Computing Section 3 TV
Computing Section 3 TV
SECTION
3 COMPUTER
NETWORKING
1
SECTION 3 COMPUTER NETWORKING
INTRODUCTION
The need to share information and resources among different computers has led to
computer systems being linked together, called networks, in which computers are
connected so that data can be transferred from machine to machine. The primary
purposes of computer networks are to facilitate communication and share resources
among connected devices. Using networks, computer users can exchange messages
and share resources, such as printing capabilities, software packages, and data storage
facilities.
Examples include an office network (connecting computers, printers, and a server
in the lab), your school Wi-Fi (allowing you to research, and learn on the extended
reading questions to the internet), and an ATM network (connecting ATMs to a bank’s
network to allow customers to access their accounts from various locations).
Key Ideas
1. A computer network is a connection of two or more computers or computing devices.
2. Some components of a computer network are; hub, nodes, and network interface cards
(NIC).
3. A stand-alone computer is a computer that operates independently and is not
connected to a network.
4. A computer area network refers to a type of network designed to connect computers
within a limited area such as a building, campus, or small geographical area.
5. A network topology describes both the physical and logical arrangement of different
components (links, nodes, etc) in a computer network.
6. A network architecture: The design and structure of a computer network.
7. A client-Server model: Clients request services from centralised servers, ensuring
easier management, security, and scalability.
8. A Peer-to-Peer model: Is an architecture where devices or nodes share resources and
services directly without centralised control.
2
SECTION 3 COMPUTER NETWORKING
1. Resource Sharing
One of the primary benefits of networking is the ability to share hardware
resources (e.g., printers, scanners, storage devices) and software applications
among multiple users. This reduces costs and increases efficiency as each device
does not need to have dedicated resources.
4. Centralised Management
In a business networked environment, system administrators can manage and
monitor multiple devices and users from a central location. This centralised
management simplifies tasks like software updates, security configurations, and
user permissions.
3
SECTION 3 COMPUTER NETWORKING
5. Communication
Networking enables efficient communication through various means, such
as email, instant messaging and VoIP (Voice over Internet Protocol). These
communication tools help individuals and businesses stay connected regardless
of geographic locations.
6. Improved Efficiency
Computer networking streamlines various processes, reducing the need for
manual tasks. For example, automated backups and data synchronisation across
devices improve data reliability and reduce data loss risks.
7. Remote Access
With network connectivity, users can access resources and data remotely. This is
especially valuable for employees working from home or on the go, as they can
access some office resources securely from any location, when using the correct
tools such as VPN.
8. Scalability
Networks can be designed to easily scale to accommodate additional devices
and users as an organisation grows, without significant changes to the existing
infrastructure.
9. Cost Savings
By sharing resources, businesses can cut down on hardware and software expenses.
Additionally, networked environments can reduce paper usage through digital file
sharing and electronic communication.
4
SECTION 3 COMPUTER NETWORKING
1. Hub
This device serves as a central connection point for multiple devices in a network.
It relays any signal it receives with some amplification back out to all the devices
connected to it. Hubs are less common today due to their inefficiency and lack of
intelligence in data transmission.
2. Nodes
These are the devices connected to the network that can send, receive, and process
data. Examples of nodes include computers, laptops, servers, routers, switches,
smartphones, printers, and other smart devices.
5
SECTION 3 COMPUTER NETWORKING
4. Communication Channels
These are the physical or logical pathways through which data is transmitted
between nodes. They can be wired (e.g. Ethernet cables, fibre optics) or wireless
(e.g. Wi-Fi, Bluetooth).
5. Switches
These are devices that facilitate the connection and communication between
multiple devices within a local area network (LAN). They use MAC addresses
(media access control addresses) to forward data to the intended recipient. A MAC
address is a 48-bit number assigned to each device connected to the network. This
intelligence is illustrated in Figure 9.4
6. Routers
These are digital devices that connect different networks and determine the best
path for data to travel from the source to the destination across the internet or
other networks.
7. Modems
These devices are used to modulate and demodulate digital signals to enable
communication over analogue communication channels, such as telephone lines.
Modem router combo devices combine the functionalities of routers and modems.
6
SECTION 3 COMPUTER NETWORKING
8. Protocols
These are a set of rules and conventions that govern how data is transmitted,
received, and processed over the network. Examples include TCP/IP (Transmission
Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), and
DNS (Domain Name System).
10. Firewalls
These are computer network security systems (hardware or software) that monitor
and control incoming and outgoing network traffic, protecting the network from
unauthorised access and potential threats. It will filter data by checking to see if it
or its behaviour fits the profile of malicious code.
The main difference between a hardware firewall and a software firewall is that the
hardware firewall runs on its own physical device, while a software firewall is a
program installed on a computer. A common example of a software firewall is the
firewall built into most operating systems like Windows and macOS (Macintosh
Operating System).
7
SECTION 3 COMPUTER NETWORKING
14. Workstation
A term sometimes used to describe a computer (usually desktop) connected to a
LAN.
Each of these components plays a specific role in a network, contributing to the
efficiency and effectiveness of its operation. They work together to enable data sharing,
resource sharing, and communication between network devices and users.
Activity 3.1
8
SECTION 3 COMPUTER NETWORKING
Activity 3.2
In your groups, observe the images of the network components below and
correctly name the devices labelled A – F.
Activity 3.3
In your groups, and with the help of the teacher, connect a network device to a
computer in your lab
Materials needed: Ethernet cable (network cable), a computer, switch/router/
modem/hub
STEPS
1. Locate the Ethernet port at the back of the desktop computer. On a laptop, it
can be found on the side or back of the device.
2. Take one end of the Ethernet cable and firmly plug it into the Ethernet
port on your computer. You should hear a click when the cable is properly
inserted.
3. Take the other end of the Ethernet cable and plug it into an available
Ethernet port on your router, switch, or modem. Again, you should hear a
click when it is properly inserted.
9
SECTION 3 COMPUTER NETWORKING
NOTE: On most devices, there are small LED lights next to the Ethernet
ports. When the cable is connected properly, these lights should blink or turn
solid to indicate a successful connection.
