0% found this document useful (0 votes)
25 views5 pages

4.2 - Network Issues and Communication Ict 2024

The document provides an overview of various network devices and their functions, including hubs, routers, switches, and firewalls. It discusses the differences between IP and MAC addresses, as well as the advantages and disadvantages of Bluetooth and Wi-Fi technologies. Additionally, it explains the concepts of the internet and intranet, highlighting their purposes, security measures, and differences.

Uploaded by

tlotlo mozila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

4.2 - Network Issues and Communication Ict 2024

The document provides an overview of various network devices and their functions, including hubs, routers, switches, and firewalls. It discusses the differences between IP and MAC addresses, as well as the advantages and disadvantages of Bluetooth and Wi-Fi technologies. Additionally, it explains the concepts of the internet and intranet, highlighting their purposes, security measures, and differences.

Uploaded by

tlotlo mozila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

IGCSE LEVEL ICT

4.2 NETWORK ISSUES AND COMMUNICATION


Computer Networks • Can act as a web server
• Can act as a buffer (between Internet and LAN)
Network Devices
• Server passes on requests to the Internet
Network devices and what it does.
• Passes the requested web pages to individual computers
1. Hub • Can cache/store the webpages
• Broadcasts data packets to computers in a LAN • Subsequent requests for that/those web page(s) are
• Can connect many devices responded to more quickly
• It is not secure to use • Can be used to monitor Internet usage

2. Router • Can block certain sites

• Connects LANs to a WAN/Internet 8. Modem


• Enable data to be routed between different networks Modulates data and demodulates phone signals
• It inspects the data packets 9. Gateway
• It can use both private and public • It is a network point that acts as an entrance to another
network
3. Switch
• Id a network needs to communicate with another device
• Directs data packets to specific computers outside the network, it will use a getaway
• Sends data to appropriate computer only • How computers in different networks communicate.
• Connect many device • It may be a router, firewall, server, or other device that
• Very secure to use enables traffic to flow in and out of the network
• It uses the MAC media access control address to send data Router
to appropriate computer
• The network software in the original computer determines
• Switched hub that the destination computer is on a
• Has many computers connected to it • different network by. using IP addresses
• Can learn/store addresses of each computer in that part of • Data is sent to the switch/hub and then passed to router,
the network the router then passes it to the router of the other network
• Can direct data to specific computers/devices and then that router passes it to the switch/hub to the
destination computer
4. NIC
Bridge
• Enables computers to be connected to a network or
internet • The computer sends the data to the bridge via the
hub/switch by using MAC addresses
• It has a mac address
• if the protocol/MAC address is same, bridge passes data to
• Connects computers within a LAN the other network and the Bridge passes it to the
5. Bridge switch/hub

• Connects networks/LANs together/Directs data packets to • And the switch passes the data to destination computer
specific networks with correct MAC address

• Connect LAN to LAN so that it can make one single LAN


6. Proxy server Difference between a hub and a switch

Stores web pages for faster re-use by computers/can act as Similarities


a firewall • A hub and a switch both are used to connect devices to
form a LAN
7. Role of proxy Server
• Both a hub and a switch use data packet
• A switch is a type of hub • Prevents computer accessing
undesirable/unauthorized sites
• Both check/read the data packets
• Prevents unauthorized computers using the internet
Differences
accessing the computer
• In a hub a data packet is broadcast / sent to every
• Keeps a list of undesirable sites/IP addresses
computer or device on
• Keeps a list of acceptable sites/IP addresses
• the LAN whereas in a switch the data packet is sent to a
specific computer • Warns you regarding threats/allows you to
accept/reject downloaded programs
• Security is lower in a hub as all data is broadcast
Items which can be provided by an ISP.
• In the switch the destination address is determined/looked
up before it is • Access to the internet
• sent whereas in hub data packets are sent to all • Email address
• A switch uses MAC addresses to locate the destination of • Router to connect to the internet
the device
• Domain name to have own website
• whereas is a hub MAC addresses are not checked
• Email security software
• A switch uses a look up table to determine destination this
• Web space to create own website
is not required in
• Storage space to save data in the cloud
• a hub
• DNS service to convert URLs to IP addresses
• A switch is capable of more functionality / multiple VLANs
but not in a hub • Firewall to block unauthorized traffic

How to setup a network


How a router routes data packet. • Purchase the hardware
• The router Inspects the data packets received • Purchase/download the software
• Checks the destination IP address« • Set up the hardware
• «Using the stored routing table • Configure all the hardware
• It uses a routing table which lists all the different routes to • Load the software onto the computers
other networks
• Purchase network licenses
• Uses the IP address to work out the best route« and sends
• Set up staff privileges
• «Sends the data packet to the next router
• Purchase a hub/switch
• Allocate/set IP addresses
Details of computer addresses that are • Install network cards
stored by a router
• Set up file/printer sharing
• Stores IP addresses
• Set up
• IP address is a unique identifier set up by network
manager/ISP
How a router works.

