You are on page 1of 11

COMPUTER NETWORKS AND WEB TECHNOLOGIES

A computer network is a group of computing devices that are connected together so that they
can share data and resources.

A mobile network is a network of communication and computing devices where the last link is
over a mobile phone network.

TYPES OF NETWORKS
The three main types of computer networks are local area networks (LANs), metropolitan area
networks (MANs) and wide area networks (WANs).

Local Area Network (LAN)


LAN a network that uses cables or radio signals to link two or more computers in a
geographically limited area (generally one building or a group of buildings). Each computer on
the network can function both as an independent computer and as a workstation on the network
accessing information from the server. A server is a computer that runs the software that allows
the computers (called client) on the network to communicate and share resources on a network.
Devices shared on the network may include: hard drives, disk drives, printers, fax machine,
scanners and modems.

Advantages
1. Hardware devices (printers) can be shared.
2. Storage mediums can be shared.
3. Software and data files can be shared by users
4. Cheaper, less costly to buy one copy of a software and pay the license for several machines,
than to buy individual packages for each computer.
5. Users can work on a single document.
6. Users can communicate using email.

Disadvantages
1. Initial setup cost is high.
2. More risk of data corruption as many users will be using the system.
3. Greater risk of viruses, virus is easily spread between the computers on the network.
4. If the server fails the entire network will be affected.
5. Networks are sometimes hard to maintain and may require a network administrator which
will incur additional cost.

Metropolitan Area Network (MAN)


A metropolitan area network (MAN) is a high-speed network that connects local area networks
in a metropolitan area such as a city or town and handles the bulk of communications activity
across that region. A MAN typically includes one or more LANs, but covers a smaller
geographic area than a WAN. A MAN usually is managed by a consortium of users or by a
single network provider that sells the service to the users. Local and state governments, for
example, regulate some MANs. Telephone companies, cable television operators, and other
organizations provide users with connections to the MAN.

Wide Area Network (WAN)


A wide area network (WAN) is a network that covers a large geographic area (such as a city,
country, or the world) using a communications channel that combines many types of media such
as telephone lines, cables, and radio waves. A WAN can be one large network or can consist of
two or more LANs connected together. The Internet is the world’s largest WAN.

1
MOBILE NETWORKS AS RADIO-BASED COMMON CARRIERS

A common carrier is a company that offers communication services to the general public.
Mobile network started life as networks for cellular phones. They are called cell phones because
of the way in which mobile networks work. A mobile phone mast (post) has a radio transmitter
and receiver at the top. The signals from the mast reach out in a circle - or cell. Any mobile
phone within that cell can communicate with the post. In a city there are many hundreds of
masts spread throughout the city area so that their cells overlap. All the masts are networked
together so a mobile phone in one cell can communicate with a mobile phone in the same cell or
another cell. From its early days this system has expanded and now covers the majority of urban
areas around the globe.

One particular clever aspect of a mobile network is that if you leave one cell and enter another,
your communication device automatically disconnects from one mast and reconnects to the new
mast without any interruption to service. Mobile networks continue to expand in coverage,
speed and capacity.

Figure 1.1 Mobile Network mast

MOBILE WIRELESS STANDARDS: FROM 2G TO 5G


First there was mobile technology, which is categorized as 1G. This utilized analog technology,
then second- generation mobile technology (2G). As of 2019, 3G and 4G are in widespread use
around the Caribbean and the world. The change from 2G to 3G was a major break in
communications. 3G receives a signal from the nearest mobile phone tower and is used for
phone calls, messaging and data. It is generally accepted that 4G works the same as 3G but with
a faster Internet connection. 4G claims to be around five times faster than existing 3G services.

Comparison of 2G, 3G and 4G-LTE


Generation Feature Problems
2G Text messaging, multimedia text Phone call dropping and slow
messaging, internet access, caller ID and data transmission.
the SIM card
3G Text messaging, multimedia text Network coverage
messaging, internet access, caller ID,
SIM card, web browsing, email, video
downloading, picture sharing and other
smart technology
4G Text messaging, multimedia text Network coverage issues
messaging, internet access, caller ID,
SIM card, web browsing, email, video
downloading, picture sharing other smart
technology increase network coverage
and speed.