Conclusion: In a small home network setup like this, a switch is not required
because the Wi-Fi router acts as the central point where devices connect and
communicate. The router handles the switching functions internally, allowing
devices to share resources and access the internet without the need for additional
networking hardware like a switch.
10
SECTION 3 COMPUTER NETWORKING
11
SECTION 3 COMPUTER NETWORKING
1. Bus Topology
All devices are connected to a single central cable called the ‘bus’. Each device on
the network can communicate directly with the others. However, if the central
bus cable fails, the entire network will go down.
12
SECTION 3 COMPUTER NETWORKING
2. Star Topology
All devices are connected to a central hub or switch. Each device has its dedicated
connection to the central hub, making it easier to manage and troubleshoot
individual connections. If one device fails, it does not affect the rest of the network.
However, the central hub becomes a single point of failure.
3. Ring Topology
The devices are connected in a closed loop. Each device is connected to two other
devices, creating a continuous circle. Data travels around the ring from one device
to the next until it reaches its destination. Ring topologies are less common due to
the risk of a single connection failure disrupting the entire network.
13
SECTION 3 COMPUTER NETWORKING
4. Mesh Topology
Every device is connected to every other device in a fully-connected mesh network.
This redundancy ensures multiple paths for data to travel, providing high reliability
and fault tolerance. Fault tolerance refers to the ability of a network to continue
operating without interruption when one or more of its components fail. Mesh
topologies are highly resilient but can be costly to implement due to the large
number of connections required.
A partial mesh topology provides alternate routes from each node to some of the
other nodes on the network.
6. Hybrid Topology
It combines two or more different types of topologies. For example, an example of
a hybrid topology is a ring star, where a star network is connected through a hub
14
SECTION 3 COMPUTER NETWORKING
to a ring network. Hybrid topologies offer flexibility and can suit complex network
requirements.
Each network topology has its strengths and weaknesses, and the choice of topology
depends on factors like the size of the network, the desired level of redundancy,
cost considerations, and the specific needs of the organisation or application.
Note that network redundancy refers to the process of adding additional or alternate
instances of network devices, equipment, and communication channels within a
network infrastructure. This is done to ensure network availability in case of a network
device or path failure.
Activity 3.4
15
SECTION 3 COMPUTER NETWORKING
Activity 3.5
Figure 3.21
16
SECTION 3 COMPUTER NETWORKING
Fault tolerance More fault tolerance Less fault tolerance Less fault tolerance
Point-to-point networks are used to connect two locations together via a private,
dedicated line.
Activity 3.6
17
SECTION 3 COMPUTER NETWORKING
3. Each member should pick one of the following topologies: Bus, Star, Mesh,
Ring, Tree, and Hybrid.
4. Explain in your own words the type of topology you picked.
5. Explain the main features of each type of topology.
6. Use the computer to create a PowerPoint slide of the report.
7. The group leader should present the report to the class.
Activity 3.7
Do the following:
1. Individually, think of possible criteria to compare different types of area
networks such as geographical area and ownership.
2. Get into your groups,
3. Share your individual views with your members.
4. Settle on the five (5) most appropriate ones.
5. Fill in Table 3.2 with the five (5) criteria under criterion with aid of computer
and PowerPoint application.
6. Complete the table with the differences between these four area networks
under the criterion identified.
7. Present your results to the class with PowerPoint presentation.
Table 3.2: Comparing different types of area networks
18
SECTION 3 COMPUTER NETWORKING
NETWORK ARCHITECTURE
Take a look at the classroom, just like how a classroom is organised with desks, chairs,
students, and a teacher, computer networks are also arranged in a specific way to make
sure everything runs smoothly. We will learn about the world of Computer Architecture
and Organisation, focusing on data communication and network systems. We will find
out how networks are designed and managed, reveal the secrets behind client-server
and peer-to-peer models.
Picture the network as a well-organised classroom: the teacher is like the server,
providing information and resources to the students (the clients). In another setup,
students might share and exchange information directly with each other, much like
a peer-to-peer network. As we journey through this topic, you will gain a practical
understanding of how data travels across networks, ensuring seamless communication
in our digital world.
Let us take a look at the network architecture and the two most common models,
client-server and peer-to-peer models.
1. Client-Server Architecture
In this architecture, devices on the network are divided into two categories: clients
and servers. Clients (e.g., computers, smartphones) request services or resources
from servers (e.g., access to webpages from a web server, access to files from a file
server). Servers respond to client requests, and this model allows for centralised
management and resource sharing. Servers tend to be quite powerful machines.
They need the processing power because many other computers connect to them.
Clients may not store data, and they have no control over the network as a whole.
Because this model is centralised, it is more secure and easier to back up data.
It is suitable for both small and large networks and for situations where many
computers need access to the same information. Many schools use this model.
Client-server networks are generally more stable than P2P networks but can cost
more due to the infrastructure and maintenance required.
19
SECTION 3 COMPUTER NETWORKING
P2P typically is used for smaller networks, often with fewer than 10 computers, or
where fewer computers need access to the same data. It is less expensive and easy
to set up compared to client-server networks. However, they can be less stable as
the number of peers increases and may have security challenges since each node
has equal authority.
Note the link between network topology and network architecture. Network
topology is the practical implementation of network architecture. A network
topology is the arrangement of different elements within the network, including
devices like routers, switches, and computers, whereas network architecture refers to
the design and physical structure of a computer network.
CLOUD NETWORKS
The CLOUD refers to servers that are accessed over the internet, and the software and
databases that run on those servers. Cloud servers are located in data centres all over
the world. In a cloud network, the network is on-premises, but some or all resources
used to manage it are in the cloud and these resources are rented from a third-party
cloud provider/ cloud vendor. Cloud networking is the infrastructure that supports
cloud computing, which is the delivery of various services through the Internet. It
involves a network of remote servers hosted on the internet to store, manage, and
process data, rather than a local server or a personal computer.
