Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Topic.3:
Designed by:
Professor. A. Lawson
Sources: Online Materials, thanks for all
1
IB Computer Science
Topic 3 - Overview
Network fundamentals
3.1.1 Identify different types of networks
3.1.2 Outline the importance of standards in the construction of networks
3.1.3 Describe how communication over networks is broken down into different layers
3.1.4 Identify the technologies required to provide a VPN
3.1.5 Evaluate the use of a VPN Data transmission
3.1.6 Define the terms: protocol, data packet
3.1.7 Explain why protocols are necessary
3.1.8 Explain why the speed of data transmission across a network can vary
3.1.9 Explain why compression of data is often necessary when transmitting across a
network 3.1.10 Outline the characteristics of different transmission media
3.1.11 Explain how data is transmitted by packet switching Wireless networking
3.1.12 Outline the advantages and disadvantages of wireless networks
3.1.13 Describe the hardware and software components of a wireless network
3.1.14 Describe the characteristics of wireless networks
3.1.15 Describe the different methods of network security
3.1.16 Evaluate the advantages and disadvantages of each method of network security
IB Computer Science
Topic 3.1.1
Identify different types of networks
2
IB Computer Science
Topic 3.1.1
Basic Topologies Topology = physical layout of a network
Types of Networks:
LAN
• Local Area Network
• A network in which the nodes
are close together. For example,
in the same building, on the
same site (school).
– Small geographic area
– Tend to use private
connections as opposed to
leased communication lines. 3
IB Computer Science
Topic 3.1.1
WAN
• Wide Area Network
• A network in which the nodes are spread
out over a larger geographic area. For
example, national and international
retailers are connected.
– Large geographic area
– Uses leased communication lines.
GAN
• Global Area Network
• A network where the nodes are spread
out globally. For example, the internet.
Computing Sin
P2P
• Peer-to-Peer
• P2P networking is a distributed architecture that partitions tasks or work
loads between peers. Peers are equally privileged, equipotent (of the
same power) participants in the application.
• They are said to form a peer-to-peer network of nodes
WLAN
• Wireless Local Area Network
• A network in which the nodes are close together. For example, in the
same building, on the same site (school)… BUT WITH NO WIRES!
5
IB Computer Science
Topic 3.1.1
SAN
• Storage Area Network
• A network which provides dedicated access to storage. Typically, they
have their own storage devices not accessible through the wider network;
instead the SAN appears as a device to the OS.
Internet
• The internet is a network of
networks.
• Since 2013, spans beyond our solar
system.
• Only 4% of WWW content is visible.
Internet VS Extranet
6
IB Computer Science
Topic 3.1.1
VLAN
• Virtual Local Area Network (This one is a logical concept not physical!)
7
IB Computer Science
Topic 3.1.2
Outline the importance of standards in the
construction of networks
IB Computer Science
Topic 3.1.3
Describe how
communication over
networks is broken down
into different layers
8
IB Computer Science
Topic 3.1.3
Simplified Model
(Sending data)
IB Computer Science
Topic 3.1.4
Identify the
technologies
required to
provide a VPN
9
IB Computer Science
Topic 3.1.4
A secure network that uses primarily
VPN public, telecommunication infrastructures,
such as the Internet, to extend a private
network.
VPN-C VPN-S
Tends to be The server that
software provides “the
installed service”. Normally
upon the located in the
client’s office or wherever
computer the client connects
too.
10
IB Computer Science
Topic 3.1.5
Evaluate the use of a VPN
Summary
• Through a VPN, it is possible to connect to a LAN that is protected from
outside access through the internet.
• Therefore, it is possible for workers to connect to a company's internal
network from almost anywhere in the world.
• This gave rise to home offices, as many office jobs do not require
consultation and hence can be completed from home.
• This remote working is also called telecommuting.
A perspective on telecommuting
11
IB Computer Science
Topic 3.1.6
Define the terms: protocol & data packet
Definition: Protocol data packet
OR
Packet Switching
12
IB Computer Science
Topic 3.1.7
Explain why protocols are necessary
Summary
• Protocols are the set of rules computers follow when
communicating across a network.
• Without them, no information can be transmitted as computers
don't know how to interpret the signals coming through the network.
