ICT Notes+Chapter+4+Networks
ICT Notes+Chapter+4+Networks
NETWORKS
4.1
NETWORKS
MS. MASARRAH
Learning objectives
1) Discuss the operation of a router and other common network devices.
LAN WLAN
WAN
LAN LOCAL AREA NETWORK
• Network used for data transmission by computing devices within one building or site (school building).
• Allows files/software application to be shared by the computers on the network.
Wi-Fi Bluetooth
Wi-Fi Bluetooth
• Communication using radio waves. • Communication using radio waves.
not so much
• Range up to 100 meters • Range up to 10 meters
• Devices cannot communicate directly • Devices can communicate directly
• Many users can be supported • Fewer users can be supported
• A high level of security • A lower level of security
1. The source computer splits the file into packets and addresses
them with the recipient’s IP address.
2. The file is split because the transmission of a large file would
consume all the bandwidth and slow the network.
3. Then it is sent onto the network using cables or radio waves as in
wireless network.
4. Routers on the network inspect each packet to find the
destination address.
5. Each router has a configuration table containing information
about which connection lead to particular groups of addresses.
6. Router can balance the load across the network.
7. If problem occur, packets can be routed around the problem,
ensuring the delivery of entire message.
8. Final router can direct the packet to the correct recipient.
Cloud Computing
• Cloud computing: an Internet service that provides computing needs to computer users.
(to work on and complete specified projects).
• These services, such as software and storage space are stored in remote computers
called servers. Server is a computer that provides services to other computer on a
network.
• Allows users to access and use applications, such as word processors and spreadsheets
stored on remote servers. Essentially, targeted towards businesses.
• Cloud Storage: the storage of digital data on remote servers (to save and keep data)
• It can be used as the main storage device, like a remote hard disk drive, but most use it
for backing up and archiving their data.
Advantages Disadvantages
Data will be secure if there us a fire Need an internet connection
or other problem at the site
The data can be accessed from Download and upload speeds can be
anywhere in the world with an affected by the internet connection
internet connection
No need to buy an expensive storage The hosting company could be
device targeted by online hackers
Many users can access the data and User have less control if the data is
collaborate with each other from held by another company
anywhere in the world
Common Network Environments
Internet
3 types
of
Networks
Intranet Extranet
Differences Between Network Types
INTERNET INTRANET EXTRANET
Definition: global network of Definition: a communication Definition: a communication
interconnected computer networks system, solely within a particular system for a particular company or
company or organization organization that can be accessed
from the internet by other parties
or organizations who have been
granted access.
Used to connect people, It is separate from global internet User from other organizations to
communities and countries and cannot be accessed by outside use it for specific purposes.
worldwide. (public) users. (private) (private/VPN)
Protocols: TCP/IP (Transmission Protocols: Organizational policies Protocols: organizational and
control protocol/internet protocol) contractual policies, internet
policies
Internet allows all users access to Intranet contains web pages about Network of collaboration between
web pages. the organization. two corporations
Example: world wide web, email, Example: it can publish newsletter,
chat, social media health and safety policies.
CHAPTER 4
4.2
NETWORKS ISSUES
AND
COMMUNICATION
MS. MASARRAH
Learning objectives
1) Discuss security issues regarding data transfer, including
understanding about passwords and other authentication
methods.
3) Describe electronic-conferencing
Security of Computer Networks
• All networks must be kept secure so that data is not corrupted or stolen.
• All online systems can be HACKED and data can be stolen when it is stored
or transmitted.
• Hacking: to gain unauthorized access to data in a system or computer.
• Hackers use packet analyzers or packet sniffers to intercept the packets,
which are then analyzed and their data is decoded.
• The criminals steal sensitive data such as logins, passwords, credit card
numbers and PINs.
How to Protect Network and Data?
1) Biometric Methods
• This method using technologies that analyse unique personal
characteristics such as fingerprints, eye retinas and irises, voice
and facial patterns, and hand measurements as a form of
identification.
2) Magnetic stripes
• This method encoded our personal and security data and can be
swiped through a reader to allow access.
3) Smart cards
• The device contains a computer chip and when it is held near a
reader, data can be transferred to allow the owner to be
authenticated for access to a room or computer system
Authentication Methods
Malware
• Short for malicious software
• Designed to get into computers without the user’s consent and to
disrupt or damage the computer.
Anti-malware Software
• Designed to prevent, detect and neutralize malware.
• It need to be installed on a computer so that the system can be
protected from infiltration and infection by any malware.
Types of Malware
• It does not need human action to spread it: it can travel to other
computers (through a network or by sending itself in emails to everyone
2) Worm in a user’s address book unaided)
• It cause other programs to run slowly
2) Video-conferencing and
1) Audio-conferencing
Web-conferencing
Webcasts
• Involve one-way transmission and are non-interactions.
• Host presents information via an audio and/or video stream over the internet and may
use screen sharing to show presentation, videos or documents.
Webinars
• Teaching sessions that take place on the internet.
• Participants in different location see and hear the presenter and ask and answer
questions.
Equipment for Video-
Conferencing and Web-
Conferencing
Web
conference
software
Internet
Advantages and Disadvantages of
Video-conferencing and Web-Conferencing
Advantages Disadvantages
Saving time and money The interaction and communication is never
successful as between people actually
meting and interacting face-to-face
Meeting can be organized very quickly to Hardware and software is expensive
respond to a new event or emergency.
Participants can show presentations and Hardware and software can malfunction
share and collaborate on documents during meeting
Encourage collaboration between May not able to see all the participants at a
colleagues as they can chat and see each remote site
other at any time
Comparison between
Video-conferencing and Web-Conferencing