0% found this document useful (0 votes)
60 views60 pages

ICT IGCSE Chap 4 - Network

ICT IGCSE Chap 4- Network

Uploaded by

gmis.nageeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views60 pages

ICT IGCSE Chap 4 - Network

ICT IGCSE Chap 4- Network

Uploaded by

gmis.nageeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Networks and the effects of using them

Section 1 – Chapter 4

By: Nageeb Yahya


You will learn
▹ Computer Network fundamentals
▹ Network devices such as routers, hubs and switches
▹ IP and MAC addresses
▹ Wi-Fi and Bluetooth
▹ How to set up and configure a small network
▹ intranets and extranets
▹ LAN, WAN and WLAN
▹ Network security
▹ Authentication
▹ Viruses
▹ Video, audio and web conferencing

2
3
Network Fundmental
▸ Computer network: group of computers connected by network device
▸ Data packet: Data is moved around networks in the form of data packets

Play ID: MAC address: 42.52.35.44.21


IP address : 192.168.1.5
Play

Play

Network ID (MAC/IP address)


MAC address (Physical address) : identity computer on Local network
MAC is provided by the chip maker ID: MAC address: 56.54.66.75.61
IP address : 192.168.1.6
IP address (Internet Protocol -Logical address) : identity computer on the internet
IP address is the identifier of the computer globally / user set IP address
4
Types of the networks Play

LAN WLAN WAN

WIRED NETWORK WIRELESS NETWORK

Wi-Fi Access Point

Hub
Router
Switch
Wireless NIC
NIC Modem 5
Types of the networks
LAN (Local area network) : A collection of
computers connected within one building
Use: hub/switch/NIC
Ex: house/office

WLAN: A collection of computers


connected wirelessly within one building
Use: WIFI Access point / WIRELESS NIC
Ex: house/office

WAN (Wide area network): A collection of


Networks connected across countries.
Use: router/Modem
Ex: internet/offices between countries
6
1-Network devices for LAN (wired network)

Ethernet cable NIC Hub Switch


7
NIC ( Network Interface Card)
NIC is a network device that used to connect individual computers to network.
MAC address stored in NIC card (ROM chip)

NIC type

wired wireless

8
Hub Play
Sender Address
MAC: B1
Receiver Address
MAC: B2
Message

▸ Hub: is a network device that connect number of computers together to form a LAN in the same building
▸ Hub is dumb device
▸ Hub send data by broadcasting the packets to all computers in the network
▸ Flood the network with unnecessary packets that slow the network(one to many)
▸ Not secure

9
Bridage Sender Address
MAC: B1
Receiver Address
MAC: B2
Message

▸ The bridge comes to reduce the broadcasting problem in hub


▸ A network bridge is a device that divides a network into segments (two LAN).
▸ Bridge inspects incoming packet based on destination MAC address. If the destination is on
another segment, it forwards the packet to that segment
▸ Reduce packets broadcasting from hub.
▸ network device that connects a LAN to another LAN using the same protocol

10
Switch
Sender Address Receiver Address
Message
MAC: 001 MAC: 003

▸ Switch: is a network device that connect number of computers together to form a LAN
▸ Switch is a smart device, it sends the packet only to the destination computer
▸ switch inspects incoming packet based on destination MAC address
And forward the packet to the destination computer.
▸ Secure and more efficient, do not waste bandwidth
▸ Switch learns which devices are connected to which ports

11
conclusion

hubs and switches are used to exchange data within their own local area networks.
They are unable to exchange data with outside networks (such as the internet).

To exchange data outside their own LAN, a device needs to be able to read an IP
address.
we need another device to allow communication with external networks. What is it?

12
2-Network devices for WAN
▸ WAN is two LAN or more are connected by router and there is a large distance
between them (several kilometers).
▸ Example: Companies / Bank with multi branches/ Internet

Router Modem

13
Router Sender MAC Receiver MAC
Sender IP
192.168.0.1
Receiver IP
172.116.5.36
Message

▸ Router :enable data packets to be routed between different LAN based on destination IP
address, for example to join a LAN to a Wide Area network (WAN) {ex: internet}
▸ Router receives a packet of data, it checks the destination IP address against the stored
routing table, which allows the router to determine the packet’s next step in the path
▸ Router connects a LAN with the internet
Modem Modem

Router Router

LAN
LAN
Branch: USA
Branch: Malaysia 14
Modem Play

Modem convert analogue signal (telephone line) to digital signal (computer network) and vise versa

Bring internet to your home/office

15
Wireless home network connected to internet by Route/modem

16
Network devices for
Play

WLAN (Wireless Local Area Network)


WLAN (Wireless LAN) :number of computers and Wi-Fi-enabled devices are wirelessly (Wi-Fi)
connected by Access Point within one building

Devices: Wireless Access Point/Wireless NIC


Example: Home/office/campus
Uses: to access internet /WLAN Wireless
Access Point

Wireless NIC
17
Bluetooth
▸ Bluetooth is a wireless networking technology designed for very short-range
connections (Very slow data transfer speeds)
➢ Connect 2 devices (pairing).