A cloud network can employ a client-server architecture. In this model, the cloud acts
as the server that provides resources and services, and the clients (which can be end-
user devices like computers, smartphones, etc.) request and consume these services.
The cloud-based delivery of services ensures that clients can access resources on-
demand via the Internet.
The client-server architecture in a cloud environment is designed to be easily scalable
and efficient, allowing for a robust network that can handle varying workloads and
provide services to a large number of clients simultaneously.
With cloud networking, an organisation can shift its network management, control,
and data connectivity from on-premises to a cloud infrastructure. Cloud networking
allows organisations to create complex networks using only the internet.
20
SECTION 3 COMPUTER NETWORKING
21
SECTION 3 COMPUTER NETWORKING
From highest level to lowest level the seven levels of the OSI model are:
Layer 7: The Application Layer
Layer 6: The Presentation Layer
Layer 5: The Session Layer
Layer 4: The Transport Layer
Layer 3: The Network Layer
Layer 2: The Data Link Layer
Layer 1: The Physical Layer
The Physical Layer (Layer 1) is responsible for the transmission and reception of
raw data bits over a physical medium, such as wires, optical fibres, or wireless signals.
The Data Link Layer (Layer 2) manages node-to-node data transfer and handles error
detection and correction during the transmission between two physically connected
devices.
The Network Layer (Layer 3) is responsible for routing data packets between different
networks, this layer determines the best physical path for data to travel from source to
destination.
The Transport Layer (Layer 4) ensures complete data transfer by providing end-
to-end communication, error recovery, and flow control between devices, often using
protocols like TCP or UDP.
The Session Layer (Layer 5) manages and controls the connections between devices,
establishing, maintaining, and terminating communication sessions.
The Presentation Layer (Layer 6) converts data between the application layer and
the lower layers, ensuring that data is in a usable format, and handling encryption and
compression.
The Application Layer (Layer 7) provides network services directly to the user or
application software, such as email, file transfer, and web browsing, facilitating end-
user interaction with the network.
A possible mnemonic for remembering the names of the layers (highest to lowest) is:
A Penguin Said That Nobody Drinks Pepsi
22
SECTION 3 COMPUTER NETWORKING
Activity 3.8
Typical uses
Security
Data
Management
Scalability
Reliability
Maintenance
Cost
b. State the network model which would be more suitable for managing
student and teacher data securely
c. Give the reason for your response in (ii) above.
2. In groups, Create an engaging presentation of each focal area:
a. Network architecture models
b. client-server
c. P2P
d. Cloud networks
e. The OSI Model
3. As a group, you will role-play the seven layers of the OSI model to
demonstrate how data is sent from one computer to another.
a. Form a group of seven.
b. Assign each of the seven students one layer of the OSI model.
c. Each group should prepare a brief explanation of their layer’s functions,
including how it interacts with the layer above and below.
d. Consider using diagrams, or cards to help illustrate the data flow and
transformation at each level.
23
SECTION 3 COMPUTER NETWORKING
1. Bluetooth
Bluetooth technology uses short-range radio signals to transmit data between two
Bluetooth-enabled computers or devices. In addition to computers, mobiles devices
and many peripherals’ devices, such as a mouse, keyboard, printer, or headset, and
many vehicles and consumer digital devices are Bluetooth enabled. The range of
a Bluetooth connection is approximately 10 meters (30 feet). However, maximum
communication range will vary depending on obstacles (such as person, metal,
storm, or wall) or the electromagnetic environment. The range may be able to be
extended with additional equipment. If you have a computer that is not Bluetooth
enabled, you can purchase a Bluetooth adapter that will give a computer the
ability to connect to Bluetooth devices either via an internal card (for a desktop
computer), or a USB adapter.
24
SECTION 3 COMPUTER NETWORKING
3. Infrared (IR)
Infrared connectivity is a wireless technology that uses a beam of infrared light to
transmit information. It is used for short-range or medium-range communications
between two devices. IR communication is among the simplest wireless
communication methods and serves as a cost-effective way of transmitting a few
bits of data wirelessly. It requires direct line of sight and operates only at close
25
SECTION 3 COMPUTER NETWORKING
range. This is not particularly common nowadays for data transfer due to the very
slow speeds, and the requirement for short distance line of sight.
26
SECTION 3 COMPUTER NETWORKING
5. Cellular Communication
A cellular wireless network, often referred to as a mobile network, is a
communication system that enables wireless communication via radio and
microwave signals over a wide geographic area using cell towers. They enable
smartphones, tablets and other digital devices to connect to the internet through
the nearest cell tower. This setup (referred to as cellular or mobile data) allows
for mobility and convenience, as users can get online without being bound to a
physical location (for Wi-Fi you need to be located near a router to get an internet
connection). You just need to be within the coverage area of the cellular network
to connect to the internet. It is particularly useful for those who travel or work
remotely. The first commercial cellular network, the 1G generation, was launched
in Japan in 1979. 5G or the fifth-generation technology standard for cellular
networks, began deployment worldwide in 2019. 5G has several advantages over
4G, including wider bandwidth resulting in faster speeds and greater capacity .
27
SECTION 3 COMPUTER NETWORKING
6. Satellite Communication
Satellite communication involves transmitting data signals to and from satellites
in space. It is commonly used for long-distance communication in remote areas
and for global connectivity. This is now becoming more and more common as
mobile phones adapt the technology for emergency use when phone signal is not
available. In recent years satellite-based internet has become mainstream under
the name Starlink, providing fast internet to areas that previously would not have
had access to it.
Wireless Metropolitan Area Networks (wMANs) use various wireless technologies, the
most common being WiMAX and LTE.
Wireless Wide Area Networks (wMANs) use various wireless technologies, including
cellular network and satellite.
28
SECTION 3 COMPUTER NETWORKING
Activity 3.9
29
SECTION 3 COMPUTER NETWORKING
OSI model) plugs into a network interface card (NIC) which handles the Layer 2 Data
Link functionality. Effectively, Layer 2 is responsible for putting 1’s and 0’s on the cable
and pulling 1’s and 0’s from the cable.
