Hexadecimal (base‑16) – digits 0‑9 and A‑F; useful for representing binary groups of four bits.
Two’s‑complement – method for representing signed integers; invert all bits and add 1 to get the negative.
All error‑detecting codes (parity, checksum, CRC) operate on binary data, so a solid grasp of these systems is essential.
2. Data‑transmission fundamentals (Topic 2.1)
2.1 Transmission modes
Mode
Description
Typical use
Serial
Bits sent one after another over a single wire or pair.
USB, Ethernet, long‑distance links.
Parallel
Multiple bits transmitted simultaneously on separate wires.
Computer‑internal buses (e.g., PCIe).
Simplex
Data flows in only one direction.
Keyboard → PC, sensor → controller.
Half‑duplex
Both ends can transmit, but not at the same time.
Walkie‑talkies, early Ethernet (coax).
Full‑duplex
Simultaneous two‑way communication.
Telephone, modern Ethernet, USB 3.0.
USB (Universal Serial Bus)
Serial, full‑duplex, hot‑plugable interface for peripherals.
Keyboards, flash drives, printers.
2.2 Packet structure
A data packet (or frame) is divided into three logical parts:
Header – control information such as source/destination addresses, protocol identifier, and sequence number.
Payload (or data field) – the actual user data being transferred.
Trailer – usually contains an error‑detecting code (e.g., CRC) and sometimes a frame‑end flag.
2.3 Packet switching
Routers examine the header to decide the next hop.
Packets are stored temporarily (store‑and‑forward) and then forwarded, allowing many devices to share a single physical link efficiently.
Switches operate at the data‑link layer, forwarding frames based on MAC addresses.
2.4 IP addressing (required by the syllabus)
IPv4 – 32‑bit address written as four decimal octets (e.g., 192.168.1.10). Supports unicast, broadcast, and multicast.
IPv6 – 128‑bit address written in hexadecimal groups (e.g., 2001:0db8:85a3::8a2e:0370:7334). Provides a vastly larger address space and built‑in support for anycast.
Both address families coexist on modern networks; devices may have a “dual‑stack” configuration.
2.5 Domain Name System (DNS)
DNS translates human‑readable domain names (e.g., www.example.com) into IP addresses. It is a hierarchical, distributed database that operates over UDP/TCP port 53.
3. Methods of error detection (Topic 2.2)
Technique
How it works
Typical use / example
Parity bit (odd / even)
Count the 1‑bits in the data; add one extra bit so the total number of 1‑bits is even (even parity) or odd (odd parity).
Simple serial links, early memory modules.
Checksum
Divide the data into fixed‑size blocks (commonly 16 bits). Add all blocks using one’s‑complement arithmetic; send the complement as the checksum.
IP header, UDP.
Echo‑check (Longitudinal Redundancy Check)
Sum all bytes of the message (often modulo 256) and transmit the sum as an extra byte.
Older modems, some serial standards.
Check‑digit
Calculate a single decimal digit from the other digits using a weighted sum (e.g., ISBN‑10, UPC).
Product codes, library books.
Automatic Repeat reQuest (ARQ)
Combine an error‑detecting code (usually a CRC) with a feedback channel. Receiver sends ACK for a correct frame or NAK / silence for an erroneous one; sender retransmits as needed.
5. Encryption – symmetric vs. asymmetric (Topic 2.3)
Symmetric encryption – the same secret key encrypts and decrypts data (e.g., AES, DES). Very fast, but key distribution must be done securely.
Asymmetric encryption – a mathematically linked key pair: a public key (shared openly) and a private key (kept secret) (e.g., RSA, ECC). Enables secure key exchange and digital signatures.
HTTPS example: When you visit https://example.com, the server sends its public key. Your browser encrypts a temporary symmetric session key with that public key; the server decrypts it with its private key. The session key then encrypts the actual web traffic (fast symmetric encryption) while the initial exchange guarantees confidentiality and authenticity (asymmetric encryption).
6. Network hardware essentials (Topic 3.4)
Network Interface Card (NIC) – connects a computer to a network; provides a unique MAC address (e.g., 00:1A:2B:3C:4D:5E).
Router – forwards packets between different networks using the destination IP address; performs IP routing and may provide NAT.
Switch – operates at the data‑link layer; forwards frames based on MAC addresses, creating separate collision domains for each port.
Modem – converts digital signals to analogue (and vice‑versa) for transmission over telephone or cable lines.
7. The Internet and the World Wide Web (Topic 5.1)
Anti‑virus / anti‑malware software – signature and heuristic scanning.
Regular updates & patches – close known vulnerabilities.
9. Digital currency & blockchain (Topic 5.2)
Blockchain – a distributed ledger where each block contains a list of transactions and the cryptographic hash of the previous block, forming an immutable chain.
Consensus mechanisms (e.g., Proof‑of‑Work) ensure that the majority of nodes agree on the next block.
Example – Bitcoin: Alice sends 0.5 BTC to Bob. The transaction is broadcast, verified by miners, placed in a new block, and linked to the chain. Changing the transaction would require re‑computing all subsequent blocks, which is computationally infeasible.
10. Automated and emerging technologies (Topic 6)
Automation & control systems – sensors gather data, controllers (e.g., PLCs) process it, and actuators perform actions (motors, valves).
Robotics – combines mechanical components, sensors, and programmable control to perform tasks ranging from manufacturing to exploration.
Artificial Intelligence (AI) – techniques such as machine learning enable systems to recognise patterns, make decisions, and improve performance over time.
Internet of Things (IoT) – everyday objects equipped with network connectivity, sensors, and often cloud‑based analytics (e.g., smart thermostats, wearables).
11. Summary checklist for the Cambridge IGCSE 0478 syllabus
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.