OCR GCSE Computer Networks
Types of Network
Network: Two or more computers connected together to share information and resources.
LAN - Local Area Network
A connection of computers and devices in a small geographical area. Often used by organisations as the owner of a LAN is able to control connections and cabling. Each device on the network is known as a node.Examples: In a school or office
WAN - Wide Area Network
A connection of computers and devices in a large geographical area. Devices like phone lines and satellites may be provided by telecoms companies instead of the owner of the network. WANs can be made up of LANS.Example: The Internet
Advantages of LANs
Enables digital communication.
Enables sharing of digital information.
Enables sharing of peripheral devices (E.g. printers or scanners).
Enables computers to be updated centrally.
Enables distributed processing - ability for a single program to run on different devices simultaneously.
Require less cabling and so are less expensive than WANs.
Disadvantages of LANs
Requires expertise to install and maintain.
Security issues may arise from unauthorised access to data.
LANs can be more secure by adding measures such as passwords, encryption, user control (E.g. not allowing users to install software) and changing passwords frequently.
Advantages of WANs
Cover a large area so able to connect different areas.
Enables digital communication
Enables sharing of digital information
Disadvantages of WANs
Increased vulnerability to viruses and data breaches.
Expensive to maintain and higher cable costs.
May have slower data transmission speeds due to the longer distance it needs to travel.
LANs VS WANs
LANs may be connected via Ethernet cables or wirelessly due to their small sizes. However, WANs cover a much larger area so may need to use other forms of connection like: Dedicated lines, Leased lines, Phone lines or satellites. These may be owned by other companies and can be very expensive.
LANs are generally safer in terms of security due to their small size but may still experience risks like: Viruses, Email attachments, Trojan horses and clicking on unsafe links.
WANs are more likely to be targeted due to the large amounts of people that may be connected to them. Security risks may include: Gaps in security, Increased vulnerability to viruses and data breaches.
Hardware and factors affecting performance
Data Packet: Parts of files that have been split up to be sent over the internet. They are reassembled to form files at the other end.
Hardware components
Wireless Access Point (WAP)
Allow for wireless devices to connect to a network. Include connections through Wi-Fi and Bluetooth.
Router
Used to connect two or more devices on networks. They contain a routing table with a list of IP addresses and routes for packets to take. They can identify the network of a packet and determine which network the packet should be forwarded to, or which host if it stays on the same network. Packets from different network types can be exchanged.
Performs a variety of tasks and handles traffic from the internet.
Switch
Connects two or more devices together and helps stop data collision. Switches create direct connections to the device a packet has as its destination address.
Learns which devices are on which connection.
Hub
Device replaced by the switch as they would pass on anything received on one connection to all other connections.
Network Interface Card (NIC)
Allows a device to connect to a wired network, allowing Ethernet cables to be plugged in. It contains a MAC address (see later in notes) and allows packets to travel to and from a device.
Transmission media
There are three main types: Ethernet, Fibre Optic and Coaxial Cable. The Ethernet cable is the current networking standard while the Coaxial cable is an older standard. Fibre Optic cables are fast but expensive.
Factors affecting network performance
Data collisions
Quieter networks experience very little data collisions but busier networks may appear slow due to packets having to be resent multiple times to make it though.
Bandwidth
Transmission capacity of a network connection in a given amount of time. A higher bandwidth means more can be transmitted in a certain amount of time.
Latency
The time it takes for one packet to arrive. It’s often called ping and lower latency networks usually have better performance.
Users on the network
Themore users are on the network, the more data is being transferred over the network. This could reduce performance as data collisions are more likely to occur.
Client-Server and Peer-to-Peer networks
Client: Device able to request information from a server.
Server: Manages access to centralised resources.
Peer: Something of the same status/ability.
Client-Server
All clients request resources from the server, it relies on the central device. Additional hardware would be needed.
Files and other resources are stored centrally and clients can access them from any device on the network. All devices are able to update the central databases.
Backups are done centrally from the file server so each device updates at the same time in one go.
They have centralised security so an antivirus and firewall can be installed from the server.
Client-Servers are useful for high traffic environments.
Peer-to-Peer
All devices have equal status and can each act as a client or server. The can request and provide network services and don’t usually require addition hardware or software.
Files are stored on each device individually and the user has to log into the same device each time.
Backups have to be done by each device individually.
Individual security can be installed on each device (less susceptible to viruses).
Peer-to-Peer is more suitable for low traffic environments.
DNS, Hosting and The Cloud
The Internet: Collection of computers worldwide that are connected together.
The Internet is aWANmade up of smaller networks.It’s connected using undersea cables and underground fibre optic cables managed by multiple different companies.
The Internet works on a Client-Server model. Web servers stores web content which can be downloaded to client devices upon request. Mail servers and media servers act similarly with emails and streaming music and/or videos.
IP - Internet Protocol
IPis aset of rulesdevices use to communicate with each other. Each device is given a unique IP address which tells other devices (like a switch or router) where to send files to and from.
It can be static (always keeps the same address) or dynamic (changes every time a device reconnects to the network). Dynamic IP addresses are used more often to allow more devices to be able to connect to a network. Static addresses may be used so that a network manager knows which devices are on a network.
It can also be IPv4 or IPv6 as due to the large increase in devices IPv4 addresses were not enough to provide for each device. There are trillions of addresses in IPv6.
ISP - Internet Service Provider
A business that provides a connection to the internet as well as other services like email addresses or web spaces.
Hosting and URL
The URL (uniform resource locator) is the host name. It has three levels with the top being generic, the second denoting the type of organisation and the third is the organisation name.
Hosting is the storing of files and data on a web server. The web server is seen as the host.
