Ict Module 3 2024 25
Ict Module 3 2024 25
Ict Module 3 2024 25
INFORMATION COMMUNICATION
TECHNOLOGY
(PRE-FINAL)
TABLE OF CONTENTS
Course Description.....................1
Course Guide .............................2
Module Mapping.........................7
Module Timetable.......................8
Pre-test ……...……………...…. 11
Introduction ……………...….... 11
Pre-Test ……………………… 17
Discussion Lesson 2 ………… 18
Reference…………….………… 77
There are no shortcuts to success here. The institution prepares you to face the
demands of the modern age of learning in this new standard without
compromising quality education and training in the maritime sectors. The only
secret to fulfilling this module‘s requirements is commitment to the institution's
mission, dream, and aim with perseverance, integrity, and dedication.
7. Study the lessons ahead of time. Utilize all the energy and
imagination effectively. Learn how to use all the learning kits and references
before doing the elements needed on your modules. Make sure no missing links
are found.
8. In all honesty, always answer the pre-test to help gauge the level of
knowledge and awareness of the topics. It is just a diagnostic test of yours.
f.Do not post lengthy posts (don't accept turning around the bush). Just stick to
the point. Keep your main point clear and express it in the shortest possible
terms. Don't let the conversation drift.
g. Secure your confidentiality. Ponder before you post so as to
prevent misinterpretation and offend other parties to your ideas. If you want to
share something private, please do so by e-mail or private messenger.
10. Do not plagiarize, and do not write patches. Patch writing is still a
plagiary type. To assess the percentage of resemblance and remove copyright
infringement, use the plagiarism checker. The act of making small modifications
and substitutions to copied source material is referred to (Merriam-Webster,
2020).To be more secure use a plagiarism check.
11. Do your best to remind your facilitator, by all means, of any inevitable
delays or "absences" or "silences" over the course of a week or other questions at
the specified time. No time as peekaboo as this moment. Be transparent
regarding your situation.
12. Notice that the platform is an area of simulated learning, not a social
networking site or a social media gossip portal. Use a recent and correct photo ID
on your profile page and fill in the details needed for proper identification.
13. Materials and other resources shall be made available to you and it is
strongly recommended that you be resourceful and imaginative.
15. Follow guidelines and assumptions at all times are strictly prohibited.
Ask your facilitators about their convenient class hours or appointed time for
consultation.
16. Finally, you‘re the learner; therefore, you‘re doing the module
yourself. Your family members and friends at home will help you but the requisite
tasks MUST be performed and undertaken entirely by you as your performance
must be orally checked and validated. The institution's core principles must be
adhered to.
In order to meet the appropriate passing grades of this module, you must:
RESULT:
The reflective questions are designed to help you critically analyze the courses for
better understanding while the pre- and post-tests, including the tasks and
exercises, are a tool for review management to prepare you for the general
evaluation at the end of the module.
GRADING SYSTEM:
You have to meet the passing grades by referring it to the institutional grading
systemand procedures.
When you earn a score below 60 percent, you are deemed "NOT YET
COMPETENT" and you are subject to a RESIT schedule. Your required
maximum number of RESITS will be granted in accordance with the Quality
Standard System (QSS) to improve your lowest percentage of assessment and
the most important thing is for you to retake a specific element that you have
achieved least in order to meet the overall passing grade.
Module Module 3
Title
Module This course introduces the fundamentals of maritime ICT technologies
Descriptio and systems. It includes topics on the introduction to computer
n systems, computer hardware and storage devices, basic computer
hardware and software servicing with troubleshooting, Software
Productivity Tools, Data Communication and Computer Networks,
Cyber Security and Emerging Technologies — Fourth Industrial
Revolution. The students of this course are going to be immersed in
interactive discussions as well as various activities and
demonstrations. By the end of the course, the students are expected
to be able to effectively use computer devices in shipboard application
and contribute to managing cyber security. Written and practical
assessments are conducted to ensure the attainment of the required
outcomes.
Course CO1. Apply appropriate computer software for data processing and
Outcomes networking onboard ship,
Addresse CO2. Troubleshoot basic computer malfunctions as per manufacturer's
d instructions
At the end of the module, you should be able to:
LO1.20 Create a spreadsheet utilising the different functions
Module and tools of the spreadsheet application including: files names
Learning and types; page lay-out; formatting and styles; formulas; charts;
Outcomes and data
- Presentation program (MS PowerPoint or equivalent)
LO1.21 Create a slide show utilising the different functions and
tools of the presentation program including: files names and
types; formatting and styles; texts, graphics, animations and
transitions; and design layout and templates
Lesson 5: Data Communication and Computer Networks
- Types of computer networks based on geographical span
LO2.1 Compare and contrast different computer networks with regards
to their characteristics and purpose including: PAN; LAN; WLAN;
WAN; Internet; and Intranet
- Computer network devices – network linking devices and
communication media
LO2.2 Identify the common computer network devices and their
functions
- Types of network topologies, Communication technologies and
Protocol and OSI model
LO2.3 Describe the different network protocols and topologies with
regards to their use, advantages and disadvantages
LO2.4 Describe the transfer of data such as text, images and videos
over a network using different communication technologies
- Shipboard computer network and internet access
Time Frame
Element No.
Course Code: ICT
Week No.
STUDY SCHEDULE
REFERENCES:
https://www.geeksforgeeks.org/data-communication-definition-components-types-channels/
https://www.guru99.com/types-of-computer-network.html
https://www.tutorialspoint.com/data_communication_computer_network/computer_network_
types.htm
https://www.techjockey.com/blog/what-are-computer-network-devices
18 Types of Communication Technologies | TL Dev Tech
https://www.guru99.com/layers-of-osi-model.html
https://www.hattelandtechnology.com/blog/introduction-to-computer-networks-on-ships
https://shipinsight.com/articles/ship-satellite-communications-overview-and-history
https://www.tutorialspoint.com/Network-Standardization
https://erainnovator.com/network-protocols-and-standards/
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html#~types
https://www.dnsstuff.com/network-troubleshooting-steps
PRE-TEST
Name:______________ Date: _______________________
Year & Section: Sc: _____________
ELEMENT (A)
Clip Art
Graphs
Tables
Photographs
Charts
Media Clips
Videos
Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can
customise and optimise a presentation. The same have been discussed
below.
Slide Layout
Multiple options and layouts are available based on which a presentation
can be created. This option is available under the ―Home‖ section and one
can select from the multiple layout options provided.
The image below shows the different slide layout options which are
available for use:
Slide Design
MS PowerPoint has various themes using which background colour and
designs or textures can be added to a slide. This makes the presentation
more colourful and attracts the attention of the people looking at it.
This feature can be added using the ―Design‖ category mentioned on the
homepage of MS PowerPoint. Although there are existing design templates
available, in case someone wants to add some new texture or colour, the
option to customise the design is also available. Apart from this, slide
designs can also be downloaded online.
PRE-TEST
.
INSTRUCTIONS: If the statement is a multiple choice test, you
should encircle the correct letter while you are required to write
the correct answer if the statement is for identification. No
erasure and no changes in replies are permitted.
Name:____________________ Date:_______Yr.&Section: ________ Sc. ____
Data Communication
Communication
- is defined as transfer of information, such as thoughts and
messages between two entities. The invention of telegraph, radio,
telephone, and television made possible instantaneous
communication over long distances.
Destiny: The user at the other end finally receives the message
through the data terminal equipment stationed at the other side.
Fig 1.1 (b) shows a typical dial-up network setup. The data communication
equipment (DCE) at the transmitting end converts the digital signals into
audio tones (modulation) so that the voice grade telephone lines can be
used as guided media during transmission. At the far end the receiving
audio tones, they are converted back to digital signals (Demodulation) by
the data communication equipment (DCE) and fed to the far end data
terminal equipment (DTE).
Signal conversions
There are two types of signals analog and digital. All naturally
available
signals are analog in nature. In data communications these signals are
converted into digital form by means of A-to-D converters
(analog to digital converters).
The following figure illustrates the analog output of microphone and
subsequent conversion into its digital counter part by A-to-D converter.
The sine wave is the simplest form of an analog signal. It has three
parameters. Amplitude, frequency and phase. Normally amplitude in
volts is denoted on Y-axis and time period is on X-axis. The time taken
to complete one cycle is called time period and measured in seconds.
The reciprocal of time period is frequency and its unit is cycles per
second(c/s) or Hz (Hertz).(See Fig.1.2)
Bandwidth
Mathematically it can be shown that any complex waveform is a
made of sine waveforms of different amplitudes and frequencies with
varying phase relationships amongst each other.
Noise
For example, if you talk on a CB radio (Citizens band radio), you press
a button and speak. But if the receiver attempts to press the button
and speak at the same time then neither one of you hear either
message. The CB radio system is not capable of sending both ways
simultaneously.
Modes of transmission
As the name suggests, the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks provide
connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Ethernet
Ethernet shares media. Network which uses shared media has high
probability of data collision. Ethernet uses Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect collisions. On the
occurrence of collision in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high
speed status only for 3 years till Giga-Ethernet introduced. Giga-Ethernet
provides speed up to 1000 mbits/seconds. IEEE802.3ab standardize Giga-
Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah
defines Giga-Ethernet over Fiber.
Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared
media in Ethernet create one single Broadcast domain and one single
Collision domain. Introduction of switches to Ethernet has removed single
collision domain issue and each device connected to switch works in its
separate collision domain. But even Switches cannot divide a network into
separate Broadcast domains.
Repeater
It extends the length of the signal and allows it to transmit over the same
network. In other words, it simply copies the signal bit by bit and re-
generates at its original strength by operating at the physical layer.
Network Hub
A network hub is a multiport repeater that connects multiple wires from
different branches. It is used to transfer important data and communicate
among diverse network hosts.
Hub transfers the data as packets through a computer network. When the
data processing is done from one host to another network hub, it gets
transmitted to all the connected ports.
Bridge
A bridge is a device that joins any two networks or host segments together.
Its primary function in a networking architecture is to store and relay frames
among the various connected segments.
They transfer frames using the MAC or the Media Access Control. It can
also prevent data crossing if the MAC addresses are wrong. Besides, it also
links different physical LANs together to form a bigger logical LAN.
Network Switch
Switches play a more important role than hubs. A switch is a multi-port
device that enhances network efficiency. It provides limited routing
information about nodes in the internal network and allows systems to
connect.
Network switches can read the hardware address of incoming data packets
and transmit them to the applicable destination. A multilayer switch is a
high-performance device that supports routing protocols like routers.
Modem
Afterward, receiver modems reverse the process and send a digital signal
to linked devices like phones and laptops. Telephone companies and cable
operators sometimes use modems as the end terminals to identify
residential and business customers.
Gateway
As the name suggests, the gateway is a passage that interlinks two
networks together. It works as the messenger agent that takes data from
one system, interprets it, and transfers it to another system. Gateways are
also called protocol converters, and they can operate at various network
layers.
Access Point
First, as a regular wired network for wireless devices. Second, like a router
for transferring data between different access points.
The AP has various ports to expand the network‘s size, firewall capabilities,
and DHCP service. As a result, we have access points that act as a switch,
DHCP server, router, and firewall.
Field Interfaces
Field interfaces comprise programmable controllers and field devices
like sensors and actuators. The field interface establishes communications
between these two components. Such communication is necessary for real-
time control and automation of various controllers and visualization stations.
Management Interfaces
Management interfaces are network interfaces dedicated mainly to
configuration and network management operations. They are usually
connected to specially dedicated band management networks like VPNs or
other physical networks.
In case of emergency, you can troubleshoot all devices remotely. When the
information is centralized, error management becomes a lot easier.
Once you get the error notification, you can immediately rectify the
issue and save your company from network downtime and subsequent
losses.
Point-to-Point
Bus Topology
Star Topology
All hosts in Star topology are connected to a central device, known
as hub device, using a point-to-point connection. That is, there exists a
point to point connection between hosts and hub. The hub device can be
any of the following:
Ring Topology
Mesh Topology
Hosts in Mesh topology also work as relay for other hosts which do
not have direct point-to-point links.
Daisy Chain
Hybrid Topology
The sender encodes the message into a format that can be sent
through the chosen channel. The receiver then decodes the message and
interprets its meaning. In order for communication to be effective, both the
sender and the receiver must be on the same page regarding the message
and its interpretation.
Telephone
The telephone is one of the oldest and most commonly used
communication technologies. It is one of the most important inventions of
the modern era. Not only does it allow us to communicate with others at a
distance, but it also conveys electrical messages over wires. This means
that instead of staccato clicks, which need the training to interpret,
telephone cables can transport genuine speech sounds.
Fax machine
The fax machine was once the primary method of sending documents
electronically. A fax machine is a machine that uses a telephone line to
send and receive documents.
The sender places the document to be faxed in the machine, dials the
number of the fax machine at the receiving end, and the document is
transmitted over the phone line. At the receiving end, the fax machine prints
out the document.
Fax machines are commonly used to send and receive business
documents, such as contracts, invoices, and reports. They are also
occasionally used to send personal documents, such as letters and family
photos. Fax machines have been around for several decades and are still in
use today, although their popularity has declined in recent years with the
advent of email and other digital communication methods.
Faxes can be sent and received quickly and easily, but they can be
costly to use long-distance. In addition, fax machines require a dedicated
phone line, which can be an issue for small businesses or home offices.
Radio
Radio is a communication technology that uses electromagnetic
waves to transmit sound. It is one of the earliest forms of wireless
communication. Radio waves are used to carry signals from one place to
another, and they can travel long distances.
Radio was first used for communication in the late 1800s, and it
quickly became a popular way to send and receive information. Radio is still
widely used today, both for commercial purposes and for personal use. It is
an effective way to communicate over long distances, but it can be
expensive to set up and maintain a radio station.
Television
Television is a broadcast medium that uses electromagnetic waves to
transmit moving images and sound. Television signals are typically
transmitted via satellite, cable, or over-the-air broadcasting.
Television was first developed in the early 1900s, and it has become
one of the most popular forms of entertainment and information in the
world. Television is an effective way to reach a large audience with a
message or story. However, it can be expensive to produce quality
television programming, and there is always the risk that viewers will
change the channel if they are not interested in what is being shown.
For example, VoIP can be used to make international calls, which can
be much cheaper than traditional phone calls. VoIP can also be used to set
up a virtual office, which can be a convenient and cost-effective way to run
a business.
VoIP has many benefits, but it also has some drawbacks. For example,
VoIP calls can be prone to dropped calls or choppy audio quality.
Additionally, VoIP requires a reliable internet connection, which may not be
available in all areas. Despite these challenges, VoIP remains a popular
and essential communication tool for many businesses.
Teleconferencing
Teleconferencing is a type of telecommunications that allows users to
communicate with each other using audio only. Teleconferencing can be
used for personal or business purposes.
For example, teleconferencing can be used to hold meetings with
colleagues or clients who are located in different parts of the world. It can
also be used to conduct job interviews, give presentations, or provide
training.
Teleconferencing has many benefits, but it also has some drawbacks.
For example, it can be difficult to schedule teleconferences, due to time
zone differences. Additionally, teleconferences can be less personal than
video conferences or in-person meetings. Despite these challenges,
teleconferencing remains a popular and essential communication tool for
many businesses.
Email
Email is a widely used communication tool that allows people to send
and receive messages electronically, especially in the business world.
Email allows users to send and receive messages from anywhere in the
world, at any time of day.
Email messages can be short or long, and can include attachments
such as documents, images, and videos. Email is an efficient way to
communicate with friends, family, colleagues, and business contacts. It is
also a convenient way to stay up-to-date on current events, news, and other
information.
Email has many benefits, but it also has some drawbacks. For example,
email can be used to send spam or unwanted messages. It can also be
used to spread viruses and other malicious software. Despite these risks,
email remains a popular and essential communication tool for millions of
Text messaging
Text messaging, also known as SMS (short message service), is a
popular way to communicate, especially among young people. Text
messages are sent and received using a mobile phone. They are typically
shorter than email messages, and can only include text, not images or
videos.
Text messaging is fast, convenient, and relatively inexpensive. It is
often used for informal communication, such as sending a quick message
to a friend or family member. However, it can also be used for business
purposes, such as sending reminders or updates to employees.
Text messaging has become so popular that some people have
started to use it as a replacement for email and other forms of
communication. This has led to concerns about the potential negative
effects of text messaging, such as distraction, addiction, and poor grammar.
Despite these concerns, text messaging remains a popular way to
communicate, both in personal and professional settings.
Instant messaging
Making voice calls is just not enough anymore in today‘s daily activities.
Businesses must learn to adapt to this by grabbing the advantages a real-
time chat can give. Instant messaging (IM) is a real-time communication
tool that allows users to send and receive messages online. IM messages
are typically shorter than email messages and can include text, images,
videos, and other media.
IM is fast, convenient, and relatively inexpensive. It is often used for
informal communication, such as sending a quick message to a friend or
family member. However, it can also be used for business purposes, such
as sending reminders or updates to employees.
Customers will surely appreciate not waiting for someone to talk to
when making a voice call. They can do something else while waiting for a
response while chatting. Even employees of a company can benefit from
having an internal chatting platform.
IM has become so popular that some people have started to use it as a
replacement for email and other forms of communication. This has led to
concerns about the potential negative effects of IM, such as distraction,
addiction, and poor grammar. Despite these concerns, IM remains a
popular way to communicate, both in personal and professional settings.
Video Calling
Nowadays, video calling is becoming more popular than voice calls
because it provides an efficient way to communicate with friends, family
members, and colleagues without having to be in the same room or even
country.
With video calling, people can see the person they are talking to
Social media
Social media is a category of online communication platforms that
allow users to share content, connect with friends and acquaintances, and
engage in other online activities. Social media platforms include Facebook,
Twitter, Instagram, Snapchat, and LinkedIn.
Social media has revolutionized communication, making it possible
for people all over the world to connect instantly. It is a quick and easy way
to share information and stay up-to-date on what is happening in the world.
However, social media can also be a source of misinformation, and it can
be addictive.
Mobile Technology
Using mobile technology to its full potential could make a business
grow and expand much faster. Almost everyone uses their mobile phones
not only for communication but also for paying bills, shopping, banking,
watching the news, etc. Businesses should employ the use of applications
to promote their products or services to their target customers.
By utilizing the full potential of this rapidly growing industry,
Wearable devices
A lot of industries benefit from wearing devices that can be used for
communicating and even to store retrievable information as well. Just take
a look at those delivery guys that brought you the food that you ordered.
Those people are using wearable technology like smart watches or
even just through their mobile phones, which use GPS technology to be
able to get to your house. It‘s a breakthrough for businesses to provide
delivery service to their customers.
The Internet
The Internet has become an essential part of communication
technology. It allows people to connect on a global scale, and it has
revolutionized the way we communicate.
The Internet has made it possible for us to communicate with anyone,
anywhere in the world, and it has given us access to a wealth of
information. In addition, it has allowed us to communicate in ways that were
once impossible. For example, we can now communicate through text,
audio, and video.
The Internet has also changed the way we do business. It has allowed
us to conduct transactions electronically, and it has given us access to a
global marketplace. As a result, businesses can now reach a larger
audience than ever before.
The Internet has had a profound impact on our lives, and it is likely to
have even more impact in the years to come. It is changing the way we live
and work, and it is paving the way for a new era of communication.
Application
Presentation
Session
Transport
Network, Data-link
Physical Layer
The physical layer helps you to define the electrical and physical
specifications of the data connection. This level establishes the relationship
between a device and a physical transmission medium. The physical layer
is not concerned with protocols or other such higher-layer items.
Examples of hardware in the physical layer are network adapters,
ethernet, repeaters, networking hubs, etc.
The data link layer is subdivided into two types of sub layers:
Transport Layer:
The transport layer builds on the network layer to provide data transport
from a process on a source machine to a process on a destination machine.
It is hosted using single or multiple networks, and also maintains the quality
of service functions.
It determines how much data should be sent where and at what rate.
This layer builds on the message which are received from the application
layer. It helps ensure that data units are delivered error-free and in
sequence.
Transport layer helps you to control the reliability of a link through flow
control, error control, and segmentation or desegmentation.
The transport layer also offers an acknowledgment of the successful
data transmission and sends the next data in case no errors occurred. TCP
is the best-known example of the transport layer.
Network Layer:
The network layer provides the functional and procedural means of
transferring variable length data sequences from one node to another
connected in ―different networks‖.
1. routing protocols
2. multicast group management
3. network-layer address assignment.
Session Layer
Session Layer controls the dialogues between computers. It helps you
to establish starting and terminating the connections between the local and
remote application.
This layer request for a logical connection which should be established
on end user‘s requirement. This layer handles all the important log-on or
password validation.
Session layer offers services like dialog discipline, which can be duplex
or half-duplex. It is mostly implemented in application environments that use
remote procedure calls.
Application Layer
Application layer interacts with an application program, which is the
highest level of OSI model. The application layer is the OSI layer, which is
closest to the end-user. It means OSI application layer allows users to
interact with other software application.
Every layer within an OSI model communicates with the other two
layers which are below it and its peer layer in some another networked
computing system.
In the below-given diagram, you can see that the data link layer of the first
system communicates with two layers, the network layer and the physical
layer of the system. It also helps you to communicate with the data link
layer of, the second system.
Here, are some important differences between the OSI & TCP/IP
model:
Summary
The OSI Model is a logical and conceptual model that defines
network communication which is used by systems open to
interconnection and communication with other systems
In OSI model, layer should only be created where the definite levels
of abstraction are needed.
OSI layer helps you to understand communication over a network
In 1984, the OSI architecture was formally adopted by ISO as an
international standard
Our goal is for you to know what matters at sea, so that you know what to
consider for your digital infrastructure. Once installed, it will be with you for
years, so it‘s important to get it right.
First, we‘ll look at what a basic computer network on a ship might consist
of. Then we‘ll talk about what sort of hardware you should opt for at sea.
Modem
Assuming the vessel has an Internet connection, the first device on
the network is the modem. Vessels can connect to the internet via different
platforms (usually 4G/5G or satellite), but they all require a modem.
Router
The router does two things:
2. The router creates a subnet. The router does this by assigning names (IP
addresses) to every unit on the local network (LAN). Once each unit is
given a unique name, the router can route the traffic to and from them.
Example: If you‘re in Japan and want to send a message via email to your
colleague in the UK, the router will direct it towards your overseas
colleague. But if you wish to print the same text from the printer on your
local network, the message will find its way there via the switch.
Above: Connecting your Local Area Network (LAN) to a Wide Area Network
(WAN) / the Internet.
Server
As the name suggests, the server serves its users by providing
access to shared resources like the network operating system, applications,
and data. It also processes data from sensors and devices, such as CCTV
cameras or sonars, before forwarding it to the appropriate output units
(monitors).
Clients (users)
The units that allow you to access and use the network are known as
clients. These include laptops, computers, cell phones and PLCs. All clients
have processing power and can send and/or receive data to/from the
network. Clients have unique IP addresses.
Cables/wires
Data passes through the network via cables, also referred to as wires.
Common examples are coaxial cables and fiberoptic cables. Today, most
networks consist of a combination of hardwired and wireless connections.
Peripherals
We divide peripherals into three categories:
1. Input devices
2. Output devices
3. Storage devices
Satellite communications
Few ship operators or their crews are concerned with the high
science and engineering of the satellites themselves, but they do need to
understand the fundamentals of satellite communications and the radio
spectrum.
The antennae on the ship are rarely stationary due to the constant
movement of the vessel when under way and thus require the dish to be
mobile in all dimensions. The dish itself is hidden from view by the radome
cover but viewed up close they are sophisticated pieces of equipment with
motors and gearing enabling the dish to maintain a lock on the satellite
under all but the harshest conditions.
Usually they are charged for this on a monthly fixed fee subscription
basis (although there may be limits on the data allowed before extra
charges apply) as opposed to the rate per Mbit charged when using basic
services. This enables a network to be created that permits the
transmission of large quantities of data.
Not all ship types or fleet managers need large data flows for
commercial reasons but passenger, offshore and container operations
frequently do. For passenger vessels this will involve allowing passengers
to use computers, tablets and smart phones as well as providing
entertainment services. In the offshore industry it enables survey and other
data to be transmitted at will and for container ships there is a need for
large amounts of data for stowage plans and customer services.
The Fleet service has recently been extended with Inmarsat offering
a hybrid service that combines Fleet Broadband with its VSAT services.
The first step was XpressLink which worked with Inmarsat‘s Ku-Band VSAT
and was followed by Fleet Xpress a Kaband/ L-band service that became
available once Global Xpress commenced global commercial service. While
waiting for all satellites in the Ka-Band constellation to be launched, the
company introduced FleetBroadband Xtra (FBX), a regional Global
Xpress/FleetBroadband service. Fleet Xpress was launched in 2016 and
has proven popular, with around 10,000 ship users.
The last hurdle is for Iridium and its selling partners to make
available type-approved equipment which must also be certified by IMSO.
The first terminal planned for certification, the Lars Thrane LT-3100S, is
now available. Several additional Iridium GMDSS terminals are planned to
be available in the future.
SOLAS class vessels will need to wait until sometime in 2020 for the
Iridium terminal to meet its mandated GMDSS carriage requirement, which
VSAT
All satellites make use of a beam which is a pattern of
electromagnetic waves transmitted by the satellite. The transmission from a
satellite has a defined pattern and the beam can be wide or narrow
covering a large or small area on earth. Using a system of varying
frequencies and alignment of antennas onboard the satellite, each satellite
can have several beams within which all or most of the satellite‘s power is
concentrated. The antennae on the ship are rarely stationary due to the
constant movement of the vessel when under way and thus require the dish
to be mobile in all dimensions.
Some bands have a wider spread than others and each of the
bands is used for a slightly different purpose. Radio communications on
Low Frequency (LF), Medium Frequency (MF), High Frequency (HF), Very
High Frequency (VHF) and Ultra High Frequency (UHF) bands are all on
frequencies below 1GHz which is the lowest point in the spectrum allocated
to satellite communications and ship‘s radar.
L -Band (1-2GHz)
Most of the Inmarsat and all of the Iridium services operate in the
part of the radio spectrum labelled as L-band, which is very narrow and
congested. Being a relatively low frequency, L-band is easier to process,
requiring less sophisticated and less expensive RF equipment, and due to a
wider beam width, the pointing accuracy of the antenna does not have to be
as accurate as the higher bands. Only a small portion (1.3-1.7GHz) of L-
Band is allocated to satellite communications on Inmarsat for the Fleet
Broadband, Inmarsat B and C services.
L-Band is also used for low earth orbit satellites, military satellites,
and terrestrial wireless connections like GSM mobile phones. It is also used
as an intermediate frequency for satellite TV where the Ku or Ka band
signals are down converted to L-Band at the antenna.
S-Band (2-4GHz)
Used for marine radar systems.
C-Band (4-8GHz)
C-band is typically used by large ships, particularly cruise vessels,
X-Band (8-12GHz)
Used for marine radar systems.
Ku-Band (12-18GHz)
Ku-Band refers to the lower portion of the K-Band. The ‗u‘ comes
from a German term referring to ‗under‘ whereas the ‗a‘ in Ka- Band refers
to ‗above‘ or the top part of K-Band. Ku-Band is used for most VSAT
systems on ships. There is much more bandwidth available in Ku -Band
and it is less expensive than C- or L-band.
Ka-Band (26.5-40GHz)
Ka-Band is an extremely high frequency requiring great pointing
accuracy and sophisticated RF equipment. Like Ku-band it is susceptible to
rain-fade. It is commonly used for high definition satellite TV. Ka- Band
With beam forming, the MBR can direct datagrams to the destination
as a multidirectional networked wireless system. Supporting IP
transmission, the MBR provides a resilient, high-capacity data link for
systems that communicate over IP. The use of end-to-end IP connectivity
provides cost efficient integration and an interoperable solution for
seamless data exchange. The MBR system has been used for testing
autonomous vessels in Norwegian waters but the concept has obvious uses
beyond this for vessels operating in relatively close contact.
Network Standards
Networking standards define the rules for data communications that
are needed for interoperability of networking technologies and processes.
Standards help in creating and maintaining open markets and allow
different vendors to compete on the basis of the quality of their products
while being compatible with existing market products.
Types of Standards
Standards are of two types
De facto − These are the standards that are followed without any
formal plan or approval by any organization. They have come into
existence due to traditions or facts. For example, the HTTP had
started as a de facto standard.
De jure − These standards are the ones which have been adopted
through legislation by any officially recognized standards
organization. Most of the communication standards that are used
today are de jure standards.
Standards Organizations
Some of the noted standards organizations are
This draft proposal is then taken for discussion with the standard
bodies for the member countries. Further, a discussion is also done within
each country. There are more comments and suggestions that are collated,
OSI standardization
Before the internet, there was ARPANET. For the ARPANET, protocols
were standardized. However, sometimes standardization may not be
enough. The reasons stated in the case of de facto standards are different
from the case here. Here, what makes standardization insufficient is the fact
that the protocol also needed a framework to enable operation. There is,
hence, a need to develop a future-proof, framework that is also for general
purposes that is suitable for network protocols that are structured.
Such developments are important because they would not only allow clearly
definitions of the protocol responsibilities at different levels but also, would
be instrumental for the prevention of overlapping functionalities. These
needs resulted in the development of the OSI Open Systems
Interconnection model for reference. The OSI Open Systems
Interconnection reference model is a vital framework used for designing
standard services and protocols that conform to the different layer
Network Security
Network security is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft. It involves
creating a secure infrastructure for devices, applications, users, and
applications to work in a secure manner.
NetWORK security
- NetWORK security is Cisco's vision for simplifying network,
workload, and multicloud security by delivering unified security
controls to dynamic environments.
SecureX
- SecureX is a cloud-native, built-in platform that connects the Cisco
Secure portfolio and your infrastructure. It allows you to radically
reduce dwell time and human-powered tasks.
Network segmentation
- Software-defined segmentation puts network traffic into different
classifications and makes enforcing security policies easier. Ideally,
the classifications are based on endpoint identity, not mere IP
addresses. You can assign access rights based on role, location,
and more so that the right level of access is given to the right people
and suspicious devices are contained and remediated.
VPN
- A virtual private network encrypts the connection from an endpoint
to a network, often over the internet. Typically, a remote-access
VPN uses IPsec or Secure Sockets Layer to authenticate the
communication between device and network.
Access control
- Not every user should have access to your network. To keep out
potential attackers, you need to recognize each user and each
device. Then you can enforce your security policies. You can block
noncompliant endpoint devices or give them only limited access.
This process is network access control (NAC).
Anti-virus and anti-malware software
Application security
- Any software you use to run your business needs to be protected,
whether your IT staff builds it or whether you buy it. Unfortunately,
any application may contain holes, or vulnerabilities, that attackers
can use to infiltrate your network. Application security encompasses
the hardware, software, and processes you use to close those
holes.
Behavioral analytics
- To detect abnormal network behavior, you must know what normal
behavior looks like. Behavioral analytics tools automatically discern
activities that deviate from the norm. Your security team can then
better identify indicators of compromise that pose a potential
problem and quickly remediate threats.
Cloud security
- Cloud security is a broad set of technologies, policies, and
applications applied to defend online IP, services, applications, and
other imperative data. It helps you better manage your security by
shielding users against threats anywhere they access the internet
and securing your data and applications in the cloud.
Data loss prevention
- Organizations must make sure that their staff does not send
sensitive information outside the network. Data loss prevention, or
DLP, technologies can stop people from uploading, forwarding, or
even printing critical information in an unsafe manner.
Email security
- Email gateways are the number one threat vector for a security
breach. Attackers use personal information and social engineering
tactics to build sophisticated phishing campaigns to deceive
recipients and send them to sites serving up malware. An email
security application blocks incoming attacks and controls outbound
messages to prevent the loss of sensitive data.
Web security
- A web security solution will control your staff's web use, block web-
based threats, and deny access to malicious websites. It will protect
your web gateway on site or in the cloud. "Web security" also refers
to the steps you take to protect your own website.
Wireless security
- Wireless networks are not as secure as wired ones. Without
stringent security measures, installing a wireless LAN can be like
putting Ethernet ports everywhere, including the parking lot. To
prevent an exploit from taking hold, you need products specifically
designed to protect a wireless network.
Applications of LAN:
Advantages of LAN:
Disadvantages of LAN:
3. Use ping and tracert. If your router is working fine, and you have an
IP address starting with something other than 169, the problem‘s
most likely located between your router and the internet. At this
point, it‘s time to use the ping tool. Try sending a ping to a well-
known, large server, such as Google, to see if it can connect with
your router. You can ping Google DNS servers by opening the
command prompt and typing ―ping 8.8.8.8‖; you can also add ―-t‖ to
the end (ping 8.8.8.8 -t) to get it to keep pinging the servers while
you troubleshoot. If the pings fail to send, the command prompt will
return basic information about the issue.
You can use the tracert command to do the same thing, by typing
―tracert 8.8.8.8‖; this will show you each step, or ―hop,‖ between your
router and the Google DNS servers. You can see where along the
pathway the error is arising. If the error comes up early along the
pathway, the issue is more likely somewhere in your local network.
6. Check on virus and malware protection. Next, make sure your virus
and malware tools are running correctly, and they haven‘t flagged
7. Review database logs. Review all your database logs to make sure
the databases are functioning as expected. If your network is
working but your database is full or malfunctioning, it could be
causing problems that flow on and affect your network performance.
REFERENCES:
https://www.geeksforgeeks.org/data-communication-definition-
components-types-channels/
https://www.guru99.com/types-of-computer-network.html
https://www.tutorialspoint.com/data_communication_computer_netw
ork/computer_network_types.htm
https://www.techjockey.com/blog/what-are-computer-network-
devices
18 Types of Communication Technologies | TL Dev Tech
https://www.guru99.com/layers-of-osi-model.html
https://www.hattelandtechnology.com/blog/introduction-to-computer-
networks-on-ships
https://shipinsight.com/articles/ship-satellite-communications-
overview-and-history
https://www.tutorialspoint.com/Network-Standardization
https://erainnovator.com/network-protocols-and-standards/
https://www.cisco.com/c/en/us/products/security/what-is-network-
security.html#~types
https://www.dnsstuff.com/network-troubleshooting-steps