Chapter 4 Networks
Chapter 4 Networks
Computers in a Network
Clients - Client computers or workstations are the normal computers that are connected to the
network.
Servers - They are special, powerful computers that provide services to the client computers on the
network. These services might include:
Providing a central, common file storage area
Sharing hardware such as printers
Controlling who can or can’t have access the network
Sharing Internet connections
Servers are built to be very reliable. This means that they are much more expensive that
normal computers.
Networking Hardware
Network Interface Card (NIC) - Every device needs to have a network interface card (NIC)
to be connected to the network.
Network Cable - To connect together different devices to make up a network, you need cables.
Hub
A device that connects a number of computers together to make a LAN. It is at the centre
of a star network and has cables plugged into it from each computer.
It receives a message, sends it to every computer on the network. So, hub-based networks
are not very secure.
Switch
It is a hub. But, It is more ‘intelligent’ device than a hub
It receives a message, it checks whom it is addressed to, and only sends it to that specific
computer. So, switches are more secure but are more expensive.
Bridge
A bridge is a network device that typically links together two different parts of a LAN.
A router links a LAN to a WAN (such as the Internet) where as a bridge links independent
parts of a LAN so that they act as a single LAN.
17
IGCSE ICT Networks and the effects of using them 0417
Modem:
A modem (modulator-demodulator) is a device that modulates signals to encode digital
information and demodulates signals to decode the transmitted information.
A computer processes digital signals and telephone lines carry analogue signals. modem
turns the digital data of a computer into modulated electrical signal for transmission over
telephone lines and demodulated by another modem at the receiver side to recover the
digital data.
A router will have at least two network cards (NICs), one physically connected to one network and
the other physically connected to another network. A router can connect any number of networks
together providing it has a dedicated NIC for each network.
Features of routers:
A router is a network device that connects together two or more networks together and
can connect them to WAN. It routes the data between different networks.
It can join a home or business network (LAN) to the Internet (WAN).
It can incorporate a firewall to provide network security.
It stores information about the computer(s) connected to each of the networks.
It inspects every packet of data being sent by any computer on the networks connected to it.
Bluetooth (Personal Area Network) - A wireless network for very short-range connections. No
cables instead they contain small, low-power radio transmitters and receivers. When devices are in
range of other Bluetooth devices, they detect each other and can be 'paired‘.
Typical uses of Bluetooth:
Connecting a wireless keyboard or a wireless mouse or a wireless headset with a mobile
phone or a computer
Printing wirelessly from a computer or PDA
Transferring data / music from a computer to an MP3 player
Transferring photos from a phone / camera to another device
18
IGCSE ICT Networks and the effects of using them 0417
Intranets - A private network that provides similar services like Internet: e-mail, messaging, web
pages, etc. But, these services are only for the users of the intranet – they are private, not public.
Very secure network. Businesses and other organizations often have intranets for use by their
employees.
Providing local e-mail and can be used for sending messages within the organization.
It reduces day-to-day expenses such as paper costs by providing all the documents and policies as a
soft copies. Bringing members of the staff up to date with the organizations policies.
Telephone directories can be put on to the intranet which saves time and paper when looking for
internal numbers.
Providing faster access to documents and statistics
Easier to share information than sending memos.
Sharing diaries and organizing meeting times
19
IGCSE ICT Networks and the effects of using them 0417
Types of Network
Local Area Network (LAN) - A network limited to one building or site. It is a private network
belonging to an organization or business. They use cables or low-power radio (wireless) for
the connections.
Wide Area Network (WAN) – [Internet] - A network that extends over a large area. It is created
by joining several LANs together, over long distances, they use optical fibre (glass) cables,
satellite radio links, microwave radio links, etc.
Wireless Local Area Network (WLAN) -It uses radio signals (WiFi) to connect computers
instead of cables. At the centre of the WLAN is a wireless switch or router - a small box with
one or two antennas sticking out the back - used to send and receive data to the computers.
It is convenient to use wireless connections as no need of cables and less expensive than
cabled LAN.
Can connect multiple connections for an access point.
But.. They are more difficult to make secure since other people can also try to connect to the
wireless network.
The strength of the wireless signal gets weaker as you move away from the access point and also
when may user access the same wireless point.
Spyware: It is software that aims to gather information about a person or organization without their
knowledge and that may send such information to another entity without the consumer's consent, or
that asserts control over a computer without the consumer's knowledge
Antispyware software helps protect your computer against pop-ups, slow performance, and
security threats caused by spyware and other unwanted software. To keep up with the latest forms
of spyware, you must keep your antispyware software updated
21
IGCSE ICT Networks and the effects of using them 0417
Offensive Content- Inappropriate Internet content can create an uncomfortable work
environment and cause potential legal problems for your business. Network users risk
viewing inappropriate content, decreasing productivity, and inviting lawsuits by abusing
company resources with unregulated Web browsing.
Firewalls: A firewall can be a device or a software that is placed between your computer and the
rest of the network to prevent unauthorized access.
To prevent all unauthorized users accessible to the network via the internet.
It works like a filter at the point of access to the internet to extract information from a
message and only let allowable traffic.
It will examine the data packets which arrive at it and filter out the packets to see what they
are.
It looks at an IP address and if it is not a part of allowed address, it prevents the packet from
continuing.
It looks at a domain name and if it is not a part of the allowed domain names, it prevents
from continuing.
It can be configured even to filter words which should not exist in a packet of arrived data
If you wish to protect your whole LAN from hackers out on the Internet, you would place
a firewall between the LAN and the Internet connection.
Proxy Server
A proxy server is a computer setup to share resources (Eg: an Internet connection.)
It acts as an agent for requests from clients seeking resources from other servers, such as a
file, connection, web page or other resource available from a different server. The proxy
server evaluates the request and executes the task accordingly.
It acts like a buffer between LAN and a WAN. It passes the service request of a computer
in a LAN to the Internet and passes back the pages requested to the same computer after
filtering any information requested by the computers in the organization. The pages
received from the internet are stored in these servers. When any other computer requests the
same pages it makes it available by speeding up the browsing process.
Virus Protection / Content Filtering : Content filtering allows schools, businesses, and other
organizations to set and enforce Acceptable Use Policies (AUPs) governing what materials can and
cannot be accessed on the organization’s computers. Without content filtering, your LAN users
have unlimited access to all Internet resources, appropriate and inappropriate, benign and
dangerous.
Encryption - Data is scrambled or converted into a form which can be understood only by the
person or the computer with the decryption key. Data cannot be changed but may be deleted from
system. An authorized recipient can easily decrypt the message with the key provided by the
originator to recipients.
Encryption is important in the business world because it is the easiest and most practical method of
protecting data that is stored, processed, or transmitted electronically.
The main benefit of data encryption is that even if you were to lose your computer, get malicious
malware or are hacked, the data inside your computer is still safe. Encryption of data gives you one
last saving grace, the data may no longer be in your hands, but no one else can see it or use it.
22
IGCSE ICT Networks and the effects of using them 0417
Disadvantages:
Low quality - images are especially poor. Sometimes difficult to read.
Slow to send (compared to e-mail), paper may jam, telephone line may be busy. The reason
for no transmission will not be clear.
E-Mail - E-mail is a system that allows messages to be sent and received by computers. E-mail is
the most common form of electronic communication.
Instant delivery of messages.
The message can be sent to many people at the same time.
Attachments like text files, audio files, video files & pictures can be sent.
Notification if the message not delivered & signatures can be added.
An address is made up of two parts: a username and an e-mail provider, with an '@' symbol in the
middle: username@provider
Video Conferencing
Three or more participants over a network are able to communicate. They are able to see,
speak & hear from each other.
Video-conferencing is a system that allows people to have conversations and meetings
with other people in different locations, but without leaving their office.
A video-conference involves people sitting in front of a camera and a microphone, whilst
watching other people of a screen and listening to them through loudspeakers.
The system uses the following hardware:
• Video camera/web camera to show you as a participant
• Monitor – to see other participants , documents
• Microphone - to input your voice into the computer
• Loudspeakers – to hear other participants voice
• High-speed network / Internet connection – to be able to have uninterrupted communication
• Codec – It encodes a signal for transmission or decodes it for playback/ editing. A video
camera's analog-to-digital converter converts its analog signals into digital signals, which are
then passed through a video compressor for digital transmission. A receiving device then runs
the signal through a video decompressor, then a digital-to-analog converter for analog display.
24
IGCSE ICT Networks and the effects of using them 0417
Video conferencing is very popular with businesses as it means:
Can organize meetings at a short notice
Can discuss the documents collaboratively
No travel costs, No time wasted travelling to other cities / countries.
Conference calls can be designed so that the calling party calls the
other participants and adds them to the call; however, participants are
usually able to call into the conference call themselves by dialing a
telephone number that connects to a "conference bridge" (a specialized type of equipment that links
telephone lines).
Companies use a specialized service provider who maintains the conference bridge, or who provides
the phone numbers and PIN codes that participants dial to access the meeting or conference call.
Web conferencing is used as a common category for various types of online collaborative
services.
1. Web seminars ("webinars") - a presentation, lecture, workshop or seminar that is
transmitted over the web using video conferencing software. It is interactive where it has the
ability to give, receive and discuss information.
2. Webcasts - a media presentation distributed over the Internet to many listeners at the same
time where the presentation does not allow interaction between the presenter and the
audience.
3. Peer-level web meetings- Discussion at one to one level.
25
IGCSE ICT Networks and the effects of using them 0417
Mobile Telephones
Mobile telephones allow people to be away from their workplace, yet still be contactable. This
means that people can still work, even when out of the office.
Internet Telephony / Voice Over IP (VOIP) – the system that the Internet uses to transfer all
data.
VOIP systems send voices through the Internet as digital data.
VOIP systems use your Internet connection to send and receive phone calls.
'Internet Telephony' means a telephone system that uses the Internet
VOIP systems can work in several ways:
VOIP software can be installed on a computer. Calls are then made using a headset
(headphones / microphone) or by using a special USB handset (looks just like a normal
phone)
Special VOIP telephones can be connected wirelessly to the network.