Chapter4 ICT
Chapter4 ICT
4
Networks and the effects of using
them
Key objectives
The objectives of this chapter are to revise:
• networks and network devices
• IP and MAC addresses
• Wi-Fi and Bluetooth
• setting up small networks
• LAN, WAN and WLAN
• accessing networks (including security aspects)
• Data Protection Acts
• use of faxes and emails
• video, audio and web conferencing.
Key terms
Term Definition
Modem modulator-demodulator; this is a device that converts
digital signals into analogue signals and vice versa.
ADSL Asymmetric Digital Subscriber Line; asymmetric
means that the download speed and upload speed
using the internet will be different.
IP address Internet Protocol address; this is a unique number
assigned when a device connects to the internet; it can
change each time a device connects.
MAC address Media Access Control address is a number that
identifies a device uniquely; it is usually set at
manufacturing stage and is part of the network
interface card (NIC).
Wi-Fi Wireless communication.
Bluetooth A short-range wireless communication.
WAP Wireless Access Point; a network transmitter and
receiver which allows wireless connection to a network
within range of the access points; most networks will
have a number of WAPs.
Spread- Used in wireless systems, for example, in a Bluetooth
spectrum system; if a selected communication channel is
frequency already being used, another channel is chosen at
hopping random.
LAN Local Area Network
WAN Wide Area Network
WLAN Wireless Local Area Network
Social/digital Those people who have the necessary IT skills and/or
divide money to purchase computer equipment have a big
advantage over those who do not.
Data packet Group of data being transmitted (packet contains IP
address, ID number, for example).
Authentication System used to verify that data comes from a secure
and trusted source.
Data Legislation set up to protect the rights of the individual
Protection Act about whom data is obtained, stored and processed.
VoIP Voice over Internet Protocol; allows communication
(both verbal and video) using the internet.
Webinar Web conferencing.
Figure 4.1 Diagram of a computer network, illustrating some of the network devices
Networks
When a set of computers have been connected together for the purpose of
sharing resources or data, this is known as a computer network.
Network devices
Modems
A modulator-demodulator is used to convert digital data into analogue data (to
allow the data to be transmitted along existing telephone lines); it also converts
analogue data into digital data so that incoming data can be understood by the
computer. Broadband modems use ADSL; the asymmetric part in this name
refers to the fact that the rate at which data can be downloaded is different to the
rate at which data can be uploaded. ADSL allows telephone lines to be shared by
telephones and computers at the same time.
Hub
This is a device used to connect devices together to form a LAN; it takes the data
packet received at one of its ports and sends it to every computer on that LAN.
Switch
This is similar to a hub; but this device checks the incoming data packet and
works out the destination address and sends the data packet to the computer with
that address only.
Router
These are devices that enable data packets to be routed between the different
networks, for example, to join a LAN to a WAN. Many routers are wireless in
operation.
Routers inspect data packets received over the internet; since all devices on
the same network have the same part of an IP address (for example,
109.108.158.1, 109.108.158.2, and so on) the router can send data to the
appropriate switch. The switch will then deliver the data packet using the
destination address.
Each data packet contains: header, sender and receiver IP addresses, number
of data packets in the message and identification number of the packet.
Gateway
This is a network point (node) which acts as an entrance to another network; if a
network node needs to communicate outside its own network, it must use a
gateway.
Network Interface Card
A Network Interface Card (NIC) is needed to allow a device to connect to a
network.
Network cables
Network cables are still used because they allow faster data transfer rates and are
usually more secure than wireless connectivity.
IP address
Every time a device connects to a network (for example, the internet) it is given
an IP (Internet Protocol) address, for example, 109.108.158.34. If the device logs
off, the next time it connects to the network it is supplied with a new IP address.
Devices which never disconnect (for example, web servers) retain the same IP
address.
An IP address identifies where on the network a device is located.
MAC address
Media Access Control (MAC) addresses are unique to each device; this address
is fixed at the manufacturing stage (although it is possible to change the value –
this is outside the scope of the syllabus). The MAC address identifies which
device is connected at a given IP address.
Wi-Fi
This is wireless connectivity. Networks use WAP (wireless access points) to
allow users to gain access to the network from anywhere within range. A WAP is
a transmitter/receiver which allows a device to communicate with the network.
Most networks will have several WAPs, for example, an airport may have
hundreds of WAPs to allow passengers to connect to the airport’s network from
anywhere within the terminal buildings.
Bluetooth
This is also a form of wireless connectivity but it has a very limited range.
Bluetooth is often used by tablets, mobile phones and cameras. With this system,
the communicating pair of devices will randomly choose 1 of 79 possible
channels; if the channel is already in use, a different one is again chosen at
random – this is known as spread-spectrum frequency hopping.
Examiner’s tip
You will sometimes be asked questions which go beyond your
experiences. But if you apply your knowledge of similar situations to the
new situation, this shouldn’t pose any real problems. In part b, the
candidate wouldn’t be expected to have covered airport security, but
common sense and applying security issues from other applications
should allow a good attempt at new, searching questions such as this.
Network issues and
communication
Security
Policing the internet
The Cambridge IGCSE ICT Coursebook covers most of the arguments about
whether or not the internet should be policed. The arguments for include:
• To prevent undesirable/dangerous material being accessible to anyone.
• To prevent search engines finding potentially dangerous/undesirable websites.
• Protection of children and the vulnerable.
The main arguments against include:
• It would be expensive to implement.
• It would be difficult to enforce globally.
• Material can already be found elsewhere … the internet just makes it easier to
find.
• Freedom of information.
• Laws already exist to protect people against many illegal internet activities.
Authentication
Authentication is used to verify that data comes from a secure and trusted
source. Items of authentication include:
• digital certification (see Chapter 8)
• biometrics (see Chapter 8)
• magnetic stripe cards and identity cards.
Identity cards can be contactless (see Chapter 2) and also contain holographic
images – a holographic image can appear to move or change colour when
viewed from different angles. This makes the illegal replication of the image, for
example, by photocopying, much harder.
Passports now usually include an RFID tag, photographs and a holographic
image. This helps in airport security to check the validity of the passport and that
the passenger is who they claim to be.
Viruses
To help mitigate the risk of viruses, antivirus software should be installed on a
computer and constantly run in the background to allow the detection of old and
new viruses. Most antivirus software has the following features:
• Checking of all files/programs before being loaded or run.
• Use of a database of known viruses to identify potential risks; for this reason,
antivirus software needs to be updated on a regular basis.
• Use of heuristic checking (checks software for behaviour that could indicate a
new virus).
• Problem files/programs are quarantined and can be automatically removed or
the user can be asked what action they want to take.
• Full scans need to be done at least once a week in case any viruses are time-
dependent (for example, only become active on July 4th, and so on).
Other protection against viruses includes using only safe websites, not
opening emails that appear suspicious or come from unknown sources; checking
for security risks such as phishing and pharming (for more information on this,
and on viruses more generally, see Chapter 8).
Communication
Faxes and emails
Electronic faxing and traditional paper-based faxing both still exist. With paper-
based systems, the document is first scanned and then the electronic version is
sent over the telephone network to another fax machine where it is printed out.
Electronic faxing allows a fax to be sent from a computer and is sent to an email
account rather than being printed out. This second method is more secure since
the document doesn’t ‘sit’ on a fax machine where it can be read by anybody
passing by.
Emails are probably one of the most common form of communication. They
have the advantage that it is much easier (and quicker) to send the same message
to multiple recipients compared to traditional postal systems. Although emails
are certainly not instantaneous, they are much faster than conventional post and
are also a lot cheaper (no need to buy stamps, paper and envelopes). However,
the syntax and spelling of an email address must be exact. If not a non-delivery
message will be received since the address is incorrect or it could be sent to the
wrong person – with potential security issues. However, if normal post is used,
this is less of a problem; for example, if an address is: ‘25 North Street’ and it is
written on the envelope as ‘25 Nort Street’ the letter would probably still arrive
at the correct destination.
Video conferencing
This is a method of communication that uses sound and video. In many cases it
removes the need for people to travel to meetings. This is, therefore, safer and
less expensive (no travel and accommodation costs), and time isn’t lost while
important staff are out of the office travelling to meetings. The disadvantages
include: possible time lag in communications, expensive hardware to set up and
maintain, potential time zone issues and ‘loss of perks’ due to removal of travel
to parts of the world. Required equipment and software includes:
• webcams
• large television screens (the larger the better)
• microphones (not headphones)
• speakers (not headphones)
• CODEC (this encodes/decodes data and also compresses data for
transmission)
• echo cancellation software (to prevent unwanted feedback and to synchronise
sound and vision).
Audio conferences
This type of communication uses telephones (it is possible to use internet
telephones or computers equipped with microphone and speakers). The organiser
of the meeting is issued with two PINs by the telephone company. One of the
PINs is for their personal use; the second one is sent to all the other delegates
along with the time/date of the audio conference. A few minutes before the
conference, the organiser calls the meeting number and keys in their PIN, the
delegates do the same thing using the PIN sent to them by the organiser, and all
are connected on the same telephone call.
Web conferences
These are sometimes referred to as ‘webinars’. This method uses computers
connected to the internet to allow delegates to communicate by speaking or
instant messaging. A ‘whiteboard’ is used where all delegates can see what is
happening during the meeting. The whiteboard allows messages, videos and
presentations to be seen by everybody. When one of the delegates wants to talk,
send a message or show a video/presentation, they send their request and a ‘flag’
appears on the organiser’s computer; this allows them to control who can talk or
write, since it is necessary for the organiser to ‘click on’ the delegate next to the
flag to allow them to actively participate.
Common errors
It is very common to see candidates making incorrect claims about emails.
Once an email has been sent, it instantly appears with the intended recipient.
Emails are much quicker to send then physical letters, but there can be delays
before an email is delivered, and the email may stay in somebody’s inbox for
several days before they read it.
It is common to see:
‘Video conferences can be called at any time.’
Video conferences can be called at short notice but that is not the same thing
as ‘called at any time’. Short notice means sending an invitation such as:
‘Sorry for the short notice, but can we call a video conference tomorrow at
15:00 please?’ Calling a video conference at any time means just going into
the video room and starting a conference without checking peoples’
availability or diary. These are not the same thing.
Several candidates make incorrect claims about video conferencing:
Video conferencing can be done from the comfort of your own home.
Video conferencing requires a dedicated room with specialist hardware and
software. A room also needs to be set up for video conferencing with, for
example, proper acoustic panelling in order to work properly. A video call
from a smartphone or using VoIP does not require this, and can be done from
home. This is not the same as video conferencing.
Examiner’s tips
• Marks are frequently lost in questions involving comparisons. For
example, in part a, if the candidate had written ‘It is easy to send the
same message to a number of recipients’ they wouldn’t get any
marks. The key word here is easier, that is, ‘It is easier to send the
same message …’
• Marks are frequently lost for not making the comparison. It is actually
easy sending the same message to a number of people using
standard post but it just takes longer and needs more effort, that is, it
is not as easy. Be careful with English here!
Exam-style questions
1 a Which devices are being described below? Copy and complete the
table.
[7 marks]
Sender’s IP address
Time and date the data packet was sent
Identity number of the data packet
Header to identify the data packet
3 a Copy and complete the following sentences using one of the words
or phrases given below (note: four of them will not be used):