0% found this document useful (0 votes)
11 views10 pages

Chapter 4 Networks

The document provides an overview of computer networks, detailing their definition, advantages, and disadvantages, as well as the roles of clients and servers. It discusses various networking hardware, types of networks, and the importance of data security, including threats like hacking and viruses. Additionally, it highlights the differences between the Internet and intranets, and the significance of using firewalls and other protective measures in network security.

Uploaded by

duleeka7909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

Chapter 4 Networks

The document provides an overview of computer networks, detailing their definition, advantages, and disadvantages, as well as the roles of clients and servers. It discusses various networking hardware, types of networks, and the importance of data security, including threats like hacking and viruses. Additionally, it highlights the differences between the Internet and intranets, and the significance of using firewalls and other protective measures in network security.

Uploaded by

duleeka7909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

IGCSE ICT Networks and the effects of using them 0417

Networks & the effects of using them


What is a network?
A network is two or more computers, or other electronic devices, connected together so that they
can exchange data.

Why Use Networks?


 Easily share files and data
 Share resources such as printers and Internet connections
 Communicate with other network users (e-mail, instant messaging, video conferencing)
 Store data centrally (using a file server) for ease of access and back-up
 Keep all of our settings centrally so we can use any workstation
Why not use Networks?
 The computer is vulnerable to hackers
 If the network breaks, many tasks become very difficult Your computer can more easily be
attacked by a virus
 Personal information can be revealed
 Information found on The Internet is not always accurate or reliable

Computers in a Network
Clients - Client computers or workstations are the normal computers that are connected to the
network.

Servers - They are special, powerful computers that provide services to the client computers on the
network. These services might include:
 Providing a central, common file storage area
 Sharing hardware such as printers
 Controlling who can or can’t have access the network
 Sharing Internet connections
 Servers are built to be very reliable. This means that they are much more expensive that
normal computers.

Networking Hardware
Network Interface Card (NIC) - Every device needs to have a network interface card (NIC)
to be connected to the network.
Network Cable - To connect together different devices to make up a network, you need cables.
Hub
 A device that connects a number of computers together to make a LAN. It is at the centre
of a star network and has cables plugged into it from each computer.
 It receives a message, sends it to every computer on the network. So, hub-based networks
are not very secure.
Switch
 It is a hub. But, It is more ‘intelligent’ device than a hub
 It receives a message, it checks whom it is addressed to, and only sends it to that specific
computer. So, switches are more secure but are more expensive.
Bridge
 A bridge is a network device that typically links together two different parts of a LAN.
 A router links a LAN to a WAN (such as the Internet) where as a bridge links independent
parts of a LAN so that they act as a single LAN.
17
IGCSE ICT Networks and the effects of using them 0417

Modem:
 A modem (modulator-demodulator) is a device that modulates signals to encode digital
information and demodulates signals to decode the transmitted information.
 A computer processes digital signals and telephone lines carry analogue signals. modem
turns the digital data of a computer into modulated electrical signal for transmission over
telephone lines and demodulated by another modem at the receiver side to recover the
digital data.

How router works:


Routing is the process of forwarding IP packets from one network to another. A router is a device
that joins networks together and routes traffic between them.

A router will have at least two network cards (NICs), one physically connected to one network and
the other physically connected to another network. A router can connect any number of networks
together providing it has a dedicated NIC for each network.

Connect your home network to the Internet


To connect your network to the Internet, you'll need an Internet service provider (ISP) and some
hardware:
 ISP (Internet Service Provider): An ISP is a company that gives you access to the Internet.
You sign up for an account with an ISP just as you do for telephone service or utilities. ISPs
are usually phone companies or TV providers.
 Hardware: For a broadband connection, such as DSL, fiber optic, or cable, you'll need a
broadband modem. This might be included as part of the start-up hardware from your ISP
when you sign up for a broadband account.
 If you plan to share Internet access with multiple PCs by using a home network, you'll also
need a router.

