Ict Module 3 2024 25

Download as pdf or txt
Download as pdf or txt
You are on page 1of 78

ICT

INFORMATION COMMUNICATION
TECHNOLOGY

(PRE-FINAL)
TABLE OF CONTENTS

Course Description.....................1
Course Guide .............................2
Module Mapping.........................7
Module Timetable.......................8

Module 3 – Element A-B

Study Schedule ………...……. 9

Learning Plans ……...…….…. 9

Pre-test ……...……………...…. 11

Introduction ……………...….... 11

Discussion Lesson 1 ………… 12

Pre-Test ……………………… 17
Discussion Lesson 2 ………… 18
Reference…………….………… 77

Course Code: ICT – Module 3 Page 1 of 77


COURSE DESCRIPTION

Software Applications and Network System used in Seagoing Ships


(ICT)
Course ICT
Code
Course Software Applications and Network
Descriptive System used in Seagoing Ships Prerequisite None
Title
This course introduces the fundamentals of maritime ICT
technologies and systems. It includes topics on the introduction
to computer systems, computer hardware and storage devices,
basic computer hardware and software servicing with
Course troubleshooting, Software Productivity Tools, Data
Description: Communication and Computer Networks, Cyber Security and
Emerging Technologies — Fourth Industrial Revolution. The
students of this course are going to be immersed in interactive
discussions as well as various activities and demonstrations. By
the end of the course, the students are expected to be able to
effectively use computer devices in shipboard application and
contribute to managing cyber security. Written and practical
assessments are conducted to ensure the attainment of the
required outcomes.
Course 2 Units Theoretical 1 Hour Demonstration/Pract 3
Credits Contact Hours ical Work Contact Hours
Per Week Hours Per Week
Competenc Operate computers and computer networks on ships
e:
KUP Understanding of:

KUP1.Main features of data processing


KUP2.Use of computer networks on ships
KUP3.Basic computer malfunctions
KUP4.Fundamentals of cybersecurity to ship operations
At the end of the course, the students shall be able to:
CO1. Apply appropriate computer software for data processing
Course and networking onboard ship,
Outcome/s CO2. Troubleshoot basic computer malfunctions as per
manufacturer's instructions
CO3. Relate the fundamentals of cybersecurity management to
shipping operations

Course Code: ICT – Module 3 Page 2 of 77


COURSE GUIDE

There are no shortcuts to success here. The institution prepares you to face the
demands of the modern age of learning in this new standard without
compromising quality education and training in the maritime sectors. The only
secret to fulfilling this module‘s requirements is commitment to the institution's
mission, dream, and aim with perseverance, integrity, and dedication.

The module has been meticulously, perceptively and independently designed to


reinforce the cornerstone of good education for you to resiliently learn the various
underpinning technical and general knowledge in maritime studies. As your
facilitator, moderator and assessor in this particular course, you will be greatly
directed and trained to test your ability to meet potential adversities in life as ship
officers. The common objectives of quality learning are to ensure that you meet
the competencies mandated by the STCW 1978, as amended. Minimum criteria
for achieving both theoretical and practical aspects consistent with knowledge,
understanding and skills captured through standards assessment and evaluation.
I am honing you as a conscientious learner to conduct all of the tasks,
assignments and tests in a very trustworthy manner. Clearly remember that this
module is just a learning tool with all the convenience and complete all the tasks
asynchronously to pave the way for a rigid assessment of each end of the
module. The following guides and house rules will help you sustain the course line
in the midst of the sea obstacles and eventually say, "I HAVE ARRIVE TO THE
DESTINATION OF SUCCESS."

Here are the guidelines which you should follow:


1. Perform your time management by reading and relating every part of
the module to reach the various learning references. Do advanced research using
different essential learning kits from books, magazines, interactive apps and
applications that you believe can help you complete the tasks. Despite internet
connectivity restrictions including government quarantine policies and
compliance procedures, it is your initiative to scrupulously and with good
conscience perform the institution's designed blended programs in either
synchronous or asynchronous mode.

2. You are on a distance learning cycle that manifests the classes by


online, off-line or hybrid approaches in coping with the highest level of quality
education without sacrificing other modules of the other enrolled courses. It takes
flexibility and efficient time management to reach the deadlines set by the
organization and also by the facilitators. Using the devices such as mobile
phones, laptops and other automated reminders to inform you of the production
submission and alert you of the deadlines. It will help you manage your time by
putting the notices in a conspicuous location.

Course Code: ICT – Module 3 Page 3 of 77


3. Stick to the query schedule that your facilitators have set. We are
not members of the call-center that can answer all your questions in 24/7 modes.
Ask only relevant questions, and avoid questions that are redundant.

4. Just know your status, whether you belong to almost any


modalities. Remind your facilitators of what you have done. Take the practice of
logging in to the learning management system sites in case you‘re in a blended
program to keep up with the updated and relevant updates and discussions. Any
time you visit the site, check the latest updates on your account for any related
improvements and revisions. Religiously observe the schedules of learning.
Stay linked and chatwith your facilitators wherever you go.

5. Do not become a delay instrument. If you cannot complete the tasks


in the set schedules, you will find it difficult soon. Remember you can't proceed to
the next module unless you get satisfactory and passing remarks.

6. Guidance is very important to execute the tasks easily. Keep in mind


that assumptions are particularly dangerous during onboard operations. Learn to
read the instructions before attempting to carry out the assigned tasks or
assessments. Never settle to a median score but strive for the highest standards
of skills.

7. Study the lessons ahead of time. Utilize all the energy and
imagination effectively. Learn how to use all the learning kits and references
before doing the elements needed on your modules. Make sure no missing links
are found.

8. In all honesty, always answer the pre-test to help gauge the level of
knowledge and awareness of the topics. It is just a diagnostic test of yours.

9. All the discussions are academic fora, meaning the relevant


academic meetings are applied.
a. Your performance will objectively be based on the rubrics of your
tasks. Check the notations or any assessment tool that meets the competencies.
b. As much as you can, avoid using abbreviations and acronyms
unless they are entered in the readings and used in your introduction. Avoid
writing in all capital letters if using digital learning kit. In a paper-based approach
you are expected to write without erasures and alterations in capital and bold
letters.
c. Please post corresponding and appropriate paragraphs on your
production. Work independently until your facilitators give feedback, without
disturbing others for approvals and disapprovals. Never settle inputs that you
composed without reliable information and resources. Learn to identify references
or even quote other people's works even without particular template types in your
outputs. Do not post uninformed or half-cooked opinions from scanty knowledge.
d. Read and analyze your classmates' contributions in the
discussion fora. Correct and courteous response. Never leave the forum, unless
you need to.

Course Code: ICT – Module 3 Page 4 of 77


Use appropriate language always when participating in any form of collaborative
discussions.

e. When sharing ideas or questions, be polite and respectful, and


contradict your views and opinions. Never be disrespectful and promote personal
assault. Apply not to people with reliable proof and references to ideas /
statements. Remember that the purpose of academic discussion is to develop
critical and analytical thinking skills and camaraderie.

f.Do not post lengthy posts (don't accept turning around the bush). Just stick to
the point. Keep your main point clear and express it in the shortest possible
terms. Don't let the conversation drift.
g. Secure your confidentiality. Ponder before you post so as to
prevent misinterpretation and offend other parties to your ideas. If you want to
share something private, please do so by e-mail or private messenger.

10. Do not plagiarize, and do not write patches. Patch writing is still a
plagiary type. To assess the percentage of resemblance and remove copyright
infringement, use the plagiarism checker. The act of making small modifications
and substitutions to copied source material is referred to (Merriam-Webster,
2020).To be more secure use a plagiarism check.

11. Do your best to remind your facilitator, by all means, of any inevitable
delays or "absences" or "silences" over the course of a week or other questions at
the specified time. No time as peekaboo as this moment. Be transparent
regarding your situation.

12. Notice that the platform is an area of simulated learning, not a social
networking site or a social media gossip portal. Use a recent and correct photo ID
on your profile page and fill in the details needed for proper identification.

13. Materials and other resources shall be made available to you and it is
strongly recommended that you be resourceful and imaginative.

14. The assessment will be generated hierarchically via the digital


platform at the scheduled time. When you have failed the evaluation by
element, the platform will guide you from the start to evaluate the element
completely and restart the evaluation and pass the evaluation before beginning
the next element.

15. Follow guidelines and assumptions at all times are strictly prohibited.
Ask your facilitators about their convenient class hours or appointed time for
consultation.

16. Finally, you‘re the learner; therefore, you‘re doing the module
yourself. Your family members and friends at home will help you but the requisite
tasks MUST be performed and undertaken entirely by you as your performance
must be orally checked and validated. The institution's core principles must be
adhered to.

Course Code: ICT – Module 3 Page 5 of 77


EVALUATION:

In order to meet the appropriate passing grades of this module, you must:

1. Read all your course readings and respond to your diagnostic


evaluation, self- assessment and other activities, including reflections.

2. Participate in conversation or for a relevant to the modules with the


asynchronouslearning modalities.

3. Submit your appropriate assignments and participate in the digital


modular summary evaluation of each element.

4. Send your recommended final teaching-learning activities as per


schedule, such as portfolio, case review, investigation report, action research,
case study, term paper, and others.

5. Start your general assessment regularly.

RESULT:

Institutional assessment is divided into two categories: formative and summative.


The formative component is an assessment provided by your facilitator by
element in which you have to pass by the 80 percent or as required otherwise you
cannot proceed to the next element. The institution will determine whether how
many attempts are allowed for you to enjoy or you will be required to pay the
correct amount to be recovered. Never try if you are not sure you are well
equipped with the critical knowledge and analytical skills of the learned outcomes.
At your most comfortable moment, you can try the quiz earlier; however, you have
to make sure you meet the minimum passing criteria for each item. Therefore, the
summative evaluation is called a general assessment given to you only once at
the end of the module. You must undergo the "Course Outcomes Assessment"
based on your most critical learning skills provided by the CHED Memorandum
Order (CMO) or the Joint CHED-MARINA Memorandum Circular(JCMMC).

The reflective questions are designed to help you critically analyze the courses for
better understanding while the pre- and post-tests, including the tasks and
exercises, are a tool for review management to prepare you for the general
evaluation at the end of the module.

GRADING SYSTEM:

You have to meet the passing grades by referring it to the institutional grading
systemand procedures.

Course Code: ICT – Module 3 Page 6 of 77


LECTURE WITH LABORATORY
 ASSESSMENT (Course/s with laboratory)
 LABORATORY ASSESSMENT: -60%
Simulator / Scenario Assessment
 SUMMATIVE ASSESSMENT: -40%
Periodical Examination
TOTAL - 100%
PURE LECTURE:
 ASSESSMENT (Course/s without laboratory)
 Formative Assessment: -60%
-Quizzes/Hands-on Activity -30%
-Recitation/Class Participation,
Project/Assignments -30%
 SUMMATIVE ASSESSMENT: -40%
Periodical Examination
TOTAL - 100%

OVER-ALL PASSING GRADE:

Eighty percent (80%) or given a remark as ―COMPETENT‖

When you earn a score below 60 percent, you are deemed "NOT YET
COMPETENT" and you are subject to a RESIT schedule. Your required
maximum number of RESITS will be granted in accordance with the Quality
Standard System (QSS) to improve your lowest percentage of assessment and
the most important thing is for you to retake a specific element that you have
achieved least in order to meet the overall passing grade.

Pls. put a check mark if conformed

 I have fully read and agree to the


above statement. I wholly uphold
the academic integrety Name & Signature:

Course Code: ICT – Module 3 Page 7 of 77


MODULE MAPPING

Module Module 3
Title
Module This course introduces the fundamentals of maritime ICT technologies
Descriptio and systems. It includes topics on the introduction to computer
n systems, computer hardware and storage devices, basic computer
hardware and software servicing with troubleshooting, Software
Productivity Tools, Data Communication and Computer Networks,
Cyber Security and Emerging Technologies — Fourth Industrial
Revolution. The students of this course are going to be immersed in
interactive discussions as well as various activities and
demonstrations. By the end of the course, the students are expected
to be able to effectively use computer devices in shipboard application
and contribute to managing cyber security. Written and practical
assessments are conducted to ensure the attainment of the required
outcomes.
Course CO1. Apply appropriate computer software for data processing and
Outcomes networking onboard ship,
Addresse CO2. Troubleshoot basic computer malfunctions as per manufacturer's
d instructions
At the end of the module, you should be able to:
LO1.20 Create a spreadsheet utilising the different functions
Module and tools of the spreadsheet application including: files names
Learning and types; page lay-out; formatting and styles; formulas; charts;
Outcomes and data
- Presentation program (MS PowerPoint or equivalent)
LO1.21 Create a slide show utilising the different functions and
tools of the presentation program including: files names and
types; formatting and styles; texts, graphics, animations and
transitions; and design layout and templates
Lesson 5: Data Communication and Computer Networks
- Types of computer networks based on geographical span
LO2.1 Compare and contrast different computer networks with regards
to their characteristics and purpose including: PAN; LAN; WLAN;
WAN; Internet; and Intranet
- Computer network devices – network linking devices and
communication media
LO2.2 Identify the common computer network devices and their
functions
- Types of network topologies, Communication technologies and
Protocol and OSI model
LO2.3 Describe the different network protocols and topologies with
regards to their use, advantages and disadvantages
LO2.4 Describe the transfer of data such as text, images and videos
over a network using different communication technologies
- Shipboard computer network and internet access

Course Code: ICT – Module 3 Page 8 of 77


LO2.5 Describe the set-up of a shipboard computer network involving
access to the internet
- Network standardisation process and security, Setting-up small
scale wired local area network and Basic network troubleshooting
A. Presentation program (MS PowerPoint, or equivalent
B. 5. Data Communication and Computer Networks
Element 5.1 Types of computer networks based on geographical span
Title 5.2 Computer network devices — network linking devices and
communication media
5.3 Types of network topologies
5.4 Communication technologies
5.5 Protocol and OSI model
5.6 Shipboard computer network and internet access
5.7 Network standardization process and security
5.8 Setting-up small scale wired local area network
5.9 Basic network troubleshooting
Time Week 9-12
Period
Periodic PRE- FINAL
Term

Course Code: ICT – Module 3 Page 9 of 77


MODULE TIMETABLE

Time Frame
Element No.
Course Code: ICT
Week No.

Course Description: Software


Module

Applications and Network System


used in Seagoing Ships
Title of the Element HRS DAY

III 9-10 A 4.5 Presentation Program (MS 2


PowerPoint)
III 1 B 5. Data Communication and
1- Computer Networks 2
1 5.1 Types of computer networks
2 based on geographical span
5.2 Computer network devices —
network linking devices and
communication media
5.3 Types of network topologies
5.4 Communication technologies
5.5 Protocol and OSI model
5.6 Shipboard computer network and
internet access
5.7 Network standardization process
and security
5.8 Setting-up small scale wired local
area network
5.9 Basic network troubleshooting
NOTE: Your next set of Modules are released
Legend: every after passing the general assessment
M–
Monday; and the complete submission of the activities in
T– the current module to both modalities. For the Hrs.
Tuesday paper-based modality, your submission of the (The facilitator shall be
; requirements to the institution is encouraged to have flexible
W– required, unless you are under blended programs which time of submission)
Wednesday;
Th – TOTAL
Thursday; F you take the general assessment in the platform same
– Friday; with in the digital-based modality. Hence, no
S – Saturday; need of reporting to school except for practical
As – demonstration and assessment. INCOMPLETE
Asynchronous; (INC) remarks is given if you partially submit the
Sy –
Synchronous;
requirements.
Bl - Blended

Course Code: ICT – Module 3 Page 10 of 77


MODULE 3
(ELEMENT A - B)

STUDY SCHEDULE

Module ICT Module III


A.4.5 Presentation Program (MS PowerPoint)

Element B.5. Data Communication and Computer Networks


5.1 Types of computer networks based on geographical
span
Module LearningOutcome
Week

5.2 Computer network devices — network linking


devices and communication media
5.3 Types of network topologies
Course Outcome

5.4 Communication technologies


5.5 Protocol and OSI model
5.6 Shipboard computer network and internet access
5.7 Network standardization process and security
5.8 Setting-up small scale wired local area network
5.9 Basic network troubleshooting

1 CO2 MLO1 Time (Flexible time is considered)


Period
Specific Learning Objectives by Element Resources Format Assignment

Course Code: ICT – Module 3 Page 11 of 77


- Work/textbook
Engage:
- e-Hand- out
-Create a slide show utilizing the different functions and
tools of the presentation program including: files names and - Mobile apps
types; formatting and styles; texts, graphics, animations and (Software, etc.)
transitions; and design layout and templates - Video Clips
Explore: - Multi-media
-Compare and contrast different computer networks with Presentation
regards to their characteristics and purpose including: PAN; - Google
LAN; WLAN; WAN; Internet; and Intranet Classroom and
Explain: other social media
-Describe the different network protocols and topologies Platform
with regards to their use, advantages and disadvantages - Paper-based
Elaborate: modules
-Describe the set-up of a shipboard computer network - Moviemaker apps
involving access to the internet
Evaluate:
-Set-up a small-scale wired local area network with a
common shared folder
ASSESSMENT DATE: ASSESSMENT
TYPE:

REFERENCES:
 https://www.geeksforgeeks.org/data-communication-definition-components-types-channels/
 https://www.guru99.com/types-of-computer-network.html
 https://www.tutorialspoint.com/data_communication_computer_network/computer_network_
types.htm
 https://www.techjockey.com/blog/what-are-computer-network-devices
 18 Types of Communication Technologies | TL Dev Tech
 https://www.guru99.com/layers-of-osi-model.html
 https://www.hattelandtechnology.com/blog/introduction-to-computer-networks-on-ships
 https://shipinsight.com/articles/ship-satellite-communications-overview-and-history
 https://www.tutorialspoint.com/Network-Standardization
 https://erainnovator.com/network-protocols-and-standards/
 https://www.cisco.com/c/en/us/products/security/what-is-network-security.html#~types
 https://www.dnsstuff.com/network-troubleshooting-steps

Course Code: ICT – Module 3 Page 12 of 77


LEARNING OUTCOMES:
At the end of this topic, the students should be able to:
 Create a slide show utilizing the different functions and tools of the
presentation program including: files names and types; formatting
and styles; texts, graphics, animations and transitions; and design
layout and templates

INSTRUCTIONS: If the statement is a multiple


choice test, you encircle the correct letter while
you are required to write the correct answer if the
statement is for identification. No erasure and no
changes in replies are permitted.

PRE-TEST
Name:______________ Date: _______________________
Year & Section: Sc: _____________
ELEMENT (A)

1. MS PowerPoint has various themes using which background


color and designs or textures can be added to a slide. This makes
the presentation more colorful and attracts the attention of the
people looking at it. This feature can be added using the ―_____‖
category mentioned on the homepage of MS PowerPoint.

a. Clip Art b. Design‘


c. Transition c. Animation
2. This feature can be added using the ―Design‖ category
mentioned on the homepage of MS PowerPoint.
a. Slide Design‘ b. Animation
c. Slide Layout d. ClipArt
3. To start PowerPoint, click the Start button on the Windows
taskbar, point to Programs, and then select ____.
a. Accessories b. Microsoft PowerPoint‘
c. Microsoft Office Tools d. Start PowerPoint
4. A ____ ends all slide shows unless the option setting is
deselected.
a.Blue Slide b. Blank Slide
c. Black Slide d. Closing Slide‘

5. You will use ____ when making a presentation.


a. PowerPoint Viewer‘ b. Slideshow
c. Scroll bars d. View commands

Course Code: ICT – Module 3 Page 13 of 77


INTRODUCTION

Today, almost all of us in the world make use of computers in


one way or the other. It in finds applications various fields of
engineering, medicine, commercial, research and others. Not only in
these sophisticated areas, but also in our daily lives, computers have
become indispensable. They are present everywhere, in all the devices
that we use daily like cars, games, washing machines, microwaves etc.
and in day to day computations like banking, reservations, electronic
mails, internet and many more.

The word computer is derived from the word compute.


Compute means to calculate. The computer was originally defined as a
super-fast calculator. It had the capacity to solve complex arithmetic
and scientific problems at very high speed. But nowadays in addition to
handling complex arithmetic computations, computers perform many
other tasks like accepting, sorting, selecting, moving, comparing
various types of information.

They also perform arithmetic and logical operations on


alphabetic, numeric and other types of information. This information
provided by the user to the computer is data. The information in one
form which is presented to the computer is the input information or
input data Information in another form is presented by the computer
after performing a process on it. This information is the output
information or output data.

The set of instructions given to the computer to perform


various operations is called as the computer program. The process
of converting the input data into the required output form with the
help of the computer program is called as data processing. The
computers are therefore also referred to as data processors

Therefore a computer can now be defined as a fast and


accurate data processing system that accepts data, performs
various operations on the data, has the capability to store the data
and produce the results on the basis of detailed step by step
instructions given to it.

Course Code: ICT – Module 3 Page 14 of 77


LESSON 1
The following elements can be added to a Powerpoint slide:
 Clip Art
 Graphs
 Tables
 Photographs 4.5 Presentation program (MS PowerPoint)
 Charts
 Media WhatClips is MS PowerPoint?
 Videos - PowerPoint (PPT) is a powerful, easy-to-use presentation
Apart from all these
All these elements graphics options;
are mainly fontused
size, to
software font
program style,that
enhance font colour,
allows
presentationyouword
to art, and
create
skills date and the
professional-
make
time, etc. can also
slide more interactive. be added
looking to a PPT.
electronic slide shows.
 Slide Design
Features MSThe
MSofPowerPoint image
PowerPoint hasgiven
variousbelowthemesshows using the which
main page of MS colour
background PowerPoint,
and
Uses of
designsTherePowerPoint
where
or textures a Presentation
person
can be lands
added when
to a the
slide. program
This makes is
are multiple features that are available in MS PowerPoint which can opened
the on a
presentation computer
more
- PowerPoint
colourful
customise and system:
and attracts presentations
optimise theaattention are useful
of the
presentation. for
people
The same both
lookingpersonal
have and professional
at it. discussed
been below.
Thisusage.
feature Given
canbelow
be added are a few
using of the
the major
―Design‖fieldscategory
where PPT is extremely
mentioned on the
homepage useful:
 SlideofLayout MS PowerPoint. Although there are existing design templates
available, in case someone
Multiple wantsand
options to add someare
layouts newavailable
texture or based
colour, onthe option
which toa
 Education
customise – With e-learning and smart classes
presentation can be created. This option is available under the also
the design is also available. Apart from being
this, slidechosen
designs as a common
can be
―Home‖
downloadedmode of education
online. today, PowerPoint presentations
section and one can select from the multiple layout options provided. can help in making
education
The image morebelowinteractive
showsand theattract students
different slidetowards
layout the modified
options version
which are
Refer to the below
available
of studying for use: for slide design:
 Marketing – In the field of marketing, PowerPoint presentations can be
extremely important. Using graphs and charts, numbers can be shown more
evidently and clearly which may be ignored by the viewer if being read
 Business – To invite investors or to show the increase or decrease in profits,
MS PowerPoint can be used
 Creating Resumes – Digital resumes can be formed using MS PowerPoint.
Howpatterns,
Different to open photograph,
MS PowerPoint on abe
etc. can personal
added tocomputer?
the resume
Follow the steps below to open MS PowerPoint on a personal
 Depicting computer:Growth – Since both graphics and text can be added in a
presentation, depicting the growth of a company, business, student‘s marks,
etc. is1.easierClick using onPPT
the start button
2. Then choose ―All Programs‖
 Animations 3. Next step is to select ―MS Office‖
During 4. the slideUnder MS Office,
show, clickappear
the slides on the ―MS on the PowerPoint‖
screen one after the other.
In case, one wants to add some animations to the way in which a slide presents
itself,
 they can
Insert –refer
A blank to the ―Animations‖
presentation
Clipart, Video, is openetc.
Audio, category.
on the screen. According to the
requirement, a person can modify
Under the ―Insert‖ category, multiple the template
options for areaavailable
presentationwhereand
one
The different
start using animation
the styles
program. available on PowerPoint
can choose what feature they want to insert in their presentation. This may are:
include images, audio, video, header, footer, symbols, shapes, etc.
The What
imageisbelow a slide show
shows theinfeatures
a PowerPointwhich can presentation?
be inserted:
- When all the slides of a PowerPoint presentation are set in series
and then presented to a group of people, where each slide appears one
after the other, is a set pattern, this is known as a PowerPoint slide show.

Course Code: ICT – Module 3 Page 15 of 77


What all elements can be added to a slide?
The following elements can be added to a Powerpoint slide:

 Clip Art
 Graphs
 Tables
 Photographs
 Charts
 Media Clips
 Videos
Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can
customise and optimise a presentation. The same have been discussed
below.

 Slide Layout
Multiple options and layouts are available based on which a presentation
can be created. This option is available under the ―Home‖ section and one
can select from the multiple layout options provided.

The image below shows the different slide layout options which are
available for use:

 Insert – Clipart, Video, Audio, etc.


Under the ―Insert‖ category, multiple options are available where one can
choose what feature they want to insert in their presentation. This may
include images, audio, video, header, footer, symbols, shapes, etc.

The image below shows the features which can be inserted:

 Slide Design
MS PowerPoint has various themes using which background colour and
designs or textures can be added to a slide. This makes the presentation
more colourful and attracts the attention of the people looking at it.

This feature can be added using the ―Design‖ category mentioned on the
homepage of MS PowerPoint. Although there are existing design templates
available, in case someone wants to add some new texture or colour, the
option to customise the design is also available. Apart from this, slide
designs can also be downloaded online.

Refer to the below for slide design:

Course Code: ICT – Module 3 Page 16 of 77


 Animations
During the slide show, the slides appear on the screen one after the other.
In case, one wants to add some animations to the way in which a slide
presents itself, they can refer to the ―Animations‖ category.

The different animation styles available on PowerPoint are:

Uses of PowerPoint Presentation


PowerPoint presentations are useful for both personal and professional
usage. Given below are a few of the major fields where PPT is extremely
useful:

 Education – With e-learning and smart classes being chosen as a


common mode of education today, PowerPoint presentations can
help in making education more interactive and attract students
towards the modified version of studying
 Marketing – In the field of marketing, PowerPoint presentations can
be extremely important. Using graphs and charts, numbers can be
shown more evidently and clearly which may be ignored by the
viewer if being read
 Business – To invite investors or to show the increase or decrease
in profits, MS PowerPoint can be used
 Creating Resumes – Digital resumes can be formed using MS
PowerPoint. Different patterns, photograph, etc. can be added to the
resume
 Depicting Growth – Since both graphics and text can be added in a
presentation, depicting the growth of a company, business,
student‘s marks, etc. is easier using PPT

Course Code: ICT – Module 3 Page 17 of 77


LEARNING OUTCOME:
At the end of this topic, the students should be able to:
 Compare and contrast different computer networks with
regards to their characteristics and purpose including: PAN;
LAN; WLAN; WAN; Internet; and Intranet

PRE-TEST
.
INSTRUCTIONS: If the statement is a multiple choice test, you
should encircle the correct letter while you are required to write
the correct answer if the statement is for identification. No
erasure and no changes in replies are permitted.
Name:____________________ Date:_______Yr.&Section: ________ Sc. ____

1. It is responsible for controlling how device in a


ELEMENT (B)

network gain access to medium and permits to transmit


data.
a. Logical link Layer b. Local
Area Network
c. Media Access Control (MAC) layer‘ d. Internet

2. The user at the other end finally receives the message


through the data terminal equipment stationed at the
other side.
a. Transmitter b. Message
c. Receiver d. Destiny‘

3. The ____________ covers a wide area which may


span across provinces and even a whole country
a.Wide Area Network (WAN)‘ b. Wifi
c. Local Area Network (LAN d. Modem

4. Ability to correct the data in case of corrupted data


reception.
a. Signal Conversions b. Error correction‘
c. Timing Problem d. Error Detection

5. It is a two-way communication or we can say that it is


a bidirectional communication in which both the devices
can send and receive data but not at the same time.
a. Simplex Communication b. Full Duplex

Course Code: ICT – Module 3 Page 18 of 77


LESSON 2

5. Data Communication and Computer Networks

Data Communication

Communication
- is defined as transfer of information, such as thoughts and
messages between two entities. The invention of telegraph, radio,
telephone, and television made possible instantaneous
communication over long distances.

In the context of computers and information technology (IT), the


data are represented by binary digit or bit has only two values 0s
and 1s. In fact any thing the computer deals with are 0s and 1s
only. Due to this it is called discrete or digital. In the digital world
messages, thoughts, numbers.. etc can be represented in different
streams of 0s and 1s.

Data Communication model


The figure 1.1(a) shows the block diagram of a typical
communication
model. The communication model has five sub systems viz., user,
transmitter, communication channel, receiver and destiny.

 User: There will be a source that generates the message and a


transducer that converts the message into an electrical signal. The
source can be a person in front of a microphone or a computer itself
sending a file. The user terminal is known as data terminal
equipment (DTE).

 Transmitter: Can be a radio frequency modulator combining the


signal coming out of the data equipment terminal. Here the radio
frequency is acting as the carrier for the data signal. Or in case of
direct digital transmission the transmitter can be Manchester
encoder transmitting digital signals directly.

 Communication channel: Can be guided media (twisted pair,


coaxial cable, fiber optic.,) or unguided media (air, water .,). In both
the cases communication is in the form of electro magnetic waves.
With guided media the electro magnetic waves are guided along a

Course Code: ICT – Module 3 Page 19 of 77


physical path. Unguided media also called wireless the transmitting
electro magnetic waves are not guided along with a physical path.
They are radiated through air/vacuum/water., etc.

 Receiver: The receiver amplifies the received signals removes any


unwanted signals (noise) introduced by the communication channel
during propagation of the signal and feeds to the destiny.

 Destiny: The user at the other end finally receives the message
through the data terminal equipment stationed at the other side.

Fig 1.1 (b) shows a typical dial-up network setup. The data communication
equipment (DCE) at the transmitting end converts the digital signals into
audio tones (modulation) so that the voice grade telephone lines can be
used as guided media during transmission. At the far end the receiving
audio tones, they are converted back to digital signals (Demodulation) by
the data communication equipment (DCE) and fed to the far end data
terminal equipment (DTE).

Signal conversions
There are two types of signals analog and digital. All naturally
available
signals are analog in nature. In data communications these signals are
converted into digital form by means of A-to-D converters
(analog to digital converters).
The following figure illustrates the analog output of microphone and
subsequent conversion into its digital counter part by A-to-D converter.

Course Code: ICT – Module 3 Page 20 of 77


Analog signal

The sine wave is the simplest form of an analog signal. It has three
parameters. Amplitude, frequency and phase. Normally amplitude in
volts is denoted on Y-axis and time period is on X-axis. The time taken
to complete one cycle is called time period and measured in seconds.
The reciprocal of time period is frequency and its unit is cycles per
second(c/s) or Hz (Hertz).(See Fig.1.2)

Wave forms of different parameters


The following figures show the signals with different parameters and
their inter-relationship

Bandwidth
Mathematically it can be shown that any complex waveform is a
made of sine waveforms of different amplitudes and frequencies with
varying phase relationships amongst each other.

Course Code: ICT – Module 3 Page 21 of 77


In the above figure the analog signal in fig 1.4(a) has several
frequency components of different amplitude as shown in fig 1.4(b). Thus
the analog signal encompasses a wide range of frequency spectrum.

In analog systems the difference between highest frequency to


lowest frequency component is called bandwidth (here it is 8f~f = 7f).
Bandwidth merely specifies a range of frequencies, from the lowest to
the highest, that the channel can carry or that are present in the signal. It
is one way of describing the maximum amount of information that the
channel can carry. Bandwidth is expressed differently for analog and
digital circuits. In analog technology, the bandwidth of a circuit is the
difference between the lowest and highest frequencies that can pass
through the channel. Engineers measure analog bandwidth in kilohertz or
megahertz.
Rate of transmission = (bits
per second)

Course Code: ICT – Module 3 Page 22 of 77


In data communication, the bandwidth is the amount of
information that can pass through the channel or medium. Engineers
measure digital bandwidth in bits, kilobits, or megabits per second. The
kilohertz of an analog bandwidth and the kilobits per second of digital
bandwidth for the same circuit are not necessarily the same and often
differ greatly.

Noise

In any type of communication, noise is the biggest impairment.


The received signal at the receiver end will consist of transmitted
message plus additional unwanted signal that are inserted somewhere
between transmitter and receiver distorting the message. There are
several types of noise sources, which can abruptly affect the quality of
reception signal. The following are some of them

• Thermal noise: Due to thermal agitation of electrons. Present in all


electronic devices and is the function of temperature.

• Impulse noise: Due to electromagnetic interference (EMI). They may


be present in power lines, or in nature (lightning.. etc)

• Delay distortion: Due to non-uniform velocities of signals of different


frequencies traveling in a guided media. Various frequencies of a
message signal will arrive at different delays resulting in distortion.

The data communication is divided into three types:

 Simplex Communication: It is one-way communication or we


can say that unidirectional communication in which one device
only receives and another device only sends data and devices
uses their entire capacity in transmission. For example, IoT,
entering data using a keyboard, listing music using a speaker, etc.

Course Code: ICT – Module 3 Page 23 of 77


For example, Radio stations and TV broadcasts work as Simplex data
communication. The point to be noted here is that there is no ability by
the receiver to respond to the message in the simplex channel.

 Half Duplex communication: It is a two-way communication or we


can say that it is a bidirectional communication in which both the
devices can send and receive data but not at the same time. When
one device is sending data then another device is only receiving and
vice-versa. For example, walkie-talkie.

For example, if you talk on a CB radio (Citizens band radio), you press
a button and speak. But if the receiver attempts to press the button
and speak at the same time then neither one of you hear either
message. The CB radio system is not capable of sending both ways
simultaneously.

 Full-duplex communication: It is a two-way communication or we


can say that it is a bidirectional communication in which both the
devices can send and receive data at the same time. For example,
mobile phones, landlines, etc.

Modes of transmission

When we talk of data communication we are primarily concerned with


serial transmission although other type of transmission does exists. In
serial transmission the data is transmitted bit by bit as a stream of 0s and
1s. Protocols are implemented for these types of transmissions so that the
communication takes place in a well-defined manner. Protocols are
mutually agreed set of rules and are necessary because the format of
transmission should be understood by the receiver

The following key factors have to be observed regarding serial


transmission:

• Timing problem: There should be some mechanism to know when the


bit has arrived and at what rate the next bit is going to arrive at the serial
input terminal of the receiver. We will see this can be accomplished in two
ways.

• Error detection: Provision should be made (during transmission itself) to


verify the integrity of the received data. Like parity, checksum bits.

• Error correction: Ability to correct the data in case of corrupted data


reception.

Course Code: ICT – Module 3 Page 24 of 77


5.2 Types of Computer Networks Based on Geographical Span

Generally, networks are distinguished based on their geographical


span. A network can be as small as distance between your mobile phone
and its Bluetooth headphone and as large as the internet itself, covering the
whole geographical world.

Personal Area Network


A Personal Area Network (PAN) is smallest network which is very
personal to a user. This may include Bluetooth enabled devices or infra-red
enabled devices. PAN has connectivity range up to 10 meters. PAN may
include wireless computer keyboard and mouse, Bluetooth enabled
headphones, wireless printers and TV remotes.

For example, Piconet is Bluetooth-enabled Personal Area Network


which may contain up to 8 devices connected together in a master-slave
fashion.

Local Area Network


A computer network spanned inside a building and operated under
single administrative system is generally termed as Local Area Network
(LAN). Usually,LAN covers an organization‘ offices, schools, colleges or
universities. Number of systems connected in LAN may vary from as least
as two to as much as 16 million.

Course Code: ICT – Module 3 Page 25 of 77


LAN provides a useful way of sharing the resources between end users.
The resources such as printers, file servers, scanners, and internet are
easily sharable among computers.

LANs are composed of inexpensive networking and routing


equipment. It may contains local servers serving file storage and other
locally shared applications. It mostly operates on private IP addresses and
does not involve heavy routing. LAN works under its own local domain and
controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most
widely employed LAN technology and uses Star topology, while Token-ring
is rarely seen.
LAN can be wired,wireless, or in both forms at once.

Metropolitan Area Network


The Metropolitan Area Network (MAN) generally expands throughout a
city such as cable TV network. It can be in the form of Ethernet,Token-ring,
ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service
enables its users to expand their Local Area Networks. For example, MAN
can help an organization to connect all of its offices in a city.

Course Code: ICT – Module 3 Page 26 of 77


Backbone of MAN is high-capacity and high-speed fiber optics. MAN works
in between Local Area Network and Wide Area Network. MAN provides uplink for
LANs to WANs or internet.

Wide Area Network

As the name suggests, the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks provide
connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.

WAN may use advanced technologies such as Asynchronous Transfer Mode


(ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may be
managed by multiple administrations.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet. The internet hugely connects all
WANs and it can have connection to LANs and Home networks. Internet uses
TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet
is widely implemented using IPv4. Because of shortage of address spaces, it is
gradually migrating from IPv4 to IPv6.

Internet enables its users to share and access enormous amount of


information worldwide. It uses WWW, FTP, email services, audio and video
streaming etc. At huge level, internet works on Client-Server model.

Internet uses very high speed backbone of fiber optics. To inter-connect


various continents, fibers are laid under sea known to us as submarine
communication cable.

 worksheet can be added in a single MS Excel fi


Course Code: ICT – Module 3 Page 27 of 77
Internet is widely deployed on World Wide Web services using HTML
linked pages and is accessible by client software known as Web Browsers.
When a user requests a page using some web browser located on some Web
Server anywhere in the world, the Web Server responds with the proper
HTML page. The communication delay is very low.Internet is serving many
proposes and is involved in many aspects of life. Some of them are:

 Web sites
 E-mail
 Instant Messaging
 Blogging
 Social Media
 Marketing
 Networking
 Resource Sharing
 Audio and Video Streaming

Network LAN Technologies

Let us go through various LAN technologies in brief:

Ethernet

Ethernet is a widely deployed LAN technology. This technology was


invented by Bob Metcalfe and D.R. Boggs in the year 1970. It was
standardized in IEEE 802.3 in 1980.

Ethernet shares media. Network which uses shared media has high
probability of data collision. Ethernet uses Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect collisions. On the
occurrence of collision in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data.

Ethernet connector is network interface card equipped with 48-bits


MAC address. This helps other Ethernet devices to identify and communicate
with remote devices in Ethernet.

Traditional Ethernet uses 10BASE-T specifications. The number 10


depicts 10MBPS speed, BASE stands for baseband, and T stands for Thick
Ethernet. 10BASE-T Ethernet provides transmission speed up to 10MBPS
and uses coaxial cable or Cat-5 twisted pair cable with RJ-45 connector.
Ethernet follows star topology with segment length up to 100 meters. All
devices are connected to a hub/switch in a star fashion.

Course Code: ICT – Module 3 Page 28 of 77


Fast-Ethernet
To encompass need of fast emerging software and hardware
technologies, Ethernet extends itself as Fast-Ethernet. It can run on UTP,
Optical Fiber, and wirelessly too. It can provide speed up to 100 MBPS.
This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted
pair cable. It uses CSMA/CD technique for wired media sharing among the
Ethernet hosts and CSMA/CA (CA stands for Collision Avoidance)
technique for wireless Ethernet LAN.

Fast Ethernet on fiber is defined under 100BASE-FX standard which


provides speed up to 100 MBPS on fiber. Ethernet over fiber can be
extended up to 100 meters in half-duplex mode and can reach maximum of
2000 meters in full-duplex over multimode fibers.

Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high
speed status only for 3 years till Giga-Ethernet introduced. Giga-Ethernet
provides speed up to 1000 mbits/seconds. IEEE802.3ab standardize Giga-
Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah
defines Giga-Ethernet over Fiber.

Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared
media in Ethernet create one single Broadcast domain and one single
Collision domain. Introduction of switches to Ethernet has removed single
collision domain issue and each device connected to switch works in its
separate collision domain. But even Switches cannot divide a network into
separate Broadcast domains.

Virtual LAN is a solution to divide a single Broadcast domain into


multiple Broadcast domains. Host in one VLAN cannot speak to a host in
another. By default, all hosts are placed into the same VLAN.

Course Code: ICT – Module 3 Page 29 of 77


In this diagram, different VLANs are depicted in different color
codes. Hosts in one VLAN, even if connected on the same Switch cannot
see or speak to other hosts in different VLANs. VLAN is Layer-2 technology
which works closely on Ethernet. To route packets between two different
VLANs a Layer-3 device such as Router is required.

5.2 Computer network devices — network linking devices


and communication media
Computer Network
Networking devices are the hardware devices used to connect
mobiles, computers, printers, and other electronic devices to a
network. Here, data is transferred via a fast and secure path.
Computer network devices help in receiving and
transmitting HART data. These are like nodes in the middle of a
wireless mesh network and play a key role in network creation
and maintenance.
Network devices are a combination of inter-network and
intra-network devices. Inter network devices, such as a NIC card
or an RJ45 connector, are mounted within the device.
On the other hand, intra-network devices, such as
routers and switches, are internal components of the network.
Let‘s inspect a few of these gadgets.

Purpose of Networking Devices

When there are a large number of devices in a network, too many


data packets get transmitted over the same network path. This can lead to
congestion and degradation in performance.
The purpose of networking devices is to enable smooth
communication between different hardware connected to a network.
Addition of a network device helps in hassle free sharing of network
resources between different systems.
While computer network devices like hubs send network data to all
connected devices, intelligent network devices like routers not only have a
fixed source and destination system but they also choose the most efficient
route to transmit data.

What is Network Management?


Network management is a system that manages and operates
multiple networks within a system. A combination of software and hardware
is used in network management systems to gather and analyze data and
push out configuration changes to improve performance, reliability, and
security.

Course Code: ICT – Module 3 Page 30 of 77


Types of Network Devices

 Repeater
It extends the length of the signal and allows it to transmit over the same
network. In other words, it simply copies the signal bit by bit and re-
generates at its original strength by operating at the physical layer.

 Network Hub
A network hub is a multiport repeater that connects multiple wires from
different branches. It is used to transfer important data and communicate
among diverse network hosts.

Hub transfers the data as packets through a computer network. When the
data processing is done from one host to another network hub, it gets
transmitted to all the connected ports.

Course Code: ICT – Module 3 Page 31 of 77


There are three different types of network hubs:

1. Active Hub-Active network hub is used to clean, increase & transfer


the signal using the network on its own power supply. It works as a
wiring center and repeater. These hubs play a major role in
expanding the distance between nodes.
2. Passive Hub-Passive network hub is used to collect wiring from the
different power supplies and nodes of an active hub. These hubs
transmit the signals over the network without advancing or cleaning
them.
3. Intelligent Hub-Intelligent network hub is like an active hub. It
includes remote management capabilities and offers flexible data
rates to network devices. It also enables admin access to monitor
the traffic on the hub and configure every port in the hub.

 Bridge
A bridge is a device that joins any two networks or host segments together.
Its primary function in a networking architecture is to store and relay frames
among the various connected segments.

They transfer frames using the MAC or the Media Access Control. It can
also prevent data crossing if the MAC addresses are wrong. Besides, it also
links different physical LANs together to form a bigger logical LAN.

There are two types of Bridges:

o Transparent Bridges-These are the bridges in which the stations are


completely unaware of whether a bridge is present or absent from
the network.

o Source Routing Bridges-In the source bridges, routing operation is


performed, and the frame specifies the path that needs to be
followed.

 Network Switch
Switches play a more important role than hubs. A switch is a multi-port
device that enhances network efficiency. It provides limited routing
information about nodes in the internal network and allows systems to
connect.

Network switches can read the hardware address of incoming data packets
and transmit them to the applicable destination. A multilayer switch is a
high-performance device that supports routing protocols like routers.

 Modem

Course Code: ICT – Module 3 Page 32 of 77


Modems are devices that transform digital signals into the form of analog
signals that are of various frequencies. Then it sends the analog signals to
receivers.

Afterward, receiver modems reverse the process and send a digital signal
to linked devices like phones and laptops. Telephone companies and cable
operators sometimes use modems as the end terminals to identify
residential and business customers.

 Gateway
As the name suggests, the gateway is a passage that interlinks two
networks together. It works as the messenger agent that takes data from
one system, interprets it, and transfers it to another system. Gateways are
also called protocol converters, and they can operate at various network
layers.

 Access Point
First, as a regular wired network for wireless devices. Second, like a router
for transferring data between different access points.

The AP has various ports to expand the network‘s size, firewall capabilities,
and DHCP service. As a result, we have access points that act as a switch,
DHCP server, router, and firewall.

Key Components of Networking Devices


Computer Network devices include the following components:

 Field Interfaces
Field interfaces comprise programmable controllers and field devices
like sensors and actuators. The field interface establishes communications
between these two components. Such communication is necessary for real-
time control and automation of various controllers and visualization stations.

 Management Interfaces
Management interfaces are network interfaces dedicated mainly to
configuration and network management operations. They are usually
connected to specially dedicated band management networks like VPNs or
other physical networks.

 Network Management Architecture


A network management architecture is necessary to establish an
efficient and well-functional networking system. It comprises several
components, including Network Change and Configuration Management
(NCCM) and Event Collection and Management System (ECMS).

The ultimate function of network management architecture is to provide

Course Code: ICT – Module 3 Page 33 of 77


tools to the network administrators for monitoring the functionality of
network devices.

Importance of Intelligent Network Device Management

The primary aim of network device management is to ensure that


your network infrastructure runs effortlessly. Computer network devices
mentioned above build a network structure for your workplace. However,
integrating an Intelligent Network Device Management can keep the
network stable.

Let‘s understand in detail how network device management can enhance


your networking performance.

 Optimized Device Management


Intelligent Network Device Management is used to optimize
networks using tools that automatically examine the network for current
data and new devices. Instead of maintaining multiple excel sheets or
manually feeding information into device management software, users can
automatically receive a display update of network devices and their status.

Course Code: ICT – Module 3 Page 34 of 77


It also shows the current version of the firmware and specifies if
devices need an update. Further use of dashboards, maps, and reports
makes network information more concise.

 Service and Maintenance


Network device management is crucial in the service and
maintenance of a network. It offers a status overview and real-time
database information that helps make better maintenance plans. Based on
the feed from the database, users can plan maintenance from one central
location and prepare device swaps in advance.

In case of emergency, you can troubleshoot all devices remotely. When the
information is centralized, error management becomes a lot easier.

 Prompt Error Notifications


Network device management sends an error message on the dashboard,
email, or SMS in case of device failure. This intimation saves you from the
hassle of checking your devices individually.

Once you get the error notification, you can immediately rectify the
issue and save your company from network downtime and subsequent
losses.

 Segregation and Isolation


With intelligent network device management, you can limit access to an
intruder in case of a breach through identification and isolation of the
infected device.

Monitoring helps in timely detection of threats and systematic segregation


of devices on the network helps in isolation.

 Security and Stability


Network device management software helps determine if ports are
open or your firmware is outdated. It can also identify suspicious traffic,
network congestion, capacity, or other bottlenecks.

Alternative paths are important to maintain the stability of a network.


The network device mapping and their connections are helpful to
establishing such alternative paths so that you don‘t suffer from device
malfunctions or loss in productivity.

Course Code: ICT – Module 3 Page 35 of 77


5.3 Types of network topologies

Computer Network Topologies


A Network Topology is the arrangement with which computer
systems or network devices are connected to each other. Topologies may
define both physical and logical aspect of the network. Both logical and
physical topologies could be same or different in a same network.

Point-to-Point

Point-to-point networks contains exactly two hosts such as


computer, switches or routers, servers connected back to back using a
single piece of cable. Often, the receiving end of one host is connected to
sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have


multiple intermediate devices. But the end hosts are unaware of underlying
network and see each other as if they are connected directly.

Bus Topology

In case of Bus topology, all devices share single communication line or


cable. Bus topology may have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses CSMA/CD technology
or recognizes one host as Bus Master to solve the issue. It is one of the
simple forms of networking where a failure of a device does not affect the
other devices. But failure of the shared communication line can make all
other devices stop functioning.

Course Code: ICT – Module 3 Page 36 of 77


Both ends of the shared channel have line terminator. The data is
sent in only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.

Star Topology
All hosts in Star topology are connected to a central device, known
as hub device, using a point-to-point connection. That is, there exists a
point to point connection between hosts and hub. The hub device can be
any of the following:

• Layer-1 device such as hub or repeater


• Layer-2 device such as switch or bridge
• Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of failure. If hub fails,


connectivity of all hosts to all other hosts fails. Every communication
between hosts, takes place through only the hub.Star topology is not
expensive as to connect one more host, only one cable is required and
configuration is simple.

Ring Topology

In ring topology, each host machine connects to exactly two other


machines, creating a circular network structure. When one host tries to
communicate or send message to a host which is not adjacent to it, the
data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.

Course Code: ICT – Module 3 Page 37 of 77


Failure of any host results in failure of the whole ring. Thus, every
connection in the ring is a point of failure. There are methods which employ
one more backup ring.

Mesh Topology

In this type of topology, a host is connected to one or multiple hosts.


This topology has hosts in point-to-point connection with every other host or
may also have hosts which are in point-to-point connection to few hosts
only.

Hosts in Mesh topology also work as relay for other hosts which do
not have direct point-to-point links.

Mesh technology comes into two types:

 Full Mesh: All hosts have a point-to-point connection to every


other host in the network. Thus for every new host n(n-1)/2

Course Code: ICT – Module 3 Page 38 of 77


connections are required. It provides the most reliable
network structure among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection
to every other host. Hosts connect to each other in some
arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Tree Topology

Also known as Hierarchical Topology, this is the most common form


of network topology in use presently. This topology imitates as extended
Star topology and inherits properties of bus topology.

This topology divides the network in to multiple levels/layers of


network. Mainly in LANs, a network is bifurcated into three types of network
devices. The lowermost is access-layer where computers are attached. The
middle layer is known as distribution layer, which works as mediator
between upper layer and lower layer. The highest layer is known as core
layer, and is central point of the network, i.e. root of the tree from which all
nodes fork.

All neighboring hosts have point-to-point connection between them.


Similar to the Bus topology, if the root goes down, then the entire network
suffers even though it is not the single point of failure. Every connection
serves as point of failure, failing of which divides the network into
unreachable segment.

Daisy Chain

Course Code: ICT – Module 3 Page 39 of 77


This topology connects all the hosts in a linear fashion. Similar to
Ring topology, all hosts are connected to two hosts only, except the end
hosts. Means, if the end hosts in daisy chain are connected then it
represents Ring topology.

Each link in daisy chain topology represents single point of failure.


Every link failure splits the network into two segments. Every intermediate
host works as relay for its immediate hosts.

Hybrid Topology

A network structure whose design contains more than one topology


is said to be hybrid topology. Hybrid topology inherits merits and demerits of
all the incorporating topologies.

The above picture represents an arbitrarily hybrid topology. The


combining topologies may contain attributes of Star, Ring, Bus, and Daisy-
chain topologies. Most WANs are connected by means of Dual-Ring
topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology

Course Code: ICT – Module 3 Page 40 of 77


5.4 Communication technologies

What Is Communication Technology?


Communication technology (CT) is the use of technological tools
and devices to facilitate communication. This can include everything from
email and text messaging to video conferencing and social media.

CT can be used to communicate with people around the world in


real-time or to send messages and information instantaneously. It has
revolutionized the way we work, play, and interact with one another.
Whether we are using it to stay in touch with friends and family or to
connect with colleagues and clients, CT has become an essential part of
our lives.

How Does Communication Technology Work?


There are a few key components that make communication technology
work. These include:

 A sender: the person who creates and sends the message


 A receiver: the person who receives and interprets the message
 A channel: the medium through which the message is sent (e.g.,
email, text, phone call, etc.)
 A message: the information that is being communicated

The sender encodes the message into a format that can be sent
through the chosen channel. The receiver then decodes the message and
interprets its meaning. In order for communication to be effective, both the
sender and the receiver must be on the same page regarding the message
and its interpretation.

Different Types of Communication Technologies


There are a variety of communication channels that can be used,
each with its own advantages and disadvantages. The most popular
channels include:

 Telephone
The telephone is one of the oldest and most commonly used
communication technologies. It is one of the most important inventions of
the modern era. Not only does it allow us to communicate with others at a
distance, but it also conveys electrical messages over wires. This means
that instead of staccato clicks, which need the training to interpret,
telephone cables can transport genuine speech sounds.

This technology has revolutionized communication, making it possible


for people all over the world to connect instantly. It is hard to overestimate
the importance of the telephone in the modern world. It is a quick and easy

Course Code: ICT – Module 3 Page 41 of 77


way to send and receive information. However, it can be expensive to use
long-distance, and there is always the possibility of dropped calls or poor
reception.

 Fax machine
The fax machine was once the primary method of sending documents
electronically. A fax machine is a machine that uses a telephone line to
send and receive documents.
The sender places the document to be faxed in the machine, dials the
number of the fax machine at the receiving end, and the document is
transmitted over the phone line. At the receiving end, the fax machine prints
out the document.
Fax machines are commonly used to send and receive business
documents, such as contracts, invoices, and reports. They are also
occasionally used to send personal documents, such as letters and family
photos. Fax machines have been around for several decades and are still in
use today, although their popularity has declined in recent years with the
advent of email and other digital communication methods.

Faxes can be sent and received quickly and easily, but they can be
costly to use long-distance. In addition, fax machines require a dedicated
phone line, which can be an issue for small businesses or home offices.

 Radio
Radio is a communication technology that uses electromagnetic
waves to transmit sound. It is one of the earliest forms of wireless
communication. Radio waves are used to carry signals from one place to
another, and they can travel long distances.

Radio was first used for communication in the late 1800s, and it
quickly became a popular way to send and receive information. Radio is still
widely used today, both for commercial purposes and for personal use. It is
an effective way to communicate over long distances, but it can be
expensive to set up and maintain a radio station.

 Television
Television is a broadcast medium that uses electromagnetic waves to
transmit moving images and sound. Television signals are typically
transmitted via satellite, cable, or over-the-air broadcasting.

Television was first developed in the early 1900s, and it has become
one of the most popular forms of entertainment and information in the
world. Television is an effective way to reach a large audience with a
message or story. However, it can be expensive to produce quality
television programming, and there is always the risk that viewers will
change the channel if they are not interested in what is being shown.

Course Code: ICT – Module 3 Page 42 of 77


 VoIP
VoIP (Voice over Internet Protocol) is a type of telecommunications that
allows users to make and receive phone calls using the internet instead of a
traditional phone line. VoIP can be used for personal or business purposes.

For example, VoIP can be used to make international calls, which can
be much cheaper than traditional phone calls. VoIP can also be used to set
up a virtual office, which can be a convenient and cost-effective way to run
a business.

VoIP has many benefits, but it also has some drawbacks. For example,
VoIP calls can be prone to dropped calls or choppy audio quality.
Additionally, VoIP requires a reliable internet connection, which may not be
available in all areas. Despite these challenges, VoIP remains a popular
and essential communication tool for many businesses.

 Teleconferencing
Teleconferencing is a type of telecommunications that allows users to
communicate with each other using audio only. Teleconferencing can be
used for personal or business purposes.
For example, teleconferencing can be used to hold meetings with
colleagues or clients who are located in different parts of the world. It can
also be used to conduct job interviews, give presentations, or provide
training.
Teleconferencing has many benefits, but it also has some drawbacks.
For example, it can be difficult to schedule teleconferences, due to time
zone differences. Additionally, teleconferences can be less personal than
video conferences or in-person meetings. Despite these challenges,
teleconferencing remains a popular and essential communication tool for
many businesses.

 Email
Email is a widely used communication tool that allows people to send
and receive messages electronically, especially in the business world.
Email allows users to send and receive messages from anywhere in the
world, at any time of day.
Email messages can be short or long, and can include attachments
such as documents, images, and videos. Email is an efficient way to
communicate with friends, family, colleagues, and business contacts. It is
also a convenient way to stay up-to-date on current events, news, and other
information.
Email has many benefits, but it also has some drawbacks. For example,
email can be used to send spam or unwanted messages. It can also be
used to spread viruses and other malicious software. Despite these risks,
email remains a popular and essential communication tool for millions of

Course Code: ICT – Module 3 Page 43 of 77


people around the world.

 Text messaging
Text messaging, also known as SMS (short message service), is a
popular way to communicate, especially among young people. Text
messages are sent and received using a mobile phone. They are typically
shorter than email messages, and can only include text, not images or
videos.
Text messaging is fast, convenient, and relatively inexpensive. It is
often used for informal communication, such as sending a quick message
to a friend or family member. However, it can also be used for business
purposes, such as sending reminders or updates to employees.
Text messaging has become so popular that some people have
started to use it as a replacement for email and other forms of
communication. This has led to concerns about the potential negative
effects of text messaging, such as distraction, addiction, and poor grammar.
Despite these concerns, text messaging remains a popular way to
communicate, both in personal and professional settings.

 Instant messaging
Making voice calls is just not enough anymore in today‘s daily activities.
Businesses must learn to adapt to this by grabbing the advantages a real-
time chat can give. Instant messaging (IM) is a real-time communication
tool that allows users to send and receive messages online. IM messages
are typically shorter than email messages and can include text, images,
videos, and other media.
IM is fast, convenient, and relatively inexpensive. It is often used for
informal communication, such as sending a quick message to a friend or
family member. However, it can also be used for business purposes, such
as sending reminders or updates to employees.
Customers will surely appreciate not waiting for someone to talk to
when making a voice call. They can do something else while waiting for a
response while chatting. Even employees of a company can benefit from
having an internal chatting platform.
IM has become so popular that some people have started to use it as a
replacement for email and other forms of communication. This has led to
concerns about the potential negative effects of IM, such as distraction,
addiction, and poor grammar. Despite these concerns, IM remains a
popular way to communicate, both in personal and professional settings.

 Video Calling
Nowadays, video calling is becoming more popular than voice calls
because it provides an efficient way to communicate with friends, family
members, and colleagues without having to be in the same room or even
country.
With video calling, people can see the person they are talking to

Course Code: ICT – Module 3 Page 44 of 77


instead of just hearing their voice. This can be helpful for many reasons,
such as getting feedback on a project or simply catching up with someone‘s
day-to-day activities.
Companies can benefit from utilizing this type of technology. Deals
and transactions could be made without leaving the office. There‘s no need
to take those expensive business trips anymore.
A company executive can talk with his counterpart from another
country and close a business deal effectively, just like a face-to-face
meeting would do. Also, multiple parties from different places can be
accommodated in a single video calling session. Imagine how productive
that could be.
Video calling has many benefits, but it also has some drawbacks.
For example, it can be expensive if used regularly. It can also be difficult to
use if the internet connection is poor or if the other person‘s device does not
have a camera installed. Despite these risks, video calling remains a
popular and essential communication tool for many people around the
world.
 Video conferencing
Video conferencing is a type of telecommunications that allows
users to communicate with each other using audio and video. Video
conferencing can be used for personal or business purposes.
For example, video conferencing can be used to hold face-to-face
meetings with colleagues or clients who are located in different parts of the
world. It can also be used to conduct job interviews, give presentations, or
provide training.
Video conferencing has many benefits, but it also has some
drawbacks. For example, it can be expensive to set up and maintain a
video conferencing system. It can also be difficult to schedule video
conferences, due to time zone differences. Despite these challenges, video
conferencing remains a popular and essential communication tool for many
businesses.

 Social media
Social media is a category of online communication platforms that
allow users to share content, connect with friends and acquaintances, and
engage in other online activities. Social media platforms include Facebook,
Twitter, Instagram, Snapchat, and LinkedIn.
Social media has revolutionized communication, making it possible
for people all over the world to connect instantly. It is a quick and easy way
to share information and stay up-to-date on what is happening in the world.
However, social media can also be a source of misinformation, and it can
be addictive.

 Project management software


Project management software is a type of computer program that
helps people plan, track, and organize tasks and projects. Slack and Trello

Course Code: ICT – Module 3 Page 45 of 77


are two popular examples of project management software.
Project management software is commonly used by businesses to
help team members collaborate on tasks and projects. It is a quick and
easy way to communicate with others and stay organized. However, project
management software can be expensive to purchase and maintain, and it
can be challenging to learn how to use all of the features.

 Blog and vlog


A blog is a type of website that typically contains text, images, and
videos. Blogs are usually maintained by an individual or a small group of
people.
Vlogs (video blogs) are a type of blog that consists primarily of
videos. Vloggers often film themselves talking about their day-to-day lives,
thoughts, and experiences.
Blogs and vlogs are popular because they are easy to create and
maintain. They are also a great way to connect with others who have similar
interests. However, blogging and vlogging can be time-consuming, and it
can be difficult to stand out in the crowded online space.

 Live video streaming


Live video is a fairly new concept that has taken the internet by
storm. It allows content creators to connect with their audience in real-time,
providing an authentic and immediate experience.
This type of content is highly engaging, as it feels more personal
and intimate than pre-recorded videos. In addition, live video is unedited
and unscripted, giving viewers a sense of authenticity and transparency.
Gamers have taken advantage of live video streaming to share their
gaming experiences with the world. Platforms like Twitch allow gamers to
stream their gameplay live, and sometimes for hours on end.
This has become incredibly popular, as it allows gamers to connect
with other gamers and share tips and tricks. It also allows viewers to get a
behind-the-scenes look at how video games are made.
While live streaming does have its advantages, it also presents
some challenges. For example, live video can be unpredictable and chaotic,
which can be off-putting for some viewers. Additionally, if something goes
wrong during a live broadcast, there is no way to edit it out or start over.
Despite these challenges, live video is a popular vlogging extension that
continues to grow in popularity.

 Mobile Technology
Using mobile technology to its full potential could make a business
grow and expand much faster. Almost everyone uses their mobile phones
not only for communication but also for paying bills, shopping, banking,
watching the news, etc. Businesses should employ the use of applications
to promote their products or services to their target customers.
By utilizing the full potential of this rapidly growing industry,

Course Code: ICT – Module 3 Page 46 of 77


businesses can expand and grow at an unprecedented rate. As mobile
technology continues to develop, businesses will have ever-greater
opportunities to reach their target audiences. Through the use of
applications, businesses can promote their products and services directly to
consumers‘ mobile devices. In an increasingly competitive marketplace,
those businesses that embrace mobile technology will be well positioned to
succeed.

 Wearable devices
A lot of industries benefit from wearing devices that can be used for
communicating and even to store retrievable information as well. Just take
a look at those delivery guys that brought you the food that you ordered.
Those people are using wearable technology like smart watches or
even just through their mobile phones, which use GPS technology to be
able to get to your house. It‘s a breakthrough for businesses to provide
delivery service to their customers.

 The Internet
The Internet has become an essential part of communication
technology. It allows people to connect on a global scale, and it has
revolutionized the way we communicate.
The Internet has made it possible for us to communicate with anyone,
anywhere in the world, and it has given us access to a wealth of
information. In addition, it has allowed us to communicate in ways that were
once impossible. For example, we can now communicate through text,
audio, and video.
The Internet has also changed the way we do business. It has allowed
us to conduct transactions electronically, and it has given us access to a
global marketplace. As a result, businesses can now reach a larger
audience than ever before.
The Internet has had a profound impact on our lives, and it is likely to
have even more impact in the years to come. It is changing the way we live
and work, and it is paving the way for a new era of communication.

5.5 Protocol and OSI model

What is OSI Model?


The OSI Model is a logical and conceptual model that defines
network communication used by systems open to interconnection and
communication with other systems. The Open System Interconnection (OSI
Model) also defines a logical network and effectively describes computer
packet transfer by using various layers of protocols.

Characteristics of OSI Model


Here are some important characteristics of the OSI model:

Course Code: ICT – Module 3 Page 47 of 77


 A layer should only be created where the definite levels of
abstraction are needed.
 The function of each layer should be selected as per the
internationally standardized protocols.
 The number of layers should be large so that separate functions
should not be put in the same layer. At the same time, it should be
small enough so that architecture doesn‘t become very complicated.
 In the OSI model, each layer relies on the next lower layer to
perform primitive functions. Every level should able to provide
services to the next higher layer
 Changes made in one layer should not need changes in other
lavers.

History of OSI Model


Here are essential landmarks from the history of OSI model:

 In the late 1970s, the ISO conducted a program to develop general


standards and methods of networking.
 In 1973, an Experimental Packet Switched System in the UK
identified the requirement for defining the higher-level protocols.
 In the year 1983, OSI model was initially intended to be a detailed
specification of actual interfaces.
 In 1984, the OSI architecture was formally adopted by ISO as an
international standard

7 Layers of the OSI Model


OSI model is a layered server architecture system in which each
layer is defined according to a specific function to perform. All these seven
layers work collaboratively to transmit the data from one layer to another.

 The Upper Layers: It deals with application issues and mostly


implemented only in software. The highest is closest to the end
system user. In this layer, communication from one end-user to
another begins by using the interaction between the application
layer. It will process all the way to end-user.
 The Lower Layers: These layers handle activities related to data
transport. The physical layer and datalink layers also implemented in
software and hardware.
Upper and Lower layers further divide network architecture into seven
different layers as below

 Application
 Presentation
 Session
 Transport
 Network, Data-link

Course Code: ICT – Module 3 Page 48 of 77


 Physical layers

Let‘s Study each layer in detail:

 Physical Layer
The physical layer helps you to define the electrical and physical
specifications of the data connection. This level establishes the relationship
between a device and a physical transmission medium. The physical layer
is not concerned with protocols or other such higher-layer items.
Examples of hardware in the physical layer are network adapters,
ethernet, repeaters, networking hubs, etc.

 Data Link Layer:


Data link layer corrects errors which can occur at the physical layer. The
layer allows you to define the protocol to establish and terminates a
connection between two connected network devices.

It is IP address understandable layer, which helps you to define logical


addressing so that any endpoint should be identified.

The layer also helps you implement routing of packets through a


network. It helps you to define the best path, which allows you to take data
from the source to the destination.

The data link layer is subdivided into two types of sub layers:

1. Media Access Control (MAC) layer- It is responsible for controlling


how device in a network gain access to medium and permits to

Course Code: ICT – Module 3 Page 49 of 77


transmit data.
2. Logical link control layer- This layer is responsible for identity and
encapsulating network-layer protocols and allows you to find the
error.

Important Functions of Data link Layer:


 Framing which divides the data from Network layer into frames.
 Allows you to add header to the frame to define the physical
address of the source and the destination machine
 Adds Logical addresses of the sender and receivers
 It is also responsible for the sourcing process to the destination
process delivery of the entire message.
 It also offers a system for error control in which it detects retransmits
damage or lost frames.
 Data link layer also provides a mechanism to transmit data over
independent networks which are linked together.

 Transport Layer:
The transport layer builds on the network layer to provide data transport
from a process on a source machine to a process on a destination machine.
It is hosted using single or multiple networks, and also maintains the quality
of service functions.
It determines how much data should be sent where and at what rate.
This layer builds on the message which are received from the application
layer. It helps ensure that data units are delivered error-free and in
sequence.
Transport layer helps you to control the reliability of a link through flow
control, error control, and segmentation or desegmentation.
The transport layer also offers an acknowledgment of the successful
data transmission and sends the next data in case no errors occurred. TCP
is the best-known example of the transport layer.

Important functions of Transport Layers:


 It divides the message received from the session layer into
segments and numbers them to make a sequence.
 Transport layer makes sure that the message is delivered to the
correct process on the destination machine.
 It also makes sure that the entire message arrives without any error
else it should be retransmitted.

 Network Layer:
The network layer provides the functional and procedural means of
transferring variable length data sequences from one node to another
connected in ―different networks‖.

Course Code: ICT – Module 3 Page 50 of 77


Message delivery at the network layer does not give any guaranteed to be
reliable network layer protocol.

Layer-management protocols that belong to the network layer are:

1. routing protocols
2. multicast group management
3. network-layer address assignment.

 Session Layer
Session Layer controls the dialogues between computers. It helps you
to establish starting and terminating the connections between the local and
remote application.
This layer request for a logical connection which should be established
on end user‘s requirement. This layer handles all the important log-on or
password validation.
Session layer offers services like dialog discipline, which can be duplex
or half-duplex. It is mostly implemented in application environments that use
remote procedure calls.

Important function of Session Layer:


 It establishes, maintains, and ends a session.
 Session layer enables two systems to enter into a dialog
 It also allows a process to add a checkpoint to steam of data.
 Presentation Layer
 Presentation layer allows you to define the form in which the data is
to exchange between the two communicating entities. It also helps
you to handles data compression and data encryption.
This layer transforms data into the form which is accepted by the
application. It also formats and encrypts data which should be sent across
all the networks. This layer is also known as a syntax layer.

The function of Presentation Layers:


 Character code translation from ASCII to EBCDIC.
 Data compression: Allows to reduce the number of bits that needs to
be transmitted on the network.
 Data encryption: Helps you to encrypt data for security purposes —
for example, password encryption.
 It provides a user interface and support for services like email and
file transfer.

 Application Layer
Application layer interacts with an application program, which is the
highest level of OSI model. The application layer is the OSI layer, which is
closest to the end-user. It means OSI application layer allows users to
interact with other software application.

Course Code: ICT – Module 3 Page 51 of 77


Application layer interacts with software applications to implement a
communicating component. The interpretation of data by the application
program is always outside the scope of the OSI model.
Example of the application layer is an application such as file transfer,
email, remote login, etc.

The function of the Application Layers are:


 Application-layer helps you to identify communication partners,
determining resource availability, and synchronizing communication.
 It allows users to log on to a remote host
 This layer provides various e-mail services
 This application offers distributed database sources and access for
global information about various objects and services.

Interaction Between OSI Model Layers


Information sent from a one computer application to another needs
to pass through each of the OSI layers.
This is explained in the below-given example:

Every layer within an OSI model communicates with the other two
layers which are below it and its peer layer in some another networked
computing system.
In the below-given diagram, you can see that the data link layer of the first
system communicates with two layers, the network layer and the physical
layer of the system. It also helps you to communicate with the data link
layer of, the second system.

Protocols supported at various levels

Course Code: ICT – Module 3 Page 52 of 77


Differences between OSI & TCP/IP

Here, are some important differences between the OSI & TCP/IP
model:

Course Code: ICT – Module 3 Page 53 of 77


Advantages of the OSI Model
Here, are major benefits/pros of using the OSI model:

 It helps you to standardize router, switch, motherboard, and other


hardware
 Reduces complexity and standardizes interfaces
 Facilitates modular engineering
 Helps you to ensure interoperable technology
 Helps you to accelerate the evolution
 Protocols can be replaced by new protocols when technology
changes.
 Provide support for connection-oriented services as well as
connectionless service.
 It is a standard model in computer networking.
 Supports connectionless and connection-oriented services.
 Offers flexibility to adapt to various types of protocols

Disadvantages of the OSI Model


Here are some cons/ drawbacks of using OSI Model:

 Fitting of protocols is a tedious task.


 You can only use it as a reference model.
 Doesn‘t define any specific protocol.
 In the OSI network layer model, some services are duplicated in
many layers such as the transport and data link layers
 Layers can‘t work in parallel as each layer need to wait to obtain
data from the previous layer.

Summary
 The OSI Model is a logical and conceptual model that defines
network communication which is used by systems open to
interconnection and communication with other systems
 In OSI model, layer should only be created where the definite levels
of abstraction are needed.
 OSI layer helps you to understand communication over a network
 In 1984, the OSI architecture was formally adopted by ISO as an
international standard

5.6 Shipboard computer network and internet access

A digital shipping industry means computer networks are vital to your


performance. Here‘s an introduction to how they work, and what to consider
when you design them.

Course Code: ICT – Module 3 Page 54 of 77


Though surrounded by water, computer networks on board vessels are
similar to those found in any other industrial environment, like factories or
airplanes. But there are some maritime-specific considerations you need to
make. This article will address those.

Our goal is for you to know what matters at sea, so that you know what to
consider for your digital infrastructure. Once installed, it will be with you for
years, so it‘s important to get it right.

First, we‘ll look at what a basic computer network on a ship might consist
of. Then we‘ll talk about what sort of hardware you should opt for at sea.

The key components of the ship’s IT network


Vessels come in all shapes and sizes. So do their computer networks.

What follows is a run-through of the core components on which all onboard


computer networks are based.

Above: A simplified computer network, including a selection of peripherals


(marked in white).

Modem
Assuming the vessel has an Internet connection, the first device on
the network is the modem. Vessels can connect to the internet via different
platforms (usually 4G/5G or satellite), but they all require a modem.

Router
The router does two things:

1. It enables the local network to share a single Internet connection (from


the modem).

2. The router creates a subnet. The router does this by assigning names (IP
addresses) to every unit on the local network (LAN). Once each unit is
given a unique name, the router can route the traffic to and from them.

Course Code: ICT – Module 3 Page 55 of 77


Switch
Once the router has established the network and assigned names to the
connected units, the switch physically directs traffic within the local network.
Another way to look at it: The router connects your network to other
networks. The switch connects units within your network.

Example: If you‘re in Japan and want to send a message via email to your
colleague in the UK, the router will direct it towards your overseas
colleague. But if you wish to print the same text from the printer on your
local network, the message will find its way there via the switch.

Computer applications in sailing ships - Modern Technology on board


ships

Above: Connecting your Local Area Network (LAN) to a Wide Area Network
(WAN) / the Internet.

Server
As the name suggests, the server serves its users by providing
access to shared resources like the network operating system, applications,
and data. It also processes data from sensors and devices, such as CCTV
cameras or sonars, before forwarding it to the appropriate output units
(monitors).

Clients (users)
The units that allow you to access and use the network are known as
clients. These include laptops, computers, cell phones and PLCs. All clients
have processing power and can send and/or receive data to/from the
network. Clients have unique IP addresses.

Cables/wires
Data passes through the network via cables, also referred to as wires.
Common examples are coaxial cables and fiberoptic cables. Today, most
networks consist of a combination of hardwired and wireless connections.

Peripherals
We divide peripherals into three categories:

1. Input devices
2. Output devices
3. Storage devices

- Input devices include cameras, keyboards, mouses and sensors.


Output devices include monitors, printers, and speakers. Storage
devices can be anything from hard drives to USB memory sticks.

Course Code: ICT – Module 3 Page 56 of 77


- Peripherals aren‘t technically part of the network, but you can‘t use
the network without them. The whole point of a network is to send
and/or receive data, which requires inputs and outputs.

The illustration further up presents a selection of peripherals in the


context of the computer network.

The marine environment calls for rugged hardware


Cyber security must be top of mind when you design a computer
network for a vessel. The same goes for the mechanical integrity of your
components.

While a computer network on board a ship is principally the same as


one on land, the surrounding environment is quite different. On land, you‘re
usually at liberty to optimize the surroundings. On board a vessel, there are
unique challenges:

 Temperature differences, moisture, and vibrations.


 Redundancy for critical systems like propulsion or air compressors.
 Complete darkness: Monitors ought to be dimmable down to a
minimum to preserve your night vision.
 Space restrictions: Close proximity between units means they need
shielding from electro-magnetic radiation.
 And the list goes on. The sea offers up a complex, non-ideal
environment for IT technology. For that reason, it‘s paramount that
your network hardware is ruggedized and tested for marine
applications.

How is Internet Provided on Ships?

The most common mode of providing internet on ships is through


satellite. Providing a direct connection with the satellite services through
some hardware installations on the ship, easy access to internet can be
provided for all the on boarders.

Satellite communications
Few ship operators or their crews are concerned with the high
science and engineering of the satellites themselves, but they do need to
understand the fundamentals of satellite communications and the radio
spectrum.

In essence, a satellite is an intermediate device that enables

Course Code: ICT – Module 3 Page 57 of 77


transmission of data to a ship or receiving data from a ship regardless of
the different positions on the surface of the globe of the two parties. The
other party can be a shore office or another ship. All satellites make use of
a beam, which is a pattern of electromagnetic waves transmitted by the
satellite. The transmission from a satellite has a defined pattern and the
beam can be wide or narrow covering a large or small area on earth. Using
a system of varying frequencies and alignment of antennas onboard the
satellite, each satellite can have several beams within which all or most of
the satellite‘s power is concentrated.

The antennae on the ship are rarely stationary due to the constant
movement of the vessel when under way and thus require the dish to be
mobile in all dimensions. The dish itself is hidden from view by the radome
cover but viewed up close they are sophisticated pieces of equipment with
motors and gearing enabling the dish to maintain a lock on the satellite
under all but the harshest conditions.

Most ships‘ communication systems are required to share channels


with others, which is perfectly fine for simple communication needs but
highly inefficient when dealing with the large quantities of data that some
operators generate. This can be overcome by making use of a very small
aperture terminal (VSAT) service. Subscribers to VSAT services are
provided with exclusive or semi-exclusive use of satellite channels for
sending and receiving voice and data at broadband speeds.

Usually they are charged for this on a monthly fixed fee subscription
basis (although there may be limits on the data allowed before extra
charges apply) as opposed to the rate per Mbit charged when using basic
services. This enables a network to be created that permits the
transmission of large quantities of data.

Not all ship types or fleet managers need large data flows for
commercial reasons but passenger, offshore and container operations
frequently do. For passenger vessels this will involve allowing passengers
to use computers, tablets and smart phones as well as providing
entertainment services. In the offshore industry it enables survey and other
data to be transmitted at will and for container ships there is a need for
large amounts of data for stowage plans and customer services.

Early satellite history


As far as shipping is concerned, the satellite communications era
began with the establishment in the 1970s of Inmarsat, a not-for profit
international organisation, set up at the behest of the IMO to provide a
satellite communications network for the maritime community.

Initially the service was used purely for commercial purposes

Course Code: ICT – Module 3 Page 58 of 77


allowing voice and telex communication with ships at sea equipped with an
Inmarsat A terminal. Without the advent of GMDSS and the mandatory
requirement for most ships to be fitted with at least an Inmarsat C terminal,
it is doubtful if the marine satellite communications sector would have
expanded at anything like the rate it has. By having an Inmarsat terminal on
board, ships immediately gained e-mail as a new method of
communication.

Early Inmarsat services were described by an alphabetical reference


being Inmarsat A, B, C, D and E. When the letter F was reached, the
service was renamed Fleet followed by a number (33, 55 or 77) indicating
the size of the antenna in centimetres.

 Inmarsat A was the original Inmarsat service and offered


analogue FM voice and telex services and, optionally, high
speed data services at 56 or 64kbit/s. The service was
withdrawn at the end of 2007.

 Inmarsat B provides voice services, telex services, medium


speed fax/data services at .6 kbit/s and high speed data
services at 56, 64 or 128kbit/s. Inmarsat C is effectively a
‗satellite telex‘ terminal with store-and-forward, polling etc. it
can handle data and messages up to 32kb in length,
transmitted in data packets in ship-toshore, shore-to-ship
and ship-to-ship directions. The message length for Inmarsat
Mini C terminals may be smaller. Certain models of Inmarsat
C terminals with GPS are also approved for GMDSS use.

 Inmarsat D/D+ is a paging service, not regularly used on


ships.

 Inmarsat E was a global maritime distress alerting service


using small EPIRBs that automatically relayed distress
messages to maritime Rescue Coordination Centres.

This service has been withdrawn.

 Inmarsat Fleet 77 offers voice and the choice of mobile


ISDN up to 64 kbit/s or an always-on Mobile Packet Data
Services (MPDS) for cost effective, virtually global
communications. Fleet 77 also meets the distress and safety
specifications of the GMDSS for voice communication. The
service is set to be discontinued at the end of 2020.

 Inmarsat Fleet Broadband was introduced in 2006 when


the first of Inmarsat‘s i-4 satellites went into service. It offers

Course Code: ICT – Module 3 Page 59 of 77


a shared-channel IP packet switched service of up to
492kbit/s and a streaming-IP service from 32 up to X-Stream
data rate. X-Stream delivers the fastest, on demand
streaming data rates from a minimum of 384kbit/s up to
around 450kbit/s. Most terminals also offer circuit switched
Mobile ISDN services at 64kbit/s and even low speed
(4.8kbit/s) voice services.

The Fleet service has recently been extended with Inmarsat offering
a hybrid service that combines Fleet Broadband with its VSAT services.
The first step was XpressLink which worked with Inmarsat‘s Ku-Band VSAT
and was followed by Fleet Xpress a Kaband/ L-band service that became
available once Global Xpress commenced global commercial service. While
waiting for all satellites in the Ka-Band constellation to be launched, the
company introduced FleetBroadband Xtra (FBX), a regional Global
Xpress/FleetBroadband service. Fleet Xpress was launched in 2016 and
has proven popular, with around 10,000 ship users.

Since the advent of GMDSS, Inmarsat has become a private


company and, although committed to maintaining the safety services, it is
no longer focused solely on the marine sector as it once was. Recently, the
IMO has decided that the GMDSS communications should be opened up to
other satellite operators. The first to apply was the US-based Iridium and
although the application initially progressed very slowly it has now been
completed.

In May 2018, the IMO‘s Maritime Safety Committee (MSC) officially


recognised Iridium as a provider of GMDSS services. The Iridium Next
satellite constellation completed in 2019 comprises 75 newly-launched
satellites and allows for coverage where none existed before, including
Arctic and Antarctic waters in Sea Area A4. Iridium has also announced the
signing of a Public Services Agreement (PSA) with the International Mobile
Satellite Organization (IMSO) detailing the conditions for IMSO to act as a
regulator and maintain oversight of Iridium GMDSS services. The signing of
this agreement is a key step towards IMSO issuing Iridium a Letter of
Compliance, stating that the company is ready to begin providing its
GMDSS service.

The last hurdle is for Iridium and its selling partners to make
available type-approved equipment which must also be certified by IMSO.
The first terminal planned for certification, the Lars Thrane LT-3100S, is
now available. Several additional Iridium GMDSS terminals are planned to
be available in the future.

SOLAS class vessels will need to wait until sometime in 2020 for the
Iridium terminal to meet its mandated GMDSS carriage requirement, which

Course Code: ICT – Module 3 Page 60 of 77


is when the needed amendments made to the SOLAS Convention take
effect. Vessels can begin using the service as soon as it is available, and
anyone will be able to begin use of the new terminal for general
communications needs.

Other commercial satellite operators include KVH, Intelsat, SES,


Telesat and Thuraya with several smaller regional players also active in the
market.

VSAT
All satellites make use of a beam which is a pattern of
electromagnetic waves transmitted by the satellite. The transmission from a
satellite has a defined pattern and the beam can be wide or narrow
covering a large or small area on earth. Using a system of varying
frequencies and alignment of antennas onboard the satellite, each satellite
can have several beams within which all or most of the satellite‘s power is
concentrated. The antennae on the ship are rarely stationary due to the
constant movement of the vessel when under way and thus require the dish
to be mobile in all dimensions.

Most ships‘ communication systems are required to share channels


with others but if an exclusive service is required this can be done by
making use of a very small aperture terminal (VSAT) technology.
Subscribers to VSAT services are provided with exclusive or semi-exclusive
use of satellite channels for sending and receiving voice and data at
broadband speeds. Usually they are charged for this on a monthly fixed fee
subscription basis (although there may be limits on the data allowed before
extra charges apply) as opposed to the rate per Mbit charged when using
basic services.

When it comes to communications equipment on board a ship,


VSAT mostly requires a choice to be made between systems operating on
either C-band or Ku-band frequency. Vessels with modest traffic should opt
for Ku-band, which requires less power and smaller antennae. Bigger
dishes and more power are needed for the larger bandwidth and better
quality of C-band systems.

The attraction of VSAT is that, whichever band is chosen, the


equipment usually comes as part of a lease package with a fixed monthly
payment, making for greater control over communication expenditure. On
many modern ships the operational element of communication use is
expanding rapidly and crews are beginning to expect the kinds of email,
internet and calling services that they receive on shore.

Greater bandwidth is now being used to meet the expanding market


by making use of the Ka-Band. Inmarsat has invested in five satellites to

Course Code: ICT – Module 3 Page 61 of 77


use Ka-band radio frequencies and deliver mobile broadband speeds of
50Mbps.

The Satellite and Radio Spectrum


Both conventional radio and satellite communications received and
transmit electromagnetic signals or radio waves. The length or frequency of
radio waves various tremendously and to distinguish between different
lengths of waves they are grouped into bands within the radio spectrum.
The bands are named under a number or protocols but in maritime circles,
the bands used by the Institute of Electrical and Electronics Engineers
(IEEE) are most commonly recognised.

Some bands have a wider spread than others and each of the
bands is used for a slightly different purpose. Radio communications on
Low Frequency (LF), Medium Frequency (MF), High Frequency (HF), Very
High Frequency (VHF) and Ultra High Frequency (UHF) bands are all on
frequencies below 1GHz which is the lowest point in the spectrum allocated
to satellite communications and ship‘s radar.

L -Band (1-2GHz)
Most of the Inmarsat and all of the Iridium services operate in the
part of the radio spectrum labelled as L-band, which is very narrow and
congested. Being a relatively low frequency, L-band is easier to process,
requiring less sophisticated and less expensive RF equipment, and due to a
wider beam width, the pointing accuracy of the antenna does not have to be
as accurate as the higher bands. Only a small portion (1.3-1.7GHz) of L-
Band is allocated to satellite communications on Inmarsat for the Fleet
Broadband, Inmarsat B and C services.

L-Band is also used for low earth orbit satellites, military satellites,
and terrestrial wireless connections like GSM mobile phones. It is also used
as an intermediate frequency for satellite TV where the Ku or Ka band
signals are down converted to L-Band at the antenna.

Although the equipment needed for L-Band communications is not


expensive in itself, since there is not much bandwidth available in L-band, it
is a costly commodity. For this reason, as the usage of data-heavy
applications has grown, shipping has turned to more sophisticated
technology for commercial communications.

S-Band (2-4GHz)
Used for marine radar systems.

C-Band (4-8GHz)
C-band is typically used by large ships, particularly cruise vessels,

Course Code: ICT – Module 3 Page 62 of 77


that require uninterrupted, dedicated, always-on connectivity as they move
from region to region. The ships‘ operators usually lease a segment of
satellite bandwidth that is provided to the ships on a full-time basis,
providing connections to the Internet, the public telephone networks and
data transmission ashore.

C-band is also used for terrestrial microwave links, which can


present a problem when vessels come into port and interfere with critical
terrestrial links. This has resulted in serious restrictions within 300km of the
coast, requiring terminals to be turned off when coming close to land.

X-Band (8-12GHz)
Used for marine radar systems.

Ku-Band (12-18GHz)
Ku-Band refers to the lower portion of the K-Band. The ‗u‘ comes
from a German term referring to ‗under‘ whereas the ‗a‘ in Ka- Band refers
to ‗above‘ or the top part of K-Band. Ku-Band is used for most VSAT
systems on ships. There is much more bandwidth available in Ku -Band
and it is less expensive than C- or L-band.

There are no official statistics as to the number of vessels equipped


with Ku-Band communications but analysts of the market estimate that
around 10,000 vessels is a probable number, indicating that a considerable
market exists to be exploited. The main disadvantage of Ku-Band is rain-
fade. The wavelength of raindrops coincides with the wavelength of Ku-
Band, causing the signal to be attenuated during rain showers. This can be
overcome by transmitting using extra power. The pointing accuracy of the
antennas need to be much tighter than L-Band Inmarsat terminals, due to
narrower beam widths, and consequently the terminals need to be more
precise and tend to be more expensive.

Ku band coverage is generally by regional spot beams, covering


major land areas with TV reception. VSAT vessels moving from region to
region need to change satellite beams, sometimes with no coverage in
between beams. In most instances, the satellite terminals and modems can
be programmed to automatically switch beams.

VSAT antenna sizes typically range from a standard 1m to 1.5m in


diameter for operation in fringe areas and, more recently, as low as 60cm
for spread spectrum operation.

Ka-Band (26.5-40GHz)
Ka-Band is an extremely high frequency requiring great pointing
accuracy and sophisticated RF equipment. Like Ku-band it is susceptible to
rain-fade. It is commonly used for high definition satellite TV. Ka- Band

Course Code: ICT – Module 3 Page 63 of 77


bandwidth is plentiful and once implemented should be quite inexpensive
compared to Ku-Band.

Inmarsat was the first to provide a global Ka-Band VSAT service as


its Global Xpress service came on stream in 2016. The service uses three
Inmarsat‘s fifth generation satellites, the first of which arrived on station in
2014 and entered commercial service in July 2014 powering regional
Global Xpress services for Europe, the Middle East, Africa and Asia.

The second Global Xpress satellite – Inmarsat-5 F2 (I-5 F2) – was


launched on 1 February 2015and offers services in the Americas and the
Atlantic Ocean Region. The third satellite in the constellation was launched
in August 2015, with global availability announced at the end of March
2016. Each Inmarsat-5 satellite is expected to have a commercial life of 15
years.

As more Ka-Band bandwidth becomes available, there will be


several other satellite providers offering Ka-Band VSAT on a more regional
basis. Telenor Satellite Broadcasting‘s THOR 7 HTS Ka-band payload
offers 6-9Gbp/s throughput with up to 25 simultaneously active spot beams
and coverage over the North Sea, the Norwegian Sea, the Red Sea, the
Persian Gulf and the Mediterranean. Ka-Sat covers most of Europe. Yahsat
1b, NewSat Australia, Eutelsat and Avanti Communications also provide
Middle East coverage, offering mariners with strictly regional European and
Middle East sailings a Ka-Band alternative to Global Xpress.

With new services in different bands coming on streams, some


providers will be operating hybrid services that take advantage of the
cheapest network at any given time. The technologies required to facilitate
hybrid networks are already well under development and consist of dual-
band satellite antennas, Ku and Ka-Band switchable antennas and the use
of equivalent modem/hub infrastructure.

ISM and wi-fi


Most people are familiar with wi-fi as a means for using smart
phones and computers and this uses a particular section of the radio
spectrum that is actually within the C-Band, mentioned above. There are a
number of unlicensed spectrum bands in a variety of areas of the radio
spectrum. Often these are referred to as ISM bands – Industrial, Scientific
and Medical – and they carry everything from microwaves in ovens to radio
communications. Many of these bands, including the two used for wi-fi are
global allocations, although local restrictions may apply for some aspects of
their use. The two bands in particular used for wi-fi are the 2.4GHz and
5GHz bands.

As the 2.4GHz band becomes more crowded, many users are

Course Code: ICT – Module 3 Page 64 of 77


opting to use the 5GHz ISM band. This not only provides more spectrum,
but it is not as widely used by wi-fi. Many of the 5GHz wi-fi channels fall
outside the accepted ISM unlicensed band and as a result, various
restrictions are placed on operation at these frequencies.

A system making use of the 5GHz waveband for vessel


communication purposes outside of the VSAT system has been developed
by Kongsberg. Its Maritime Broadband Radio MBR is a smart antenna
designed for use in maritime applications where digital high-speed reliable
communication and data transfer are desirable.

The housing accommodates 60 individual antennae and needs only


connections to power and ethernets. The unit is configured from a web
interface that also provides the status of the radio and the network. The
network administrator can configure and operate units and adjust network
resources from any vessel in the network.

The MBR units use highly-dynamic beamforming and adaptive


power control to secure stable communication in maritime operations with
signal obstructions, fading and ranges in excess of 50km depending upon
the model chosen. The system can securely carry a diverse array of
operational information, from real-time video to system data, and remotely-
situated teams can work together seamlessly, coordinating systems and
activities for optimal performance, safety and operational success.

With beam forming, the MBR can direct datagrams to the destination
as a multidirectional networked wireless system. Supporting IP
transmission, the MBR provides a resilient, high-capacity data link for
systems that communicate over IP. The use of end-to-end IP connectivity
provides cost efficient integration and an interoperable solution for
seamless data exchange. The MBR system has been used for testing
autonomous vessels in Norwegian waters but the concept has obvious uses
beyond this for vessels operating in relatively close contact.

5.7 Network standardisation process and security

Network Standards
Networking standards define the rules for data communications that
are needed for interoperability of networking technologies and processes.
Standards help in creating and maintaining open markets and allow
different vendors to compete on the basis of the quality of their products
while being compatible with existing market products.

During data communication, a number of standards may be used


simultaneously at the different layers. The commonly used standards at

Course Code: ICT – Module 3 Page 65 of 77


each layer are −

 Application layer − HTTP, HTML, POP, H.323, IMAP


 Transport layer − TCP, SPX
 Network layer −IP, IPX
 Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
 Physical layer −RS-232C (cable), V.92 (modem)

Types of Standards
Standards are of two types

 De facto − These are the standards that are followed without any
formal plan or approval by any organization. They have come into
existence due to traditions or facts. For example, the HTTP had
started as a de facto standard.
 De jure − These standards are the ones which have been adopted
through legislation by any officially recognized standards
organization. Most of the communication standards that are used
today are de jure standards.

Standards Organizations
Some of the noted standards organizations are

 International Standards Organization (ISO)


 International Telecommunication Union (ITU)
 Institute of Electronics and Electrical Engineers (IEEE)
 American National Standards Institute (ANSI)
 Internet Research Task Force (IETF)
 Electronic Industries Association (EIA)

The Process of Standardization


The process of standardization is not really complex but involves a
series of steps. First, it starts off with ISO commissioning of a sub-
committee workgroup. The workgroup then does the work of issuing the
working drafts and discussions that surround the protocol to interested
parties, which may include other bodies involved in standardization. With
such intense discussions, there is bound to be a debate, a lot of questions,
and even disagreement on what the provisions of the standard should be
and the needs that it can satisfy. All these conflicting views are always
taken into consideration, and what they strive to achieve is a balance. After
a compromise is reached, a draft proposal of what comprises the working
group is made.

This draft proposal is then taken for discussion with the standard
bodies for the member countries. Further, a discussion is also done within
each country. There are more comments and suggestions that are collated,

Course Code: ICT – Module 3 Page 66 of 77


and eventually, national views come together and are formulated before
being taken to the members of ISO who will vote for the proposal. If by any
chance, a proposal is rejected, the draft has to consider every counter-
proposal and objections and use the information to draft a new proposal
that will be taken for the vote. Before the end of this process, there is
usually a lot of feedback, compromise, and modification. The final draft that
is considered reaches a status called draft international standard, and once
it is standardized, it is considered an international standard.

The process that a draft proposal takes to reach international standard


status can often take years for completion. The original draft created by the
designer will differ significantly from the copy that makes it the standard and
will have some of the features outlined below:

Various modes of operation that will allow for different aspects of


performance, for instance, the set-up of different packet sizes at the time of
startup. This is usually advisable when parties are unable to reach a
consensus on what should be the optimum packet size.
Undefined parameters or some that are allowed to take values that are set
at the discretion of the implementer. This, just like the various modes of
operation described above, usually is a reflection of how much the views of
the members conflicted.
Parameters that are reserved for use in the future. This usually reflects that
the members of the standardization board reached a consensus that the
facility had to be provided. However, in such a case, they could not agree
on how the facility should have been provided within the time they had
available.
There will be ambiguities and inconsistencies found as the standards
continue to be implemented.

OSI standardization
Before the internet, there was ARPANET. For the ARPANET, protocols
were standardized. However, sometimes standardization may not be
enough. The reasons stated in the case of de facto standards are different
from the case here. Here, what makes standardization insufficient is the fact
that the protocol also needed a framework to enable operation. There is,
hence, a need to develop a future-proof, framework that is also for general
purposes that is suitable for network protocols that are structured.

Such developments are important because they would not only allow clearly
definitions of the protocol responsibilities at different levels but also, would
be instrumental for the prevention of overlapping functionalities. These
needs resulted in the development of the OSI Open Systems
Interconnection model for reference. The OSI Open Systems
Interconnection reference model is a vital framework used for designing
standard services and protocols that conform to the different layer

Course Code: ICT – Module 3 Page 67 of 77


specifications.

With this OSI model, the systems in communication are presumed


connected through an underlying medium that provides a primary
mechanism for transmission. The above layers are numbered from one
through to 7, and each layer provides service to the layer above it using the
services of the below layers. The interface through which the layers
communicate with each other are called service access points, and the
corresponding layers at the systems are known as peer entities.

For communication to happen, the peer entities in a layer use a protocol


that is implemented by a number layer below. If systems do not have a
direct connection, relays-intermediate peer entities are used. There are
addresses that identify service access points, and the domains that provide
these naming services are not necessarily restricted to one layer. This
makes it possible to use the same naming domain in all layers. Each layer
has two network protocols: the service standards protocol and the protocol
standards. Service standards define how a layer communicates with the
one above it while the protocol layer defines communication between peer
entities at each level.

Network Security
Network security is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft. It involves
creating a secure infrastructure for devices, applications, users, and
applications to work in a secure manner.

How does network security work?


Network security combines multiple layers of defenses at the edge and in
the network. Each network security layer implements policies and controls.
Authorized users gain access to network resources, but malicious actors
are blocked from carrying out exploits and threats.

How do I benefit from network security?


Digitization has transformed our world. How we live, work, play, and learn
have all changed. Every organization that wants to deliver the services that
customers and employees demand must protect its network. Network
security also helps you protect proprietary information from attack.
Ultimately it protects your reputation.
Types of network security
 Firewalls
- A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules. Cisco offers
both threat-focused firewalls and unified threat management (UTM)

Course Code: ICT – Module 3 Page 68 of 77


devices.

 Intrusion prevention systems


- An intrusion prevention system (IPS) scans network traffic to actively
block attacks. Secure IPS appliances do this by correlating huge
amounts of global threat intelligence to not only block malicious
activity but also track the progression of suspect files and malware
across the network to prevent the spread of outbreaks and
reinfection.
 Workload security
- Workload security protects workloads moving across different cloud
and hybrid environments. These distributed workloads have larger
attack surfaces, which must be secured without affecting the agility
of the business.

 NetWORK security
- NetWORK security is Cisco's vision for simplifying network,
workload, and multicloud security by delivering unified security
controls to dynamic environments.

 SecureX
- SecureX is a cloud-native, built-in platform that connects the Cisco
Secure portfolio and your infrastructure. It allows you to radically
reduce dwell time and human-powered tasks.

 Network segmentation
- Software-defined segmentation puts network traffic into different
classifications and makes enforcing security policies easier. Ideally,
the classifications are based on endpoint identity, not mere IP
addresses. You can assign access rights based on role, location,
and more so that the right level of access is given to the right people
and suspicious devices are contained and remediated.

 VPN
- A virtual private network encrypts the connection from an endpoint
to a network, often over the internet. Typically, a remote-access
VPN uses IPsec or Secure Sockets Layer to authenticate the
communication between device and network.

 Access control
- Not every user should have access to your network. To keep out
potential attackers, you need to recognize each user and each
device. Then you can enforce your security policies. You can block
noncompliant endpoint devices or give them only limited access.
This process is network access control (NAC).
 Anti-virus and anti-malware software

Course Code: ICT – Module 3 Page 69 of 77


- "Malware," short for "malicious software," includes viruses, worms,
Trojans, ransomware, and spyware. Sometimes malware will infect
a network but lie dormant for days or even weeks. The best
antimalware programs not only scan for malware upon entry, but
also continuously track files afterward to find anomalies, remove
malware, and fix damage.

 Application security
- Any software you use to run your business needs to be protected,
whether your IT staff builds it or whether you buy it. Unfortunately,
any application may contain holes, or vulnerabilities, that attackers
can use to infiltrate your network. Application security encompasses
the hardware, software, and processes you use to close those
holes.

 Behavioral analytics
- To detect abnormal network behavior, you must know what normal
behavior looks like. Behavioral analytics tools automatically discern
activities that deviate from the norm. Your security team can then
better identify indicators of compromise that pose a potential
problem and quickly remediate threats.
 Cloud security
- Cloud security is a broad set of technologies, policies, and
applications applied to defend online IP, services, applications, and
other imperative data. It helps you better manage your security by
shielding users against threats anywhere they access the internet
and securing your data and applications in the cloud.
 Data loss prevention
- Organizations must make sure that their staff does not send
sensitive information outside the network. Data loss prevention, or
DLP, technologies can stop people from uploading, forwarding, or
even printing critical information in an unsafe manner.

 Email security
- Email gateways are the number one threat vector for a security
breach. Attackers use personal information and social engineering
tactics to build sophisticated phishing campaigns to deceive
recipients and send them to sites serving up malware. An email
security application blocks incoming attacks and controls outbound
messages to prevent the loss of sensitive data.

 Industrial network security


- As you are digitizing your industrial operations, the deeper
integration between IT, cloud, and industrial networks is exposing
your Industrial Control Systems (ICS) to cyber threats. You need full
visibility into your OT security posture to segment the industrial

Course Code: ICT – Module 3 Page 70 of 77


network, and feed IT security tools with rich details on OT devices
and behaviors.
 Mobile device security
- Cybercriminals are increasingly targeting mobile devices and apps.
Within the next three years, 90 percent of IT organizations may
support corporate applications on personal mobile devices. Of
course, you need to control which devices can access your network.
You will also need to configure their connections to keep network
traffic private.
 Security information and event management
- SIEM products pull together the information that your security staff
needs to identify and respond to threats. These products come in
various forms, including physical and virtual appliances and server
software.

 Web security
- A web security solution will control your staff's web use, block web-
based threats, and deny access to malicious websites. It will protect
your web gateway on site or in the cloud. "Web security" also refers
to the steps you take to protect your own website.
 Wireless security
- Wireless networks are not as secure as wired ones. Without
stringent security measures, installing a wireless LAN can be like
putting Ethernet ports everywhere, including the parking lot. To
prevent an exploit from taking hold, you need products specifically
designed to protect a wireless network.

5.8 Setting-up small scale wired local area network

How to Set Up a LAN?


LAN (Local Area Network) is a data communication network that
locally connects network devices such as workstations, servers, routers,
etc. to share the resources within a small area such as a building or
campus. Physical or wireless connections are set up between workstations
to share the resources. Ethernet and Wi-fi are the most important
technologies of LAN. Personal networks at home, school, office, etc. are
examples of LAN. These are generally privately-owned networks.

Requirements to set up LAN Network:

 Workstation/Personal devices: laptop, computer, mobile phones,


etc.
 Network devices: router, switch, modem (if not already present in
the router)
 Sharing resources: printers, disk drives, etc.

Course Code: ICT – Module 3 Page 71 of 77


 Cables: Ethernet cables, wires for connecting other devices (in case
of wired LAN)
 Internet connection: Wi-Fi (in case of wireless LAN)

Instructions to set up LAN Network:


Following steps should be followed to set up a LAN network:

1. Identify services: Identify the network services such as printers,


disk drives, data, etc. that will be shared among workstations.
2. Identify devices: Identify devices such as computers, mobile
phones, laptops, etc. with a unique address that will be connected to
the network.
3. Plan connections: Design the network by laying out cable wires
between network devices or by making wireless connections. Wired
LAN is set up using Ethernet cables while wireless LAN is set up
using Wi-Fi that connects network devices without making any
physical connection. A wired LAN network is more secure than a
wireless LAN network but it is difficult to relocate.
4. Select networking device: Select switch or router with enough
ports to connect all workstations within the network. The choice of
networking device is based on the requirements of the network.
5. Configure ports: Configure WAN ports according to the information
provided by ISP (Internet Service Provider). Also, configure LAN
ports of cable routers such that there are enough addresses
available for all the workstations within the network. A cable router
acts as DHCP (Dynamic Host Configuration Server) server that
automatically allocates addresses to all the devices connected to
the network.
6. Make connections: Connect all the devices using wires to configure
a LAN network. Standard Ethernet cables are used to connect
workstations and servers while Ethernet crossover cable is used to
connect the switch to cable routers by connecting the standard port
of the switch with router‘s LAN port. For wireless LAN, connect all
the devices to Wi-Fi with SSID (Service Set Identifier) provided by
the router or switch to configure the LAN network.
7. Test the network: Test each of the workstation connected to the
network and ensure every workstation have access to network
services.

Tips for LAN Set-Up:

1. Make a comprehensive plan about connections before making


actual connections to avoid confusion.
2. Carefully identify the requirements and size of the network and plan
accordingly.
3. Smartly choose the networking device which provides more flexibility

Course Code: ICT – Module 3 Page 72 of 77


to the network.
4. Ensure the cable length is not more than 100 meters.
5. Avoid laying cables in air ducts unless fire rated.
6. Perform detailed testing after network set up to analyze the actual
performance of the network.

Applications of LAN:

1. Resource sharing: LAN network allows workstations connected to


the network to share resources such as printers, scanners, CD
drives, etc. which reduces the cost of the set-up of the network.
2. Software sharing: LAN network allows to share a single copy of
licensed software among workstations connected to the network
instead of purchasing separate software for each computer.
3. Internet sharing: LAN network facilitates sharing of internet
connection among all the devices connected to the network.
4. Data sharing: LAN network allows different workstations to share
the data and files with each other. It also allows access to data
stored on the central server.
5. Communication: Devices connected to a LAN network can
communicate with each other.

Advantages of LAN:

 It is an easy and cheap way of communication within a small


geographical location.
 It is easy to expand the network by connecting workstations to a
central server.
 It is easy to manage the resources and data from the central server.
 It is more secure since data is stored on a central server which
denies illegal access to data.
 It has high data transmission rates.

Disadvantages of LAN:

 It has a high initial setup cost.


 It violates the privacy of network users as administrators have
access to all their data and files.
 It can face security issues if the central server is not properly
secured.
 It needs regular maintenance to deal with issues such as software
installations, hardware failures, cable disturbances, etc.
 It restricts the size of the network.

Course Code: ICT – Module 3 Page 73 of 77


5.9 Basic network troubleshooting

How to Troubleshoot a Network

Issues can arise at numerous points along the network. Before


you start trying to troubleshoot any issue, you want to have a clear
understanding of what the problem is, how it came up, who it‘s affecting,
and how long it‘s been going on. By gathering the right information and
clarifying the problem, you‘ll have a much better chance of resolving the
issue quickly, without wasting time trying unnecessary fixes.

Start troubleshooting using these simple network troubleshooting


steps to help diagnose and refine the issue.

1. Check the hardware. When you‘re beginning the troubleshooting


process, check all your hardware to make sure it‘s connected
properly, turned on, and working. If a cord has come loose or
somebody has switched off an important router, this could be the
problem behind your networking issues. There‘s no point in going
through the process of troubleshooting network issues if all you
need to do is plug a cord in. Make sure all switches are in the
correct positions and haven‘t been bumped accidentally.
Next, turn the hardware off and back on again. This is the mainstay
of IT troubleshooting, and while it might sound simplistic, often it
really does solve the problem. Power cycling your modem, router,
and PC can solve simple issues—just be sure to leave each device
off for at least 60 seconds before you turn it back on.

2. Use ipconfig. Open the command prompt and type ―ipconfig‖


(without the quotes) into the terminal. The Default Gateway (listed

Course Code: ICT – Module 3 Page 74 of 77


last) is your router‘s IP. Your computer‘s IP address is the number
next to ―IP Address.‖ If your computer‘s IP address starts with 169,
the computer is not receiving a valid IP address. If it starts with
anything other than 169, your computer is being allocated a valid IP
address from your router.
Try typing in ―ipconfig /release‖ followed by ―ipconfig /renew‖ to get
rid of your current IP address and request a new one. This will in
some cases solve the problem. If you still can‘t get a valid IP from
your router, try plugging your computer straight into the modem
using an ethernet cable. If it works, the problem lies with the router.

3. Use ping and tracert. If your router is working fine, and you have an
IP address starting with something other than 169, the problem‘s
most likely located between your router and the internet. At this
point, it‘s time to use the ping tool. Try sending a ping to a well-
known, large server, such as Google, to see if it can connect with
your router. You can ping Google DNS servers by opening the
command prompt and typing ―ping 8.8.8.8‖; you can also add ―-t‖ to
the end (ping 8.8.8.8 -t) to get it to keep pinging the servers while
you troubleshoot. If the pings fail to send, the command prompt will
return basic information about the issue.
You can use the tracert command to do the same thing, by typing
―tracert 8.8.8.8‖; this will show you each step, or ―hop,‖ between your
router and the Google DNS servers. You can see where along the
pathway the error is arising. If the error comes up early along the
pathway, the issue is more likely somewhere in your local network.

4. Perform a DNS check. Use the command ―nslookup‖ to determine


whether there‘s a problem with the server you‘re trying to connect to.
If you perform a DNS check on, for example, google.com and
receive results such as ―Timed Out,‖ ―Server Failure,‖ ―Refused,‖
―No Response from Server,‖ or ―Network Is Unreachable,‖ it may
indicate the problem originates in the DNS server for your
destination. (You can also use nslookup to check your own DNS
server.)

5. Contact the ISP. If all of the above turn up no problems, try


contacting your internet service provider to see if they‘re having
issues. You can also look up outage maps and related information
on a smartphone to see if others in your area are having the same
problem.

6. Check on virus and malware protection. Next, make sure your virus
and malware tools are running correctly, and they haven‘t flagged

Course Code: ICT – Module 3 Page 75 of 77


anything that could be affecting part of your network and stopping it
from functioning.

7. Review database logs. Review all your database logs to make sure
the databases are functioning as expected. If your network is
working but your database is full or malfunctioning, it could be
causing problems that flow on and affect your network performance.

Network Troubleshooting Best Practices


To make troubleshooting as efficient and painless as possible, it‘s
also important to have some best practices in place. As you work through
the steps to try to solve network issues, following these network
troubleshooting best practices can help streamline the process and avoid
unnecessary or redundant efforts.

1. Collect information. To best support your end users, you first


need to make sure you‘re clear on what the problem is. Collect
enough information from both the people who are experiencing
network issues and the network itself, so you can replicate or
diagnose the problem. Take care not to mistake symptoms for the
root cause, as what initially looks like the problem could be part of a
larger issue.
2. Customize logs. Make sure your event and security logs are
customized to provide you with information to support your
troubleshooting efforts. Each log should have a clear description of
which items or events are being logged, the date and time, and
information on the source of the log (MAC or IP address).

Course Code: ICT – Module 3 Page 76 of 77


3. Check access and security. Ensure no access or security issues
have come up by checking all access permissions are as they
should be, and nobody has accidentally altered a sensitive part of
the network they weren‘t supposed to be able to touch. Check all
firewalls, antivirus software, and malware software to ensure
they‘re working correctly, and no security issues are affecting your
users‘ ability to work.

4. Follow an escalation framework. There‘s nothing worse than


going to the IT help desk and being directed to another person,
who then directs you to another person, who directs you to yet
another. Have a clear escalation framework of who is responsible
for which issues, including the final person in the chain who can be
approached for resolution. All your end users should know who
they can go to about a given issue, so time isn‘t wasted talking to
five different people who cannot fix the problem.

5. Use monitoring tools. Troubleshooting can be done manually but


can become time-consuming if you go through each step. When
you have a bunch of people knocking on your office door or
sending you frantic emails, it can be overwhelming to try to find the
problem, let alone fix it. In business and enterprise situations, it‘s
best to use monitoring tools to make sure you‘re getting all the
relevant network information and aren‘t missing anything vital, not
to mention avoiding exposing the company to unnecessary risk.

REFERENCES:

 https://www.geeksforgeeks.org/data-communication-definition-
components-types-channels/
 https://www.guru99.com/types-of-computer-network.html
 https://www.tutorialspoint.com/data_communication_computer_netw
ork/computer_network_types.htm
 https://www.techjockey.com/blog/what-are-computer-network-
devices
 18 Types of Communication Technologies | TL Dev Tech
 https://www.guru99.com/layers-of-osi-model.html
 https://www.hattelandtechnology.com/blog/introduction-to-computer-
networks-on-ships
 https://shipinsight.com/articles/ship-satellite-communications-
overview-and-history
 https://www.tutorialspoint.com/Network-Standardization
 https://erainnovator.com/network-protocols-and-standards/
 https://www.cisco.com/c/en/us/products/security/what-is-network-
security.html#~types
 https://www.dnsstuff.com/network-troubleshooting-steps

Course Code: ICT – Module 3 Page 77 of 77

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy