Professional Documents
Culture Documents
4.1 Network
4.1 Network
By mujjuzi Yasin
INTRODUCTION
• The router that you have at home receives data packets from the
internet and forwards them to devices in your home, usually
via wi-fi.
• The switch then sends the data packets to the correct device on
the network.
Take a look at this video, which shows you how routing works:
• Activity
• Routing in action
Activity 1. If you have a laptop or smartphone, try to find out its MAC
address.
2. I f you have a Windows computer, open the command prompt
window (type cmd in the search bar).
If you have a Mac then go to Launchpad > Other and open the
1. Switches maintain MAC address tables that store the Terminal window.
MAC address of each device connected to each port.
What does ‘MAC’ stand for?.................................... 3. Now you can locate the google.com site by typing in:
Wi-f • You can use wireless to share files, to tether your smartphone to your computer for internet access
anywhere, to stream films and music, and to transfer photos from your digital camera or smartphone.
Bluetooth operates within a frequency range of 2.4 GHz Relatively low power consumption. Some electronic and electrical equipment
to 2.485 GHz. can interfere with Bluetooth.
It is relatively slow, with transfer speeds of less than 2 Better range than Security can be a problem as Bluetooth
can easily be hacked.
Mbps (megabits per second). Signals transmitted via infrared
Bluetooth can cover distances of up to 10 metres. communication.
Both wi-fi and Bluetooth
Similarities and differences between wi-fi and • Activity
Bluetooth.
• Using wi-fi and Bluetooth
Wi-fi Bluetooth
Transmission 2.4 GHz, 5 GHz, 6 2.4 GHz to 2.485 • If you have a smartphone or laptop, try to determine
whether they have wi-fi and/or Bluetooth capability.
Frequency GHz GHz
• Copy these table headings and list the tasks or activities
you would use wi-fi for and those you would use Bluetooth
Range 30 metres 10 metres for:
• The term cloud computing spans a range of classifications, • IAAS (Infrastructure as a Service)
types and architecture models, and deployment models can be A provider delivers virtual computing resources to
classified into three basic types: organisations via the internet.
Cisco Metacloud
• Cloud computing for data storage
A major use of cloud computing is for online data
DigitalOcean storage on hosted servers.
Data is stored in the cloud securely and is accessible to
Google Compute Engine (GCE)
the user online from anywhere at any time.
Linode
Google Cloud
IBM Cloud
Microsoft Azure
Oracle Cloud
SaaS Adobe Creative Cloud
Atlassian
Freshworks
Google Workspace
Microsoft 365
Advantages and disadvantages of cloud storage.
Intranet Internet
An intranet is a localised The internet is a worldwide
network network
All devices on a LAN are connected so Initial setting up of a LAN can be expensive
resources, such as printers, software and as switches, cabling, routers, servers etc.
• A LAN is a network that is normally confined to a documents can be shared. need to be installed.
single building or site.
• A LAN is usually an intranet within an organization Shared data on the LAN can be centralised If the LAN server has a problem, then that
used only by people within that organization.
and easily accessed. may affect every device on the LAN.
• A LAN is usually made up of a number of desktop
computers and other devices, such as printers, LAN users can easily communicate with A LAN may be vulnerable to security threats,
connected via network cables to a switch. each other. particularly if connected to the internet.
• WLANs are the same as LANs but use wireless RF signals instead of physical Installation of a LAN is more Installation of a WLAN is simpler
cables. complex and time consuming. to undertake.
Advantages Disadvantages
A WAN can cover a large geographical area so The costs of planning , implementing and maintaining a
organisations can connect over long distances. WAN can be high.
Allows connected devices to share resources, software, Ongoing monitoring and maintenance requires skilled
apps etc. network supervisors and technicians.
Messages can be sent and received very quickly WANs are more susceptible and vulnerable to hacking.
enhancing effective communication.
Data can be shared with one copy stored in one location, Additional investment is required to implement firewalls
which eliminates data redundancy and Intrusion Prevention Systems (IPS)
. .
Activity
1. What type of network is made up of a number of desktop
computers and other devices, such as printers, connected
via network cables to switches……………..
2. Which of the following is a disadvantage of using a WLAN?
• WLANs are more likely to suffer from external
interference.
• Devices are fully mobile without the restriction of
connected cables.
• Removing the need for cables improves safety and
flexibility.
• You can usually connect to a WLAN wherever you go.
3. user interface, distances, devices, geographical,
AS…………………….. in a WAN often cover
large ……………………………… areas, the connections between
them can often be over long …………………………… .