1.3 Computer networks, connections and protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

The characteristics of LANs and WANs and their characteristics

A LAN is a network that has computer systems located geographically close to each other for example within a building or site such as a school. LANs' network infrastructure (servers and routers) are usually owned and managed by the network owner. A WAN is a network that has computer systems located geographically distant from one another for example across a country or the world. WANs use third party communication channels from internet service providers like BT or Virgin Media.

2
New cards

The different factors that can affect network performance

The bandwidth (maximum amount of data that can be sent across a network at once) available

Number of users

Number of data collisions

Interference and physical obstructions such as thick walls

Distance to travel/signal strength

Amount of data to transfer

3
New cards

Wireless Access Point

Provides a link between wireless and wired networks allowing wireless devices to connect to a wired network by creating a wireless local network. WiFi or bluetooth hotspots like the WiFi in a café or airport that provides phones and laptops a connection to the internet. A WAP may be a separate device or built into another device such as a router.

4
New cards

Router

Routers are used to transfer data packets between networks. Routers receive data packets and use the IP address from the packet header to determine the best route to transmit the data. Data is transferred from router to router across the internet towards the destination. Routers store the IP address of each computer connected to it on the network and uses a list called a routing table to calculate the quickest and shortest route.

5
New cards

Switch

Switches connect devices together on a LAN by receiving data packets from a connected node, reading the destination address in the packet header and forwarding the data directly to its destination. Switches generate a list of the MAC addresses of all devices connected to it when it receives data, and must scan for a matching destination address before sending. An alternative to using a switch is a hub, but hubs are slower and less secure as they forward a copy of received data to all connected nodes.

6
New cards

Network Interface Controller/Card

An NIC is an internal piece of hardware that is required for the computer to connect to a network. The NIC includes a MAC address which is plugged into the network card to allow data to be exchanged between the device and a network. An NIC is embedded on the motherboard.

7
New cards

Transmission media

Although not technically a device, the communication channel along which data is transferred will affect performance. Three common types of transmission media include ethernet cables, fibre optic cables, and coaxial cables.

8
New cards

Ethernet cable

Ethernet cables are used typically on a LAN to transfer data between nodes and hardware such as switches. Examples include Cat5e and Cat6.

9
New cards

Fibre Optic cable

Fibre Optic cables very fast but more expensive and fragile cables typically used to send data quickly along a WAN. Data is sent as pulses of light.

10
New cards

Coaxial cables

Coaxial cables older, slower, copper cables that are not used as much in modern times as they can be affected by electromagnetic interference.

11
New cards

The internet

The internet is a global network of interconnected networks. The world wide web (WWW) is not the same as the internet. It is a way of accessing information, using protocols such as HTTPS to view web pages. Servers provide services on the internet, such as a web server which responds to the web browser (client) request to display a web page. The web server processes the client request to prepare the web page and return it so the web browser can display it to the user. A website must be hosted on a web server so that it can be accessed by others using the internet. A unique domain name must be registered with a domain registrar – this is a company that checks the name is valid and not already taken.

12
New cards

Domain Name Service

A DNS server stores a list of domain names and a list of corresponding IP addresses where the website is stored. Every webpage has a domain name which can be understood and typed by humans and a related, unique IP address. The role of a DNS is to convert the website's domain name into an IP address so the browser can make a request to the correct server hosting that webpage.

If the local DNS server doesn't hold the IP address the query is passed to another DNS server at a higher level until the IP address is resolved. If the IP address is found, the address is passed on to the DNS servers lower in the hierarchy until it is passed onto the local DNS server that couldn't find it and then the browser.

13
New cards

The steps to display a web page are;

  1. A domain name is typed into the address bar of the browser

  2. A query is sent to the local DNS server for the corresponding IP address

  3. The local DNS server will check if it holds an IP address corresponding to that domain name and if it does it passes the IP address to the browser

  4. The browser then connects to the IP address of the server and accesses the website

14
New cards

Client-server networks

In a client-server network, clients make requests to a server which manages that request and responds, for example if a user (client) made a request to access a website to a web server. Large services such as Amazon will require lots of powerful servers to handle the millions of requests per second. The client is completely dependent on the server to provide and manage the information. The server controls network security and backups and can be upgraded to manage higher demand.

The advantages of a C-S network are;

  • The network can be controlled centrally from the server to easily backup data and update software.

  • Hardware, software, and resources can be shared across the network, such as printers, applications and data files.

  • The network allows for improved scalability meaning more clients can be easily added to the central server.

 

The disadvantages of a C-S network are;

  • Large amounts of traffic congestion will cause the network to slow down.

  • If a fault occurs with the server then the whole network will fail.

  • IT technicians may be required to manage and maintain the network.

  • Malware, such as viruses, can spread quickly across the network.

<p>In a client-server network, clients make requests to a server which manages that request and responds, for example if a user (client) made a request to access a website to a web server. Large services such as Amazon will require lots of powerful servers to handle the millions of requests per second. The client is completely dependent on the server to provide and manage the information. The server controls network security and backups and can be upgraded to manage higher demand.<br></p><p>The advantages of a C-S network are;</p><ul><li><p><span>The network can be controlled centrally from the server to easily backup data and update software.</span></p></li><li><p><span>Hardware, software, and resources can be shared across the network, such as printers, applications and data files.</span></p></li><li><p><span>The network allows for improved scalability meaning more clients can be easily added to the central server.</span></p></li></ul><p>&nbsp;</p><p>The disadvantages of a C-S network are;</p><ul><li><p><span>Large amounts of traffic congestion will cause the network to slow down.</span></p></li><li><p><span>If a fault occurs with the server then the whole network will fail.</span></p></li><li><p><span>IT technicians may be required to manage and maintain the network.</span></p></li><li><p><span>Malware, such as viruses, can spread quickly across the network.</span></p></li></ul><p></p>
15
New cards

Peer-peer networks

For peer-peer networks, data is shared directly between systems without requiring a central server. Each computer is equally responsible for providing data. Peer-peer is optimal for sharing files that can then be downloaded.

 

The advantages of a P-P network are;

  • It is a simpler network than C-S to set up as no server is required.

  • Clients are not dependant on a server.

  • It is perfect for quickly sharing files between systems, such as downloading media files.

 

The disadvantages of a P-P network are;

  • Without a dedicated server, there is no central device to manage security or backups. Backups must be performed on each individual system.

  • Computer performance will decrease with more devices connected to the network, especially if other machines are slow.

<p>For peer-peer networks, data is shared directly between systems without requiring a central server. Each computer is equally responsible for providing data. Peer-peer is optimal for sharing files that can then be downloaded.</p><p>&nbsp;</p><p>The advantages of a P-P network are;</p><ul><li><p><span>It is a simpler network than C-S to set up as no server is required.</span></p></li><li><p><span>Clients are not dependant on a server.</span></p></li><li><p><span>It is perfect for quickly sharing files between systems, such as downloading media files.</span></p></li></ul><p>&nbsp;</p><p>The disadvantages of a P-P network are;</p><ul><li><p><span>Without a dedicated server, there is no central device to manage security or backups. Backups must be performed on each individual system.</span></p></li><li><p><span>Computer performance will decrease with more devices connected to the network, especially if other machines are slow.</span></p></li></ul><p></p>
16
New cards

The Cloud

The cloud is networks of servers accessed on the internet. Cloud computing is an example of remote service provision. Cloud servers can have different purposes such as running applications, remote processing and storing data. When data is stored in 'the cloud', using services such as Microsoft OneDrive data is stored on large servers owned by the hosting company. The hosting company is responsible for keeping the servers running and making the user's data accessible on the internet.

 

Advantages and disadvantages of the Cloud:

Cloud storage is very convenient as it allows people to work on a file at the same time and it can be accessed from different devices. It has a huge capacity and subscriptions can simply be upgraded if you want more storage. Cloud storage is typically free for a certain amount of storage so it is cheaper than regular storage.

17
New cards

Portability

Portability depends on internet connection. If the internet connection fails, or the servers are attacked then the data could become inaccessible.