Features of routers:
 A router is a network device that connects together two or more networks together and
can connect them to WAN. It routes the data between different networks.
 It can join a home or business network (LAN) to the Internet (WAN).
 It can incorporate a firewall to provide network security.
 It stores information about the computer(s) connected to each of the networks.
 It inspects every packet of data being sent by any computer on the networks connected to it.

How to connect to Wifi:


Wifi is a wireless broadband connection that allows you to connect to the internet without using any
cables. You need a wireless router & a computer with a built-in wireless adaptor or a separate adaptor.

Bluetooth (Personal Area Network) - A wireless network for very short-range connections. No
cables instead they contain small, low-power radio transmitters and receivers. When devices are in
range of other Bluetooth devices, they detect each other and can be 'paired‘.
Typical uses of Bluetooth:
 Connecting a wireless keyboard or a wireless mouse or a wireless headset with a mobile
phone or a computer
 Printing wirelessly from a computer or PDA
 Transferring data / music from a computer to an MP3 player
 Transferring photos from a phone / camera to another device

18
IGCSE ICT Networks and the effects of using them 0417

Difference between Bluetooth & Wifi:


 Bluetooth is used to connect devices without using cables, while Wi-Fi provides high-speed
access to the Internet
 Bluetooth is a wireless technology standard that is used to exchange data over short
distances. It acts like a cord between the two devices by creating a secure, wireless personal
area network in which these devices can communicate while Wifi serves to wirelessly
connect devices to the internet or local area network.
 Bluetooth communicates within a small range only while wifi has a greater range.
 Wi-Fi technology is more used in connecting computers to routers or internet gateways.
Moreover, a number of electronic gadgets such as camera, gaming consoles, PDA’s etc. also
make use of Wi-Fi to connect to each other or internet while Bluetooth is used to connect
peripherals to the computer. Computer keyboards, mouse, headsets etc. can be connected to
the CPU using Bluetooth protocol.

Setting Up a Small Network


 Server(s) to manage network functions such as network security, network file storage,
shared resources (such as printers)
 One or more switches / hubs - to link devices together
 Each device with NIC and Network cables to connect devices to the switch, etc.
 A separate wireless access point (or this could be part of the switch) - to allow wireless
devices (e.g. laptops or smart-phones) to join the network
 A router to connect your LAN to the Internet (WAN) A firewall to protect your network
from hackers Possibly a bridge if you already have a section of network and you want your
new network to connect to it
To connect the Internet you need to
 Set up an account with an Internet Service Provider (ISP)
 Get an Internet connection installed from the ISP to your location
 Configure various bits of hardware and software so that everything worked with the
network
The Internet - Why use internet?
 View web pages on the WWW (World-Wide Web)
 Sending and receiving e-mail messages, Sharing files
 Communicating using voice (VOIP) and video
 Playing multi-player games , listening to streamed music or watching streamed video

Intranets - A private network that provides similar services like Internet: e-mail, messaging, web
pages, etc. But, these services are only for the users of the intranet – they are private, not public.
Very secure network. Businesses and other organizations often have intranets for use by their
employees.
 Providing local e-mail and can be used for sending messages within the organization.
 It reduces day-to-day expenses such as paper costs by providing all the documents and policies as a
soft copies. Bringing members of the staff up to date with the organizations policies.
 Telephone directories can be put on to the intranet which saves time and paper when looking for
internal numbers.
 Providing faster access to documents and statistics
 Easier to share information than sending memos.
 Sharing diaries and organizing meeting times
19
IGCSE ICT Networks and the effects of using them 0417

Difference between Internet and intranet:


1. The Internet is an open, public space, a worldwide system of interconnected computer networks
while an intranet is designed to be a private space.
2. Internet is the global World Wide Web, while an intranet is a private Internet operating within a
company.
3. Internet is a network of networks that consists of millions of smaller domestic, academic, business,
and government networks, which together carry various information and services, such as electronic
mail, online chat, file transfer, and the interlinked Web pages and other documents of the World
Wide Web while intranet is a single network within an organization and it may be accessible from
the Internet, but as a rule it's protected by a password and accessible only to employees or other
authorized users.
4. An intranet server responds much more quickly than an internet server.
5. Intranet offers faster communication and access to information than the internet.
6. Users of an intranet can get on the Internet, but global Internet users cannot get onto an intranet
unless they have access to it.

