3.4 Networks and the internet
3.4 Networks and the internet
networks connect computers, people and networks and the internet are
communities, allowing data and defining features of digital
information society that have evolved over
to be created, accessed and shared in a time
distributed manner
3.4C Characteristics of
computing networks
● PAN
● LAN ● Wired, ● Client-Server
● MAN ● Wireless ● Peer-to-peer
● WAN ● Cloud
PANs vary in size from a few centimeters to several meters. One of the most prevalent instances of a PAN in
the real world is the pairing of a Bluetooth earpiece and a smartphone. In addition to connecting laptops,
printers, tablets, mouses, and keyboards, PANs connect additional computing devices.
3.4A Types of computing networks
(VLAN)
3.4A Types of computing networks
• Describe one difference between a local area network (LAN) and a wide area
network (WAN). [2]
• Explain three problems that could result from linking 25 hospitals in the city
through a WAN. [6]
Q&A
Describe one difference between a local area network (LAN) and a wide area network (WAN). [2]
●LAN is within close proximity, (ie home, office, same building or group of buildings close
together), whereas a WAN is not restricted to a geographical area
●WAN connects several LANs together
●They use different protocols.
●LAN has a high transfer rate, WAN is much slower.
Q&A
●a computer network that covers a relatively large geographical area (i.e. wide area network)
●a WAN may join two or more LANs
●a network of computers that use the telecommunications network to connect between
them.
Q&A
Explain three problems that could result from linking 25 hospitals in the city through a WAN.
[6]
●compatibility between the systems in the different hospitals / hospitals may run different platforms of
hardware and software, and databases may need to be configured for all or may not run at all
●privacy issues of information being available across hospitals / patients may not trust how some of
these hospitals deal with their private information about certain illnesses or conditions
●data collection of information to be shared should be standardized between hospitals / if each hospital
enters data in its own way then it will be very difficult for others to understand it and use it – similar
codes for different procedures, illnesses and patients must be agreed
●sharing of costs to implement the connectivity between the hospitals / the implementing of a WAN to
connect all hospitals may need a greater infrastructure, equipment, IT team, training and this will involve
costs
●appropriate bandwidth to effectively share important information / x-rays and images or voice
consultations may require large bandwidth for doctors in different hospitals to have access to all
information needed about a patient.
●ensuring that the data is kept secure from accidental tampering / how will they prevent the accidental
change of data by people in different hospitals who may now have access to the data - integrity
problem
●providing different levels of access consistently across the different hospitals / agreeing on who will
have access to what and who will be allowed to add information to patients’ data to update records
●security of data. During transmission, data may pass through servers that are outside of the control of
the hospital. There is the potential for interception of data, packet sniffing or other means of
unauthorized access. The network could be infected by viruses or other malware.
●in the case of problems in using the WAN (i.e. WAN failure / server failure, too much traffic on the
network causing slowness), the hospitals who previously had their own database/LAN are now
impacted.- reliability
3.4A Types of computing networks
● Wired networks
● Wireless networks
● Cloud network
Wired networks
Cellular Networks
Traditional wired and wireless networks are used to connect devices together to access shared resources and data with the
networking technologies all on the physical site. Cloud networks have changed this. With a cloud-based wireless network, the
organization can still install access points on site, but the management of the network or the data can be hosted off-site.
Configurations to the network can be made by accessing the IP (internet protocol) address of the hardware controlling the
wireless network, making it easier to deploy, saving costs and allowing for scalability.
Improved Security
Performance Optimization
Scalability
ATL ACTIVTY
The server processes requests and sends back the requested webpages
as an HTTP response.
The client Displays the webpage and any further interaction with this
page might generate more requests to server.
Peer-to-peer network (P2P)
Resource Sharing : Peers can share resources like files, processing power, or
bandwidth with one another without needing a central authority.
2 mark
● LAN is within close proximity, (ie home, office, same
Describe one building or group of buildings close together), whereas
a WAN is not restricted to a geographical area
difference between
● WAN connects several LANs together
a local area ● they use different protocols. A LAN transmits to other
devices within the network, whereas a WAN uses point
network (LAN) and
to point transmissions between nodes
a wide area network ● LAN has a high transfer rate, WAN is much slower.
(WAN). Award [1 mark] for identifying one difference and an
additional [1 mark] for a brief description up to a maximum
of [2 marks].
2 mark
The upgraded IT
system is a LAN
based on a
● the server hosts information and programs that are
client/server network. shared to the clients (computers used in the
examination rooms by dental hygienist/dentist)
Outline the ● the client (computer used by the dental
relationship between hygienist/dentist) makes a request to the server
● the server fulfills the request.
the client and the
server in the
upgraded IT system.
2 mark
● hardware resources may be shared (e.g. printers, hard
Identify four disks)
advantages of ● internet connection may be cheaper for a LAN than
for a number of standalone computers
using a home local ● software resources may be shared (e.g. antivirus)
area network (LAN) ● files may be shared between computers without the
need of external memory devices to transfer them
rather than several from one computer to the other
stand alone ● internet security is easier to take care of if only one
internet connection is available to be shared between
computers. home users
● backups can be made using different computers as
copying files between them is simple.
