0% found this document useful (0 votes)
8 views

Chapter4 ICT

Uploaded by

And rei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Chapter4 ICT

Uploaded by

And rei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

CHAPTER

4
Networks and the effects of using
them
Key objectives
The objectives of this chapter are to revise:
• networks and network devices
• IP and MAC addresses
• Wi-Fi and Bluetooth
• setting up small networks
• LAN, WAN and WLAN
• accessing networks (including security aspects)
• Data Protection Acts
• use of faxes and emails
• video, audio and web conferencing.
Key terms
Term Definition
Modem modulator-demodulator; this is a device that converts
digital signals into analogue signals and vice versa.
ADSL Asymmetric Digital Subscriber Line; asymmetric
means that the download speed and upload speed
using the internet will be different.
IP address Internet Protocol address; this is a unique number
assigned when a device connects to the internet; it can
change each time a device connects.
MAC address Media Access Control address is a number that
identifies a device uniquely; it is usually set at
manufacturing stage and is part of the network
interface card (NIC).
Wi-Fi Wireless communication.
Bluetooth A short-range wireless communication.
WAP Wireless Access Point; a network transmitter and
receiver which allows wireless connection to a network
within range of the access points; most networks will
have a number of WAPs.
Spread- Used in wireless systems, for example, in a Bluetooth
spectrum system; if a selected communication channel is
frequency already being used, another channel is chosen at
hopping random.
LAN Local Area Network
WAN Wide Area Network
WLAN Wireless Local Area Network
Social/digital Those people who have the necessary IT skills and/or
divide money to purchase computer equipment have a big
advantage over those who do not.
Data packet Group of data being transmitted (packet contains IP
address, ID number, for example).
Authentication System used to verify that data comes from a secure
and trusted source.
Data Legislation set up to protect the rights of the individual
Protection Act about whom data is obtained, stored and processed.
VoIP Voice over Internet Protocol; allows communication
(both verbal and video) using the internet.
Webinar Web conferencing.

Figure 4.1 Diagram of a computer network, illustrating some of the network devices
Networks
When a set of computers have been connected together for the purpose of
sharing resources or data, this is known as a computer network.
Network devices
Modems
A modulator-demodulator is used to convert digital data into analogue data (to
allow the data to be transmitted along existing telephone lines); it also converts
analogue data into digital data so that incoming data can be understood by the
computer. Broadband modems use ADSL; the asymmetric part in this name
refers to the fact that the rate at which data can be downloaded is different to the
rate at which data can be uploaded. ADSL allows telephone lines to be shared by
telephones and computers at the same time.

Hub
This is a device used to connect devices together to form a LAN; it takes the data
packet received at one of its ports and sends it to every computer on that LAN.

Switch
This is similar to a hub; but this device checks the incoming data packet and
works out the destination address and sends the data packet to the computer with
that address only.

Router
These are devices that enable data packets to be routed between the different
networks, for example, to join a LAN to a WAN. Many routers are wireless in
operation.
Routers inspect data packets received over the internet; since all devices on
the same network have the same part of an IP address (for example,
109.108.158.1, 109.108.158.2, and so on) the router can send data to the
appropriate switch. The switch will then deliver the data packet using the
destination address.
Each data packet contains: header, sender and receiver IP addresses, number
of data packets in the message and identification number of the packet.

Gateway
This is a network point (node) which acts as an entrance to another network; if a
network node needs to communicate outside its own network, it must use a
gateway.
Network Interface Card
A Network Interface Card (NIC) is needed to allow a device to connect to a
network.

Network cables
Network cables are still used because they allow faster data transfer rates and are
usually more secure than wireless connectivity.

IP address
Every time a device connects to a network (for example, the internet) it is given
an IP (Internet Protocol) address, for example, 109.108.158.34. If the device logs
off, the next time it connects to the network it is supplied with a new IP address.
Devices which never disconnect (for example, web servers) retain the same IP
address.
An IP address identifies where on the network a device is located.

MAC address
Media Access Control (MAC) addresses are unique to each device; this address
is fixed at the manufacturing stage (although it is possible to change the value –
this is outside the scope of the syllabus). The MAC address identifies which
device is connected at a given IP address.