Table 1.1 Comparison of 2G to 4G networks

2
5G is the next generation of mobile broadband that will eventually replace, or at least augment,
your 4G LTE connection. With 5G, you’ll see exponentially faster download and upload speeds.
Latency, or the time it takes devices to communicate with wireless networks, will also drastically
decrease.

There are several differences between 4G vs 5G:

 5G is a unified platform that is more capable than 4G


 5G uses spectrum better than 4G
 5G is faster than 4G
 5G has more capacity than 4G
 5G has lower latency than 4G

WIRELESS NETWORK TECHNOLOGIES

Mobile networks aren’t the only wireless radio-based communication technologies used in
Information Technology. Both Bluetooth and Wi-Fi are widely used.

Bluetooth is a wireless protocol for exchanging data over short distances from fixed and mobile
devices, using radio waves. Bluetooth capability is enabled in a device by means of an embedded
Bluetooth chip and supporting software. The chip enables Bluetooth to be built into a wide range
of devices such as cellular phones and PDAs. Some of the current uses of the Bluetooth protocol
include:
 Wireless control of and communication between a mobile phone and a handsfree headset;
 Wireless control of and communication between a mobile phone and a Bluetooth compatible
car stereo system;
 Wireless Bluetooth headset and intercom;
 Wireless networking between pcs in a confined space and where little bandwidth is required;
 Wireless communication with PC input and output devices, the most common being the
mouse, keyboard and printer;
 Transfer of files, contact details, calendar appointments, and reminders between
smartphones.
 Linking mobile phone with car stereo system.
 Control of games such as Nintendo Wii.
 Has a limited range of approximately 10 meters (30 feet).
 Uses a radio (broadcast) communications system; devices do not have to be in line of sight of
each other.
 Does not penetrate walls; no interference with other devices in adjoining rooms.

Wi-Fi is short for wireless fidelity is a wireless protocol used to connect hardware such as
computers, peripherals, tablets and smartphones to local area networks without cables. The term
Wi-Fi and its logo were introduced by the Wi-Fi Alliance to give consumers a way to distinguish
Wi-Fi devices from other wireless products. Most wireless networks today operate on the 802.11
standard and more than half all Internet traffic transverses Wi-Fi networks, making Wi-Fi one of
the greatest technological advances in history.

Wi-Fi can be useful when you are on the move.

A hotspot is the physical location where persons may obtain Internet access, typically using
WIFI technology.

Wi-Fi hotspot can be created by business for use by customers in places such as a café, shopping
mall, restaurant, airports and hotels.

3
LEVELS OF PRIVACY PROVIDED BY AN INTRANET, AN EXTRANET AND INTERNET

Some organisations rely on the intranet, an extranet and the Internet, to meet their data
communication needs. Whilst all three have similarities, they all have features that make them
different.

Intranet
An intranet is a private computer network where only authorized persons within an organization
can access resources;

It is designed to meet the needs of a single organisation or company that needs to keep data
private and secure. It utilises familiar facilities such as web pages and web browsers and are used
by hospitals, banks insurance companies and many other organizations.

Extranet
An extranet is an intranet that has been selectively opened to specially selected individuals or
organisations (including customers, suppliers, research associates). An online banking
application is an example of an extranet.

Figure 1.2 The extranet operated by NCB allows customers around-the-clock access to banking services.

Internet
The internet is a public, globally accessible, wide area network providing information and
communication facilities.

With its global reach, the Internet service the data communication needs of businesses worldwide
and billions of individuals. Within countries, the Internet is accessible via Internet service
providers (ISP). An ISP is a company that provides individuals and other organizations with
access to the Internet and other related services. An ISP will usually have a direct connection to
at least one fast access connection to the country's main Internet infrastructure, the Internet
backbone. Within the Caribbean, Cable & Wireless, Digicel and FLOW are well-known Internet
service providers. Information travelling over the Internet is not secure and can easily be seen.
If you need to send confidential information over the Internet it should be encrypted first.

Encryption is the process of converting data/information to a code to prevent unauthorized


persons from accessing it.

While all three types of network - intranet, extranet and Internet - have similarities, they also
have features that set them apart.

Characteristic Internet Intranet Extranet


Level of privacy Public: Anyone can Private: Only Private: Only
access authorized employees authorized persons
can access can access
Ownership Not owned by anyone Owned by a particular May be owned by one
organization or more collaborating
organization

4
Characteristic Internet Intranet Extranet
Information sharing Information can be Information can be Information can be
shared with everyone shared securely within shared between
across the world an organisation employees and
external colleagues
Table 1.2 Comparing Internet, Intranet and Extranet

FUNCTIONS OF THE BASIC COMPONENTS OF A NETWORK

Most network use a combination of wired and wireless technologies.

A wired transmission medium carries data directly from one point to another whereas a wireless
medium broadcasts the data, which is carried to all devices within range.

A range of hardware devices and transmission media is used in the creation and operation of a
computer network. These are listed in table 1.3.

Method of connectivity Transmission media Networking devices


Wired  Cables  Hub
 Coaxial  Switch
 Twisted pair  Router
 Fibre optic  Network interface card/ adapter
Wireless  Bluetooth  Wireless access point
 Microwave  Wireless adapter
 Radio
 Satellite
 Wi-Fi
Table 1.3 Transmission media and networking devices

TRANSMISSION MEDIA
Data can be transmitted through various types of cabled (wired) or wireless media. Cabled media
uses wires to transmit data while wireless media transmit data through the air.

Wired/Cabled Media
Cabled transmission media falls into three categories:
1. Coaxial cable
2. Twisted pair/Ethernet cable
3. Fibre optic cable

Coaxial cable: this is a type of communication channel used to transmit voice, video and data.
The cable consists of a single copper core surrounded by a metal shield to reduce interference
and all enclosed in a plastic covering. It facilitates high speed transmission but is difficult to
install as cables are bulky and somewhat rigid. It is usually found on television, videos and cable
TV.

Figure1.3 Coaxial Cable

5
Twisted pair or Ethernet cable: a communication channel consisting of eight copper wires,
twisted in pairs to reduce interference and enclosed in a plastic covering. They are used to
transmit voice data over telephone lines and is the most popular form of data transmission. This
type of cable is easy to handle and cheap but relatively slow. These cables are built to transmit
analog data; therefore a modem is required to convert the analog signals to digital data.

(a) (b)

Figure 1.4 Twisted pair cable is often used in computer networks: (a) cable, (b) cable with connector

Fibre optic cable: these cables consist of clear, thin fibre of glass; they transmit data using pulse
of light rather than electrical signals. This eliminates the problem of electrical interference. They
enable volumes of digital data to be transmitted fast and virtually error free. A single cable
consists of thousands of hair thin strands of glass. It is ideal for connecting between buildings as
it is also not affected by moisture and lightening. Fibre optic cables can transmit signals over
longer distance than the other two cables. They are also relatively expensive.

Figure 1.5 Fibre Optic cable

Wireless Media
This enables two or more devices to communicate with each other without physical connection
(without cables). They use radiofrequencies to transmit data. Wireless communication offers
users many benefits such as portability, flexibility, increase productivity and lower installation
costs. Wireless communication range from complex systems such as wireless local area network
(WLAN) and cell phones to simple wireless devices such as wireless headphones, microwave
and other devices that do not process or store information. These devices also include infrared
devices (IR) such as remote controls, cordless computer keyboard and mouse, and wireless Hi-fi
stereo headset, all of which require direct line of sight between transmitter and receiver to close
the link.

Wireless media includes:


Infrared, microwave and satellite.
Infrared
This is part of the electromagnetic radiation spectrum at wavelengths that fall between visible
light and radio waves at frequencies 300GHz up to 430THz.

In terms of Information Technology, infrared works in the same way as Wi-Fi but at a different
frequency. It is used in remote controls for televisions and other domestic devices. It is
occasionally used in computer systems, for example, when controlling robots. However, the
signal cannot travel very far and also needs clear space for the signal to travel.

6
Microwave
These are part of the electromagnetic radiation spectrum at frequencies 300MHz and 300GHz.
Like infrared, microwave communication works in the same way as Wi-Fi. The range of
microwave transmission is many kilometers but there has to be clear line of sight between the
two antennae as it cannot get round or through objects in its way.

Satellite

A satellite is basically a self-contained communication system with the ability to receive signals
from Earth and to retransmit those signals back with the use of a transponder—an integrated
receiver and transmitter of radio signals. Satellites are usually used for:
 Long-distance telephony (calling Jamaica from Barbados, etc.).
 Satellite television and radio.
 Distance learning.
 Video conferencing.
 GPS navigation systems.
 Google maps, Google Earth.
It has very long range: 160–2,000 km (100–1,240 miles).

CONNECTION DEVICES
Hub & Switches

A hub is a device that provides a central point for cables in a network (Figure 1.6). Larger
networks typically use a hub, while smaller networks use a switch. Some hubs and/or switches
include routers. That is, the hub or switch receives data from many directions and then forwards
it to one or more directions.

Figure 1.6 A network hub/ switch with ports for connecting multiple devices

Routers

A router is a communications device that connects multiple computers or other routers together
and transmits data to its correct destination on a network. A router can be used on any size of
network. On the largest scale, routers along the Internet backbone forward data packets to their
destination using the fastest available path. For smaller business and home networks, a router
allows multiple computers to share a single high-speed Internet connection such as through a
cable modem or DSL modem (Figure 1.7 (a)). These routers connect from 2 to 250 computers.
To prevent unauthorized users from accessing files and computers, many routers are protected by
a built-in firewall, called a hardware firewall. Some also have built-in antivirus protection.
Routers also support wireless communications, eliminating the need for a separate wireless
access point in a wireless network. If the network has a separate wireless access point, it
connects to the router via a cable. Some routers also include additional functionality such as

7
including a built-in print server. Today’s routers or combination wireless access point/routers are
easy to configure and secure against unauthorized access.
(a) (b)

Figure 1.7 (a) router showing access on a network to a high-speed Internet connection such as through a cable or DSL modem
(b) A rear view of a wireless router showing connection points

Modems

Modem is an abbreviation for modulator-demodulator, a device that converts signals from


analogue to digital and vice versa. A modem allows computers to exchange information through
telephone lines.

Modems are now much less common because they offer only slow internet connection and
connect only a single computer to the Internet. Modems are being replaced by more up-to-date
technologies.

Figure 1.8 front view of a modem

NETWORK INTERFACE CARDS (NIC)

Any device that wants to connect to a network needs a network interface card.

A network card, sometimes called a network interface card (NIC pronounced nick), is a
communications device that enables a computer or device that does not have built-in networking
capability to access a network. The network card coordinates the transmission and receipt of
data, instructions, and information to and from the computer or device containing the network
card. Network cards are available in a variety of styles (Figure 1.9). A network card for a desktop
computer is an adapter card that has a port to which a cable connects. A network card for
mobile computers and devices is in the form of a USB network adapter, ExpressCard module,
PC Card, or a memory card.

Network cards that provide wireless data transmission also are available. This type of card,
called a wireless network card, often has an antenna. Sometimes the antenna is detachable,
allowing the user to position it in a location with the best signal strength. Users also can install
an amplifier to increase and/or stabilize the signal strength. Some network cards include support
for both wired and wireless networks. A network card follows the guidelines of a particular
8
network communications standard, such as Ethernet or token ring. An Ethernet card is the most
common type of network card. Ethernet cards may support multiple speeds.
(a) (b)

Figure 1.9 (a) A network interface card fits inside the computer device, (b) A wireless network interface card

KEY WEB TECHNOLOGY CONCEPTS


World Wide Web

The World Wide Web (WWW), commonly referred to as the 'web'. Is a graphical, easy-to-use
system of inter-linked files on the internet.

Another way of thinking about the WWW is as a collection of billions of documents, accessed
through the Internet, using a web-browsing application.

Web Browser
A web browser is a program that allows users to view and explore information on the World
Wide Web. You need a web browser application program to view web pages on the WWW.

Figure 1.10 Examples of Web browsers

Hypertext Mark-up Language (HTML)


HTML is short for Hypertext Markup Language. HTML is used to create electronic
documents (called pages) that are displayed on the World Wide Web. Each page contains a series
of connections to other pages called hyperlinks. Every web page you see on the Internet is
written using one version of HTML code or another.

HTML code ensures the proper formatting of text and images for your Internet browser. Without
HTML, a browser would not know how to display text as elements or load images or other
elements. HTML also provides a basic structure of the page, upon which Cascading Style
Sheets are overlaid to change its appearance. One could think of HTML as the bones (structure)
of a web page, and CSS as its skin (appearance).

Hyperlink
Alternatively referred to as a link and web link, a hyperlink is an icon, graphic, or text that links
to another file or object when clicked with the mouse. The World Wide Web is comprised of
hyperlinks linking trillions of pages and files to one another. For example, "Computer Hope
home page" is a hyperlink to the main page of Computer Hope.

9
Hyperlinks are what allow web pages to connect to other web pages and without them you would
need to know the URL for every page on the Internet.

Uniform Resource Locator


Uniform Resource Locator (URL) is the direct address to a website/ internet file. This is typed
into the address field of your browser. A URL has four main parts and in the following format;
protocol://server/path/filename.

 Protocol: the name of the internet protocol (http) giving access to the internet.
 Server: the computer on which the document is located (host name, e.g. www).
 Path: (directory hierarchy) the top-level directory and any other lower-level sub-
directories separated by a back slash (‘/’) in which the required file is to be found.
 Filename: the actual name of the document.

Example: http://www.ascd.org/studyguides
http:// is the protocol
www is the name of the server and tells the browser that this is a web page
.ascd is the sub-domain name is the domain name and tells the web browser to contact the
.org is the top-level domain name ascd web server to obtain this resource.
studyguides is the document name

/ is used as a separator to indicate a change in directory in the server storage medium.


INTERACTING WITH WEBSITES
Users interact with web sites in a number of ways and it is useful to understand the main
concepts and terms for such interactions.

Web server
Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP
(Internet Protocol) address and possibly a domain name. For example, if you enter
the URL http://www.webopedia.com/index.html in your browser, this sends a request to the Web
server whose domain name is webopedia.com. The server then fetches the page
named index.html and sends it to your browser.

Hypertext Transfer Protocol (HTTP)


HTTP means HyperText  Transfer Protocol. HTTP is the underlying protocol used by the World
Wide Web and this protocol defines how messages are formatted and transmitted, and what
actions Web servers and browsers should take in response to various commands.

For example, when you enter a URL in your browser, this actually sends an HTTP command to
the Web server directing it to fetch and transmit the requested Web page. 

File Transfer Protocol (FTP)


FTP stands for File Transfer Protocol. It is used to transfer computer files.

You’ve probably used FTP before, even if you didn’t realize it. If you have downloaded
something from the Internet, such as a new version of an application, it is very possible that you
used FTP to do so.

FTP is also frequently used as a way to transfer web pages. FTP allows new web pages created
by an individual to show up on the Internet. FTP essentially transfers these web page files to the
10
computer server so others can access them. FTP can also be used to download files or programs
from the Internet to your computer. When you download these files, you are transferring them
from other servers through FTP.

FTP can allow you to transfer files over any two computers, as long as they both have an Internet
connection. You can share folders that contain data like music, Word documents and more.

Upload
Uploading is the transmission of a file from one computer system to another. To upload a file is
to send it to another computer that is set up to receive it. However, in practice, many people use
"upload" to mean "send"

Download
Download is a term used to describe the process of copying data from one computer to another,
either over a network or modem. A good example of this is downloading a video from YouTube
so that you can save it to your hard drive or opening a web page, receiving email, purchasing
music files or watching online videos. However, in practice, many people use "download" to
mean receive.'

Email
Electronic mail is a method of exchanging messages (text, voice, graphic and video) between
individual or groups locally and worldwide using electronic devices using special software. A
great feature of email is the sending attachments, this allows for the sending and receiving of
documents created with various applications such as Microsoft Word. A single email can be sent
to more than one recipient and more than one attachment can be sent with one email. Email is
faster than traditional mail, also when the mail is sent the recipient does not have to be online.
Emails are kept in an electronic mailbox. Some examples of email software are Gmail, yahoo
mail and Microsoft outlook. An email address is always in the form username@domain_name,
for example prettygirl@yahoo.com.

Advantages of email
1. Faster than ordinary mail; ordinary mail may take several days depending on the format it
is sent in, while email is sent immediately and replies given as soon as the mail is
checked by the recipient.
2. Emails follow no specific formal structure
3. It eliminates the need for stamp, paper, envelops or to go to the post office.

Disadvantages of email
1. Not everyone have access to a computer/ computer devices or the software required for
email facility.
2. Emails does not offer the same privacy as letters
3. Replies are dependent on the recipient accessing the mail

Folders found in a mailbox window


 Inbox: shows about emails you have received.
 Outbox: shows emails that were not sent.
 Sent: shows emails that have been sent.
 Delete: shows emails that have been removed from your inbox.
 Draft: shows emails that have not completed, that you are still composing.

Notes taken from Information Technology for CSEC Examinations 3rd Edition and Discovering
Computers 2011 among other sources.

11

You might also like