18
New cards

Star topology

In a star topology each computer system is connected to a central hub or switch.

How it works: each computer system is connected to the central hub or switch and transfers its data packets there. The hub or switch looks at the destination address in the header and transfers data packets directly to the intended computer.

 

The advantages of a star topology are;

  • A star topology has improved security because data packets are sent directly to and from the hub / switch in the centre and not necessarily all devices like in a bus or ring topology.

  • New systems can be attached directly to the central system so the network doesn't need to be shut down. System failures of attached computers won't usually cause complete network failure.

  • Transfer speeds are generally fast in a star topology as there are minimal network collisions.

 

The disadvantages of a star topology are;

  • Extra hardware (the hub or switch) is required to be purchased, installed and maintained.

  • If the central system (the hub or switch) fails then the whole network will be unusable until the error is fixed.

<p>In a star topology each computer system is connected to a central hub or switch.</p><p>How it works: each computer system is connected to the central hub or switch and transfers its data packets there. The hub or switch looks at the destination address in the header and transfers data packets directly to the intended computer.</p><p>&nbsp;</p><p>The advantages of a star topology are;</p><ul><li><p><span>A star topology has improved security because data packets are sent directly to and from the hub / switch in the centre and not necessarily all devices like in a bus or ring topology.</span></p></li><li><p><span>New systems can be attached directly to the central system so the network doesn't need to be shut down. System failures of attached computers won't usually cause complete network failure.</span></p></li><li><p><span>Transfer speeds are generally fast in a star topology as there are minimal network collisions.</span></p></li></ul><p>&nbsp;</p><p>The disadvantages of a star topology are;</p><ul><li><p><span>Extra hardware (the hub or switch) is required to be purchased, installed and maintained.</span></p></li><li><p><span>If the central system (the hub or switch) fails then the whole network will be unusable until the error is fixed.</span></p></li></ul><p></p>
19
New cards

Mesh topology

In a full mesh network, each computer system is connected to every other computer system. There are also partial mesh networks where only some nodes (e.g. a printer) are connected to every other node.

How it works: Data packets are transferred to the destination address along the quickest path, travelling from node to node. If a pathway is broken, there are many alternative paths that the packets can take.

 

The advantages of a mesh topology are;

  • If one cable or system fails then data packets can take an alternative route and still reach the destination address.

  • Because of the large possible number of systems and connections, a mesh topology can usually withstand large amounts of data traffic.

  • New systems can be added to the network without disrupting the entire topology.

 

The disadvantages of a mesh topology are;

  • Because of the possibly large amount of cables required (especially in a full mesh topology) this network layout can be expensive to install and maintain.

  • Redundant cabling should be avoided - this is when cables are connected between systems that won't ever need to communicate.

<p>In a full mesh network, each computer system is connected to every other computer system. There are also partial mesh networks where only some nodes (e.g. a printer) are connected to every other node.</p><p>How it works: Data packets are transferred to the destination address along the quickest path, travelling from node to node. If a pathway is broken, there are many alternative paths that the packets can take.</p><p>&nbsp;</p><p>The advantages of a mesh topology are;</p><ul><li><p><span>If one cable or system fails then data packets can take an alternative route and still reach the destination address.</span></p></li><li><p><span>Because of the large possible number of systems and connections, a mesh topology can usually withstand large amounts of data traffic.</span></p></li><li><p><span>New systems can be added to the network without disrupting the entire topology.</span></p></li></ul><p>&nbsp;</p><p>The disadvantages of a mesh topology are;</p><ul><li><p><span>Because of the possibly large amount of cables required (especially in a full mesh topology) this network layout can be expensive to install and maintain.</span></p></li><li><p><span>Redundant cabling should be avoided - this is when cables are connected between systems that won't ever need to communicate.</span></p></li></ul><p></p>
20
New cards

Benefits and drawbacks of wired and wireless connection

Wired connections are physical cables such as copper or fibre optic wires, and require an NIC to connect to a network. Wired connections use a wired connection protocol, most commonly ethernet. Wired connections restrict movement but are faster and more secure than wireless networks and require an NIC.

 

Wireless connections such as WiFi or Bluetooth use no cables but require a wireless NIC (WNIC). Wireless connections can be affected by the device's distance from the wireless router and physical obstacles like walls or bad weather. Wireless connections provide a freedom of movement but are slower and less secure than wired networks and require a WNIC.

21
New cards

The principle of encryption to secure data across network connections.

Wireless connections are less secure and require encryption. Encryption is the process of scrambling data into an unreadable format so that attackers cannot understand it if intercepted during transmission.

The original data (known as plaintext) is converted to scrambled ciphertext using an encryption key. Only at the correct destination will the encryption key be used to convert the ciphertext back into plaintext to be understood by the receiving computer.

22
New cards

IP addressing and the format of an IP address (IPv4 and IPv6)

There are two versions of IP addressing currently used, IPv4 and IPv6.

 

IPv4 is a 32-bit address, represented in denary, that allows for over 4 billion unique addresses. 

It has four 8-bit segments of denary values (from 0 to 255) separated by full stops.

IPv4 example:

145.13.218.102

 

IPv6 is a 128-bit address, represented in hexadecimal, that allows for an undecillion unique addresses. 

It has eight 16-bit segments of four hexadecimal values (0000 - FFFF), separated by colons.

IPv6 example: 

736E:1029:A4B3:902D:77B2:72FF:AE62:0912

23
New cards

A MAC address is assigned to devices; its use within a network; its format

A MAC address is a unique hexadecimal number assigned to each network interface card/controller inside a networked device such as a router or laptop. 

​​A MAC address is a 48-bit address made up of six 8-bit pairs in hexadecimal, separated by dashes.

While an IP address may change, the MAC address can’t be changed. MAC stands for Media Access Control.

MAC example: 19-C2-D1-47-AA-38

24
New cards

Networking standards

Networking standards are rules that allow computer systems to communicate across networks. Standards have been created to ensure devices can exchange data and work together by interpreting signals in the same way, regardless of the manufacturer.

25
New cards

Transmission Control Protocol and Internet Protocol

Transmission Control Protocol / Internet Protocol or TCP / IP are actually two separate protocols that combine together. ​​TCP is a protocol that allows packets to be sent and received between computer systems. It breaks the data into packets and reorders them back into the original data at the destination. IP is a protocol in charge of routing and addressing data packets. This ensures data packets are sent across networks to the correct destination. It is also an addressing system, every device on a network is given a unique IP address so data packets can be sent to the correct computer system.

26
New cards

Hyper Text Transfer Protocol

HTTP is used to transfer web pages over the Internet so that users can view them in a web browser. All URLs start with either HTTP or HTTPS. HTTPS is a more secure version of HTTP that works with another protocol called SSL (Secure Sockets Layer) to transfer encrypted data.

27
New cards

File Transfer Protocol

FTP is used to transfer files across a network. It is commonly used to upload or download files to/from a web server.

28
New cards

Simple Mail Transfer Protocol

SMTP is a protocol used to send emails to a mail server and between mail servers.

29
New cards

Post Office Protocol and Internet Message Access Protocol

POP and IMAP are both protocols for receiving and storing emails from a mail server. POP will delete an email from the email server once it has been downloaded to a device. IMAP syncs the message with an email server so it can be accessed by different devices.

30
New cards

How layers are used in protocols, and the benefits of using layers; for a teaching example, please refer to the 4-layer TCP/IP model

TCP/IP operate on different layers. A protocol layer is a division of network functionality with each layer providing a specific function to assist the transmission of the data. TCP/IP is split into four layers.

Protocol layers are used because;

  • Layers are self-contained, so they allow different developers to concentrate on one aspect of the network at a time. A layer can be taken out and edited without affecting other layers.

  • Protocol layers are used to visualise the different parts of a network, as each of the four layers of TCP/IP has a specific role and is associated with different protocols.

  • Protocols are broken down into well-defined, specific layers to simplify design, making it easier to identify errors (known as troubleshooting).

  • Each layer uses specific protocols, so layering ensures these protocols are applied in a specific order. This process uses abstraction and layers only communicate with adjacent layers for easy compatibility.