0% found this document useful (0 votes)
7 views

3.4 Networks and the internet

The document outlines the structure and significance of networks and the internet within the digital society, detailing various types of computing networks such as PAN, LAN, WAN, and their characteristics. It discusses the advantages and disadvantages of wired and wireless networks, as well as the client-server and peer-to-peer models for data sharing. Additionally, it highlights the evolution of the internet, dilemmas associated with it, and the components essential for computing networks.

Uploaded by

eda.nural
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

3.4 Networks and the internet

The document outlines the structure and significance of networks and the internet within the digital society, detailing various types of computing networks such as PAN, LAN, WAN, and their characteristics. It discusses the advantages and disadvantages of wired and wireless networks, as well as the client-server and peer-to-peer models for data sharing. Additionally, it highlights the evolution of the internet, dilemmas associated with it, and the components essential for computing networks.

Uploaded by

eda.nural
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Network and the Internet

DIGITAL SOCIETY COURSE


Understanding

networks connect computers, people and networks and the internet are
communities, allowing data and defining features of digital
information society that have evolved over
to be created, accessed and shared in a time
distributed manner

networks and the internet


involve significant opportunities
Advertising and dilemmas for life in digital
society
3.4A Types of computing
networks

Roadmap for the Unit 3.4B Components of computing


networks

3.4C Characteristics of
computing networks

3.4D Computing network


providers and services

3.4E The World Wide Web

3.4F Evolution of the internet and


the web

3.4G Internet dilemmas


History of Networks
3.4A Types of computing networks

● PAN
● LAN ● Wired, ● Client-Server
● MAN ● Wireless ● Peer-to-peer
● WAN ● Cloud

Network by size Types of Connectivity Sharing Data


3.4A Types of computing networks

01. Network by size


3.4A Types of computing networks

01. Network by size


IT’S YOUR TURN
3.4A Types of computing networks

01. Network by size

PANs vary in size from a few centimeters to several meters. One of the most prevalent instances of a PAN in
the real world is the pairing of a Bluetooth earpiece and a smartphone. In addition to connecting laptops,
printers, tablets, mouses, and keyboards, PANs connect additional computing devices.
3.4A Types of computing networks

01. Network by size A LAN is usually set up to help the sharing of


resources, whether it is giving access to a centralized
store of data in an office, sharing a printer at home
or sharing internet access in school.

●a computer network limited to a small

area such as a building


●a group of computers and devices that

share a common link (cable or wireless) to


a server
●can be connected to other LANs

●A LAN enables sharing of resources such

as printers and storage


●can use a physical or virtual connection

(VLAN)
3.4A Types of computing networks

01. Network by size

It will include two or more computers


connecting together when they are not
in the same building or campus, but they
are in the same city. This type of network
can cover an area of between 5 and 50
km.
3.4A Types of computing networks

01. Network by size

The largest of networks is spread across a wider geographical


area. WANS can be a collection of LANS connected by
telecommunication technologies that are available to the public
or may be limited to an organization that operates nationally or
internationally.
Questions

• Describe one difference between a local area network (LAN) and a wide area
network (WAN). [2]

• Identify two characteristics of a WAN. [2]

• Explain three problems that could result from linking 25 hospitals in the city
through a WAN. [6]
Q&A

Describe one difference between a local area network (LAN) and a wide area network (WAN). [2]

●LAN is within close proximity, (ie home, office, same building or group of buildings close
together), whereas a WAN is not restricted to a geographical area
●WAN connects several LANs together
●They use different protocols.
●LAN has a high transfer rate, WAN is much slower.
Q&A

Identify two characteristics of a WAN. [2]

●a computer network that covers a relatively large geographical area (i.e. wide area network)
●a WAN may join two or more LANs
●a network of computers that use the telecommunications network to connect between
them.
Q&A

Explain three problems that could result from linking 25 hospitals in the city through a WAN.
[6]