Wi-Fi
This is wireless connectivity. Networks use WAP (wireless access points) to
allow users to gain access to the network from anywhere within range. A WAP is
a transmitter/receiver which allows a device to communicate with the network.
Most networks will have several WAPs, for example, an airport may have
hundreds of WAPs to allow passengers to connect to the airport’s network from
anywhere within the terminal buildings.

Bluetooth
This is also a form of wireless connectivity but it has a very limited range.
Bluetooth is often used by tablets, mobile phones and cameras. With this system,
the communicating pair of devices will randomly choose 1 of 79 possible
channels; if the channel is already in use, a different one is again chosen at
random – this is known as spread-spectrum frequency hopping.

Local Area Networks


Local Area Networks (LANs) are relatively small networks where all the
components are geographically close together (for example, in one building).
The devices on a LAN are connected to hubs or switches; one of the hubs or
switches will be connected to a router and modem to allow the LAN to be
connected to the internet. If two or more LANs are connected together they use a
bridge to enable this connection.

Wide Area Networks


Wide Area Networks (WANs) are large networks where the devices are a long
way away from each other geographically (for example, in a different city or
country); the internet is the most well-known WAN. Since WANs are connected
over long distances, they use the public communications network (for example,
telephone lines or satellites).

Wireless Local Area Network


A wireless LAN (WLAN) doesn’t use any wires or cables to connect devices to
the network; wireless nodes (WAPs) are connected into the network at a number
of fixed positions and users connect to the network via these nodes.
(NOTE: the advantages and disadvantages of the above network devices are
covered in more detail in the Cambridge IGCSE ICT Coursebook.)
Setting up a network
When setting up a small network the main tasks can be summarised:
• Purchase of all the necessary hardware and software.
• Set up an IP account if internet connection is required.
• Configure all of the hardware and software.
• Install the required software on the server and ensure the network licences
have been bought.
• Set up network privileges (for example, network manager).
Accessing the internet
Users can connect to the internet using desktop computers, laptops, tablets or
smartphones/watches. Each device has a number of advantages and
disadvantages:

Device Advantages Disadvantages


Desktop • faster processors • not very portable; can be
computers • full-size keyboard and used in one fixed
pointing devices position only
• more stable internet • requires expensive
connection (usually dongles if the device
wired) needs to access the
• all web page features are cellular phone network
available
Laptop • mobile device (single • don’t have a very good
computers unit) battery life
• touchpad is easier to • much heavier and
navigate than on bulkier than tablet or
tablet/mobile phones smartphone
• better keyboards than • processors not as fast
tablets and mobile as equivalent desktop
phones computer
• all web page features are • more expensive than
available desktop computer for
similar specification
Tablets, • very portable and • small screens and
mobile lightweight devices keyboards can cause
phones and • a person is more likely to problems (slower, more
smartwatches have a error-prone data entry)
phone/tablet/watch on • small screens often
their person than a laptop make web pages more
computer difficult to read and
• easier to use on the move navigate
than a laptop computer • not all websites work
• usually have access to properly on tablets and
either 4G/5G cellular smartphones
network or Wi-Fi • signal not as stable as
wired laptop/desktop
computer
Common errors
It is very common to see confusion between the terms WAN and WLAN.
A WLAN is a wide area network.
A WLAN is a wireless LAN network; whereas a WAN is a wide area network
which may or may not have wireless connectivity.
Confusion between the uses of hubs, switches and routers is very common.
A hub sends an incoming data packet to the correct device on a network. If
the hub is connected to the internet it is called a router.
A hub is a device used to connect devices together to form a LAN; it takes the
data packet received at one of its ports and sends it to every computer on that
LAN; a switch is an ‘intelligent’ hub which sends the data packet only to the
correct device on the network. However, routers enable data packets to be
routed between the different networks.
IP addresses and MAC addresses are often confused.
An IP address is assigned to a device at the manufacturing stage.
An IP address is assigned to a device by the ISP every time it connects to the
network. This allows the location of the device to be determined. MAC
addresses are unique to each device; this address is fixed at the
manufacturing stage and is usually part of the NIC installed in the device.

Sample exam questions


a Explain the use of the following network devices:
hub
switch
router.
b An airport wishes to allow free internet access to all passengers
using any of its terminal buildings. Discuss how this can be done.
In your discussion, mention any precautions that need to be taken by
airport management and passengers when setting up and accessing
the airport network.
Student’s answer
a Hub: used to connect a number of devices together to form a LAN;
takes a received data packet and sends it to all the devices on the
network.
Switch: as with hubs, connects a number of devices together to form
a LAN; each data packet is checked for destination address and data
is sent only to the device with this destination address.
Router: allows data packets to be routed between different networks,
for example, allows a LAN (or group of LANs) to join a WAN; they
check data packets and send them to appropriate switch from where
they are sent to the correct device with packet destination address; if
the address doesn’t match any of the computers connected to that
switch, it passes to another switch until the correct device is found.
Examiner’s comments
a The candidate has given a fairly comprehensive answer to the question. They
were only required to explain the terms with no need for any comparisons to
be made. The addition of diagrams, such as the one below, could prove to be
very useful in the explanation (provided it doesn’t contradict the text!).
Student’s answer
b Airport can make use of WAPs or ‘hot spots’.
Several WAPs will be located around the airport, allowing
passengers to access the network wirelessly.
Passengers need to be aware of security issues when using a
shared network.
Passengers should ensure they log off correctly before leaving the
network.
Airport management need to be aware of potential virus
transmissions and hacking …
… they will need to set up firewalls that block undesirable websites
… they need to make sure the network has no connections to other
networks within the airport that handle security or passenger
information (for example, flight lists)
… they need to make sure it is impossible for passengers to gain
access to the network that handles flight traffic control.
Examiner’s comments
b This answer needs careful thought. The first part is relatively easy since it
only concerns the use of ‘hot spots’. The second part hinges on security of the
passengers accessing an open network and the care needed by airport
management to prevent unauthorised access to security data and traffic
control systems.

Examiner’s tip
You will sometimes be asked questions which go beyond your
experiences. But if you apply your knowledge of similar situations to the
new situation, this shouldn’t pose any real problems. In part b, the
candidate wouldn’t be expected to have covered airport security, but
common sense and applying security issues from other applications
should allow a good attempt at new, searching questions such as this.
Network issues and
communication
Security
Policing the internet
The Cambridge IGCSE ICT Coursebook covers most of the arguments about
whether or not the internet should be policed. The arguments for include:
• To prevent undesirable/dangerous material being accessible to anyone.
• To prevent search engines finding potentially dangerous/undesirable websites.
• Protection of children and the vulnerable.
The main arguments against include:
• It would be expensive to implement.
• It would be difficult to enforce globally.
• Material can already be found elsewhere … the internet just makes it easier to
find.
• Freedom of information.
• Laws already exist to protect people against many illegal internet activities.

Authentication
Authentication is used to verify that data comes from a secure and trusted
source. Items of authentication include:
• digital certification (see Chapter 8)
• biometrics (see Chapter 8)
• magnetic stripe cards and identity cards.
Identity cards can be contactless (see Chapter 2) and also contain holographic
images – a holographic image can appear to move or change colour when
viewed from different angles. This makes the illegal replication of the image, for
example, by photocopying, much harder.
Passports now usually include an RFID tag, photographs and a holographic
image. This helps in airport security to check the validity of the passport and that
the passenger is who they claim to be.

