GCSE ICT Revision Topic 2: Connectivity.

Slides:



Advertisements
Similar presentations
How to Set Up, Secure and Manage A Network
Advertisements

Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Networks: LANs File Server : Runs software, stores files. Terminals : Workstations that give network access. Print Server : Queues up all print jobs from.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
1.1 System Performance Security Module 1 Version 5.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Communication Methods
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Communications & Networks National 4 & 5 Computing Science.
Describe the characteristics of a personal/desktop computer and its uses, both as a standalone and networked computer Describe the characteristics of a.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
COMBINING TECHNOLOGIES. WHY COMBINED? Achieve a lot more by using them together Achieve a lot more by using them together.
Network media, protocols and networking standards, networking hardware.
The Internet – Connection Methods 14 The Internet – Connection Methods 14.
ICT Unit 4: Network and the effects of using them
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
One of the most important ways that information technology is used today is to distribute, exchange and share information. Electronic communication systems.
Unit 2 Technology Systems
Understand how a router works and its purpose
CS101 Home Network Basics.
Wi-Fi Technology.
Ethernet, WiFi & Protocols
Unit Communication Hardware
Network and hardware revision
By: Hunza, Omar and Anum Chapter 4 pg(76-79).
LAN, WAN, and Network Topologies
Computer network Ch.5.
Networks and Communication
Wireless USB.
Transfer of data in ICT systems
The Internet and connections
Chapter 4 Computer Networks – Part 2
SUBMITTED BY DINEEJ A 28 S3 EC
Edexcel GCSE ICT ASSESSMENT INFORMATION
Desktop/Personal Computer
Types of internet access
Final Revision Notes-Grade10
Unit 9 Network Fundamentals
Mitel Networks SX-200 ICP Sales Training Terminology.
Wireless Fidelity (15881A0515).
Ultra Wideband Technology
Transfer of data in ICT systems
McGraw-Hill Technology Education
Networking Lexi Becker Chapter is broke in two parts
Fun gym Cambridge Nationals R001.
Computer Technology Notes #4
THE PYRAMID OF KNOWLEDGE
Chapter 7 Connecting to the Internet
CS101 Home Network Basics.
Connecting to the Internet
Topic 5: Communication and the Internet
Networks Learning Outcome 1
Creating a home network
Computer Skills and Applications II
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Networks 1 Key Revision Points.
Introduction to Networks
CS101 Home Network Basics.
McGraw-Hill Technology Education
CS101 Home Network Basics.
Presentation transcript:

GCSE ICT Revision Topic 2: Connectivity

Home Networks Most homes with a home network use it mainly to allow users to share an Internet connection. A local area network (LAN) connects all the computers in a house so that resources can be shared. Benefits of a home network include: Sharing the Internet connection Sharing files, including backing up files Sharing peripherals, for example printers Connecting to the Internet from a home network requires a router.

Home Networks You need to know what is good and bad about cabled connections and the same for wireless connections. Think of the computers at school – they are connected by cables in computer rooms but the laptops in the Art room are wireless. There are good and bad things about each type of connection.

Cable & Wireless Compared Cable Connection to Router (Ethernet) Wireless Connection to Router (Wi-Fi) Setting up  Cables have to be run from the router to all rooms  All you need is a wireless router Cost  Installation is expensive  cheaper; only the cost of the router Bandwidth  Very fast (1 Gigabit per second)  Slower; 54 megabits per second (Mbps) Interference  Should not experience any interference  Can be affected by walls, distance, electronic devices Security  Good; users are directly connected to the network  poor; anyone can connect unless a password/key is set Mobility  You cannot connect in a room without a socket  Connect from any room and stay connected moving

Network Security Wireless networks are less secure than cabled ones. If you do not secure your network, anyone within range can access it. To secure the network, people should be advised to change the default password on their router. People should set up some form of encryption. Encryption scrambles data so that only computers with the right key can read it.

Combining Technology Digital devices can be used together. Mobile phones and laptops, for example, are compatible because they can communicate via Wi-Fi or Bluetooth technology and they both have USB ports. A photograph can be taken on a mobile phone, for example, and shared online after being uploaded to a laptop. Exam Question: List two ways in which Jack can transfer the images from his camera to his laptop. (2 marks)

Bandwidth and Latency Higher grades: Bandwidth is the number of bits that can go through the network connection in one second (measured in bits per second, bps). Latency is the time in milliseconds between a bit leaving one device and arriving at the other. It is measured in milliseconds (ms). For streaming videos, you need a connection with high bandwidth otherwise the video pauses. To get quick search results from Google, you need a low latency network connection so that information arrives quickly.

Wi-Fi and Mobile Broadband The most common ways of connecting to the internet on the move are Wi-Fi and mobile broadband. Wi-Fi devices need to be within range of a wireless access point (‘hotspot’). This connection is good because it has a good range (60 metres from the hotspot) and is quite widely available. This connection is not so good because, sometimes, hackers can set up fake hotspots putting users at risk. 3G and 4G can be used which have greater coverage than Wi-Fi. 3G is more secure than Wi-Fi because data is encrypted. 3G costs money though and downloads are limited.

Communication Protocols Protocols are rules that devices follow when they communicate with each other. VoIP (Voice over Internet Protocol) is the set of rules for transmitting audio messages over the Internet. These help people make free voice calls or, combined with a webcam, video calls. POP3, IMAP, SMTP – these are the rules used when sending emails. HTTP – this is the protocol of the World Wide Web (WWW). HTTPS is the secure version of this.

Security Risks When you connect a computer to a network, there are security risks that you need to be aware of and how these can be prevented. When you connect to the Internet, your computer is visible to billions of computers around the world. To protect yourself, use a firewall. This is software that permits or blocks connections. Users need to take care of their data when using the Internet too. Data should be encrypted to ensure its safety.

Security Risks Data can also be stolen through unauthorised access. People should set secure passwords consisting of numbers, punctuation and upper and lower case letters. People should also lock their computer when they leave it unattended. To prevent physical theft of the computer, chains and locks should be used to further protect data that is saved on the machine itself.