▸ Example : mouse, smartphone, headset, TV, Speaker.

18
Play

Play

19
4.3 Cloud storage (Cloud computing)
▸ Cloud storage: storing data in a remote physical location called server (Online storage platform)
▸ Files can be accessed from any device with an internet connection.

Advantage:
-Backup
-Share files
-Access anywhere

Disadvantage:
-Security issue: hacker
-No Data access:
-Internet connection is not
Present
- Loss Username or
password

20
Past paper

21
Past paper

22
23
Past paper

24
Answer

25
4.4 Network environments

Network environments

Internet Intranet Extranet

Public Network Private Network Private Network

26
Internet , Intranet, Extranet
▸ Internet stand for International Network (public network )
▸ Internet: is a computer network that spans the globe (WAN).
▸ Services: World wide web (WWW): it consists of massive webpages

▸ Intranet stand for Internal restricted access network (private network)


▸ Intranet : is a computer network (LAN).It is a small image of internet within single organization
or company (all services of internet working locally). Can only accessed locally by authorized
users (Employee) (Username/password).
▸ Example: hospital, school, small medium business, bank

▸ Extranet : it is allow the intranet to be extended outside the organizations (Bank Branches)
▸ Allow the employee to access the Intranet from outside by remote connection VPN
(username/password)
27
Differences and similarities between
Internet, Intranet and Extranet
Similarities
Services web access, email, file transfer
connection Require connection to servers
Network type LAN or WAN

Differences
Features Internet Intranet Extranet
ISP connection need No need Need
Network Public Private Private
Encryption Required Not required required

28
4.6 Network issue and communication
Network Issue

Network security Network Communication

Video Web Audio


Data security Authentication Anti-Malware
conference conference conference

29
A- Security of data transfer
▸ To ensure the packet travel from user computer to destination (website) without losing data or
stolen by hacker.
▸ Web browser uses secure connection via HTTPS protocol to encrypt the data before sending to
the internet.

Data

30
B-Authentication techniques (1-Password)
▸ Authentication technique is a process to validate an identity , it used to ensure only
authorized users are able gain access to a Network via User Names/Passwords, BiometricsPlay

▸ 1-Password is a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked.
▸ Password should be strong . it should be a combination of:
1. Capital letter and small letter ASDasd
2. Numbers 54214
3. Symbols $%#&/;
▸ Example: Gm2K;iS$/8
▸ Note:
▸ The hacker can be pretend of you, so Password does not represent the identity of the
person (account owner), we need more secure method (biometric)
▸ 2-Electronic Tokens: (two authentication factors)
▸ Allow the user to authenticate to the system by enter a PIN
number (passcode) that was generated and send it to the
user’s mobile as SMS message.
▸ Used in: websites (google, facebook .. Etc), Bank system

▸ 3-Zero login (Passwordless): new authentication


technologies (2018)
▸ It recognize users on the basis of their behaviors (ID)
▸ will allow people to log into websites without a password
▸ our devices and applications being smart enough to
‘recognize’ a particular user without requiring any
passwords or codes.
▸ what if your devices were smart enough to recognize you
instantly and provide a secure, personalized experience
based on trusted information, with no password needed
32
▸ 4-Biometrics is a method of authentication. It relies on unique Play
characteristics of human beings
▸ Biometrics data is difficult to copy and requires the user to be present
▸ Use: smartphone / bank account / secure door

▸ 5-Magnetic strip card: (password is stored)


▸ Gain access to the system by swiping the card to the reader
▸ The system match the data stored in the card for authentication.
▸ Use: hotel room/ EFTPOS (electronic fund transfer POS)

▸ 6-Smart card (Chip and PIN): (password not stored)


▸ Gain access to the system by entering the PIN Number
▸ Use: EFTPOS

33
▸ 7-Physical Tokens: (Access control – RFID)
▸ The token stored the passcode
▸ Allow the user to authenticate to the system by touching
the token to the numeric device or enter the passcode in
the numeric keypad
▸ The device is connected to network server to match the
passcode for authentication process.

34
Anti malware –Anti virus
▸ Malware (malicious software) is intrusive software that is designed to damage and destroy
computers and computer systems
▸ Examples of common malware : viruses, worms, Trojan, spyware, adware, and ransomware

▸ Virus: It a software code which can install and replicate itself on computer/network
system. It spreads by reproducing and inserting themselves into programs, documents, or
e-mail attachments
▸ Effect:
▸ Delete / corrupt user files or system files (system crash)
▸ Replicate itself that make computer slow / crash / malfunction
▸ Stop services (printer, browsing internet, system function)

▸ Protection:
▸ Use Anti-virus/Anti-Malware software
▸ Don’t install software/ email attachment from unknown resources
35
4.6.5 Network communication – Video conference Play
Play
• Video conferencing is a communication method that uses both video and sound using
an internet connection.
• It can be used to have business meeting when people are in different locations.

Need hardware equipment


Network communication – Video conference

• Video encoder
37
Network communication – web conference Play

• web conferencing use software in computer with internet connection to make conference
with other side like zoom, team,wbinar
• Quit similar to video conference
Used for:
• Online presentation
• Online education or training
Network communication – web conference

39
Audio conference (Phone conference) Play
Audio conferencing refers to meetings held between people using audio (sound)
Equipment (telephone) but can not see them.
• Audio conference can be done over the telephone network or using a computer
network making use of VOIP.
• The drawback: sound quality

Audi conference

VoIP
Telephone network
Computer network/internet
Audio conference – using VoIP (computer network/internet)

Sound is digital signal

IP 192.168.0.1
IP 192.168.0.2
Computer network
Or IP 192.168.0.3
Internet
digital
IP 192.168.0.4
digital

IP 192.168.0.4
Appendix

42
IP address (ID)
▸ IP address : Internet Protocol Address ex: 192.168.1.100
▸ IP: identify the location of the computer in the network/ internet {unique address}
▸ Packet frame: hold the ID (MAC,IP) address and message

Sender Address Receiver Address Sender IP Receiver IP


Message
MAC: B1 MAC: B2 192.168.0.1 192.168.0.50

Used by switch Used by router

192.168.1.50

Network ID PC ID
1-254

43
Compare between hub and switch
▸ Similarities
▸ both a hub and a switch are used to connect devices in a LAN
▸ » both hubs and switches use data packets
▸ differences
▸ hubs send data packets to every device on the network;
whereas switches send data packets to a specific device only
▸ security is lower with hubs than with switches
▸ a switch uses a look-up table to determine the destination
device
▸ switches use MAC addresses to locate the destination device.

44
1-LAN (Local Area Network)
LAN :number of computers and devices (for example, printers) are connected to hubs / switches
by Ethernet cable within one building

Example: Home/office/campus Advantage disadvantage

sharing of resources spread of viruses

Office/home LAN 1 communication security risk


Between users {hacking} data
stolen
control and monitor if server breaks
the computer down , the network
not function
45
Setting up the LAN network
1. Purchase the hardware (computer/cables/printers)
2. Install network cards NIC
3. Purchase a hub/switch
4. Set IP addresses
5. Set up file/printer sharing
6. Purchase/prepare the software /antivirus/firewall/web
browser
2-WAN (Wide Area Network)
▸ WAN is two LAN or more are connected by router and there is a large distance
between them (several kilometers).
▸ Example: Companies / Bank with multi branches, Internet

47
WAN Example (company with branches)
Router
Modem

Modem

Router
LAN
Branch: USA

LAN
Branch: Malaysia
48
The purpose of the Router:
• Connects a LAN to a WAN / LAN
• Allows devices to connect to the internet
• Forwards data packets
• Sends/receives data packets

Switch Switch
Router
Router

49
WLAN (Wireless Local Area Network)
WLAN (Wireless LAN) :number of computers and Wi-Fi-enabled devices are wirelessly (Wi-Fi)
connected by Access Point within one building

Example: Home/office/campus
Uses: to access internet /WLAN
Wireless
Access Point

50
Setting up the WLAN (home network with internet)
(home)
Modem
1. Purchase the hardware Router
2. Install wireless network cards IP: 192.168.0.1
3. Purchase a Access point
4. Purchase a Router/modem
5. Allocate/set IP addresses
6. Subscribe to Internet from ISP ISP/Internet
7. Purchase the software /antivirus
Wireless
Access Point

IP: 192.168.0.2 IP: 192.168.0.3 IP: 192.168.0.4 IP: 192.168.0.5 IP: 192.168.0.6 51
Bluetooth
▸ How computers can use Bluetooth to connect to a device
▸ Computer’s Bluetooth searches for the other devices using radio wave
▸ Devices automatically detect and connect to each other
▸ Pairs the two devices, Ready to send/receive information
▸ Used for low-bandwidth applications, e.g. streaming music

▸ Note:
▸ Used for short distances
▸ Used when the speed of transmission is not critical
▸ Bluetooth can be used to create a secure Wireless Personal Area Network
52
General Internet Terms
Internet Terms

HTTP URL FTP ISP Web browser

▸ HTTP: Hyper Text Transfer Protocol : is a set of rules agreed by the sender (user/web browser) and
recipient (web site) when (data / web pages) is being transferred between devices.

▸ HTTPS: Hyper Text Transfer Protocol Secure : send encrypted data over secure connection SSL.
HTTP
http://domain-name Carry Plain text from .. To..

Web browser
GMiS

HTTPS
Carry SSL encryption data
https://domain-name 53
Router
Router Router
Internet
Connection

Switch

54
55
3- Extranet (External Restricted Access Network)

56
Audio conference (Phone conference)

Audi conference

VoIP
Telephone network
Computer network/internet
Audio conference – using telephone network (analogue)

Sound is an analogue signal

Phone No: 03254159

Phone No: 03254158


Phone No: 03254160
Telephone company
Land line

Analogue
Analogue Phone No: 03254161

Phone No: 03254162


Chapter 4- Past paper

Find the past paper @google drive


60

You might also like