Networks and Data Communication
Networks and Data Communication
3.1. Routers
A router can form a LAN by connecting devices within a building. It also makes it
possible to connect different networks together. Homes and businesses use a router
to connect to the internet. A router can often incorporate a modem within the
hardware.
3.2. Modems
A modem enables a computer to connect to the internet over a telephone line. A
modem converts digital signals from a computer to analogue signals that are then
sent down the telephone line. A modem on the other end converts the analogue
signal back to a digital signal which another computer can understand.
Hubs, bridges and switches allow multiple devices to connect to the router and
they transfer data to all devices on a network. A router is a more complex device
that usually includes the capability of hubs, bridges and switches.
3.3. Hubs
A hub broadcasts data to all devices on a network. This can use a lot of bandwidth
as it results in unnecessary data being sent - not all computers might need to receive
the data. A hub would be useful to link up a few games consoles for a local
multiplayer game using a wired LAN.
3.4. Bridges
A bridge is used to connect two separate LAN networks. A computer can act as a
bridge through the operating system. A bridge looks for the receiving device
before it sends the message. This means that it will not send a message if the
receiving computer is not there. It will check to see if the receiver has already had
the message. This can help save unnecessary data transfers, which improves the
performance of a network.
3.5. Switches
A switch performs a similar role to a hub and a bridge but is more powerful. It
stores the MAC addresses of devices on a network and filters data packets to see
which devices have asked for them. This makes a switch more efficient when
demand is high. If, for example, a game involved lots of data being passed between
machines, then a switch could reduce the amount of latency.
3.6. Wireless access points
Wireless access points (WAPs) are required to connect to a network wirelessly.
WAPs are usually built into the broadband router.
NIC. No two computers have the same MAC address. A MAC address is made up
of 48 bits of data, usually written as 12 hexadecimal characters.
3.7. Network interface card (NIC)
NICs enable desktop and laptop computers to connect to a network. NICs are small
circuit boards that connect to the motherboard. Smartphones also use a GSM
chip to connect to the telephone network. Games consoles contain a NIC card so
users can access the internet, download games and play online.
3.8. Coaxial Cables
Invented in the 1880s, "coax" was best known as the kind of cable that connected
television sets to home antennas. Coaxial cable is also a standard for 10 Mbps
Ethernet cables. When 10 Mbps Ethernet was most popular, during the 1980s and
early 1990s, networks typically utilized one of two kinds of coax cable - thinnet
(10BASE2 standard) or thicknet (10BASE5). These cables consist of an inner
copper wire of varying thickness surrounded by insulation and another shielding.
Their stiffness caused network administrators difficulty in installing and
maintaining thinnet and thicknet.
3.9. Twisted Pair Cables
Twisted pair eventually emerged during the 1990s as the leading cabling standard
for Ethernet, starting with 10 Mbps (10BASE-T, also known as Category 3 or
Cat3), later followed by improved versions for 100 Mbps (100BASE-TX, Cat5,
and Cat5e) and successively higher speeds up to 10 Gbps (10GBASE-T). Ethernet
twisted pair cables contain up to eight (8) wires wound together in pairs to
minimize electromagnetic interference.
Two primary types of twisted pair cable industry standards have been defined:
Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP). Modern Ethernet
cables use UTP wiring due to its lower cost, while STP cabling can be found in
some other types of networks such as Fibre Distributed Data Interface (FDDI).
Client-server P2P
Client-Server P2P
4.4. Servers
A server stores data to be used by other computers on a network. A server could be
a specialized machine or it can be a normal PC running server software. The
server stores data and responds to requests for data or files such as web pages.
5.5. VPN
A VPN (virtual private network) is usually hosted securely on another network,
such as the internet, to provide connectivity. VPNs are often used when working
on secure information held by a company or school.
6.0. Topologies
There are different ways of setting up a LAN, each with different benefits in terms
of network speed and cost. Three of the main topologies include bus, star and ring.
6.1. Bus network
In a bus network all the workstations, servers and printers are joined to one cable -
'the bus'. At each end of the cable a terminator is fitted to stop signals reflecting
back down the bus.
Advantages
• easy to install
• cheap to install - it does not require much cabling
Disadvantages
• if the main cable fails or gets damaged, the whole network will fail
• as more workstations are connected, the performance of the network will
become slower because of data collisions
• every workstation on the network 'sees' all of the data on the network, which
can be a security risk
6.2. Ring network
In a ring network, each device (egg workstation, server, and printer) is connected in
a ring so each one is connected to two other devices. Each data packet on the
network travels in one direction. Each device receives each packet in turn until the
destination device receives it.
