Sunteți pe pagina 1din 8

11

Theory Notes for IGCSE


Computer Networks
Part: B

Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa


12

Internet (International networks)


A worldwide collection of networks that allow subscribers to send and receive email, chat (using text or
voice) or browse the worldwide webs.

The worldwide web (WWW) is part of the internet the user can access by way of a web browser such as
Internet Explorer or Google Chrome among others.

Intranet (Internal restricted access network)


Network based on internet technology that is designed to meet the internal needs of a company or
organisation.

As the name suggests, this kind of network has high access restrictions because it is installed behind a
firewall that gives strong protection against hackers, crackers, viruses and spyware.

Features of an intranet
 Because of the above mentioned security factors it is safer since there is less chance of external
threats
 It is possible to prevent employees from viewing unwanted websites
 Organisations can ensure that the information available is specific to their needs
 Sensitive information can be send out securely within the organisation

Internet versus Intranet


 Internet comes from the phrase – International network
 Intranet comes from the phrase –Internal restricted access network (see above subheading)
 Intranet covers issues to do with the company whereas internet is of a global view
 It is easier to block out certain web content or sites on intranet but difficult on internet
 Intranet requires password entry and can only be accessed from certain designated places,
whereas internet can be accessed from anywhere as long user has ISP account
 Intranet is behind a firewall for protection but this is difficult to implement on internet because it is
more open on an international scale
 Intranet information is stored on servers within the company thereby making it more secure from
outside threats

Network security
Computers on a network especially WAN (like the internet) are prone to high security threats such as:
 Hacking
 Cracking
 Virus attacks
 Malware
 Data theft
 Data losses

To avoid the above problems in addition to many, there is a need for good network security, through some
authentication methods.

The following authentication methods can be applied:

Access to the computer lab


 Restricted access to the lab
 Need for access PIN
 Need for access ID
 Biometric access methods (iris scan, finger-print, voice recognition, facial scan)

Return to First page Return to Top of this page


Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa
13

Access to the network system accounts


 Need for user ID or logon account
 Need for account password
 Biometric access (mentioned above)
 Fire-wall

Access to the network system documents and files


Files and or documents must have some form of encryption to prevent anyone from accessing and reading
them.
 Encryption software can be used to scramble the file or document into unreadable state unless one
has the code to decrypt the data.
 Passwords can also be assigned to documents so that only those with password can read or edit
the document.

Please not that encryption does not prevent data from being deleted by hackers or crackers. Also data
backups do not prevent data from being tampered with by hackers and crackers, it (data backup) only
ensures that you have an extra copy in the event of data loss due to fire hazards, natural disasters or
hacking and cracking.

Network Communication methods


 Network communication methods include the following:
 Fax
 Email
 Video conferencing
 Voip (Voice over internet protocol)

Fax
A short form for facsimile. Hard copy documents are scanned electronically and converted into bit-map
image (digital signal) and then transmitted as electronic signals through the telephone line. At the far end,
they are re-converted by the fax and printed on paper.

Modern fax machines are connected to computers such that there is no need for printing a document first in
order to send it by fax, the computer converts it into a fax format/signal then send it straight to the fax
machine.

Email (Electronic mail)


A means of sending electronic mail (text and attachments) from one computer to another over a network.

Advantages of using email


 Faster than ordinary mail or fax to send or receive email
 Message is received instantaneously
 Less expensive since stamps, paper and envelops are not needed
 You do not need to leave home to send or receive email

Disadvantages of using email


 There is a possibility of virus threats and hacking
 You may send email to the wrong person – email address has to correct 100%
 You cannot send bulky objects through email

Video Conferencing
Real-time communication between 2 people (groups) from separate geographical places (e.g. different
countries). The method makes use of LAN if internal or WAN (e.g. internet) if international.

Return to First page Return to Top of this page


Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa
14

It uses additional hardware such as:


 Webcams
 Large monitors/television screens
 Microphones
 Speakers

Also uses additional software such as:


 CODEC (Coder – decoder or Compressor – decompressor) – codes or compresses analogue data
into digital data to send down digital lines. This software works together with ADC/DAC.
 Echo cancellation software – allows talking in real-time and synchronises communication

Delegates at one end speak into the microphone whilst looking at a webcam. The other end can see
and hear them using large monitors and speakers.

Advantages of video conferencing


 Meetings can be called at short notice
 Saves costs on travelling expenses
 Employees can work from home

Disadvantages of video conferencing


 There is time lag (time it takes for signal to reach the other end) when making a conversation
 Sound and picture quality can be poor unless expensive equipment is installed
 Initial cost of installing the equipment is rather high
 There is loss of social interaction
 Difficult to set time for meetings due to time-zone differences

VOIP (Voice over internet protocol)


A method used to talk to people over the internet. VOIP converts sound picked by the microphone into
discrete digital packets that can be sent to their destinations via the internet. The same technology applies
when using mobile phones.

Advantages of VOIP
 It is free when talking is done computer to computer
 Local rates apply when talking is done with mobile/fixed telephone

Disadvantages of VOIP
 To work in real-time this system requires a broadband ISP
 Sound quality is not so good (echoes and weird sounds)
 Security is not so good just like other internet based technologies
 Common security issues are:
 Identity theft
 Viruses and malware (malicious software)
 Spamming (sending junk mail)
 Phishing attacks – sending of email to a user claiming to be a legitimate company with
the aim of scamming the user to surrender personal information that can be used in
identity theft
 Pharming – the act of installing a malicious code or viruses onto a user’s computer in
order to redirect/link them to a an illegitimate website which looks similar to the one they
know. As a result, the user’s details are collected and even more malware can be
installed unaware, only to discover latter that the computer is no longer in usual state. This
can be rectified by ant-spyware and ant-malware software.

Go to next page for specimen questions on computer networks

Return to First page Return to Top of this page


Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa
15

Specimen questions for IGCSE networks

1. Tick TRUE or FALSE next to each of these statements.

2. Two types of network topology have been combined to form a larger network.

3. Complete each sentence below using one item from the list.

Return to First page Return to Top of this page

Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa


16

4. Tick three items of software which a PC connected to the internet might use.

5. Tick three developments which have arisen because of the internet.

Return to First page Return to Top of this page

Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa


17

6. A small office has four standalone computers. The office manager wants to connect the
computers together to form a LAN.

(6d) The company’s workers are concerned that their payroll data may not be secure as a
result of the computers being networked. Explain why the workers are concerned.

[6]

Return to First page Return to Top of this page


Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa
18

(6e) Give three actions that the office manager could take to ensure data security.

7. Draw in the communication lines in the following diagrams to make:

END OF CHAPTER

Computer Networks for IGCSE

Return to First page Return to Top of this page

Computer networks for IGCSE www.ictranda.co. IGCSE-Teacher: Mr. Sherpherd Randa

S-ar putea să vă placă și