Viruses
To help mitigate the risk of viruses, antivirus software should be installed on a
computer and constantly run in the background to allow the detection of old and
new viruses. Most antivirus software has the following features:
• Checking of all files/programs before being loaded or run.
• Use of a database of known viruses to identify potential risks; for this reason,
antivirus software needs to be updated on a regular basis.
• Use of heuristic checking (checks software for behaviour that could indicate a
new virus).
• Problem files/programs are quarantined and can be automatically removed or
the user can be asked what action they want to take.
• Full scans need to be done at least once a week in case any viruses are time-
dependent (for example, only become active on July 4th, and so on).
Other protection against viruses includes using only safe websites, not
opening emails that appear suspicious or come from unknown sources; checking
for security risks such as phishing and pharming (for more information on this,
and on viruses more generally, see Chapter 8).
Communication
Faxes and emails
Electronic faxing and traditional paper-based faxing both still exist. With paper-
based systems, the document is first scanned and then the electronic version is
sent over the telephone network to another fax machine where it is printed out.
Electronic faxing allows a fax to be sent from a computer and is sent to an email
account rather than being printed out. This second method is more secure since
the document doesn’t ‘sit’ on a fax machine where it can be read by anybody
passing by.
Emails are probably one of the most common form of communication. They
have the advantage that it is much easier (and quicker) to send the same message
to multiple recipients compared to traditional postal systems. Although emails
are certainly not instantaneous, they are much faster than conventional post and
are also a lot cheaper (no need to buy stamps, paper and envelopes). However,
the syntax and spelling of an email address must be exact. If not a non-delivery
message will be received since the address is incorrect or it could be sent to the
wrong person – with potential security issues. However, if normal post is used,
this is less of a problem; for example, if an address is: ‘25 North Street’ and it is
written on the envelope as ‘25 Nort Street’ the letter would probably still arrive
at the correct destination.

Video conferencing
This is a method of communication that uses sound and video. In many cases it
removes the need for people to travel to meetings. This is, therefore, safer and
less expensive (no travel and accommodation costs), and time isn’t lost while
important staff are out of the office travelling to meetings. The disadvantages
include: possible time lag in communications, expensive hardware to set up and
maintain, potential time zone issues and ‘loss of perks’ due to removal of travel
to parts of the world. Required equipment and software includes:
• webcams
• large television screens (the larger the better)
• microphones (not headphones)
• speakers (not headphones)
• CODEC (this encodes/decodes data and also compresses data for
transmission)
• echo cancellation software (to prevent unwanted feedback and to synchronise
sound and vision).

Audio conferences
This type of communication uses telephones (it is possible to use internet
telephones or computers equipped with microphone and speakers). The organiser
of the meeting is issued with two PINs by the telephone company. One of the
PINs is for their personal use; the second one is sent to all the other delegates
along with the time/date of the audio conference. A few minutes before the
conference, the organiser calls the meeting number and keys in their PIN, the
delegates do the same thing using the PIN sent to them by the organiser, and all
are connected on the same telephone call.

Web conferences
These are sometimes referred to as ‘webinars’. This method uses computers
connected to the internet to allow delegates to communicate by speaking or
instant messaging. A ‘whiteboard’ is used where all delegates can see what is
happening during the meeting. The whiteboard allows messages, videos and
presentations to be seen by everybody. When one of the delegates wants to talk,
send a message or show a video/presentation, they send their request and a ‘flag’
appears on the organiser’s computer; this allows them to control who can talk or
write, since it is necessary for the organiser to ‘click on’ the delegate next to the
flag to allow them to actively participate.
Common errors
It is very common to see candidates making incorrect claims about emails.
Once an email has been sent, it instantly appears with the intended recipient.
Emails are much quicker to send then physical letters, but there can be delays
before an email is delivered, and the email may stay in somebody’s inbox for
several days before they read it.
It is common to see:
‘Video conferences can be called at any time.’
Video conferences can be called at short notice but that is not the same thing
as ‘called at any time’. Short notice means sending an invitation such as:
‘Sorry for the short notice, but can we call a video conference tomorrow at
15:00 please?’ Calling a video conference at any time means just going into
the video room and starting a conference without checking peoples’
availability or diary. These are not the same thing.
Several candidates make incorrect claims about video conferencing:
Video conferencing can be done from the comfort of your own home.
Video conferencing requires a dedicated room with specialist hardware and
software. A room also needs to be set up for video conferencing with, for
example, proper acoustic panelling in order to work properly. A video call
from a smartphone or using VoIP does not require this, and can be done from
home. This is not the same as video conferencing.

