Unit 2 Ict Csic
Unit 2 Ict Csic
CONNECTIVITY
The speed at which devices can transfer data depends on the …………………………………… of the connection
Bandwidth –
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
Buffer –
………………………………………………………………………………………………………………………………………………………………………………………………………………………… ,
especially when streaming video.
To avoid the buffer becoming empty, data must be constantly downloaded into the buffer, filling it up at
a rate faster than it is emptied.
Latency
1
LATENCY –
……………………………………………………………………………….……………………………………………………………………………………………………………………………………………
……………………………………………………………………………….……………………………………………………………………………………………………………………………………………
When we ping a Domain, we send a packet of data to a server and the packet of data is immediately
returned by the server to the originating device.
If the …………………………………………… is high, events in the game will …………………………………… and the game will not seem
✓ ………………………………………………………………………… .
✓ ………………………………………………………………………… .
✓ ………………………………………………………………………… .
✓ ………………………………………………………………………… .
When devices transfer data, they can be affected by many factors that stop bits from reaching their
destination.
These bits then have to be sent again, which slows the overall data transfer rate.
Transfer Method
2
Comparison
Wire methods, Ex. – Copper cable can carry more frequencies than wireless methods.
Cable methods can have more bandwidth available to them than wireless methods.
INTERFERENCE
Other electromagnetic signals disrupt or interface with wired and wireless signals.
Ex. Wireless routers and appliances emitting (discharge) electromagnetic fields like fridges and microwave
ovens.
Cable connections can be Shielded (Protected) from this interference by having the wires wrapped in a
thin layer of metal.
BLOCKAGES
…………………………………..…………… and ……………………………..……………………… reduce the strength of wireless signals.
This reduces the available …………………………………………………………….
DISTANCE
The strength (power) of a wired or wireless signal is reduced as the distance that it has to travel increases.
DEVICE-TO-DEVICE COMMUNICATION
Devices can connect directly to each other using ……………………………………… or ……………………………………… methods.
This is called DEVICE-TO-DEVICE COMMUNICATION.
3
Minijack
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
HDMI - ……………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………
Table. h/w
NETWORK COMMUNICATION
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
4
WIDE AREA NETWORK
It is a network that is spread over a ……………………………………………………………………………………………………………………….
They are often used to connect different buildings owned by national and international businesses, law
enforcement agencies, health and education organizations and government departments.
WANs often have ……………………………………… transfer speeds than ……………………………………… because of their wider
reach.
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
Devices in a PAN can either be connected to each other directly or connected through access points.
5
PAN
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
TETHERING
It is the process of connecting a ……………………………….…………… device, such as a …………………………………..………………… or a
……………………………………… device, that uses a ………….…………………………………………………………………………………………… with one or more
other devices.
This enables the other device or devices to ……………………………………… the host device’s ………………………………………
connection.
Mobile phone network providers can enable or disable tethering as part of the Service Agreement –
(contract)
6
Consequence of Tethering
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………………
SATELLITE COMMUNICATION
7
Benefit of satellite communication
1. …………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
2. …………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
2. …………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………….………………………………………………………………………
…………………………………………………………………….………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………….………………………………………………………………………
TELEVISION
▪ What is the Internationally accepted standard method of broadcasting digital television?
…………………………………………………………………………………………………………………………………………………………………………………………………….
DVD-S
8
▪ What the Set-top box is?
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
2. …………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
9
DIGITAL RADIO
DAB – ……………………………………………………………………………………………………………………………..…………………..
✓ DAB provides, ……………………………………………….………………………………………… and can also carry text data that DAB
receivers can display.
✓ The text data can include the time, name of the station and details of the music being played.
TELEPHONE
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
10
WIRED COMMUNICATION
✓Some wires use for many different purposes such as USB. Others are only used to meet one particular
need, such as Ethernet.
Ethernet.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
• HDMI ……………………………………………………………………………………
• Minijack ……………………………………………………………………………………
• USB ……………………………………………………………………………………
• Ethernet ……………………………………………………………………………………
USB - ………………………………………………………………………..……………………… .
✓ (1996)– is a very ……………………………………….………………… connection type. It has been through a number of
revisions, and each revision allows ……………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
✓ Maximum length of the Ethernet cable, before the signals it carries start to lose quality - ………………………
✓ Types of Cables use – Twisted pair cable, Coaxial Cable, Fiber Optic cable etc.
WIRELESS COMMUNICATION
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
11
Wi-Fi
✓ It is used in ……………………………………………and …………………………………………… networks.
✓ It is a wireless technology used to connect ……………………….……..………………… to a network.
✓ It uses the IEEE 802.11 specification of standard (Institute of Electrical and Electronics Engineers)
BLUETOOTH
✓ It is a type of …………………………..……………… connectivity that lets devices connect over
…………………………………………………..…… distance.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
12
3G and 4G
✓ They are also referred to as ………………………..………………………………………………………………………….
✓ They are used to provide ……………………………..……………………………………………………… to mobile devices such as,
smartphones and tablet devices when a WiFi signal is not available.
INFRA-RED (IR)
✓ IR signals cannot carry much data and only have a short range.
✓ Explain why Transmitters must have a clear line of signal to receive?
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
ISP
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
13
FIBRE OPTIC CABLE
……………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………..……………………………………………………………………………
………………………………………………………………………………………………………………………….…………………………………………………………………………
……………………………………………………………………………………………………………………………….……………………………………………………………………
…………………………………………………………………………………………………..…………………………….…………………………………………………………………
COPPER CABLE
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
14
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
- Chapter questions
1. Explain one reason why some games console controllers use Bluetooth rather than infra-red to connect
to the console.
IR signals do not travel as far as Bluetooth signals.
IR needs line of sight, if the controller is often pointed away from the consoler when in use
2. State one way in which using infra-red in games console controllers could affect the experience of the
person playing the game.
3. Describe bow video streaming works.
Packet or parts of video file are downloaded to the buffer, which is then topped up as the video plays.
3. Explain why streaming is more convenient for the user than downloading.
The user does not need to wait for the entire file to be downloaded. Before that the video can be played.
4. State 3 types of wired connections.
USB , HDMI , Mini Jack , Ethernet
6. Explain why global games companies use games servers in multiple countries to ensure that the
experience of users is not negatively affected when playing online games.
As people play games with other players from all around the world, and they want to avoid Lag which is
caused by Latency.
15
CHAPTER - 5 N E T W O R K S
Protocols
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
In order to connect to a network, computers need to fulfil certain requirements so that they all operate
using standard Protocols.
Stand-alone
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
16
Methods used to identify the devices on a network.
………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………….…………………………………………
IP Address
Ex.
IPv6 – uses
…………………………………………………………… of 4 hexadecimal numbers separated by ……………………………………………………… .
Ex.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
17
MAC Address – Media Access Control
It is a ………………………………………………………………………………………………………………identifiers
given to the NETWORK INTERFACE CARD – NIC.
Remaining pairs are assigned by the manufacturer to uniquely identify the ………………………………………………… .
Ex.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
Device Name
Device names are not used by computers to ……………………………………………………… with each other as they are
not always ……………………………………………………… .
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
18
Device name can be ……………………………………………………….
CABLE
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
19
SWITCH
……………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………..……………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………
GATEWAY
……………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………..…………………………………………………………………………………………………………………………………………
20
ROUTER
BOOSTER
Wireless access points can be set to repeater mode in order to act as boosters for WiFi signals.
21
SERVER
………………………………………………………………………………………………………………………………..……………………
………………………………………………………………………………………………………………………………..……………………
………………………………………………………………………………………………………………………………..……………………
………………………………………………………………………………………………………………………………..……………………
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
?. Explain how the computer’s ability to perform multiple roles will depend?
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
22
INTERNET SERVICE PROVIDER – ISP
WEB BROWSER
…………………………………………………………………………………………………………………………………………………………………………………………………….
Ex.
Search engine
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
FILTER SOFTWARE
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
23
Explain how the black list can be updated.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
Peer-to-peer Network
Computers in the peer to peer network ……………………………….……………… their ……………………………….……………… with
other computers in the network, but they do not ……………………………….……………………………..……………. .
24
Client-Server Network
The network that uses ……………………………….……………… and ……………………………….……………… is called a client-server
network.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
NETWORK SECURITY
It prevents ……………………………………………..….……………… users from accessing network ……………………………….………………
and ……………………………….……………….
25
……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………
……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………
……………………………………………….………………………………………………………… ……………………………………………….…………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
Once a user has been authenticated, they do not have to log in each time they access a resource or
service.
FIREWALLS
It controls the ……………………………………………..……….………………to and from a network, particularly the traffic from
the Internet.
It prevents ………………………..……….……………… users from accessing network devices and resources. Ex. Storage.
ENCRYPTION
After encrypting a message, the user is at the other end should decrypt it before reading. Typically it
happens automatically by the system.
(Book-Cipher)
26
Types of Encryptions
1. Symmetric key encryption
It uses the ……………………………….……………… key at both ends of the process.
Same key is used to encrypt and ……………………………….……………… the data.
2. Public key encryption
It uses two ……………………………….…………………………………………………….…………keys called a ‘Key Pair’.
One key is used to ……………………………….……………… the data and a different key is used to
……………………………….……………… it.
The connection to the LAN is created using the infrastructure of a public network like the Internet.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
27
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
TRANSACTION LOGS
Log – ………………………………………………………………………………………………………………………………………………………………………………………….
Transaction – ………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
BACKUPS
It is copy of ……………………………….……………………………………………….……………………………………………….……………….
Backups are usually stored on a …………………………………………………………………………………….….………………device to the
original file.
28
Chapter Questions
2. Explain why public key encryption is more secure than symmetric key encryption.
Public key encryption uses two different keys to encrypt and decrypt the data.
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………….
29