0% found this document useful (0 votes)
46 views19 pages

CS Unit 5

Uploaded by

fogoy95199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views19 pages

CS Unit 5

Uploaded by

fogoy95199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CS Unit 5 (Communication and

the internet)
Type IGCSE

Chapter21(Network)
Text in red —→ Definition or key point or main point
Text in green —→ Common sense or Knowledge point / need to know
Other Text —→ General text

The networking of digital devices has had a profound impact on our lives and
the way in which we work, communicate with each other.

What is Network?
A network is a collection of two or more computers tat are connected together
for the purpose of sharing resources and data. It include all types of digital
devices.

Many of networks has server and client. A server is a powerful computer that
provide the network with services where as the client request the services.
Types of server:
▪File server
▪ Print server
▪ Email server
▪ Web server

▪ Database server
▪ DNS server

CS Unit 5 (Communication and the internet) 1


Why are network used?
A network can support multiple users accessing multiple services at the same
time. The network allows multiple users:

to read/write personal files on a central server (provide storage and back-


up)

to access shared files among several users

to download data or updates to computer programs

to send data to a shared printer

to access the internet

to communicate with

What is Internet?
Internet is a worldwide system of interconnected networks that enables
information to be exchanged and shared.

How does the internet and world wide web differ?


Internet is not the same things as World Wide Web. The internet is the
interconnected network of computers that provides many online services to
users. World Wide Web is just one use of network of the internet.

Advantages and Disadvantages Of Computer


Network
Advantages Disadvantages

More storage Security risk - Data loss by unauthorized access, virus

Data Back-up Cost - To buy networks components and maintenances

CS Unit 5 (Communication and the internet) 2


Files share between users Complexity - need expertise to set up and maintain

users can communicate

users can play multiplayer


games remotely

Type of Networks Base on:


Geographical Area
There are three types: LAN, WAN and PAN

LAN: A local area network is a network that covers a relatively small


geographical area, often a single site or home. Most common type of
LAN is ethernet LAN. But home system use wireless local area network
(WLAN) which is wireless.

WAN: A wide are network (WAN) covers a large geographical area,


usually organizations or company. Each sites has one or more LANs and
form WAN. It allow employees on different sites to communicate and
share data.

PAN: A person are network is a network communication between your


own computer devices, such as laptops, phones, tablet, printer…. The
PAN connect the local devices to allow the data sharing. The devices
usually connect using Wi-Fi or Bluetooth

Network Topology
Network Topology is the arrangement of connections between networked
devices. There are four main network topologies.

Bus Topology : A bus network consists of a single cables to which each


networked device is connected. At each end of cable, there is a
terminator to absorb signals that reach end. Bus topology is widely used
in modern cars and some aircraft. (Controlled Area network)

Advantages Disadvantages

Very Cheap to install - one cable is If cable is damaged or cut, whole


needed network fails

CS Unit 5 (Communication and the internet) 3


Advantages Disadvantages

Easy to connect nodes to network Hard to find where a fault on cable

Having one cable increase data


Easy To add Extra devices
collosions

More devices added ——→ Slower the


Node failures doesn’t affect the other
network
devices or network
All data sent is received by all devices

Ring Topology: A ring network is bus topology but in a closed loop or


ring. Each network device has ‘in’ and ‘out’ connection. Message sent
on ring network all travel in the same direction so no collisions. Data is
passed from one device to next until it reaches.

Advantages Disadvantages

Adding extra doesn’t affect the If cable is damaged or cut, whole


performance of network network fails

If any nodes fail, the ring is broken and


Easy To add Extra devices
failed

Adding extra need to shut down the


No collisions
whole network

More expensive than bus

Star Topology: A star network is a network with main central point


(server) in which networked devices are connected to using either hub
or switch. A central device receives and direct messages to correct
recipients (client).

Advantages Disadvantages

Each node is installed separately so no If switch is damaged or fail, whole


failures due to nodes network fails

Easy To add Extra devices without


Expensive to buy cables, switch
needing to shut

Bottlenecking can occurs if too much


Easy to locate faults and which
traffic pass through central point,
devices
making network slow

Network is efficient as messages are


only sent to device needing them

CS Unit 5 (Communication and the internet) 4


Mesh Topology: There is no central point in mesh topology, instead,
each networked devices (node) is directly connected to every other
devices in network. Only two type exist: Fully connected or Partially
connect. Mesh network can be either wired or wireless. Wired >
Wireless (in cost)

Advantages Disadvantages

Failure preserved - if one device fails, Difficult and expensive to install wired
message can re-routed mesh

Very High performance due to each


Can be difficult to manage due to
device is connected to multiple
multiple connections
devices

In wireless mesh, each node can


extend within the range.

Function / Model
There are only two Models of network: Client-Server Network and Peer-To-
Peer Network

1. Client-Server Network: In this network, there is one server to provides


services to the client computers. They all are connected through a
network using switch or hub. Client-Server Network are usually
Centralized.
Q: How does they work?

A: Client access data or files from server by the following process:

1. client make connection to server using it address (IP)

2. then, client make a service request to server

3. if the request is valid, server will send requested data to client

2. Peer-To-Peer Network: In this network, each devices/computers can act


as client and server. There is no central point in this network. Peer-To-
Peer Network are usually Decentralized.

Communication Media

CS Unit 5 (Communication and the internet) 5


There are many different devices that can be use to connected devices in a
network.

Network Devices Network Media

Wired
→Hub
→Ethernet Cable
→Switch
→Coaxial Cable
→Router
→Fiber Optic Cable
→Modern
→Repeater
Wireless
→Bridge
→Wi-fi
→Wireless Access Point
→Bluetooth
→Gateways
→Mobile Broadband (4G,5G)

Ethernet Cable: Twisted pairs of copper wires to transmit data

Coaxial : A single copper conductor surround by insulation and shielding

Fiber-optic Cable: Made of glass or plastic which carry light signals at light
speed so faster data transmission

Switch and Hub : Switch and Hub are devices that receives incoming data
packets and redirects them to their destination on a local area network (LAN).
The difference is that Switch only sent to intended computers where as Hub
sent to all devices.

Router: Router store the address of all devices that are connect to it in a
network. It route the data from one network to another based on their IP
address.

Modern : Modern convert digital data to analog signals. Modulates (D to A) or


Demodulate (A to D)
Gateway: Connect two different types of network and acts as ‘gate’

Wireless Access Point : allow wireless device to connect to wired network .


They convert data they receive through cables into a wireless signals.

Bridges : connects two or more network segments, making them function as a


single network.
Repeater : extend the range of network

CS Unit 5 (Communication and the internet) 6


Difference between Wired and Wireless

Wired Wireless

Not require physical


Has physical connection connection instead use
signal connection

No need for a cable to


Data Transmission is faster connect devices or to the Advantages
internet

Not easy to intercept or Allows user to use their


Advantages
eavesdrop on data own device

Less susceptible to A wider range of devices


interference than wireless can communicate within Advantages
connectivity the range

Data transmission is slower


Expensive to install and
Interference can often Disadvantages
reconfigure
affect performance

Walls and physical objects


Requires many cables / can affect performance
Disadvantages
expensive Data need to encrypted to
prevent interception

Network Data Speed


The speed that data can be transmitted through a communications medium is
measured in bits per second (bps, b/s, bit/s). Note that network data speed is
1000

Calculating the time needed to transmit a file


If you have a network connection of 12 Mbps and you want to download a
50 MB file, how long would it take?

1. Convert the file size from megabytes to bits.


• File size in megabytes = size x 1024 x 1024 x 8
• 50 MB = 50 x 1024 x 1024 x 8 bits = 419,430,400 bits

2. Convert the transmission speed from Mbps to bits per second.


• Transmission speed in Mbps = size x 1000 x 1000
• 12 Mbps = 12 x 1000 x 1000 = 12 000 000 bps

3. Divide bits by bits per second.


• Time = size of file (in bits) / network speed (in bits per second)

CS Unit 5 (Communication and the internet) 7


• 419,430,400/12 000 000 = 34.95 seconds

IP address and MAC address

Domain Names
Domain names are used to identify one or more IP address.
Domain Name Services (DNS)

DNS is a internet service that translate domain names into IP address. It


has databse of domain names and IP address.

How does it work?

1. User enters a domain names into browser on client computer

2. A client request a DNS server to resolve the domain name

3. If one DNS server doesn’t know how to translate a particular domain


name, it asks another one, and so on.

4. If it hasn’t got that domain name in its database it will ask another server.

5. If one DNS server found the domain names, it will return IP address to
client and the client will connect the host using that IP address.

Data Communication (Protocols)

CS Unit 5 (Communication and the internet) 8


Data communication mean exchanges of data between devices using
transmission media in a network. Five main components in data
communication:

1. Source or Sender

2. Destination or Receiver

3. Channel or media

4. Message

5. Protocol

Protocols
Protocol is a set of rules that control how the communication be between
devices in a network. Without it, different computers wouldn’t be able to
communicate.
A general protocol follows these process:

Identifying : how computer will be identify (IP or MAC)

Encoding and Formatting : Data is converted into signals and formatted


before transmit.

Routing : what route/path the data will take to get its destination

Sequencing : How the data is di-sort and sort/ sequence in correct


order

Error checking : how error will be found and dealt with

Acknowledgement : confirmation that destination has received the


message correctly

Error Handling : what to do if data isn’t received properly

Synchronization : how the speed of the sender and receiver can be


synchronized

Protocol Stacks : Protocol stack means a collection of protocols that work


together. Examples: Internet, TCP/IP and OSI Protocol Suite

Email Protocols

CS Unit 5 (Communication and the internet) 9


Email are sent and received using set of standard protocols

Network Protocols
TCP : Transmission Protocol is used when you access web pages,
send/receive email or upload/download files
IP : Internet Protocol deal with addressing system to identify individual
devices and splitting data into packet and adding packet header with details

TCP/IP Protocols Suite


Data sent using TCP/IP is broken into packets. Each packets of data consists
of a small section of data and packet header. A packer header contain
details of

sender

receiver

how many packets the data is split into

number of this packet

CS Unit 5 (Communication and the internet) 10


Once the receiver computer receives all packets, it will reconstruct data
using the information in the header into original data. A network that moves
data in packets is called packet switched network.

When Data is sent, it pass through Four different Layers:

Application Layer

Transport Layer

Internet Layer

Link (Network Layer)

Web Browsing Protocols


HTTP : the rules to be followed by web server and web browser when
sending and requesting data.

HTTPS : More secure version of http. Especially it ensure communication


between financial information
File Transfer Protocols

FTP: rules that must follow when files are being transmitted between
devices in network. It is often used when sending web pages and other files
by web developers.

CS Unit 5 (Communication and the internet) 11


Benefits of Networking Layers

1. it makes the overall model easier to understand by dividing into


functional parts

2. Each layer perform specialized tasks

3. Different layer can be combine different ways

4. One layer can be developed or changed without affecting other layers

5. It make it easier to identify and correct networking errors and problem.

6. It provide a universal standard for hardware and software manufactures


to communicate

Mobile Broadband Communications

A mobile or cellular network is also a wireless network distributed through


cells where each cell(tower) includes a fixed location transceiver known as
base station. They all work together to cover up over large geographical
area.

When user moves out of range, the signals fails and the base station make a
request to transfer control to another base station nearby without notifying
subscriber. This is called handover.

2G was first mobile communication. It can send text messages and


introduced multimedia messaging service (MMS)

3G increase data transmission speeds and gave wireless access.

4G provide much higher data speeds and rise the popularity of


mobile gaming. It also got much higher capacity (more
users/subscriber)

5G is smarter, faster, and more efficient than 4G. It peaks speeds of


100 Gbps, 100 times faster than 4G

Chapter22(NetworkSecurity)
It is essential that all data stored on networks is kept confidential and secure.

Network security

CS Unit 5 (Communication and the internet) 12


Network Security covers a wide range of activities that protect data from
threats to its confidentiality, correct ness (integrity) and availability.
Data confidentiality involves restricting access to data and ensuring it is
protected form unauthorized individuals. It is important that the network is not
hacked, intercepted or stolen by criminals or competitors. Otherwise, they can
use the data for illegal purposes or business advantage. Some ways to ensure
this is done by:

Access Control Measures : Ensure that only authorized person can


access/modify specific files/data

Stopping Misuse : Stopping users not to misuse the files which are
beyond their permission

Encrypting data : Encrypt/Scramble data so that when unauthorized


person gain access, they won’t be able to read it without encryption key

Data Correctness is important because Data is useless unless it is correct.


Store data must not change or modify without authorization.
Data Availability is as well as needed. A network is useless if the data cannot be
accessed when it is needed. So it is important to protect from failures caused
by criminals,, virus or denial of service (DoS) - an attack on a network that
attempts serval request at the same time in oder to shut down/ slow down the
network.

Why network Security is important?


1. Required for the running of the organization

2. Private and Confidential

3. Financial Valuables

Authorization and Validation


Authorization is the process of checking the identify of a user of a computer
system or network where as Validation is the checking of username and
password meets up with the rules.

CS Unit 5 (Communication and the internet) 13


Ways to secure A Network
There are many different ways to secure a network.

Firewall
A network security system that monitor and controls data that is ‘in’ and ‘out’
of the network to network. It inspects the incoming and outgoing data and
uses set of rules to decide whether to allow the data or not. It can be
hardware- or software- base

Access Control
A method to control that particular user can gain access to particular file.
Access control decides if user should get read-only access/ or read/write
access.

Physical Security
It ensures that critical parts of network can only be physically accessed by
authorized people. It protect against theft of equipment. For examples,
locked/authorized person room, installing burglar alarm, security tagging/
record entry and exist. Physical security is very important because anyone
with physical access to the server can more easily bypass the security
provided by the authentication system or access control system.

Cloud storage and security


fjasklf

Contemporary Storage and security

One type of this storage is network-attached storage (NAS). It is a hardware


device that is connected to a network to provide file storage for any device
connected to that network.
Security risk of NAS:

CS Unit 5 (Communication and the internet) 14


Not changing device’s default password

Not updating software running on the NAS

Another widely type is USB flash drive. They are easy to transport, cheap for
storage amount and convenient to use. The disadvantages is that people put
sensitive information there and it is easily lost. Anyone find it can access. But to
secure this, encryption or setting password is need.

Cyber Attack
A cyber attack is any kind of attack on a computer system or network intention
of

gain access to data

modify and delete data

making system unavailable for use

physically damage a device

Type of Cyber Attack

Social Engineering
Attacks that rely on exploiting human behavior.

Phishing : A method to get personal information and payment details


from users by sending a fake message or email which seems to be
from real organization. Users can loss data by replying them or
clicking the link provided and reveal their personal data such as
username and passwords.

Pharming : A method to gain personal information and payment


details from users by directing them to fake version of trusted
websites to trick users into entering personal login details. There are
two main methods when user are directed to pharming site.

Internet traffic: while going to real website is redirected to fake


website

CS Unit 5 (Communication and the internet) 15


pharming sites have very similar URL to real website so when
user mistype the real one it is already directed to fake website

Blagging : Blagging is when someone makes up a store to gain a


person’s interest and steal money.

Shoulder Surfing : Gaining access to confidential information by


directly observing a user, possibly literally looking over their
shoulder, as they complete a task
To prevent Social Engineering Attacks,
Users should always be careful when opening email attachments or
hyperlinks in emails and other messages. Users should not reply or open if :

no sender

text is general

spelling and grammatical errors

attached file is .exe file or zip file

contain message that seem to rush

not recognize the URL

the website has https or https

install latest security updates/ anti-virus software

be cautious when entering PINs/ password in public location

Technical Weakness
Other forms of cyber attack rely on technical weaknesses (vulnerabilities) in
the system.
Unpatched software : Software is very complicated and security issues are
usually found if it is used in real world. The developer should normally
provide updates to fix these issues. If not, some people use this information
to attack unpatched software to gain access to information.
USB devices : discussed above

Eavesdropping: While data are being sent through, some computer system
will intercept data. In this way the data can be stolen or lost. The owner
wouldn’t know if the data is being eavesdrop

CS Unit 5 (Communication and the internet) 16


Hacking : Hacking is breaking into computer system to steal personal data
without the owners’ consent or knowledge.
Virus : Program or program code that can replicate/copy itself with the
intention of deleting or corrupting files or cause the computer to
malfunction.

Protecting against Security Weakness


Security must be considered at the system and software or application design
stage for the software to be as safe as possible against cyber attack.
Consider these question:

Once Design phase is done, they need to look at implementation ( writing


code).
One major issue is “codes are poor quality and don’t consider how safe or
secure program is” . Another major issue is some programming lead to code
vulnerabilities.
These issues can minimized by having regular code reviews. There are two
main types:

1. Review by another programmer, usually more senior and experience

2. Automated review, usually using software to examine the code

Modular testing is important to security too as it check every tiny problems


remain, by reviewing each section of blocks of code

Other Security Measures to cyber attack

CS Unit 5 (Communication and the internet) 17


Used audit trail which record the activities that have taken place on a
computer system and which can’t be changed. it is order by chronological.
Audit trail contain details of who or what made the change so that
technicians can find out what happened during cyber attack.
Used secure operating system as different systems as different purpose.
Keeping a network secure require effective network management,
monitoring and training of it user.

Identifying Vulnerabilities
Ethical hacking is the branch of computer science that relates to cybersecurity
and preventing cyber attacks from being successful. Ethical hacking is
essentially ‘good’ hacking, looking for weaknesses in software and systems so
that they can be improved. Once weaknesses have been found, steps to
remove or reduce its impact can be taken.

Ways to identify vulnerability


Penetration Testing (Pen Testing)
It is likely to try to gain access to all the systems that the organization has
and the attacks will often include looking for technical weaknesses and
trying social engineering methods. The IT systems of an organization are
deliberately attacked to find any weakness. These attacks are authorized by
the organization and are therefore legal. Once the pen testing has been
completed, a report is usually presented to a senior manager within the
organization explaining what issues were found and the likely impact of
them.

Commercial Analysis Tools


Commercial analysis tools or vulnerability scanners can be used to scan a
system for vulnerabilities, either by purchasing the tools or hiring a service.
These tools can only identify known vulnerabilities, look for common issues
and alert the user. But it must be kept up to date to be effective. They can be
used to scan the network from:

Internally : show issues that could exploited by rogue employee or


hacker who physically get in

CS Unit 5 (Communication and the internet) 18


Externally : show vulnerabilities that hacker could exploit from
outside of company network

Reviews of Network and User Policies


All networks should have written policies that document:
▪ who is authorized to carry out various activities on the network
▪ how and when patches to software should be applied
▪ access controls
▪ password requirements, including how complex passwords should be
and how often they should be changed
▪ how security is set up and maintained on the network
▪ what data audit trails should collect and how long they should be kept
for
▪ anything else relevant to the security and maintenance of the network

Before accessing the network, employees must read and sign the network
user policy to confirm they agree to the organization's rules. User policy is
likely to contain detail of:
▪ what use of the network is allowed or not allowed
▪ what will happen to the user if they do something unacceptable
▪ how to report faults, problems and security issues
▪ security information, such as good practice when choosing and using
password

Over time, the hardware, software, and usage of a network may change.
Therefore, network policies should be regularly reviewed. This ensures they
remain current and effective for maintaining network security.

CS Unit 5 (Communication and the internet) 19

You might also like