0% found this document useful (0 votes)
98 views

Chapter 4 Networks and The Effects of Using Them

Routers enable data to be sent between different types of networks by making decisions on message routing and formatting messages for different networks. They store IP addresses in routing tables to determine the best routes for sending data packets between devices on different networks. Common network devices include network interface cards, hubs, bridges, switches, and modems. Users can access the internet through different connection types like dial-up, cable, or DSL. Web browsers are used to access and navigate the world wide web, while email allows sending messages over networks. An intranet is a private network accessible only to specific users of an organization.

Uploaded by

Jong Phoebe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views

Chapter 4 Networks and The Effects of Using Them

Routers enable data to be sent between different types of networks by making decisions on message routing and formatting messages for different networks. They store IP addresses in routing tables to determine the best routes for sending data packets between devices on different networks. Common network devices include network interface cards, hubs, bridges, switches, and modems. Users can access the internet through different connection types like dial-up, cable, or DSL. Web browsers are used to access and navigate the world wide web, while email allows sending messages over networks. An intranet is a private network accessible only to specific users of an organization.

Uploaded by

Jong Phoebe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CHUNG HWA MIDDLE SCHOOL, BSB NAME:

INFORMATION & COMMUNICATION TECHNOLOGY CLASS:

CHAPTER 4: NETWORKS & THE EFFECTS OF USING THEM

4.1 Routers
· A device that enables data to be sent between different types of networks
· Commonly used to connect computers and other network capable devices to the internet
· They can be connected to through cables or wirelessly

Function
· Makes decisions on messages being passed between the networks
· Reads information about the message and decides where the message should go and the best route for it to
get there
· Formats the messages making it suitable for the new network

How it Works
· To send data to a specific device, a router needs a something like an address
· Internet Protocol Address: a unique number assigned to all computers and devices connected to the internet
which can determine its exact physical location
· A router can use this IP to send data from the internet to the exact device that requested it
· Storing IP Addresses:
o Routers store IP addresses in a routing table
o Routing tables list all the different routes to other networks
o Routing table determines best route for data

Sending Data between Devices


· Routers can also send ‘packets’ of data between devices on different networks
· Each packet contains the data itself and the IP address of the device being sent to
· Occurs globally using multiple routers & re-routing until the data reaches its intended IP address

4.2 Common Network Devices


Network Interface Cards
· Used to connect individual computers/devices to a network
· NICs come in two distinct types:
o Wired: cards that have ports which allow network cables to be plugged in directly
o Wireless: cards that connect to networks using Wi-Fi signals

Hubs
· They are devices that can have multiple devices connected to them
· Main task is to receive data from different ports and send it to each device
· T he in fo rm at io n w il l be r ec ei ve d t o t he de vi ce w h et he r it s r el ev an t, o r no t

MARY/CHMS,BSB/ICT/CHAPTER 4 1
B ri d g es
· It connects 2 different types of networks together e.g. a bus and star network
· It can only connect networks that use the same way for handling messages
· They do this by changing the form of message to suite the different type of network
Switches
· More efficient than hubs in distributing data
· Each device has an access control media address MAC which identifies it uniquely
MAC Address: a number unique to each device connected to the network (like fingerprints)
· Data sent will have a mac address which tells the source and receiving device

Modems
· It stands for modulator demodulator.
· Converts computer’s digital signals (modulates it) into analogue for transmission through telephone lines
· Reverse this process- analogue signal from a telephone line into digital for a computer to process the data
(demodulates it)
· The main use it to connect to computer networks over long distances using existing telephone lines

Types of Modems:
· Dial-up modems: operate at 60 kilobits/sec
o slow compared to modern standards
· Asymmetric: faster at downloading than uploading
o (ADSL) asymmetric digital subscriber line modems operate at 11,000 kilobits/sec
o Don’t tie up line while accessing internet, which allows simultaneous internet access and usage of telephone
o Cable modems: allow cable TV users to receive TV signals as well as internet access

4.3 Wi-Fi & Bluetooth


Wi-Fi
· Any system which allows you to connect to a network or computer through wireless communication
· Examples:
o WLANs
o PDAs
o Laptop computers
o Peripheral devices such as printers

· Wi-Fi Hotspots
o Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send signals
o Wi-Fi hotspots are places where you can access Wi-Fi (free or paid)
o Hotspots are found in public places like Airports, hotels, and cafés
o War driving: The act of driving and searching for unsecured Wi-Fi hotspots
o This gives a risk to the Wi-Fi system

