Download Communication Systems #5

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Information processes and technology topic 3-Communication systems
Characteristics of Communication Systems


A communication system allows its users to send and receive data and information
The framework in which communication systems function is shown in the diagram below, where it represents
Skype/MSN as a communication system.
Network
Interface
Card
Ethernet Cable
Wireless
Functions performed within communication systems to send a message:
 Message creation
 Organisation of packets at the interface between source and transmitter
 Signal generation by the transmitter
 Transmission via a medium
 Synchronising the exchange
 Addressing and routing
 Error detection and correction
 Security and management
All communication systems have five basic components:
1. The data source produces the data to be sent.
2. The transmitter encodes the data into a signal suitable for a transmission' medium.
3. The transmission medium is a channel, such as a cable, in which the signal is~ transmitted to the destination.
The signal may be changed or distorted during transmission.
4. The receiver decodes the signal back into the original data or an approximation! of the data
5. The destination is the receiver of the information.
Protocols in communication:
 A protocol is a set of rules that governs a communication process
 ‘Handshaking’ is the process of establishing a communication link and agreeing on which protocol to use.
 A communications protocol must define the following:
o Rate of transmission (in baud or bps)
o Whether transmission is to be synchronous or asynchronous
o Whether data is to be transmitted in half-duplex or full-duplex mode

Also, protocols can include sophisticated techniques for detecting and recovering from transmission errors and
for encoding and decoding data.
Common protocols:
 TCP/IP: Transmission Control Protocol/Internet Protocol – rules that split data into packets for transfer across
the internet
 HTTP: Hyper Text Transfer Protocol – allow the displaying of files containing hypertext links across a network
 FTP: File Transfer Protocol – the protocol defining the transfer of files over a network or the internet
 SMTP: Simple Mail Transfer Protocol – sending of e-mail messages
 POP: Post Office Protocol – retrieves e-mail messages
 SSL: Secure Sockets Layer – used for encryption of data for secure data transmission
Page | 1
Information processes and technology topic 3-Communication systems
The client-server architecture:
The client sends a request to the server using its IP address and the
port. The server receives the request and responds using the client IP
address and port.


The client controls the user interface and application
The server controls access to the network

Advantages:
o Centralised resources; given that the server is the centre of the network, it can manage resources that
are common to all users
o It is possible to remove or add clients without affecting the operation of the network and without the
need for major modification

Disadvantages:
o Client-server networks can become congested and overload the server with requests
o Increased costs due to the technical complexity of the server
TYPES OF CLIENTS
The client controls the user interface and application . Some examples of clients include; web browsers and e-mail
clients.
 Thin clients:
o A thin client - a workstation that does not have the capacity to perform meaningful tasks without a
server. E.g. a thin client is a network computer without a hard disk drive. They are easy to install and
have lower total costs than fat clients.

Fat clients:
o A fat client (or thick client) - a desktop computer connected to a Network that includes a NOS. They
may do their own processing without access to the server. They perform the bulk of the processing in
client/server applications.
o They can handle higher bandwidths; operating systems and software that do not run on thin clients
can run on fat/thick clients as it has its own resources.
Servers


server – computer that controls access to the network
Some examples of servers include:
o Print servers - control access to printers on the network and queue data waiting to be printed
o Mail servers - receives electronic mail (e-mail) and stores it in the recipient’s mailbox.
o Web servers - stores and distributes web pages. It allows access over port 80 on its IP address.
o File servers- a computer that provides file services to workstations and users. It stores files and
application software.
o Proxy servers - a computer that manages printing tasks.
NOS

NOS(network operating system)- a set of core programs that run on the computer controlling a network. It
organizes the whole network as one. E.g. Microsoft Windows NT, and UNIX. They have features such as:
 Administration – allows the network manager to manage the network users and perform essential tasks
such as backing up the files on the shared network disk drives.
 File management – allows the network users to access and manage their files
 Security – protects the network resources, users and their files from unauthorised access to the network
 Sharing resources – enables users to access shared files and resources (e.g. printers and modems)
 Cross-platform access – provides software that will allow workstations using different operating systems
to connect to the file server.
Page | 2
Information processes and technology topic 3-Communication systems
Examples of Communication Systems
Teleconferencing systems:
 Teleconferencing (video conferencing) is an alternative to face to face meetings, using electronic hardware and
software such as camera and internet connections to transfer video and audio data. Commonly used for
education and conferencing.

How data is transmitted and received:
o The video and audio data is captured, digitised (by assigning a number -binary code- to each pixel on
the image to represent its colour), transmitted over the internet, and then decoded when received.
Advantages
o Facilitates flexible meeting scheduling
o Achieves worldwide connectivity; thus avoids
expensive travel costs
Disadvantages
o Can be expensive and requires fast processors and
high transmission speeds
o Reduces personal contact; lack of social skills
develop
Messaging systems:
Email:
 Users are able to send text messages and attached files to individuals or groups of people via the internet (e.g.
used in schools to send notices and make appointments).

How data is transmitted and received:
o Use computers to send and receive text messages and attached documents via the internet
Advantages
 Very fast transmission of mail compared to
conventional postal mail
 Capable of transmitting and receiving text,
graphics, sound and video as attachments
Disadvantages
 Viruses, which can be attached to email
messages
 Only available to those who have a computer,
internet connection and email address
Voice mail:
 Voice mail allows transmission of vocal messages between users via telephone systems.
 How data is transmitted and received:
o Audio messages are recorded and then transmitted by telephone system for storage (when someone
is unavailable)
Advantages
 The receiver does not have to be present, and
messages are stored and can then be later
retrieved by the recipient
 No extra hardware needed besides a telephone
Disadvantages
 Voicemail can be viewed as impersonal by
callers
 Only users with a voice mail account can access
its functionality
Voice over internet protocol (VOIP):
 Purpose: To allow voice calls to be made over a broadband internet connection
 Participants: Residential home users, small businesses
 Data/information: Sound waves converted to digital audio signals
 Information technology: Broadband internet connection, computer, VOIP software (for computer-to-computer
connections), microphone, speakers, sound card, modem

How data is transmitted and received:
o Sound waves are recorded by microphone
o The computer compresses it into data packets for transmission over the IP network
o The sending computer places an address on each packet telling the network devices where to send
them
Page | 3
Information processes and technology topic 3-Communication systems
o
o
o
Inside of each packet is a payload; a voice recording digitally converted
The sending computer sends the packet(s) to a router which directs it to the receiver
The receiving computer decodes the transmission to output sound waves
Advantages
 Except for your normal monthly ISP fee, there is
usually no charge for computer-to-computer
calls, no matter the distance
 VOIP consumes less transmission time
Disadvantages
 Phone conversations can become distorted,
garbled or lost because of transmission errors
(e.g. packet loss)
 Susceptible to worms, viruses and hacking
Other systems dependent on communication technology:
EFTPOS (Electronic Funds Transfer at Point Of Sale):
 EFTPOS is a financial network for processing credit cards, debit cards and ATM transactions at ‘point of sale’.
 How data is transmitted and received:
o Employee swipes card in a magnetic strip reader
o Customer enters password/PIN
o Card details collected and funds transferred from customer to retailer’s account
Advantages:



Easier than manually transferring funds from
bank branch
Efficient, secure form of payment
Disadvantages:


Both buyer and the seller have to pay charges
for use of the cards
Many people don’t have bank accounts or
prefer to use cash
Emerging trends
o Pay Pass
o Tap and Go (tap your visa card against the machine and up to $100 can be paid for using it,
E-commerce:
 E-Commerce - consists of the buying and selling of products or services over electronic systems such as the
internet and other computer networks. Can be used with computers, mobile phones, ATMs, telephone, etc.
Advantages
 Customers are more easily able to compare
products and services
 Reduced waiting time as products and services
are more quickly obtained by customers
Disadvantages
 Potential customers may not like having to
reveal their financial and personal information
online
 Fraud, hacking, identity theft, etc.
Electronic banking:
 Internet banking - involves consumers using the Internet to access their bank account and to undertake
banking transactions. They may do account enquiries and the access to the latest rate of interests and
schemes.
Advantages
o Allows people greater convenience in the
process of banking as electronic banking is
available 24/7
o Saves people from going into the bank to
withdraw or deposit money – travel time and
costs
Disadvantages
 Customers may be sucked into phishing scams
where they disclose their private details to
scammers believing them to be the actual bank
 Unauthorised individuals can intercept banking
transactions; gaining access to people’s private
banking details which they can use for criminal
activities such as fraud
Page | 4
Information processes and technology topic 3-Communication systems
Transmitting and Receiving in Communication Systems
Transmission media
Wired transmission:
Twisted pair
What is it?
Twisted pairs are stiff copper wires
surrounded by insulating material
then encased by a conductor like a
mesh. ELECTRICAL SIGNALS USED.
The twists in the cable reduce
interference/noise during
transmission. They are also called
unshielded twisted pairs. (UTP)
Coaxial pair
Coaxial cables are thick cores
of copper surrounded by
insulating material. The
insulation is enclosed by a
woven mesh. The mesh is
surrounded by a plastic layer
for electrical interference
protection.
Optical fibre cable
Fibre optic cables are very
thin glass strands well
protected by insulation.
Expensive and most
reliable
10Mbps to 1Gbps
2000m
Cost/reliability
Least expensive, least reliable,
Moderate,
Speed
Cable length
Uses
10Mbps, 100 Mbps
100m
A twisted pair is installed to an
ethernet cable (RJ-45) for use to
connect computers in a local area
network (LAN)
10Mbps
185m
Mostly used for Internet
connections and Foxtel (cable
television)
Topologies
Star, ring
Bus
Star, ring
Wireless transmission:
 Microwave:
o Microwaves are extremely high frequency radio waves waves that can be used for data transmission.
o Microwaves are also used by fixed traffic speed cameras, and for radar, which is used by aircraft, ships
and weather forecasters.

Satellite:
o Use microwave signals between the satellite and its ground stations.
o Geostationary object (in space) functioning as a repeater or microwave tower.
o Used for internet connections mainly in remote areas where other internet connections may be
unavailable
o Advantages: carry very high bandwidth over very large distances

Radio waves:
o The two types of radio transmission are ‘line-of-sight’ and ‘wide area spread spectrum’.
 line-of-sight- having a directional antenna in line with another antenna without objects
impeding the signal. Disadvantage = eavesdropping
 wide area spread spectrum- signals jump from one frequency to another. Advantages=
reduces interference and improves security
o Radio waves have the longest wavelengths in the electromagnetic spectrum.
o Radio waves do more than just bring music to your radio; they also carry signals for your television
and mobile phones.

Infrared:
o Infrared light-emitting diodes (LEDs) emit infrared radiation which is focused by a plastic lens into a
narrow beam. The beam is modulated, i.e. switched on and off, to encode the data. The receiving
computers will contain a silicon photodiode which will convert the infrared radiation to an electric
current.
o Wireless signals, mainly used in devices such as remote controls where it is transmission over very
short distances
o Advantages: add devices without cables
Page | 5
Information processes and technology topic 3-Communication systems
Transmission speed:
 Transmission speed is the time it takes data to travel from the source to the destination. The hardware being
used and the transmission medium will greatly affect this speed. It can be best described in terms of
bandwidth, baudrate and bits per second (bps).

Bandwidth: The ability of the transmission medium to handle a particular amount of data in a given time; the
higher the bandwidth the more data that can be sent

Baud rate: A measure of the speed of transmission in a communication medium; measures how many bits per
second a channel can send per second

Bits per second (bps): A measure of the speed of transmission in communication medium; measures how many
bits of data are transmitted (or received) in one second
Application level protocols:
 HTTP: Hyper Text Transfer Protocol – allow the displaying of files containing hypertext links across a network
 SMTP: Simple Mail Transfer Protocol – sending of e-mail messages
 SSL: Secure Sockets Layer – used for encryption of data for secure data transmission
Communication control and addressing level protocols:
 TCP/IP: Transmission Control Protocol/Internet Protocol – rules that split data into packets for transfer across
the internet

TCP: Responsible for breaking data down into IP packets before they are sent, and for assembling the packets
when they arrive

IP: Responsible for ‘routing’ each packet to the correct destination
Transmission level protocols:
 Ethernet: The Ethernet protocol allows for bus, star, or tree topologies, depending on the type of cables used
and other factors

Token ring: A token ring network is local areas network (LAN) in which all computers are connected in a ring or
star topology and a bit (or token) passing scheme is used in order to prevent the collision of data between two
Asynchronous – uses start and stop bits
computers that want to send messages at the same time.
Synchronous – no start/stop bit
Strategies for error detection and error correction:
 Parity:- Parity is the method used to check data in asynchronous transmission, where one character is checked
at a time. The eighth bit of the byte is the parity bit, which is used to check the accuracy of transmission. The
parity checking can be either odd or even.
o When 01010111 are sent, there is an odd parity.
o





