Networking and Internet Concepts
UNIT 5: COMMUNICATION AND THE INTERNET
Assessment Objectives
Objective 1: Demonstrate knowledge and understanding of the key principles of computer science.
Objective 2: Apply knowledge and understanding of key concepts and principles of computer science.
Objective 3: Analyse problems in computational terms:
Make reasoned judgements.
Design, program, test, evaluate, and refine solutions.
Learning Outcomes
Understanding different types of networks and their importance.
Recognizing security threats to data and implementing protection strategies.
Exploring the Internet as a massive network with specific hardware and software requirements.
NETWORKS
Definition
Network: An arrangement of computers and devices connected to share resources and data.
Key Vocabularies
Network Service: An app running on a server providing operations such as data storage, printing, or communications.
Why Use Networks?
Support multiple users accessing multiple services simultaneously.
Share resources and facilitate communication (e.g., email, video chat).
Types of Networks
Local Area Network (LAN): Covers a small area (e.g., home, school).
Wide Area Network (WAN): Covers a large area connecting multiple LANs (e.g., the Internet).
Personal Area Network (PAN): For short-range communication between devices (e.g., Bluetooth).
Wireless Local Area Network (WLAN): Wi-Fi-based LAN with high-frequency radio communication.
NETWORK TOPOLOGIES
Definitions
Topology: Arrangement of devices on a network.
Main Topologies
Bus: Single cable with terminators.
Advantages: Cost-effective; easy to add devices.
Disadvantages: Entire network fails if cable is damaged; difficult fault detection.
Ring: Devices connected in a closed loop.
Advantages: No data collision.
Disadvantages: Failure of one device affects the entire network.
Star: All devices connected to a central hub.
Advantages: Easy to manage faults; additional devices can be added without interruptions.
Disadvantages: Central hub failure results in network failure; high implementation costs.
Mesh: Devices interconnected, either fully or partially.
Advantages: Very fault-tolerant.
Disadvantages: Complex and expensive to install and manage.
NETWORK PROTOCOLS
What is a Protocol?
Set of rules governing the format and transmission of data over a network.
Main Types of Protocols
TCP/IP: Protocol stack facilitating data transmission.
HTTP/HTTPS: Protocols for web data transmission, with HTTPS offering secure communication.
FTP: Used for transferring files.
Email Protocols: SMTP (sending), POP3, and IMAP (retrieval).
DATA TRANSMISSION
Data transmitted in packets containing sender/receiver addresses and order information.
Bandwidth: The amount of data transmitted over time.
Latency: The delay in data transmission.
NETWORK SECURITY
Importance
To protect data from unauthorized access, ensuring confidentiality, integrity, and availability.
Security Threats
Malware: Malicious software designed to disrupt or gain unauthorized access.
Phishing: Attempts to extract sensitive data by deception.
Eavesdropping: Unauthorized interception of data transmission.
Protection Strategies
Authentication: Verifying user identity.
Access Control: Restricting user access to resources.
Firewalls: Monitoring and controlling incoming/outgoing traffic based on predetermined security rules.
Encryption: Securing data to prevent unauthorized access.
THE INTERNET
Definition
A worldwide system of interconnected networks using TCP/IP protocol.
IP Addressing
IPv4: Composed of four decimal numbers separated by dots.
IPv6: Longer address format to accommodate more devices.
SUMMARY
Networks enhance communication and resource sharing.
Understanding protocols and security is crucial for maintaining network integrity.
The Internet is fundamentally a vast WAN supporting a multitude of applications via TCP/IP.
Assessment Objectives
Objective 1: Demonstrate in-depth knowledge and understanding of the fundamental principles of computer science, including hardware, software, data structures, algorithms, and their applications.
Objective 2: Apply knowledge and understanding of key concepts and principles of computer science to solve real-world problems, focusing on efficiency, scalability, and user experience.
Objective 3: Analyse complex problems in computational terms by making reasoned judgments based on logical reasoning, creativity, and innovation; design, program, rigorously test, evaluate, and refine solutions systematically.
Learning Outcomes
Acquire a thorough understanding of different types of networks, their architecture, functionalities, and real-world applications, emphasizing their importance in communication.
Recognize various security threats to data integrity, confidentiality, and availability and implement robust protection strategies to mitigate risks effectively.
Explore the Internet as a vast, decentralized network with specific hardware requirements (such as routers, switches, and legacy systems) and software frameworks, alongside the protocols that facilitate communication across devices globally.
NETWORKS
Definition
Network: An arrangement of interconnected computers, servers, and devices designed to share resources, information, and data effectively and efficiently across geographical locations.
Key Vocabularies
Network Service: An application hosted on a server that facilitates operations such as data storage, file-sharing, printing devices, or communication between users via protocols such as HTTP or FTP.
Why Use Networks?
Enable multiple users to access shared resources simultaneously, increasing productivity and collaboration.
Facilitate seamless communication between users through various channels such as email, video chat, and messaging services, enhancing teamwork and connectivity.
Types of Networks
Local Area Network (LAN): Typically covers a small geographical area like a home, office, or school; provides high-speed connections and low latency for users in close proximity.
Wide Area Network (WAN): Spans extensive distances, connecting multiple LANs across cities or countries, exemplified by the Internet's structure, enabling broad access to resources and information.
Personal Area Network (PAN): A small network, often used for short-range communication, facilitating connections between personal devices such as smartphones, tablets, and laptops via technologies like Bluetooth.
Wireless Local Area Network (WLAN): A LAN that utilizes high-frequency radio waves (Wi-Fi) to allow devices to connect without physical cables, enhancing mobility and flexibility in accessing network resources.
NETWORK TOPOLOGIES
Definitions
Topology: The geometric arrangement and organizational structure of devices and connections on a network, affecting performance and reliability.
Main Topologies
Bus: A single central cable (the bus), with terminators at both ends.
Advantages: Cost-effective construction; facilitates easy addition of devices without significant layout change.
Disadvantages: A single point of failure; if the cable is broken, the entire network becomes inoperable and fault detection can be challenging.
Ring: Devices are connected in a closed loop, where data travels in one direction.
Advantages: Eliminates data collisions due to the defined transmission order.
Disadvantages: A malfunction in any single device or cable can disrupt the network for all users.
Star: All devices are connected to a central hub or switch, creating a star-like structure.
Advantages: Centralized management simplifies fault diagnosis; devices can be added or removed without disrupting network operation.
Disadvantages: The central hub represents a single point of failure; high installation and maintenance costs involved.
Mesh: Devices are interconnected in multiple pathways creating robustness.
Advantages: Highly fault-tolerant; failure of one link does not affect the overall network connectivity.
Disadvantages: Complex setup and maintenance due to the number of connections; can become costly based on the degree of interconnection chosen.
NETWORK PROTOCOLS
What is a Protocol?
A set of established rules that dictate how data is formatted, transmitted, and received across a network, covering aspects such as error handling, data integrity, and the timing of data transmission.
Main Types of Protocols
TCP/IP: A foundational suite of protocols including Transmission Control Protocol (TCP) and Internet Protocol (IP), essential for establishing reliable communication between devices on a network.
HTTP/HTTPS: HyperText Transfer Protocol (HTTP) is used for transmitting web pages, while HTTPS adds a layer of security through SSL/TLS encryption for secure web transactions.
FTP: File Transfer Protocol is used for transferring files between a client and a server, allowing for uploads and downloads with various command options.
Email Protocols: Protocols like SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol) or IMAP (Internet Message Access Protocol) for retrieving emails, facilitating efficient electronic communication.
DATA TRANSMISSION
Data is transmitted in structured packets that contain information about sender/receiver addresses, sequencing, and error-checking codes to ensure accurate delivery.
Bandwidth: Refers to the maximum rate at which data can be transferred over a network connection in a specified time, typically shown in bits per second (bps).
Latency: The delay noticed from the time a data packet is sent to the time it is received, impacting the responsiveness of a network, particularly in real-time applications.
NETWORK SECURITY
Importance
To establish protective measures against unauthorized access to data and systems, ensuring confidentiality, integrity, and availability of information.
Security Threats
Malware: Malicious software designed to infiltrate and disrupt systems, steal data, or gain unauthorized access, including viruses, worms, and ransomware.
Phishing: A deceptive attempt to acquire sensitive information, such as login credentials or financial data, often through spoofed emails or fraudulent websites.
Eavesdropping: The unauthorized interception of data being sent over a network, allowing attackers to collect sensitive information during transmission.
Protection Strategies
Authentication: Implementing methods such as passwords, biometrics, and two-factor authentication to verify user identities before granting access.
Access Control: Utilizing permissions and user roles to restrict access to sensitive resources and information based on organizational policies.
Firewalls: Hardware or software solutions that monitor and control incoming and outgoing traffic according to predetermined security rules, preventing unauthorized access.
Encryption: Techniques that encode data to secure it against unauthorized access, ensuring that even if intercepted, the information remains unreadable without decryption keys.
THE INTERNET
Definition
A global system of interconnected networks using the TCP/IP suite of protocols, enabling the exchange of information and communication amongst billions of devices across various platforms.
IP Addressing
IPv4: An addressing method utilizing a 32-bit format composed of four decimal numbers (e.g., 192.168.1.1), the most common IP addressing scheme.
IPv6: An extension to IPv4, employing a 128-bit format allowing a vastly larger number of unique IP addresses, essential for accommodating the growing number of internet-connected devices.
SUMMARY
Networks enhance communication and resource sharing through established protocols and topologies.
An in-depth understanding of network protocols, security measures, and data transmission principles is crucial for maintaining network integrity and reliable operation.
The Internet is fundamentally structured as a vast WAN supporting a multitude of applications, services, and protocols that ensure continuous global connectivity and