CAIE-As Level-Computer Science - Theory
CAIE-As Level-Computer Science - Theory
ORG
CAIE AS LEVEL
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for reja for personal use only.
CAIE AS LEVEL COMPUTER SCIENCE
Thin Clients Thick Clients
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by reja at Homeschool on 16/12/24.
CAIE AS LEVEL COMPUTER SCIENCE
Benefits Drawbacks
Client-Server vs. Peer-to-Peer models Can travel over large
Network Topologies Low frequency means
distances with a wide
Bus less data can be
range of wavelengths.
Radio transmitted at one time.
A single line (bus) connects all devices with Relatively inexpensive.
waves Affected by interference
terminators at each end. Used for TV signals and
from radio stations with
Other computers can read data being sent mobile phone
similar frequencies.
between any two computers. communications.
Unsuitable for heavy traffic due to frequent Expensive to build
Larger bandwidth allows emitting towers.
collisions. Microwaves
more data transfer. Physical obstacles can
Star interfere with signals.
Consists of a central server (switch) with all other Cost-effective for long-
computers connected via dedicated connections. Susceptible to
distance communication,
The server can send packets to different devices Satellites interference. Expensive
used in satellite phones
setup.
simultaneously and bidirectionally. and radio broadcasts.
No collisions are possible.
Mesh Wireless Networks
Every device (node) is directly interconnected with Use radio waves (including WiFi), microwaves, and
each of the other devices (nodes). satellites to connect devices to networks without
Commonly used for wireless networks, such as cables.
the Internet, through the mesh connection of
routers. Real-time On-demand
Hybrid Existing digital files are
A combination of two or more topologies. converted to encoded bit-
The event is captured live via a
Example: A connection between two or more streaming format for
video camera that is connected
LANs of different topologies. broadcasting on the internet by
to a computer.
uploading to a dedicated
server.
Benefits Drawbacks
A link for encoded video is
Less expensive and Doesn’t perform well Video signal converted to an
placed on the website, and the
Copper easier to install. Flexible. with small charges. encoded streaming video
user clicks on the link to view
Cable Easier to make Affected by signal.
encoded streaming video.
terminations. electromagnetism.
Encoded video signal uploaded The data is streamed to a
Greater bandwidth, from computer to a dedicated buffer in the user’s computer,
improved security, streaming server via cables or and the buffer stops the video
lightweight, easy to Needs expensive optical high-speed wireless internet from being paused as the bits
Fiber-Optic
install, and less signal transmitters and connection. are streamed.
Cables
boosting are required; receivers.
The server then sends live As the buffer is emptied, it’s
used in long-distance
images to all users requesting filled again, thus providing
communications.
them as a real-time video. continuous viewing.
Wired Networks It cannot be paused, fast- Can be paused, fast-forwarded,
forwarded, etc. etc.
Use copper (twisted-pair cable or coaxial cable) or
fiber-optic cables.
Cables are connected to an Ethernet port on the
network router.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by reja at Homeschool on 16/12/24.
CAIE AS LEVEL COMPUTER SCIENCE
Public cloud Private Cloud
Ethernet Access provided by third-party Owned and maintained by a
The most common wired medium for data service providers, shared single organization, providing
transmission in LANs or WANs. among multiple users. exclusive access.
Typically used in bus topology; data collisions are Managed by cloud service Can be managed internally by
managed by the CSMA/CD (Carrier Sense Multiple providers using large server the organization itself, or
Access with Collision Detection) method. farms. outsourced.
CSMA/CD Process:
Device checks if the channel is busy before Benefits Drawback
transmitting. Cannot access the
If busy, the device waits a random time before Less technical knowledge resources/data stored on the
retrying. required, easy to implement. cloud if there are bandwidth
During transmission, the device listens for other issues.
transmissions. Poor data privacy, since there
Flexibility to scale with may be data leakage in the
If a collision occurs, transmission is aborted, and
organization’s growth mindset. multi-tenant architecture
both devices wait random times before retrying. (public clouds).
Bit Streaming
Sequence of digital signals (bits) transferred over a
communication path at high speeds, requiring a fast World Wide Web (WWW):
broadband connection and buffers. Description: Collection of web pages stored on
Bit Streaming Types: websites.
Real-time: Live events captured and transmitted Function: Protocols are used to transmit data across
directly. the WWW.
On-demand: Pre-existing files are converted and Internet (Interconnected Network):
streamed as requested. Description: Massive, open network of networks.
Importance of High Broadband Speed/Bit-Rate Protocol: Uses TCP/IP protocol, which uses IP
The user has to download and display bits at the addresses to identify devices connected to the
same time. internet.
Higher quality media requires faster speeds due Access: Provided by Internet Service Provider.
to larger data frames as well. Communication Methods: Wired, radio, and
Real-time streaming needs higher speeds due to satellite.
simultaneous data requests coming from multiple Router in a Network:
different users. Function: Connects two networks together which
operate under the same protocols (for example, IP).
Cloud Computing Connections: Allows internal connections between
On-demand provision of computing services over the LANs or external connection from the main LAN to a
internet, including infrastructure, and platforms. WAN.
Infrastructure: Storage capacity and higher Additional Roles: Acts as a gateway and firewall.
processing power. Setup: Usually attached to a server or switch in a
Platform: Software, testing & debugging LAN.
resources. IP Address Translation: Translates private IP
addresses to public IP addresses and vice versa.
Public cloud vs. Private cloud
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by reja at Homeschool on 16/12/24.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by reja at Homeschool on 16/12/24.
CAIE AS LEVEL COMPUTER SCIENCE
IPv4 IPv6
32-bit address, split into 4 The 128-bit address is divided Public and Private IP Addresses:
blocks by “.” into eight 16-bit blocks by “:” Public IP:
Each block could have a value Each block can have 4 hex Provided by the ISP.
between 0 and 255 (00 to FF in values ranging from 0000 to Unique and can be accessed across the internet.
hex). FFFF. Private IP:
IPv6 can be shortened by Issued by the LAN’s router.
removing at least (≥) 2 blocks Unique within the LAN and can only be accessed
containing only zeroes. For within the LAN.
example: NAT (Network Address Translation): Required
For example, 255.0.1.255. “2001:0db8:85a3:0000:0000:8a2 for private IP addresses to access the internet
e:0070:7334” can be shortened
to directly.
“2001:0db8:85a3::8a2e:0070:73 Security: Private IPs are more secure than public
34" IPs since they are not directly accessible on the
Internet and are hidden by NAT.
IPv4 vs. IPv6 Address Range: The range of IP addresses used
IPv4 Functionality: for private IP addressing can never be assigned to
IP Address Structure: public IP addresses.
Network Identifier (netID): Identifies the
network to which the host (device) is connected. Static Dynamic
Host Identifier (hostID): Identifies the host The IP address will change at
IP address never changes.
within the network. regular periods.
Classful Addressing: Used for IPv4, where Static IP addresses are valid Dynamic IP address is relatively
different bit lengths for identification impose when websites need to more secure, hence used
restrictions on available addresses. remember a device for a long where data privacy is quite
Subnetting: time, e.g VPNs whitelisting. important.
Definition: The practice of dividing a network into Faster upload/download Maintaining the cost of the
two or more networks. speeds. dynamic IP address is a lesser.
Structure: IP addresses are broken down into
three parts by not changing the netID but Static vs. Dynamic IP addresses
partitioning the host ID into a subnet ID and host
ID. URL (Uniform Resource Locator)
Subnet ID: These bits are used to identify Unique reference address for the exact location of an
each subnet within the network. internet resource on the WWW
Subnet Masks: Numbers that hide (mask) the Protocol: Enables the browser to know what protocol is
netID of a system's IP address and leave only used to access information in the domain.
the host part as the machine identifier, Host-name: The domain name.
allowing data to be routed within the subnet Location of Server: The path indicating the server
to the appropriate host. location.
Domain Name Service (DNS)
Definition: A naming system used for computers or
resources having an internet connection.
Structure: Consists of a hierarchy of DNS servers
which have a URL database and their corresponding
IP addresses.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by reja at Homeschool on 16/12/24.
CAIE AS Level
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by reja on Mon Dec 16 2024 for strictly personal use only.
These notes have been created by Nethul Dulwan Gunasekara for the 2024-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).