尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
• Understand how a router works and its purpose
• Understand the use of other common network devices, including: network interface
cards, hubs, bridges, switches, modems
• Understand the use of WiFi and Bluetooth in networks
• Understand how to set up and configure a small network, including: access to the
internet, the use of a browser, the use of email, access to an ISP
• Understand the characteristics and purpose of common network environments, such
as intranets and the internet
• Understand the advantages and disadvantages of using different types of computer to
access the internet
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Overview What is a Computer Network?
A network is two or more
computers, or other electronic
devices, connected together so
that they can exchange data.
For example a network allows:
• Computers to share files
• Users to message each other
• Share Resources
Network connections between
computers are typically created
using cables (wires) or via
wireless signals.
Cables
Wireless
Workstation
Switch
Bridge
Wireless
Access
Point
Internet
Switch
Router
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Overview
Advantages of using Networks
• Easily share files and data.
• Share resources such as printers and Internet connections.
• Communicate with other network users (e-mail, instant messaging,
video-conferencing, etc.)
• Store data centrally (using a file server) for ease of access and
back-up.
• Keep all of our settings centrally so we can use any workstation.
Disadvantages of using Networks
• Greater risk of hackers.
• Greater risk of viruses (spreading and disabling network).
• The significant cost of extra equipment.
• When the network is down computers can not be used as
standalone computers.
• Print queues can be long.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Discuss the advantages and disadvantages of using a computer network?
Exam Question
The advantages of using a computer network is that it is easier to share files and
data. Also resources such as one printer can be shared with many workstations
(computers). However printer ques could be long. Since all the computers are
connected together there is a greater risk of hackers or viruses spreading which
could disable the network. In addition the cost (expenditure) of the equipment
could be significant. Furthermore a network will allow data to be stored centrally
which will means files can be accessed from any work station on the network. Also
central settings can be applied to all work stations for example restrictions in
changing computer settings from the control panel.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Understand how a router works and its purpose
R
Internet
Outgoing Data
Incoming Data
Router
R
R
S
S Switch
• Connects network/computers to the internet
• Connects LANs/networks together
• Transfers data between networks (Receives and Sends Data Packets)
• Router can connect to devices using cables or wireless signals.
• It stores information about which computer is connected to which
network
Data Packets contain the
following information:
• Header to identify Data
Packet.
• Sender and Receivers IP
address.
• Number of data packets
making up the whole
message.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Understand how a router works and its purpose
R
R R
R
Internet
Outgoing Data
Incoming Data
Router
Web
Server
Web Pages are stored on Web Servers.
Webpages have unique IP address &
domain names to find/communicate
with each other.
Routers direct packets of data across
the internet to its destination. R
R
Everything connected to the internet has an IP Address.
R
S
S
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Common Network Devices
Switch Hub
Smart Device Dumb Device
A Hub and a Switch both connect a number of computers together to make a LAN.
Normally used in larger networks
found in schools, offices etc.
Poor Security
Only would be suitable for a small
home networks.
Sends specific packets of data to
specific computers on the LAN using
workstations unique MAC addresses.
Sends data packets to all the
workstations on the network which
causes network traffic.
More secure however more expensive
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Switch Ports
1 2 3 4
Switch Table
Work
station
Mac
Address
1 AA-AA-AA
2 BB-BB-BB
3
4
Workstation connect to switch ports. Each
Network Card has a unique address (MAC
ADDRESS) which switches can use to
identify a workstation.
Common Network Devices: Switch
You always start
with an empty
switch table.
The switch will
learn each
workstations
MAC address
when it sends a
packet of data
across the
network.
Sending Packets of Data from
Workstation 1 – 2
The switch will send data
packets to all computers
because it does not know the
MAC address for Workstation 2.
1
2
3
4
Sending Packets of Data from
Workstation 2 – 1
Now the switch table has the
MAC address for workstation 1
it is possible for workstation 2
to send a direct pack of data.
1
2
3
4
S S
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Compare and contrast the use of a Router and a Switch?
Exam Question
The router is used to connect Local Area Networks together to form a Wide Area
Networks and also to the internet. The router will transfer data been networks
using IP addresses to direct information. The switch is used to connect computers
together to create a LAN. Each workstation connected to the network will have its
own MAC addresss. The router will learn each work stations MAC address in order
to send specific packets of data to the correct workstation.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
A router is connected to a LAN. Describe the function of a router?
Exam Question
Routers inspect and read the IP address of the data packets sent to it. The
router will the sends the data packet to a switch with that IP address.
Describe the details of computer addresses that are stored by a router.
The Router stores IP addresses. IP address is a unique identifier set up by network
manager/ISP. An IP address consists of 4 numbers separated by full stops. The router
also stores MAC addresses. MAC address is usually hard coded by manufacturer
which means it never changes.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Common Network Devices
Modems
Network Interface Card
Bridge
Switch
Bridges
Network Interface Card (NIC) allows you to
connect a device to the network. The NIC will
contain the MAC address which will be used to
identify the computer to the network.
Switch
A bridge is used to connect two parts of a LAN network together
so they function as a single LAN. Two Switches can be connected
using a the Bridge Device.
Modems convert analogue signals from a
telephone line to digital signals which can be
read by the computer.
The Modem also converts digital signals back
into analogue for transmission over telephone
lines.
Analogue >>> Digital
Analogue <<< Digital
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Understand the use of WiFi and Bluetooth in networks
• Very slow data transfer speeds
• Short distance of coverage/limited signal strength
• Greater risk of interception of data/less secure
• Supports a limited number of devices in a network
Bluetooth is a wireless networking technology designed for very short-range connections.
• Connecting wireless devices such as mouse, phone, headset to a computer which are close in proximity.
• Transferring files between devices.
• Printing Wirelessly from a Tablet or Mobile Phone.
WiFi is a wireless networking technology makes it possible to connect devices with a wireless connection to a
network or to a single computer .
• Reduced cost of cabling/Safer – won’t trip over wires
• Easier to connect other devices to the network
• Makes the computer portable as long as it’s within range of the wireless access point
• Limited area of network
• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/less secure
• Physical obstacles can interfere with signal/can
cause disconnection
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Bluetooth and WiFi can connect devices together.
Discuss the advantages and disadvantages of using Bluetooth or WiFi.
Exam Question
Bluetooth is more useful when transferring data between two devices whereas
WiFi is more suited to full scale networks. The devices connected via Bluetooth
should be near to each other whereas WiFi has a larger range. Less data tends to
be transferred with Bluetooth. Bluetooth uses a lower bandwidth which means
data transfer speeds are slower compare to WiFI. WiFi has better security than
Bluetooth however the cost of Bluetooth is cheaper than WiFi.
Bluetooth and Wifi both use wireless technology which means there is no need for
cables. This reduces costs and trip hazards. Bluetooth is more energy efficient than
wifi
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Methods which can be used to connect computers to networks.
WiFi: Using WIFI can allow you to connect to the internet from any
room in a house without the use of cables.
In addition multiple devices can be connected at the same time.
Satellite: Satellite can be used almost anywhere in the
world. Since it connects via satellites it has better
coverage. Its general use is for the internet.
3G / 4G: 3G and 4G are used in smart phones to connect
wirelessly to Internet. Allows for access on the move even
within areas with no WiFi. 3G and 4G is not affected by rain or
snow as it as a form of satellite communication.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Many computer networks are connected using cables for some are now
connected using wireless technology. Discuss the advantages and
disadvantages of using wireless networks compared to using cabled
networks.
Exam Question
The advantage of using wireless networks is that it can increase the range of the
network making it easier to add additional devices and computers. With a cabled
network you would be restricted to the amount of networks ports. Furthermore it
could potentially be a cheaper alternative as you would not have to buy cables and
modify the building. In contrast the wireless signal could be limited and therefore
weaker in some parts of the network due to physical obstacles. The cabled network
would provide a more stable and quicker connection.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Web Browser:
To browse the internet.
Email:
To send email messages including
attachments to other users.
Security:
Anti Virus/Spyware software to protect your
computer from external threats
(Viruses/Hackers)
Router:
To connect your LAN to the Internet (WAN)
Switch/Hub:
To connect Network Devices together using
cables.
Network Cables:
To create physical connections.
Firewall:
To keep network secure from external threats.
Servers:
To manage network functions such as network
security, network file storage, share resources
etc.
Setting up a Network
ISP (Internet Service Provider)
Set up an account with an Internet Service Provider (ISP) to
receive an internet connection to your location
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Describe what an ISP is and, apart from security measures, describe what
it offers its customers.
Exam Question
Internet Service Provider (ISP) provides Internet access. ISPs often offers web
space and domain name to create own website. Also the ISP provides users with
an email address. The ISP also provides a router to connect to the internet. In
addition they may also offer storage space to save data in the cloud.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Common network environments
• LAN is a Local Area Network
• LAN covers a small area (normally
confined to one building or within
a close proximity).
• LAN consists of number of
computers and devices that
usually connect to a switch which
is connected to a router.
• A WAN is Wide Area Network is a
network that extends over a large
geographical area.
• A WAN is often created by joining
several LANs together.
• Routers are used to connect LAN
networks to form a WAN Network.
LAN
WAN
The most common
examples of WAN is the
internet.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Common network environments
• A wireless LAN (WLAN) is a LAN that uses
radio signals (WiFi) to connect computers
instead of cables.
• Devices know Access Points (AP) are
connected to the wired network at fixed
locations.
• These devices provide the wireless access
to devices on the network.
• It is much more convenient to use wireless
connections instead of running long wires
all over a building.
WLAN
AP
AP
AP
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Describe the differences between the common network environments
(LAN, WAN, WLAN)?
Exam Question
LAN (Local Area Network) WAN (Wide Area Network) WLAN (Wireless Local Area Network)
 Smaller geographical area
 Confined to one building
 Larger geographical area
 LANs connected together form a
WAN
 Uses wireless signals to connect devices
 Access Points are connected to the wired
networks.
Local Area Networks (LANs) normally cover a smaller geographical area confined
normally to one building. Wide Area Networks are LANs which have been
connected together with a router. They normally cover a larger geographic area.
The connection between the LANs could either be with cables or satellite signals.
Wireless Local Area Networks use wireless signals to connect devices. Access
Points are connected to the wired networks.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Internet • Internet is Public (available to all
users)
• Internet is network of networks
• Internet is global
• Internet has more information than
an intranet
Typical uses of an internet would be:
• Viewing web pages
• Sending and receiving e-mail messages
• Sharing files
• Communicating using voice (VOIP)
and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Intranet • Intranet is within one organisation
(Private)
• Intranets tend to be
policed/managed
• Intranet has an extra layer of security
• Data found in an intranet is likely to
be more reliable/relevant than that
found on the Internet
Typical uses of an intranet would be:
• Viewing internal web pages (e.g.
company schools, university's etc.)
• Internal e-mail and instant-
messaging between workers
• Sharing of internal documents
Intranets and the Internet
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Describe the differences between the internet and intranet?
Exam Question
Internet is global network of networks. It is open to the public domain whereas the
intranet is private and normally within on organisation. The intranet requires
authentication to log on which provides an extra layer of security. Information
found on the intranet will more reliable and relevant then the internet because the
intranet tends to be policed/managed. However more information is available on
the internet.
Give three reasons why some companies have intranets?
It is possible to prevent employees accessing undesirable websites. The company
can ensure that available information is specific to their needs. Also it will make it is
easier to make sure confidential messages stay within the company. Furthermore
there is less chance of company computers being hacked.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
In order to make reliable information available to all students, schools
often put the information on their intranet. Describe what is meant by an
intranet?
Exam Question
An intranet is a computer network which normally exists usually within one
organisation. The intranet meets the internal needs of an organization. Intranet is
private and tends to be policed or managed. Intranet has an extra layer of security
and data found in an intranet is likely to be more relevant to the users’ needs.
ICT IGCSE Theory – Revision Presentation
4.1 Networks
Chapter
4:
Networks
and
the
effects
of
using
them
WWW.YAHMAD.CO.UK
Accessing the Internet
Device Advantages Disadvantages
laptop computers • More portable and smaller in size compared
to desktop computers.
• Bigger screens compared to tablets and
phones.
• Touch pad may be difficult to
use to navigate webpages.
• Processors are not as fast as
desktop computers.
Desktop • Stable internet connection since the
connection is normally wired.
• Use of input devices including pointing
devices to make navigation easier.
• Has to be connected to a
power supply at all times.
• Not portable.
Tablets • Tablet: More portable than desktops/laptops
however less than phones.
• Mobile: Portable: Easy to carry around and
use whilst on the move.
• Mobile: Always likely to have a mobile phone
at all times.
• Mobile: Can access internet via phone
networks (4G)
• Signal strength dependant on
location.
• Smaller display screen.
• Not all websites designed to
be used by mobiles/tablets.
• Touch screen may be difficult
to use.
• Limited battery Life.
Smart Phones

More Related Content

What's hot

Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
sourabh4u07
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
SubhamKumarYadav2
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
Anjan Mahanta
 
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.pptCBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
41Anshmaurya9A
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
itsvineeth209
 
Types of computer
Types of computerTypes of computer
Types of computer
Rajkumar Rajak
 
Types of server
Types of serverTypes of server
Types of server
Muhammad Mudarrak
 
Network Adapter
Network AdapterNetwork Adapter
Network Adapter
Ankit Agrawal
 
Os ppt
Os pptOs ppt
Os ppt
Mitali Chugh
 
Partitioning a Hard Drive
Partitioning a Hard DrivePartitioning a Hard Drive
Partitioning a Hard Drive
Jamaica Olazo
 
Operating Database Application ODA
Operating Database Application ODAOperating Database Application ODA
Operating Database Application ODA
Gera Paulos
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
mvenkat2016
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentation
Jisu Dasgupta
 
USES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORKUSES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORK
GLOBAL TECHNOLOGY CONSULTANCY
 
Bits And Bytes
Bits And BytesBits And Bytes
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Celia Bandelier
 
9626 GCE AS Information Technology Chapter 1
9626 GCE AS Information Technology Chapter 19626 GCE AS Information Technology Chapter 1
9626 GCE AS Information Technology Chapter 1
Anthi Aristotelous
 
Operating System - Microsoft Windows 10
Operating System - Microsoft Windows 10 Operating System - Microsoft Windows 10
Operating System - Microsoft Windows 10
Ruchika Sawant
 
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)
Waleed Khan
 

What's hot (20)

Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.pptCBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
CBSE_Std_IX_DataEntry_and_Keyboarding_Skills.ppt
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Types of server
Types of serverTypes of server
Types of server
 
Network Adapter
Network AdapterNetwork Adapter
Network Adapter
 
Os ppt
Os pptOs ppt
Os ppt
 
Partitioning a Hard Drive
Partitioning a Hard DrivePartitioning a Hard Drive
Partitioning a Hard Drive
 
Operating Database Application ODA
Operating Database Application ODAOperating Database Application ODA
Operating Database Application ODA
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentation
 
USES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORKUSES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORK
 
Bits And Bytes
Bits And BytesBits And Bytes
Bits And Bytes
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
9626 GCE AS Information Technology Chapter 1
9626 GCE AS Information Technology Chapter 19626 GCE AS Information Technology Chapter 1
9626 GCE AS Information Technology Chapter 1
 
Operating System - Microsoft Windows 10
Operating System - Microsoft Windows 10 Operating System - Microsoft Windows 10
Operating System - Microsoft Windows 10
 
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)
 

Similar to 4.1 Networks.pdf

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Mark Rotondella
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
CatherineBotardo3
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Computer network
Computer networkComputer network
Computer network
Md Saylab
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Computer network
Computer networkComputer network
Computer network
NajmulIslam38
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
Gohil Anshu
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Class Note
Class NoteClass Note
Class Note
AK IJ
 
Fg c
Fg cFg c
Fg c
Taha Khan
 
Networking basics
Networking basicsNetworking basics
Networking basics
George Ranson
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
teknik komputer ui
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
AlidHasan4
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
Subas Paudel
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
Susan Ferdon
 

Similar to 4.1 Networks.pdf (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Computer network
Computer networkComputer network
Computer network
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Computer network
Computer networkComputer network
Computer network
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Class Note
Class NoteClass Note
Class Note
 
Fg c
Fg cFg c
Fg c
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
Overkill Security
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 

4.1 Networks.pdf

  • 1. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK • Understand how a router works and its purpose • Understand the use of other common network devices, including: network interface cards, hubs, bridges, switches, modems • Understand the use of WiFi and Bluetooth in networks • Understand how to set up and configure a small network, including: access to the internet, the use of a browser, the use of email, access to an ISP • Understand the characteristics and purpose of common network environments, such as intranets and the internet • Understand the advantages and disadvantages of using different types of computer to access the internet
  • 2. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Overview What is a Computer Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example a network allows: • Computers to share files • Users to message each other • Share Resources Network connections between computers are typically created using cables (wires) or via wireless signals. Cables Wireless Workstation Switch Bridge Wireless Access Point Internet Switch Router
  • 3. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Overview Advantages of using Networks • Easily share files and data. • Share resources such as printers and Internet connections. • Communicate with other network users (e-mail, instant messaging, video-conferencing, etc.) • Store data centrally (using a file server) for ease of access and back-up. • Keep all of our settings centrally so we can use any workstation. Disadvantages of using Networks • Greater risk of hackers. • Greater risk of viruses (spreading and disabling network). • The significant cost of extra equipment. • When the network is down computers can not be used as standalone computers. • Print queues can be long.
  • 4. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Discuss the advantages and disadvantages of using a computer network? Exam Question The advantages of using a computer network is that it is easier to share files and data. Also resources such as one printer can be shared with many workstations (computers). However printer ques could be long. Since all the computers are connected together there is a greater risk of hackers or viruses spreading which could disable the network. In addition the cost (expenditure) of the equipment could be significant. Furthermore a network will allow data to be stored centrally which will means files can be accessed from any work station on the network. Also central settings can be applied to all work stations for example restrictions in changing computer settings from the control panel.
  • 5. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Understand how a router works and its purpose R Internet Outgoing Data Incoming Data Router R R S S Switch • Connects network/computers to the internet • Connects LANs/networks together • Transfers data between networks (Receives and Sends Data Packets) • Router can connect to devices using cables or wireless signals. • It stores information about which computer is connected to which network Data Packets contain the following information: • Header to identify Data Packet. • Sender and Receivers IP address. • Number of data packets making up the whole message.
  • 6. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Understand how a router works and its purpose R R R R Internet Outgoing Data Incoming Data Router Web Server Web Pages are stored on Web Servers. Webpages have unique IP address & domain names to find/communicate with each other. Routers direct packets of data across the internet to its destination. R R Everything connected to the internet has an IP Address. R S S
  • 7. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Common Network Devices Switch Hub Smart Device Dumb Device A Hub and a Switch both connect a number of computers together to make a LAN. Normally used in larger networks found in schools, offices etc. Poor Security Only would be suitable for a small home networks. Sends specific packets of data to specific computers on the LAN using workstations unique MAC addresses. Sends data packets to all the workstations on the network which causes network traffic. More secure however more expensive
  • 8. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Switch Ports 1 2 3 4 Switch Table Work station Mac Address 1 AA-AA-AA 2 BB-BB-BB 3 4 Workstation connect to switch ports. Each Network Card has a unique address (MAC ADDRESS) which switches can use to identify a workstation. Common Network Devices: Switch You always start with an empty switch table. The switch will learn each workstations MAC address when it sends a packet of data across the network. Sending Packets of Data from Workstation 1 – 2 The switch will send data packets to all computers because it does not know the MAC address for Workstation 2. 1 2 3 4 Sending Packets of Data from Workstation 2 – 1 Now the switch table has the MAC address for workstation 1 it is possible for workstation 2 to send a direct pack of data. 1 2 3 4 S S
  • 9. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Compare and contrast the use of a Router and a Switch? Exam Question The router is used to connect Local Area Networks together to form a Wide Area Networks and also to the internet. The router will transfer data been networks using IP addresses to direct information. The switch is used to connect computers together to create a LAN. Each workstation connected to the network will have its own MAC addresss. The router will learn each work stations MAC address in order to send specific packets of data to the correct workstation.
  • 10. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK A router is connected to a LAN. Describe the function of a router? Exam Question Routers inspect and read the IP address of the data packets sent to it. The router will the sends the data packet to a switch with that IP address. Describe the details of computer addresses that are stored by a router. The Router stores IP addresses. IP address is a unique identifier set up by network manager/ISP. An IP address consists of 4 numbers separated by full stops. The router also stores MAC addresses. MAC address is usually hard coded by manufacturer which means it never changes.
  • 11. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Common Network Devices Modems Network Interface Card Bridge Switch Bridges Network Interface Card (NIC) allows you to connect a device to the network. The NIC will contain the MAC address which will be used to identify the computer to the network. Switch A bridge is used to connect two parts of a LAN network together so they function as a single LAN. Two Switches can be connected using a the Bridge Device. Modems convert analogue signals from a telephone line to digital signals which can be read by the computer. The Modem also converts digital signals back into analogue for transmission over telephone lines. Analogue >>> Digital Analogue <<< Digital
  • 12. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Understand the use of WiFi and Bluetooth in networks • Very slow data transfer speeds • Short distance of coverage/limited signal strength • Greater risk of interception of data/less secure • Supports a limited number of devices in a network Bluetooth is a wireless networking technology designed for very short-range connections. • Connecting wireless devices such as mouse, phone, headset to a computer which are close in proximity. • Transferring files between devices. • Printing Wirelessly from a Tablet or Mobile Phone. WiFi is a wireless networking technology makes it possible to connect devices with a wireless connection to a network or to a single computer . • Reduced cost of cabling/Safer – won’t trip over wires • Easier to connect other devices to the network • Makes the computer portable as long as it’s within range of the wireless access point • Limited area of network • Strength of signal is weaker • Possible slow data transfer speeds • Easier to hack into/less secure • Physical obstacles can interfere with signal/can cause disconnection
  • 13. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Bluetooth and WiFi can connect devices together. Discuss the advantages and disadvantages of using Bluetooth or WiFi. Exam Question Bluetooth is more useful when transferring data between two devices whereas WiFi is more suited to full scale networks. The devices connected via Bluetooth should be near to each other whereas WiFi has a larger range. Less data tends to be transferred with Bluetooth. Bluetooth uses a lower bandwidth which means data transfer speeds are slower compare to WiFI. WiFi has better security than Bluetooth however the cost of Bluetooth is cheaper than WiFi. Bluetooth and Wifi both use wireless technology which means there is no need for cables. This reduces costs and trip hazards. Bluetooth is more energy efficient than wifi
  • 14. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Methods which can be used to connect computers to networks. WiFi: Using WIFI can allow you to connect to the internet from any room in a house without the use of cables. In addition multiple devices can be connected at the same time. Satellite: Satellite can be used almost anywhere in the world. Since it connects via satellites it has better coverage. Its general use is for the internet. 3G / 4G: 3G and 4G are used in smart phones to connect wirelessly to Internet. Allows for access on the move even within areas with no WiFi. 3G and 4G is not affected by rain or snow as it as a form of satellite communication.
  • 15. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Many computer networks are connected using cables for some are now connected using wireless technology. Discuss the advantages and disadvantages of using wireless networks compared to using cabled networks. Exam Question The advantage of using wireless networks is that it can increase the range of the network making it easier to add additional devices and computers. With a cabled network you would be restricted to the amount of networks ports. Furthermore it could potentially be a cheaper alternative as you would not have to buy cables and modify the building. In contrast the wireless signal could be limited and therefore weaker in some parts of the network due to physical obstacles. The cabled network would provide a more stable and quicker connection.
  • 16. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Web Browser: To browse the internet. Email: To send email messages including attachments to other users. Security: Anti Virus/Spyware software to protect your computer from external threats (Viruses/Hackers) Router: To connect your LAN to the Internet (WAN) Switch/Hub: To connect Network Devices together using cables. Network Cables: To create physical connections. Firewall: To keep network secure from external threats. Servers: To manage network functions such as network security, network file storage, share resources etc. Setting up a Network ISP (Internet Service Provider) Set up an account with an Internet Service Provider (ISP) to receive an internet connection to your location
  • 17. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Describe what an ISP is and, apart from security measures, describe what it offers its customers. Exam Question Internet Service Provider (ISP) provides Internet access. ISPs often offers web space and domain name to create own website. Also the ISP provides users with an email address. The ISP also provides a router to connect to the internet. In addition they may also offer storage space to save data in the cloud.
  • 18. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Common network environments • LAN is a Local Area Network • LAN covers a small area (normally confined to one building or within a close proximity). • LAN consists of number of computers and devices that usually connect to a switch which is connected to a router. • A WAN is Wide Area Network is a network that extends over a large geographical area. • A WAN is often created by joining several LANs together. • Routers are used to connect LAN networks to form a WAN Network. LAN WAN The most common examples of WAN is the internet.
  • 19. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Common network environments • A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi) to connect computers instead of cables. • Devices know Access Points (AP) are connected to the wired network at fixed locations. • These devices provide the wireless access to devices on the network. • It is much more convenient to use wireless connections instead of running long wires all over a building. WLAN AP AP AP
  • 20. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Describe the differences between the common network environments (LAN, WAN, WLAN)? Exam Question LAN (Local Area Network) WAN (Wide Area Network) WLAN (Wireless Local Area Network)  Smaller geographical area  Confined to one building  Larger geographical area  LANs connected together form a WAN  Uses wireless signals to connect devices  Access Points are connected to the wired networks. Local Area Networks (LANs) normally cover a smaller geographical area confined normally to one building. Wide Area Networks are LANs which have been connected together with a router. They normally cover a larger geographic area. The connection between the LANs could either be with cables or satellite signals. Wireless Local Area Networks use wireless signals to connect devices. Access Points are connected to the wired networks.
  • 21. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Internet • Internet is Public (available to all users) • Internet is network of networks • Internet is global • Internet has more information than an intranet Typical uses of an internet would be: • Viewing web pages • Sending and receiving e-mail messages • Sharing files • Communicating using voice (VOIP) and video (video-conferencing) • Playing multi-player games • Streaming Video/audio Content • Online Shopping/Banking Intranet • Intranet is within one organisation (Private) • Intranets tend to be policed/managed • Intranet has an extra layer of security • Data found in an intranet is likely to be more reliable/relevant than that found on the Internet Typical uses of an intranet would be: • Viewing internal web pages (e.g. company schools, university's etc.) • Internal e-mail and instant- messaging between workers • Sharing of internal documents Intranets and the Internet
  • 22. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Describe the differences between the internet and intranet? Exam Question Internet is global network of networks. It is open to the public domain whereas the intranet is private and normally within on organisation. The intranet requires authentication to log on which provides an extra layer of security. Information found on the intranet will more reliable and relevant then the internet because the intranet tends to be policed/managed. However more information is available on the internet. Give three reasons why some companies have intranets? It is possible to prevent employees accessing undesirable websites. The company can ensure that available information is specific to their needs. Also it will make it is easier to make sure confidential messages stay within the company. Furthermore there is less chance of company computers being hacked.
  • 23. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK In order to make reliable information available to all students, schools often put the information on their intranet. Describe what is meant by an intranet? Exam Question An intranet is a computer network which normally exists usually within one organisation. The intranet meets the internal needs of an organization. Intranet is private and tends to be policed or managed. Intranet has an extra layer of security and data found in an intranet is likely to be more relevant to the users’ needs.
  • 24. ICT IGCSE Theory – Revision Presentation 4.1 Networks Chapter 4: Networks and the effects of using them WWW.YAHMAD.CO.UK Accessing the Internet Device Advantages Disadvantages laptop computers • More portable and smaller in size compared to desktop computers. • Bigger screens compared to tablets and phones. • Touch pad may be difficult to use to navigate webpages. • Processors are not as fast as desktop computers. Desktop • Stable internet connection since the connection is normally wired. • Use of input devices including pointing devices to make navigation easier. • Has to be connected to a power supply at all times. • Not portable. Tablets • Tablet: More portable than desktops/laptops however less than phones. • Mobile: Portable: Easy to carry around and use whilst on the move. • Mobile: Always likely to have a mobile phone at all times. • Mobile: Can access internet via phone networks (4G) • Signal strength dependant on location. • Smaller display screen. • Not all websites designed to be used by mobiles/tablets. • Touch screen may be difficult to use. • Limited battery Life. Smart Phones
  翻译: