#Connectivity Ppt Notes
#Connectivity Ppt Notes
CHAPTER 4
CONNECTIVITY
Connectivity is a way in which
digital devices exchange data
and communicate with each
other.
DIGITAL COMMUNICATION
1. WI-FI
• WI-FI is used in home, schools and office networks.
Some companies provide Wi-Fi access in towns and
cities. Wi-Fi is a wireless technology used to connect
to a network. That network can itself then be
connected to the internet, so that devices connected
to the Wi-Fi network can be connect to the internet.
2. BLUETOOTH
• Bluetooth is type of wireless connectivity that lets devices connect
over short distances. It cannot carry as much data as Wi-Fi.
• Bluetooth devices need to be paired (connect two devices-usually
only with each other) with each other before they can
communicate.
• Bluetooth can be used to transfer small files between devices.
• It is used to connect devices such as smartphones and laptops to
peripherals such as portable speakers, headphones, earphones,
keyboards, and mice.
3. 3G and 4G
• 3G and 4G are sometimes referred to as mobile
broadband.
• They are used to provide internet access to
mobile devices such as smartphones and tablet
devices when a Wi-Fi signal is not available.
• G stands for “Generation” meaning that 4G is
the fourth generation of mobile broadband
technology.
4. INFRA-RED (IR)
• Infra-red signals cannot carry much data and only
have a short range. Transmitters must have clear line
of sight to receivers, because this allows the signal to
travel in a straight line between them without being
blocked by solid objects like walls. The signal is also
affected by sunlight. It is often used in remote -control
devices such as television remote control.
5. NEAR -FIELD COMMUNICATION (NFC)
• NFC uses close proximity RFID (Radio
Frequency Identification) chips. NFC used in
smartphones, payment cards and travel
cards
Comparing wired and wireless connectivity
Wired Wireless
Cost Cables are cheap if purchasing for a small No need to buy cables
number of devices May need a wireless access point for
multiple connections
Safety Risk of tripping over cables None (though some people worried about
the effects of radiation)
Speed Faster than wireless Slower than wired
Stability Less affected by interference than wireless Affected by interference and objects
Portability Not portable as limited by connecting device Potable within signals range
END
UNIT 2-Chapter 5
NETWORKS
WHAT IS A NETWORK?
Identifying a device on a Some WI-FI hotspot only provide free access for a certain length
of time. on a network and they Identity a device using its MAC
network address in order to work out whether it is trying to access the
hotspot for longer than the permitted time
Tracking a device Some companies and organizations track devices (and therefore
their users) by checking which wireless access points have been
accessed by specific MAC address
3. DEVICE NAME
• A device name is a descriptive name that helps users
to identify computers on a network.
• Device names are not used by computers to
communicate With each other as they are not always
unique. This means that they could cause conflicts if
data was to be sent to more than one device with the
same name for processing.
COMPONENTS OF WIRED AND WIRELESS
SYSTEMS
1. CABLES
• Cables are used to connect devices in a wired network.
• Cat5e cables are used for Ethernet connections. These
cables are able to transfer data at 10 Mbit/s. 100
Mbit/s or 1 Gbit/s.
• Cat6 cables can be used to transfer data at 10 Gbit/s.
These are more expensive than Cat5e cables and are
usually only used by businesses.
2. WIRELESS ACCESS POINT
• Control of user access rights: Users, or groups of users, can be given access to
some resources (such as storage or printers) and restricted from accessing others.
• Centralized administration: Resources and user accounts can be managed by an
individual, or individual group of servers and administrators
• Centralized backup: User data is protected from loss because backups can be
automated for all users.
• Shared software: Application servers can provide access to shared software.
Some servers can provide access to operating systems.
• Shared storage and file access: The amount of storage available to users can be
managed centrally. Sharing storage means that users can make files available to
others.
• Roaming profiles: This is the ability to log into any computer in an office and see
your settings and files.
SECURING DATA ON NETWORKS
Methods used to secure data on networks