0% found this document useful (0 votes)
27 views76 pages

Topic 3 - Networks

A computer network connects two or more computers together so they can share resources and send/receive data. There are different types of networks like LAN, WAN, VLAN, etc. Networks rely on protocols like TCP/IP to transmit data in packets. Devices connect to networks via various transmission media using wired or wireless connections. Security measures like authentication, encryption, firewalls are used to secure networks and the data being transmitted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views76 pages

Topic 3 - Networks

A computer network connects two or more computers together so they can share resources and send/receive data. There are different types of networks like LAN, WAN, VLAN, etc. Networks rely on protocols like TCP/IP to transmit data in packets. Devices connect to networks via various transmission media using wired or wireless connections. Security measures like authentication, encryption, firewalls are used to secure networks and the data being transmitted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

TOPIC 3 - NETWORKS IB Computer Science

- Server - a computer system or a


software application that provides
a service to other computer systems
on the same network
CLIENTS/SERVER - Client - computer system or
software application that requests a
services from a server connected to
the same network
- Watch this video.
WHAT IS A COMPUTER NETWORK?

Every computer or
device on a network
A computer network is
can send and receive
formed when 2 or more
data from any of the
computer are linked
other computers or
together.
devices connected to
the network.
What is a computer
network?
WHAT IS A COMPUTER NETWORK? (VIDEO)
https://www.youtube.com/watch?v=3QhU9jd03a0
CONNECTING COMPUTER SYSTEMS
- Hub - Connection point for devices on a single network
- When a network device wishes to send data to another device on the network, it copies the
data and sends it to all devices connected to its ports.
- This generates a lot of unnecessary traffic on the network, slowing it down
- Switch - Similar to a hub, but can identify which device is connected to which port, allowing a
network connected by switches to operate much faster - data is only send to the computer that
needs it
- Router - Can connect multiple networks and serves as an intermediary between them (i.e.
home network and Internet)
WHAT IS THE INTERNET?
- Globally connected network system
- Uses TCP/IP protocol to transmit data
- No centralized governance
- Hosts the webpages that make up the World Wide Web
- ISPs (Internet Service Providers) run networks that provide internet access
- ISPs are “glued together” by internet exchanges (IXPs)
- IXPs are the key to connecting all the different ISPs and networks
together - usually run and maintained by nonprofits
WHAT IS A ROUTER?
- Used to manage traffic
- Controls the flow of data packets
- Checks address of data packets
- Puts packets on correct path
- Secure transmission
HOW DOES THE INTERNET WORK?
- Data travels in the form of packets.
- Every file you send or request you make is split up
into packets over the internet.
- Individual packets often take different routes
through exchanges, ISPs, and junction boxes
- Ultimately reach the same destination and are
reassembled at destination.
PACKET SWITCHING
- A packet is a unit of information suitable for travel through computer networks.
- Data is grouped into packets.
- A file being transmitted through packet switching may be divided into multiple packets and
each packet could follow a different route to the same destination.
- This allows for more efficient data transmission and reduced delays.
WHAT DOES A DATA PACKET LOOK LIKE?
PACKET SWITCHING: A VIDEO
https://www.youtube.com/watch?v=ewrBalT_eBM
Undersea Cables -
https://www.youtube.com/watch?v=IlAJJI-qG2k
HOW DOES THE INTERNET WORK? (IN 5 MINS)
https://www.youtube.com/watch?v=7_LPdttKXPc&t=1s
TYPES OF NETWORKS
- LAN
- WAN
- VLAN
- SAN
- WLAN
- Intranet
- Extranet
- VPN
- PAN
- P2P
LAN (LOCAL AREA NETWORK)
- Covers a single building or collection of
buildings
- Less than 1KM radius
WAN (WIDE AREA NETWORK)
- Covers more distance than LAN
- Greater than 1KM radius
- Often uses multiple routers
- May be several LANs connected together
- May use leased lines
- Examples: Internet, Cellular Network, ATM
network
VLAN (VIRTUAL LOCAL AREA NETWORK)
- 1 or more physical LAN (local area network)
- Network switch used to divide network
- Works as multiple networks
- More than the number of physical networks
- Each VLAN may have different security
requirements
- Appears to an outsider as 1 LAN or WAN
VLAN VS LAN - SIMILARITIES AND DIFFERENCES

Similarities Differences

Used to connect devices Better performance

Share resources More flexible

Safer

More complex to set up and maintain

Better for larger organizations


SAN (STORAGE AREA NETWORK)
- Network of storage devices
- Often appear as attached drives

- Purpose specific servers (email server, application server, database server, storage server,
etc.)
- Backup servers, battery backup in case of disasters
- Not accessible through LAN
- Better performance
WLAN (WIRELESS LOCAL AREA NETWORK)
- LAN by which devices are
connected by high-frequency data
waves
- Requests and responses from the
internet (internet access
- Uses can move around
- “Wifi network”
- Uses type of radio waves called
Wifi (Wireless Fidelity)
ADVANTAGES AND DISADVANTAGES OF WLAN
Advantages Disadvantages

Can use unlicensed radio spectrum (reduces Interference


cost)

No cables (reduces cost) Limited range

Can move around Security

Global Standards (ex: 802.11n) Health concerns?

Minimal setup costs


PAN (PERSONAL AREA NETWORK)
- Connects devices in a user’s immediate
area
- Radius of several meters
- Examples include wifi hotspots, bluetooth
devices
INTRANET AND EXTRANET
- Private network
- Sort of a “private internet”
- Uses TCP/IP
- Can view webpages similar to those on the internet
- Intranet webpages only accessible from computers on network
- If the intranet system is accessible through an online portal, it becomes an extranet.
- North Korea - nationwide intranet
VPN (VIRTUAL PRIVATE NETWORK)
- You use a VPN client, like NordVPN or something similar.
- From your VPN client, you send all your requests, like www.google.com to a VPN server
- The VPN server makes a request to that internet resource on your behalf and the VPN server
returns the response to you via the VPN client
- Connection with VPN server encrypted.
- The process of creating and maintaining an encrypted connection between the server and
client is called tunneling.
- This encryption is done using an encryption technology like SSL, TLS, or IPSec.
VPN ADVANTAGES
- Authentication
- Encryption cannot be changed by outsider
- Encryption
- Data cannot be accessed or altered
- Tunneling
- Data can be be secured using proprietary protocols of company or external VPN provider
- Multiple Exit Nodes
- Origin of initial data packets unclear
- Data can appear to originate from multiple IP Address
P2P (PEER TO PEER NETWORK)
- Allows 2 or more computers to share
resources with each other
- Each computer acts as both a client
and server
- No central point
WHAT IS A PROTOCOL?
- A protocol is a set of rules for data transmission
(data packets)
- TCP/IP - Rules for transmitting data on the
internet
- HTTPS - Rules for securely transmitting data
between a web browser and a server
- SFTP - Rules for securely transferring files from
client to server
ROLE OF PROTOCOLS
- Maintain Data Integrity - same data that is sent is received
- Flow Control - data is sent and received at the same rate
- Prevent Deadlock - two packets don’t “block each other”
- Prevent Errors - Make sure no errors introduced in transit
OSI MODEL (OPEN
SYSTEMS
INTERCONNECTION)
MODEL
For IB Exam,
know at least 3
layers
TRANSMISSION MEDIA
- Physical media by which data packets are transmitted
- Two types - wired and wireless
- Wired - Ethernet, Fiber Optic, Copper
- Wireless - Radio Waves (WLAN), Microwave, Wireless
- 4 Factors to Consider
- Security
- Reliability
- Cost
- Speed
TRANSMISSION SPEED
- Primary Factors
- Traffic
- Secondary Factors
- Time of Day
- Distance
- Infrastructure
- Tertiary Factory
- Environmental Issues (Temperature, Interference)
- Financial Factors (Cheaper equipment, etc.)
- Type of Data (Size, streaming, etc.)
COMPRESSION
- Lossy Compression
- Removes data
- Smaller file size
- Irreversible
- Used when some data can be lost (videos,
images, etc.)
- Lossless
- Uses algorithm to reduce file size
- Larger than lossy, but smaller than normal
- Reversible
- Used when no data can be lost (text, software,
etc.)
NETWORK SECURITY
AUTHENTICATION
- One factor - use one way
- Ex: Password
- Two factor - use two ways
- Ex: Password, Text Message
- Three factor - use three ways
- Ex: Password, Text Message, Thumbprint
ENCRYPTION
- Encodes data
- Data can only be read by sender
and receiver
- Involves a “key”
MAC (MEDIA ACCESS CONTROL) ADDRESS
- Used to identify network-enabled devices in
networks
- “Hard-coded” by manufacturer
- Network interface controller
- Unique, 6 pairs of 2 hexadecimal digits
- Check against white list
FIREWALLS
- Can be hardware- or software-based
- Analyzes data packets
- Controls incoming and outgoing traffic
according to predetermined rules
- Filter based on MAC addresses
PHYSICAL SECURITY
- Locked doors
- Cages
- Security Guards
- Secure Rooms
- Hurricane/Earthquake Proof
- EMP-Insulated
IB QUESTIONS
IB QUESTION

You might also like