Types of Network
Local Area Network (LAN) - A network limited to one building or site. It is a private network
belonging to an organization or business. They use cables or low-power radio (wireless) for
the connections.
Wide Area Network (WAN) – [Internet] - A network that extends over a large area. It is created
by joining several LANs together, over long distances, they use optical fibre (glass) cables,
satellite radio links, microwave radio links, etc.
Wireless Local Area Network (WLAN) -It uses radio signals (WiFi) to connect computers
instead of cables. At the centre of the WLAN is a wireless switch or router - a small box with
one or two antennas sticking out the back - used to send and receive data to the computers.
 It is convenient to use wireless connections as no need of cables and less expensive than
cabled LAN.
 Can connect multiple connections for an access point.
But.. They are more difficult to make secure since other people can also try to connect to the
wireless network.
The strength of the wireless signal gets weaker as you move away from the access point and also
when may user access the same wireless point.

Advantages of students using laptop to access internet:


 With a laptop a student can take notes in class, type up assignments, share notes, and work
with groups on projects.
 Students can use the internet to speak to and communicate with family and friends without
incurring huge phone bills.
 Laptops enable students to watch films and video clips as well as download music from the
net.
 Students even use laptops for creating software and designing things to earn a little pocket
money. Those with writing or research skills can consider freelance writing.
 There are students to launch websites while students along with friends and these ventures
become huge successes creating millionaires.
 Online libraries and other websites allow students to download whole books online. It save
time and money and students can read books published as far back as the 18th century to
new ones.
 Laptops make students self sufficient and they learn to type, manage their schedules, learn
to budget by using online planners, and become citizens of the world.
20
IGCSE ICT Networks and the effects of using them 0417

Network & Data Security


 Physical Security - no unauthorized people can physically access any of the computers on
your network.
 Use a Username and Have a Good Password - The most common way to protect your
computer’s data is to setup user accounts with usernames and passwords. Anyone not
having a username, or not knowing the correct password will be denied access.
 Always Install and Use a Firewall - A firewall is a device, or a piece of software that is
placed between your computer / LAN and the rest of the network / WAN.
 Data Encryption - Encryption is the process of converting information into a form that is
meaningless to anyone except holders of a ‘key’.
 Digital certificates - Transactions are digitally signed/authenticated/transaction is linked to
the PC being used to carry out online banking
 Anti Spyware - Prevents spyware from invading your computer and gaining personal
information
 Make sure website is secure and has a Locked padlock on display.

Spyware: It is software that aims to gather information about a person or organization without their
knowledge and that may send such information to another entity without the consumer's consent, or
that asserts control over a computer without the consumer's knowledge

Antispyware software helps protect your computer against pop-ups, slow performance, and
security threats caused by spyware and other unwanted software. To keep up with the latest forms
of spyware, you must keep your antispyware software updated

Security issues related to the use of computer networks:


 Hacking unauthorized access to or use of data, systems, server or networks to breach
security without authorization of the owner of the system, server or network. Hackers
breaking into your network can view, alter, or destroy private files.
 Sending abusive e-mails or posting offensive Web pages.
 Creation or transmission of any offensive or indecent images.
 Giving unauthorized access to resources e.g. allowing an account to be used by someone not
authorized to use it.
 Deliberately creating or spreading computer viruses or worms.
 Unauthorized running of applications that share its computing resources like network
bandwidth in an uncontrolled and unlimited way.
 Viruses - These are destructive programs that attach themselves to Email, applications and
files. Once on your LAN computers, viruses can damage data or cause computer crashes.
Users can quickly damage entire networks by unknowingly downloading and launching
dangerous computer viruses. Viruses can also be used as delivery mechanisms for hacking
tools, putting the security of the organization in doubt, even if a firewall is installed.
 Capture of Private Data Going Over the Internet - As your private data moves over the
Internet, hackers using programs called packet sniffers can capture your data as it passes
from your network over the Internet and convert it into a readable format. The source and
destination users of this information never even know that their confidential Information has
been tapped.