When 01011111 are sent, there is an even parity, thus an error.
Checksum:-- If the 1 digits of a binary code are added they give a total which is called a checksum. The
receiving computer calculates the checksum and compares it to the transmitted checksum, and if they do not
match, an error is detected.
if the total of the bytes is lower than 255, that is the checksum
add all except for the last, divide by 255 if greater, get remainder,
if there’s an error, then the addition of the byte values, divided by 255 gets a different same remainder
o What is the checksum for the message 00000010
 00000010 = 2 (checksum)
Cyclic redundancy check (CRC):- the transmitted data is treated as one large binary sum . The sum is then
divided by a constant and the remainder is sent to the receiver. The receiver then works out the sum of the
transmitted data, divides it by the same constant and compares the remainder with the transmitted data. CRC
has the highest probability of detecting errors.
o TREAT THE MESSAGE AS 1 BIG BINARY. GET THE VALUE AND DIVIDE BY A CONSTANT. THE
REMAINEDER IS THE CRC.
Page | 6
Information processes and technology topic 3-Communication systems
Network topologies:
Star networks:
Star networks are where one central node (computer or other network device) and
distant nodes are connected along communications lines that radiate as spokes from the
central node.

Advantages:
o Fast; if the central computer is fast
o Non-centralised failure will not cause the entire network to fail
o Multiple nodes can be easily connected
o Files can be simultaneously accessed by multiple nodes

Disadvantages:
o The network operation depends on the functioning of the central
node; hence, the failure of the central node leads to the failure of the
entire network
Bus networks:
Bus networks are where several devices are connected to a single communications
channel.
Ring networks:
Hybrid networks:

Advantages:
o It is easy to handle and implement; only one main line
o Cheaper; no extra hardware is required (such as a central server)
o Easy error detection since there is only one main line and few
connections

Disadvantages:
o Slow; can perform well only for a limited number of nodes
o If the main line (bus) is broken, transmission will fail
Ring networks are where there is a continuous circle, with nodes around the
circumference.

Advantages:
o Cheaper, a central server is not required for the management of this
topology
o Easily set up/implemented – using cables

Disadvantages:
o If one node of the ring breaks down or a part of the network is
disconnected, the network will not work
Hybrid networks are where a combination of any two or more of the basic topologies.

Advantages:
o Able to be used where different types of networks are required

Disadvantages:
o Expensive, errors may be hard to detect within the network
Page | 7
Information processes and technology topic 3-Communication systems
Wireless networks:
Wireless networks are where the data packets are converted into radio
frequencies which travel through the air to the receiving node.


Advantages:
o Cables aren’t needed to connect the nodes together; portable
applications are available, e.g. laptops, wireless printers, etc.
o Easy to add stations as there are no cables required
Disadvantages:
o Disconnections are more common than with cable connections
o Quality of transmission is not as high as other methods
o Devices which are not Wi-Fi enabled cannot be connected to the
network
o Wireless signal can be intercepted and accessed by hackers
o within the network
Data collisions


CSMA/CD is used by bus or star topologies when data collides.
When a node needs to put data onto the network it must first 'listen' to the line for a carrier signal. It can
transmit data after it determines that no carrier signal is detected on the network. Since no other device is
transmitting it places it’s on carrier signal onto the line to prevent other nodes from transmitting. If a node
were to detect a carrier signal present it would wait until the signal is turned off.
Network hardware
Hubs:
 Hubs- A multiport device used to connect computers in a local area network. They send data to many locations
at the same time.
 In a network with hubs data Passes network traffic to all devices connected, therefore slowing down the
network.
 They are cheap and use Half duplex transmission, therefore inefficient under high network traffic
Switches:
 Switches- A multi-port device that allows small sections of LANs to connect and switch traffic directly from the
source to the destination. They:
o Transmit to the destination port only
o Enables faster data transmission as it reduces collisions
o Are more expensive and faster
o Limit traffic to a certain node
Routers:
 Router - stores information about its surrounding networks and the paths it can use to access them. They:
 direct data traffic, which is protocol dependent
 Selects the best path on the network to route data (efficient) by reading the packet address and
understanding the network topology
 Enables fast data transmission as it reduces collisions
 Connects different network
Bridges and gateways:
 Bridges - used to connect two LANs together in a simple network topology which use the same protocol to
communicate.

Gateways- devices that provide the ability for one protocol to talk to a different one . They are more complex
than bridges and will translate data in one protocol to another protocol for transmission.
Page | 8
Information processes and technology topic 3-Communication systems
Network interface cards (NIC):



NIC- a circuit board that is installed in a slot inside a PC. The NIC is where the network cable plugs into the
computer.
Provides a physical link to a computer network; this connection allows computers to communicate with
servers, as well as other computers on the network.
The job of the NIC is to control the sending, receiving and error checking of all data exchanged between the PC
and the other network devices.
Mobile phones:
 Transmit and receive voice calls via radio waves
Cables:
 Connects communication systems together, allowing for data transmitting and receiving
Wireless access points:
 A wireless access point (WAP) is a device that allows wireless communication devices to connect to a wireless
network. Common hardware devices that connect to a WAP include laptop computers.
Bluetooth devices:
 Bluetooth is a wireless network protocol for exchanging data over short distances (using short length radio
waves) from fixed and mobile devices, creating personal area networks (PANs). Common hardware devices
that connect to Bluetooth include mobile phones to send and receive data.
Backbone link
 Backbone link- typically fibre or high capacity coaxial cable. It is designed to connect central nodes (such as
hubs and switches) and carries a much higher volume of data than UTP or standard coaxial cable. Users would
not normally connect directly to a backbone.
Page | 9
Information processes and technology topic 3-Communication systems
OSI model
The bottom layers are responsible for transfer of data from one place to another. They include protocols that specify
the type of plugs, the format of data, the method of transmission and error checking.
The top layers examine the exchange of data between application programs. They include protocols that specify file
transfer, passwords and network management.

OSI (Open Systems Interconnection model)- a theoretical model that describes defined layers in a network
operating system. There are 7 layers:
o Layer 7, Application layer- provides the interface for the application programs.
o
Layer 6, Presentation layer-converts formats specific to
system to formats that are generic. It also provides
encryption and compression.
o
Layer 5, Session layer- Facilitates the starting, handling
and ending of connections between nodes. It also
synchronises streams of data.
o
Layer 4, Transport layer-Ensures that reliability and flow
control are ensured by choosing the correct protocols,
e.g. TCP. It also uses port numbers to differentiate
between different applications on the same node. If the
packet/frame fails then the transport will begin resending.
o
Layer 3, Network layer- It provides addressing across the internet. It determines the best path for the
data. The source and destination is added to the packets. It also handles congestion control and
packet sequencing. This includes switching and routing technologies, such as routers and hubs.
o
Layer 2, Data link layer- It translates messages from the Network layer into bits for the Physical layer
to transmit. It also makes sure that there is reliable transfer between 2 nodes, while dealing with
physical addressing.
Layer 1, Physical layer-It sends the data through physically, e.g. electrical impulse, light or radio signal. It provides the
physical means, e.g. twisted cables, cards.
ASCII basics





A= 65
The remainder goes on the left, then minus that
and divide.
Keep dividing by 2, no remainder = 0, remainder =1
Keep dividing to 1/2, since can’t have fractions, then
It is from bottom to top.
remainder
0 or 1
Internet, intranets and extranets:
 The Internet consists of a worldwide network of computer networks that use the TCP/IP network protocols to
facilitate data transmission and exchange.

An Intranet is a private computer network that uses the protocols of the Internet. An intranet is not accessible
by computers on the outside of the private network.

