0% found this document useful (0 votes)
22 views30 pages

ICT Notes+Chapter+4+Networks

Chapter 4 discusses the fundamentals of networks, including types such as LAN, WAN, and WLAN, along with the roles of Wi-Fi and Bluetooth in network communication. It also covers cloud computing, its advantages and disadvantages, and the importance of network security, including methods for protecting data and preventing malware. Additionally, the chapter highlights electronic conferencing technologies and their benefits and drawbacks.

Uploaded by

alaynaniazia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views30 pages

ICT Notes+Chapter+4+Networks

Chapter 4 discusses the fundamentals of networks, including types such as LAN, WAN, and WLAN, along with the roles of Wi-Fi and Bluetooth in network communication. It also covers cloud computing, its advantages and disadvantages, and the importance of network security, including methods for protecting data and preventing malware. Additionally, the chapter highlights electronic conferencing technologies and their benefits and drawbacks.

Uploaded by

alaynaniazia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

CHAPTER 4

NETWORKS
4.1

NETWORKS

MS. MASARRAH
Learning objectives
1) Discuss the operation of a router and other common network devices.

2) Explain the use of Wi-Fi and Bluetooth in networks.

3) Discuss cloud computing and how to store and share data.


Learning objectives
4. Describe the characteristics and purpose of common network environments

5. List the differences between different network types


Networks
• Networks is two or more computers or other digital devices connected to share data and
resources.
• Networks allow the use of the following:
• Computer-to-computer communication
• Mobile phone networks

• There are three main types of networks:

LAN WLAN

WAN
LAN LOCAL AREA NETWORK
• Network used for data transmission by computing devices within one building or site (school building).
• Allows files/software application to be shared by the computers on the network.

WAN WIDE AREA NETWORK


• A network that connects separate LANs over a large geographical area.
• WAN will connect cities, a country or many countries.
• INTERNET is a huge wide area network.

WLAN WIRELESS LOCAL AREA NETWORK


• A local area network accessed using radio wave communications.
• The advantages:
• Allows the user to move around the area with their devices and remain connected.
• Let’s one or more people connect their mobile devices such as laptops/tablets.
THE USES of Wi-Fi and Bluetooth
• Protocols is a sets of rules governing how devices communicate with each other
over networks.
• Two main sets of rules used by computers communicating in a WLAN using
radio waves are:
• Wi-Fi
• Bluetooth

Wi-Fi Bluetooth

• One protocol allowing computers, • Wireless protocol allowing communication


smartphones or other devices to connect over short distances (up to 30 feet).
the internet or communicate with one • Used to link personal devices, example
another wirelessly within particular area. tablets-so that data can be shared between
them.
COMPARISON of Wi-Fi and Bluetooth

Wi-Fi Bluetooth
• Communication using radio waves. • Communication using radio waves.
not so much
• Range up to 100 meters • Range up to 10 meters
• Devices cannot communicate directly • Devices can communicate directly
• Many users can be supported • Fewer users can be supported
• A high level of security • A lower level of security

• Fast data transfer • Low data transfer


Common network devices
Used for connecting computers to form
a network. It broadcast data to all • Knows the addresses
devices not just the one they intended Hubs of the different
for devices on the
network and only
sends the message to
the correct devices
• Allow different
Switches devices on a network
Is a component that to communicate
connects a computer Network
to a network Interface
Card (NIC)
• A device for transmitting data
between networks
A device for linking • Allow different networks to
separate segments of communicate and forwards
a local area network Bridge Routers packages between them
HOW ROUTER WORKS?

1. The source computer splits the file into packets and addresses
them with the recipient’s IP address.
2. The file is split because the transmission of a large file would
consume all the bandwidth and slow the network.
3. Then it is sent onto the network using cables or radio waves as in
wireless network.
4. Routers on the network inspect each packet to find the
destination address.
5. Each router has a configuration table containing information
about which connection lead to particular groups of addresses.
6. Router can balance the load across the network.
7. If problem occur, packets can be routed around the problem,
ensuring the delivery of entire message.
8. Final router can direct the packet to the correct recipient.
Cloud Computing
• Cloud computing: an Internet service that provides computing needs to computer users.
(to work on and complete specified projects).

• These services, such as software and storage space are stored in remote computers
called servers. Server is a computer that provides services to other computer on a
network.

• Allows users to access and use applications, such as word processors and spreadsheets
stored on remote servers. Essentially, targeted towards businesses.

• Cloud Storage: the storage of digital data on remote servers (to save and keep data)

• It can be used as the main storage device, like a remote hard disk drive, but most use it
for backing up and archiving their data.

• Essentially, targeted for professional and personal reasons.


EXAMPLE:
Cloud Storage
Advantages and disadvantages of cloud storage:

Advantages Disadvantages
Data will be secure if there us a fire Need an internet connection
or other problem at the site
The data can be accessed from Download and upload speeds can be
anywhere in the world with an affected by the internet connection
internet connection
No need to buy an expensive storage The hosting company could be
device targeted by online hackers
Many users can access the data and User have less control if the data is
collaborate with each other from held by another company
anywhere in the world
Common Network Environments

Internet

3 types
of
Networks

Intranet Extranet
Differences Between Network Types
INTERNET INTRANET EXTRANET
Definition: global network of Definition: a communication Definition: a communication
interconnected computer networks system, solely within a particular system for a particular company or
company or organization organization that can be accessed
from the internet by other parties
or organizations who have been
granted access.
Used to connect people, It is separate from global internet User from other organizations to
communities and countries and cannot be accessed by outside use it for specific purposes.
worldwide. (public) users. (private) (private/VPN)
Protocols: TCP/IP (Transmission Protocols: Organizational policies Protocols: organizational and
control protocol/internet protocol) contractual policies, internet
policies
Internet allows all users access to Intranet contains web pages about Network of collaboration between
web pages. the organization. two corporations
Example: world wide web, email, Example: it can publish newsletter,
chat, social media health and safety policies.
CHAPTER 4

4.2
NETWORKS ISSUES
AND
COMMUNICATION

MS. MASARRAH
Learning objectives
1) Discuss security issues regarding data transfer, including
understanding about passwords and other authentication
methods.

2) Explain the use of anti-malware software.

3) Describe electronic-conferencing
Security of Computer Networks

• All networks must be kept secure so that data is not corrupted or stolen.
• All online systems can be HACKED and data can be stolen when it is stored
or transmitted.
• Hacking: to gain unauthorized access to data in a system or computer.
• Hackers use packet analyzers or packet sniffers to intercept the packets,
which are then analyzed and their data is decoded.
• The criminals steal sensitive data such as logins, passwords, credit card
numbers and PINs.
How to Protect Network and Data?

Encryption Firewalls Authentication

• The process of • Software or hardware • The process or action


turning devices that protect of proving or showing
information into against unauthorized something to be true,
a form that access to a network. genuine or valid.
cannot be • Firewall can inspect • Primary method:
understood by the incoming packets password.
unauthorized and rejects those are • Password: a secret
recipients. from IP address not word or phrase that
on a trusted list or must be used to gain
block it. admission to a place.
Passwords Rules
Strong Password: a password that is difficult to detect by both humans and
computer programs.

1. Should be at least 8 characters long


2. Contain both numbers and letters
3. Contain both upper- and lower-case letters
4. Contain at least one characters such as !@#$%^*
5. Changed password regularly
6. Never used previous password
7. Never shared password to others
Authentication Methods

1) Biometric Methods
• This method using technologies that analyse unique personal
characteristics such as fingerprints, eye retinas and irises, voice
and facial patterns, and hand measurements as a form of
identification.
2) Magnetic stripes
• This method encoded our personal and security data and can be
swiped through a reader to allow access.
3) Smart cards
• The device contains a computer chip and when it is held near a
reader, data can be transferred to allow the owner to be
authenticated for access to a room or computer system
Authentication Methods

4) Physical Tokens (USB token/Key Fobs)


• This method allows you to access software and verify your
identity with physical devices rather than relying on
authentications codes or passwords.

