address against the stored
routing table, which allows the router to determine the packet’s next step in the path
▸ Router connects a LAN with the internet
Modem Modem
Router Router
LAN
LAN
Branch: USA
Branch: Malaysia 14
Modem Play
Modem convert analogue signal (telephone line) to digital signal (computer network) and vise versa
15
Wireless home network connected to internet by Route/modem
16
Network devices for
Play
Wireless NIC
17
Bluetooth
▸ Bluetooth is a wireless networking technology designed for very short-range
connections (Very slow data transfer speeds)
➢ Connect 2 devices (pairing).
18
Play
Play
19
4.3 Cloud storage (Cloud computing)
▸ Cloud storage: storing data in a remote physical location called server (Online storage platform)
▸ Files can be accessed from any device with an internet connection.
Advantage:
-Backup
-Share files
-Access anywhere
Disadvantage:
-Security issue: hacker
-No Data access:
-Internet connection is not
Present
- Loss Username or
password
20
Past paper
21
Past paper
22
23
Past paper
24
Answer
25
4.4 Network environments
Network environments
26
Internet , Intranet, Extranet
▸ Internet stand for International Network (public network )
▸ Internet: is a computer network that spans the globe (WAN).
▸ Services: World wide web (WWW): it consists of massive webpages
▸ Extranet : it is allow the intranet to be extended outside the organizations (Bank Branches)
▸ Allow the employee to access the Intranet from outside by remote connection VPN
(username/password)
27
Differences and similarities between
Internet, Intranet and Extranet
Similarities
Services web access, email, file transfer
connection Require connection to servers
Network type LAN or WAN
Differences
Features Internet Intranet Extranet
ISP connection need No need Need
Network Public Private Private
Encryption Required Not required required
28
4.6 Network issue and communication
Network Issue
29
A- Security of data transfer
▸ To ensure the packet travel from user computer to destination (website) without losing data or
stolen by hacker.
▸ Web browser uses secure connection via HTTPS protocol to encrypt the data before sending to
the internet.
Data
30
B-Authentication techniques (1-Password)
▸ Authentication technique is a process to validate an identity , it used to ensure only
authorized users are able gain access to a Network via User Names/Passwords, BiometricsPlay
▸ 1-Password is a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked.
▸ Password should be strong . it should be a combination of:
1. Capital letter and small letter ASDasd
2. Numbers 54214
3. Symbols $%#&/;
▸ Example: Gm2K;iS$/8
▸ Note:
▸ The hacker can be pretend of you, so Password does not represent the identity of the
person (account owner), we need more secure method (biometric)
▸ 2-Electronic Tokens: (two authentication factors)
▸ Allow the user to authenticate to the system by enter a PIN
number (passcode) that was generated and send it to the
user’s mobile as SMS message.
▸ Used in: websites (google, facebook .. Etc), Bank system
33
▸ 7-Physical Tokens: (Access control – RFID)
▸ The token stored the passcode
▸ Allow the user to authenticate to the system by touching
the token to the numeric device or enter the passcode in
the numeric keypad
▸ The device is connected to network server to match the
passcode for authentication process.
34
Anti malware –Anti virus
▸ Malware (malicious software) is intrusive software that is designed to damage and destroy
computers and computer systems
▸ Examples of common malware : viruses, worms, Trojan, spyware, adware, and ransomware
▸ Virus: It a software code which can install and replicate itself on computer/network
system. It spreads by reproducing and inserting themselves into programs, documents, or
e-mail attachments
▸ Effect:
▸ Delete / corrupt user files or system files (system crash)
▸ Replicate itself that make computer slow / crash / malfunction
▸ Stop services (printer, browsing internet, system function)
▸ Protection:
▸ Use Anti-virus/Anti-Malware software
▸ Don’t install software/ email attachment from unknown resources
35
4.6.5 Network communication – Video conference Play
Play
• Video conferencing is a communication method that uses both video and sound using
an internet connection.
• It can be used to have business meeting when people are in different locations.
• Video encoder
37
Network communication – web conference Play
• web conferencing use software in computer with internet connection to make conference
with other side like zoom, team,wbinar
• Quit similar to video conference
Used for:
• Online presentation
• Online education or training
Network communication – web conference
39
Audio conference (Phone conference) Play
Audio conferencing refers to meetings held between people using audio (sound)
Equipment (telephone) but can not see them.
• Audio conference can be done over the telephone network or using a computer
network making use of VOIP.
• The drawback: sound quality
Audi conference
VoIP
Telephone network
Computer network/internet
Audio conference – using VoIP (computer network/internet)
IP 192.168.0.1
IP 192.168.0.2
Computer network
Or IP 192.168.0.3
Internet
digital
IP 192.168.0.4
digital
IP 192.168.0.4
Appendix
42
IP address (ID)
▸ IP address : Internet Protocol Address ex: 192.168.1.100
▸ IP: identify the location of the computer in the network/ internet {unique address}
▸ Packet frame: hold the ID (MAC,IP) address and message
192.168.1.50
Network ID PC ID
1-254
43
Compare between hub and switch
▸ Similarities
▸ both a hub and a switch are used to connect devices in a LAN
▸ » both hubs and switches use data packets
▸ differences
▸ hubs send data packets to every device on the network;
whereas switches send data packets to a specific device only
▸ security is lower with hubs than with switches
▸ a switch uses a look-up table to determine the destination
device
▸ switches use MAC addresses to locate the destination device.
44
1-LAN (Local Area Network)
LAN :number of computers and devices (for example, printers) are connected to hubs / switches
by Ethernet cable within one building
47
WAN Example (company with branches)
Router
Modem
Modem
Router
LAN
Branch: USA
LAN
Branch: Malaysia
48
The purpose of the Router:
• Connects a LAN to a WAN / LAN
• Allows devices to connect to the internet
• Forwards data packets
• Sends/receives data packets
Switch Switch
Router
Router
49
WLAN (Wireless Local Area Network)
WLAN (Wireless LAN) :number of computers and Wi-Fi-enabled devices are wirelessly (Wi-Fi)
connected by Access Point within one building
Example: Home/office/campus
Uses: to access internet /WLAN
Wireless
Access Point
50
Setting up the WLAN (home network with internet)
(home)
Modem
1. Purchase the hardware Router
2. Install wireless network cards IP: 192.168.0.1
3. Purchase a Access point
4. Purchase a Router/modem
5. Allocate/set IP addresses
6. Subscribe to Internet from ISP ISP/Internet
7. Purchase the software /antivirus
Wireless
Access Point
IP: 192.168.0.2 IP: 192.168.0.3 IP: 192.168.0.4 IP: 192.168.0.5 IP: 192.168.0.6 51
Bluetooth
▸ How computers can use Bluetooth to connect to a device
▸ Computer’s Bluetooth searches for the other devices using radio wave
▸ Devices automatically detect and connect to each other
▸ Pairs the two devices, Ready to send/receive information
▸ Used for low-bandwidth applications, e.g. streaming music
▸ Note:
▸ Used for short distances
▸ Used when the speed of transmission is not critical
▸ Bluetooth can be used to create a secure Wireless Personal Area Network
52
General Internet Terms
Internet Terms
▸ HTTP: Hyper Text Transfer Protocol : is a set of rules agreed by the sender (user/web browser) and
recipient (web site) when (data / web pages) is being transferred between devices.
▸ HTTPS: Hyper Text Transfer Protocol Secure : send encrypted data over secure connection SSL.
HTTP
http://domain-name Carry Plain text from .. To..
Web browser
GMiS
HTTPS
Carry SSL encryption data
https://domain-name 53
Router
Router Router
Internet
Connection
Switch
54
55
3- Extranet (External Restricted Access Network)
56
Audio conference (Phone conference)
Audi conference
VoIP
Telephone network
Computer network/internet
Audio conference – using telephone network (analogue)
Analogue
Analogue Phone No: 03254161