Sample exam questions


a Discuss the advantages and disadvantages of using emails
compared to sending out mail using conventional post.
b Discuss the advantages of holding a webinar for training purposes.
Student’s answer
a Environmental issues (less paper used, less fuel used driving to the
post office, …).
Emails are much quicker to send.
Emails can be read anywhere in the world if left in the inbox.
More secure than normal post (messages can be encrypted).
Easier to send to multiple recipients.
Recipient can copy/paste message into a document.
Sending emails to a foreign country is much cheaper than postage.
One drawback is the need to buy a computer and pay for an ISP.
If the internet is down, messages can’t be sent.
It is possible to send parcels using normal post, something that can’t
be done using emails.
The recipient may not have a computer.
It doesn’t necessarily save money or paper if recipient prints out the
message.
Examiner’s comments
a The candidate has given at least two advantages and two disadvantages. It is
important to give a good, balanced response in questions asking for
advantages and disadvantages. Marks can be lost if both sides of the
argument are not given.
Student’s answer
b No need to travel to a venue for training – saving time and money.
Safer than travelling to venue.
Can bring in ‘experts’ and ‘special guests’ whenever needed without
having to bring them to the training venue.
Doesn’t need special equipment unlike video conferencing.
Easy to use – instant messaging, VoIP, shared videos, and so on.
Organiser has control and can make sure only one person ‘talks’ at
once.
Possible to use tablets and mobile phones, allowing training to take
place anywhere.
Examiner’s comments
b This is a good, solid answer. Only the advantages were asked for, so be careful
not to include disadvantages. The question does not stipulate what webinars
are being compared to, so any comparisons made must clearly indicate what
they are being compared to.

Examiner’s tips
• Marks are frequently lost in questions involving comparisons. For
example, in part a, if the candidate had written ‘It is easy to send the
same message to a number of recipients’ they wouldn’t get any
marks. The key word here is easier, that is, ‘It is easier to send the
same message …’
• Marks are frequently lost for not making the comparison. It is actually
easy sending the same message to a number of people using
standard post but it just takes longer and needs more effort, that is, it
is not as easy. Be careful with English here!

Exam-style questions
1 a Which devices are being described below? Copy and complete the
table.
[7 marks]

Description Network device


A device that takes a data packet received at
one of its input ports and sends the data
packet to every computer connected to the
LAN.
A device that converts digital data to
analogue data (and vice versa) to allow the
transmission of data across existing
telephone lines.
A device that connects a LAN to another
LAN that uses the same communication
protocols.
A device that takes a data packet received at
one of its input ports and works out its
destination address; the data packet is then
sent to the correct computer on the LAN
only.
A device that enables data to be directed
between different networks, for example, to
join a LAN to a WAN; the main function is to
transmit internet and transmission protocols
between two networks.
A network point (node) that acts as an
entrance to another network.
Hardware which forms part of any device
that needs to connect to a network; it often
contains the MAC address generated at the
manufacturing stage.

b Describe four of the tasks to be done when setting up a small


network for the first time.
[4 marks]
2 a Explain the three terms:
i LAN
ii WAN
iii WLAN
[3 marks]
b Copy and complete the tables. In each table, tick (✓) one of the
boxes to indicate your answer.
i Which of the following is a disadvantage of using a WLAN rather
than a normal LAN?
[1 mark]

Printer queues can cause a big problem


If the main server breaks down, the whole network goes
down
Data transfer rate is much slower
All computers can have access to the same software
and files

ii Which of the following is the meaning of the term MAC?


[1 mark]

Medium access card


Media address command
Modem addressing card
Media access control

iii Which of the following isn’t part of a data packet?


[1 mark]

Sender’s IP address
Time and date the data packet was sent
Identity number of the data packet
Header to identify the data packet

3 a Copy and complete the following sentences using one of the words
or phrases given below (note: four of them will not be used):

i Checking of software for types of behaviour that could indicate a


possible virus is known as …
ii When a user knows that a file/program which has been identified
as infected with a virus is, in fact, not infected, this is known as a

iii A 3-D image formed from laser light; the image produced where
the two laser light beams meet on a photographic plate is known
as …
iv People who have the necessary IT skills and money to purchase
and use computers, which gives these people an advantage
over those who do not is called …
v Verification that data comes from a secure and trusted source on
the internet is called …
vi System to protect the rights of the individual about whom
information is obtained, stored and processed is known as …
vii The type of subscriber telephone line where download rate of
data is different to upload rate of data is called …
[7 marks]
b Give two reasons why the internet should be policed and two
reasons why it shouldn’t.
[4 marks]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy