EDEXCEL GCSE Computer Science, Topic 4- Networks
EDEXCEL GCSE Computer Science, Topic 4- Networks
INTRO TO NETWORKS
Sharing data and software
Sharing peripherals
Sharing internet connections and services
Providing centralised support and backup
Enabling rapid deployment of new software and updates
Allowing people to communicate
Supporting collaborative working
Small geographical area
Single site
Usually managed by a local manager or team (distributed ownership)
Managed on site
Network of networks- connect separate lans
Large geographical area
Spread over different sites
Managed by several different people (collective ownership)
THE INTERNET
Super-fast fibre-optic cable
Satelites
Every internet-connected device has a unique IP address
IPv4 /32-bit addresses/from ‘70s/sufficient for 4 bil. devices to be uniquely identified
IPv6 /128-bit/340 tril. tril. devices with unique IDs
Most devices use dynamic IP addresses
Dynamic IP addresses = allocated from a communal pool when they connect to a network & returned when they leave. Next time they connect, their IP address will probably be different
Static IP addresses = never change, permanently connected to the internet. Used by devices such as routers and web servers.
Domain name = human friendly IP address eg- www.google.com is a lot easier to use than a string of numbers
Complete web address of any resource on the internet
When a URL is typed into a browser, the browser sends it to a DNS server
The DNS server returns its corresponding IP address to the browser
Now it has the IP address, the browser will send an HTTP request to the web server that holds the page data
The server finds the correct files and sends them to the browser
The browser renders the page and displays it on the screen
PACKET SWITCHING
The sender’s large file is broken into small packets
Routers direct packets to their destination by inspecting them and finding the cheapest (remember- this means quickest) route to the next router
Packets take different routes and may arrive out of order. A packet has to be forwarded to several routers before reaching its destination
The receiving computer reassembles the packets into the correct order using the packet headers. Any lost or corrupted packets will be requested to be re-sent
Routers form a physical connection between networks and forward data from one to another
When a router receives a packet it finds the packet’s destination address then uses its routing table to determine the cheapest route for the next part of the packets journey
Routers inform each other on traffic conditions so if a route is congested a packet can be sent another way
A data packet consists of a header, payload and footer
A header contains the source & destination IP addresses, the sequence number. The total number of packets and a checksum
The payload contains part of the data of the file that has been split and sent
The footer contains the end of packet flag
WIRED VERSUS WIRELESS
Devices can be physically connected using cables
The most common cable is made of thin copper wire and it transmits data as electrical pulses
The modern alternative is a fibre-optic cable which is made of very thin glass strands and transmits data as light pulses
Copper wire is susceptible to electrical interference while fibre optic is immune
Copper wire is typically used to connect devices in a LAN and fibre-optic for long distance data traffic
Fibre-optic is more efficient however it is a lot more expensive and fragile
Radio waves transmit data through air
Wi-Fi is the most well-known and the oldest but there are others that have different uses, ranges and power requirements- Bluetooth, Zigbee, RFID & NFC
These all consume less power and all but Zigbee have a smaller range, RFID has a particularly small range and NFC’s is even smaller
Uses - Wi-Fi = networking devices in LANs, Bluetooth = pairing devices, Zigbee = home automation, RFID = security tags, passports and implants & NFC = contactless payment
CONNECTIVITY ON A LAN:
Big range- up to 100m and larger if signal booster is installed
High bandwidth- up to 10 Gbps
Low latency- cables have layers of protective covering making them less susceptible to interference
Good security- impossible to tap physical cables without being in the same location
Difficult installation- each device connected must have its own cable
Limited flexibility- the number and location of cable connections is fixed. Making changes to the network once its already running is time-consuming and disruptive
Easy installation- does not take long as only the wireless access points need to be connected by cable
Good flexibility- devices can be moved around without losing their connection (provided they stay within the range) & new users can easily be added with the network ID and its password
Shorter range- large physical objects like walls can obstruct the signal
Lower bandwidth- up to 3.2 Gbps, all active devices on the network must share this
Higher latency- susceptible to interference from other wireless devices and networks
Poor security- anyone within range can intercept transmissions
Many networks use a combination of wired and wireless connections (a mixed network)
Devices such as TVs or printers and other peripherals would likely be connected by cables
Devices such as laptops and tablets would likely be connected wirelessly
The router assigns an internal IP address to each device (connected by cable or wirelessly) so they can all be part of the same network
NETWORK SPEEDS
Network speed is the data transfer rate of a network (the number of bits that can be transferred from one device to another in a specified period of time)
Data transfer rate is measure in bits per second (bps)
As modern technology is able to transfer more data more quickly we usually measure this in Megabits per second (Mbps)
Data transfer rate (speed) is measured in base-10 units (bps ,Bps, Kbps ,Mbps, Gbps)
File size is measured in base-2 units (bit, byte, KiB, MiB, GiB, TiB)
Formula:
Time (in seconds) = File Size (in bits) Data Transfer rate (in bps)
NETWORK PROTOCOLS
Define rules about how data must be formatted, transmitted and received on a network