For a website to be seen, it needs to provide a suitable domain name and register with a domain registrar to ensure the domain name is not already registered. It would then gain an associated IP address which would be registered on the DNS.
DNS - Domain Name System
Every website on the Internet has a network address. These addresses are hard to remember so domain names are used as an easier alternative for the user.
When a user visits a website they enter the domain name as a URL, the computer then queries the DNS server. The DNS searches for its equivalent IP/network address in its database. The users request is then forwarded to the server on that IP/network address.
User types address into web browser
Web browser sends web address to a DNS server
DNS server sends back the corresponding IP address
Web browser sends request to the IP address for the website
Web servers and clients
Webs servers hold data needed for websites. When a user wants to view a website, the web browser sends a request to the web server. The web server processes the request and prepares the data requested before sending it back. The web browser receives it and displays the website to the user.
The web server/host acts as a server.
The web browser acts as a client.
The Cloud
The cloud is remotely accessed storage, which is accessed through the Internet.
Advantages of The Cloud
Access files from any location or device.
Access can be granted to others.
Backups are done by the cloud.
Disadvantages of The Cloud
Some else may be accessing your data
Data may not get backed up
Access only possible with an internet connection
Cloud software is good for low-powered devices or for travelers as it just stores your files and allows you to use web based software.
It doesn’t require any secondary storage usage.
Network Topologies
There are two main types of topology (in the case of the OCR specification) which are the Star Topology and the Mesh Topology.
Star Topology
All devices connect to a central device like a router or switch. Every message gets sent through the central device before reaching the clients. Each device has its own cable connecting to the centre.
It can be reliable if one cable fails as the others will still continue and it has good performance as no data collisions can occur. However, if the central device fails, the whole network goes down and the extra hardware to install it is expensive.
The Star Topology requires fewer cables but that can cause bottlenecks on a busy network. It’s also easier to add or remove devices as it’s simple to understand and troubleshoot.
Mesh Topology
Devices are all connected to other devices with no central device. Messages being sent to devices can choose to travel through multiple different routes. It can be done as a full mesh where all devices connect to each other or a partial mesh where at least two of the computers are connected to multiple other computers.
This topology is less expensive in terms of hardware but still requires more cabling. Packets are able to be routed around bottlenecks but it’s more difficult to understand and troubleshoot. A single failure won’t stop the rest of the network so it’s quite reliable but it’s more complicated to add or remove devices.
IP, MAC and Encryption
IP recap
IP as stated previously is a set of rules devices use to communicate and it’s used to identify computers within a network. They are mostly dynamic and when you move network the IP address will change which is known as a logical address.
IPv4 is usually 4 sets of digits between 0 and 255 while IPv6 is usually 8 blocks of 4 hexadecimal digits. They are used to identify devices on that network. They are dynamic and ideal for use on WANs.
MAC - Media Access Control
The MAC address is the device’s physical address and it cannot change - it’s static. Every MAC address is unique to its NIC. It’s usually represented using 12 hexadecimal digits.
Encryption
Encryption forces anyone trying to access packets that’s not theirs to try and decrypt the data being sent across the network. It requires a key that only the users device would know. Encryption is necessary on public networks to avoid data being intercepted.
Standards and Protocols
Standards: Rules that make sure different manufacturers and providers create products that work together.
Protocol: Standard used to define a method of exchanging data over a computer network.
When two devices send messages to each other it’s called handshaking.
Main Protocols
(For the OCR Specification)
TCP/IP - Transmission Control Protocol/Internet Protocol
Ensures data is split into data packets in the same way, are put back together correctly when received and the data received is the same as was sent.
IPensures data packets are directed in the most appropriate way.
HTTP/HTTPS - Hyper Text Transfer Protocol (Secure)
Governs howwebsitesandweb serversare accessed byweb browsers.
Secure makes sure data is encrypted.
FTP - File Transfer Protocol
Ensures all clients on a network access files from a server in the same way. It can upload, download, delete, rename, move and copy files.
Email Protocols
POP - Post Office Protocol
Retrieves emails from a mail server and deletes it from the server once received. It can then only be accessed from the device it was received on.
IMAP - Internet Message Access Protocol
Similar toPOPbut email remains on the server once downloaded/received. This means the email can be accessed by other devices that can be synchronised.
SMTP - Simple Mail Transfer Protocol
Used for sending an email from anemail clientto anemail server*. May also be used to forward an email from one* email serverto another.
Layers
Packet switching: Splitting data into packets to be sent along different routes to its destination. The packets are then reassembled to reform the data.
Each packet is given a header which contains the IP address of the network it’s on, going to and the IP address of the network it’s being sent to.
The header also contains the packet number and the total number of packets so that it can be used to reassemble the data once sent. Packet loss can sometimes occur so the device may request for the packet to be sent again.
If the packet never arrives it’s deleted by the router.
TCP/IP Stack
(For the OCR Specification)
The TCP/IP Stack is a 4 layer concept where there is an Application layer, Transport/Transmission Layer, Internet Layer and Data Link/Network Layer.
4) Application Layer
Provides networking services where it prepares data using different protocols.
Example Protocols: FTP, HTTP, SMTP, IMAP, and POP
Transport Layer
Sets up communications between devices so data can be transported and splits data into packets ensuring they’ve been sent and received correctly.
Example Protocol: TCP
Internet Layer
Responsible for handing IP addresses for data packets - routing data across. It directs them between devices and controls the traffic.
Example Protocol: IP
Data Link Layer
Controls how data is sent as electrical signals over cables, wireless or other hardware. It provides the physical transport of data.
Example Protocols: Wi-Fi and Ethernet