Chapter 4 Networks and The Effects of Using Them
Chapter 4 Networks and The Effects of Using Them
4.1 Routers
· A device that enables data to be sent between different types of networks
· Commonly used to connect computers and other network capable devices to the internet
· They can be connected to through cables or wirelessly
Function
· Makes decisions on messages being passed between the networks
· Reads information about the message and decides where the message should go and the best route for it to
get there
· Formats the messages making it suitable for the new network
How it Works
· To send data to a specific device, a router needs a something like an address
· Internet Protocol Address: a unique number assigned to all computers and devices connected to the internet
which can determine its exact physical location
· A router can use this IP to send data from the internet to the exact device that requested it
· Storing IP Addresses:
o Routers store IP addresses in a routing table
o Routing tables list all the different routes to other networks
o Routing table determines best route for data
Hubs
· They are devices that can have multiple devices connected to them
· Main task is to receive data from different ports and send it to each device
· T he in fo rm at io n w il l be r ec ei ve d t o t he de vi ce w h et he r it s r el ev an t, o r no t
MARY/CHMS,BSB/ICT/CHAPTER 4 1
B ri d g es
· It connects 2 different types of networks together e.g. a bus and star network
· It can only connect networks that use the same way for handling messages
· They do this by changing the form of message to suite the different type of network
Switches
· More efficient than hubs in distributing data
· Each device has an access control media address MAC which identifies it uniquely
MAC Address: a number unique to each device connected to the network (like fingerprints)
· Data sent will have a mac address which tells the source and receiving device
Modems
· It stands for modulator demodulator.
· Converts computer’s digital signals (modulates it) into analogue for transmission through telephone lines
· Reverse this process- analogue signal from a telephone line into digital for a computer to process the data
(demodulates it)
· The main use it to connect to computer networks over long distances using existing telephone lines
Types of Modems:
· Dial-up modems: operate at 60 kilobits/sec
o slow compared to modern standards
· Asymmetric: faster at downloading than uploading
o (ADSL) asymmetric digital subscriber line modems operate at 11,000 kilobits/sec
o Don’t tie up line while accessing internet, which allows simultaneous internet access and usage of telephone
o Cable modems: allow cable TV users to receive TV signals as well as internet access
· Wi-Fi Hotspots
o Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send signals
o Wi-Fi hotspots are places where you can access Wi-Fi (free or paid)
o Hotspots are found in public places like Airports, hotels, and cafés
o War driving: The act of driving and searching for unsecured Wi-Fi hotspots
o This gives a risk to the Wi-Fi system
Bluetooth
· Bluetooth is an example of wireless personal area networking (WPAN) technology
MARY/CHMS,BSB/ICT/CHAPTER 4 2
· Spread spectrum transmission (radio waves) is used to provide wireless links between to devices such as
mobile phones and allow connection to the internet
· A small home network can be created with this system
Uses:
o Transfer photos from camera to mobile phone
o Wirelessly connect different external devices
Websites
· Web is made up of millions of websites and web pages
· Web pages are documents on a computer screen containing various multimedia and text, pictures
· A website consists of many of these pages linked together Uniform Resource
Locator (URL)
· Web browsers use URLs to retrieve files
· They are multiple ways of locating on the internet
· Standard form: 4 numbers e.g. 194.106.220.19
· Alphanumeric form:
· protcol://web address/path/filename
o Where; Protocol is usually http
MARY/CHMS,BSB/ICT/CHAPTER 4 3
o Site address consists of: computer name, domain name, domain type, and country code
o Path is the web page
o Filename is the item on the page
4.6 Email
· A method for sending text and attachments from one computer to another over a network
Advantages
o Speed of sending and receiving replies is quick
o Low cost (no stamps, paper etc.)
o Not needing to leave home to send the mail
Disadvantages
o Possibility of virus threats and hacking
o Need for the email address to be correct
o Inability to send bulky objects via emails
Intranet
· Like the internet but only accessible to specific users
· Basically, a private internet where outsiders cannot connect to it
· Uses of an Intranet:
o Web Browsing
o Email
o File Sharing
MARY/CHMS,BSB/ICT/CHAPTER 4 4
o Schools: share information and learning resources with students
o Businesses: share private information within a large company securely
INTERNET INTRANET
Access Anywhere if you are connected Only from within the company
Advantages
o The sharing of resources
o Communication between users
o Network administrator can control and monitor all aspects of the network
Disadvantages
o Easier spread of viruses throughout the whole network
o Development of printer queues
o Slower access to external networks e.g. internet
o Increased security risk
o If main server breaks down, usually the networks will no longer function
Advantages
o All computers can access the same services and resources
MARY/CHMS,BSB/ICT/CHAPTER 4 5
o No cabling is involved
o The system is more flexible
o Adding new computers and devices is very easy
o Cost is reduced, and safety is improved
Disadvantages
o Security is an issue
o Problems and interference can affect the signal
o The data transfer is slow than in the wired LAN
Desktop Computers
Advantages Disadvantages
Most websites are designed to be viewed on a Not portable so are limited to use in one
desktop room
Have larger keyboards making it easier to type on Require keyboard and mouse as extra
peripheral devices
Screens are larger so giving an easier and better Screen and Monitor consume separate
viewing experience power.
Usually use wired internet connections Cannot usually connect to devices like
which is more stable/reliable than Wi-Fi Bluetooth speakers without external adapter
Robust Take up large desk space
Good heat dissipation- large body. Bulky to carry around
Tablet Computers
Advantages Disadvantages
MARY/CHMS,BSB/ICT/CHAPTER 4 6
Smaller & lighter than desktops & laptops making it Larger & less portable than smartphones
easier to carry
Larger screen than smartphones Uses Wi-Fi to connect to the internet which
is less reliable than wired
On-screen keyboards larger than those on Screens are smaller than those on laptops &
smartphones desktops
On-screen keyboard is not easy to type on
Mobile Phones
Advantages Disadvantages
Smallest most portable of all devices Websites are often not fully displayed
People more likely to carry this wherever they go Small screen size makes viewing websites
difficult
Much easier to connect to internet on-the-go Small keyboards make it difficult to type
Allow children access to internet anywhere;
canbe dangerous
· For Policing:
o Prevent illegal material being posted
o People can easily find info on how to become hackers or make bombs
o Prevent children from accessing undesirable websites
o Could reduce the amount of incorrect information
· Against Policing:
o Material already available in other sources i.e. books
o Very expensive
o Users would have to fund
o Difficult to enforce rules
MARY/CHMS,BSB/ICT/CHAPTER 4 7
o Against freedom of information
o Laws already exist to deal with perpetrators
Inappropriate Websites
· Risk of finding undesirable websites
· Risk of doubtful websites which are not genuine
· They could lead to problems such as undesirable web links, security risks
MARY/CHMS,BSB/ICT/CHAPTER 4 8
Fingerprint Scanning: Scans the pattern on fingers and verifies it against a stored database of authenticated
fingerprints using pattern-matching software to allow access to a user.
Guidelines
· Do not leave personal information lying around
· Lock all filing cabinets when leaving an office
· Do not leave computer without locking or logging off
· Protect passwords
· Change passwords regularly
· Do not fax or email anything of sensitive nature.
· Physical Faxing: dedicated fax machine connected via telephone line that copies and electronically
sends files to the dialed recipient
· Electronic Faxing/Online Faxing: uses the internet to send documents through computers.
Email
A method for sending text and attachments from one computer to another over a network
4.15 Web-Conferencing
Video-Conferencing
· This is a method of communication between people at 2 or more separate locations
· It is done in real time and makes use of LAN, if internal, or WAN if through the internet
· Uses hardware like; webcam, microphones, speakers and monitors
· It also uses special software like CODEC converts and compresses analogue data into digital data to
send down digital lines
· How it works:
o Delegates at one end speak into a microphone and consider the webcam
o The other delegates can see them and hear them using speakers and monitors
o However, there are several problems with these as the conference call often lags and quality not always
high.
o Also, as travelling tickets increase in price, terrorists can use this way of communicating with each other,
increasing risk
Audio-Conferencing
· Same as video-conferencing but without webcam
· VOIP is often used
· VOIP (Voice over internet protocol) is a method used to talk to people over internet
· VOIP converts sound (picked up by a microphone) into discrete digital packets that can be sent to a destination
via internet
Advantage: free and can be used all over the world
MARY/CHMS,BSB/ICT/CHAPTER 4 10
Disadvantage: sound quality is usually bad
Security Issues:
o Identity and service theft
o Viruses and malware
o Spamming (sending junk mail)
o Phishing attacks (illegitimate scams)
MARY/CHMS,BSB/ICT/CHAPTER 4 11