Without them, network devices would not be able to understand the electronic signals sent to one another
Protocols need data formats (to make sure data can be exchanged consistently and correctly), address formats (to identify senders and recipients & ensure data is sent to the right places) & routing (to provide the right information so that data can flow through networks correctly)
Protocols in the top layer are the ones users see
Those at the bottom handle the converting of binary data into electrical, light or radio signals for transmission
The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a collection of protocols known as a stack that decides how data is transmitted
The TCP/IP model has four layers, the top is the application layer, applications such as file transfer, web browsers and email operate at this level
FTP (File Transfer Protocol) = rules for transferring files between computers, often used for transferring those that are too large for email attachment
HTTP (HyperText Transfer Protocol) = rules followed by a web browser and web server when requesting and supplying information
HTTPS (HyperText Transfer protocol secure) = makes sure communications between client and server are secure using encryption
SMTP (Simple Mail Transfer Protocol) = rules for sending emails from client to server and server to server until it reaches its destination
POP (Post Office Protocol) = used by a client to retrieve emails from a mail server, all emails are downloaded when there is a connection between them and are deleted from the server once done so
IMAP (Internet Message Access Protocol) = unlike POP, messages do not need downloading, they can be read and stored on the message server. This is better for users with multiple devices as they can read emails from them all rather than just the one that they are downloaded on
THE TCP/IP MODEL
A hierarchical set of protocols working together to allow devices to communicate, each layer is responsible for a different aspect
(Sending computer) → application layer → transport layer → internet/ network layer → link layer → link layer → internet/ network layer → transport layer → application layer → (receiving computer)
Outgoing data is passed down the stack and incoming data is passed upwards
The individual layers do not know how the others function, only how to pass data to them
Each layer may contain several protocols that all provide a suitable service to the layer’s function
Each protocol has a role to play at both the sending and receiving ends
Application layer = providing the interfaces and protocols needed by the user
Transmission layer = splitting outgoing data into packets and numbering them, a header containing a sequence number and a checksum is added to each
Internet/network layer = adding source and destination IP addresses to packet headers so routers can guide them
Link layer = using network specific protocols to convert binary data into light, electrical or radio signals for transmission
Link layer = converting incoming signals into binary data
Internet/network layer = stripping addresses information from incoming packet headers
Transport layer = checking incoming packets and sending a resend request for any that are damaged or lost. the sender is notified when all have arrived and the packets are reassembled then passed to the application layer
Displaying received information from the user
NETWORK TOPOLOGIES
Each computer is connected individually to a central point/node which can be a hubor a switch
Data is only sent to the intended destination
If one link fails the other devices can still work
Easy to add new devices without disrupting the network
If the central point fails, the entire network will fail
Requires a lot of cable because each computer has its own connection to the node
Each computer is connected to at least one other
As well as sending its own signals, each computer also relays data from the others
Commonly used on wireless networks where there is high demand
Data can be transmitted from different devices simultaneously
Always an alternative route if one component fails
Can handle high data traffic
Adding more devices does not slow transmission on the network
Overall cost is high if it is not wireless as it would require a lot of cable
Difficult to manage and requires expert supervision
Each node is connected to the main cable called a bus
There are terminators at each end to absorb signals when they reach the end to prevent interference
Easy to set up and add extra devices
Relatively cheap as only one cable is needed
Lots of data collisions when multiple devices try to transmit data at the same time. Devices detect collisions and rewend the data which slows the network
The whole network will fil if a terminator is removed
NETWORK SECURITY
To protect a network from internal and external threats
Ensures only authorised users have access to the network and its resources
Making sure users only access data relevant to them
Preventing misuse
Preventing damage to hardware
Business success = data on an organisation’s network is vital and the business may fail if it is compromised
Privacy = data stored on a network may be sensitive and must be stored securely to comply with the law
Finance = data can be financially valuable (eg. details of new products and marketing campaigns)
Hackers = people who exploit security vulnerabilities to gain unauthorised access to a network
Insiders = people who work for the organisation and have authorised access to the network but create problems for it, often this isn't malicious and is just careless human error
Malware = software engineered to cause damage and disruption to a network
Used to check a network for any security vulnerabilities that a hacker could exploit
Testers attempt to access a network in the same way that hackers do (gaining unauthorised access)
Testing assesses security awareness of users and efficiency of security policies
Black box penetration testing = the tester is given absolutely no information about the network and must try and breach its security
White box penetration testing = the tester is given relevant information about the network and looks for security loopholes that could be exploited by insiders or outsiders.
An ethical hacker is a computer and networking expert that systematically tries to penetrate a computer system or network to identify security vulnerabilities
Often referred to as “white-hat” to differentiate between criminal hacking known as “black-hat”
PROTECTING NETWORKS
Limiting who can log into a network and what they are permitted to do
Authentication is determining whether a person on a network is who they claim to be
Many organisations will use multi-factor authentication, as well as having a valid ID and password people must have a swipe card and/or some sort of biometric information about themselves
Permissions are the levels of access to files. Some users may be given “read-only” files where they can only view the file, others may have “read and write” where they can also make edits. Those at a higher level can delete files and change other users’ permissions
When assigning permissions, network managers often apply the “principle of least privilege” where users are given only the amount of access they need to do their job and no more
The first line of defence is to prevent unauthorised people from entering the premises where the network equipment is located
Access doors should be kept locked and fitted with security recognition measures
Biometric security recognition can be used on mobile devices to authenticate users
Swipe cards containing a users’ details can be used for entry
Closed-circuit television (CCTV) can be used to monitor the premises
RFID chips can be fitted to all equipment so that an alert will be triggered if it is removed from the premises
Protect networks connected to WANs
Can be software or hardware
Can be configured to prevent communications from entering the network and prevent programs and users from accessing the internet inside the network
Most individual computers have a software firewall installed that has some default rules
Businesses are likely to have a PC-like hardware-based firewall as they have greater flexibility in the rules that can be applied and can allow faster throughput of data
EDEXCEL GCSE Computer Science, Topic 4- Networks
INTRO TO NETWORKS
Sharing data and software
Sharing peripherals
Sharing internet connections and services
Providing centralised support and backup
Enabling rapid deployment of new software and updates
Allowing people to communicate
Supporting collaborative working
Small geographical area
Single site
Usually managed by a local manager or team (distributed ownership)
Managed on site
Network of networks- connect separate lans
Large geographical area
Spread over different sites
Managed by several different people (collective ownership)
THE INTERNET
Super-fast fibre-optic cable
Satelites
Every internet-connected device has a unique IP address
IPv4 /32-bit addresses/from ‘70s/sufficient for 4 bil. devices to be uniquely identified
IPv6 /128-bit/340 tril. tril. devices with unique IDs
Most devices use dynamic IP addresses
Dynamic IP addresses = allocated from a communal pool when they connect to a network & returned when they leave. Next time they connect, their IP address will probably be different
Static IP addresses = never change, permanently connected to the internet. Used by devices such as routers and web servers.
Domain name = human friendly IP address eg- www.google.com is a lot easier to use than a string of numbers
Complete web address of any resource on the internet
When a URL is typed into a browser, the browser sends it to a DNS server
The DNS server returns its corresponding IP address to the browser
Now it has the IP address, the browser will send an HTTP request to the web server that holds the page data
The server finds the correct files and sends them to the browser
The browser renders the page and displays it on the screen
PACKET SWITCHING
The sender’s large file is broken into small packets
Routers direct packets to their destination by inspecting them and finding the cheapest (remember- this means quickest) route to the next router
Packets take different routes and may arrive out of order. A packet has to be forwarded to several routers before reaching its destination
The receiving computer reassembles the packets into the correct order using the packet headers. Any lost or corrupted packets will be requested to be re-sent
Routers form a physical connection between networks and forward data from one to another
When a router receives a packet it finds the packet’s destination address then uses its routing table to determine the cheapest route for the next part of the packets journey
Routers inform each other on traffic conditions so if a route is congested a packet can be sent another way
A data packet consists of a header, payload and footer
A header contains the source & destination IP addresses, the sequence number. The total number of packets and a checksum
The payload contains part of the data of the file that has been split and sent
The footer contains the end of packet flag
WIRED VERSUS WIRELESS
Devices can be physically connected using cables
The most common cable is made of thin copper wire and it transmits data as electrical pulses
The modern alternative is a fibre-optic cable which is made of very thin glass strands and transmits data as light pulses
Copper wire is susceptible to electrical interference while fibre optic is immune
Copper wire is typically used to connect devices in a LAN and fibre-optic for long distance data traffic
Fibre-optic is more efficient however it is a lot more expensive and fragile
Radio waves transmit data through air
Wi-Fi is the most well-known and the oldest but there are others that have different uses, ranges and power requirements- Bluetooth, Zigbee, RFID & NFC
These all consume less power and all but Zigbee have a smaller range, RFID has a particularly small range and NFC’s is even smaller
Uses - Wi-Fi = networking devices in LANs, Bluetooth = pairing devices, Zigbee = home automation, RFID = security tags, passports and implants & NFC = contactless payment
CONNECTIVITY ON A LAN:
Big range- up to 100m and larger if signal booster is installed
High bandwidth- up to 10 Gbps
Low latency- cables have layers of protective covering making them less susceptible to interference
Good security- impossible to tap physical cables without being in the same location
Difficult installation- each device connected must have its own cable
Limited flexibility- the number and location of cable connections is fixed. Making changes to the network once its already running is time-consuming and disruptive
Easy installation- does not take long as only the wireless access points need to be connected by cable
Good flexibility- devices can be moved around without losing their connection (provided they stay within the range) & new users can easily be added with the network ID and its password
Shorter range- large physical objects like walls can obstruct the signal
Lower bandwidth- up to 3.2 Gbps, all active devices on the network must share this
Higher latency- susceptible to interference from other wireless devices and networks
Poor security- anyone within range can intercept transmissions
Many networks use a combination of wired and wireless connections (a mixed network)
Devices such as TVs or printers and other peripherals would likely be connected by cables
Devices such as laptops and tablets would likely be connected wirelessly
The router assigns an internal IP address to each device (connected by cable or wirelessly) so they can all be part of the same network
NETWORK SPEEDS
Network speed is the data transfer rate of a network (the number of bits that can be transferred from one device to another in a specified period of time)
Data transfer rate is measure in bits per second (bps)
As modern technology is able to transfer more data more quickly we usually measure this in Megabits per second (Mbps)
Data transfer rate (speed) is measured in base-10 units (bps ,Bps, Kbps ,Mbps, Gbps)
File size is measured in base-2 units (bit, byte, KiB, MiB, GiB, TiB)
Formula:
Time (in seconds) = File Size (in bits) Data Transfer rate (in bps)
NETWORK PROTOCOLS
Define rules about how data must be formatted, transmitted and received on a network
Without them, network devices would not be able to understand the electronic signals sent to one another
Protocols need data formats (to make sure data can be exchanged consistently and correctly), address formats (to identify senders and recipients & ensure data is sent to the right places) & routing (to provide the right information so that data can flow through networks correctly)
Protocols in the top layer are the ones users see
Those at the bottom handle the converting of binary data into electrical, light or radio signals for transmission
The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a collection of protocols known as a stack that decides how data is transmitted
The TCP/IP model has four layers, the top is the application layer, applications such as file transfer, web browsers and email operate at this level
FTP (File Transfer Protocol) = rules for transferring files between computers, often used for transferring those that are too large for email attachment
HTTP (HyperText Transfer Protocol) = rules followed by a web browser and web server when requesting and supplying information
HTTPS (HyperText Transfer protocol secure) = makes sure communications between client and server are secure using encryption
SMTP (Simple Mail Transfer Protocol) = rules for sending emails from client to server and server to server until it reaches its destination
POP (Post Office Protocol) = used by a client to retrieve emails from a mail server, all emails are downloaded when there is a connection between them and are deleted from the server once done so
