INTERNET & NETWORK
TECHNOLOGIES
1. DEVICES TO CONNECT TO A NETWORK
Switch
Allows multiple devices on a network to communicate.
Router
A device that connect a network to other networks wirelessly or through
cables.
2. INTRANET
Definition
A secure, internal network that uses web technologies to distribute
organisational data and information exclusively to employees.
Uses of Intranet
- Internal communications
- Document management
- Information sharing
- Support and maintenance
- Collaboration tools
- Employee services
Disadvantages
- Employees need to be trained
- Requires integration and maintenance
- Complex for employees
- Rarely equipped with offline functionality
3. LAN
Local Area Network is small network of computers covering a small area, such
as an office building or school. Use wired connections. Limited to fixed
locations.
4. WLAN
Wireless local area network. Provide greater mobility and coverage
5. WEB-BASED EMAIL SERVICE
Definition
An email system that you access through a web browser - no need to install
any software.
Examples
- Gmail
- Outlook.com
- Yahoo Mail
Disadvantages
- Need to be connected to Internet to access email.
- Limited personalisation.
- Supported by ads.
- Privacy concerns.
- Spam vulnerability.
- Data loss risk.
Features of threaded discussion in an email
- Make it easier to follow discussion
- Easier to see updates in chronological order
- Maintain continuity
6. FIBRE
- delivers speeds up to 20x faster cable.
- immune to electromagnetic interference.
- support high-definition streaming without buffering.
7. SEARCH ENGINE vs WEB BROWSER
FEATURE SEARCH ENGINE WEBBROWSER
DEFINITION A website that helps users An application used to access
find information online by and display website.
searching its index of web
pages.
EXAMPLES Google Chrome
Bing Firefox
Yahoo Safari
Edge
FUNCTION Retrieves relevant web pages Displays web pages and
based on keywords. allows interaction
INSTALLATION No installation needed - Must be installed on your
accessed via browser. device
8. URL
Identify and locate a resource on the Internet.
Parts of URL
- https - tells browser how to access the resource
- www. identifies the server
- Path - identifies the specific page or resource
9. GRID COMPUTING
Different computers resources in different locations to achieve a common goal
or to solve a specific problem.
Examples
- Space exploration
- Analysis of Big Data
- Earth quake simulations
10. ONLINE BANKING
Allows to view account balances, pay bills and transfer money via EFT
(Electronic Funds Transfer).
Advantages
Can bank at anytime from anywhere if you have Internet connection
Transactions can be done faster and cost less than going to the bank
Safer than carrying around large sums of cash
Disadvantages
Users at risk of scams and fraud
Need Internet connection to bank online
Examples
PayPal
Amazon Pay
OTP-One Time Password
Unique temporary code used to verify a user's identity during login or
transactions.
Examples
Reset password
Online shopping
Logging into streaming apps
11. LAYOUT OF WEB PAGE
Readability
• Readability allows users to efficiently read and process the information in the
text.
• Users should be able to read your content and absorb it easily
Navigation
• Navigation links should be formatted in a consistent and standard way
• Navigation system should be easy to locate and identify (Usually top of
web page)
• Links should not be long -user must be able understand what the link
is leading to
• There should be no 'broken' links (All navigation links must work)
Consistency
• Consistency provides users with a familiar focus point when they are
scanning the text, and it helps to organise the content.
• The website should use the same basic layout throughout
• The same fonts, colours , to theme should be used on all pages.
Layout
• Layout refers to how the various elements (text, graphics, buttons, etc.)
are arranged on a web page.
• Pages should be designed and laid out in a way best suited to their
intended audience or readers.
Typography
• Typography refers to fonts and how they are put together.
• The font you use on your website needs to meet two specific criteria:
• How easy is it to read?
• Can it be rendered in HTML?
12. BETA-VERSION
Software to a limited group of users for testing before final release.
May contain bugs.
Used to collect feedback and usage data
13. URL SHORTENER
URL shortener is a tool or service which converts a long URL to a shorter vers
ion. This shorter version of the URL will take a user to the same web address
but is easier to remember and/or type out.
14. NFC- NEAR FIELD COMMUNICATION
Allows devices such as smartphones to connect wirelessly simply by touching
them together or bringing them into close proximity.
Purpose and function
NFC is a technology built upon radio-frequency identification, or RFID, which
allows a gadget to send radio waves to another gadget or to another RFID-
enabled tag and to trigger a certain action.
NFC makes tap-and-go services possible and is often used in smartphones
and smartwatches.
Advantages
• NFC offers a certain amount of security, as a hacker would need to be close to the
target to access NFC-data exchange.
• NFC can be used to change settings automatically on devices such as smartphones.
• Makes quick contactless data transfer by a single tap on a screen possible, for example,
contactless tap-and-go card transactions.
Disadvantages
NFC has a comparatively low transfer speed - so it is not the best method for transferring large
files such as videos.
15. WEARABLE DEVICES
Wearable devices and technologies are electronic mobile devices worn as accessories or part of
clothing that continuously generate data from various environments and communicate with
other devices/PC/networks.
Purpose and function
Used for tracking information on a real-time basis.
These devices have sensors which track information such as distance travelled, hear
t rate,
oxygen saturation and temperature which can be transmitted to connected smart devices.
The information between the wearables and the smart devices are synchronized.
Advantages
• Wearables are hands free and portable, facilitating mobility and connectivity for
users to access online information.
• Wearables are connected to smart devices to which they transmit information. This
allows us to view this information immediately or at a later time.
• It allows for tracking of information without confinement to a physical location.
• Information is collected and analyzed, and a report is issued almost immediately.
• There are several advantages of wearable devices in the health sector: encourages
proactive healthcare, keeps patients engaged, and monitors vulnerable patients.
Disadvantages
• Some wearables have been known to measure data inaccurately on some occasions
which can have serious implications.
• Privacy concerns regarding wearables - may share information that violates privacy.
• Wearable technology may pose security risks as they are always online and may be hac
ked or allow the wearer to be spied upon.
16. E-LEARNING
E-learning (Electronic learning) is the creation of a learning environment
where individuals use their computers to take part in teaching and learning to
further their education.
Mobile learning or m-Learning is a form
of education and training delivered and
conducted via the internet using mobile
devices, such as tablets and smartphones.
It is designed to be flexible, allowing
learners/workers/students access to
education anywhere, anytime. It is a
subsection of e-learning.
17. CLIENT/SERVER
Definition:
Client devices are endpoints (pc/workstation) in a network that request services,
resources, or data from server devices. They are typically used by end-users (us who
work on them).
Characteristics:
• User-Focused: Designed to interact directly with users.
• Input and Output: Equipped with input devices (keyboards, mice) and output
devices (monitors, printers).
• Software: Run client-side applications that interface with server-side
applications.
• Limited Resources: Generally, have less processing power and storage
compared to servers.
Examples:
1. Personal Computers (PCs):
Desktops and laptops used for everyday tasks such as browsing the internet,
word processing, and gaming.
2. Mobile Devices:
Smartphones and tablets that access web services, email, and cloud
applications.
3. Thin Clients:
Lightweight computers that rely heavily on a server for processing and data
storage commonly used in enterprise environments.
4. Workstations:
High-performance computers used for specialized tasks such as graphic
design, engineering, and scientific computations.
17. TYPES OF SERVERS
SERVER TYPE FUNCTION
Web server Host websites and deliver web pages
Database server Stores and manages structured data for
applications
Email server Send, receives stores email messages
File server Centralises file storage and sharing across a
network
Print server Manages printers and print jobs
Proxy server Acts as middleman between users and the
Internet, filters and caches.
18. AUTHENICATION
Two-factor (two-step) authentication (2FA) is a security process in which
users provide two different authentication factors to verify themselves, usually
something you know (like a password) plus something you have
(like a one-time password - OTP sent to your phone).
An extra layer of security is added to your account to prevent someone
from logging in, even if they have your password.