Vous êtes sur la page 1sur 24

IB Computer Science

Topic.3:
Designed by:
Professor. A. Lawson
Sources: Online Materials, thanks for all

1
IB Computer Science
Topic 3 - Overview
Network fundamentals
3.1.1 Identify different types of networks
3.1.2 Outline the importance of standards in the construction of networks
3.1.3 Describe how communication over networks is broken down into different layers
3.1.4 Identify the technologies required to provide a VPN
3.1.5 Evaluate the use of a VPN Data transmission
3.1.6 Define the terms: protocol, data packet
3.1.7 Explain why protocols are necessary
3.1.8 Explain why the speed of data transmission across a network can vary
3.1.9 Explain why compression of data is often necessary when transmitting across a
network 3.1.10 Outline the characteristics of different transmission media
3.1.11 Explain how data is transmitted by packet switching Wireless networking
3.1.12 Outline the advantages and disadvantages of wireless networks
3.1.13 Describe the hardware and software components of a wireless network
3.1.14 Describe the characteristics of wireless networks
3.1.15 Describe the different methods of network security
3.1.16 Evaluate the advantages and disadvantages of each method of network security

IB Computer Science
Topic 3.1.1
Identify different types of networks

2
IB Computer Science
Topic 3.1.1
Basic Topologies Topology = physical layout of a network

STAR RING BUS

These are called NODES

• LAN • WAN • GAN • (W)PAN •


WLAN • SAN • VPN • VLAN •
Internet/Extranet/Intranet

Types of Networks:

LAN
• Local Area Network
• A network in which the nodes
are close together. For example,
in the same building, on the
same site (school).
– Small geographic area
– Tend to use private
connections as opposed to
leased communication lines. 3
IB Computer Science
Topic 3.1.1
WAN
• Wide Area Network
• A network in which the nodes are spread
out over a larger geographic area. For
example, national and international
retailers are connected.
– Large geographic area
– Uses leased communication lines.

GAN
• Global Area Network
• A network where the nodes are spread
out globally. For example, the internet.

Computing Sin

Types of Network The Internet != World Wide Web


• LAN
• WAN
• GAN
• (W)PAN
• P2P
• WLAN
• SAN
• VPN
• VLAN
•Internet/Extranet/Intranet
4
IB Computer Science
Topic 3.1.1
(W)PAN
• (Wireless) Personal Area Network
• A network which consists of computers,
mobile phones, iPod, headphones etc.

Bluetooth typically travels 10m in any direction.

P2P
• Peer-to-Peer
• P2P networking is a distributed architecture that partitions tasks or work
loads between peers. Peers are equally privileged, equipotent (of the
same power) participants in the application.
• They are said to form a peer-to-peer network of nodes

WLAN
• Wireless Local Area Network
• A network in which the nodes are close together. For example, in the
same building, on the same site (school)… BUT WITH NO WIRES!
5
IB Computer Science
Topic 3.1.1
SAN
• Storage Area Network
• A network which provides dedicated access to storage. Typically, they
have their own storage devices not accessible through the wider network;
instead the SAN appears as a device to the OS.

Internet
• The internet is a network of
networks.
• Since 2013, spans beyond our solar
system.
• Only 4% of WWW content is visible.

Internet VS Extranet

6
IB Computer Science
Topic 3.1.1
VLAN
• Virtual Local Area Network (This one is a logical concept not physical!)

7
IB Computer Science
Topic 3.1.2
Outline the importance of standards in the
construction of networks

Standards are important!


• Standards play an important role in networking.
• Without standards, manufacturers of networking products
have no common ground on which to build their systems.
• Interconnecting products from various vendors would be
difficult, if not impossible.
• Without agreed standards, communication would be
difficult (if not impossible)

IB Computer Science
Topic 3.1.3
Describe how
communication over
networks is broken down
into different layers

8
IB Computer Science
Topic 3.1.3

Simplified Model
(Sending data)

IB Computer Science
Topic 3.1.4

Identify the
technologies
required to
provide a VPN
9
IB Computer Science
Topic 3.1.4
A secure network that uses primarily
VPN public, telecommunication infrastructures,
such as the Internet, to extend a private
network.

Two types Client - Server

VPN-C VPN-S
Tends to be The server that
software provides “the
installed service”. Normally
upon the located in the
client’s office or wherever
computer the client connects
too.

Basic checklist for VPN


ALAN that is connected to the internet. One computer outside of the LAN that is
also connected to the internet. VPN client and server running on the lone
machine and the original LAN Internet connection

10
IB Computer Science
Topic 3.1.5
Evaluate the use of a VPN

Summary
• Through a VPN, it is possible to connect to a LAN that is protected from
outside access through the internet.
• Therefore, it is possible for workers to connect to a company's internal
network from almost anywhere in the world.
• This gave rise to home offices, as many office jobs do not require
consultation and hence can be completed from home.
• This remote working is also called telecommuting.

A perspective on telecommuting

11
IB Computer Science
Topic 3.1.6
Define the terms: protocol & data packet
Definition: Protocol data packet

Set of rules for data communication

OR

A protocol defines the format and the order of messages


exchanged between two or more communicating entities, as
well as the actions taken on the transmission and/or receipt of a
message or other event.

Definition: Data Packet

Data - Anything in a form suitable for use with a


computer… such as binary. Typically data is meaningless.

Packet - A small unit of data used in network communication.

Make up of a data packet

Packet Switching

12
IB Computer Science
Topic 3.1.7
Explain why protocols are necessary

Summary
• Protocols are the set of rules computers follow when
communicating across a network.
• Without them, no information can be transmitted as computers
don't know how to interpret the signals coming through the network.

Essential functions of protocols

• Ensure data integrity


• Manage flow control
• Prevent deadlock
• Manage congestion
• Perform error checking

Establishment

Language / Format

Data integrity

Flow Control
13
IB Computer Science
Topic 3.1.7
Congestion Control

Error Checking

Error Handling

Termination

IB Computer Science
Topic 3.1.8
Explain why the speed of data
transmission across a network can vary
Connection speed averages
• Dedicated LAN connections • Broadband (WAN) connections
– UTP Copper cable (100Mbps) – DSL (2-16Mbps)
– Fibre optic cable – Fibre optic (20-100Mbps)
(5-100Gbps) – 3G (± 1 Mbps)
– WiFi (10-150Mbps) – 4G (± 20 Mbps)
14
IB Computer Science
Topic 3.1.8

Speeds vary (time of day)

Speeds vary (distance)

Speeds vary (provider)

Speeds vary (cable quality)

15
IB Computer Science
Topic 3.1.9
Explain why compression of data is often
necessary when transmitting across a
network

Definition: Compression

Data compression involves encoding information using


fewer bits than the original representation.

That’s why
we bother…

Backups/Archiving
Media file transfer Encryption/
File Transfer
over the web Protection

Lossy vs Lossless Compression

Common compression file types

16
IB Computer Science
Topic 3.1.9
Audio Example: WAV vs MP3
Images
Low res images become pixelated
when zoomed in

IB Computer Science
Topic 3.1.10
Outline the characteristics of different transmission media

Characteristics of media

Types of media

17
IB Computer Science
Topic 3.1.10
UTP – Unshielded Twisted Pair

Co-axial (metal)

Fibre-optic (glass)

Ties in with:

IB Computer Science
Topic 3.1.11
Explain how data is Definitions
transmitted by
packet switching
• Packet: A packet is the unit • Packet switching: Packet-
of data that is routed between switching describes the type of
an origin and a destination on network in which relatively
the Internet small units of data called
or any other packet-switched packets are routed through a
network. network based on the
destination address contained
within each packet.

18
IB Computer Science
Topic 3.1.11
How it works Video: Video:
Packet Undersea
Switching Cables

IB Computer Science
Topic 3.1.12

Outline the advantages and


disadvantages of wireless networks

Advantages
• Uses unlicensed radio spectrum – Doesn't cost anything
• LANs can be set up without cabling – Doesn't take space or time to lay the
cables. No extra cost on cables
• WiFi can support roaming between access points – People can switch from
router to router automatically depending in which connection is best
• Global standards (eg. 802.11n)
• Prices are cheap – Many types are available on the market and they are
affordable

Disadvantages
• Interference – as the 2.4GHz spectrum is often crowded with other devices
• Limited Range
• WEP – this encryption is not difficult to hack and WPA2 has solved this
problem
• Access Points – these can be used to steal data
• Health Concerns
19
IB Computer Science
Topic 3.1.12
In an exam be • What’s good about it?
prepared to • What’s bad about it?
EVALUATE • When is it most
appropriate?

IB Computer Science
Topic 3.1.13
Describe the hardware and software components of a
wireless network

Hardware components Software components


• Network Operating System
• Node: PC, Laptop, Tablet, Printer
(with drivers)
• Wireless network interface card
• Protocol stack (TCP/IP)
• Radio waves (Bluetooth/WiFi)
• Applications (Browser/File
• Connection point: Wireless AP /
explorer)
Router

IB Computer Science
Topic 3.1.14
Types of wireless networks Describe the characteristics
of wireless networks

20
IB Computer Science
Topic 3.1.14
WiFi (Wireless Fidelity) • Also called Wireless LAN (WLAN)
• Used in laptops/mobile devices
to connect wirelessly to home
network
• Most preferred network type to
implement a home network
• Allows relatively slow to fast
data transmissions (depending on
the version)
• Backwards compatible with most
older WiFi standards (a/b/g/n)
• Small transmitting radius makes
it suited for homes, usually <20m

WiMAX
• WiMAX = Worldwide
Interoperability for Microwave
Access 3G (Third Generation)
• Designed for large distance high
speed internet access • The primary way
• Relatively cheap method of mobile phones access
providing internet over a large the internet today •
area - suited for poorer countries Allows the tunnelling of
• Rivalled by Long Term Evolution phone lines (mobiles
(LTE) standard don't have to switch
• Can be used as a form of back to phone network
wireless variant of DSL phone when receiving a call •
transmission lines Relatively fast
21
IB Computer Science
Topic 3.1.14

IB Computer Science
Topic 3.1.15
Describe the different
methods of network security

Making sure systems don’t get hacked? Security


breaches can happen without being hacked…
Making sure data is not stolen or leaked? But
what about systems where data is public?

Security properties Its much easier to think of these three


factors when talking about security.
1. Confidentiality
2. Integrity
• Maintaining accuracy of data
3. Availability
• DoS attacks
22
IB Computer Science
Topic 3.1.15
Why is securing systems so hard?
• Cannot plan for every eventuality
• The “arms race”
• Systems can unravel from a weak point
• Users!

Authentication One factor


Is someone who they claim to be? Something you know.
• One factor authentication
• Two factor authentication
• Three factor authentication

Two factor
Something you have.
Three factor

Something you are.

Firewalls
• Hardware or Software (or hybrid of both).
• Controls incoming and outgoing network traffic.
• Analyse data packets based on pre-determined set of rules.
MAC Address
Encryption • Media Access Control address.
• Hard-coded into devices by
Only focusing on encryption
over wireless networks manufacturers
• UserID (and passwords) • Managed by the IEEE (institute of
• PSK (pre-shared key) Electrical and Electronics Engineers).
• WEP (dead) • Are used to identify specific pieces of
Physical security • WPA / WPA2
hardware.
• Locked doors?
• Security personnel? WEP WPA/WPA2
• Cages / sealed units?
• Reinforced/secure rooms? Wireless Equivalent Privacy • Wi-Fi Protected Access (I or II)
Very simple algorithm… …
• Walls with barbed wire?
that was very quickly WPA WPA2
• Ravenous guard dogs? broken! 2004-2006 2006 onwards 23
People? Natural Disasters? • Superseded by WPA in
Intrusion can be made from Intrusion can only come from since who
2003 • Deprecated in 2004. outside the network. already has access to the network.
IB Computer Science
Topic 3.1.15

Evaluate the advantages


and disadvantages of each
method of network
security

• Advantages:
– Access rights to the network can be set for each user
– User groups can be created to manage user rights in
UserID batches
• Disadvantages:
– A userID can be stolen
– system can be bypassed
– Does not protect against intercepting messages in the
network

• Advantages:
Encryption – A strong encryption is very hard to break
security – Computer are fast enough to encrypt data on-the-fly
• Disadvantages:
– Often, users are lazy and take a password that is easy
to guess
– The password needs to be transmitted over the
network to receiver to allow them to read the message
– Some encryptions are designed to have backdoors
built in

24

Vous aimerez peut-être aussi