IMAP (Internet Message Access Protocol) = unlike POP, messages do not need downloading, they can be read and stored on the message server. This is better for users with multiple devices as they can read emails from them all rather than just the one that they are downloaded on
THE TCP/IP MODEL
A hierarchical set of protocols working together to allow devices to communicate, each layer is responsible for a different aspect
(Sending computer) → application layer → transport layer → internet/ network layer → link layer → link layer → internet/ network layer → transport layer → application layer → (receiving computer)
Outgoing data is passed down the stack and incoming data is passed upwards
The individual layers do not know how the others function, only how to pass data to them
Each layer may contain several protocols that all provide a suitable service to the layer’s function
Each protocol has a role to play at both the sending and receiving ends
Application layer = providing the interfaces and protocols needed by the user
Transmission layer = splitting outgoing data into packets and numbering them, a header containing a sequence number and a checksum is added to each
Internet/network layer = adding source and destination IP addresses to packet headers so routers can guide them
Link layer = using network specific protocols to convert binary data into light, electrical or radio signals for transmission
Link layer = converting incoming signals into binary data
Internet/network layer = stripping addresses information from incoming packet headers
Transport layer = checking incoming packets and sending a resend request for any that are damaged or lost. the sender is notified when all have arrived and the packets are reassembled then passed to the application layer
Displaying received information from the user
NETWORK TOPOLOGIES
Each computer is connected individually to a central point/node which can be a hubor a switch
Data is only sent to the intended destination
If one link fails the other devices can still work
Easy to add new devices without disrupting the network
If the central point fails, the entire network will fail
Requires a lot of cable because each computer has its own connection to the node
Each computer is connected to at least one other
As well as sending its own signals, each computer also relays data from the others
Commonly used on wireless networks where there is high demand
Data can be transmitted from different devices simultaneously
Always an alternative route if one component fails
Can handle high data traffic
Adding more devices does not slow transmission on the network
Overall cost is high if it is not wireless as it would require a lot of cable
Difficult to manage and requires expert supervision
Each node is connected to the main cable called a bus
There are terminators at each end to absorb signals when they reach the end to prevent interference
Easy to set up and add extra devices
Relatively cheap as only one cable is needed
Lots of data collisions when multiple devices try to transmit data at the same time. Devices detect collisions and rewend the data which slows the network
The whole network will fil if a terminator is removed
NETWORK SECURITY
To protect a network from internal and external threats
Ensures only authorised users have access to the network and its resources
Making sure users only access data relevant to them
Preventing misuse
Preventing damage to hardware
Business success = data on an organisation’s network is vital and the business may fail if it is compromised
Privacy = data stored on a network may be sensitive and must be stored securely to comply with the law
Finance = data can be financially valuable (eg. details of new products and marketing campaigns)
Hackers = people who exploit security vulnerabilities to gain unauthorised access to a network
Insiders = people who work for the organisation and have authorised access to the network but create problems for it, often this isn't malicious and is just careless human error
Malware = software engineered to cause damage and disruption to a network
Used to check a network for any security vulnerabilities that a hacker could exploit
Testers attempt to access a network in the same way that hackers do (gaining unauthorised access)
Testing assesses security awareness of users and efficiency of security policies
Black box penetration testing = the tester is given absolutely no information about the network and must try and breach its security
White box penetration testing = the tester is given relevant information about the network and looks for security loopholes that could be exploited by insiders or outsiders.
An ethical hacker is a computer and networking expert that systematically tries to penetrate a computer system or network to identify security vulnerabilities
Often referred to as “white-hat” to differentiate between criminal hacking known as “black-hat”
PROTECTING NETWORKS
Limiting who can log into a network and what they are permitted to do
Authentication is determining whether a person on a network is who they claim to be
Many organisations will use multi-factor authentication, as well as having a valid ID and password people must have a swipe card and/or some sort of biometric information about themselves
Permissions are the levels of access to files. Some users may be given “read-only” files where they can only view the file, others may have “read and write” where they can also make edits. Those at a higher level can delete files and change other users’ permissions
When assigning permissions, network managers often apply the “principle of least privilege” where users are given only the amount of access they need to do their job and no more
The first line of defence is to prevent unauthorised people from entering the premises where the network equipment is located
Access doors should be kept locked and fitted with security recognition measures
Biometric security recognition can be used on mobile devices to authenticate users
Swipe cards containing a users’ details can be used for entry
Closed-circuit television (CCTV) can be used to monitor the premises
RFID chips can be fitted to all equipment so that an alert will be triggered if it is removed from the premises
Protect networks connected to WANs
Can be software or hardware
Can be configured to prevent communications from entering the network and prevent programs and users from accessing the internet inside the network
Most individual computers have a software firewall installed that has some default rules
Businesses are likely to have a PC-like hardware-based firewall as they have greater flexibility in the rules that can be applied and can allow faster throughput of data