Connectivity

HideShow resource information
View mindmap
  • Connectivity
    • Home Networks
      • Local area network
      • Cabled connections are quicker and are not interfered with normally however they are expensive, harder to set up and you can't access the network from anywhere, cabled connections include Ethernet cableor CAT5 cable
      • Wireless connections are cheaper, easier to set up as well as being able to be accessed from anywhere however aren't as fast and can e interfered. an example is Wi-Fi. Hackers can also set up fake Wi-Fi hotspots and steal user details
    • Network Security
      • Network security is important because if it is not ecure people will be able to connect to it and use your internet connection easily, there are people who can use websites to see where unsecure hotspots are so that they can access the internet without paying
        • A net work can be made secure in a number of ways, you can change the password, set up encryption, set up media access control (MAC) filtering orturn the router off when it isn't in use.
    • Many devices are compatible with eachother as they are able to connect to eachother, for example with a USB connection such as a memory stick, or wireless connection such as bluetooth.
    • Bandwidth- the number of bits that can go through the netowrk connection in 1 second and is measured in bits per second. Latency - the time in miliseconds between leaving one device and arriving at the other.
    • Mobile broadband has a far greater coverage than Wi-Fi, is more secure as data is encrpyted, however you have to pay for it, Downloads are limited and the bandwidth is lower than Wi-Fi
    • In the past devices connected through a transmitter, however with Wi-Fi direct allows users to connect without the use of an access point,Users can set up a peer to peer network, however it still allows users to connect to an access point for normal Wi-Fi.
      • Bluetooth is another way of setting up a peer to peer network, users can communicate automatically when in range, up to 8 devices can be connected and low power so it does not interfere with other devices
    • VoIP- Voice over internet protocol, used to make online voice calls and video calls if there is a camera, can also be used from a smartphone. Very useful when travelling or abroad
    • Email
      • Post office protocol or POP3 allows the recipient's mail server to download the email to the computer, the email is then deleted from the server and can be read when offline
      • Internet Message Access Protocol or IMAP is used when the email is read on the mail server, the email isn't deleted from the server and can be accessed anywhere with an internet connection
    • HTTP or hyper text transfer protocol is used on the world wide web, it uses the protocol to transfer the needed files, There is also HTTPS, the S meaning over SSL (secure sockets layer) This is mroe secure as it uses encrpytion, the server and browser use the encrpytion to send information to one another and the encryption is unique
    • Digital certificates are issued by companies such as Norton and they certify the identity of the website you are working wit
    • Risks
      • Data can be intercepted by other users, and the vital information is protected by encryption
      • Other computers on the network are able to remotley access your computer, however a firewall protects you from this by blocking the income users
      • Physical things such as Chains, locks and RFID chips can be used asn physical iprotection to protect any theft of the real equipment

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Connectivity resources »