IGCSE LEVEL ICT
4.2 NETWORK ISSUES AND COMMUNICATION
Computer Networks • Can act as a web server
• Can act as a buffer (between Internet and LAN)
Network Devices
• Server passes on requests to the Internet
Network devices and what it does.
• Passes the requested web pages to individual computers
1. Hub • Can cache/store the webpages
• Broadcasts data packets to computers in a LAN • Subsequent requests for that/those web page(s) are
• Can connect many devices responded to more quickly
• It is not secure to use • Can be used to monitor Internet usage
2. Router • Can block certain sites
• Connects LANs to a WAN/Internet 8. Modem
• Enable data to be routed between different networks Modulates data and demodulates phone signals
• It inspects the data packets 9. Gateway
• It can use both private and public • It is a network point that acts as an entrance to another
network
3. Switch
• Id a network needs to communicate with another device
• Directs data packets to specific computers outside the network, it will use a getaway
• Sends data to appropriate computer only • How computers in different networks communicate.
• Connect many device • It may be a router, firewall, server, or other device that
• Very secure to use enables traffic to flow in and out of the network
• It uses the MAC media access control address to send data Router
to appropriate computer
• The network software in the original computer determines
• Switched hub that the destination computer is on a
• Has many computers connected to it • different network by. using IP addresses
• Can learn/store addresses of each computer in that part of • Data is sent to the switch/hub and then passed to router,
the network the router then passes it to the router of the other network
• Can direct data to specific computers/devices and then that router passes it to the switch/hub to the
destination computer
4. NIC
Bridge
• Enables computers to be connected to a network or
internet • The computer sends the data to the bridge via the
hub/switch by using MAC addresses
• It has a mac address
• if the protocol/MAC address is same, bridge passes data to
• Connects computers within a LAN the other network and the Bridge passes it to the
5. Bridge switch/hub
• Connects networks/LANs together/Directs data packets to • And the switch passes the data to destination computer
specific networks with correct MAC address
• Connect LAN to LAN so that it can make one single LAN
6. Proxy server Difference between a hub and a switch
Stores web pages for faster re-use by computers/can act as Similarities
a firewall • A hub and a switch both are used to connect devices to
form a LAN
7. Role of proxy Server
• Both a hub and a switch use data packet
• A switch is a type of hub • Prevents computer accessing
undesirable/unauthorized sites
• Both check/read the data packets
• Prevents unauthorized computers using the internet
Differences
accessing the computer
• In a hub a data packet is broadcast / sent to every
• Keeps a list of undesirable sites/IP addresses
computer or device on
• Keeps a list of acceptable sites/IP addresses
• the LAN whereas in a switch the data packet is sent to a
specific computer • Warns you regarding threats/allows you to
accept/reject downloaded programs
• Security is lower in a hub as all data is broadcast
Items which can be provided by an ISP.
• In the switch the destination address is determined/looked
up before it is • Access to the internet
• sent whereas in hub data packets are sent to all • Email address
• A switch uses MAC addresses to locate the destination of • Router to connect to the internet
the device
• Domain name to have own website
• whereas is a hub MAC addresses are not checked
• Email security software
• A switch uses a look up table to determine destination this
• Web space to create own website
is not required in
• Storage space to save data in the cloud
• a hub
• DNS service to convert URLs to IP addresses
• A switch is capable of more functionality / multiple VLANs
but not in a hub • Firewall to block unauthorized traffic
How to setup a network
How a router routes data packet. • Purchase the hardware
• The router Inspects the data packets received • Purchase/download the software
• Checks the destination IP address« • Set up the hardware
• «Using the stored routing table • Configure all the hardware
• It uses a routing table which lists all the different routes to • Load the software onto the computers
other networks
• Purchase network licenses
• Uses the IP address to work out the best route« and sends
• Set up staff privileges
• «Sends the data packet to the next router
• Purchase a hub/switch
• Allocate/set IP addresses
Details of computer addresses that are • Install network cards
stored by a router
• Set up file/printer sharing
• Stores IP addresses
• Set up
• IP address is a unique identifier set up by network
manager/ISP
How a router works.
• Can change but should match the network it’s on • A router receives/sends data packet
• IP address consists of 4 numbers separated by full stops • Routers inspect the data packets received
• Stores MAC addresses • Checks the destination IP address
• 6 pairs of hexadecimal digits • Checks the IP address using the stored routing table
• MAC address is usually hard coded by manufacturer, never • It uses a routing table which lists all the different routes to
changes. other networks
How a firewall could be used to secure the • Data packet is sent to the appropriate/next switch/router
data in a computer connected to the • Uses the MAC address to send to correct computer/device
internet. • Uses the IP address to work out the best/quickest route
• Monitors and controls incoming and outgoing data
traffic
Tasks carried out by a firewall.
• Helps to prevent malware getting into computer/from
the internet
• examines/monitors traffic to and from a user’s computer Limitation of Bluetooth
and a network/Internet
• Very slow data transfer speeds
• checks whether incoming and outgoing traffic meets a
• Short distance of coverage/limited signal strength
given set of criteria/rules
• Greater risk of interception of data/less secure
• firewall blocks/filters traffic that doesn’t meet the
criteria/rules • Supports a limited number of devices in a network
• logs all incoming and outgoing traffic Discuss the advantages and
• can prevent viruses or hackers gaining access disadvantages of using Bluetooth or Wi-
• blocks/filters access to specified IP addresses/websites Fi.
• warns users of attempts by software (in their computer) • Bluetooth is more useful when transferring data
trying to access external data between two devices whereas Wi-Fi is
• sources (e.g., updating of software) etc. // warns of • more suited to full scale networks
attempted unauthorized access to the system • Bluetooth does not buffer
• The devices connected via Bluetooth should be near to
The difference between IP and MAC each other whereas Wi-Fi has a larger range
• Less data tends to be transferred with Bluetooth
MAC address
• Bluetooth uses a lower bandwidth E.g., sound data
• Media Access Control (address)
(phones) or file transfer (computers)
• unique number that identifies a device (connected to the
• Wi-Fi has better security than Bluetooth
Internet)
• Cost of Bluetooth is cheaper than Wi-Fi
• address is made up of manufacturer id + serial number of
devices • Bluetooth has a shorter password
• address is allocated by the manufacturer • Bluetooth devices are battery operated which needs to
be replaced or recharged but
• Wi-Fi do not necessarily use batteries
IP address
• To connect to the network, need a Bluetooth adapter
• Internet Protocol (address) but Wi-Fi needs a Wi-Fi adapter, a
• location/address of a device on the Internet • wireless router and a wireless access point
• address is unique for given Internet session • Bluetooth range is approx. 20m whereas Wi-Fi is
• address is supplied when a device connects to the Internet approx. 100m
• address is allocated by the network • Bluetooth is simple to use and setup, but Wi-Fi is more
complex
• Bluetooth/Wi-Fi are both wireless can’t fall over the
Wi-Fi – Wireless fidelity wires/move around the house
• It offers wireless communication using radio waves • Saves money (on cables) as both do not require wires
• It uses devices like WAP and AP and can communicate up to • Bluetooth is more energy efficient than Wi-Fi
100 meters.
• in some cases, 3% of the energy
• It is a line of sight meaning obstacles can block signals
How a tablet computer can connect to a
printer using Bluetooth.
Bluetooth
• The devices automatically connect when they come into
Devices that can be connected using range
Bluetooth • Tablet sends radio signals to the printer / printer receives
radio signals from
• the tablet
• Mouse Keyboard • Tablet receives radio signals from the printer / printer
responds using radio
• Printer Mobile phone
• signals
• PDA Headphones
• A handshake takes place
• Webcam Camera
• Microphone Laptop
• Scanner Graphics tablet
• Award a mark for mention of use of 4-digit code for access / • Devices automatically detect and connect to each
default code / other
• auto connection with code / some devices don’t need code • Used for short distances
• Uses a band of 79 radio frequencies / channels • Randomly picks channels to use one of 79 channels can
be used
• The tablet computer randomly chooses one of the radio
frequencies / • Uses spread spectrum frequency hopping
• channels to use • Constantly change the channels to stop interference
with other communication systems
• If it is being used it chooses another at random until it finds
a free one • Used for low-bandwidth applications, e.g., streaming
music
• Uses spread-spectrum frequency hopping
• Used when the speed of transmission is not critical
• Bluetooth can be used to create a secure Wireless
Differences in use between Wi-Fi and Personal Area Network
Bluetooth. • Intrusive as personal details have to be stored in
• Wi-Fi technology enables local area network… biometrics
• … and Internet connections • Can be a slower entry using biometrics as more checking is
carried out
• Using Wi-Fi, a laptop or desktop computer can connect to a
network's wireless router • Security can be lowered with biometrics due to problems
in reading data
• Bluetooth connects two devices together
• Harder to set up the biometric system
• Usually, Bluetooth peripherals are powered by batteries
that need to be charged or replaced • Takes longer to add new people to the system
• Wi-Fi covers a larger distance than Bluetooth • Biometrics can use a lot of memory to store the data
• Wi-Fi requires more than ten times more bandwidth than • Signature/voice entry – person needs to write the
Bluetooth signature the same each
Compare and contrast Bluetooth and Wi-Fi. • time/speak the same each time
• Voice can be recorded by mobile device and then used to
Similarities
enter system
• Both Wi-Fi and Bluetooth use wireless communications
• Security issues if data from signatures are used in other
• Both Wi-Fi and Bluetooth use radio frequencies for ways
communication/radio waves
• Examples:
• Both Wi-Fi and Bluetooth allow several devices to be
• Retina/iris scan/face recognition/fingerprint/handprint
connected
How security can be improved in a Wi-Fi
• Both use security when sending data
network.
Differences
• Secure the wireless router/network with a strong password
• Wi-Fi has faster data transfer rate
• Do not broadcast the Wi-Fi security key/SSID
• Wi-Fi has a greater range of transmission
• Enable WPA encryption
• Wi-Fi uses key matching encryption
• Disable remote administration to the router
• Bluetooth uses WEP and WPA security together
• Enable user management
• Wi-Fi can be broadcast
• Change from the default SSID
• Bluetooth has more channels
• Use MAC address filtering/change the router IP address
• Wi-Fi connects more devices
• Use wireless security software
How computers can use Bluetooth to What is the internet?
connect to a device. • Public network/not policed.
• Bluetooth sends and receives radio waves • International network of networks
• Enable Bluetooth • WAN/wide area network.
• Bluetooth searches for the other devices • Worldwide/global/international
• Pairs the two devices • Public information system
• Web, email, gophers, social networking, video • Do not have to waste time going to the library.
conferencing are services provided by the • Do not have to spend money going to the library.
internet. • Ability to discuss topics far easier with people
from around the world.
What is an intranet?
• Ability to get a wider range of opinions.
• Internal restricted access network/secure
• Allows emailing therefore sending/collecting
network
information far quicker than manual methods.
• Uses same protocols as the internet.
• Data is digital therefore can be easier to transfer to
• Private network documents.
• Used within an organization e.g., school. • Online conferencing can be conducted.
Limited resources
The purpose of Intranet Advantages and disadvantages of using the
• Private/confidential data stays within a school’s intranet rather than the internet to
company/organization/school access this student work files area.
• To store relevant/up to date information about Advantages
the organization available to workers
• The school /controls intranet.
• To facilitate communication/collaboration
between workers/students/teachers • More secure as it needs a password.
• Make it easier to access company specific • Intranet private network only contains
applications. information that is relevant.
• Restrict access to certain sites of the • Intranet resides behind a firewall therefore
internet/regulate access to the internet.
data is more secure.
• Restrict access for certain employees.
• Messages can target the correct students.
Differences between an intranet and the • Better bandwidth on the intranet
Internet. • Access from external people is barred.
1. Internet is network of networks/intranet does
not have to be a network of networks. Disadvantages
2. The Internet is global. • More expensive to set up.
3. Intranet is within one organization. • More time consuming to set up.
4. Intranet is private/Internet is public. • More time spent on administration i.e.,
5. Intranets tend to be policed/managed. passwords.
6. The intranet has an extra layer of security. • May only be viewed within the school.
7. Data found in an intranet is likely to be more • More expensive to maintain.
dependable/relevant than that found on the • More time consuming to maintain.
Internet. • Will not be able to access school files at home
Internet has more information than an intranet for homework.
[4.
• School would need to provide more computers
Advantages of internet for research projects across the school for students to use to access
• Vast amount of information available via the intranet.
• More up to date information is available as the
information in books may be outdated.
• Wider range of information from every level of
society/scholarly to research
• Information can be found quicker using specialist
search engines.
• Information can be researched at home rather than
using research libraries.