5)Electronic Tokens (cryptocurrecies)


• This method can be used for electronic payments and function as
a medium of exchange between people and businesses.
6) Zero Login
• This method using artificial intelligence, technologies are being
developed so that users can be authenticated, not only by a
password or physical features, but how they behave.
Anti-malware Software

Malware
• Short for malicious software
• Designed to get into computers without the user’s consent and to
disrupt or damage the computer.
Anti-malware Software
• Designed to prevent, detect and neutralize malware.
• It need to be installed on a computer so that the system can be
protected from infiltration and infection by any malware.
Types of Malware

• Computer program hidden within another program or file.


1) Virus • Have harmful effect (corrupting or deleting data on a disk)

• It does not need human action to spread it: it can travel to other
computers (through a network or by sending itself in emails to everyone
2) Worm in a user’s address book unaided)
• It cause other programs to run slowly

• Does not replicate or attach itself to other files.


• It must be installed by a computer user who thinks they are installing
3) Trojan legitimate software or by opening an email attachment (Trojan horses).
• They deleting files and destroying system information
Types of Malware

• It spies on the computer and sends information to a criminal.


4) Spyware • It comes packaged with other software (free software that you
download, so that the user does not know they are installing it).

• It designed to display advertisements on the computer and redirect


search requests to advertising websites.
5) Adware • When done without a user’s consent, it is considered to be malware.
• User can register the program and pay a fee to have the adverts
removed.
Steps to Prevent Infection

1. Install anti-malware software.


2. Install anti-virus software.
3. Install a firewall to ensure software is not downloaded without your
knowledge.
4. Install anti-spyware protection software.
5. Avoid opening emails and attachments from unknown sources.
6. Scan all data files as they are downloaded.
7. Read all security warnings, license agreements and privacy
statements.
Electronic-Conferencing

Electronic- Meeting between individuals who are not in the same


conferencing room or location using communication technology.

2) Video-conferencing and
1) Audio-conferencing
Web-conferencing

• People in different locations use • Both allow an audio and a visual


technology to speak to each other. connection between the members of the
• All participants use their phone to dial into conference.
a central system that connects them. • Visual and audio communication links
• The members cannot see each other or two/more participants using specialized
any visual presentations high-quality equipment (TV Screen)
Web-Conferencing

Webcasts
• Involve one-way transmission and are non-interactions.
• Host presents information via an audio and/or video stream over the internet and may
use screen sharing to show presentation, videos or documents.

Webinars
• Teaching sessions that take place on the internet.
• Participants in different location see and hear the presenter and ask and answer
questions.
Equipment for Video-
Conferencing and Web-
Conferencing

Web
conference
software
Internet
Advantages and Disadvantages of
Video-conferencing and Web-Conferencing

Advantages Disadvantages
Saving time and money The interaction and communication is never
successful as between people actually
meting and interacting face-to-face
Meeting can be organized very quickly to Hardware and software is expensive
respond to a new event or emergency.
Participants can show presentations and Hardware and software can malfunction
share and collaborate on documents during meeting
Encourage collaboration between May not able to see all the participants at a
colleagues as they can chat and see each remote site
other at any time
Comparison between
Video-conferencing and Web-Conferencing

Video Conferencing Web Conferencing


Better quality video and audio Not as good quality video and audio
Complete group of people at one location Only shows an individual using web cam
can be viewed
Not require the use of the WWW and a web Require the use pf WWW and a web
browser. Use their own software clients and browser
less errors and problem with distortion of
images and sound

You might also like