Ethernet cables are commonly used in LANs, MANs and WANs. The original 10 base
5 Ethernet used a thick coaxial cable. More modern Ethernet variants use twisted pair,
but more recently fibre optic has become more common for high speed over longer
distances.
30
SECTION 3 COMPUTER NETWORKING
2. Coaxial Cable
This is a type of copper cable specially built with a metal shield and other
components engineered to block signal interference. It consists of a copper
conductor surrounded by insulation, a braided metallic shield, and an outer jacket.
These cables were commonly used for older Ethernet networks (e.g. 10Base2 and
10Base5). Coaxial cables have good bandwidth and resistance to interference but
are bulky and less flexible compared to twisted pair cables.
31
SECTION 3 COMPUTER NETWORKING
32
SECTION 3 COMPUTER NETWORKING
Advantages of PLC
1. Easy to set up: no cabling required, just plug and go
2. Large Reach: PLC can enable communication with hard-to-reach nodes by cable
or where Wi-Fi signals might be weak or compromised
Disadvantages of PLC
1. Lower speed – the maximum speed is generally lower than Ethernet.
2. Can be impacted by electrical interference, for example such as from tumble
dryers or microwaves
3. Powerline adaptors must be plugged into a wall and, usually do not work when
plugged into extension cords. This means that users will have fewer electrical
outlets available for other uses.
33
SECTION 3 COMPUTER NETWORKING
Activity 3.10
34
SECTION 3 COMPUTER NETWORKING
2
Noise immunity is the ability to perform its functions when interference (noise)
is present.
3
A repeater on a network is a node that amplifies incoming signals and rebroadcasts
them.
Conclusion
Each type of cable has its own unique features and is used for different purposes.
Twisted-pair cable is the most common and cheapest option, Co-axial cable has a higher
bandwidth and is used for high-speed connections, and optical fibre cable is immune to
electromagnetic interference and has a very high bandwidth over long distances. The
choice of cable depends on factors such as data transfer speed requirements, distance,
cost, environment, and the type of network being deployed.
35
SECTION 3 COMPUTER NETWORKING
Activity 3.11
NFC
INFRARED
Wi-Fi
Bluetooth
Unshielded twisted pair
cable
Shielded twisted pair cable
Fibre optic cable
Coxial cable
Cellular communication
Satellite communication
Power line communication
2. Complete the concept map on the content of this section with the title
‘Computer networks.
Instructions:
a. Name the first node as the header or starting point of the map titled
“Computer Networks”
b. Name the nodes in orange respectively “Wireless Data Connection” and
“Wired Data Connection”
c. From each node created above in (b), add the name of the data
connections respectively in grey colour as children’s nodes from (b)
Figure 3.40
36
SECTION 3 COMPUTER NETWORKING
37
SECTION 3 COMPUTER NETWORKING
a. https://www.youtube.com/watch?v=Gh2KRiSbGGE
4. Scan this QRcode for more information on connecting a phone to a Wi-Fi Network
38
Review Questions 3.1
39
Review Questions 3.2
Figure 3.41
40
Review Questions 3.3
1.
a. What are the possible benefits and risks involved in migrating your school’s
network to a cloud environment?
b. How would you address issues such as cost, security, and performance
2. Define a client-server architecture and explain the roles of clients and servers in
this model.
3. Describe two advantages of a cloud network over a traditional network.
4. Evaluate the security implications of various network architecture designs,
identifying potential vulnerabilities and recommending mitigation strategies.
5. Evaluate the cost efficiencies for an organisation switching to cloud networking.
41
Review Questions 3.4
1. Describe two advantages and one disadvantage of coaxial cabling over twisted
wire cabling.
2. Why is coaxial cabling good for usage in situations where signals must be sent
over great distances, such as cable TV networks?
3. Identify the similarities and differences of the physical properties, transmission
characteristics, and applications of different types of data transmission media.
4. Analyse at least three factors that influence the choice of transmission medium
when setting up a network.
5. Identify the type of Ethernet cable shown in Figure 3.43. Justify your answer.
Figure 3.43
6. What activity and wireless technology are indicated in the image shown in Figure
3.44.
Figure 3.44
42
7. Study Figure 3.45
Figure 3.45
43
Answers to Review Questions 3.1
44
Centralised Data Management and Security: A network enables centralised
data storage on a file server. This simplifies data backup procedures and ensures
that important documents are securely stored and easily accessible to authorised
personnel. Additionally, centralised security measures such as firewalls and
antivirus software can be implemented to protect sensitive information from
cyber threats.
Additional Items of Hardware Required to Set Up the Network:
• Network Switch
• Router
• Ethernet Cables
• Wireless Access Point (WAP) (Optional)
• Server (Optional)
7.
a. To mitigate data loss, STC should implement regular automated backups,
both locally and in the cloud, along with strict access controls to limit data
modification. They should also use antivirus software, firewalls, and encryption
for secure data transmission. Employee training and network monitoring will
help prevent and detect malicious or accidental data loss.
b. Why a Switch may not be required:
In a scenario where there are only two computers and a printer, and they
can all connect directly to the Wi-Fi router, a separate switch is unnecessary.
The Wi-Fi router already has built-in switching capabilities to manage the
communication between the devices connected to it (computers and printer).
Devices communicate with each other through the router, which routes data
packets between the devices within the local network and manages the internet
connection.
45
Answers to Review Questions 3.2
1.
a. Star topology
b. One computer failure does not affect the whole network, only that computer is
affected and loose communication until it is repaired or replaced.
c. If the central device (Hub) fails, then the whole network will be breakdown
hence fail.
2. The differences between MAN and WAN include:
MAN WAN
A network that connects large areas The network covers a large area such as a
than LANs such as small towns or country or several countries.
cities.
Examples include university network Examples include Internet, ATM network
Topology that can be used are ring, Topology that can be used are Point-to-
Mesh, hybrid point, Mesh
Transmission speed is moderate Transmission speed is low
3. The differences between PAN and LAN in terms of coverage and purpose include:
Coverage area It is within a range of a few meters It covers a larger area, from
(around 10 meters) a single building to a group
of buildings (up to several
kilometres).
46
Feature Bus Topology Star Topology
Figure 3.42
5. GCB (Ghana Commercial Bank), with its 185 branch offices and ATMs spread
across the country, is an example of a Wide Area Network (WAN).
Justification:
a) Geographic Distribution:
Wide Area Network (WAN): WANs cover a large geographic area, often across
cities, regions, or even countries. GCB’s network spans the entire nation of
Ghana, connecting branches and ATMs located in different cities and towns.
This extensive geographic spread is characteristic of a WAN.
Metropolitan Area Network (MAN): MANs typically cover a smaller area,
such as a city or metropolitan region. While GCB might have a MAN within
a single city where multiple branches are interconnected, the overall network
encompassing all branches across Ghana exceeds the scope of a MAN.
b) Interconnectivity:
47
WAN: WANs are designed to interconnect multiple local area networks (LANs)
and MANs over long distances. GCB’s branches and ATMs are interconnected
through a network that links diverse geographic locations, fitting the description
of a WAN.
MAN: A MAN might be used within a single city to connect branches within
that urban area, but it would not encompass the entire national network.
c) Infrastructure:
WAN: WANs typically utilise leased telecommunication lines, satellite links,
and other long-distance communication technologies to maintain connectivity
over vast distances. GCB likely relies on such infrastructure to link its
widespread branches and ATMs.
MAN: MANs often use high-speed fibre optics and other infrastructure suitable
for city-wide connections, but these wouldn’t be sufficient for a country-wide
network.
Given the national reach of GCB’s network, connecting branch offices and
ATMs across Ghana, it is accurately categorised as a WAN. The network’s need
to cover extensive distances and interconnect diverse regional locations clearly
fits the definition of a Wide Area Network.
6. Evaluation of the star, bus, and ring topologies, followed by a recommendation.
a. Star Topology
Advantages
i. Centralised Management: Easier to manage and troubleshoot due to the
centralised hub or switch.
ii. Fault Isolation: A failure in one cable or workstation does not affect the rest
of the network. Only the affected device is isolated.
iii. Scalability: Easy to add more workstations by connecting additional cables
to the central hub or switch.
iv. Performance: Each device has a dedicated connection to the hub, reducing
the chances of collisions and improving overall network performance.
Disadvantages
i. Cost: Requires more cabling and networking hardware (hubs or switches),
which can be more expensive.
ii. Single Point of Failure: If the central hub or switch fails, the entire network
goes down.
b. Bus Topology
Advantages
i. Cost-Effective: Requires less cabling compared to star topology, making it
cheaper to implement.
ii. Simple Design: Easy to implement and extend with a single backbone cable.
48
Disadvantages
i. Performance Issues: As more workstations are added, the network can
become slower and more prone to collisions.
ii. Fault Detection: Difficult to troubleshoot and isolate faults since a problem
in the backbone cable can bring down the entire network.
iii. Limited Scalability: Adding too many devices can degrade performance and
reliability.
c. Ring Topology
Advantages
i. Equal Access: Each device has equal access to the network, which can
reduce the chances of collisions.
ii. Predictable Performance: Can perform better than bus topology under heavy
load as data travels in one direction, reducing the chances of collisions.
Disadvantages:
i. Complexity: More difficult to install and configure compared to star and
bus topologies.
ii. Fault Tolerance: A failure in any single cable or device can disrupt the
entire network. However, some modern implementations use dual rings for
redundancy.
iii. Scalability: Adding or removing devices can be more disruptive compared
to star topology.
Recommended Topology: Star Topology
Reasons:
1. Scalability: The star topology allows for easy expansion by simply adding more
cables to the central hub or switch. This is particularly important for a network
that needs to grow and accommodate more workstations in the future.
2. Fault Isolation: In a star topology, a failure in one workstation or cable does not
affect the entire network. This makes it easier to isolate and troubleshoot problems
without bringing down the entire network.
3. Performance: Each device in a star topology has a dedicated connection to the
hub or switch, which helps maintain good performance even as more workstations
are added. This reduces the likelihood of network collisions and congestion.
4. Management: Centralised management via the hub or switch simplifies network
administration, making it easier to monitor and manage network traffic.
5. Flexibility: Star topology provides the flexibility to implement different network
speeds and technologies for different floors or areas, which can be crucial in a
multi-floor setup.
While star topology might have higher initial costs due to more cabling and the need
for a central hub or switch, its benefits in terms of scalability, performance, and ease
49
of management make it the most suitable choice for connecting workstations across
three floors with the capacity to extend the network in the future.
50
Answers to Review Questions 3.3
1.
a. Migrating the School’s Network to a Cloud Environment
Benefits
• Scalability: Easily scale resources up or down based on demand.
• Cost Efficiency: Pay-as-you-go model reduces upfront costs and optimises
spending.
• Accessibility: Access resources from anywhere with an internet connection.
• Disaster Recovery: Enhanced data backup and recovery solutions.
• Collaboration: Improved collaboration tools for students and teachers.
Risks
• Security Concerns: Potential vulnerabilities in cloud infrastructure.
• Data Privacy: Compliance with data protection regulations.
• Downtime: Dependence on internet connectivity and cloud provider
uptime.
• Vendor Lock-in: Difficulty in switching providers or migrating data out of
the cloud.
b. Addressing Issues
Cost
• Perform a cost-benefit analysis to compare on-premises vs. cloud costs.
• Use budgeting tools and cost management features provided by cloud
services.
Security
• Choose a reputable cloud provider with strong security measures (e.g.,
Google Cloud, AWS, Microsoft Azure).
• Implement end-to-end encryption and strict access controls.
• Regularly audit cloud security policies and practices.
Performance
• Ensure adequate bandwidth and internet speed for cloud access.
• Use Content Delivery Networks (CDNs) to reduce latency.
• Monitor performance metrics and adjust resources as needed.
