Chapter - 3 Ict
Chapter - 3 Ict
Page 1
3.1.1 Benefit of Network Computing
Networks increase efficiency and reduce costs. Computer networks achieve these goals in
the following primary ways:
1. Sharing Information (Or Data)-- like, Company Data Base
2. Sharing Hardware(Peripheral Devices) Printers, Faxes, FDD,HDD,CD-
ROM-DRIVE etc
3. Sharing Internet Connection
4. Sharing Programs/Software
Expensive Professional Software
5. Centralizing Administration And Support
i. Centralized Software Update: like Antivirus
ii. Centralized Storage and Backup
iii. Centralized Processing and management of data, such as Airline
reservation.
Sharing Programs/Software
Application (software) sharing occurs when several users at different locations run
application programs that are installed centrally in one location (application server).
Software (applications) that are installed centrally can be managed and upgraded
centrally. Such systems are mostly common in financial system where the main
Page 2
application is stored centrally and users in different sections of the finance
department are able to run the system from the network.
Central Disk storage – Network system provide the possibility of using a dedicated file
server to store all the company data in one location. Users will be able to access their
data over the network from their workstations. Using central disk storage system
facilitates data backup operations from a central location guarantying complete data
recovery in case of system failures.
Sharing Information/data
Sharing data – users in a certain network environment have the liberty of
sharing data and information across the network. Data sharing enables
different users to work on a certain file concurrently. Few examples of data
sharing are:
o Database: - databases are often managed centrally and several users
can have access to the database at same time. For example, in a
networked banking system, different bank branches can have access to
the central account database. This enables bank clients to carry their
transactions on any branch bank office.
o Email: email communication can be achieved over the network enabling
networked users in the company to communicate messages across the
network using email.
Page 3
Centralizing Administration And Support
The login (gain access to) Process:
Even if your computer is physically connected to a network, you cannot
typically use network resources until you log into the network. When you log
in , you formally identify yourself to the network by providing your ID and
password.
Your user ID and password are the basis for your user account. A user account
provides access to network resources and accumulates information about your
network use by tracking when you log in and log out.
A network administrator/supervisor is the person who is responsible for setting
up user accounts and maintain a network. The network administrator
provides each new user with a user ID and starter password. In this way
centralized administration and support can be achieved.
Note: Network administration tasks include:
Managing users and security.
Making resources available.
Maintaining applications and data.
Installing and upgrading application and operating system software.
Terminologies
Page 4
• Example: Shared data,Shared printers and other peripherals, & shared
applications
• Node: each device in the network
Network can be grouped in two major categories depending on the geographical scope
they cover.
Types of LAN
Page 5
The three broad classification of LAN, based on how the computers in a network
are configured and how they access information, or simply based on the roles of the
computer found in the networkare:-
1. Peer-to-peer LAN/peer-based LAN/workgroups LAN
2. Client-server LAN/ server-based LAN
3. Hybrid LAN
• Note: Computers are categorized into three based on their role in LAN. These
are client, server and peer.
• Peers are computers which use and provide network resources.
• Clients are computers that uses but do not provide network resources
• Servers are powerful computers that provide network resources
[Link]-TO-PEER LAN
In such network configuration, all the connected systems (computers and
printers) can communicate directly with each other without relying on other
intermediary server. Implementation of Peer-to-Peer network is relatively
simple, cheap and can connect up to 10 computers. Although appropriate for
small networks, it lacks the ability to implement centralized management of
users, files, and security features and tends to slow down performance as the
number of connected computers increase.
Although a peer-to-peer network might meet the needs of small organizations,
it is not appropriate for all environments. In a typical peer-to-peer network, no
network manager oversees administration for the entire network. Instead,
individual users administer their own computers.
All users can share any of their resources in any manner they choose. These
resources include data in shared folder, printers, fax cards, and so on.
On a computer network, security (making computers and data stored on them
safe from harm or unauthorized access) consists of setting a password on a
resource, such as a folder, that is shared on the network. All peer-to-peer
network users set their own security, and shared resources can exist on any
computer rather than on a centralized server only; consequently, centralized
control is very difficult to maintain. This lack of control has a big impact on
network security because some users may not implement any security
measures at all. If security is an issue, a server-based network might be a
better choice.
Page 6
Advantages and disadvantages of Peer-to-peer
/workgroupsLAN
Advantage:
Users can control resource sharing
No reliance on other computers for their operation
Computers in the network are connected by a simple, easily visible cabling
system.
Low initial cost-(no need of server and network operating system (NOS)
software )
Easy to setup-(use client/desktop operating system like windows 95,
98,me….)
Disadvantage
It lacks the ability centralized management of users & files
Lacks security features
Hard to locate network resources
Tends to slow down performance as the number of connected computers
increase.
Additional load on computers because of resource sharing
Page 7
Print server – servers that control one or more printers and provide
print service to LAN users.
Database server – servers that centrally store database and provide
data to client application in the LAN.
Web server – servers that store web pages that will be viewed using
browsers in the network.
Email server – servers that are used to manage and control email
communications across the network.
Note:
A dedicated server is one that functions only as a server and is not used as a
client or workstation. Servers are described as "dedicated" because they are not
themselves clients, and because they are optimized to service requests from
network clients quickly and to ensure the security of files and folder. Server-
based networks have become the standard models for networking.
Advantages and disadvantages of Client-Server Network
Advantage
Strong central Security
Has central file storage, which allows all users to work from the same set
of data and provides easy backup of critical data
Ability of servers to pool available hardware and software, lowering
overall costs
Ability to share expensive equipment, such as laser printers and mass
storage
Easy manageability of a large number of users (can support thousand of
users
Freeing of users from the task of managing the sharing of resources
Optimized dedicated servers, which are faster than peers at sharing
network resources
Page 8
Disadvantage
• Expense – Requires high initialinvestment in dedicated server and expensive
Network operating system software and client license
• Maintenance - Large networks will require a staff (a dedicated network
administrator) to ensure efficient operation.
• Dependence - When server goes down, operations will cease across the network.
• Complex to install, configure and manage
Can you think about the advantage and disadvantage of this type of LAN?
Note:
The security advantage of peer-to-peer LAN is that each user controls access to their
own resources. The security disadvantage of peer-to-peer LAN is that you can not
differentiate among LAN users when you allow access to a resource. The security
advantage of server-base LAN is that each user is allowed accessto only those
resources that the user has the privilege to access. A disadvantage is that someone
must centrally administer the security on your LAN.
Note:
The type of LAN you choose to implement will depend on factors such as the:
Size of the organization.
Level of security required.
Type of business.
Level of administrative support available.
Amount of network traffic.
Needs of the network users.
Network budget.
By the turn of the century, information, including access to the Internet, will be the
basis for personal, economic, and political advancement. The popular name for the
Internet is the information superhighway. Whether you want to find the latest
financial news, browse through library catalogs, exchange information with
colleagues, or join in a lively political debate, the Internet is the tool that will take you
beyond telephones, faxes, and isolated computers to a growing networked information
frontier. The Internet supplements the traditional tools you use to gather information,
Data Graphics, News and correspond with other people. Used skillfully, the Internet
Page 9
shrinks the world and brings information, expertise, and knowledge on nearly every
subject imaginable straight to your computer.
The Internet has brought new opportunities to government, business, and education.
Governments use the Internet for internal communication, distribution of information,
and automated tax processing. In addition to offering goods and services online to
customers, businesses use the Internet to interact with other businesses. Educational
institutions use the Internet for research and to deliver courses and course material to
students. It has made it possible for people all over the world to communicate with one
another effectively and inexpensively.
Internet service providers (ISPs) provide Internet access to customers, usually for a
monthly fee. A customer who subscribes to an ISP’s service uses the ISP’s network to
access the Internet. Because ISPs offer their services to the general public, the
networks they operate are known as public access networks. In Ethiopia, there is only
one ISP – The Ethio telecom that also owns most of the public networks.
Page 10
3.2.1 Technical Requirement of the Internet
The basic building blocks to the Internet are
1) Clients
2) Hosts/internet servers
3) IP Routers and
4) Connections/internet access
• Dialup connection
• Direct/leased line connection
Note: internet is based on the concept of client/server computing
The Clients
The client refers to a computer or any device that connects to the Internet temporarily
to get one of the services. Usually, a user runs a client application, such as a Web
browser, that contacts one server at a time to obtain information. Because it only
needs to access one server at a time, client software can run on almost any computer,
including smallhandheld devices such as personal organizers and cellular telephones
(these devices are sometimes called Web appliances). Client get temporary IP
addresses when connected. For instance when you try to establish a dial-up connection
your computer – the clients is assigned a temporary IP address from a pool
maintained by your ISP. When it is disconnected, IP address goes back into the pool
and it is available for use by other dialup users.
Page 11
Host/internet servers
Host / Internet sever refers to computers with a permanent link to the Internet and
always connected and on-line. To supply information to others, an internet server
computer must run a server application. Although server software can run on any
computer, most companies choose large, powerful computers to run server software
because the company expects many clients to be in contact with its server at any given
time. A faster computer enables the server program to return information with less
delay.
The internet hosts can be found with ISP, commercial business, Universities,
Governmental agencies, International organizations, Military organizations,
Professional and non-profit organizations more that avail their services on the
Internet.
IP Router
IP Router is a special device, which basically sit at key points on the Internet and act
like traffic police at an intersection of hundreds of streets. Data is sent from your
computer in the form of a "packet". You can think of a packet to be similar to an
envelope; it surrounds your data and contains both a return and destination address.
Your computer handles the packets for you; it's all done in the background, without
your knowledge. This technique is called packet switching. The Router basically
reads the destination address on the packets being sent by your computer and then
forwards the packet to the appropriate destination. The IP router finds the best path
to your packets, based on current traffic and quality of transmission paths. In some
cases your data will travel through several routers before reaching its ultimate
destination as illustrated in the figure below.
Software on the sending computer divides a large document into many packets for
transmission; software on the receiving computer regroups incoming packets into the
original document. A series of rules known as computer communication protocols
specify how packet are assembled in the sending computers and re-assembled to
Page 12
original messages in the receiving computers. The TCP/IP protocol handles such
packet management on the Internet.
Connections/internet access
The access to these networks is provided by Internet Service Providers (ISPs) that let
you subscribe for either of the two modes of connections: dial-up and high-
speed/dedicated connections
The modem is a device that converts digital signal produced by the computer to
analogue signal transmitted through telephone networks. This is because computers
represent data in digital form and the telephone system transmits data using
continuous, or analog, wave forms, their combination must include equipment that
converts signals from one to another. The unit that does this is the modem, short for
modulator-demodulator. Modulation converts digital signal into analog wave
pattern. Demodulation reverses the process.
For example In the figure below a sending modem MOdulates digital signals into
analog signals, and a receiving modem DEModulatesanalog signals back into digital
signals
Page 13
The process of converting digital signal to analogue signal and v.v.
Dialup connection is the cheaper and least convenient connection. It is also called a
narrowband connection where the maximum speed that can be attained over a
dialup connection is 56.6kbps (kilo bits per-second). As a result dialup connection
cannot be used for advanced applications on the Internet that involve transmission of
audio and video data.
This connection is more quality connection that can provide a speed as a multiple of
64kbps. The ISP charges such a connection a fixed fee per month based on the speed
you want to buy. Using this connection advanced applications that involve audio and
video data can be used.
3.2.2Importance of internet
Because of this many host computers also have an easy to remember name like coca-
[Link], [Link], etc. Such a name is called Domain Name. Domain name is a
natural language translation of IP address. It is maintained by Domain Name Servers
(DNS) that translates the domain name to IP address. Hence DNS is one important
service for the proper functioning of the Internet. By convention you should type
Page 14
domain names using all lower case letters. A domain name ends with a three letter
extension that indicates its top level domain. For example, in the domain name
[Link], the .com indicates that the computer is maintained by a commercial
business.
Table that shows common First-Level Domain Name extenstions and their description
First-level domain Organization Type/description
.com Commercial Business
.edu Educational institutes
.org Organization/Association
.net Internet administrative organizations
.gov Government
.mil Military organizations
.int Organizations established by
international
After the three letter extension, some treaties
domain names (residing outside of the United
States) also end with two letter country code such as uk, fr, et, za, etc. This country
codes also serve as a top level
Example: [Link], [Link], [Link]
The domain name is widely used in Internet addresses that indicate Internet sites
round the world that provide different Internet services. A computer with domain
name is referred to as a Site.
Activity
If you are using a computer that has access to the Internet, you can find out the
IP addresses of any host using a simple step
1. Click on Start button and select Run
2. Type in cmd on the Run box
3. Click Ok button on the Run box
4. Type ping domainName,
Then the first thing you will see is a line of text that starts with
"Pinging domainName [IP address] ...."
Find out the IP addresses of commonly used hosts such as [Link],
[Link], and [Link]
Page 15
organizations, educational institutions, science research centers, private businesses etc.
Currently the web pages present information in a graphical user interface that includes text,
graphics, animations, and most importantly hyperlinks. Hyperlink is a special type of
formatting used in web pages to link one page to the other. Once you start to view a web
page from the web, the hyperlinks will take you to other pages / documents as you select
(press button on) them using your mouse. It is the hyperlink that makes up the web – a
complex link among the different nodes, in this case the web pages.
WWW began in the late 1980's when physicist Dr. Timothy Berners-Lee wrote a small
computer program for his own personal use. This program allowed pages, within his
computer, to be linked together using keywords. It soon became possible to link
documents in different computers, as long as they were connected to the Internet. The
document formatting language used to link documents is called Hypertext Markup
Language (HTML).
The www, just like most of other internet services is based on the client
server model. The web pages are stored in host computers called web
servers round the world. These hosts are referred by a web site address
that serves to locate the host computer. Web site address has a format
that specifies the service and the host computer providing the service.
The generic format for a web site address is:
www.domain_name.[Link]
Where the first three letters (www) indicate the service followed after a
period is domain name (with extension and country code) to identify the
host computer. A web site is a collection of related web pages.
Examples: www. [Link], [Link], [Link],
On the other hand, there has to be client computers that run one of the
web browser software such as Netscape Navigator,Internet Explorer, Fire
Fox, Opera etc. A browser is a computer program that resides on your computer
enabling you to use the computer to view WWW documents and access the Internet taking
advantage of text formatting, hypertext links, images, sounds, motion, and other features.
The browser requests web pages form the web servers. The web server responds by
transmitting the web page to the requesting client computer where the web browser views
the content of the web page. This exchange of hypertext documents is done by the use of a
standard protocol called HyperText Transfer Protocol (HTTP). Today’s browsers made it
easier to access the different web sites that had started to appear, containing more than just
text. They also had sound and video files. They are also versatile in that the browsers also
give you additional services such as e-mail, ftp etc.
As it was discussed above a web site is composed of a series of web
pages that contain information. Each page is stored as a separate file
and referred to by a unique Uniform Resource Locator (URL). A URL is the
address of a document on a computer. The components of URL include the
web protocol, the web server name, the folder in which the page is
stored, and the filename of the page as illustrated in the figure below.
Page 16
An example of URL of a document on the world wide web
Web page URLs begin with http:// the protocol, communication system that allows web
clients to communicate with web servers. Many of today’s web browsers assume that all
web address begin with [Link] If you are using such a browser, you can omit http:// when
you type a URL.
The next part of URL is the web server name. A web server is a computer that uses
special software to transmit web pages over the internet. Many web server names are
domain name prefixed with www as in the case of web site address. The web server names
for your favorite university might be something like [Link]. Suppose you
indicate to your web browser that you want to access [Link] by entering the web
server name, you access the site’s home page. A home page is similar to the title page in a
book. It is the introductory page of a website that normally has a master menu of
documents on that site. It identifies the site and contains links to other pages at the site.
The URL of a web page reflects the name of any folder in which it is stored. For example,
suppose that the university has a page listing degree programs. The listing is stored in a file
called [Link] in a folder called information. The URL for this page would be:
[Link]/information/[Link].
File name extension for web pages are typically htm or html. This is because as mentioned
earlier, web pages are written using a document formatting language called HTML.
Page 17
Home page of The AAU's Official Web site
Activity
Go to any Internet cafe or where you can get an Internet access. Open the
browser and type in the url "[Link] You must get the page
shown in the figure above. Surf through it selecting the links listed at the left
corner of the page and top of the page. Learn as much as you can about the
University just be visiting the website.
Page 18
AltaVista ([Link]
Google ([Link]
Lycos([Link]
Yahoo[[Link]
Excite[[Link]
Search directories
Creates directories of web sites and their address. Directories are collection of resources.
People or organization submit sites of interest to search service provider like:
Yahoo [[Link]
Linkstar [[Link]
LookSmart [[Link]
Librarian's Index to the Internet [[Link]
During submission process, the people or organizations should supply the following
information about their web sites such as URL, Title, Short summery. The search service
provider will classify these directories according to the rules of a particular search service.
A web directory lists resources, organized by subject area. To Search the directory,
you just click / select the subject you want under the categorized list
of topics rather than entering keyword. Or you can also enter one or more
keywords and see a list of categories and sites displayed with those
keywords in the title.
However, the distinction between search engines and directories is not as clear cut as it
used to be. All the major search directories will feed you results from a search engine if
they cannot find what you are looking for in their own directory. On the other hand, some
of the search engines will serve information from search directories before giving you data
from the search engine's database. Search engines should be your first choice when you
know exactly what you are looking for. They also cover a much larger part of the Web than
the search directories.
Activity
[Link] is both a search engine and a web directory. Visit [Link] and see
information about Ethiopian tourist attractions from search engines and web
directories listed above. Search for "Ethiopian tourism" in [Link], then
Page 19
search for Ethiopia - tourism" in [Link]. Compare the resulted list sites for
the two search and write what it means by adding minus sign in keywords.
2. Communication services
a. Electronic mail
Electronic mail is a method for sending and receiving textual messages from one user to another
through the internet. It is the electronic equivalent of sending a letter through the mail, but a more
efficient means of communication than ground or air mail. Although email is mostly used to
transfer text based messages, users can attach other files (such as graphics, audio, video…) with
their emails.
Email is also provided through the client server model. Email users have electronic
mailboxes on e-mail servers that provide the email service. Each mailbox is identified
by an email account composed of a username and password. An email address has two
major components, the username and the domain name separated by the special
character @ (username@domain-name). The username is the name assigned to the
person or organization using the email, and the domain name is a unique name that
identifies the name of the network system connected on the internet, usually called
email server. For example, the domains name for an email address provided by
Ethiopian Internet Center is [Link]. If you subscribe for an email using your
name (such as Abebe) your email address will be abebe@[Link]
On client side email users use email client application programs to connect to the
email server to enable them to compose, send and receive electronic messages. There
are several client applications supplied by different software developers, such as
Eudora, Pegasus, Ms-Outlook, Lotus CC:Mail etc. Most of these programs also have
different features more than sending and receiving mails such as saving the address
for future reference in an address book, reply to the original message, forward the
message to a third party, check spelling, and few more features of word processors.
Email Attachments
An attachment is a computer file or files place inside an email message. Email was
originally designed to handle only plain text (no formatting, ie. bold, centering, etc.) which
was transferred from one computer to another in a format called ASCII. ASCII is a
standard across all computer types which makes e-mail universal. Today many modern
email programs allow HTML (hypertext markup language) to be included in email
Page 20
messages which allow you to format your email messages with font sizes, bold, centre and
such. The recipient must have an HTML capable email reader to see the formatting
otherwise they will get a document marked up with HTML tags that looks garbage data
unreadable to users as seen below in the figure .
To attach a document to an email message drag the file attachment to the body of the
message and drop it. An attachment can also be added by choosing File Attachment from
the menu. Most modern email programs place a button on the Toolbar usually in the shape
of a paper clip that you can click. A dialog box will open that allows you to browse and
select the file that you want to attach. You can attach more than one file to a single email
message.
Activity
Register for a free e-mail address from two sites. You can try from
[Link], [Link], and [Link] data for your self from one
mail to another. Attach files, to your message by dragging and dropping it to the
message and using the attach buttons.
b. Usenet (newsgroup)
Newsgroups are discussion groups that are going on all the time. You can write a message
and post it to a newsgroup in the morning and come back to read a reply to the message in
the afternoon. You can also reply to other's messages. The popular sites such as yahoo and
google enable you to start a group and have a community of your interest
Page 21
A typical interface of a Usenet where you can start your own discussion group
There are thousands of news groups covering as many topics. Some are moderated,
meaning that a person who has knowledge or an interest in a certain topic will receive the
message and read it before posting it. This keeps the discussion on topic. Most are not
moderated and the discussion can go anywhere but it can be a great way to get a quick
reply to your questions.
As well as the public newsgroups many organizations and companies will provide
discussion groups of bulletin boards that focus on areas related to their own topics. This can
be a great spot to find out more about an organization, find a solution to a problem you are
having and participate in the discussions related to that company or organization.
One problem with posting a message to a discussion or newsgroup is that unscrupulous
companies mine the newsgroups for email addresses and then send unsolicited email
(spam) to the poster. It is recommended that you disguise your email address using your
email software preferences or the bulletin board settings.
Many newsgroups have a publicly accessible faq. A faq is a collection of frequently asked
questions that have been posted many times to a newsgroup. You may get a gentle
reminder or a completely rude and insulting comment if you post a question that is on the
faq. It is acceptable to post a question as where the faq is located and you may find that
frequent posters will mention the faq in their message.
Example of Usenet site: [Link]
Page 22
Activity
Search for a USNET / discussion group site and read peoples, comments on
technology issues. To start with this, you can just type in a problem such as
virus problems, or technology problems you have faced on the search engines.
The result usually takes you to discussions group pages where similar questions
are [Link] your own questions and collect answers for your questions. This
may require you to get registered first.
[Link]
[Link]
[Link]
[Link] (web broadcasting services)
IM is a software, such as YahooMessanger and MSN allows users to find friends and
contacts through the Internet and communicate with them in real time. Users
maintain a list of contacts which the software will notify when they are online and
contact is available. To use an instant messaging service it is necessary to have and
register software available on the Internet. Instant messaging allows you to chat, send
messages and files and various other features but only with people you choose. Often
the software and registration is free.
Some services also provide the ability to connect a microphone to your computer and
talk to your contact. Your contact can talk back using their account and software
which you can hear using the computer's speakers or an ear attachment. These days
people are using the same IM software to have a live conversation using voice chat and
video chat.
Page 23
Activity
Use the MSN messenger program to chat with your colleague / classmate. You
must have a hotmail e-mail account to do [Link] a web based
messenger service for free at [Link] If you have
yahoo email address, you can sign in and chat with it. Try [Link] to add your
yahoo email address to your contacts in MSN messenger and v.v
e. Video Conferencing
Video conferencing means making a conference on the Internet by individuals who live
in different location. This takes place at the same time in different location. It is
similar to conference in a hall except they are at distant.
For participation in video conferencing (receive and send), each user needs
Video conferencing involves the visual communication of parties around the world.
You can use Video conferencing to link up with specific parties or you can join Video
conferencing communities that operate in the same way as Internet Chat does.
f. Internet telephone
The Internet can also be used to transfer telephone calls using an application known
as IP-telephony. This application requires a special phone that digitizes voice and
sends it over the Internet to a second IP telephone.
You need special client software called audio conferencing programs. Newer software
operates in full duplex conversation (i.e you can speak and hear the other person at
the same time). In half duplex conversation only one person can speak at a time.
Information retrieval service refers to the process of transferring large volume of data
across the internet. Examples of information retrieval application on the internet
include FTP and Telnet.
Page 24
a. File Transfer Protocol
FTP is method for transferring files from one internet site to another internet sites.
FTP enables user to download or retrieve files from ftp sites and to upload files to ftp
server. Like many internet applications, FTP is a client server system where there is
FTP server that provides the service and users use FTP client programs to access
resources from the FTP server.
FTP service is a popular internet service which is widely used to download exciting
games, large documents, program upgrades and other resources from the internet.
Although some FTP sites have restricted access where only authenticated users are
given access to the FTP server, there are still several anonymous FTP sites that allow
anyone to transfer files without prior permission.
Activity
Find FTP sites on the Internet. You can use the search engines.
Try to download files form the ftp service if you get a free one.
Telnet is an internet application and protocol that allows users to log onto a remote
computer. Once connected to a remote computer using telnet application, users can
access their files and document, work on their files and save their work on the remote
computer as if they are directly connected to the server on the local area network.
Telnet gives the appearance that the user’s keyboard and monitor are connected
directly to the remote computer. For example, a businessperson who is visiting a
location/ working at home that has Internet access can use Telnet to contact their
office computer.
Page 25