An Extranet is a private network that uses Internet protocols. It can be viewed as part of a company's intranet
Page | 10
Information processes and technology topic 3-Communication systems
that is extended to users outside the company, usually via the Internet.
Page | 11
Information processes and technology topic 3-Communication systems
Other Information Processes in Communication Systems
Collecting:
 A phone is a collection device for the use of voice mail
 An EFTPOS terminal is a collection device for electronic banking
Digital data:
 Digital Data is data that is stored and transmitted in two possible states; each digit can be either on or off,
represented using electrical impulses that are of high or low voltage
 Much of our technology relies on digital data
 Computers use the binary system to store and transmit data, i.e. the digits 1 and 0
Analog data:
 analogue data is represented in a continuous form in which there are many different possibilities
 Analogue data can be represented as a wave
 It is more difficult to handle this type of data as transmitting it accurately involves sending it in its exact form,
and because there are so many more variables it is more easily corrupted.
Processing:
Encoding and decoding analog and digital signals:
 Communication systems use both analog and digital data, for this reason it is often necessary to encode and
decode signals
o Analog data to analog signal - Telephone conversations are the best example here. The system
encodes speech and transmits it from sender to receiver.

o
Digital data to analog signal - A digital device will often have to display data in an analog form for
humans to understand. This will require encoding the 0’s and 1’s.
o
Digital data to digital signal - This form of transmission has both sender and receiver speak the same
language. One computer on a network is able to communicate directly with another computer.
o
Analog data to digital signal - The analog data is encoded to a series of 0’s and 1’s by dividing the
data into two groups across an illogical line.
Real life example- modems
o Modem converts the digital data from your
PC into an analog signal before sending it
through the telephone link - the
modulation step (the 'mo' in modem).
o The modem on the receiving computer
converts the analog data from its
telephone line back into digital before
passing it to the computer - the
demodulation step (the 'dem' in modem).
Page | 12
Information processes and technology topic 3-Communication systems
Types of modulation
Wave
Amplitude modulation
Description + diagram
 the change of peak of the wave indicates a 0
or 1. A high peak equals an 1.
Frequency modulation

A higher frequency indicates a 1, a lower
frequency indicates a 0.
Phase modulation

A change of phase indicates a o or 1
NRZ-L modulation

Non return to zero level modulation uses a
high voltage to indicate a zero, and an low
voltage to indicate an 1.
NRZ-I modulation

Non return to zero level inverted
modulation uses a high voltage to
indicate a zero, and an zero voltage to
indicate an 1. The polarity of the bit is
reversed when a 1 bit is encountered.
Manchester encoding

Bits are translated depending on the
transitions.
a 0 is indicated by a 0 to 1 transition at
the centre of the bit
a 1 is indicated by a 1 to 0 transition at
the centre of the bit.
(HIGH LOW = zero) (LOW HIGH = 1)



QAM



Quadrature Amplitude Modulation
Waves that have specific shape
(amplitude and phase) represent agreed
upon codes.
(duplicate the wave, then take it back
and reduce depending on amplification.
Page | 13
Information processes and technology topic 3-Communication systems
Formation of data packets:
 A packet is the unit of data that is routed between an origin and a destination on a network
 The structure of a packet depends on the type of packet it is and on the protocol. Normally, a packet has a
header and a payload
 For example, an IP packet includes;
o The source IP address
o The destination IP address
o The sequence number of the packets
o The type of service, etc.
o The payload is the data it carries
Routing:
 Routing is the process of selecting paths in a network along which to send network traffic
 Routing is performed for many kinds of networks
Encryption and decryption:
 Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called
cipher) to make it unreadable to anyone except those possessing special knowledge, who obtain the ‘key’.

Decryption is the reverse process where the receiver requires the ‘key’ to decrypt the data.
Error checking:
 Parity bit check
 Check sum
 Cyclic redundancy check (CRC)
Displaying:
 A phone is also a display device for the use of voice mail
 An EFTPOS terminal is also a display device for electronic banking
Network administration tasks:
 Adding/removing users
 Assigning users to printers
 Giving users file access rights
 Installation of software and sharing with users
 Client installation and protocol assignment
 Network-based applications
 Logon and logoff procedures
o Where user enters username and password to validate access. A user session is opened and the user
can access resources they have rights to.
o Log-off disconnects that user form network – important for security as open network can be used by
unauthorised users
Page | 14
Information processes and technology topic 3-Communication systems
Issues Related to Communication Systems
Teleconferencing systems:
 Changing the nature of work as individuals around the world can work on a project and share information
 May lose interpersonal skills as communication via microphones and speakers
Messaging systems:
 Cyber bullying
 Misinterpretation (may not understand abbreviation, cannot see facial expressions)
 Privacy
o Employers have rights to read employee emails sent from work
o Social networking companies may sell user information without user’s knowledge
 Child grooming for sexual assault (using fake Facebook accounts)
 Diminishing of interpersonal skills
E-commerce:
 Hacking
 Loss of jobs as machine replace humans
 Globalisation: access to unreliable sellers – loss of money
Electronic banking:
 Jobs and bank branches close as ATM machines replace bank tellers
 Extra costs for businesses who need to train staff in IT
 E-crime more common (phishing scams, key logging)
EFTPOS:
 Similar to e-commerce
Page | 15
Information processes and technology topic 3-Communication systems
Changing nature of work (working from home):
Advantages:
 Flexibility over when to work when productivity is high and when it suits private life (taking care of children)
 Save costs on travel
 Allows disabled and rural workers to find jobs
 Reduced office needs for employers
Disadvantages:
 Need self-motivated staff who can cope with isolation
Virtual communities:
 Network of individuals who pursue similar interests; e.g. forums created in Facebook and online dating sites
 Advantages:
o People from around the world can communicate

Disadvantages:
o Young people can become addicted
o Loss of social skills
The Internet:
The need for ethical behaviour when using the internet
 Do not attack others through insulting messages – cyber bullying
 Do not copy and paste information without proper referencing – plagiarism
 Do not impersonate others to extract personal data – follow netiquette
These behaviours make the internet safe and enjoyable for everyone.
Issues that have arisen from internet use
 Availability of material normally restricted
o Internet saturated with pornography and children with internet access can easily view sites if no filter
(leading to sexualisation of children)
o Internet used to spread child pornography in file sharing sites (abuse of children)
o Australian Government implementing a mandatory filter: will this restrict material that is legally
available
Domination of content and control of access to internet
 Previously, large media organisations decided what news people would receive. But individuals have greater
control and power through blogs – where they can report news.
 Access to internet controlled by a few large companies. There is less competition, leading to higher internet
prices, which limits access to the poor.
Page | 16
Information processes and technology topic 3-Communication systems
Current and emerging trends in communications
Blogs:




Wikis:



BLOGS- a web page that serves as a publically, accessible personal journal for an individual.
Other users can read; entries are dated & have a journal design.
Only updated by blog owner.
Current and emerging trends are:
o Interactive blogs
o Blogs in education
o Group blogs are now possible
A Wiki is a piece of server software that allows users to freely create and edit Web page content using any
Web browser.
Can be updated by any internet user with a wiki account
Powerful educational resource – but the information may not be accurate
RSS feeds:
 RSS FEEDS- A format for delivering regularly changing web content.
 A user subscribes to a feed by entering the users URL by clicking on the feed icon in a browser that activates
the subscription process. It allows the users to avoid manually inspect which feeds they want to read.
Podcasts:
 Podcasts are audio files that deliver content over the Internet
 Users subscribe for podcasts through specific software. It may be on the internet and users will be notified
through email or the software.
 They can be uploaded for download or streamed direct from the site.
Online radio
 Internet Radio is an audio service transmitted via the internet.
 It involves streaming media, giving listeners a continuous stream of audio that cannot be paused or replayed.
 Audio data is transmitted serially over the local network or internet in TCP or UDP packets.
TV and video on demand
 Video on Demand - where a user has access to the companies video database and from there, is able to make
a selection appropriate to their needs.
 The downside of VOD is the large file size that the videos have, this impedes on the speed of the transfer and
consumes the users downloads (assuming they are on a capped plan)
4G



4G as the name implies, is the fourth generation in the mobile networking standard with speeds up to 1gpbs.
The fourth generation of mobile networking technology requires new hardware to support newer features.
This includes:
o Gaming and high demand services like video conferencing and streaming.
o All prior features in 1G, 2G, and 3G
o up to 30x faster than initial 3G speeds
4G also utilises packet switching telephony only which means packets do not need to be routed, improving
reliability and efficiency.
Page | 17
Information processes and technology topic 3-Communication systems
3G technologies for mobile communications


3G refers to the Third Generation of mobile telephone technology.
3G technology is intended for the true multimedia cell phone - usually called smartphones.
3G has the following enhancements over 2.5G and previous networks:




Several times higher data speed
Enhanced audio and video streaming
Video-conferencing support Web and WAP browsing at higher speeds
IPTV (TV through the Internet) support.
3G application services include mobile internet access, wide-area voice calls, mobile TV and video calls, all in a mobile
environment.
Page | 18