21
IGCSE ICT Networks and the effects of using them 0417
 Offensive Content- Inappropriate Internet content can create an uncomfortable work
environment and cause potential legal problems for your business. Network users risk
viewing inappropriate content, decreasing productivity, and inviting lawsuits by abusing
company resources with unregulated Web browsing.

Protection related to the use of computer networks:

Firewalls: A firewall can be a device or a software that is placed between your computer and the
rest of the network to prevent unauthorized access.
 To prevent all unauthorized users accessible to the network via the internet.
 It works like a filter at the point of access to the internet to extract information from a
message and only let allowable traffic.
 It will examine the data packets which arrive at it and filter out the packets to see what they
are.
 It looks at an IP address and if it is not a part of allowed address, it prevents the packet from
continuing.
 It looks at a domain name and if it is not a part of the allowed domain names, it prevents
from continuing.
 It can be configured even to filter words which should not exist in a packet of arrived data
 If you wish to protect your whole LAN from hackers out on the Internet, you would place
a firewall between the LAN and the Internet connection.
Proxy Server
 A proxy server is a computer setup to share resources (Eg: an Internet connection.)
 It acts as an agent for requests from clients seeking resources from other servers, such as a
file, connection, web page or other resource available from a different server. The proxy
server evaluates the request and executes the task accordingly.
 It acts like a buffer between LAN and a WAN. It passes the service request of a computer
in a LAN to the Internet and passes back the pages requested to the same computer after
filtering any information requested by the computers in the organization. The pages
received from the internet are stored in these servers. When any other computer requests the
same pages it makes it available by speeding up the browsing process.

Virus Protection / Content Filtering : Content filtering allows schools, businesses, and other
organizations to set and enforce Acceptable Use Policies (AUPs) governing what materials can and
cannot be accessed on the organization’s computers. Without content filtering, your LAN users
have unlimited access to all Internet resources, appropriate and inappropriate, benign and
dangerous.

Encryption - Data is scrambled or converted into a form which can be understood only by the
person or the computer with the decryption key. Data cannot be changed but may be deleted from
system. An authorized recipient can easily decrypt the message with the key provided by the
originator to recipients.
Encryption is important in the business world because it is the easiest and most practical method of
protecting data that is stored, processed, or transmitted electronically.

The main benefit of data encryption is that even if you were to lose your computer, get malicious
malware or are hacked, the data inside your computer is still safe. Encryption of data gives you one
last saving grace, the data may no longer be in your hands, but no one else can see it or use it.

22
IGCSE ICT Networks and the effects of using them 0417

Preventing Data Misuse


Data Misuse - If the wrong person has access to your data, they can misuse it in a variety of ways:
 Data could be deleted (e.g. your bank balance could be wiped out)
 Data could be changed (e.g. you could end up with a criminal record, for something you
didn't do)
 Data could be used for blackmail (e.g. your school record might contain information that
you are embarrassed about, and someone might threaten to reveal it to the press!)
 Data could be used to help someone impersonate you (e.g. they could apply for a bank loan
in your name). This is known as Identity Theft

How Do Bad People Get Your Data?


So how does data end up in the wrong people's hands?
 A CD-ROM or memory stick might be left somewhere by mistake (e.g. on a train)
 A hacker might break in to a network
 A password might be guessed
 Information might be sent in an e-mail which is intercepted
 Someone might read things on an unattended monitor
 The data might be sold by someone for profit
 Discarded printouts can be found in bins

How Do You Stop Data Getting into the Wrong Hands?