2. Client-server architecture is a network model where multiple clients (user devices)
request and receive services from a centralised server.
Clients: Devices like computers or smartphones that initiate requests for resources
or services, such as files, applications, or database access.
51
Servers: Centralised machines or systems that store, process, and manage
resources, responding to client requests and delivering the required services.
3. Advantages of a Cloud Network Over a Traditional Network
Scalability:
Cloud Network: Cloud networks offer on-demand scalability, allowing businesses
to easily adjust resources like storage, computing power, and bandwidth to meet
changing needs. This is particularly beneficial for handling variable workloads
and growth without significant upfront investments.
Traditional Network: In traditional networks, scaling up often requires significant
investment in physical infrastructure, including hardware and software, which
can be time-consuming and costly. This makes it less flexible and harder to adapt
to changing business demands.
Cost Efficiency:
Cloud Network: Cloud services typically operate on a pay-as-you-go or
subscription model, meaning businesses only pay for the resources they actually
use. This reduces the need for large capital expenditures and ongoing maintenance
costs associated with physical hardware.
Traditional Network: Traditional networks require significant upfront
investment in physical infrastructure, including servers, storage devices, and
networking equipment. Additionally, ongoing maintenance, upgrades, and energy
costs can be substantial, making it less cost-efficient compared to cloud solutions.
These advantages make cloud networks a preferred choice for many modern
businesses, offering flexibility, efficiency, and cost savings that traditional networks
often struggle to match.
4. Security Implications of Various Network Architecture Designs
a. Client-Server Architecture
• Potential Vulnerabilities:
o Single Point of Failure: If the server is compromised or fails, the entire
network can be affected.
o DDoS Attacks: Servers are susceptible to Distributed Denial of Service
(DDoS) attacks, which can overwhelm the system.
o Data Breaches: If the server is hacked, sensitive data stored on it can
be exposed.
• Mitigation Strategies:
o Redundancy: Implement failover servers and load balancers to
distribute the load and ensure availability.
o DDoS Protection: Use DDoS protection services and rate limiting to
mitigate attack impacts.
o Strong Authentication: Implement strong authentication and
encryption methods to protect data.
52
b. Peer-to-Peer (P2P) Architecture
• Potential Vulnerabilities:
o Security Risks: Each peer can become a point of vulnerability, making
the network harder to secure.
o Data Integrity: Ensuring data integrity can be challenging since data
is distributed across multiple peers.
o Malware Spread: Malware can spread quickly across peers if one node
is compromised.
• Mitigation Strategies:
o Secure Protocols: Use secure communication protocols and encryption
to protect data transmission.
o Regular Updates: Ensure all peers have up-to-date security patches
and antivirus software.
o Monitoring: Implement monitoring tools to detect and respond to
suspicious activities.
c. Cloud Network Architecture
• Potential Vulnerabilities:
o Data Breaches: Sensitive data stored in the cloud can be targeted by
hackers.
o Account Hijacking: User accounts can be compromised if proper
security measures are not in place.
o Insider Threats: Employees with access to cloud resources can pose
internal security risks.
• Mitigation Strategies:
o Encryption: Use encryption for data at rest and in transit to protect
sensitive information.
o Access Controls: Implement strict access controls and multi-factor
authentication (MFA) to secure user accounts.
o Regular Audits: Conduct regular security audits and monitoring to
detect and respond to potential threats.
d. Hybrid Network Architecture
• Potential Vulnerabilities:
o Complexity: The integration of on-premises and cloud resources can
create complex security challenges.
o Data Sync Issues: Synchronising data between different environments
can lead to security gaps.
o Inconsistent Policies: Inconsistent security policies across
environments can create vulnerabilities.
53
• Mitigation Strategies:
o Unified Security Policies: Implement consistent security policies
across both on-premises and cloud environments.
o Data Encryption: Ensure data is encrypted during synchronisation
and storage.
o Integrated Security Tools: Use integrated security tools and platforms
to manage and monitor the hybrid environment.
By understanding these potential vulnerabilities and implementing appropriate
mitigation strategies, organisations can enhance the security of their network
architectures and protect against various cyber threats.
5. Evaluating Cost Efficiencies of Switching to Cloud Networking
Switching to cloud networking offers several cost efficiencies for organisations.
Below are the primary areas where organisations can realise savings:
i. Reduced Capital Expenditure
• Traditional Network:
o Significant upfront costs for purchasing hardware (servers, storage
devices, networking equipment).
o Expenses related to setting up data centres, including space, power, and
cooling.
• Cloud Network:
o No need for large capital expenditures on physical infrastructure.
o Costs are shifted to an operational expenditure model, paying only for
the resources used.
ii. Operational Savings
• Traditional Network:
o Ongoing maintenance and upgrades of hardware and software.
o Hiring and retaining IT staff for managing and maintaining the
infrastructure.
o Energy costs associated with running and cooling data centres.
• Cloud Network:
o Maintenance, upgrades, and infrastructure management are handled
by the cloud service provider.
o Potential reduction in IT staff costs or redeployment of IT staff to more
strategic roles.
o Lower energy costs as there is no need to run and cool local data centres.
54
iii. Scalability and Flexibility
• Traditional Network:
o Scaling up requires significant investment in additional hardware and
software.
o Over-provisioning or under-utilisation of resources can lead to
inefficiencies and wasted costs.
• Cloud Network:
o On-demand scalability allows organisations to quickly adjust resources
based on demand, ensuring efficient use of resources.
o Pay-as-you-go pricing models ensure that organisations only pay for
what they use, avoiding over-provisioning costs.
iv. Disaster Recovery and Business Continuity
• Traditional Network:
o High costs associated with setting up and maintaining redundant
systems and disaster recovery sites.
o Complex and expensive to implement effective business continuity
plans.
• Cloud Network:
o Built-in disaster recovery and business continuity solutions provided by
cloud service providers.
o Reduced costs for backup and recovery infrastructure, with data often
automatically replicated across multiple locations.
v. Software Licensing and Updates
• Traditional Network:
o Upfront costs for purchasing software licenses.
o Ongoing costs for software updates, patches, and renewals.
• Cloud Network:
o Many cloud services include software licenses in their subscription fees.
o Automatic updates and patches are typically included, reducing the
need for manual updates and associated costs.
vi. Productivity and Collaboration
• Traditional Network:
o Additional investments in collaboration tools and infrastructure to
support remote work and collaboration.
• Cloud Network:
o Many cloud services offer built-in collaboration tools, enhancing
productivity without additional costs.
o Facilitates remote work with easy access to resources from anywhere,
reducing the need for physical office space.
55
Answers to Review Questions 3.4
56
Aspect Twisted Pair Coaxial Cables Fibre Optic Cables Wireless
Cables Communication
Transmission - Moderate data - Higher data rates - Extremely high data - Variable data rates
Characteristics rates. than twisted rates. depending on
pair. technology (e.g., Wi-
- Susceptible to - Immune to EMI. Fi, cellular).
electromagnetic - Good resistance
interference to EMI due to - Can transmit data - Susceptible to
(EMI). shielding. over very long interference from
distances without obstacles and other
- Maximum - Can transmit significant loss. signals
distance of 100 over longer
meters without distances than - Range depends on
signal booster. twisted pair. power and frequency.
Applications - Local Area - Cable television - Backbone networks. - Mobile networks (3G,
Networks (CATV). 4G, 5G).
(LANs) - Long-distance
- Internet telecommunication. - Wi-Fi and wireless
- Telephone lines connections LANs.
(broadband). - High-speed
- Short-distance internet and data - Satellite
communication. - Long-distance connections. communication.
video and data
transmission.
57
• Twisted Pair Cables: Suitable for short distances (up to 100 meters)
without signal boosters. Commonly used in Local Area Networks (LANs)
within buildings.
• Coaxial Cables: Can transmit data over longer distances than twisted
pair cables. Often used in Cable TV networks and broadband internet
connections.
• Fibre Optic Cables: Ideal for long-distance transmission, capable of
spanning several kilometres without significant signal loss. Used in
backbone networks, long-distance telecommunications, and high-speed
internet connections.
• Wireless Communication: Coverage area depends on the technology
used (e.g., Wi-Fi, cellular networks). Suitable for both short-range (Wi-Fi)
and wide-area (cellular networks) applications.
ii. Bandwidth and Data Transmission Rates
The required data transmission rate and bandwidth determine the appropriate
medium to handle the expected network load:
• Twisted Pair Cables: Moderate data rates, suitable for typical LAN
environments and office networks.
• Coaxial Cables: Higher bandwidth capabilities compared to twisted pair
cables. Used for applications requiring higher data rates, such as video
streaming and broadband internet.
• Fibre Optic Cables: Provides extremely high data rates and bandwidth.
Ideal for applications demanding high-speed data transfer, such as data
centres and high-performance computing networks.
• Wireless Communication: Data rates vary based on technology (e.g., Wi-
Fi 6, 4G, 5G). Suitable for environments where mobility and flexibility are
important, such as wireless LANs and mobile networks.
iii. Environmental Factors and Interference
The environment in which the network operates can impact the choice of
transmission medium due to potential sources of interference and physical
obstacles:
• Twisted Pair Cables: Susceptible to electromagnetic interference (EMI),
especially in unshielded variants (UTP). Best used in environments with
minimal EMI or where shielded cables (STP) can be employed.
• Coaxial Cables: Better protection against EMI due to shielding. Suitable
for environments with moderate levels of interference.
• Fibre Optic Cables: Immune to EMI and radio frequency interference
(RFI). Preferred in environments with high levels of electromagnetic noise,
such as industrial areas or where high electrical interference is present.
58
• Wireless Communication: Susceptible to interference from physical
obstacles (walls, buildings) and other electronic devices. Best suited for
open environments or where the flexibility of wireless access outweighs
potential interference issues.
iv. Additional Considerations
• Cost: The budget for the network infrastructure influences the choice, with
twisted pair cables being the most cost-effective, followed by coaxial cables,
and fibre optic cables being the most expensive. Wireless solutions can vary
in cost depending on the technology and scale of deployment.
• Scalability and Future-Proofing: Consideration for future network
expansion and technological advancements. Fibre optic cables offer the
highest scalability and future-proofing potential due to their high bandwidth
capacity.
• Installation and Maintenance: The ease of installation and ongoing
maintenance requirements. Twisted pair cables are easier to install and
maintain, while fibre optic cables require specialised skills and equipment.
5. Unshielded Twisted Pair (UTP) cable is commonly chosen as a wired data
connection for several reasons, which make it a popular choice in many
networking environments, especially for Local Area Networks (LANs). Here are
the key reasons:
i. Cost-Effectiveness
• Lower Cost: UTP cables are generally less expensive than other types of
cables like shielded twisted pair (STP) and coaxial cables. This makes them
a cost-effective choice for large-scale network installations.
• Widely Available: The widespread use of UTP cables has driven down
costs further due to economies of scale.
ii. Ease of Installation
• Flexibility: UTP cables are lightweight and flexible, making them easy to
install and route through tight spaces, conduits, and around corners.
• Standard Connectors: They use standard connectors (RJ-45), which are
easy to work with and widely supported by networking equipment.
• Simple Termination: Terminating UTP cables is straightforward and
requires minimal specialised tools, unlike fibre optic cables that need
precise splicing.
iii. Sufficient Performance for Many Applications
• Adequate Bandwidth: UTP cables provide sufficient bandwidth for most
LAN applications. For instance, Category 5e (Cat 5e) and Category 6 (Cat
6) cables support speeds up to 1 Gbps and 10 Gbps, respectively, which is
adequate for typical office and home networks.
• Standardisation: UTP cables conform to industry standards (such as TIA/
EIA-568), ensuring compatibility and reliable performance.
59
iv. Minimisation of Electromagnetic Interference (EMI)
• Twisted Pair Design: The twisting of the pairs in UTP cables helps to
cancel out electromagnetic interference (EMI) from external sources and
crosstalk between adjacent pairs, improving signal quality and reliability.
