Summary

This presentation details ICT IA4, covering topics such as how websites are accessed, how data travels over networks and how data security is maintained. The presentation includes different tasks and examples for a better understanding.

Full Transcript

ICT IA4 By Johan, Smaran, Sreejit and Ian Table of Contents Task 1- How a website is accessed when a user types a URL into a web browser Task 2- How the data travels over networks Task 3- How we know that the data we are sending is kept secure and safe from error...

ICT IA4 By Johan, Smaran, Sreejit and Ian Table of Contents Task 1- How a website is accessed when a user types a URL into a web browser Task 2- How the data travels over networks Task 3- How we know that the data we are sending is kept secure and safe from errors Task 1 The parts of a URL URL stands for Uniform Resource Locator, and it is a unique identifier to locate a resource from the internet. URLs consist of 3 parts: 1. The protocol : method for exchanging or transferring data around a computer network (eg. https://) 2. The domain name: A string of text text that is matched to an IP address for website (eg. www.google.com) 3. The path: the exact location of a page/file/other asset (eg. /areyoufeelinglucky) Developer.mozilla.org How a DNS finds a matching IP address for a URL DNS is an abbreviation for Domain Name Server. It can be thought of as the internets phone book. When you type a URL into your browser the DNS translates the domain name into it’s IP address so that your computer can connect with the server. Think of it like the number stored is the IP address and the name you have given for the number is the URL. Savemyexams.com, dev.to Task 2 How data travels? 1. Data is sent through a cable and converted into binary code, 1s and 0s. 2. When sent over WiFi, firstly it is broken up into smaller packets which are later transferred which are later translated into bits. The packets get rooted to their final destination through many networking devices like routers and switches. 3. When the device gets a connection with the nearest cell tower using radio waves, its starts to send data. The cellular tower receives that same data and then sends it to the data centre through underground cables. Lastly, the data centre transfers that data to whichever service your are currently try to reach and then waits for the response. 4. First a device connects with Bluetooth using a method known as pairing he method lets the two devices swap information. Bluetooth uses radio waves to transmit data at the speed of 25mbps. It operates at 2.45 ghz frequency, it has a range of 10m. Simbase.com, cloudfare.com, elandcables.com Advantages of sending data through different ways 1. Through wired: Speed, Reliability when in place, security (physically) 2. Through wifi: Cheaper compared to others, stable internet connection, fast 3. Through cellular: large coverage area, easy global connectivity, convenient, efficient, capacity  Through Bluetooth wireless technology: Data can be transferred between devices without sending it via the internet. Large files can be transferred quickly. Because a code must be shared between the paired devices, it is difficult to intercept data during transfer. The fact that the data for one request may travel over more than one type of network Mobile Data + Wi-Fi: A mobile device might start a request using a cellular network (4G/5G) but switch to a Wi-Fi network if it becomes available and offers better performance. Local Area Networks (LANs): Your device is often connected to a local network, such as Wi-Fi or Ethernet, a short-range network connecting devices within a limited area. Wide Area Networks (WANs): Your request might traverse a larger, geographically distributed network, like your Internet Service Provider's (ISP's) network, to reach a regional or national backbone. In a remote region, data may initially travel from a user's device over a satellite link (which covers a wide area) to a ground station. From there, it may be routed over a fibre-optic or broadband network for further Cambridge.org, iop.org distribution. This involves multiple network types working together to Task 3 How we know that the data we are sending is kept secure and safe from errors  To ensure data security and error-free transmission, we rely on a combination of encryption, authentication, error-checking protocols, secure network infrastructure, and regular system maintenance. Errors can occur due to network issues, human mistakes, hardware failures, or protocol mismatches, but modern systems are designed with safeguards and error-correction methods to minimise their impact.

Use Quizgecko on...
Browser
Browser