• Can change but should match the network it’s on • A router receives/sends data packet
• IP address consists of 4 numbers separated by full stops • Routers inspect the data packets received

• Stores MAC addresses • Checks the destination IP address

• 6 pairs of hexadecimal digits • Checks the IP address using the stored routing table

• MAC address is usually hard coded by manufacturer, never • It uses a routing table which lists all the different routes to
changes. other networks

How a firewall could be used to secure the • Data packet is sent to the appropriate/next switch/router
data in a computer connected to the • Uses the MAC address to send to correct computer/device
internet. • Uses the IP address to work out the best/quickest route
• Monitors and controls incoming and outgoing data
traffic
Tasks carried out by a firewall.
• Helps to prevent malware getting into computer/from
the internet
• examines/monitors traffic to and from a user’s computer Limitation of Bluetooth
and a network/Internet
• Very slow data transfer speeds
• checks whether incoming and outgoing traffic meets a
• Short distance of coverage/limited signal strength
given set of criteria/rules
• Greater risk of interception of data/less secure
• firewall blocks/filters traffic that doesn’t meet the
criteria/rules • Supports a limited number of devices in a network
• logs all incoming and outgoing traffic Discuss the advantages and
• can prevent viruses or hackers gaining access disadvantages of using Bluetooth or Wi-
• blocks/filters access to specified IP addresses/websites Fi.
• warns users of attempts by software (in their computer) • Bluetooth is more useful when transferring data
trying to access external data between two devices whereas Wi-Fi is
• sources (e.g., updating of software) etc. // warns of • more suited to full scale networks
attempted unauthorized access to the system • Bluetooth does not buffer
• The devices connected via Bluetooth should be near to
The difference between IP and MAC each other whereas Wi-Fi has a larger range
• Less data tends to be transferred with Bluetooth
MAC address
• Bluetooth uses a lower bandwidth E.g., sound data
• Media Access Control (address)
(phones) or file transfer (computers)
• unique number that identifies a device (connected to the
• Wi-Fi has better security than Bluetooth
Internet)
• Cost of Bluetooth is cheaper than Wi-Fi
• address is made up of manufacturer id + serial number of
devices • Bluetooth has a shorter password
• address is allocated by the manufacturer • Bluetooth devices are battery operated which needs to
be replaced or recharged but
• Wi-Fi do not necessarily use batteries
IP address
• To connect to the network, need a Bluetooth adapter
• Internet Protocol (address) but Wi-Fi needs a Wi-Fi adapter, a
• location/address of a device on the Internet • wireless router and a wireless access point
• address is unique for given Internet session • Bluetooth range is approx. 20m whereas Wi-Fi is
• address is supplied when a device connects to the Internet approx. 100m
• address is allocated by the network • Bluetooth is simple to use and setup, but Wi-Fi is more
complex
• Bluetooth/Wi-Fi are both wireless can’t fall over the
Wi-Fi – Wireless fidelity wires/move around the house
• It offers wireless communication using radio waves • Saves money (on cables) as both do not require wires
• It uses devices like WAP and AP and can communicate up to • Bluetooth is more energy efficient than Wi-Fi
100 meters.
• in some cases, 3% of the energy
• It is a line of sight meaning obstacles can block signals
How a tablet computer can connect to a
printer using Bluetooth.
Bluetooth
• The devices automatically connect when they come into
Devices that can be connected using range
Bluetooth • Tablet sends radio signals to the printer / printer receives
radio signals from
• the tablet
• Mouse Keyboard • Tablet receives radio signals from the printer / printer
responds using radio
• Printer Mobile phone
• signals
• PDA Headphones
• A handshake takes place
• Webcam Camera
• Microphone Laptop
• Scanner Graphics tablet
• Award a mark for mention of use of 4-digit code for access / • Devices automatically detect and connect to each
default code / other
• auto connection with code / some devices don’t need code • Used for short distances
• Uses a band of 79 radio frequencies / channels • Randomly picks channels to use one of 79 channels can
be used
• The tablet computer randomly chooses one of the radio
frequencies / • Uses spread spectrum frequency hopping
• channels to use • Constantly change the channels to stop interference
with other communication systems
• If it is being used it chooses another at random until it finds
a free one • Used for low-bandwidth applications, e.g., streaming
music
• Uses spread-spectrum frequency hopping
• Used when the speed of transmission is not critical
• Bluetooth can be used to create a secure Wireless
Differences in use between Wi-Fi and Personal Area Network
Bluetooth. • Intrusive as personal details have to be stored in
• Wi-Fi technology enables local area network… biometrics
• … and Internet connections • Can be a slower entry using biometrics as more checking is
carried out
• Using Wi-Fi, a laptop or desktop computer can connect to a
network's wireless router • Security can be lowered with biometrics due to problems
in reading data
• Bluetooth connects two devices together
• Harder to set up the biometric system
• Usually, Bluetooth peripherals are powered by batteries
that need to be charged or replaced • Takes longer to add new people to the system
• Wi-Fi covers a larger distance than Bluetooth • Biometrics can use a lot of memory to store the data
• Wi-Fi requires more than ten times more bandwidth than • Signature/voice entry – person needs to write the
Bluetooth signature the same each

