ICT - Chapter 5 - Revision Notes
ICT - Chapter 5 - Revision Notes
ICT - Chapter 5 - Revision Notes
There are requirements for devices to connect to a network so that they can abide by the protocols.
1. IP Address
IPV6 was developed because the number of devices was growing faster than the number of physical users.
2. MAC Address
The second three pairs – Unique to the device and its NIC
E.g. – Every individual Lenovo device has a different second three pairs.
1. Identifying devices on a network (E.g., in malls when they only give you a certain amount of Wi-Fi time. If
you log in again you are rejected because your MAC Address is identified)
2. Tracking devices on a network
3. Changing device’s access rights to a network
4. To adjust dynamic/static IP Addresses
Since IP Address constantly changes, using MAC Address you can specify a fixed IP Address for a device when
it connects to your network.
3. Device’s Name
This is not the best way as several devices on one network can have the same name
Edexcel IGCSE ICT Revision Notes Youssef
1
Koraitem
Components of Wired and Wireless Networks:
Networks typically have a few standard components which we need to know about:
A) Cables
Cables are used to connect devices in a wired network.
Variations include: Cat5e, Cat6 and even optical fibers.
Measurements of their speed is taken in Mbit/s or Gbit/s.
C) Gateway
A gateway connects LANs to WANs
D) Routers
Routers store all connected device’s IP Addresses.
They use these to forward network traffic using the fastest route.
E) Switch
A switch has many ports that can be used to connect devices with wires.
F) Booster
A booster amplifies a network signal so that it can cover larger distances.
G) Server
A server is a computer that shares its resources with connected devices.
Devices connected to a server are called clients.
Types of servers include:
1) Authentication Server
2) Application Server
3) File Server
4) Print Server
5) Web Server
2) Web Browser – A web browser takes requests and guarantees access to Web Servers
A) Peer-to-peer network:
This is where the devices are connected to each other and share resources without a server.
B) Client-server network
This is when all the devices are connected to one server.
2) Firewalls
These are found on gateways and control what can enter the network of the LAN (like a cell membrane)
3) Encryption
This is when data is scrambled so that unauthorized users are unable to understand it.
A) Caesar Cipher
All data is shifted by a certain number of units to the left. The number of units it’s shifted is the key. This is,
however, easy to crack.
5) Transaction Logs
These keep track of all exchanges of data happening on the network.
7) Backup