0% found this document useful (0 votes)
12 views

Unit 04 - Networks and Effects of Using

Uploaded by

sohailhammad16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Unit 04 - Networks and Effects of Using

Uploaded by

sohailhammad16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

IGCSE ICT (0417)

Networks and effects of


Unit 04
using them
NETWORKING

Networking is a process of connecting


computers and related devices (I/O) so
that they can communicate and share data
and other resources among each other.
NETWORK

Network is a group of connected


computers and related devices(I/O) which
can communicate and share data and
other resources among each other.
Local Area Network(LAN)

It’s a group of computers connected on a


small geographical area like, for example
computers connected in a computer
laboratory or computers connected from
different offices in a building.
Local Area Network(LAN)
Wireless Local Area Network(WLAN)

Computers and other short range devices


are connected together via wireless
connection methods like a WiFi router. It
works on the base of the Radio waves.
Wireless Local Area Network(WLAN)
Wide Area Network(WAN)

Many Local Area Networks(LANs) and


individual devices are connected into WAN
which spans over a large geographical area
i.e. across the entire city, country, or
continent and whole world. It is the
largest network that connects the entire
globe’s computers.
Examples of WAN

 Internet
 The ATM facility of banks
 A Company network with distant offices
 Mobile broadband
 Metropolitan Area Network
Wide Area Network(WAN)
Client/Server Network
It’s a group of connected computers in
which one computer serves as a main or
central computer and controls the activities
on the connected computers. The
main/central computer is called a Server
and other computers in the network are
known as Clients/workstations.
Client/Server Network
Client/Server Network
 There is one dedicated computer called
server, serves as the administrator and
controls all other computers in the
network.
 Server holds huge resources.
 All data are stored in the server.
 Server privileges resources to other
computers
Client/Server Network
 Sharing of data and resources is
controlled by a Server.
 Server controls the user names and
passwords.
 Security is better in these networks as all
the shared resources are centrally
administered.
Peer to Peer Network
It’s a group of connected computers in
which all computers have their own
resources i.e. storage devices etc. All
computers can freely communicate and
share data and other resources to each
other without any centralized control. It is
also known as peer group or workgroup.
Peer to Peer Network
Peer to Peer Network
 There is no dedicated central computer.
 All computers have their own resources.
 Every computer has the privilege to
control its own resources.
 User names and passwords are created
and controlled by every computer
individually.
Metropolitan Area Network(MAN)

It is a type of Wide Area Network and is


made up of multiple LANs. It is used to
transfer data with high speed within a city.
Metropolitan Area Network(MAN)
Examples of MAN
 The best example of a MAN is Cable TV.
The cable TV is situated in the middle of
a city and from there, its cable spreads
throughout the city and the user uses
the service through the cable network.
 A business organizations have their own
MAN. Through which it connects to a
different branch.
Personal Area Network(PAN)

It is a type of Local Area Network in which


personal electronic gadgets may be
connected for sharing of data. A PAN may
use Ethernet, Wi-Fi, and Bluetooth
connections to connect devices.
Personal Area Network(PAN)
Examples of PAN

 Smartphone tethering using internet


with a cellular data.
 Mobile hotspot or personal hotspot
that makes it work as a wireless router.
Virtual Private Network(VPN)
VPN is a type of WAN. It makes the
internet or WiFi connection secure from
the internet predators or hackers while
accessing any website or transferring
personal data. VPN secures data in both
computer and mobile.
These types of networks are mostly used
for security purposes.
Virtual Private Network(VPN)
How VPN Is Created?
A VPN is created by establishing a virtual
point-to-point connection through the use
of dedicated circuits or with tunneling
protocols over existing networks.
A VPN available from the public Internet
can provide some of the benefits of a wide
area network (WAN).
How VPN Works?
Examples of VPN

 One can access any blocked websites.


 VPN service is used by online working
merchants, organizations, government
agencies, educational institutions, and
corporations to protect their important
data and privacy from unauthorized
users and hackers.
Dumb Terminal Network
 Dumb terminals network is a networking
of computer devices. There is only one
central computer and all input and
output interfaces are connected to the
central computer.
 Dumb terminals can input or output
data but processing and storage of data
takes place in the central computer.
Dumb Terminal Network
 This network is mostly used in
educational institutions, super markets,
railway stations, metro stations, airports
or passport offices etc.
Dumb Terminal Network
Network Topologies
A Network Topology is the physical or
logical layout/arrangement of computers
in a network.
Network Topologies
A Network Topology is the physical or
logical layout/arrangement of computers
in a network.
Network Topologies
There are three basic types of network
topologies:

1. Bus topology
2. Star topology
3. Ring topology
Bus Topology

In bus topology all devices on the network


are connected along a single cable from
one end of the network to the other. The
cable is known as “backbone”.
Bus Topology
Advantages of Bus Topology

 Bus topologies are cost-effective for


smaller networks.
 More computers can be easily added to
the network by joining additional cables.
 Installation of bus topology is simple and
easy and less time consuming.
Disadvantages of Bus Topology
 If backbone cable experiences failure
whole network goes down.
 Bus topologies are best suited for small
networks only.
 data transmission is “half-duplex” which
means it can’t be sent in two opposite
directions so it is not the ideal choice for
networks with huge data traffic load.
Star Topology

In bus topology all devices on the network


are connected along a single cable from
one end of the network to the other. The
cable is known as “backbone”.
MAC Address
MAC is an abbreviation of Media Access
Control. MAC address is the unique
address of each hardware component or
computer on a network that uniquely
identifies it.
Networking Devices
 Network Interface Card(NIC)
 Network Cable
 RJ45 Connector
 Hub/Switch
 Modem
 Bridge
 Router
 Gateway
 Wi-Fi Router and Bluetooth
Networking Devices
Network Interface Card(NIC)
An NIC is a hardware component which
connects a computer to a network. It is
also known as
network interface
controller, network
adapter or LAN
adapter.
Networking Devices
Network Interface Card(NIC)
An NIC is directly connected on the motherboard
and has external port/socket so that the
computer can be connected to the network.
An NIC does the following jobs:
1. It provides unique address to computer.
2. It prepares the data for sending.
3. It sends the data.
4. It controls the flow of data from the computer
to the transmission media.
Networking Devices
Wireless NIC
A wireless NIC connects to a wireless
network, rather than
using a cable. It
includes all cellular
or Wi-Fi devices.
Networking Devices
Network Cable
Network cables are
physical media to connect
computers and other devices
on the network.
Cables have advantage over Wi-Fi devices as:
1. data transfer rate is faster
2. data is more secure than Wi-Fi devices
3. Fibre optic cables provide faster data
transfer rate than copper.
Networking Devices
RJ45 Connector
It is standard device to connect network
cable into computer’s port.
Networking Devices
Hub
A hub is a hardware component which
connects many computers and other
devices in a LAN.
Networking Devices
Hub
Hub receives a data packet from one of its
ports and broadcasts it to all computers in
that network then whichever computer
matches the address accepts the data
packet and all other computers reject it.
Networking Devices
Hub in a LAN
Networking Devices
How does a Hub pass a data packet?
Networking Devices
Switch
A switch is a hardware component which
connects many computers and other
devices in a LAN.
Networking Devices
Switch
A switch receives a data packet from one
of its ports, works out the destination
MAC address and sends the data packet to
the appropriate computer(s) in the
network. This makes a switch more secure,
reliable and intelligent device.
Networking Devices
Switch in a LAN
Networking Devices
How does a Switch pass a data packet?
Networking Devices
Modem
Modem is a portmanteau of modulator and
demodulator. It is an electronic device that
performs dual function of data conversion.
Modulator converts digital data from
computer into analogue signal to transmit in
an analogue internet cable.
Demodulator converts analogue signal into
digital data from an analogue cable into a
computer
Networking Devices
Modem
Modem is used on the network where the
data transmission cables are analogue so
that data is converted into analogue form
before it is put on the transmission line
from a computer and into digital form
before it is received into a computer from
a transmission line.
Networking Devices
Modem
Networking Devices
Modem
Modem is also known as analogue to digital
converter and digital to analogue
converter(ADC/DAC). ADC/DAC is also used
in automated systems where data is
captured using sensors and passed to a
computer system as analogue data. This
data is also converted into digital form
before receiving into a computer.
Networking Devices
Dial-up Modem
Dial-up modem is used to access internet using
the public switched telephone network to establish
a connection to an Internet service provider (ISP)
by dialing a telephone number on a
conventional telephone line.
Dial-up modem operate at very low speed of
approximately at 60 kilobits per second.
Networking Devices
Dial-up Modem
Networking Devices
Asymmetric Digital Subscriber Line(ADSL)
ADSL modem operate at very high speed when
specially fibre optic cable is used for data
transmission. The word asymmetric refers that the
modern modem is faster at downloading the data
than uploading the data.
ADSL still use the telephone line but they don’t tie
up the telephone line like dial-up modem. In ADSL
telephone line remains on so internet traffic and
telephone conversation can occur at the same time
because ADSL uses wide bandwidth.
Networking Devices
Asymmetric Digital Subscriber Line(ADSL)
Networking Devices
Bridge

A bridge is a hardware device that connects a LAN


to another LAN that uses the same
protocols(communication rules). They are often
used to connect different parts of a LAN so that
they can function as a single LAN. They send a data
packet to all possible destination addresses.
Networking Devices
Bridge in a Network
Networking Devices
Router
A router is a hardware device that
connects a LAN or individual computer to
another LAN or WAN(internet). A router
routs a data packet among different
networks.
Broadband routers sit behind a firewall.
Firewall protects the computers from
unauthorized access.
Networking Devices
Main Functions of Router
 It transmits internet and transmission
protocols between two networks.
 It also allows private networks to be
connected.
Networking Devices
How does a network/individual computer
connect to the internet?
Every device on the internet is provided a
unique address by an ISP(Internet Service
Provider). This address is known as an
IP(Internet Protocol) address. An internet user
uses this address to configure his/her computer
to connect to the internet.
All devices on a network has the same IP
address.
Networking Devices
Internet Protocol (IP) Address
An IP(Internet Protocol) address is
provided by an ISP to connect a computer
or a network to the internet. An IP address
is a 32-bit number like 109.108.158.1
The IP address is unique for a particular
internet session. The only IP addresses
that remains fairly unchanged are the web
servers.
Networking Devices
Internet Protocol (IP) Address
Networking Devices
Internet Protocol (IP) Address
An IP address can be used instead of
typing in the full URL; for example,
http://109.108.158.1 would take us to the
device containing the web page
corresponding to this IP address.
Networking Devices
Internet Protocol (IP) Address
Networking Devices
Difference between an IP address and a
MAC address
 An IP address is the location of the
device on the internet while MAC
address is the address of the device
connected to the internet.
 IP address keeps changing but MAC
address doesn’t change.
Networking Devices
Uniform Resource Locator(URL)
A browser uses a URL to access websites
and retrieve files etc.
These URLs are actually mask of the IP
addresses of the web servers which
comprise a set of four numbers for
example 109.108.158.1
(http:// 109.108.158.1 ).
Networking Devices
Uniform Resource Locator(URL)
However this is not very user friendly so a
mask of alphanumeric format is used
instead, for example:
http://www.hoddereducation.co.uk
The above URL can be broken in four
segments like:
109 => www => domain host
108 => hoddereducation => website name
Networking Devices
Uniform Resource Locator(URL)

The web browser translates the web


server name into an IP address. The html
is returned and shows correctly formatted
page.
Networking Devices
How does a router stores the MAC address
of the computer?
A router stores MAC addresses of the
computers on the network in a routing table.
It stores the MAC address of the device,
assigned IP address, and the lease time IP
address is assigned for. The bits forming the
destination IP address in the data packet are
used to point to the correct route.
Networking Devices
How does a router stores the MAC address
of the computer?
The data packet is sent to the number of
routers until it reaches the final destination.
Networking Devices
How does a router send data packet?
1. Router reads the destination address
from the data packet sent to it from any
computers on the network.
2. Router then sends the data packet to
the appropriate switch at first priority.
3. The switch then passes the data packet
received on the appropriate destination
MAC address of a computer.
Networking Devices
How does a router send data packet?
4. If the MAC address doesn’t match to
any MAC addresses on the address
table of the switch then it passes the
data packet to another switch.
5. The data packet keeps on passing to
other switches unless MAC address of
the appropriate computer matches.
Networking Devices
How does a router send data packet?
Sending data packets through a router is
called data routing.
Networking Devices
How does a router send data packet?
Networking Devices
How does a router send data packet?
Networking Devices
Data Packet
Data packet is an amount of data which is
transmitted over a transmission line from
sender computer on a network to another
computer on another network. Data
packet usually contains the following
information:
1. Header to identify the data packets
2. Sender’s IP address
Networking Devices
Data Packet
3. Receiver’s IP address
4. Information that how many data
packets make the whole message.
5. Identity number of each data packet
When data packets are received on the
destination computer, they are
reassembled according the order of the
identification number of the packets.
Networking Devices
Bluetooth
Bluetooth is a wireless networking device
which uses radio waves to transmit data.
Bluetooth uses band of 79 different
frequencies to send and receive data
known as channels. All these frequencies
are centered on 2.45 GHz. Bluetooth
devices automatically detect each other.
Networking Devices
Bluetooth
Bluetooth devices don’t interfere with
other devices as each connected pair uses
a different channel from 79 different
frequencies. When a device wants to
connect to another device, it randomly
picks one of the 79 channels/frequencies
but if this channel is already busy it picks
another channel randomly.
Networking Devices
Bluetooth
Bluetooth devices don’t interfere with other
devices as each connected pair uses a
different channel from 79 different
frequencies. When a device wants to connect
to another device, it randomly picks one of
the 79 channels/frequencies but if this
channel is already busy it picks another
channel randomly which is known as Spread-
spectrum frequency hopping.
Networking Devices
Bluetooth
Paired devices through Bluetooth constantly
change frequencies to mitigate the risk of
interference with other devices. It is useful to:
 transfer data between two devices which
are very close to each other(<30 meters)
 transfer data where speed is not critical
 transfer data to low bandwidth applications
for example sending music files from mobile
phone to head set
Networking Devices
Some Uses of Bluetooth
 For wireless communication between input
and output devices
 Communication between mobile phone and
wireless hands-free headset
 Creating a very short range private network
where bandwidth is not a problem
 Communication using game controller. Many
game consoles use Bluetooth technology
Networking Devices
Wi-Fi
 A wireless transmitter/router called
Wireless Access Point(WAP)/Hotspot
uses broadband internet connection to
receive from or send data to a network.
 Wi-Fi uses radio waves to receive or
send data.
 It converts data received into radio wave
signals to send it.
Networking Devices
Wi-Fi
 Access range of a Wi-Fi router depends on
the type of wireless routers. If there are
obstacles like walls then the range may be
up to 50 meters indoor and 100 meters
outdoor in open area.
 A computer or other device on the network
receives the data in the form of radio
waves via an installed wireless adaptor.
Networking Devices
Wi-Fi
 Similarly a computer or other device on the
network transmits data via wireless
adaptor installed in the computer.
 Wi-Fi is suitable for a full scale networking,
fast data transfer rate, more range and
more security.
Networking Devices
Wi-Fi Network
Networking Devices
Difference Between Bluetooth and Wi-Fi
Bluetooth Wi-Fi
Transmission frequency is 2.4 Transmission frequency is 2.4, 3.0,
GHz 5.0 GHz
Data transfer rate is 25 Data transfer rate is 250
Megabits/second Megabits/second
Maximum effective range is 30 Maximum effective range is 100
meters meters
Maximum number of devices Maximum number of devices
connected are 7 connected depend on the router or
number of routers
Uses key matching encryption Most commonly uses wireless
for data security equipment privacy(WEP) and Wi-Fi
Protected Access(WPA)
Networking Devices
Advantages of Wireless Communication
 We can move to any confortable place to
work
 No risk of tripping over trailing wires
hazards
 No extra cost of wires and their installation
 No risk of electrocution through naked
wires
 Work area is more neat and clean as there
are no trailing wires
Networking Devices
Disadvantages of Wireless Communication
 Data transfer rate is slower than in wires
 Less secure than wired communication
 Radiations can be a risk to health
 Limited access range as compared to wires
 Obstacles can weaken the strength of the
signals which reduce the access range
 Access may be weak or may not be
available in some areas i.e. depression
areas
Internet, Intranet and Extranet
Internet
The internet is a world wide collection of
networks that allows users to communicate.
The internet is a concept rather than an
intangible thing.
It relies on the infrastructure that allows
networks to connect other networks.
Internet, Intranet and Extranet
Internet
Internet, Intranet and Extranet
Internet
World wide web(www) is part of the internet.
World wide web comprises massive collection
of web pages globally which can be accessed
using a software called a web/internet browser.
It uses hypertext transfer protocol(http)
protocols to request web pages and access
them on our computer.
Internet, Intranet and Extranet
Uses of internet
The internet allows users to:
 Send and receive emails
Some 20 million e-mail messages cross the
Internet every week.
 Online chat
using text, voice, or video
 Transfer data using file transfer protocols (ftp)
 Download files
 Browse the world wide web for research and
information
Internet, Intranet and Extranet
Uses of internet
 Social networking and forums
It includes Facebook, twitter, messenger etc.
 Interactive games
 Education and self-improvement
On-line courses and workshops have found yet
another outlet.
 Electronic newspapers and magazines
This category includes late-breaking news,
weather, and sports.
Internet, Intranet and Extranet
Uses of internet
 Job-hunting
Classified ads are in abundance.
 Online shopping
It appears that “cybermalls” are more for
curious than serious shoppers.
Internet, Intranet and Extranet
Intranet
An intranet is a network which uses internet
technology for sharing data and information
locally within an organization to meet the
organizational needs only.
 Access to the intranet is controlled by
encryption, user names and passwords.
 Communication from and to external users is
completely restricted
 Access to intranet is restricted by installing a
hardware firewall.
Internet, Intranet and Extranet
Intranet
Internet, Intranet and Extranet
Uses of intranet
There are number of reasons to adopt for
intranet:
 Intranet is safer as access from
outside(hackers and viruses) is restricted
 It is possible to restrict external web links
like Facebook, YouTube etc which may
distract the attention of the employees
from work to waste time
Internet, Intranet and Extranet
Uses of intranet
 organizations ensure that the information
available is specific to their need
 Organizations can keep their data and
information confidential and can’t be
disclosed to outside channels
 Intranet provides better bandwidth than
internet
Internet, Intranet and Extranet
Extranet
When specific users from outside are
allowed to access data and information from
an intranet provides data and information on
the intranet it is known as the extranet.
External users can access extranet by using
user names and passwords. This enables for
example trading partners to share
commercially sensitive information using
controlled access.
Internet, Intranet and Extranet
Extranet
Internet, Intranet and Extranet
ISP
ISP is an abbreviation for Internet Service
Provider. It is an organization that
provides Internet access to businesses, families,
and mobile users. ISPs use fiber-optics, satellite,
copper wire, and other forms to provide
Internet access to its customers for example
Zong, WiTribe, Nayatel, PTCL etc.
Set Up & Configuring a Small Network

 Set up an IP account(if internet is required)


 Purchase appropriate ardware
Video Conferencing

Video conferencing is communication between two


or more than two people from different places in
real time. It uses video and audio. It allows people
to conduct virtual meetings. It is a substitute of
face-to-face. It makes use of some form of
network.
Video Conferencing
Hardware Requirement

 Computers with monitors/LCD screens


 Microphone
 Speaker/headphones
 Webcam
 Internet (WAN)
Video Conferencing
Software Requirement
 Protocols
 Device drivers
 CODEC
 Echo cancellation software
 Conferencing software:
1. Microsoft Teams
2. Google Meet
3. Zoom Meetings
Video Conferencing
Video Conferencing
Advantages
 People don’t need to travel so saves energy,
time, and money.
 It is possible to conduct a meeting at short
notice.
 People can have more time for their families as
they don’t have to stay away from their families.
 It’s better to have video conference than to
travel to some unsafe place.
 It stress free as people have to face stress while
travelling at airports, roads, metro stations etc.
Video Conferencing
Advantages
 It improves productivity of the employees as
they don’t have to waste time and energy in
travelling.
 Some training sessions are very expensive so
they can be conducted through video
conferencing.
 Experiences can be shared from all over the
world.
Video Conferencing
Advantages
 Less travelling causes less carbon emission so it
is environment friendly to conduct video
conferences.
 Less travelling means less traffic jams.
 It is substitute of face-to-face meeting.
Video Conferencing
Disadvantages
 Initial cost of equipment, software and
installation is high.
 Some time poor image and sound quality.
 Some people feel very self-conscious so don’t
communicate effectively.
 Although documents in digital form can be
passed and shared among the attendees but real
things can’t be passed.
 If the delegates are distant then the picture and
the speech can be out of synchronization.
Video Conferencing
Disadvantages
 Time lag in responses/delays when talking.
 Jerking images due to poor internet connection.
 It is difficult for some people who live in
different time zones.
 Some time it is difficult for some people to use
the system.
 It is also time consuming and expensive to train
people to use the system.
 It is demotivating for staff whose one of the
perks of the job is international travel.

You might also like