• Suitable for Low-Interference Environments: While UTP cables lack
the additional shielding found in STP cables, they perform adequately in
environments with minimal EMI.
v. Versatility and Compatibility
• Widely Supported: UTP cables are compatible with a wide range of
networking devices, including switches, routers, and network interface
cards.
• Multiple Categories: UTP cables come in various categories (Cat 5e, Cat
6, Cat 6a, etc.) that offer different performance levels, allowing network
designers to choose the appropriate type based on their specific needs.
vi. Maintenance and Troubleshooting
• Ease of Maintenance: UTP cables are relatively easy to maintain and
troubleshoot. They can be quickly replaced if damaged, and issues can often
be diagnosed with basic network testing tools.
• Less Susceptible to Physical Damage: While they lack shielding, UTP
cables are still robust enough for most indoor environments, and their
flexibility reduces the risk of damage from bending or handling.
6. Credit and debit cards use NFC (Near Field Communication) technology for
transactions at point of sale (POS) terminals due to several benefits that enhance
convenience, security, and efficiency. Here are some key reasons:
• Convenience: NFC technology allows for quick and easy transactions. Users
can simply tap or wave their card near the POS terminal without needing to
swipe or insert the card, speeding up the checkout process.
• Security: NFC transactions are typically more secure than traditional magnetic
stripe transactions. NFC uses encryption to protect the data exchanged between
the card and the terminal, reducing the risk of fraud. Many NFC transactions
also use tokenisation, where a unique token (instead of the actual card number)
is transmitted, adding an extra layer of security.
• Contactless Transactions: With the rise of contactless payments, especially
during the COVID-19 pandemic, NFC technology has become more popular.
It reduces physical contact between the card and the terminal, promoting
hygiene and reducing the spread of germs.
• Compatibility with Mobile Payments: NFC technology is compatible with
mobile payment solutions like Apple Pay, Google Pay, and Samsung Pay. This
allows users to make payments using their smartphones or smartwatches,
providing flexibility and convenience.
60
• Improved Customer Experience: Faster and more efficient transactions lead
to shorter wait times and a better overall shopping experience for customers.
This can increase customer satisfaction and loyalty.
• Reduced Wear and Tear: NFC cards do not require physical contact with the
terminal, reducing wear and tear on the card. This can extend the life of the
card compared to traditional magnetic stripe or chip-and-PIN cards.
7. In a cellular network, cell towers (or cell sites or base stations) are used to
enable mobile communication and provide internet access on digital devices
such as smartphones. These cell towers contain antennas and other equipment
necessary to transmit and receive signals between mobile devices and the network’s
core infrastructure. Here’s how they work:
Key Components and Functions of Cell Towers:
• Antennas: Transmit and receive radio frequency (RF) signals to and from
mobile devices. Multiple antennas may be used to cover different frequency
bands and improve signal quality.
• Base Transceiver Station (BTS): The equipment that facilitates wireless
communication between the network and mobile devices. It handles the radio
communications with the mobile device.
• Base Station Controller (BSC): Manages multiple BTS units. Coordinates
handoffs of mobile devices as they move between cell towers and handles
traffic load balancing.
• Backhaul Connection: Connects the cell tower to the core network. Can be
implemented using various technologies such as fibre optics, microwave links,
or satellite connections.
How Cell Towers Enable Mobile Communication:
• Coverage: Cell towers are strategically placed to provide coverage over a
geographic area. The area covered by each tower is known as a “cell.” As a
user moves, their mobile device connects to the nearest cell tower, allowing
seamless communication.
• Handoffs: When a user moves from the coverage area of one cell tower to
another, the network performs a handoff to maintain the connection without
interruption.
• Frequency Reuse: To efficiently use the available spectrum, frequencies
are reused in different cells. Proper planning ensures minimal interference
between cells using the same frequencies.
61
Services Provided:
• Voice Calls: Allows users to make and receive voice calls.
• Text Messaging: Supports SMS (Short Message Service) for sending and
receiving text messages.
• Internet Access: Provides mobile internet access through technologies like
4G LTE and 5G.
• Data Services: Enables data-intensive applications such as video streaming,
online gaming, and mobile applications.
62
SECTION 3 COMPUTER NETWORKING
REFERENCES
1. Anshuman Singh (2024). Difference Between Bus and Star Topology retrieved
from https://www.shiksha.com/online-courses/articles/difference-between-bus-
and-star-topology-blogId-158377 on 25th June, 2024.
2. Computing – Teacher Manual (2023) for SHS, SHTS, STEM curriculum – pages
88 – 94
3. Computing – Teacher Manual (2023) for SHS, SHTS, STEM curriculum – pages
95 – 97
4. Computing – Teacher Manual (2023) for SHS, SHTS, STEM curriculum – pages
101 – 107
5. images of the components of a network: retrieved from: https://medium.com/@
hasonsnik/key-components-of-computer-network-7e3baaaeb749
6. Keary, T. (2024, January 10). Network security and administration expert.
Comparitech. https://www.comparitech.com/net-admin/network-topologies-
advantages-disadvantages/
7. NaCCA (2023) Computing Curriculum for Secondary Education (SHS 1 - 3), pg.
41
8. NaCCA (2023) Computing Curriculum for Secondary Education (SHS 1 - 3), pg.
41.
9. NaCCA (2023) Computing Curriculum for Secondary Education (SHS 1 - 3), pg.
40.
10. Types of Network Topology retrieved from InterviewBit https://www.interviewbit.
com/blog/types-of-network-topology/ on 25th June, 2024.
11. Types of networks and topologies https://docs.google.com/document/
d/1E5naR7y40yahbFw9TY0DJPmvjKbUrP4M/edit?usp=drive_
link&ouid=102519533476148787893&rtpof=true&sd=true
63
SECTION 3 COMPUTER NETWORKING
ACKNOWLEDGEMENTS
List of Contributors
Name Institution
64