Chap 4 Notes Ict
Chap 4 Notes Ict
4.1 Networks
Computer systems connected together in some way to form is known as a network.
Network allows computers to share files, resources. A computer that is not connected to a network is known
as Stand-alone computer. Network connections are created using cables (wires), radio signals or by satellite
links.
4.1.1 Modems:
Modem means ‘modulator demodulator’ and is a device that converts a computer’s digital signal into an
analogue signal for transmission over an existing telephone line.
Modems are used to allow computers to connect to network over long distances using existing telephone
networks.
Dial-up modem operate at the speed of about 60 kilobits per second, which is very slow. Modern broadband
operate at 11,000 kilobits per second.
4.1.1.1 HUB
Hubs are hardware devices that can have a number of devices or computers connected to them. Hub is used at
the centre of star topology.
Its main task is to take data which receives through one of the ports and then send out this data from all of the
ports. Each computer or device will receive the data, whether it is relevant or not.
Hub is a dumb device, if it receives a message, it sends it to every computer on the network. This means that
hub-based networks are not very secure.
4.1.1.2 SWITCH
Switch is like a hub which connects number of computers together to make a LAN. The use of a switch is at the
centre of star topology.
The switch has cables plugged into computers to connect to a network. A switch is a more intelligent device than
a hub. If it receives a message, it checks who it is addressed and only sends it to that specific computer.
Because of this, networks that use switches are more secure than those that use hubs, but also a little more
expensive.
Switch only sends packets of data to the computer, it reduces the amount of data on the network, thus speeding
up the network.
4.1.1.3 Bridge
Bridges are used to connect LANs together. When one of the LAN sends a message, all the devices on the LAN
receive the message.
This increases the amount of data flowing on the LAN. Often a large LAN is divided into a series of smaller LANs.
If a message is sent from one computer in a LAN to another computer in a different LAN, then the message
needs to pass between the LANs using the bridge.
A bridge therefore, usually has only two ports in order to connect one LAN to another LAN.
4.1.1.4 Router
Routers are hardware devices that read the address information to determine the final destination of the packets.
Each computer linked to the internet is given a number which is called Internet Protocol address (IP address).
When data is transferred from one network to another, the data is put into packets. The packets contain details
of the destination address of the network it is intended for.
Computers on the same network have the same first part of the IP address and this is used to locate a particular
network.
IT can be used to join wired or wireless networks together.
Packets of data usually contain information such as:
Sender’s IP address
Receiver’s IP address
Identity number of each packet
Some form of header to identify the packets
How many data packets make up the whole ‘message’.
4.1.1.5 Gateway
A gateway is a network point or node that acts as an entrance to another network. It is a key point for data on its
way to or from other networks. All networks will have boundaries so that all communication within the network is
conducted using devices such as switches or routers. If a network node needs to communicate outside its
network, it needs to use a gateway.
4.1.2 Internet protocol (IP) and media access control (MAC) addresses
4.1.2.1 Internet protocol (IP)
Each device on the internet is given a unique address known as its internet protocol (IP) address. This is a 32-
bit number that is usually written in the form:
Example: 109.108.158.1
A home computer is given an IP address when it connects to the internet. This is assigned by the ISP and it is
unique for that particular internet session. The only IP addresses that remain fairly unchanged are web servers.
An IP address can be used instead of typing in the full URL; for example, http://109.108.158.1 would take you
straight to the device containing web page corresponding to this address.
4.1.3.2 Bluetooth
Bluetooth sends and receives radio waves in a band of 79 different frequencies. Devices using Bluetooth
automatically detect and connect to each other, but they don’t interfere with other devices since each
communicating pair uses a different channel.
When a device wants to communicate, it picks one of the 79 channels at random. If the channel is already being
used, it randomly picks another channel. This is known spread-spectrum frequency hopping.
Hardware requirements:
One or more switches or hub to link devices together.
Network cables to connect devices to the switch.
A separate wireless access point to allow wireless devices to connect to the network.
A router to connect your LAN to the WAN.
A firewall to protect your network from the hackers.
A bridge is required if you already have a section of the network and you want new network to connect
to it.
Software requirements:
Web browser to access internet
Firewall – if it is software
Anti-virus to protect your network
Apart from the hardware and software, you would also have to think about doing the following:
Set up an account with an ISP
Set up the system.
Configure hardware and software so that everything works with the network.
Get an internet connection installed from the ISP.
Putting all common software onto a server and making sure that network license is acquired.
Set up privileges so that each user can only access their own area or common shared area.
Servers to network-manager-level of privilege so that they can monitor network usage, change
passwords, etc.
Local Area Network or LAN is usually within one building or not over a large geographical area. A LAN consists
of a number of computers and devices, e.g., printers, which will be connected to hubs or switches.
Advantages:
The sharing of resources (such as expensive peripherals and application software).
Communication between users is easy.
A network administrator to control and monitor all aspects of networking (For example, changing
password, monitoring internet, etc.)
Disadvantages:
Easier spread of viruses through the whole network.
The development of queues for printer, which can be frustrating.
Slower access to networks, such as internet.
Increased security risk as compared to stand-alone computers.
If the main server breaks down, in most cases, the network will no longer function.
A Wide Area Network is formed by a number of LANs being connected together through either a router or
modem. Some companies setup private WANs. This is expensive but comes with an advantage of much
enhanced security and speed. It is common to use an Internet Service Provider (ISP) for connections to the
internet and communicate through this network system.
Advantages:
A WAN is a network that extends over a large area.
WAN can be connected using optical fibre cable, satellite link, radio signals, etc.
Disadvantages:
Very expensive.
Limited access.
Data access slows down if spread over huge area.
Wireless Local Area Networks or WLANs are similar to LANs, but there are no wires or cables.
They provide wireless network communication over very short distances (a few metres) usually radio or infra-red
signals instead of cables.
Devices known as access points are connected into the wired network, at fixed locations.
Because of the limited range, most commercial WLANs need several access points, to permit uninterrupted
wireless communication.
The access point receives and transmits data between the WLAN and the wired network structure.
Advantages:
All computers can access the same services and resources. E.g., printers, scanners, internet access,
etc.
There is no cabling to individual computers and devices so safety is improved.
The system is more flexible since, users can move their laptops from their desks.
Adding new computers and devices is a very easy task and costs are reduced, since no extra cabling is
needed.
Disadvantages:
Security is a big issue, since anyone with a WLAN enabled laptop or computer, can access a network if
it can pick up a signal.
There may be problems of interference, which can affect the signal.
Data transfer is slower than LAN.
4.2.2 Authentication
Authentication is used to verify that data comes from a secured and trusted source.
It works with encryption to strengthen internet security, for example: User ID and passwords are authentication
techniques.
Some forms of authentication include:
Digital certificates
Biometrics
Magnetic stripe cards/ id cards/ passports.
Example: Passport control at an airport
The passport page containing the photograph is placed face down on a reader.
A microchip embedded in the page is now read by a reader and the facial image on the passport is also
scanned in.
The owner of the passport now looks up at a digital format and a photograph is taken.
The photograph is converted into a digital format so that it can be compared to the scanned facial image.
The data read from the microchip is also compared to data stored on a central database.
The scanned image from the passport and photograph just taken by the camera must match and the
data stored on the microchip must also match up with the data on a central database; if either produces
any differences the passport is rejected.
4.2.3 Viruses
This section considers how the risk of viruses can be minimized when using the internet or any situation where
data is transferred from computer to computer or other electronic devices – it is important to point out that tablets
and mobile phones can be infected by viruses. Ways of preventing or minimizing the risk of viruses are outlined
below:
Antivirus software:
Running antivirus software in the background on a computer will constantly check for virus attacks.
Common features of antivirus software is as follows:
Check software or files before they are run or loaded on a computer
Antivirus software compares a possible virus against a database of known virus.
Heuristic check is carried out.
Any files that are infected are put into quarantine that:
o Allows the virus to be automatically deleted or
o Allows the user to make the decision about deletion.
Antivirus software needs to be kept up to date.
Full system checks need to be carried out once a week.
Avoiding viruses when accessing the internet:
Avoid looking into unknown or suspicious websites.
Look for security indicators such as https or padlock symbols.
While accessing a new website, instead of clicking the link sent to email, copy paste the URL into the
address bar. This can help you to avoid links to bogus/ fake websites.
Viruses from hardware devices:
It is unsafe to plug in a device from an unknown source.
Even memory sticks or DVDs from friends could still be infected unless they have also carried out all the
necessary precautions.
Advantages:
Saves money as business does not have to spend money on travelling, hotel rooms, meals, etc.
Less stress as employees don’t have to experience delays at airports, accidents, road work, etc.
Meeting can be called at very short notice without too much planning.
Improved family life as less time spent away from homes, staying in hotels.
Improved productivity of employees as they are not wasting time in travelling.
Disadvantages
Delays when talking.
Jerking images due to poor internet.
Can be very expensive to set up.
There will be problems if the delegates live in different countries where the time zone differences are
large.
Training people to use the system can be costly and time consuming.