Year 8 Digital Communications
Year 8 Digital Communications
Learning Objectives
IP Address
Each web server has an IP address. This is the address that other devices use to send their
requests for accessing webpages.
A secure website means the data that is transmitted to and from it is encrypted.
Firewall prevents unauthorized access through the Internet .
Firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. A firewall typically establishes a barrier between a trusted
network and an untrusted network.
Network Topology :
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other.
Types of Network Topology:
Bus Topology:
Bus topology is a network type in which every computer and network device is connected to a
single cable. All devices share single communication line or cable.
Backbone/Main Cable
• Low-cost cable: In bus topology, nodes are directly connected to the single cable.
Therefore, the initial cost of installation is low.
• Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
• Limited failure: A failure in one node will not have any effect on other nodes.
• Extensive cabling: A bus topology is simple, but still it requires a lot of cabling for every
individual device.
• If any fault occurs in the main cable, then it would disrupt the communication for all the
nodes.
• Signal interference: If two nodes send the messages simultaneously, then the signals of
both the nodes collide with each other.
• Reconfiguration difficult: Adding new devices to the network would slow down the
network.
Ring Topology
Ring topology is where nodes are arranged in a circle (or ring). The data can travel through the
ring network in either one direction or both directions, with each device having exactly two
neighbors.
Advantages of Ring topology:
• Ring topology has cheap installation and expansion. To connect one more host in the
existing network, we will need only one more extra cable.
• Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.
• If any fault occurs in the cable, then it would disrupt the communication for all the
nodes. The breakdown in one station leads to the failure of the overall network.
• Reconfiguration difficult: Adding new devices to the network would slow down the
network.
• Delay: Communication delay is directly proportional to the number of nodes. Adding
new devices increases the communication delay.
Star Topology
Star Topology is the kind of network topology in which all the nodes/devices are connected via
cables to a single node called a hub, which is the central node.
Every node in the network is directly connected to one central hub via cable.
Acting as a server, this central node manages data transmission.
Advantages of Star Topology:
• Since each of the nodes is independently connected to the central hub, so if one node
goes down, the rest of the network will continue functioning unaffected.
• Limited failure: As each node is connected to the central hub with its own cable,
therefore failure in one cable will not affect the entire network.
• Easily expandable: It is easily expandable as new stations can be added to the open
ports on the hub.
• If the hub/central node fails then the whole network is stopped because all the nodes
depend on the hub.
Role of protocols in transmitting data, including TCP/IP and HTTP
• Different data transmissions may have different requirements.
• This leads to the need for different protocols, depending on the data.
Protocols: A network protocol is set of rules that determine how data is transmitted between
different devices in the same network.
It allows connected devices to communicate with each other, regardless of any differences in
their internal processes, structure or design.
To ensure the scalability, the distance can be mitigated using boosters (wi-fi and/or ethernet).
The amount of data can be mitigated by having further bandwidth, or by using multiple smaller
networks that then connect together. This will mean that all the data is not all travelling on the same
route at the same time. Transmission can instead be managed in smaller areas and, therefore, not all be
using the same transmission media all the time.
Answer: It allows devices that are further away to connect with the network
Answer: Because the signal does not reach far enough, or because obstacles are in the way.
Error Detection
There is always the chance that data has been corrupted (changed in some way) during transmission.
To avoid having corrupted data it is really important that computers check for errors and correct them
wherever possible.
There are several methods of error checking, with some being more effective than others.
A parity bit is a check bit, which is added to a block of data for error detection purposes. It is used to
validate the integrity of the data. The value of the parity bit is assigned either 0 or 1 that makes the
number of 1s in the message block either even or odd depending upon the type of parity. Parity check is
suitable for single bit error detection only.
The two types of parity checking are
• Even Parity − Here the total number of bits in the message is made even.
• Odd Parity − Here the total number of bits in the message is made odd.
Receiver’s End − On receiving a frame, the receiver counts the number of 1s in it. In case of even parity
check, if the count of 1s is even, the frame is accepted, otherwise it is rejected. In case of odd parity
check, if the count of 1s is odd, the frame is accepted, otherwise it is rejected.
Answer: An extra bit added to a binary number to identify if there is an odd or even number of 1s.
Answer: Add the number of 1s, and add a 1 or 0 to make it odd or even as required
How does parity help you identify if there has been an error in transmission?
Answer: If the received data is not odd or even as required, then an error has occurred.