Chapter 2
Chapter 2
Networking benefits:
o File sharing - you can easily share data between different interconnected devices
o Resource sharing - using network-connected output devices like printers, or can share
the same software within the network
LAN WAN
Network that connects devices within a small Network that connects devices within a larger
geographical area geographical area
Transmission medium: twisted pair cable, coaxial Transmission medium: PSTN or satellite link
cable or Wi-Fi
Client-server Model
Client-server Applications
o File Sharing: the client accesses software and user’s data files stored on the server
o Proxy server
A client that solely runs on the resources provided by the An independent client that does not
server and has no local storage require the server to run
Only provides input and receives output; processing done Thick client processes most of the
by server application
Smaller purchase cost: expensive, demanding hardware is Can function even if no server is
not required connected (works offline)
Improved security: cannot run unauthorized, harmful No lag related to network problems
software
o De-centralized network where each connected computer stores data and operates
independently as a ‘peer’, and can act as both a client & server.
Client-server Peer-to-peer
Files & resources centralized in server: prevents Lesser network traffic: each peer can
illegal resource usage simultaneously receive data from different
sources
Improved security: files are stored on central Can work even if a device goes down, but Client-
server which would be regularly scanned for server model can’t work if server goes down
malware
Network Topologies
o Bus
Single line (bus) connecting all devices with terminators at each end.
Other computers can read the data being sent from one to another computer.
Consists of a central server (‘Switch’) and all other computers connected with a
dedicated connection to each, hence server can send packets to different
devices simultaneously and bi-directionally.
No collisions possible.
o Mesh
Network setup where every device (node) is directly interconnected to the each
It is commonly used for wireless networks (such as the Internet), via the mesh
connection of routers
o Hybrid
Wired Networks: use (copper (twisted-pair cable or coaxial cable) or fibre-optic) cables
connected to an Ethernet port on the network router
Benefits Drawbacks
Copper Less expensive and easier to install. Flexible. Easier Doesn’t perform well with small
Cable to make terminations charges. Affected by
electromagnetism
Wireless Networks: use radio waves (including WiFi), microwaves, and satellites to connect
devices to networks without cables.
Benefits Drawbacks
Radio Can travel over large distances since they have Low frequency so transmits less data
waves largest range of wavelength Relatively at one time. Affected by radio
inexpensive. Used for TV signals & mobile phone stations with similar frequency
comms.
Micro- Larger bandwidth, can transfer more data at a Emitting towers expensive to
waves time build Physical obstacles can interfere
Satellites Cheap with long distance Used for Satellite Easy to interfere Expensive set up
phones, satellite radio broadcast
Ethernet
o Most common wired medium of transmission, that can be used to transfer data
between LANs or WANs
o Usually used in bus topology; since all data travelled on a single wire there is a
possibility of data corruption by the “collision” of signals
o This collision is prevented by the CSMA/CD (Carrier Sense Multiple Access Collision
Detection) method:
If busy, device calculates a random wait time and waits that time, after which it
begins transmission
Then during transmission, the device listens for other devices also beginning
transmission
Bit Streaming
o Sequence of digital signals (bits) transferred over a communication path at high speeds
o Requires a fast broadband connection and some form of buffers (short-term memory)
Real-time On-demand
Event captured live via video camera that is Existing digital files converted to encoded bit-
connected to a computer streaming format for broadcasting on the internet
by uploading to a dedicated server
Video signal converted to an encoded streaming A link for encoded video is placed on website and
video signal the user clicks on link to view encoded streaming
video
Encoded video signal uploaded from computer to The data is streamed to a buffer in user’s
a dedicated streaming server via cables or high- computer and the buffer stops the video from
speed wireless internet connection being paused as the bits are streamed
Server then sends live images to all users As the buffer is emptied, it’s filled again thus
requesting it as a real-time video providing continuous viewing
o If media is of higher quality, then higher broadband speed needed since each “frame” is
of a larger size
o Real-time needs faster broadband speeds as compared to on-demand, since there are a
greater number of users simultaneously requesting same data
Cloud Computing
o Refers to the on-demand provision of computing services through the internet
3rd-party cloud service provider grants A private cloud is owned by one organization and is not
access to multiple parties, accessible via a shared with any other organization
browser
Cloud service provider owns, develops and The private cloud can either be created and maintained
manages the public cloud through large by the organization itself or it can outsource these tasks
server farms to a third-party
Benefits Drawback
Relatively less technical knowledge Cannot access the resources/data stored on the cloud, if
required and easy to implement there are bandwidth issues
Flexibility: Cloud Can Be Scaled To Match Poor data privacy, since there may be data leakage in the
The Organization’s Growth multi-tenant architecture (public clouds)
o Uses TCP/IP protocol, which uses IP addresses to identify devices connected to the
internet
Router in a network
o Connects two networks together which operates under the same protocols
o Allows internal connections between LANs OR allows external connection from the main
LAN to a WAN
o The router translates private IP addresses to public IP addresses AND vice versa.
LAN-supporting hardware
o Switch: Connected to all devices in a LAN and can simultaneously broadcast information
to all devices
Provides each device (an end-system) in the wired LAN with a unique (MAC)
address to uniquely identify it on the network
o Wireless Network Interface Card (WNIC): Provides each end-system of a wireless (WiFi)
LAN a unique network address to identify it.
Allows devices to connect to the LAN via WiFi (wireless radio communication)
instead of using a cable
o Bridge
Connects two LANs which work use the same protocol, which can be two
segments of the same network
Stores network addresses for all devices (end-systems) between the 2 networks
A bridge looks for the receiving device before it sends the message.
o Repeater
regenerates the sent data signal over the same network before the signal
weakens (attenuation) to prevent it from being corrupted
Internet-supporting hardware
o Modems
A receiver uses a modem on the other end to convert the analog signals to
digital signals so the receiving device can understand the data.
Channel used between 2 endpoints for the call duration via circuit switching
Bi-directional communication
o Dedicated lines
Wireless networks spread over land areas divided into (hexagonal) ‘cells’
Each cell is served by at least one base station (transceiver), which uses a
different frequency range, as compared to adjacent cells, to transmit data
Portable transceivers (e.g. mobile phones) are able to communicate and access
internet via base stations
32 bit address, split into 4 blocks 128 bit address divided into eight 16-bit blocks by “:”.
by “.”
Each block could have a value Each block can have 4 hex values ranging from 0000 to FFFF
between 0 and 255 (00 to FF in
hex).
IPv4 functionality
o ‘Classfull’ addressing used for IPv4 where different bit lengths for identification and
impose restrictions on available address
Subnetting
o IP addresses are broken down to 3 parts by not changing the netID but partitioning the
host ID into a subnet ID and host ID
o These subnet ID bits are used to identify each subnet within the network.
o Subnet masks are numbers that hides (masks) the netID of a system's IP address and
leaves only the host part as the machine identifier, allowing data to be routed within the
subnet to the appropriate host.
Public and Private IP address
o Public IP is provided by the ISP while Private IP issued by the LAN’s router
o Public IP is unique and can be across the internet whereas Private IP is only unique
within LAN and hence can only be accessed within LAN
o NAT (Network address translation) required for private IP addresses to access internet
directly.
o Private IP more secure than public IP, since they are not directly accessible on the
Internet and are hidden by NAT
o Range of IP addresses used for private IP addressing can never be assigned to public IP
addresses
Static Dynamic
Static IP addresses are useful when websites need to Dynamic IP address is relatively more
remember a device for a long time. Eg) VPNs secure, hence used where data privacy is
whitelisting important
o Unique reference address for the exact location of an internet resource on the WWW
Protocol: enables browser to know what protocol is used to access info in domain
o Consists of a hierarchy of DNS servers which have a URLs database of and their
corresponding IP addresses