Bluetooth
· Bluetooth is an example of wireless personal area networking (WPAN) technology
MARY/CHMS,BSB/ICT/CHAPTER 4 2
· Spread spectrum transmission (radio waves) is used to provide wireless links between to devices such as
mobile phones and allow connection to the internet
· A small home network can be created with this system

Uses:
o Transfer photos from camera to mobile phone
o Wirelessly connect different external devices

4.4 Accessing the Internet


· User can access by web browser

TYPE OF ACCESS DESCRIPTION

DIAL UP INTERNET · Slowest type (60kbps)


ACCESS · Telephone line gets tied up while a dial up modem is in operation
CABLE INTERNET · Local cable television operators give user access through cable
ACCESS networks
INTERNET ACCESS VIA · Fastest download speed connections (at least 110000kbps)
DSL

4.5 Web Browser


· Software used to retrieve, present & traverse the World Wide Web
· World Wide Web: system of interlinked hypertext documents accessed via the Internet

HTTP Proxy Server


· Type of server that acts as a buffer between a WAN and a LAN
· Retrieves web pages and passes them onto the computer that made a request
· Stores any page retrieved on the server, which means that when a different computer requests the same
page it would be available
· Speeds up the browsing process

Websites
· Web is made up of millions of websites and web pages
· Web pages are documents on a computer screen containing various multimedia and text, pictures
· A website consists of many of these pages linked together Uniform Resource

Locator (URL)
· Web browsers use URLs to retrieve files
· They are multiple ways of locating on the internet
· Standard form: 4 numbers e.g. 194.106.220.19
· Alphanumeric form:
· protcol://web address/path/filename
o Where; Protocol is usually http

MARY/CHMS,BSB/ICT/CHAPTER 4 3
o Site address consists of: computer name, domain name, domain type, and country code
o Path is the web page
o Filename is the item on the page
4.6 Email
· A method for sending text and attachments from one computer to another over a network

Advantages
o Speed of sending and receiving replies is quick
o Low cost (no stamps, paper etc.)
o Not needing to leave home to send the mail

Disadvantages
o Possibility of virus threats and hacking
o Need for the email address to be correct
o Inability to send bulky objects via emails

4.7 Internet Service Provider (ISP)


· These are companies that provide users with access to the internet
· Provider in return for these services is charged a monthly or annual fee
· After paying this fee, a username and password are issued which can be used to connect to the internet

4.8 Common Network Environments


Internet
· A worldwide collection of networks and computers that have joined together
· Uses of the Internet:
o Web Browsing
o Email
o File Sharing
o Entertainment
o Video Conferencing
o Online Banking
o Advertising & Blogging
o Social Media

Intranet
· Like the internet but only accessible to specific users
· Basically, a private internet where outsiders cannot connect to it
· Uses of an Intranet:
o Web Browsing
o Email
o File Sharing
MARY/CHMS,BSB/ICT/CHAPTER 4 4
o Schools: share information and learning resources with students
o Businesses: share private information within a large company securely

Comparing Internet & Intranet

INTERNET INTRANET

International Network Internal Restricted Access Network


Phrase Origin

Globally share data Privately share data


Purpose

Wide range of people Specific company or Organization


Audience

Access Anywhere if you are connected Only from within the company

Local Area Networks (LAN)


· Not over a large geographical area (e.g. in one building)
· Typical LAN will consist of several computers and devices
· Devices and computers will be connected to hubs or switches
· One of the hubs or switches will usually be connected to a router/modem to allow LAN to connect to the internet
· In doing so it then becomes part of a wide area network

Advantages
o The sharing of resources
o Communication between users
o Network administrator can control and monitor all aspects of the network

Disadvantages
o Easier spread of viruses throughout the whole network
o Development of printer queues
o Slower access to external networks e.g. internet
o Increased security risk
o If main server breaks down, usually the networks will no longer function

Wireless LANs (WLANs)


· Do not involve any wiring or cabling
· Provide wireless network connection overs a short distance
· They use radio or infrared signal's instead of cables
· Devices known as Access Points (APs) are used for a larger range
· APs usually use spread spectrum technology (larger range)

Advantages
o All computers can access the same services and resources
MARY/CHMS,BSB/ICT/CHAPTER 4 5
o No cabling is involved
o The system is more flexible
o Adding new computers and devices is very easy
o Cost is reduced, and safety is improved

Disadvantages
o Security is an issue
o Problems and interference can affect the signal
o The data transfer is slow than in the wired LAN