Establishment
Language / Format
Data integrity
Flow Control
13
IB Computer Science
Topic 3.1.7
Congestion Control
Error Checking
Error Handling
Termination
IB Computer Science
Topic 3.1.8
Explain why the speed of data
transmission across a network can vary
Connection speed averages
• Dedicated LAN connections • Broadband (WAN) connections
– UTP Copper cable (100Mbps) – DSL (2-16Mbps)
– Fibre optic cable – Fibre optic (20-100Mbps)
(5-100Gbps) – 3G (± 1 Mbps)
– WiFi (10-150Mbps) – 4G (± 20 Mbps)
14
IB Computer Science
Topic 3.1.8
15
IB Computer Science
Topic 3.1.9
Explain why compression of data is often
necessary when transmitting across a
network
Definition: Compression
That’s why
we bother…
Backups/Archiving
Media file transfer Encryption/
File Transfer
over the web Protection
16
IB Computer Science
Topic 3.1.9
Audio Example: WAV vs MP3
Images
Low res images become pixelated
when zoomed in
IB Computer Science
Topic 3.1.10
Outline the characteristics of different transmission media
Characteristics of media
Types of media
17
IB Computer Science
Topic 3.1.10
UTP – Unshielded Twisted Pair
Co-axial (metal)
Fibre-optic (glass)
Ties in with:
IB Computer Science
Topic 3.1.11
Explain how data is Definitions
transmitted by
packet switching
• Packet: A packet is the unit • Packet switching: Packet-
of data that is routed between switching describes the type of
an origin and a destination on network in which relatively
the Internet small units of data called
or any other packet-switched packets are routed through a
network. network based on the
destination address contained
within each packet.
18
IB Computer Science
Topic 3.1.11
How it works Video: Video:
Packet Undersea
Switching Cables
IB Computer Science
Topic 3.1.12
Advantages
• Uses unlicensed radio spectrum – Doesn't cost anything
• LANs can be set up without cabling – Doesn't take space or time to lay the
cables. No extra cost on cables
• WiFi can support roaming between access points – People can switch from
router to router automatically depending in which connection is best
• Global standards (eg. 802.11n)
• Prices are cheap – Many types are available on the market and they are
affordable
Disadvantages
• Interference – as the 2.4GHz spectrum is often crowded with other devices
• Limited Range
• WEP – this encryption is not difficult to hack and WPA2 has solved this
problem
• Access Points – these can be used to steal data
• Health Concerns
19
IB Computer Science
Topic 3.1.12
In an exam be • What’s good about it?
prepared to • What’s bad about it?
EVALUATE • When is it most
appropriate?
IB Computer Science
Topic 3.1.13
Describe the hardware and software components of a
wireless network
IB Computer Science
Topic 3.1.14
Types of wireless networks Describe the characteristics
of wireless networks
20
IB Computer Science
Topic 3.1.14
WiFi (Wireless Fidelity) • Also called Wireless LAN (WLAN)
• Used in laptops/mobile devices
to connect wirelessly to home
network
• Most preferred network type to
implement a home network
• Allows relatively slow to fast
data transmissions (depending on
the version)
• Backwards compatible with most
older WiFi standards (a/b/g/n)
• Small transmitting radius makes
it suited for homes, usually <20m
WiMAX
• WiMAX = Worldwide
Interoperability for Microwave
Access 3G (Third Generation)
• Designed for large distance high
speed internet access • The primary way
• Relatively cheap method of mobile phones access
providing internet over a large the internet today •
area - suited for poorer countries Allows the tunnelling of
• Rivalled by Long Term Evolution phone lines (mobiles
(LTE) standard don't have to switch
• Can be used as a form of back to phone network
wireless variant of DSL phone when receiving a call •
transmission lines Relatively fast
21
IB Computer Science
Topic 3.1.14
IB Computer Science
Topic 3.1.15
Describe the different
methods of network security
Two factor
Something you have.
Three factor
Firewalls
• Hardware or Software (or hybrid of both).
• Controls incoming and outgoing network traffic.
• Analyse data packets based on pre-determined set of rules.
MAC Address
Encryption • Media Access Control address.
• Hard-coded into devices by
Only focusing on encryption
over wireless networks manufacturers
• UserID (and passwords) • Managed by the IEEE (institute of
• PSK (pre-shared key) Electrical and Electronics Engineers).
• WEP (dead) • Are used to identify specific pieces of
Physical security • WPA / WPA2
hardware.
• Locked doors?
• Security personnel? WEP WPA/WPA2
• Cages / sealed units?
• Reinforced/secure rooms? Wireless Equivalent Privacy • Wi-Fi Protected Access (I or II)
Very simple algorithm… …
• Walls with barbed wire?
that was very quickly WPA WPA2
• Ravenous guard dogs? broken! 2004-2006 2006 onwards 23
People? Natural Disasters? • Superseded by WPA in
Intrusion can be made from Intrusion can only come from since who
2003 • Deprecated in 2004. outside the network. already has access to the network.
IB Computer Science
Topic 3.1.15
• Advantages:
– Access rights to the network can be set for each user
– User groups can be created to manage user rights in
UserID batches
• Disadvantages:
– A userID can be stolen
– system can be bypassed
– Does not protect against intercepting messages in the
network
• Advantages:
Encryption – A strong encryption is very hard to break
security – Computer are fast enough to encrypt data on-the-fly
• Disadvantages:
– Often, users are lazy and take a password that is easy
to guess
– The password needs to be transmitted over the
network to receiver to allow them to read the message
– Some encryptions are designed to have backdoors
built in
24