●compatibility between the systems in the different hospitals / hospitals may run different platforms of
hardware and software, and databases may need to be configured for all or may not run at all
●privacy issues of information being available across hospitals / patients may not trust how some of
these hospitals deal with their private information about certain illnesses or conditions
●data collection of information to be shared should be standardized between hospitals / if each hospital
enters data in its own way then it will be very difficult for others to understand it and use it – similar
codes for different procedures, illnesses and patients must be agreed
●sharing of costs to implement the connectivity between the hospitals / the implementing of a WAN to
connect all hospitals may need a greater infrastructure, equipment, IT team, training and this will involve
costs
●appropriate bandwidth to effectively share important information / x-rays and images or voice
consultations may require large bandwidth for doctors in different hospitals to have access to all
information needed about a patient.
●ensuring that the data is kept secure from accidental tampering / how will they prevent the accidental
change of data by people in different hospitals who may now have access to the data - integrity
problem
●providing different levels of access consistently across the different hospitals / agreeing on who will
have access to what and who will be allowed to add information to patients’ data to update records
●security of data. During transmission, data may pass through servers that are outside of the control of
the hospital. There is the potential for interception of data, packet sniffing or other means of
unauthorized access. The network could be infected by viruses or other malware.
●in the case of problems in using the WAN (i.e. WAN failure / server failure, too much traffic on the
network causing slowness), the hospitals who previously had their own database/LAN are now
impacted.- reliability
3.4A Types of computing networks

02. Types of Connectivity

● Wired networks
● Wireless networks
● Cloud network
Wired networks

When we talk about wired networks, we’re referring


to networks where data is transmitted through
physical pathways.
These pathways can take the form of various cabling
systems such as coaxial cables, Ethernet cables, or
even fiber-optic cables.
Ethernet Networks
Types of wired networks This is the most common type of network used for creating LANs.
They employ Ethernet cables, which are usually made up of copper,
to connect devices like computers, routers, and switches.
There are several types of wired networks,
Fiber Optic Networks
with the most common ones being Ethernet
Fiber optic networks, on the other hand, use light signals to
and Fiber Optic networks. transmit data over thin strands of glass or plastic known as fiber
optic cables. They are known for their high-speed data transfer
capability, often being employed in WANs or in environments
where high data throughput is required, such as data centers and
large enterprises.

Coaxial Cable Networks

Once the mainstay of cable television and early computer


networks, coaxial cable networks are less common today but are
still used in some contexts. These networks use cables with a
core conductor and outer shielding, providing good resistance to
interference.
Advantages Disadvantages
● Speed: Wired networks often provide faster data ● Limited Mobility: Since devices need to be physically
transfer speeds compared to their wireless connected to the network, moving around can be a
counterparts. Especially with modern Ethernet and challenge in wired networks. This can limit flexibility,
fiber-optic cables, high-speed data transfer is especially in larger or more dynamic environments.
achievable.
● Installation Complexity and Cost: Wired networks can
be complex and costly to install, especially in large
● Reliability: Because they use physical connections,
buildings. Running cables through walls and ceilings,
wired networks are less likely to experience
and managing the physical infrastructure can require
interference or signal loss, resulting in more stable and
significant time and resources.
consistent connections.

● Aesthetics: From a design perspective, visible network


● Security: Wired networks tend to be more secure as cables may not always be desirable in certain settings.
they’re harder to intercept compared to wireless
networks. Physical access to the network is typically
required for unauthorized access.
Wireless networks

Wireless networks allow devices to connect and


communicate without the need for cables. These networks
leverage radio waves or infrared signals to transmit data,
offering a degree of freedom and flexibility that wired
networks can’t match.
Wi-Fi Networks
Types of Wireless networks These are perhaps the most well-known type of wireless network. Wi-Fi
uses radio waves to connect devices like laptops, smartphones, and smart
home devices to the internet or each other, typically over short to medium
distances
There are several types of wireless networks, with
Bluetooth Networks
Wi-Fi, Bluetooth, and Cellular networks being
Bluetooth networks enable communication between devices over short
some of the most recognized. distances. They’re typically used for connecting peripherals like wireless
mice, keyboards, or headphones to a computer or smartphone.

Cellular Networks

Cellular networks, used by mobile phones and some IoT devices,


leverage a large network of fixed-location cell towers to provide
wide-ranging wireless coverage. These networks support voice calls,
SMS, and data services, such as 4G and 5G internet access.
Advantages Disadvantages
● Mobility: The most apparent advantage is mobility. ● Interference: Wireless signals can be subject to
Without the need for physical cables, devices can interference from other electronic devices or physical
move freely within the network’s range. obstacles, potentially causing a drop in connection
quality or speed.

● Ease of Installation: Wireless networks can be easier


and cheaper to install and expand than wired ● Security: While wireless networks can be secured,
networks, particularly in challenging environments. they are inherently more open to potential security
threats than wired networks. Extra precautions are
necessary to keep them secure.
● Scalability: Adding new devices to a wireless network
is usually as simple as connecting to the network,
making it highly scalable. ● Speed and Range Limitations: While advancements
like 5G are mitigating this issue, wireless networks
generally offer slower speeds than wired ones,
especially over longer distances.
Cloud networks

Traditional wired and wireless networks are used to connect devices together to access shared resources and data with the
networking technologies all on the physical site. Cloud networks have changed this. With a cloud-based wireless network, the
organization can still install access points on site, but the management of the network or the data can be hosted off-site.
Configurations to the network can be made by accessing the IP (internet protocol) address of the hardware controlling the
wireless network, making it easier to deploy, saving costs and allowing for scalability.

Cloud Networking: Benefits

Improved Security

Performance Optimization

Scalability
ATL ACTIVTY

1. Use effective online research skills to investigate current networking technologies.


Investigate which current wired and wireless technologies are being used in your home or
school.
2. Compare the speed, range of connectivity and cost of each of these.
03. Sharing Data
• Client-Server
• Peer-to-peer

One of the main benefits of using a network is the


ability to share resources and data, however, where
the data is stored will depend on the type of
network.
• Client-Server

The client-server model is a fundamental


concept in network computing where a
server provides services or resources to
multiple clients over a network.
These devices are referred to as ‘clients’ and the
server can either be hosted internally by the
organization or externally in the cloud. Many
organizations use this model so that
organizations can prioritize IT resources that will
secure and backup the data.
Server Client
Servers are always on and Clients initiate
waiting for requests from communications with the
clients to provide the server by sending requests.
necessary resources or Examples of clients include
responses. - Hosts data, apps computers, smartphones or
or services. specific apps like web
browsers or email software.
How it works?

When a user (client) wants to access a webpage, the browser (client


apps) sends an HTTP request to the web server.

The server processes requests and sends back the requested webpages
as an HTTP response.

The client Displays the webpage and any further interaction with this
page might generate more requests to server.
Peer-to-peer network (P2P)

P2P network is a decentralized network model where each participant


or “peer” can act as both a client and a server. This means that all
devices in the network share resources and communicate directly with
each other, rather than relying on central server to manage
interactions.
(P2P)

Peers: Each device connected to the network (such as a computer or


smartphone) is called a peer. Every peer has equal rights and responsibilities.

Resource Sharing : Peers can share resources like files, processing power, or
bandwidth with one another without needing a central authority.

Decentralized: There’s no central server to control the network, marking it


more resilient to failures or attacks.

Direct Communication: Data is shared directly between peers, meaning files


or informations can be exchanged without needing an intermediary server.
ATL -Thinking Activity
Describe a scenario when you have used each type of
network. (P2P and client-server)
• a computer network that covers a relatively large geographical
Identify two
area (i.e.wide area network)
characteristics of a
• a WAN may join two or more LANs
WAN.
• a network of computers that use the telecommunications
network to connect between them.

2 mark
● LAN is within close proximity, (ie home, office, same
Describe one building or group of buildings close together), whereas
a WAN is not restricted to a geographical area
difference between
● WAN connects several LANs together
a local area ● they use different protocols. A LAN transmits to other
devices within the network, whereas a WAN uses point
network (LAN) and
to point transmissions between nodes
a wide area network ● LAN has a high transfer rate, WAN is much slower.
(WAN). Award [1 mark] for identifying one difference and an
additional [1 mark] for a brief description up to a maximum
of [2 marks].

2 mark
The upgraded IT
system is a LAN
based on a
● the server hosts information and programs that are
client/server network. shared to the clients (computers used in the
examination rooms by dental hygienist/dentist)
Outline the ● the client (computer used by the dental
relationship between hygienist/dentist) makes a request to the server
● the server fulfills the request.
the client and the
server in the
upgraded IT system.

2 mark
● hardware resources may be shared (e.g. printers, hard
Identify four disks)
advantages of ● internet connection may be cheaper for a LAN than
for a number of standalone computers
using a home local ● software resources may be shared (e.g. antivirus)
area network (LAN) ● files may be shared between computers without the
need of external memory devices to transfer them
rather than several from one computer to the other
stand alone ● internet security is easier to take care of if only one
internet connection is available to be shared between
computers. home users
● backups can be made using different computers as
copying files between them is simple.
● computers can connect to the resources wirelessly
and avoid having cables around the house
4 mark
Components of Computing Networks

Router: Modem: Hub:


● A networking device that sends ● A device that converts digital data ● A simple network device that
data from one network to another. into analog signals, making it broadcasts data to all devices on
● Its role is to forward data packets possible to transmit over telephone the network.
to their destination via the most lines. ● Uses more bandwidth and may
efficient route. ● Used to send and receive data send unnecessary data, but it’s
● It allows you to connect to the between your home network and the Client–Server Model:
easy to set up and useful for small
internet by sending data to a ISP. networks (e.g., for gaming
modem, which communicates with ● Modern ISPs often use fibre optics ● In larger networks
consoles in a local multiplayer
your Internet Service Provider for faster connections, and modems (like those in schools
setup).
(ISP). may include fibre-optic support. or offices), this model
is used.
● Requires additional
hardware, like a
Wireless Access Points (WAP): Switch: server, to manage
Fibre to the Home (FTTH): and store data for
● Devices placed around a building to ● A more intelligent network device multiple devices on
● A fast internet connection method the network
provide wireless internet coverage. than a hub.
where fibre optic cables are
● Computers and devices connect to ● Directs data to the correct device
installed directly into homes.
these WAPs wirelessly, but the WAP instead of broadcasting to all.
● Requires a fibre-optic router and
itself connects to the network via a ● Offers more efficient data
modem to work efficiently.
wired connection (usually through a transmission and gives the
switch or hub). network manager more control.
MODEM - Types of Modem
ISDN Modem (Integrated Services Digital Network): Wireless Modem:
● Function: Transmits data over digital telephone lines.
● Function: Connects to the internet via a wireless
● Speed: Faster than dial-up but slower than DSL and cable.
● Usage: Largely outdated but was once used for internet and voice services over the signal, such as 4G or 5G cellular networks.
same line. ● Speed: Varies based on the network (4G or 5G).
● Usage: Used in mobile internet devices, hotspots,
Satellite Modem: and some home setups without wired connections.

● Function: Connects to the internet using a satellite connection.


● Speed: Slower compared to fiber or cable, but improving (up to 100 Mbps).
● Usage: Useful in remote or rural areas where other types of connections are not
available. Cable Modem:

DSL Modem (Digital Subscriber Line): ● Function: Connects to the internet via cable TV lines.
● Function: Transmits digital data over standard telephone lines without interfering ● Speed: Much faster than DSL, with speeds reaching up
with voice service. to hundreds of Mbps.
● Speed: Faster than dial-up (up to several Mbps). ● Usage: Widely used for home broadband internet
● Usage: Commonly used in homes for internet access. access.

Fiber Optic Modem:

● Function: Transmits data using light signals over fiber-optic cables.


● Speed: Extremely fast, capable of gigabit speeds (Gbps).
● Usage: Used in modern high-speed internet services like Fibre to the Home (FTTH).
Hub, Switch and Router Router VS Modem
Components of computer
networks
Components of computer
networks

MAC Address -( Media Access Control)

● Hardware address
● A unique number built into virtually every network
device.
● Each MAC address is unique
● Stored in a device’s ROM (typically)
● Permanent, does not change
● MAC address filtering - prevent access by
unauthorised devices
● 00:2b:67:dc:ac:c7
ISP: Internet service provider:Refers to a company that provides internet access to its customers,
making it possible for subscribers to use online services such as

● browsing the ‘web’,


● file sharing
● video conferencing.
They also provide other services such as email, domain registrations and web hosting

Client Router ISP


Example Question: Identify two services provided by an internet service provider (ISP)
other than access to the World Wide Web. [2] - May 24

• Email • Customer support services


and technical assistance
• Chat / texting / online
messaging. • Data security / antivirus /
firewall / monitoring for
• File sharing
malware and phishing attempts.
• Cloud storage
• SaaS / PaaS / IaaS
• VOIP / video conferencing
NYC smart city
projects

https://www.techtarget.com/i
otagenda/feature/NYC-smart-c
ity-projects-focus-on-user-exp
erience-transportation
Smart cities

● Singapore ● London
● Barcelona ● Tokyo
● Amsterdam ● Dubai
● Copenhagen ● Stockholm
● New York City ● Shanghai

What are the features that made a city a smart city?


Do you think a smart city project could be implemented in Istanbul by changing the network
infrastructure?
3.4C Characteristics of computing networks

Network standards and


Network capacity Security
protocols
01. Network standards and protocols

A network protocol is a set of agreed rules that state


how to format, send and receive data. To successfully
transmit data, both sides of the communication must
accept and follow these protocols.

In networking, different layers are identified to handle


the different parts of a communication. This layering
makes it easier for standards to be put in place. There
are four layers:
Application Layer:
Transport Layer:
● Function: This is the top layer that interacts with the
software applications and defines how users interact ● Function: Manages end-to-end communication,
Internet Layer:
with the data (e.g., web browsing, file transfer). data flow control, and error-checking between two
● Function: Responsible for addressing, routing,
● Terms: devices.
and packaging data for transmission. This layer
○ HTTP (Hypertext Transfer Protocol): The ● Terms:
ensures that data packets move across
protocol used for transmitting web pages over ○ TCP (Transmission Control Protocol):
networks.
the internet. Ensures reliable, ordered delivery of data
● Terms:
○ FTP (File Transfer Protocol): A protocol for between computers (used by HTTP, email,
○ IP (Internet Protocol): The main
transferring files between computers on a etc.).
protocol responsible for delivering
network. ○ UDP (User Datagram Protocol): A faster
packets of data from the source to the
○ DNS (Domain Name System): Translates but less reliable protocol than TCP, used for
destination using IP addresses.
domain names (like www.example.com) into streaming and real-time services like video
IP addresses so that browsers can load or voice calls.
internet resources.

Physical Network Layer:

● Function: This layer deals with the physical connection between devices, such as cables, routers, and
switches.
● Terms:
○ Ethernet: A widely used technology for local area networks (LANs), which allows devices to
communicate within a physical network.
○ ATM (Asynchronous Transfer Mode): A network technology that supports high-speed data transfer,
often used in telecommunications.
○ DECnet: A suite of network protocols created by Digital Equipment Corporation, primarily used for
older systems.
Request from my computer

Request from ChatGPT

Tracert www.google.com
NETWORK PROTOCOLS AND INTEROPERABILITY

Network protocols are essential for ensuring interoperability in a global Network protocols are the backbone of global network

network. Interoperability refers to the ability of diverse systems and interoperability. They provide a common language and

devices, often from different manufacturers and locations, to framework for diverse devices and systems to

communicate effectively across the world. These


communicate and work together seamlessly. In a global network context,
protocols establish the rules and mechanisms necessary
where various hardware and software components come from different
to ensure that data can flow seamlessly, regardless of its
sources and are distributed worldwide, interoperability is crucial.
source or destination, facilitating the functioning of the
Network protocols support this interoperability in several ways: global internet and other worldwide networks.
Network Standards and Protocols

To make our life easier, we do not need to remember the IP address of every web server that we visit. Instead, we type
the website address into a web browser, which consists of a domain name, for example Twitter.com. This request is
then sent to a domain name server (DNS), which will look up the IP address in its database of public IP addresses. Once
the IP address is known, the data packet will be forwarded to that address. For example, a request to visit Twitter.com
would be sent to the IP address 104.244.42.1.
02. Network Capacity

Bandwidth Speed

The maximum rate of The length of time it


data transfer at any takes for data to be
one time, measured in transferred, measured
hertz (Hz) in megabits per second
(Mbps)
What Are Your Network and Device Configurations?

IP Address Internet speed MAC Address

https://fast.com/ Network&Internet Settings


https://www.whatismyip.com/

Performance of your computer (Windows) : Ctrl + Shift + Esc

Performance of your computer (MAC) : Fİnder>Utilities>Activity Monitor


Data Compression

Lossless Lossy
Compression Compression

Reduces the file size without


Reduces the file size by
losing data. Possible to return
permanently removing
back to its original size after
unimportant, less noticeable data
transmission.
from the file.
PNG, BMP.
JPG, MP4
Net neutrality is the notion that the internet should be free and without restriction, so that all data
requests made on the internet are treated equally.

it is a slippery slope when telecommunication companies start to control who has access to which
websites and at what speed. This could easily lead to ISPs charging companies to have preferential
treatment and users having to pay extra to view specific content.

This is not the internet that Sir Tim Berners-Lee had in mind when he created it.
03. Security
Controlling access ( Authentication / Identification )

Three technologies that can protect a network from outside threats include:

● A Firewall

● Proxy Server

● Virtual Private Networks (VPNs)

● Encryption
Identification VS Authentication

Example Question:Describe the difference between identification and authentication

Expected answer:

● Identification – uniquely identify a user on a digital system (and takes place before authentication).
● Authentication – confirming the identity of a person/the person is who they say they are (occurs after
identification).
3 technologies to protect a network from outside
threads

A Firewall (hardware/software) Proxy Server Virtual Private Networks (VPNs)

The purpose of the firewall is to It uses the anonymous network ID VPN contributes to network security
block unauthorized access to the instead of the actual IP address of the through data encryption,
network by inspecting packets network address. It can also filter anonymity, secure remote access,
trying to enter or leave the content requests from within the and protection against network
network. These requests are network and may be used to limit attacks. It is especially important for
accepted or rejected depending on users from accessing certain remote workers and those who
the set of rules defined by the undesirable or unproductive sites frequently use public networks, as it
firewall. using keywords or by blacklisting web provides a crucial layer of security.
addresses.
VPN - Example question

Example Question: Outline one advantage for users if a school


introduces a virtual private network (VPN).
Encryption is used to help secure data on Accessibility
networks, whether this is encrypting data on the ● Allows users to access their personal files on the school
server storage device or encrypting the wireless server.
● Which means they can work seamlessly between home and
connection using WPA (Wi-Fi protected access) school / Access to school-approved digital resources that
would otherwise be blocked due to location.

Security

● Data and communications protection.


● Data is encrypted.
ATL ACTIVITY

Explain in your own words how the network components work together. Use a drawing program to create a
diagram of your home network.

■ Check that you have included each of the components identified in this chapter.

■ Label all of the components and write a brief explanation of what each one does. Write an explanation on
how the components connect together.

■ Use the network diagram you created to explain to your peers how the different components on a network
work together to share data.
COMPUTER NETWORK PROVIDERS AND SERVICES

A mobile service provider (MSP), also known as mobile phone operator, is a company that offers cellular
connection to mobile phone subscribers. These mobile phone networks are referred to as 4G or 5G
networks (the G standing for ‘generation’).

Mobile phone customers use this service to make phone calls, send and receive text messages, and use
their data to browse the web.

Users now have the choice to make calls directly using their mobile phone network or using VoIP (voice
over internet protocol). With VoIP, audio data is transformed into digital packets that are sent via the
internet between any two devices. Popular examples include Skype, WhatsApp and Facebook
Messenger.

An internet service provider (ISP) refers to a company that provides internet access to its customers,
making it possible for subscribers to use online services such as browsing the ‘web’, online shopping, file
sharing and video conferencing. They also provide other services such as email, domain registrations and
web hosting.
Key Terms

◆ Mobile service provider (MSP): A company that offers cellular connection to mobile phone subscribers.

◆ VoIP (Voice over internet protocol): Allows users to make voice calls using a broadband Internet connection
instead of an analogue phone line.

◆ Internet service provider (ISP): A company that provides internet access and other related services to its
customers.

◆ Internet: The global connection of networks and networking technologies that link billions of users
worldwide.

◆ World Wide Web (WWW): The websites and web services that are hosted on web servers and identified by
their URL (uniform resource locator)
THE WORLD WIDE WEB

internet is the network of computers and The World Wide Web (WWW), on the other
networking technologies that we talked about hand, is the collection of websites and web
earlier. A computer can connect to the internet services that are hosted on these web servers
through a router and connect with a web server and identified by their URL (uniform resource
to access resources or services. locator), for example https://example.com, and
accessed through a web browser.
THE WORLD WIDE WEB

● A URL is the unique address of each resource on the web, which could be the address of a web
page or the file hosted by a web server.

● From the application layer (mentioned earlier in this chapter), HTTP (hypertext transfer protocol)
or HTTPS (secure hypertext transfer protocol) determines how web resources are transmitted
between the web browser and the web server.

● HTML (hyper text markup language) is the format of web pages that allows documents to be
displayed as web pages as well as web pages to be linked together
DS Past Paper Question - May 24

(b) (i) Distinguish between the internet and the World Wide Web. [2]

Answers may include:

• The internet is a worldwide network of networks/ a hardware-based infrastructure / WAN (wide area
network) / GAN (global area network) (whereas)
• The www is the collection of webpages, hosted on web servers and accessible via web browsers. It
is a subset of the Internet.
EVALUATION OF THE INTERNET AND THE WEB

● The early days of the internet (1969-2000)

● The expansion of the web (2000-20)

● Web 3.0: The semantic web (2020-present)

● The internet of things (IoT)


Key Terms 1
Network: A series of interconnected nodes (connection points) that are able to transmit, receive and exchange data. The
data may have various formats including text, sound, images and video. Examples of nodes include computers, servers and
routers.

Personal area network (PAN): The smallest type of network, consisting of the connected devices that are in close
proximity to an individual.

Local area network (LAN): A group of computers or devices Metropolitan area network (MAN): A network that covers
athat are connected on a single site.

larger geographical area, such as a city.

Wide area network (WAN): A national or international network, the largest example is
the internet.

Wireless networks: Use of wireless technologies to connect the different nodes to form a network.

Cloud network: Incorporate some or all of the network capabilities on a public or private cloud platform.

Peer-to-peer network (P2P): A decentralized network in which each computer is equally responsible for storing and
sharing data.

Client-server network: A type of network where data is stored centrally on a server and access is given to each device
(client) connected to the network.
Key Terms 2

Network Interface Card: Device responsible for connecting data into a digital signal and communicating this data to a
network.

Router : Transfer data from one network to another by forwarding the network packets to their destination by the most
efficient route available.

Mac Address (Media Access Control): A unique identifier assigned to every piece of hardware.

Modem : Convert digital data to analog data so that it can be transmitted over telephone line using the telecommunication
network.

ISP: Internet service provider.

FTTH: Fiber to the Home.

WAP (wireless access point): A device that creates a wireless local area network to improve coverage through a building.

Hub: A networking device that broadcasts data to all devices on the network.

Switch: A networking device that forwards data packets more efficiently than a hub.
Key Terms 3
◆ Network protocol: A set of agreed rules that state how to format, send and receive data.

◆ Transmission control protocol/ internet protocol (TCP/IP): Protocol that defines where data is to be sent to and from (IP), and
how the data is to be broken down into packets before sending (TCP).

◆ IP (internet protocol) address: A logical numeric address that is assigned to every node on a network.

◆ Domain name server (DNS): A server that translates domain names into IP addresses.

◆ Bandwidth: The maximum rate of data transfer at any one time, measured in hertz (Hz).

◆ Speed: The length of time it takes for data to be transferred, measured in megabits per second (Mbps).

◆ Data compression: Is a process that reduces the size of a file by re- encoding it to use fewer bits of storage than the original file.

◆ Multi-factor authentication: The use of multiple methods of authentication to verify a user's identity.

◆ Net neutrality: The concept that all data requests on the internet should be treated equally by the internet service providers
(ISPs).

◆ Firewall: Hardware or software designed to block unauthorized access to a network by inspecting incoming and outgoing
network traffic.

◆ Proxy server: Computer system that acts as an intermediary between the client on the network and the internet; providing an
additional layer of security.

Interoperability : Allows different digital technologies or systems to connect and exchange data with one another without
restrictions.
INTERNET DILEMMAS

● Understanding the risk of data


● Consequences of the risks to data
◆ Internet of things (IoT): Internet connected devices that collect and share data.

◆ Spamming:

◆ Hacking:

◆ Social engineering:

◆ Phishing:

◆ Virus:

◆ Ransomware:

◆ Distributed denial of service (DDOS) attacks:

◆ Anonymity:

◆ Internet trolls:

◆ Identity theft:
http://192.168.1.1/
SOURCES
● "Understanding Wired and Wireless Networks: A Comprehensive Guide." Collection Performance,
https://collectionperformance.com/understanding-wired-and-wireless-networks-a-comprehensive-guide/.
Accessed 2 Oct. 2024.
● "Types of Computer Network." JavaTpoint, https://www.javatpoint.com/types-of-computer-network.
Accessed 2 Oct. 2024.
● "Types of Networks: Advantages and Disadvantages." BBC Bitesize,
https://bbc.co.uk/bitesize/guides/z777xfr/revision/4. Accessed 2 Oct. 2024.
● "Importance of Types of Networks: LAN, MAN, WAN." Simplilearn,
https://www.simplilearn.com/tutorials/networking-tutorial/importance-of-types-of-networks-lan-man-wan.
Accessed 2 Oct. 2024.

You might also like