Wide Area Networks (WAN)


· WAN is formed by several LANs being connected through a router or a modem
· Some companies set up Private WANs, it is expensive however it comes with a more enhanced security
· It is common to use an Internet service provider (ISP) for connections to the internet and communicate via
this network system
· Additional hardware is needed for a WAN: Routers, modems and proxy servers

4.9 Using Different Types of Computers to Access the Internet


Laptop computers
Advantages Disadvantages
More portable than desktops can access Less portable than tablets/smartphones
internet in more locations
Larger screen than tablets & smartphones Screens not as large as desktop PCs may not
which allows easier reading appear as clearly
Keyboards are bigger than those on CPUs are not as powerful as those in
tablets/smartphones desktops
Touchpads allows easy navigation even on
slanted surfaces

Desktop Computers
Advantages Disadvantages
Most websites are designed to be viewed on a Not portable so are limited to use in one
desktop room
Have larger keyboards making it easier to type on Require keyboard and mouse as extra
peripheral devices
Screens are larger so giving an easier and better Screen and Monitor consume separate
viewing experience power.
Usually use wired internet connections Cannot usually connect to devices like
which is more stable/reliable than Wi-Fi Bluetooth speakers without external adapter
Robust Take up large desk space
Good heat dissipation- large body. Bulky to carry around

Tablet Computers
Advantages Disadvantages
MARY/CHMS,BSB/ICT/CHAPTER 4 6
Smaller & lighter than desktops & laptops making it Larger & less portable than smartphones
easier to carry
Larger screen than smartphones Uses Wi-Fi to connect to the internet which
is less reliable than wired
On-screen keyboards larger than those on Screens are smaller than those on laptops &
smartphones desktops
On-screen keyboard is not easy to type on

Mobile Phones
Advantages Disadvantages
Smallest most portable of all devices Websites are often not fully displayed
People more likely to carry this wherever they go Small screen size makes viewing websites
difficult
Much easier to connect to internet on-the-go Small keyboards make it difficult to type
Allow children access to internet anywhere;
canbe dangerous

4.10 Network Security Issues


· Connection to a network exposes a user to:
o Hacking: Unauthorised access given to computer.
o Phishing: Phishing involves getting sensitive information such as usernames, passwords, and credit card
detail, for malicious reasons, by mimicking a reliable webpage on the network
o Pharming: Pharming is a scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent Web sites without their knowledge or consent. 
o Viruses: A computer virus is a malicious software program loaded onto a user's computer without the user's
knowledge and performs malicious actions. ... It can self-replicate, inserting itself onto other programs or files,
infecting them in the process.
Policing the Internet
· Currently, the internet has no boundaries
· Anything and everything can be put online

· For Policing:
o Prevent illegal material being posted
o People can easily find info on how to become hackers or make bombs
o Prevent children from accessing undesirable websites
o Could reduce the amount of incorrect information

· Against Policing:
o Material already available in other sources i.e. books
o Very expensive
o Users would have to fund
o Difficult to enforce rules
MARY/CHMS,BSB/ICT/CHAPTER 4 7
o Against freedom of information
o Laws already exist to deal with perpetrators

Inappropriate Websites
· Risk of finding undesirable websites
· Risk of doubtful websites which are not genuine
· They could lead to problems such as undesirable web links, security risks

4.11 Password Interception


Spyware
· Spyware is software that gathers user information through their network connections without them being
aware that this is happening
· Once spyware is installed, it monitors all key presses and transmits the information back to the person who
sent out the spyware
· This software can install other spyware software, read cookies and personal information, and change the
default home page or web browser
· Anti-spyware can be used to search out this software and correct the corruption

Weak & Strong Passwords


· Strong passwords: A random mix of alphabets (uppercase and lowercase), numbers, and keyboard
symbols (@, %, ^ etc.)
· Weak passwords: Easy to guess, e.g. users name or date of birth or 1234556, etc.
· Frequent password changes can help reduce the chances of password interception too
· Passwords must not be shared, their strength is then of little use.

4.12 Authentication Techniques


Magnetic Stripes: Card swiped through a magnetic stripe reader that authenticates the user after reading
iron-based magnetic particles on a band of magnetic material on the card which is also called a magstripe.
ID Cards: Usually a photo ID with a QR or barcode that authenticates the user.
Passports: Have an RFID chip on it that responds to a signal sent by a RFID reader that sends information
about the passport holder to the computer system
Physical Tokens: A security token (sometimes called an authentication token) is a small hardware device
that the owner carries to authorize access to a network service. The device may be in the form of a smart card
or may be embedded in a commonly used object such as a key fob.
Retina Scans: Scans the unique pattern of blood vessels in the eye of a user using an unperceived beam of
low-energy infrared light into a person's eye as they look through the scanner's eyepiece.
Iris Scans: A scanner scans and compares the pattern in the iris of a user to a database of stored iris patterns, if it
finds a match, the user is authenticated. Iris scans are generally more accurate than retinal scans.
Face Recognition: Verifies the face of the person attempting to access the data using a face recognition
algorithm and identifies facial features by extracting landmarks, or features, from an image of the subject's
face.

MARY/CHMS,BSB/ICT/CHAPTER 4 8
Fingerprint Scanning: Scans the pattern on fingers and verifies it against a stored database of authenticated
fingerprints using pattern-matching software to allow access to a user.

4.13 Data Protection Act


· Failure to abide to rules can lead to fines or imprisonment

Rules (SAREF DES SAS)


1. Data must be Fairly and lawfully processed
2. Data can only be processed for the Stated purpose
3. Data must be Adequate, Relevant and not Excessive
4. Data must be Accurate
5. Data must not be kept longer than necessary (Short time)
6. Data must be processed in accordance with the data Subject’s right
7. Data must be kept Secure
8. Data must not be transferred to another country unless (Domestic) they have adequate protection

Guidelines
· Do not leave personal information lying around
· Lock all filing cabinets when leaving an office
· Do not leave computer without locking or logging off
· Protect passwords
· Change passwords regularly
· Do not fax or email anything of sensitive nature.

4.14 Network Communication


Facsimile (Fax)
· A system that scans documents electronically and converts them into a bit map image (a bit is a binary digit
and is a 1 or a 0)
· Then transmitted as a series of electrical signals through the telephone network
· Receiving fax machine converts the electronic image and prints it out on paper
· It is also possible to generate fax signals from a computer to allow documents to be sent to a fax
machine
· Saves printing out the document first and then passing it through the fax machine
· Fax/modem software in the computer converts the image into a form fax machines can be
recognized

· Physical Faxing: dedicated fax machine connected via telephone line that copies and electronically
sends files to the dialed recipient

· Electronic Faxing/Online Faxing: uses the internet to send documents through computers.

PHYSICAL FAXING ELECTRONIC FAXING


Associated with a phone number only Associated with an email address and phone
MARY/CHMS,BSB/ICT/CHAPTER 4 9
number.
Need actual fax machine, paper, etc. Cheaper- no fax machine, paper and ink
No encryption Better safety- encryption
The signal can get busy No busy signal issues

Email
 A method for sending text and attachments from one computer to another over a network

Comparing Faxing & Email


Fax Email
Singed faxes are legally acceptable More secure (user id and password needed to
access files)
Poor quality prints at times Digital files (no need to print – eco-friendly)
Delay is telephone line busy Better quality
Slow if several documents need to be sent Files can be transferred between any device
connected to the internet
Every recipient must be dialed up one by Faster sending of documents per document
one and even if multiple recipients
Expensive to buy No dedicated device needed

4.15 Web-Conferencing
Video-Conferencing
· This is a method of communication between people at 2 or more separate locations
· It is done in real time and makes use of LAN, if internal, or WAN if through the internet
· Uses hardware like; webcam, microphones, speakers and monitors
· It also uses special software like CODEC converts and compresses analogue data into digital data to
send down digital lines

· How it works:
o Delegates at one end speak into a microphone and consider the webcam
o The other delegates can see them and hear them using speakers and monitors
o However, there are several problems with these as the conference call often lags and quality not always
high.
o Also, as travelling tickets increase in price, terrorists can use this way of communicating with each other,
increasing risk
Audio-Conferencing
· Same as video-conferencing but without webcam
· VOIP is often used
· VOIP (Voice over internet protocol) is a method used to talk to people over internet
· VOIP converts sound (picked up by a microphone) into discrete digital packets that can be sent to a destination
via internet
Advantage: free and can be used all over the world

MARY/CHMS,BSB/ICT/CHAPTER 4 10
Disadvantage: sound quality is usually bad
Security Issues:
o Identity and service theft
o Viruses and malware
o Spamming (sending junk mail)
o Phishing attacks (illegitimate scams)

MARY/CHMS,BSB/ICT/CHAPTER 4 11

You might also like