0% found this document useful (0 votes)
19 views

CIE ICT Chapter 4 Notes

Uploaded by

Kham Sian Khai
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

CIE ICT Chapter 4 Notes

Uploaded by

Kham Sian Khai
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Networks & the Effects of Using

Them
Networks
Routers

A device that enables data to be sent between different types of networks. It can be

connected through cables or wirelessly to connect a LAN to the internet.

It can be used for:

• connecting networks and devices to the internet,

• storing computer addresses,

• routing data packets.

When a data packet is received, the router checks if the packet is intended for it or

another network. The data packet is routed to the local switch/hub if it's meant for its

network. If not, the data packet is sent to the relevant router, which sends it to the

relevant device.

• They consult routing cables to know where to send the data.

Common Network Devices

1. Network Interface Cards (NIC): These are needed to allow a device to connect to a

network. Turns binary data into an electrical signal that allows network access. Usually

integrated into the motherboard.


• Each NIC is given a unique hardwired media access control (MAC) address.

Media access control (MAC) address: a number that uniquely identifies a device when

connected to a network.

• The first six hex digits identify the manufacturer’s code, and the next 6 identify the

device’s serial number.

2. Hubs: they are hardware devices that can have several other devices connected to

them. They are used to connect devices together to form a local area network (LAN). It

takes a data packet received by one of its ports and sends it to all relevant or irrelevant

devices that are connected to it.

• It is not very secure to broadcast data to all devices.

• Unnecessary network traffic.

3. Switches: intelligent hubs. Used to connect devices to form a LAN. Unlike hubs, the

switches store the MAC addresses of all devices on a lookup table. So, it only sends

data to the relevant device.

In summary:

• Both are used to connect devices in LAN.

• Both use data packets.

• Hubs send data to every device on the network.

• Switches send data to a relevant device only.

• Switches have better security.

• Switches use lookup tables to determine the destination for a data packet.

• Switches use MAC addresses for relevant device locations.


4. Bridges: Devices that connect one LAN to another LAN that use the same protocol.

Unlike routers, they can’t communicate with external networks, such as the Internet.

Comparison:

• Bridges connect LANs together; routers connect various types of networks together.

• Bridges scan MAC addresses while routers scan the IP addresses.

• Both send out data in the form of data packets.

• Bridges connect networks with the same protocol; routers can connect networks with

different protocols.

• The router uses routing tables to direct data packets, but bridges don’t.

• Bridges have only two ports; routers have multiple ports.

Wi-Fi & Bluetooth

Both are used for wireless communication between devices. They both use

electromagnetic radiation as the carrier of data transmission.

Bluetooth uses:

• When transferring data between 2 or more devices that are very close together.

• When the speed of data transmission isn’t crucial.

• For low-bandwidth applications.

Wi-Fi uses:

• Full-scale networks.

• When the data transfer rate is crucial.

• For uses where a higher range and better security are required.

Differences and similarities:


• Bluetooth uses a transmission frequency of 2.4 GHz, whereas Wi-Fi uses a 2.4 – 5.0

GHz range.

• Wi-Fi has a much faster data transfer rate.

• Wi-Fi has a higher geographical range in which it is effective.

• Bluetooth only allows up to 7 devices to be connected simultaneously, whereas the

number of devices connected to a Wi-Fi network depends on the router/routers used.

• Bluetooth uses key-matching encryption. However, Wi-Fi uses WPA (Wi-Fi protected

access) and WEP (wireless equivalent privacy).

Cloud Computing

This method is where data is stored on remote servers accessed online.

The three types of cloud storage are:

1. Public Cloud - The customer and the cloud storage provider are different companies.

2. Private Cloud - The customer and the cloud storage provider are a single organization.

3. Hybrid Cloud - Combines public and private cloud options and allows sensitive data to

remain private while providing public cloud services for less sensitive information.

• Cloud data is duplicated and stored on other servers to ensure availability during

system failures, upgrades, and maintenance.

Advantages:

• Services can be scaled up or down according to changing requirements.

• Cloud storage eliminates the need for a business to purchase expensive equipment for

infrastructure and maintenance.

• Readily available globally, allowing both remote working and data sharing.
• Providers offer high levels of ensuring that services are always available.

• It can offer an almost unlimited amount of storage.

• A backup of the data from the cloud will allow full data recovery in case of incidents.

• Files can be synced across multiple devices.

• There is no need to carry storage devices around.

Disadvantages:

• A stable internet connection is always required.

• Data storage in clouds may be vulnerable to security breaches.

• The user depends on the storage provider for reliability and availability of services.

• The services may become expensive as the amount of storage or bandwidth required

increases.

Common Network Environments

1. Internet:

• The Internet is a very large global network that consists of many

other interconnected networks

• The World Wide Web is a vast collection of web pages that can be accessed using a

web browser.

• The World Wide Web allows you to access information by using the internet

Characteristics:

• It is an open network, meaning everyone can access the same resources and

information as everybody else.

• People from all over the world can communicate with each other in real-time.
• Available to anyone who has a suitable device and access to any one of the

interconnected networks.

Uses:

• Education and training

• Social Networking

• Online shopping

• Entertainment

2. Intranet:

• Usually private and are used to send information securely and safely.

• Access to an organization’s Intranet is restricted and only accessible to authorized

users such as employees.

• Intranets have many advantages over the internet, such as:

o better bandwidth than the internet,

o data is kept within the organization,

o less chance of hacking and attacks,

o administrators can manage access to external sites and links.

Characteristics:

• A private network that is accessible to employees within a company or organization.

• Usually behind a firewall to ensure security.

• Allows for document sharing and the use of collaboration tools between users.

• It can be customized to meet the specific requirements of the business.

• Users will require a username and password to access the Intranet.


3. Extranet:

• Private Intranet that also allows access by selected parties that reside outside of the

organization. These parties, for example, maybe customers, key stakeholders or clients.

• Users will have an authorization level once they have successfully logged in, which will

determine which resources they may access.

• Similarities between the Internet, Intranet and extranet are as follows:

o They are all web-based technologies

o They allow users to access information remotely

o They all use client-server architecture

o They all use security measures such as authentication and encryption

o They all promote and facilitate information and resource sharing

• Differences between the internet, intranet and extranet are as follows:

o The internet is a global network, whereas an intranet/extranet is a private network

contained within an organization

o The use of the internet covers a wide range of purposes, whereas an intranet/extranet is

designed for specific users and purposes.

o Much information is publicly available, whereas an intranet/extranet is not.

o The Internet is not owned solely by one person or organization, whereas the

organization usually owns intranets/extranets.


Network Types

1. Local Area Network (LAN): networks usually contained within a single building or

small geographical location. It is made up of hubs and/or switches, which will connect

several devices together. One hub or switch commonly connects to a router, allowing

LAN connectivity to other outside networks such as the Internet.

Advantages:

• Allows centralized management of updates, backups and software installations.

• Can secure its devices with the use of firewalls, antivirus software and other security

features to prevent unauthorized access.

• A LAN allows users on the network to share resources such as printers and other

peripherals.

Disadvantages:

• The network may not function correctly in case of hardware failure.

• They are more prone to attacks than standalone computers.

• Data and peripheral accessing can be slow, based on network traffic.

• LAN networks require maintenance to ensure the software is up-to-date.

2. Wireless Local Area Network (WLAN): Local Area Networks allow devices to connect

wirelessly rather than using physical cables. Wireless Access Points (WAPs) are

connected to an existing wired network, which provides wireless connectivity. Support a

vast range of devices, such as smartphones and laptops, are very popular in public

areas such as shopping malls.

Advantages:

• Allows users to connect anywhere in the range of a Wireless Access Point (WAP).
• They can be used in various indoor and outdoor environments, making them highly

flexible.

• As the requirements change, additional WAPs can be added relatively easily.

• Printer access can be given to wireless devices.

Disadvantages:

• The strength of their signals can be affected by obstacles such as walls.

• Speeds can be affected by high-traffic areas.

• It can sustain interference from other devices which can affect performance and

connectivity.

• Can be vulnerable to security threats due to signal interception.

3. Wide Area Networks (WAN): is formed by several LANs connected through a router. It

is expensive. However, it comes with a more enhanced security. Additional hardware is

needed for a WAN: Routers, modems, and proxy servers.

Advantages:

• Provide the ability to connect geographically dispersed locations, such as offices in

different cities or countries.

• Offer the flexibility to scale up or down based on the organisation's needs.

• Administrators can monitor and manage the network infrastructure from a single

location.

Disadvantages:

• Setting up and maintaining a WAN can be expensive, especially compared to LANs.

• Cover larger distances and rely on public networks or leased lines, which can introduce

latency and affect performance.


• WANs are subject to the reliability and availability of external service providers.

Network Issues and Communication


• Connection to a network exposes a user to:

o Hacking: Unauthorized access given to the computer. This can lead to identity theft or

the misuse of personal information.

o Phishing: Phishing involves getting sensitive information, such as usernames,

passwords, and credit card details, for malicious reasons by mimicking a reliable

webpage on the network

o Pharming: This is malicious code installed on a user’s computer or a web server; the

code will redirect the user to a fake website without their knowledge (the user doesn’t

have to take any action, unlike phishing).

o Viruses: Program code that replicates (copies itself) to delete or corrupt files and cause

the computer to malfunction

Passwords

It is a common form of security often accompanied by a username or email address.

• There are many ways to enhance the security of your password, such as the following:

o Ensure that the password is changed regularly in case it has been obtained illegally or

accidentally

o Ensure that the password uses a combination of uppercase, lowercase, numbers and

special characters to make the password more difficult to guess.

o iloveict is a weak password

o 1lov3ICT# is a strong password


• Anti-spyware software can be run regularly to ensure that your information, including

your password, is not passed to an unauthorized third-party user.

Other Authentication Methods

1. Zero login: A security concept that eliminates traditional login methods, such as

usernames and passwords, using biometrics or other authentication factors for

seamless and password-less access.

2. Biometric Recognition: These authentication methods use unique physical or

behavioural characteristics, such as fingerprints, iris scans, or voice recognition, to

verify a person's identity.

3. Magnetic Stripes: These are authentication features on cards storing data

magnetically. They enable secure identification and authorization by containing encoded

information that magnetic stripe readers can read.

4. Smart Cards: Smart cards are portable devices with integrated circuits to store and

process data. They are used for authentication, identification, and secure transactions in

various applications such as banking, telecommunications, and access control.

5. Physical Tokens: It is a type of authentication that takes the shape of a solid object.

The user demonstrates ownership of the token through interaction with a login system.

Physical tokens have embedded clocks that create one-time passwords (OTPs) when a

PIN and other authentication information are entered.

6. Electronic Tokens are applications that users install on their hardware, such as

smartphones. Say a person wants to access a website on a tablet computer. To access

this website, users must first authenticate themselves using electronic tokens. The user

has already set up the electronic token app with their smartphone. The user launches
the app on their smartphone when the website asks them to verify their identity. The

program creates an OTP that is only good for a short period of time.

Anti-malware Software

• Anti-malware software is designed to protect devices against viruses and malicious

software. It has 3 primary purposes: detect, prevent and remove malicious software. It is

installed onto a computer system and will operate in the background.

Standard features of Anti-Malware software include the following:

• Comparing the scanned files against an extensive database of known threats

• Real-time scanning

• Regular updates to gather an up-to-date list of known threats

• Quarantine of infected files

o Quarantining files allows threats to be automatically deleted.

o Allows the user to determine if the file is a legitimate threat and not a false positive.

Heuristic Checking: Instead of relying solely on a database of known viruses, this

method looks for behavioural patterns and other features in a file to identify possible

risks.

Electronic Conferencing

1. Video Conferencing: It is a form of audio and video communication. It serves as a

stand-in for face-to-face meetings between several persons who may reside abroad or

in another region of the country. It utilizes a network in some way and is done in real-

time.
The basic hardware includes:

• webcams,

• large monitors/television screens,

• microphones,

• speakers.

The software used are:

• Webcam and microphone software drivers

• CODEC (coder and de-coder)

• Echo cancellation software

Advantages:

• It is much easier to access important documents or bring in ‘experts’ at key parts of the

conference.

• It is possible to hold conferences at short notice.

• Reduced travelling costs.

• There is no need to pay for hotel accommodation or venue hire.

• Reduces the cost of taking people away from work for two or three days to travel.

• Using video conferencing is better than having delegates travel to potentially unsafe

places worldwide.

Disadvantages:

• Potential time lag in responses/delays when talking.

• Images can jerk.

• It is very expensive to set up in the first place.

• Problems if the delegates live in different countries with large time zone differences.
• Requires IT knowledge to some extent.

• It's not the best for people who consider travelling a job perk.

• Completely reliant on stable internet connections.

2. Audio Conferencing: Meetings held using audio (sound) technology are called audio

conferencing. The normal telephone network can be used for audio conferencing,

frequently called a phone conference.

The hardware required is:

• a computer (with built-in microphones and speakers)

• external microphone and/or speakers

• an internet phone

• a standard phone.

Advantages:

• Allows participants to join meetings from any location.

• Eliminates the need for travel expenses, such as transportation, accommodation, and

meals.

• Saves time by eliminating travel time and allowing meetings to be scheduled and

conducted quickly.

Disadvantages:

• Lacks the visual aspect of face-to-face meetings, which can hinder communication.

• It can limit interaction and engagement compared to in-person or video conferencing.

• Heavily relies on technology, and technical issues such as poor audio quality,

background noise, or connectivity problems are common.


3. Web Conferencing:

Web conferencing, often known as webinars or webcasts, makes use of the Internet to

enable conference calls. This system makes use of numerous computers that are

interconnected over the internet. It operates in real-time, just like video conferencing,

and enables the following meeting types:

» business meetings to discuss new ideas

» presentations

» online education or training.

Advantages:

• Allows participants to see each other through video, providing a more immersive and

engaging experience than audio conferencing.

• Often offer screen sharing capabilities, enabling participants to share presentations,

documents, or other visual content in real-time.

• Often provide features like chat, polling, hand raising, and Q&A sessions, fostering

interactivity and engagement among participants.

Disadvantages:

• Heavily relies on internet connectivity and technical infrastructure.

• They can be susceptible to distractions and multitasking.

• It often has various features and settings that participants need to familiarize

themselves with, especially if they are new to the platform.

You might also like