Compare and contrast Bluetooth and Wi-Fi. • time/speak the same each time
• Voice can be recorded by mobile device and then used to
Similarities
enter system
• Both Wi-Fi and Bluetooth use wireless communications
• Security issues if data from signatures are used in other
• Both Wi-Fi and Bluetooth use radio frequencies for ways
communication/radio waves
• Examples:
• Both Wi-Fi and Bluetooth allow several devices to be
• Retina/iris scan/face recognition/fingerprint/handprint
connected
How security can be improved in a Wi-Fi
• Both use security when sending data
network.
Differences
• Secure the wireless router/network with a strong password
• Wi-Fi has faster data transfer rate
• Do not broadcast the Wi-Fi security key/SSID
• Wi-Fi has a greater range of transmission
• Enable WPA encryption
• Wi-Fi uses key matching encryption
• Disable remote administration to the router
• Bluetooth uses WEP and WPA security together
• Enable user management
• Wi-Fi can be broadcast
• Change from the default SSID
• Bluetooth has more channels
• Use MAC address filtering/change the router IP address
• Wi-Fi connects more devices
• Use wireless security software
How computers can use Bluetooth to What is the internet?
connect to a device. • Public network/not policed.
• Bluetooth sends and receives radio waves • International network of networks
• Enable Bluetooth • WAN/wide area network.
• Bluetooth searches for the other devices • Worldwide/global/international
• Pairs the two devices • Public information system
• Web, email, gophers, social networking, video • Do not have to waste time going to the library.
conferencing are services provided by the • Do not have to spend money going to the library.
internet. • Ability to discuss topics far easier with people
from around the world.
What is an intranet?
• Ability to get a wider range of opinions.
• Internal restricted access network/secure
• Allows emailing therefore sending/collecting
network
information far quicker than manual methods.
• Uses same protocols as the internet.
• Data is digital therefore can be easier to transfer to
• Private network documents.
• Used within an organization e.g., school. • Online conferencing can be conducted.
Limited resources
The purpose of Intranet Advantages and disadvantages of using the
• Private/confidential data stays within a school’s intranet rather than the internet to
company/organization/school access this student work files area.
• To store relevant/up to date information about Advantages
the organization available to workers
• The school /controls intranet.
• To facilitate communication/collaboration
between workers/students/teachers • More secure as it needs a password.
• Make it easier to access company specific • Intranet private network only contains
applications. information that is relevant.
• Restrict access to certain sites of the • Intranet resides behind a firewall therefore
internet/regulate access to the internet.
data is more secure.
• Restrict access for certain employees.
• Messages can target the correct students.
Differences between an intranet and the • Better bandwidth on the intranet
Internet. • Access from external people is barred.
1. Internet is network of networks/intranet does
not have to be a network of networks. Disadvantages

2. The Internet is global. • More expensive to set up.


3. Intranet is within one organization. • More time consuming to set up.
4. Intranet is private/Internet is public. • More time spent on administration i.e.,
5. Intranets tend to be policed/managed. passwords.
6. The intranet has an extra layer of security. • May only be viewed within the school.
7. Data found in an intranet is likely to be more • More expensive to maintain.
dependable/relevant than that found on the • More time consuming to maintain.
Internet. • Will not be able to access school files at home
Internet has more information than an intranet for homework.
[4.
• School would need to provide more computers
Advantages of internet for research projects across the school for students to use to access
• Vast amount of information available via the intranet.
• More up to date information is available as the
information in books may be outdated.
• Wider range of information from every level of
society/scholarly to research
• Information can be found quicker using specialist
search engines.
• Information can be researched at home rather than
using research libraries.

You might also like