You should always follow sensible precautions when dealing with other people's data:
 Encrypt files, when taken out of the office (e.g. on a memory stick, or sent via e-mail)
 Use strong passwords, change your password frequently.
 Lock your computer when you are away from it or log off once done.
 Always shred printouts that contain sensitive data

Data Protection Act


 Data must only be kept if it is necessary for the business / organisation (e.g. a store
shouldn't keep details of your political or religious views - they don't need to know this!)
 Data must be accurate and kept up-to-date (it is the duty of the business / organisation to
make sure the data has no errors)
 Data must not be kept longer than necessary (e.g. you can't keep a customer's details
forever - only whilst they are still your customer)
 Data must be kept secure (e.g. databases should be encrypted, firewalls should be used for
networks, etc.)
 Data must not be transferred to any country that does not have a similar data protection
law.
Fax - Fax is short for ‘facsimile’ which means ‘copy’.

Fax machine → Phone line → Fax machine


A fax machine is an electronic instrument composed of a scanner, a modem, and a printer. It
transmits data in the form of pulses via a telephone line to another fax machine, which then
transforms these pulses into images, and prints them on paper.
Advantages:
 Instant hard copy delivery without any computer and internet connections
 The hardcopies are legally accepted anywhere is the world.
 Due to low quality, cannot computerize. Hence no illegal copy can be produced.
23
IGCSE ICT Networks and the effects of using them 0417

Disadvantages:
 Low quality - images are especially poor. Sometimes difficult to read.
 Slow to send (compared to e-mail), paper may jam, telephone line may be busy. The reason
for no transmission will not be clear.

Electronic faxing: Internet fax


The recipient machine must also be compatible with Internet fax. Hardcopy is converted to PDF
data and attached to an e-mail in Multi-Purpose Internet Mail Extensions format. Data is sent via
TCP/IP directly to any Internet Fax on the intranet or Internet. Because they make use of TCP/IP,
Internet Faxes do not have long-distance transmission costs and the receiving end can verify the
sender.

E-Mail - E-mail is a system that allows messages to be sent and received by computers. E-mail is
the most common form of electronic communication.
 Instant delivery of messages.
 The message can be sent to many people at the same time.
 Attachments like text files, audio files, video files & pictures can be sent.
 Notification if the message not delivered & signatures can be added.
An address is made up of two parts: a username and an e-mail provider, with an '@' symbol in the
middle: username@provider

Difference between fax and email:


1. Fax is the method of sending and receiving documents containing texts using telephone lines
whereas email is a method of sending or receiving electronic messages over the internet.
2. Fax makes use of fax machines and telephone lines, and it scans and transmits data to be
received and converted at the receivers end to be reproduced as the original document
3. Email is electronic mail where the user does not use a pen to write on paper but types on his
computer monitor and does not need a stamp but just presses send button to transmit the
mail.
4. Today fax is being sent over the internet just like email obliterating the need of not only
telephone lines but also fax machines

Video Conferencing
 Three or more participants over a network are able to communicate. They are able to see,
speak & hear from each other.
 Video-conferencing is a system that allows people to have conversations and meetings
with other people in different locations, but without leaving their office.
 A video-conference involves people sitting in front of a camera and a microphone, whilst
watching other people of a screen and listening to them through loudspeakers.
The system uses the following hardware:
• Video camera/web camera to show you as a participant
• Monitor – to see other participants , documents
• Microphone - to input your voice into the computer
• Loudspeakers – to hear other participants voice
• High-speed network / Internet connection – to be able to have uninterrupted communication
• Codec – It encodes a signal for transmission or decodes it for playback/ editing. A video
camera's analog-to-digital converter converts its analog signals into digital signals, which are
then passed through a video compressor for digital transmission. A receiving device then runs
the signal through a video decompressor, then a digital-to-analog converter for analog display.
24
IGCSE ICT Networks and the effects of using them 0417
Video conferencing is very popular with businesses as it means:
 Can organize meetings at a short notice
 Can discuss the documents collaboratively
 No travel costs, No time wasted travelling to other cities / countries.

However there are some problems with video conferencing:


 It is difficult to synchronize international conferences due to the difference in time zones.
 Documents (e.g. contracts) cannot be signed
 Less personal than face-to-face meetings

Audio Conference: A conference call is a telephone call in which the


calling party wishes to have more than one called party listen in to the
audio portion of the call.

Conference calls can be designed so that the calling party calls the
other participants and adds them to the call; however, participants are
usually able to call into the conference call themselves by dialing a
telephone number that connects to a "conference bridge" (a specialized type of equipment that links
telephone lines).

Companies use a specialized service provider who maintains the conference bridge, or who provides
the phone numbers and PIN codes that participants dial to access the meeting or conference call.

Web conferencing is used as a common category for various types of online collaborative
services.
1. Web seminars ("webinars") - a presentation, lecture, workshop or seminar that is
transmitted over the web using video conferencing software. It is interactive where it has the
ability to give, receive and discuss information.
2. Webcasts - a media presentation distributed over the Internet to many listeners at the same
time where the presentation does not allow interaction between the presenter and the
audience.
3. Peer-level web meetings- Discussion at one to one level.

Advantages of web conferencing:


1. It allows real-time point-to-point communications as well as multicast communications
from one sender to many receivers.
2. It offers data streams of text-based messages, voice and video chat to be shared
simultaneously, across geographically dispersed locations.
3. The major benefits include saving time, resources, and money since you and your clients or
customers can meet online instead of having to leave the office.
4. It is also environmentally friendly since it reduces the need for travel. It can bring the same
impact as an actual in-person meeting if it is conducted correctly.
5. It can combine the advantages of a typical phone conversation and those of a live video
feed. It also provides the ability to conduct chats via instant messaging during the web
conference. This means you can type, text and communicate verbally to other attendees of
the conference. With instant access to the Internet, you can also access any necessary files
right on your desktop and share them with others attending the conference in real time.

25
IGCSE ICT Networks and the effects of using them 0417

Disadvantages of web conferencing


1. Technology Issues : For online meetings and web conferences to be productive, participants
require suitable hardware, software and Internet connectivity. Poor web conferencing
technology or inadequate training using the technology will undermine its success.
2. Facility Issues: Suitable facilities are needed for web meeting participants. Cameras,
microphones, monitors and computer keyboards need to be situated in a quiet room with
comfortable seating and proper lighting conditions.
3. Cultural Issues: Web conferencing often appeals to Internet savvy, computer literate
individuals. Many people, however, are uncomfortable with new technologies. Transitioning
from in-person meetings to web meetings must be well managed, like any other significant
business change.
4. Inter-Personal Relationships: Web meetings and web conferences are not suitable for all
types of gatherings. Human contact plays an import role in relationship building with
customers and suppliers and should not be underestimated. There is often no substitute for
a face-to-face contact, particularly at the start of an important business relationship.

Mobile Telephones
Mobile telephones allow people to be away from their workplace, yet still be contactable. This
means that people can still work, even when out of the office.

Modern smart-phones can perform a wide variety of tasks:


 Make and receive telephone calls just about anywhere
 Send a receive SMS (short message service) messages
 Send and receive e-mail
 Send and receive files such as images, text documents, etc.
 Edit documents
 Most people would be lost without their mobile phone!
However there are some downsides to the use of mobiles:
 Workers never get a chance to 'switch off' since they can always be contacted - can be
stressful
 Mobiles are easy to lose, and often contain a lot of personal and/or business information. A
lost mobile could be embarrassing / damaging if the wrong people got hold of it

Internet Telephony / Voice Over IP (VOIP) – the system that the Internet uses to transfer all
data.
 VOIP systems send voices through the Internet as digital data.
 VOIP systems use your Internet connection to send and receive phone calls.
 'Internet Telephony' means a telephone system that uses the Internet
VOIP systems can work in several ways:
 VOIP software can be installed on a computer. Calls are then made using a headset
(headphones / microphone) or by using a special USB handset (looks just like a normal
phone)
 Special VOIP telephones can be connected wirelessly to the network.

VOIP systems have a number of advantages over a normal telephone system:


 No telephone line is required & Long distance call costs are very low.
But Not as reliable as normal phones, so cannot be relied upon for emergency calls & Call
quality depends on the speed of the Internet connection
26

You might also like