0% found this document useful (0 votes)
43 views

Unit 2 Ict Csic

The document discusses different types of digital communication networks including local area networks (LAN), wide area networks (WAN), and personal area networks (PAN). It covers topics like bandwidth, latency, factors that affect data transfer speeds, wireless and wired connection methods, and examples of different communication standards.

Uploaded by

Lochi Liyanage
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Unit 2 Ict Csic

The document discusses different types of digital communication networks including local area networks (LAN), wide area networks (WAN), and personal area networks (PAN). It covers topics like bandwidth, latency, factors that affect data transfer speeds, wireless and wired connection methods, and examples of different communication standards.

Uploaded by

Lochi Liyanage
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

UNIT – 2

CONNECTIVITY

CHAPTER -4 DIGITAL COMMUNICATION

 The speed at which devices can transfer data depends on the …………………………………… of the connection
Bandwidth –
………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

Higher bandwidth - means that ……………………………………………………………………………………………………………………………………………………


…………………………………………………………………………………………………………………………………………………… .

Higher Bandwidth – Advantage

 It makes ……………..…………………..…………… and ……………………………………...…………………………… faster.


 ………………………..……………… of data to be transferred in ……………………….……………… amount of time.
✓ Ex. Multiplayer online games , high-definition video streaming.

Buffer –
………………………………………………………………………………………………………………………………………………………………………………………………………………………… ,
especially when streaming video.

 To avoid the buffer becoming empty, data must be constantly downloaded into the buffer, filling it up at
a rate faster than it is emptied.

Latency

As well as bandwidth, the ………………………………………………………………………… of data transfer also depends of LATENCY.

1
LATENCY –
……………………………………………………………………………….……………………………………………………………………………………………………………………………………………

……………………………………………………………………………….……………………………………………………………………………………………………………………………………………

 We can identify latency by ‘Pinning’ a DOMAIN.

 When we ping a Domain, we send a packet of data to a server and the packet of data is immediately
returned by the server to the originating device.

 The ‘Ping Time’ – is the amount of time ………………………………………………………………………………………………………………………………


………………………………………………………………………………………………………………………………………………………………………….

DOMAIN – the name used to ……………………………………………….…………………………………………………………………………………………… .

IMPACT ON THE USER EXPERIENCE


 In online gaming, the game will play smoothly if the ……………………………………………………………. is adequate. (enough)

 If the …………………………………………… is high, events in the game will …………………………………… and the game will not seem

responsive to the player’s commands.

Factors that Affect Speed and Volume of Data Transfer

✓ ………………………………………………………………………… .

✓ ………………………………………………………………………… .

✓ ………………………………………………………………………… .

✓ ………………………………………………………………………… .

 When devices transfer data, they can be affected by many factors that stop bits from reaching their
destination.
 These bits then have to be sent again, which slows the overall data transfer rate.

Transfer Method

 Wireless methods have to work on a limited number of Frequencies.


Frequency – the waveband at which a radio signal is transmitted.

2
Comparison
 Wire methods, Ex. – Copper cable can carry more frequencies than wireless methods.
 Cable methods can have more bandwidth available to them than wireless methods.

INTERFERENCE
 Other electromagnetic signals disrupt or interface with wired and wireless signals.
Ex. Wireless routers and appliances emitting (discharge) electromagnetic fields like fridges and microwave
ovens.
 Cable connections can be Shielded (Protected) from this interference by having the wires wrapped in a
thin layer of metal.

BLOCKAGES
 …………………………………..…………… and ……………………………..……………………… reduce the strength of wireless signals.
 This reduces the available …………………………………………………………….

DISTANCE
 The strength (power) of a wired or wireless signal is reduced as the distance that it has to travel increases.

DEVICE-TO-DEVICE COMMUNICATION

 Devices can connect directly to each other using ……………………………………… or ……………………………………… methods.
 This is called DEVICE-TO-DEVICE COMMUNICATION.

3
Minijack
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………

HDMI - ……………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………

Table. h/w

NETWORK COMMUNICATION

LOCAL AREA NETWORK – LAN


✓ It is a network ………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

4
WIDE AREA NETWORK
 It is a network that is spread over a ……………………………………………………………………………………………………………………….

 They are often used to connect different buildings owned by national and international businesses, law
enforcement agencies, health and education organizations and government departments.

 Some organizations launch their ………………………………………………………………………………to provide connectivity for their


own global WANs.

 LANs are ……………………………………… together through …………………….……………………………… by third-party


telecommunication companies in order to provide connectivity.

WANs often have ……………………………………… transfer speeds than ……………………………………… because of their wider
reach.

What is the largest example of a WAN? ……………………………………………………… .

PERSONAL AREA NETWORK – PAN

 It is a group of connected devices that are all near an individual user.


Ex. ………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 Devices in a PAN can either be connected to each other directly or connected through access points.

5
PAN

What is “WPAN”? Explain - ……………………………………………………………………………….……………………………………………………….


………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

TETHERING
 It is the process of connecting a ……………………………….…………… device, such as a …………………………………..………………… or a
……………………………………… device, that uses a ………….…………………………………………………………………………………………… with one or more
other devices.

 This enables the other device or devices to ……………………………………… the host device’s ………………………………………
connection.

 Mobile phone network providers can enable or disable tethering as part of the Service Agreement –
(contract)

 Some network providers charge more for this feature to be enabled.

6
Consequence of Tethering
………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

The ways in which digital devices communicate

SATELLITE COMMUNICATION

• Satellites transmit data to and receive data from digital devices.


• Digital devices use antennae to receive the radio signals that satellite transmit.

7
Benefit of satellite communication
1. …………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

2. …………………………………………………………………………………………………………………………………………………………………………………………………….

Drawbacks of Satellite communication


1. …………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

2. …………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

GPS – GLOBAL POSITION SYSTEM


…………………………………………………………………….………………………………………………………………………

…………………………………………………………………….………………………………………………………………………

…………………………………………………………………….………………………………………………………………………

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………….………………………………………………………………………

TELEVISION
▪ What is the Internationally accepted standard method of broadcasting digital television?
…………………………………………………………………………………………………………………………………………………………………………………………………….

▪ Write an example of DVB


…………………………………………………………………………………………………………………………………………………………………………………………………….

DVD-S

8
▪ What the Set-top box is?
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

▪ Explain the process of Set-top box.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

▪ Explain why sometimes we do not want to use Set-top boxes.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

▪ What are the Newer digital broadcasting standards?


1. …………………………………………………………………………………………………………………………………………………………………………………………………….

2. …………………………………………………………………………………………………………………………………………………………………………………………………….

▪ Mention the advantages of them.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Analogue Video Broadcast Digital Video Broadcast

9
DIGITAL RADIO
DAB – ……………………………………………………………………………………………………………………………..…………………..

✓ It is broadcast in the same way as DVB.

✓ DAB provides, ……………………………………………….………………………………………… and can also carry text data that DAB
receivers can display.

✓ The text data can include the time, name of the station and details of the music being played.

Analogue Radio Broadcast Digital Radio Broadcast

TELEPHONE
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

10
WIRED COMMUNICATION
✓Some wires use for many different purposes such as USB. Others are only used to meet one particular
need, such as Ethernet.
Ethernet.
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Mention the use of following connection types

• HDMI ……………………………………………………………………………………

• S/PDIF (Sony/Philips Digital Interface) ……………………………………………………………………………………

• Minijack ……………………………………………………………………………………

• USB ……………………………………………………………………………………

• Ethernet ……………………………………………………………………………………

USB - ………………………………………………………………………..……………………… .
✓ (1996)– is a very ……………………………………….………………… connection type. It has been through a number of
revisions, and each revision allows ……………………………………………………………………………………………………………………………….

Ex. USB 2.0, USB 3.0

✓ Ethernet – allows users to connect to ……………………………… network.

What is the advantage of the development of the Ethernet technology?

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

✓ Maximum length of the Ethernet cable, before the signals it carries start to lose quality - ………………………
✓ Types of Cables use – Twisted pair cable, Coaxial Cable, Fiber Optic cable etc.

WIRELESS COMMUNICATION
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

11
Wi-Fi
✓ It is used in ……………………………………………and …………………………………………… networks.
✓ It is a wireless technology used to connect ……………………….……..………………… to a network.
✓ It uses the IEEE 802.11 specification of standard (Institute of Electrical and Electronics Engineers)

BLUETOOTH
✓ It is a type of …………………………..……………… connectivity that lets devices connect over
…………………………………………………..…… distance.

✓ It cannot carry as much data as ………………….………………………….


✓ Bluetooth devices need to be ……………………….…………………… with each other before they can communicate.
✓ It can be used to transfer ………………………………..……………files between devices.
✓ It connects devices such as, …………………………………………………… and …………………………………..………………… to
peripherals such as portable speakers, headphones, earphones, keyboards and mics.
➢ Mention an alternative to the Bluetooth – …………………………..……………………………………………………

➢ Mention an advantage of WiFi direct over WiFi.


…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….

➢ Write 2 similarities between WiFi and Bluetooth.

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

➢ Mention 5 differences between WiFi and Bluetooth.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

12
3G and 4G
✓ They are also referred to as ………………………..………………………………………………………………………….
✓ They are used to provide ……………………………..……………………………………………………… to mobile devices such as,
smartphones and tablet devices when a WiFi signal is not available.

✓ What are the planned improvements in future generations?


…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….

✓ What is the difference between 3G/4G and WiFi?


…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….

INFRA-RED (IR)
✓ IR signals cannot carry much data and only have a short range.
✓ Explain why Transmitters must have a clear line of signal to receive?

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

✓ Mention 2 disadvantage of IR.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

✓ Ex. Devices – Remote Control devices such as television remote controls.

NEAR FIELD COMMUNICATION (NFC)

✓ NFC uses close proximity ……………………………… chips. (Radio Frequency Identification)


✓ It is used in Smartphones, payment cards and travel cards.

✓ Mention another name for a Mobile Phone Network. - ………………………………………………………………………………

ISP
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….

13
FIBRE OPTIC CABLE
……………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………..……………………………………………………………………………

………………………………………………………………………………………………………………………….…………………………………………………………………………

……………………………………………………………………………………………………………………………….……………………………………………………………………

…………………………………………………………………………………………………..…………………………….…………………………………………………………………

COPPER CABLE
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………

BROADBAND , MOBILE BROADBAND AND CELLULAR NETWORKS


✓ Broadband networks provide ………………………….. access to the internet through a connection to an
……………………….. .

✓ They use the ………………………..…………………………….. cable or …………………………………………………….. cable


network.

✓ Mobile broadband provides ………………………………………………………………………………………………………


connectivity using ………………………………….. or ………………………………………….……… technology to connect to
the mobile phone network.

Difference between Wired and Wireless.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

14
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

- Chapter questions
1. Explain one reason why some games console controllers use Bluetooth rather than infra-red to connect
to the console.
IR signals do not travel as far as Bluetooth signals.
IR needs line of sight, if the controller is often pointed away from the consoler when in use
2. State one way in which using infra-red in games console controllers could affect the experience of the
person playing the game.
3. Describe bow video streaming works.
Packet or parts of video file are downloaded to the buffer, which is then topped up as the video plays.
3. Explain why streaming is more convenient for the user than downloading.
The user does not need to wait for the entire file to be downloaded. Before that the video can be played.
4. State 3 types of wired connections.
USB , HDMI , Mini Jack , Ethernet
6. Explain why global games companies use games servers in multiple countries to ensure that the
experience of users is not negatively affected when playing online games.
As people play games with other players from all around the world, and they want to avoid Lag which is
caused by Latency.

15
CHAPTER - 5 N E T W O R K S
Protocols

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

 In order to connect to a network, computers need to fulfil certain requirements so that they all operate
using standard Protocols.
Stand-alone
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Network Operating System.

 It allows a computer to ……………………………………………………………… on a ……………………………………………………….

Mention the Functions of the Network Operating System.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

16
Methods used to identify the devices on a network.
 ………………………………………………………………………………………………………………………………………………………

 ………………………………………………………………………………………………………………………………………………………

 …………………………………………………………………………………………………………….…………………………………………

IP Address

 It is a ……………………………..………………… address that networked ……………………………………… use to send data to each


other.
 IP addresses are made up ………………….……………………………………………. There are ………………………… main versions of
IP in use.
 ………………….………………………………………… and ………………………………………………………………… .
 IPv4 – uses,
……………………………………………………..…………… of up to 3 numbers separated……………………….…………………………………… .

Ex.
 IPv6 – uses
…………………………………………………………… of 4 hexadecimal numbers separated by ……………………………………………………… .

Ex.

 IP addresses can by either be assigned by a ……………………………………………………………………………………………………………


or allocated dynamically by a ………………………………………….…………………………….. running Dynamic Host Configuration
Protocol (DHCP)

 What is DHCP Server?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

17
MAC Address – Media Access Control

 It is a ………………………………………………………………………………………………………………identifiers
given to the NETWORK INTERFACE CARD – NIC.

 MAC addresses are used in devices connected to the ………………………….……..s.

 MAC address is usually made up of …………………………………………………………………… of characters.

 1st three pairs identify the ……………………………………………………………………… .

 Remaining pairs are assigned by the manufacturer to uniquely identify the ………………………………………………… .

Ex.

Explain what Hotspot is.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Explain what Spoofing is?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Device Name

 It is a descriptive name that helps users to identify ………………………………………………………………… on a network.

 Device names are not used by computers to ……………………………………………………… with each other as they are
not always ……………………………………………………… .

Explain why Device Name is not use by computers to communicate?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

18
 Device name can be ……………………………………………………….

CABLE

 Cables are used to connect …………………………..……………………………………… in a wired network.


Ex.

What does NIC do?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Why LEDs are used with NICs?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

FIBRE OPTIC CABLES

 It transfers data at the speed of ……………………………………………………… .


 They are expensive.
 They are used by , telecommunication companies and organizations that need …………………………………………
data transfer speeds.
Ex.

WIRELESS ACCESS POINT


 It allows devices with ………………………………….………… connectivity to connect to a ……………………………..……………………
network. They are often build into other hardware such as ………………………………………………………………….

 Also they are available as …………………………………………….………………………… devices that connect to a wired


network using ………………………….………………………………………………..

19
SWITCH

 ……………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………..……………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………………………………………………………………………

GATEWAY

 ……………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………..…………………………………………………………………………………………………………………………………………

Ex. LAN can be connected to a WAN using a Gateway.

20
ROUTER

 It stores ……………………………………….…………………………… of all devices that are


connected to it. So, it can forward network traffic to its destinations using
the quickest route.

 Most domestic routers have a switch and a wireless access point.


They also act as Gateways, connecting the LAN to the Internet,
(which is a type of WAN)

BOOSTER

 It is used to …………………………….…….……………………………… the signal in a network so


that its range can be extended.

 Boosters can be used for both ……………………………………………………… and


……………………………………..……………… connections.

 Wireless access points can be set to repeater mode in order to act as boosters for WiFi signals.

21
SERVER

………………………………………………………………………………………………………………………………..……………………

………………………………………………………………………………………………………………………………..……………………

………………………………………………………………………………………………………………………………..……………………

………………………………………………………………………………………………………………………………..……………………

 Clients – computers connected to the server are known as


Clients.
 Printers, Storage and Applications are resources that can be shared by servers.
Types of Servers
 Authentication server
 Print server
 File server
 Application server
 Web server

?. Write a summary of the above servers.

?. Explain how servers are more powerful than clients.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

? Explain why servers are more powerful than clients.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

?. Explain why servers have fast processors and lots of memory.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

?. Explain how the computer’s ability to perform multiple roles will depend?
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

22
INTERNET SERVICE PROVIDER – ISP

 ISPs provide connections to the ………………………………………………………………………………..……………………………………………………


that forms the framework for the internet.

 ISPs provide access via ………………………………………………………………………………………………………………………………….…… and


………………………………………………………………………………………………………….

WEB BROWSER

 Explain what a web browser is?


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Ex.

Search engine

Explain what a search engine is.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Explain how users can find information using search engine.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Explain the difference between a search engine and a web browser.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

FILTER SOFTWARE

 It prevents users from accessing inappropriate information.


Explain how filter software does it.
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….
23
Explain how the black list can be updated.
…………………………………………………………………………………………………………………………………………………………………………………………………….

Identify a use of Filter software.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

LOCAL AREA NETWORK – LAN

 It contained to a …………………………… area such as a …………………………………………… or ………………………………………………


network.
 It is available in …………………… different types / computers in a network can be connected using one of two
different models.
 1. ……………………………………………………….……………………………
 2. ……………………………………………………….……………………………

Peer-to-peer Network
 Computers in the peer to peer network ……………………………….……………… their ……………………………….……………… with
other computers in the network, but they do not ……………………………….……………………………..……………. .

24
Client-Server Network
 The network that uses ……………………………….……………… and ……………………………….……………… is called a client-server
network.

Benefits of using Client-Server Networks


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Benefits of using LANs / Advantages of LANs


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

NETWORK SECURITY
 It prevents ……………………………………………..….……………… users from accessing network ……………………………….………………
and ……………………………….……………….

25
……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………

……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………

……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………

Logins and Passwords


 Explain why users log in to computers on a network?
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

 Explain the use of Passwords in a login process.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

 Once a user has been authenticated, they do not have to log in each time they access a resource or
service.

FIREWALLS

 It is used at the ……………………………….……………… to a network.

 It controls the ……………………………………………..……….………………to and from a network, particularly the traffic from
the Internet.

 It prevents ………………………..……….……………… users from accessing network devices and resources. Ex. Storage.

 Firewalls are available as ……………………………….……………… and ……………………………….……………… .

 As a software it can be installed to the computer to prevent ……………………………….……………… from within a


network.

ENCRYPTION

 It is the process of ………………………………….……….………………, …………………………………….………….……………… or


……………………………….………….…………… data so that ……………………………………………..…………….……………… users are prevented

from being able to …………………………..…………….……………… it.

 After encrypting a message, the user is at the other end should decrypt it before reading. Typically it
happens automatically by the system.

(Book-Cipher)
26
Types of Encryptions
1. Symmetric key encryption
 It uses the ……………………………….……………… key at both ends of the process.
 Same key is used to encrypt and ……………………………….……………… the data.
2. Public key encryption
 It uses two ……………………………….…………………………………………………….…………keys called a ‘Key Pair’.
 One key is used to ……………………………….……………… the data and a different key is used to

……………………………….……………… it.

Wireless Encryption Protocol – WEP

 It is easier to encrypt data in wireless network than in a ……………………………….……………… network.


 WEP is used to ……………………………….……………… the wireless transfer of data.
 It is the ……………………………….……………… secure wireless data encryption method. Because, every device on
the wireless network uses the ……………………………….……………… key for every transfer.

Wi-Fi Protected Access – WPA

 It is a security protocol designed to provide ……………………………………………………….…….………………than WEP.


 WPA generates a new key for each device on the wireless network.
 New keys are also provided for each packet of data that is sent.

Virtual Private Network – VPN

 It provides access to a ……………………………….……………… LAN from a ……………………………….……………… Location.

 The connection to the LAN is created using the infrastructure of a public network like the Internet.

 Data sent using a VPN is ………………………………….……………….

Users can use VPNs to,


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

27
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

FILE ACCESS RIGHTS

 It is also known as …………………………………….…………………………………..…….……………….


 It can be set for individual files, folders or drives.
 User will get the permission either to read only or allowed to read and write to the file, folder or drive.

TRANSACTION LOGS

Log – ………………………………………………………………………………………………………………………………………………………………………………………….
Transaction – ………………………………………………………………………………………………………………………………………………………………………….

 Log file records all network activities.

Explain how Transaction log will be used.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

Describe the advantage of the Transactions logs to an administrator.


…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

BACKUPS

 It is copy of ……………………………….……………………………………………….……………………………………………….……………….
 Backups are usually stored on a …………………………………………………………………………………….….………………device to the
original file.

28
Chapter Questions

2. Explain why public key encryption is more secure than symmetric key encryption.
Public key encryption uses two different keys to encrypt and decrypt the data.

3. State which security device controls the traffic entering a network.


Firewall
4. State two methods by which devices are identified to each other on a network.
IP address , MAC address
5. Explain why IPv6 used to replace IPv4.
The IPv4 could not provide enough unique addresses to serve the number of devices being connected to
the Internet.
6. State 2 uses for a VPN
To avoid geolocation right management.
Make secure payments online.
To work from home
7. State the reason why a booster is used in a network.
It is used if the network signal has a limited range
8. Describe how encryption secures data.
Data is jumbled and scrambled using a key, which makes it can only be accessed by others with the
network key.
9. List 3 methods of securing data on networks.
Firewall , Encryption , File access rights , Passwords/login
10. State 3 benefits to users of using a local area network.
…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………………………………………….
29

You might also like