● computers can connect to the resources wirelessly
and avoid having cables around the house
4 mark
Components of Computing Networks
DSL Modem (Digital Subscriber Line): ● Function: Connects to the internet via cable TV lines.
● Function: Transmits digital data over standard telephone lines without interfering ● Speed: Much faster than DSL, with speeds reaching up
with voice service. to hundreds of Mbps.
● Speed: Faster than dial-up (up to several Mbps). ● Usage: Widely used for home broadband internet
● Usage: Commonly used in homes for internet access. access.
● Hardware address
● A unique number built into virtually every network
device.
● Each MAC address is unique
● Stored in a device’s ROM (typically)
● Permanent, does not change
● MAC address filtering - prevent access by
unauthorised devices
● 00:2b:67:dc:ac:c7
ISP: Internet service provider:Refers to a company that provides internet access to its customers,
making it possible for subscribers to use online services such as
https://www.techtarget.com/i
otagenda/feature/NYC-smart-c
ity-projects-focus-on-user-exp
erience-transportation
Smart cities
● Singapore ● London
● Barcelona ● Tokyo
● Amsterdam ● Dubai
● Copenhagen ● Stockholm
● New York City ● Shanghai
● Function: This layer deals with the physical connection between devices, such as cables, routers, and
switches.
● Terms:
○ Ethernet: A widely used technology for local area networks (LANs), which allows devices to
communicate within a physical network.
○ ATM (Asynchronous Transfer Mode): A network technology that supports high-speed data transfer,
often used in telecommunications.
○ DECnet: A suite of network protocols created by Digital Equipment Corporation, primarily used for
older systems.
Request from my computer
Tracert www.google.com
NETWORK PROTOCOLS AND INTEROPERABILITY
Network protocols are essential for ensuring interoperability in a global Network protocols are the backbone of global network
network. Interoperability refers to the ability of diverse systems and interoperability. They provide a common language and
devices, often from different manufacturers and locations, to framework for diverse devices and systems to
To make our life easier, we do not need to remember the IP address of every web server that we visit. Instead, we type
the website address into a web browser, which consists of a domain name, for example Twitter.com. This request is
then sent to a domain name server (DNS), which will look up the IP address in its database of public IP addresses. Once
the IP address is known, the data packet will be forwarded to that address. For example, a request to visit Twitter.com
would be sent to the IP address 104.244.42.1.
02. Network Capacity
Bandwidth Speed
Lossless Lossy
Compression Compression
it is a slippery slope when telecommunication companies start to control who has access to which
websites and at what speed. This could easily lead to ISPs charging companies to have preferential
treatment and users having to pay extra to view specific content.
This is not the internet that Sir Tim Berners-Lee had in mind when he created it.
03. Security
Controlling access ( Authentication / Identification )
Three technologies that can protect a network from outside threats include:
● A Firewall
● Proxy Server
● Encryption
Identification VS Authentication
Expected answer:
● Identification – uniquely identify a user on a digital system (and takes place before authentication).
● Authentication – confirming the identity of a person/the person is who they say they are (occurs after
identification).
3 technologies to protect a network from outside
threads
The purpose of the firewall is to It uses the anonymous network ID VPN contributes to network security
block unauthorized access to the instead of the actual IP address of the through data encryption,
network by inspecting packets network address. It can also filter anonymity, secure remote access,
trying to enter or leave the content requests from within the and protection against network
network. These requests are network and may be used to limit attacks. It is especially important for
accepted or rejected depending on users from accessing certain remote workers and those who
the set of rules defined by the undesirable or unproductive sites frequently use public networks, as it
firewall. using keywords or by blacklisting web provides a crucial layer of security.
addresses.
VPN - Example question
Security
Explain in your own words how the network components work together. Use a drawing program to create a
diagram of your home network.
■ Check that you have included each of the components identified in this chapter.
■ Label all of the components and write a brief explanation of what each one does. Write an explanation on
how the components connect together.
■ Use the network diagram you created to explain to your peers how the different components on a network
work together to share data.
COMPUTER NETWORK PROVIDERS AND SERVICES
A mobile service provider (MSP), also known as mobile phone operator, is a company that offers cellular
connection to mobile phone subscribers. These mobile phone networks are referred to as 4G or 5G
networks (the G standing for ‘generation’).
Mobile phone customers use this service to make phone calls, send and receive text messages, and use
their data to browse the web.
Users now have the choice to make calls directly using their mobile phone network or using VoIP (voice
over internet protocol). With VoIP, audio data is transformed into digital packets that are sent via the
internet between any two devices. Popular examples include Skype, WhatsApp and Facebook
Messenger.
An internet service provider (ISP) refers to a company that provides internet access to its customers,
making it possible for subscribers to use online services such as browsing the ‘web’, online shopping, file
sharing and video conferencing. They also provide other services such as email, domain registrations and
web hosting.
Key Terms
◆ Mobile service provider (MSP): A company that offers cellular connection to mobile phone subscribers.
◆ VoIP (Voice over internet protocol): Allows users to make voice calls using a broadband Internet connection
instead of an analogue phone line.
◆ Internet service provider (ISP): A company that provides internet access and other related services to its
customers.
◆ Internet: The global connection of networks and networking technologies that link billions of users
worldwide.
◆ World Wide Web (WWW): The websites and web services that are hosted on web servers and identified by
their URL (uniform resource locator)
THE WORLD WIDE WEB
internet is the network of computers and The World Wide Web (WWW), on the other
networking technologies that we talked about hand, is the collection of websites and web
earlier. A computer can connect to the internet services that are hosted on these web servers
through a router and connect with a web server and identified by their URL (uniform resource
to access resources or services. locator), for example https://example.com, and
accessed through a web browser.
THE WORLD WIDE WEB
● A URL is the unique address of each resource on the web, which could be the address of a web
page or the file hosted by a web server.
● From the application layer (mentioned earlier in this chapter), HTTP (hypertext transfer protocol)
or HTTPS (secure hypertext transfer protocol) determines how web resources are transmitted
between the web browser and the web server.
● HTML (hyper text markup language) is the format of web pages that allows documents to be
displayed as web pages as well as web pages to be linked together
DS Past Paper Question - May 24
(b) (i) Distinguish between the internet and the World Wide Web. [2]
• The internet is a worldwide network of networks/ a hardware-based infrastructure / WAN (wide area
network) / GAN (global area network) (whereas)
• The www is the collection of webpages, hosted on web servers and accessible via web browsers. It
is a subset of the Internet.
EVALUATION OF THE INTERNET AND THE WEB
Personal area network (PAN): The smallest type of network, consisting of the connected devices that are in close
proximity to an individual.
Local area network (LAN): A group of computers or devices Metropolitan area network (MAN): A network that covers
athat are connected on a single site.
Wide area network (WAN): A national or international network, the largest example is
the internet.
Wireless networks: Use of wireless technologies to connect the different nodes to form a network.
Cloud network: Incorporate some or all of the network capabilities on a public or private cloud platform.
Peer-to-peer network (P2P): A decentralized network in which each computer is equally responsible for storing and
sharing data.
Client-server network: A type of network where data is stored centrally on a server and access is given to each device
(client) connected to the network.
Key Terms 2
Network Interface Card: Device responsible for connecting data into a digital signal and communicating this data to a
network.
Router : Transfer data from one network to another by forwarding the network packets to their destination by the most
efficient route available.
Mac Address (Media Access Control): A unique identifier assigned to every piece of hardware.
Modem : Convert digital data to analog data so that it can be transmitted over telephone line using the telecommunication
network.
WAP (wireless access point): A device that creates a wireless local area network to improve coverage through a building.
Hub: A networking device that broadcasts data to all devices on the network.
Switch: A networking device that forwards data packets more efficiently than a hub.
Key Terms 3
◆ Network protocol: A set of agreed rules that state how to format, send and receive data.
◆ Transmission control protocol/ internet protocol (TCP/IP): Protocol that defines where data is to be sent to and from (IP), and
how the data is to be broken down into packets before sending (TCP).
◆ IP (internet protocol) address: A logical numeric address that is assigned to every node on a network.
◆ Domain name server (DNS): A server that translates domain names into IP addresses.
◆ Bandwidth: The maximum rate of data transfer at any one time, measured in hertz (Hz).
◆ Speed: The length of time it takes for data to be transferred, measured in megabits per second (Mbps).
◆ Data compression: Is a process that reduces the size of a file by re- encoding it to use fewer bits of storage than the original file.
◆ Multi-factor authentication: The use of multiple methods of authentication to verify a user's identity.
◆ Net neutrality: The concept that all data requests on the internet should be treated equally by the internet service providers
(ISPs).
◆ Firewall: Hardware or software designed to block unauthorized access to a network by inspecting incoming and outgoing
network traffic.
◆ Proxy server: Computer system that acts as an intermediary between the client on the network and the internet; providing an
additional layer of security.
Interoperability : Allows different digital technologies or systems to connect and exchange data with one another without
restrictions.
INTERNET DILEMMAS
◆ Spamming:
◆ Hacking:
◆ Social engineering:
◆ Phishing:
◆ Virus:
◆ Ransomware:
◆ Anonymity:
◆ Internet trolls:
◆ Identity theft:
http://192.168.1.1/
SOURCES
● "Understanding Wired and Wireless Networks: A Comprehensive Guide." Collection Performance,
https://collectionperformance.com/understanding-wired-and-wireless-networks-a-comprehensive-guide/.
Accessed 2 Oct. 2024.
● "Types of Computer Network." JavaTpoint, https://www.javatpoint.com/types-of-computer-network.
Accessed 2 Oct. 2024.
● "Types of Networks: Advantages and Disadvantages." BBC Bitesize,
https://bbc.co.uk/bitesize/guides/z777xfr/revision/4. Accessed 2 Oct. 2024.
● "Importance of Types of Networks: LAN, MAN, WAN." Simplilearn,
https://www.simplilearn.com/tutorials/networking-tutorial/importance-of-types-of-networks-lan-man-wan.
Accessed 2 Oct. 2024.