Advantages
• this type of network can transfer data quickly (even if there are a large
number of devices connected) as data only flows in one direction so
there won't be any data collisions
Disadvantages
• if the main cable fails or any device is faulty, then the whole network
will fail - a serious problem in a company where communication is vital
6.3. Star network
In a star network, each device on the network has its own cable that connects to a
switch or hub. This is the most popular way of setting up a LAN. You may find a
star network in a small network of five or six computers where speed is a priority.
Advantages
• very reliable – if one cable or device fails, then all the others will continue to
work
• high performing as no data collisions can occur
Disadvantages
• expensive to install as this type of network uses the most cable, and network
cable is expensive
• extra hardware is required - hubs or switches - which add to the cost
• if a hub or switch fails, all the devices connected to it will have no network
connection
6.4. Point to Point Topology
This is the simplest of all the network topologies. If consists of a direct link
between two computers. This is faster and more reliable than other types of
connections. The disadvantages is that it can only be used for a small area where
computers are in close proximity
6.5. Mesh Topology
It is a point to point connection to other nodes or devices. All the network nodes
are connected to each other.
6.6. Tree Topology
It has a root node and all other nodes are connected to forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the
hierarchy
6.7. Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in a hybrid topology.
The internet is a global network of computers that any computer can join. It is a
WAN - which is a series of connected LANs.
Data packets are sent between computers using protocols that manage how data is
sent and received. The internet also uses different models - such as the client-server
model and the P2P model - to connect computers in different ways. The internet is
leading to more and more people using cloud computing to store files and use web
applications online.
Technologies and services available over the internet include:
• web pages – HTML documents that present images, sound and text accessed
through a web browser
• web applications - web software accessed through a browser
• native apps - applications developed for specific devices (such as
smartphones) and accessed without the need for a browser email
• file sharing
• voice calls
• streaming audio and video
7.7. Protocols
The internet is similar to a road network in that it has rules (protocols) that you
need to follow and only a certain number of vehicles (data) can get through at a
time (bandwidth). If too many vehicles try to go down the same road you get
congestion (reduced bandwidth).
When two devices send messages to each other it is called handshaking - the client
requests access, the server grants it, and the protocols are agreed. Once the
handshaking process is complete, the data transfer can begin.
Protocols establish how two computers send and receive a message. Data packets
travel between source and destination from one router to the next. The process of
exchanging data packets is known as packet switching.
Protocols manage key points about a message:
• speed of transmission
• size of the message
• error checking
• deciding if the transmission is synchronous or asynchronous
TCP/IP (transmission control protocol/internet protocol)
TCP/IP (also known as the internet protocol suite) is the set of protocols used over
the internet. It organizes how data packets are communicated and makes sure
packets have the following information:
• source - which computer the message came from
• destination - where the message should go
• packet sequence - the order the message data should be re-assembled
• data - the data of the message
• error check - the check to see that the message has been sent correctly
Key protocols.
IP address
Every device on the internet has a unique IP address. The IP address is included in a data packet.
IP addresses are either 32-bit or 128-bit numbers. The address is broken down into four 8-bit
numbers (each is called an octet). Each octet can represent a number between 0 and 255 and is
separated by a full stop, e.g. 192.168.0.12.
To find your IP address you can use the ipconfig command line tool.
Home and small business routers often incorporate a basic dynamic host configuration protocol
(DHCP) server which assigns IP addresses to devices on a network.
The 32-bit IP address system is also known as IPv4. It allows for just over 4 billion unique
addresses. IPv6 is now coming into use. IPv6 uses 16 bits for each section of the address,
creating a 128-bit address. This allows almost 80 octillion unique IP addresses.
FTP
FTP is used to transfer large files. It is often used for organising files on a web server for a
website. You can have private access to an area on an FTP server where you can upload your
files. You can then give another user access to download the documents that you have shared.
HTTP
HTTP transfers web pages from web servers to the client. All web page addresses start with http.
An https address is a secure web address which has been encrypted. An https address is used for
sites holding bank details and secure information.
VOIP
VOIP is a set of protocols that enables people to have voice conversations over the internet.
Web addresses
Every website address has a URL with an equivalent IP address. A web address
contains (running from left to right):
In this example from BBC Nature:
1. http is the protocol
2. www.bbc.co.uk is the domain name stored on a DNS
3. /nature/life/ is the folder structure leading to where the web page is located
4. frog is the requested web page
Name servers are used to host and match website addresses to IP addresses. DNS
is the main system over the internet that uses the name server.
When you type in a URL, the ISP looks up the domain name, finds the matching
IP address and sends it back.
The web browser sends a request straight to that IP address for the page or file that
you are looking for.
Every website has a URL with an equivalent IP address.
Device addresses
Data packets include the addresses of the devices they are going to and coming
from. Computers need a network interface card to connect to a network. All
devices on a network have a MAC address.
MAC address
Every piece of hardware on a network has a unique MAC address. This is
embedded in the hardware when the product is made in the factory, and the user
cannot change it. On a computer, the MAC address is a unique code built into a
Streaming
Streaming high-quality images, music and video requires a lot of data.
Compression reduces file sizes whilst keeping the high quality of the original
media. Music and video
Compression is important for reducing music and video file sizes. Music and video
files can both be either downloaded as permanent files or streamed temporarily.
A downloaded file creates a file you can store permanently. Streamed files are not
stored permanently. Streaming allows data to be used immediately but the whole
file is not downloaded. Popular streaming sites include BBC iPlayer, Spotify and
YouTube.
Data is streamed by the service to the client. The client could be a web application,
web browser or native app. A browser needs to use HTML5 or a plug-in to decode
the audio or video. HTML5 is a new version of HTML which makes it possible for
compatible browsers to stream audio and video without the need for plug-ins.
Buffering
A buffer is a temporary storage space where data can be held and processed. The
buffer holds the data that is required to listen to or watch the media. As data for a
file is downloaded it is held in the buffer temporarily. As soon as enough data is in
the buffer the file will start playing.
When you see the warning sign 'buffering' this means that the client is waiting for
more data from the server. The buffer will be smaller if the computer is on a faster
network.
Network security
Computer networks have many benefits but they also create security risks. By
connecting computers it is possible to share personal data easily. However, it
makes computers more vulnerable to interference from other people.
Anyone sharing personal information, e.g. bank details, wants to be sure that they
are safe and secure. Most businesses and organisations employ network managers
or administrators to manage the security of their networks.
There are many potential threats to a network and various ways to protect them.
Anti-virus software
There are a number of malicious software (‘malware’) programs that can cause
damage to computers. These include viruses, worms, zombies, Trojan horses
(Trojans) and Spybot.
Anti-virus software is designed to detect and block attacks from malware. Some
operating systems have their own inbuilt anti-virus software.
In a large organisation, a network manager should make sure that all the computers
under their control are secure and the anti-virus software is up to date.
Firewalls
A firewall is software that will block unexpected connections coming in to the
network. Most operating systems include a firewall.
Secure passwords
When more than one person uses a network it is important to have user IDs and
passwords. Only someone with a login and password can access that network. It
also helps the network manager trace unusual activity to a specific user.
A weak password makes it easy for someone to try to guess your login details. A
good password will have a mix of upper case and lower case letters, numbers and
special characters.
Access levels
In a large company or school, many people will be using computers on the same
network. A network manager will normally control the level of access people have
to the network. General users will not have the ability to download any software
they want or to make changes to any part of the system, as that could affect other
users.
The more people have access to sensitive parts of the network, the more likely it is
that a hacker or a virus might be able to cause damage.
You can set user access levels on your home computer. For example, a parent may
prevent a child from being able to install software.
Encryption
Any message sent over a network can be intercepted. Encryption is a method of
changing the original numbers and characters so that they are hidden or disguised.
This is important if you are sending sensitive information.
One method of encryption is the Caesar Cipher algorithm. In this method, each
letter of the alphabet is simply replaced by another letter in the alphabet that might
be one or more letter positions away.
For example, encrypting using letters which are +5 positions away would change
the original text ‘Bitesize’ into cipher text ‘Gnyjxnej’.
The prefix for some web addresses is https instead of http. The‘s’ indicates that it
is a secure website and any payment or personal details that are inputted into the
site will be encrypted.
Network policies
Network policies provide rules and guidelines on what network users can and
cannot do. Most networks in large organisations will have network policies in
place.
Acceptable Use Policy (AUP)
An AUP states how the network may be used – what is and is not acceptable. If
you are going to let people use your network, then you should have an agreement
in place which states the rules and guidelines for users.
Archiving
Networks often have to store a lot of data. A good archiving strategy takes old,
non-essential data and puts it somewhere safe. An archiving policy will help decide
when to move data, where it should be kept, and how to get it back if needed.
Cyber attacks
Cyber-attacks and cyber terrorism are ways of attacking companies and
organizations online. There are frequent cyber-attacks on the government and
businesses in the UK.
Hacking
Hackers attempt to break into networks to steal private information. In
2011, Sony’s PlayStation Network was hacked and security details for
thousands of users were released.
IT security specialists are employed by companies to hack their own networks and
find security faults or weaknesses. These ‘white hat hackers’ (as they are
sometimes called) must be experts in their field and have knowledge of the latest
techniques being used by illegal hackers. By attempting to hack into a network,
they can spot security flaws and offer advice on how to fix them.