0% found this document useful (0 votes)
64 views18 pages

Edexcel IGCSE ICT Topic 2 Connectivity

The document provides an overview of various types of digital communication methods, including satellite communication, wired and wireless communication, and local area networks (LANs) versus wide area networks (WANs). It discusses the advantages and disadvantages of each method, as well as factors like bandwidth and latency that influence user experience. Additionally, it explains technical concepts such as IP addresses, MAC addresses, and the differences between IPv4 and IPv6.

Uploaded by

Dinanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views18 pages

Edexcel IGCSE ICT Topic 2 Connectivity

The document provides an overview of various types of digital communication methods, including satellite communication, wired and wireless communication, and local area networks (LANs) versus wide area networks (WANs). It discusses the advantages and disadvantages of each method, as well as factors like bandwidth and latency that influence user experience. Additionally, it explains technical concepts such as IP addresses, MAC addresses, and the differences between IPv4 and IPv6.

Uploaded by

Dinanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

TYPES OF DIGITAL COMMUNICATION

What is satellite communication?

 Satellite communication uses radio waves for wireless communication

 Signals are sent between satellites and ground stations on earth

 Ground stations transmit the radio wave to antenna within or connected to a digital devices

 The advantage of satellite communication is that the service is always available

 The disadvantages of satellite communication is that the service can be interrupted by weather
conditions and signals do not pass through solid objects

Satellite television

 Digital Video Broadcasting (DVB) is the international standard for broadcasting digital television

 Digital Video Broadcasting-Satellite (DVB-S) is an example of DVB

 A video signal is sent from a broadcaster to a satellite, and sent back to earth to an antenna connected
to a set-top box or directly to a television

 The set-top box or television decodes the signal to make it watchable

What is digital television and radio?

 Digital Video Broadcasting Terrestrial (DVB-T) and Digital Audio Broadcasting (DAB) are methods
of transmitting video and audio signals from transmitters to an antenna

 Transmitters are based on earth

 Once received by the antenna, signals travel through wires to a television or radio receiver
which decodes the signal and converts it into video and/or audio

 The advantages of digital television and radio are:

o Improved video/audio quality

o Access to more channels/stations

What are wired methods of communication?

 There are a number of wired methods of communication, some are designed to transmit a specific type
of data and some are universal

Type Use

High Definition Multimedia


High definition video and audio signals
Interface (HDMI)

Sony/Phillips Digital Transmit digital audio streams between


Interface Format (S/PDIF) devices
3.5mm jack commonly used to connect
Mini-jack headphones, speakers and microphones to
devices

Networking standard for connecting devices


Ethernet
to a local area network (LAN)

Connecting and powering various devices


Universal Serial Bus (USB) such as printers, flash drives, keyboards,
mice etc.

Wireless

What are wireless methods of communication?

 There are a number of wireless methods of communication, including:

Type Use

A wireless method of connecting devices to a


Wireless Fidelity (Wi-Fi)
local area network (LAN)

Allows two devices to connect to each other


Bluetooth
over very short distances

Transmits tiny amounts of data over very


Infra-red (IR)
short distances

Near Field Use close proximity RFID (radio frequency


Communication (NFC) identification)

4G and 5G Provides internet access to mobile devices

What is a local area network?

 A local area network (LAN) is a network which has a small geographical area (under 1 mile)

 All of the hardware is owned by the company/organisation/household using it

 LANs will use unshielded twisted pair (UTP) cable, fibre optic cable or wireless connections (Wi-Fi)

Advantages Disadvantages

If hardware fails, the


Allows centralised management of updates,
network may not function
backups and software installations
properly or even at all

Can secure its devices with the use of


Networks are more prone
firewalls, antivirus software and other
to attacks than standalone
security features to prevent unauthorised
computers
access
Access to data and
Allows users on the network to share
peripherals can be slow
resources such as printers and other
depending on network
peripherals
traffic

Require maintenance to
ensure that software is up
Allows the users of the network
to date, upgrades and
to collaborate and share files and folders
backups which can be
costly

What is a wide area network?

 A wide area network (WAN) is a network which has a large geographical area (over 1 mile)

 They are a collection of LANs joined together

 The computers on a WAN are connected via routers

 The hardware used to connect the networks together is not all owned by the
company/organisation/household using it.

 For example, telephone lines owned by telecommunication companies

 WANs will use fibre optic cable, telephone lines and satellite to connect the LANs together

What is a PAN?

 A personal area network (PAN) is a network that is used for transmission of data between devices in
close proximity

 A PAN has a very short range (10 metres)

 Bluetooth is the most widely used PAN

 Typical examples of devices which make use of a PAN are:

o Wireless headphones

o Mobile phones

o Tablet

o Laptop etc.

What is tethering?

 Tethering is when a host device shares its internet connection with other connected devices

 Commonly used by mobile devices to share its mobile data connection to devices such
as laptops and tablets

 Tethering can be enabled or disabled as part of the mobile contract

 Some network providers charge extra to use this feature


What is Wi-Fi?

 Wireless fidelity (Wi-Fi) is a common standard for wireless networks

 Wi-Fi is common in most homes and offices to connect devices such as laptops, tablets & smart
phones

 Using Wi-Fi, devices communicate with a hotspot or a wireless access point (WAP), which can be a
standalone device or built into a router or switch

 Wi-Fi may be preferred over Bluetooth when:

o High speed data transfer is required

o Long range communication is required

o Many devices are needed to be connected at the same time

Advantages Disadvantages

 Portability - Easy to move  Speed - Slower data


around, location is only transfer than Ethernet
limited by range
 Security - Less secure than
 Cost - Less expensive to Ethernet
setup and add new devices
 Range - Relies on signal
 Compatibility - Most devices strength to the WAP,
are manufactured with a built signals can be obstructed
in Wi-Fi adapter (up to 100m)

Bluetooth

What is Bluetooth?

 Bluetooth is another common standard for wireless networks

 Bluetooth is common in most homes and offices to connect devices such


as headphones, controllers, keyboards & mice

 Bluetooth is used typically for a direct connection between two devices

 When two devices pair, they both exchange a cryptographic key

 The keys are used to generate a secret shared key which is used to encrypt the data between the two
devices and create a Wireless Personal Area Network (WPAN)

 Connected devices continuously change their transmitting frequency between 79 different channels to
avoid interference and improve the reliability of the connection

 This is known as the frequency hopping spread spectrum (FHSS)


Advantages Disadvantages

 Speed - Very slow


 Compatibility - Ideal for transfer speeds
personal devices and ad-  Security - Data can be
hoc connections intercepted by anyone in
 Power - Very low power range
consumption  Range - Short range
(30m)

What is GPS?

 Global Positioning System (GPS) is a satellite system used to track the exact location of an object

 GPS uses orbiting satellites to receive, amplify and transmit signals

 Radio frequencies are used to communicate between satellites and ground stations

 GPS requires a direct line of sight

Sat nav in a car

 The position/location of the car is calculated using GPS software

 Data is transmitted every few seconds

 An algorithm calculates the speed/location of the car

 The map is updated every few seconds

Advantages Disadvantages

 Expensive setup and


 Wide coverage area maintenance

 Real-time data  Signal interference due to


transmission weather or obstacles

 Improved communication  Limited bandwidth and


in remote locations capacity

 Accurate location tracking  Privacy concerns and potential


for Surveillance

What is 3G & 4G?

 3G and 4G are references to the 3rd and 4th generation of mobile data networks

 They provide mobile devices with wireless access to the internet

 Each generation has a faster transfer rate and an improved capacity for more users

o 3G - 256 Kbps (kilobits per second)


o 4G - 100+ Mbps (megabits per second)

 The current generation (5G) has even faster speeds and lower latency

What is infra-red?

 Infra-red is a wireless communication method used to transfer very small amounts of data to a
device in direct line of sight

 Commonly used in remotes to control devices such as:

o Televisions

o Audio receivers

o Home entertainment equipment etc.

 Uses light waves which can cause:

o Walls or obstacles to block the signal

o Sunlight to affect the signal

 It is a reliable and cost effective solution for many short-range wireless communication needs

What is NFC?

 Near field communication (NFC) is a subset of RFID which allows communication between two
devices in very close proximity

 NFC can be either:

o Passive - uses energy from the reader

o Active - has it's own power source

 Smartphones use active NFC to allow contactless payments by tapping a smartphone on a reader

 Smartphones can also exchange data using NFC by tapping together (usually back to back)

Advantages Disadvantages

 Convenient
 Limited range
 Secure
 Slow data transfer rate (not
 Very fast suitable for transferring large files)
 Low  Compatibility
power consumption
Factors influencing digital communication
What is bandwidth?

 Bandwidth is the amount of data that can be carried by a connection in one second

 Measured in bits per second (bit rate)

 A smaller bandwidth means that less data can be sent and the network can slow down, potentially to
the point of becoming unusable

Impact on user experience

 A higher bandwidth means more data can be sent and received in one second

 Higher bandwidth can improve:

o Upload and download speeds

o Online gaming

o Streaming high definition video

 To stream content, enough data to play a few seconds is downloaded and stored in a temporary area
of memory called a buffer

 As the contents of the buffer are played, more data is downloaded at the same time to keep the buffer
full

 If the buffer ever becomes empty playback will pause

 To stream successfully, data must be downloaded to the buffer at a faster rate than it is being emptied

What is latency?

 Latency is the delay between data being sent and received

 If there is a big delay between the two, more data will be on the network causing collisions

 This can lead to even more packets of data being sent as the error rate will increase

Impact on user experience

 Playing games online smoothly, requires a high bandwidth

 A high latency can cause lag and the game will not respond as quickly as a users commands

 This can cause big issues when users are playing fast paced games or playing against other users with
a lower latency (have an advantage due to quicker response times)

 Streaming sport content with a high latency can cause micro-stutters and ruin a users watching
experience
What else can affect the speed & volume of data transfer?

Factor Description

Devices that emit electromagnetic signals such as


Interference
microwaves and fridges can disrupt wireless signals

Transfer Wired connections can carry more frequencies, meaning a


method higher bandwidth compared to wireless connections

Walls and furniture can block wireless signals, lowering


Blockages
the bandwidth available

The strength of a wired and wireless signals reduces as


Distance
data has to travel further

What are the advantages and disadvantages of wired & wireless communication?

Wired Wireless

Speed Fast data transfer Slower than wired

Location is limited by physical


Portability Location only limited by range
cable

Less secure, easier to intercept


Security Better physical security
data

Range Less affected by interference Affected by interference

Cables can be trip hazards,


Safety need routing along walls, None
under floors

Cables are cheap, more No cables required, may require


Cost devices means more cables a wireless access point to be
needed purchased

Broadband, mobile broadband & cellular networks

 Internet Service Providers (ISP) provide access to high speed internet (broadband)

 ISPs use fibre optic or copper cable to create a wide area network (WAN)

What is fibre optic?

 Fibre optic is a type of cable that uses light to transmit data on a wide area network (WAN)

 Fibre transmits data at a much higher speed and has a much higher bandwidth compared to copper
cables

 Fibre optic cable does not suffer from interference which makes them the most secure option to
send sensitive data
 Fibre optic cables can cover a long distance without any degradation, they can span cities and countries

What is copper cable?

 Copper is a type of cable originally used in telecommunication to transmit voice signals, forming the
traditional landline phone network

 The ability to use copper to deliver network traffic on a wide area network (WAN) made the internet
possible

 Copper cables degrade over time which limits their range compared to fibre optic

 Copper cable suffers from interference which can disrupt data quality

 Copper transmits data at a much slower rate, and has a much lower bandwidth compared to fibre optic

Requirements for connecting to a network


What is an IP address?

 An IP (Internet Protocol) address is a unique identifier given to devices which communicate over the
Internet (WAN)

 IP addresses can be allocated by a network administrator or assigned dynamically by a Dynamic Host


Configuration Protocol server (DHCP)

 IP addresses make it possible to deliver data to the right device

 A device connecting to a network will be given an IP address, if it moves to a different network then
the IP address will change

IPv4

 Internet Protocol version 4 is represented as 4 blocks of denary numbers between 0 and 255,
separated by full stops

 Each block is one byte (8 bits), each address is 4 bytes (32 bits)

 IPv4 provides over 4 billion unique addresses (232), however, with over 7 billion people and countless
devices per person, a solution was needed

IPv6

 Internet Protocol version 6 is represented as 8 blocks of 4 hexadecimal digits, separated by colons

 Each block is 2 bytes (16 bits), each address is 16 bytes (128 bits)

 IPv6 could provide over one billion unique addresses for every person on the planet (2128)

What is a MAC address?

 A MAC (Media Access Control) address is a universally unique identifier given to devices which
communicate over a local area network (LAN)

 MAC addresses are static, they can never change


 MAC addresses make it possible for switches to efficiently forward data to the intended recipient

 Any device that contains a Network Interface Card (NIC) has a MAC address assigned during
manufacturing

 A device connecting to a local network already has a MAC address, if it moves to a different network
then the MAC address will stay the same

 A MAC address is represented as 12 hexadecimal digits (48 bits), usually grouped in pairs

 The first three pairs are the manufacturer ID number (OUI) and the last three pairs are the serial
number of the network interface card (NIC)

 There are enough unique MAC addresses for roughly 281 trillion devices

 MAC addresses can be used to:

o Restrict or allow access to a network

o Identify a device on a network

o Track a device

o Assign 'static' or 'fixed' IP addresses

What is a device name?

 A device name is a way for users to describe/name a device so that it is easier to identify on a network

 Device names are not used by devices to communicate as they are not always unique

 Device names are set by users in the devices operating system or from a router

What cables are used in a wired network?

 A wired network is a network where physical cables are used to join devices together and transmit
data

 The most common types of cables in a wired network are:

o Ethernet

o Fibre optic

What is Ethernet?

 Ethernet is a wired networking standard to carry electrical signals between devices on a local area
network (LAN)

 Ethernet is common in most offices and homes to connect devices such a desktop computers & servers

 Ethernet uses twisted pair cables (CAT5) to allow duplex communication

What is fibre optic?

 Fibre optic is a type of cable that uses light to transmit data on a wide area network (WAN)
 Fibre transmits data at a much higher speed and has a much higher bandwidth compared to copper
cables

 Fibre optic cable does not suffer from interference which makes them the most secure option to
send sensitive data

 Fibre optic cables can cover a long distance without any degradation, they can span cities and countries

What is a wireless access point (WAP)?

 The Wireless Access Point (WAP) allows wireless devices to connect to a local area network (LAN)

 The WAP connects to a Switch or Hub via an Ethernet cable

 The WAP range is limited so the use of multiple Wireless Access Points can be used for complete
coverage or a home/business

What is a router?

 The router is responsible for routing data packets between different networks

 An example of data the router can direct is, sending internet traffic to the right devices in your home

 The router manages and prioritise data traffic, which can help to keep connections stable

 The router will assign IP addresses to the devices on the network

 The router acts as a gateway

What is a gateway?

 A gateway is a device that bridges the connection between two different types of network

 Gateways translate between different network protocols

 For example, a local area network (LAN) to a wide area network (WAN)

What is a switch?

 A Switch allows multiple wired devices to connect to a local area network (LAN)

 The Switch is an active device, which means it can inspect network data and route it to the correct
device, thus reducing traffic on the network

 A Switch can contain extra Software to allow administration/configuration

What is a booster?

 A booster is a device used to amplify a network signal in order to extend the normal range

 Boosters can be used with both wired and wireless networks

What is a server?

 A server is a dedicated computer that shares its resources with devices that connect to it

 Devices that connect to a server are known as clients


 Common examples of servers include:

o File

o Web

o Print

o Authentication

o Application

Server Function

File  Allows access to shared and private resources

 Stores the content of websites and processes


Web
requests made via HTTP to access them

 Manages print jobs and organises the queue so


Print
that individual printers are not overloaded

 Stores usernames and passwords that can be


checked when a user logs in
Authentication
 Authenticated users receive a certificate that
allows access to resources

 Allows clients access to applications that run


Application
directly from the server

 A single computer can perform multiple server functions depending on its resources (memory &
processor)

What is a web browser?

 A web browser is a software application used to locate, retrieve, and display content on the World
Wide Web (WWW)

 Web browsers are used to display web pages which include images, videos and other files

 Most web browsers have the following features:

o Home page

o Ability to bookmark favourites

o Keep a history of visited websites

o Hyperlinks which allow users to navigate between pages

What is an ISP?

 An Internet Service Providers (ISP) is a company that provides access to the Internet to users and
businesses
 The ISP provides internet access by leasing equipment and telecommunication lines to users that are
required to access the internet

 IPS generally charge a subscription fee for access to the internet

What are Search Engines?

 Search engines are tools that locate and display web pages related to the search terms entered by
the user

 They are essential for navigating the vast amount of information on the internet

 They index millions of web pages and use algorithms to rank the relevance of each page to the search
terms

How do search engines work?

 Search engines work in several stages:

o Crawling

o Indexing

o Ranking

 Crawling is when web crawlers scour the internet daily to retrieve new websites

 Indexing is how websites are categorised based on the content of their web pages, keywords and
metadata

 Ranking is how websites are ranked and listed on search engine pages - this depends on many factors
to display the most relevant results

What is filter software?

 Filter software uses two lists stored in a database to allow or block access to websites

 URLs entered by a user are compared against both lists

 The two lists are:

o Whitelist - URLs on the whitelist are allowed and the website can be viewed

o Blacklist - URLs on the blacklist are not allowed and the website is blocked

 URLs that cannot be found on either list are allowed

 Filter software is used by schools and parents to protect children from accessing age inappropriate
content

 Administrators can add and remove URLs from the lists


Benefits of using a local area network
What are the benefits of a LAN?

 Users can share peripherals such as printers

 Shared access to the internet

 Users can access their files from any computer on the network

 Communication can be made easier via email and social networks

 Users can share files and folders easily such as central databases and spreadsheets

 Servers can be used to provide centralised backups, updates and security

 Media streaming (movies, music and gaming)

What are the drawbacks of a LAN?

 There is an increased security risk to data

 Malicious software can infiltrate the network and render it unusable

 Servers and switches can provide a central point of failure, resulting in users not being able to
complete tasks using their computer

 Factors can impact the performance of the network such as the number of users and data on the
network at one time

What is a peer-to-peer network?

 A peer is a computer on a network which is equal to all other computers

 Each peer on the network

o Often have their own printer attached

o Will provide access to their own files

o Is responsible for their own backups

o Is responsible for their own security

o Is responsible for carrying out their own backups

 A network with no server providing services is a peer-to-peer network

 Most homes will have a peer-to-peer network model

Advantages Disadvantages

 Very easy to set up and maintain


 Users will need to
 Very cheap to set up because manage their own
there is no expensive hardware backups
to purchase
 No specialist knowledge or staff  Users will need to
are required to run the network manage their own
software updates

 The network can be less


secure

What is a client-server network?

 A client is a computer on the network, these connect to the server via a switch

 A server is a computer on a network which often has a single purpose, for example

o Managing access to the Internet

o Managing printing

o Providing email services

o Providing backups

o Controlling security

 Servers are often more powerful than the client machines

 Servers are seen as more significant than the client machines and can require specialist hardware and
software

 A network which uses a server is called a client-server model

 Most companies, organisations and schools will use a client-server network model

Advantages Disadvantages

 Servers can be expensive to


 Managing backups of the
purchase, setup and maintain
network is easier as it is
done from one central point  A specialist network manager
would be required as servers
 Updating and installing new
require specialist IT
software can be done
knowledge
centrally instead of having
to log on to each machine  Servers can be a single point
of failure, meaning all users
 Security of files can be
would lose access to the
managed easily
network if the server fails
SECURING DATA ON A NETWORK
How does a password help?

 Passwords are a digital lock to prevent unauthorised access to an account

 Passwords are used to authenticate a user to the network

 They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with
unauthorised access to a database, a hacker would not be able to gain access to the individual
passwords of users

 Strong passwords and regular password changes are important to maintain security

What is a firewall?

 A firewall is a barrier between a network and the internet

 A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they
are legitimate

 It can be both hardware and software and they are often used together to provide stronger security to a
network

o Hardware firewalls will protect the whole network and prevent unauthorised traffic

o Software firewalls will protect the individual devices on the network, monitoring the data
going to and from each computer

What is encryption?

 Encryption is a method of scrambling data so that unauthorised users cannot understand it

 Encryption methods use 'keys', which are specialised programs designed


to scramble or unscramble data

 Encryption uses complex mathematical algorithms to scramble the data

 There are two common methods of encryption:

o Symmetric

o Public key

Symmetric encryption

 The sender uses a key to encrypt the data before transmission

 The receiver uses the same key to decrypt the data

 It's usually faster, making it ideal for encrypting large amounts of data

 The significant downside is the challenge of securely sharing this key between the sender and receiver

 If an unauthorised user captures the key, they can decrypt all messages intercepted in transmission

Public key encryption


 Public key encryption uses two keys:

o a public key for encryption

o and a private key for decryption

 Receivers openly share their public key

 Senders use this public key to encrypt the data

 The receiver's private key is the only key that can decrypt the data and is kept locally on their side

 The public and private keys are created at the same time and are designed to work together in this way

 It is typically slower than symmetric encryption

 It is generally used for more secure and smaller data transactions, e.g. passwords, bank details

What is WEP?

 Wireless Encryption Protocol (WEP) is a method of encrypting data being transmitted on


a wireless network

 Each device on the network uses the same key to encrypt and decrypt data

 It is a less secure encryption method due to all devices on the network sharing the same key

 Eavesdropping software (packet sniffers) can be used to intercept data packets and identify the key

What is WPA?

 Wi-fi Protected Access (WPA) is a more secure method of encrypting data being transmitted on
a wireless network

 Each device connected to the network receives a different key

 New keys are used for every packet transmitted on the network

What is a VPN?

 A VPN allows users to remotely connect to private local area networks (LANs)

 All data sent and received using a VPN is encrypted

 Common uses of a VPN include:

o Remotely accessing a companies network (working from home)

o Making secure payments

o Hiding web activities

o Bypassing geolocation rights management or online censorship

What are file access rights?

 File access rights can be set to determine different levels of access to specific files/folders

 Examples of file permissions include:


o Read - can read the contents of a file only

o Write - can make changes to file contents and/or create new files

o Delete - can delete files

o Execute - can run applications/launch software

What is a transaction log?

 A transaction log is a secure file on a network that keeps a record of every action performed by devices
on a network

 Transactions logs include:

o Device & data access

o Timestamps

o User IDs

o Successful/failed login attempts

 Transaction logs don't directly protect a network, they help administrators monitor any identify any
unusual activity

 Backups are another indirect method of protecting a network

 Keeping copies of data in a secure place on the network in the event of a data breach/loss

You might also like