0% found this document useful (0 votes)
51 views

Information Technology in A Global Society

1. Networks enable widespread information sharing but also raise privacy and security concerns as personal data can be accessed without authorization. 2. As technologies like AI and robotics advance, there are open questions about how to ensure they are developed and applied in an ethical manner that considers human values and priorities. 3. The growing use of automated systems in areas like decision-making and weapons could significantly impact jobs and human control or oversight, requiring careful consideration of associated social and economic impacts.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Information Technology in A Global Society

1. Networks enable widespread information sharing but also raise privacy and security concerns as personal data can be accessed without authorization. 2. As technologies like AI and robotics advance, there are open questions about how to ensure they are developed and applied in an ethical manner that considers human values and priorities. 3. The growing use of automated systems in areas like decision-making and weapons could significantly impact jobs and human control or oversight, requiring careful consideration of associated social and economic impacts.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Information Technology in a

Global Society
Strand 1 : Social & Ethical
Significance
Networks
Networks are Everywhere !

Restaurant
Family Network Peer Network Network

Contact Network

Computer
Network
Networks & its benefits
★ Sharing is a fundamental aspect of ★ Benefits of Networks:
networking ○ Assisting Collaboration
★ Benefits of Networks:
○ Facilitating Centralized
○ Sharing Information - quickly
Management (standardization and
and efficiently interoperability)

○ Sharing Resources ■ Managing Software


■ Peripherals ■ Backing Up Data
■ Storage
■ Applications
Network Components
Example: Email Servers
Clients & Servers
An application request a service from
another application

The requesting An application


application is called providing services is
client called server.
Servers Clients

● Authentication Server ● Regular Desktops or PC/Laptop


● Web Server

High Specification -> Multiple


● May require authentication to
processors and more RAM
connect to server
Hubs are “dumb” devices that pass
on anything received on one
connection to all other connections. HUBS
Every computer connected to the
hub “sees” everything every
other computer on the hub does

Incoming data passing through a hub.

Returned response passing through a hub.


Most network traffic only goes where it
Switches are semi-intelligent needs to, rather than to every port. On
devices that learn which SWITCHES busy networks, this can make the
devices are on which network significantly faster.
connection.
Routers are essentially small
computers that perform a
variety of intelligent tasks.
ROUTERS
● programmed to
understand, manipulate,
and act on the data it
handles.

Acts as a Gateway for the network


Modem Versus Router
● “modulator demodulator” ● stand-alone device
● Door to Internet ● “routes” networking/internet traffic to its
connected devices
Network Architecture
● Computers are logically organised on a network, and the role each takes.

● Types of Network
○ client/server network architecture : one or more of the computers acts as
servers that provide services to the rest of the network (the clients).
○ Thin-client network architecture : client computers rely heavily on a server not
only to store files and applications, but to run the software on the clients behalf.
The thin client merely acts as a terminal for accepting input and display.
○ In peer-to-peer network architecture every client (peer) has equal status and
there is no central authority or server. Peer-to-peer networks are common in
homes and small businesses.
Network Architectures
Firewalls
● Hardware or Software
● Secure computer from
unauthorised access
● Allow or Block traffic by
○ IP address
○ Domain Names
○ Protocols & ports
○ Application Programs
Proxy Servers
● It is a gateway between users and the internet. It is a server, referred to as
an “intermediary” because it goes between end-users and the web pages they
visit online.
● Proxy servers provide varying levels of functionality, security, and privacy.
● Caching, Filtering, Logging Data
Types of Network
LAN versus WAN
MAN and PAN
SAN
VPN
VLAN
Network Reference Models
OSI Model
TCP/IP Model
TCP/IP Protocols
IP Addressing
IP Address
● IP (Internet Protocol) Address
● Logical Address
● IPV4 & IPV6
● Types of IP addresses
○ private IP addresses
○ public IP addresses
○ static IP addresses
○ dynamic IP addresses.
IPV4 Vs IPV6
Classful & Classless Addressing
Point to Discuss
The increasing use of networks raises a range of social impacts and ethical issues
such as unauthorized access, intrusive software (viruses, worms and Trojan
horses), spam, phishing, pharming, spoofing and identity theft.
References
★ https://sites.google.com/site/pnutpck11/lesson-1---introduction-to-teaching-computer-networking
★ https://medium.com/@satyendra250896/understand-client-server-architecture-by-real-life-example-f1a239577099
★ https://askleo.com/whats_the_difference_between_a_hub_a_switch_and_a_router/#:~:text=Hubs%20are%20%E2%80%9Cdumb%E2%80%
9D%20devices%20that,a%20variety%20of%20intelligent%20tasks
.
★ https://www.digitaltrends.com/computing/modem-vs-router/
AI & Robotics
1. Which problem AI will solve ?
2. How will you ensure AI Systems are ethical &
fair?
3. Who will decide AI work for us? Or We work
for AI?
4. At which point should humans hand over key
decision-making to a computer?
5. Should robots have the same rights as
humans?
6. What social impacts might arise with the
replacement of human workers or the creation of
smart weapons?

You might also like