Networks
Networks
Learning objectives
By the end of this topic, students will be able to
Describe common network devices Including: network interface cards (NIC), hubs,
bridges, switches.
Describe the operation and purpose of a router
Explain Bluetooth and Wi-Fi and state how to connect to a network using both.
A network is the interconnection of two or more computing devices via a
telecommunication media for the purpose of sharing resources. These resources can be
files, or hardware resources like storage space, RAM or CPU.
Common network devices and terms
This section defines four important terms you will often come across these are:
network interface card (NIC)
media access control (MAC) address
internet protocol (IP) address
data packet.
Because IPv4 is being exhausted coupled with the fact that there are so many devices
connecting to the internet in recent days, there arouse a need to have a new IP address
scheme that can address these challenges. Therefore, a newer version called IPv6 is now
being used.
This uses a 128-bit address, which take the form of eight groups of hex digits; for
example:
IPv6 has been designed to allow the internet to grow in terms of the number of hosts and
potential increase in the amount of data traffic.
Data packets
Data is moved around networks in the form of data packets. Whenever a user sends
some data, it is split up into a number of packets and each packet is transmitted
separately. Packets of data will usually have a header which contains:
the sender’s IP address
the receiver’s IP address
the sequence/identity number of the packet (this is to ensure that all the
packets can be reassembled into the correct order once they reach the
destination)
the packet size (this is to ensure the receiving station can check if all of the
packets have arrived intact)
how many data packets make up the whole message.
When a router (see later) receives a packet of data, it checks the destination IP address
against the stored routing table, which allows the router to determine the packet’s next
step in the path.
HUBs
These are hardware devices that can have a number of other devices connected to them.
Their purpose is to connect devices together to form a local Area Network (LAN) usually
within a single building. A hub takes a data packet received on one of its ports and
broadcast it to every device connected to it.
Compute
r
Data packet Data sent out
Compute to all devices
sent to one
r connected to
of the hub HU
ports Compute the hub in the
B
r network
Compute
r
Because data packets are delivered to every device on the network:
Hubs are not very secure because every device will receive every data packet
There will be unnecessary traffic on the network, which results in reduced
bandwidth.
Switches
These are intelligent versions of hubs. They connect
a number of devices together to form a LAN.
However, unlike a hub, a switch stores the MAC
addresses of all devices on the network. These MAC
addresses are stored against the port number to
which it is attached in a table called the “Look-Up”
table. It is also called the MAC address table.
Consequently, switches are more secure than hubs
(because only the intended device is sent the data)
and do not waste bandwidth (because network
traffic is reduced).
In conclusion, hubs and switches are used to exchange data within their own local area
networks. They are unable to exchange data with outside networks (such as the
internet). To exchange data outside their own LAN, a device needs to be able to read an
IP address. Therefore, we need another device to allow communication with external
networks.
In summary:
both a hub and a switch are used to connect devices in a LAN
both hubs and switches use data packets
hubs send data packets to every device on the network; whereas switches send
data packets to a specific device only
security is lower with hubs than with switches
a switch uses a look-up table to determine the destination device
switches use MAC addresses to locate the destination device.
Bridges
Bridges are devices that connect one LAN to another LAN that uses the same protocol
(communication rules). They are often used to connect together different parts of a LAN
so that they can function as a single LAN.
Unlike routers, bridges cannot communicate with other external networks, such as the
internet.
Routers
Routers are used to route packets from one network to another based on addresses. They
are used to join Local Area Network to the internet.
When a router receives a data packet at one of its ports, it inspects the IP header to find
out if the packet is for its own network or another external network. If the data packet is
meant for its own network, then the data packet is sent to the local switch or hub.
Routers know where to send data packets by consulting a routing table (stored on the
router’s RAM). The routing table will contain information about the router’s immediate
network (such as computer addresses) and information about other routers in its
immediate vicinity.
Routers however, do not store the MAC addresses of devices (only IP addresses of all
computers and devices are stored). The router does not need the MAC address because
the data packet will be sent by the router to the switch on the recipient local network.
The switch can then use its look-up table to send the data packet to the correct device.
Suppose, in Figure 4.9, computer C1 wishes to send data to computer C10:
Data packets are sent from C1 to R1.
R1 checks the IP addresses and notes the data packets are not intended for any
devices on Network 1.
The data packets are then forwarded onto the internet (R0).
The IP address (in the header of the data packet) matches that of R4; this ensures
that each data packet is eventually forwarded to R4.
R4 recognizes that the IP address of each data packet refers to Network 4, and
forwards them to S4 which then directs each data packet to C10.
Router Switch
Connect networks using IP address Connects devices together to form a
LAN using MAC address.
Sends data packet to switches on the Sends data packet to individual
network devices
Uses routing table to locate local and Uses MAC address table to track
remote networks location of devices connected to its
ports.
Network types
This section will cover the following types of network:
local area network (LAN)
wireless local area network (WLAN)
wide area network (WAN).
LAN
Local area networks (LANs) are usually within one building or geographically near
each other. A typical LAN will consist of a number of computers and devices (for example,
printers) which will be connected to hubs or switches.
There are advantages of networking computers together using LANs:
they allow the sharing of resources such as hardware (e.g. printers and scanners)
and software (e.g. word processors and photo editing software)
they permit easy communication between users of the LAN (e.g. by using simple
text messaging between computers on the network)
they use a network administrator that ensures security and use of the LAN is
constantly monitored (e.g. the administrator can maintain passwords and also
monitor data traffic within the network).
There are also disadvantages of networking computers using LANs:
easier spread of viruses throughout the whole network
queues for shared resources (such as a printer) which can be frustrating
slower access to external networks
increased security risk when compared to stand-alone computers
if the main server breaks down, in many types of network structures, the network
will no longer function properly.
Wireless local area network (WLAN)
Wireless LANs (WLANs) are similar to LANs, but there are no wires or cables. In other
words, they provide wireless network communications over fairly short distances using
radio or infrared signals instead of using cables.
Devices, known as access points (APs), are connected into a wired network at fixed
locations. Because of the limited range, most commercial LANs (for example, a college
campus or an airport) need several APs to permit uninterrupted wireless
communications.
Wired versus wireless
Wide area networks (WANs)
Wide area networks (WANs) are used where computers or networks are situated a long
distance from each other geographically (for example, in a different city or country). As
mentioned earlier, if a number of
LANs are joined together using a
router, then they can form a
WAN. The network of ATMs
(automated teller machines) used
by banks is one of the most
common examples of the use of a
WAN.
A typical WAN will consist of end systems and intermediate systems (Figure 4.11). In
Figure 4.11, 1, 3, 7 and 10 are known as end systems and the remainder are known as
intermediate systems. The distance between each system can be considerable,
especially if the WAN is run by a multinational company.
The following is used as a guide for deciding the ‘size’ of a network:
WAN: 100 km to over 1000 km
MAN: 1 km to 100 km
LAN: 10 m to 1000 m (1 km)
Network issues and communication
This section covers some of the more general aspects of internet security, together with
how we use networks to communicate.
Passwords
Passwords are used in many instances when accessing the internet. For example:
when accessing your email account
when carrying out online banking
accessing social networking sites.
It is important that passwords are protected. Some ways of doing this are described
below:
Run anti-spyware software to make sure that your passwords are not being relayed
back to whoever put the spyware on your computer
Change passwords on a regular basis in case it has come into the possession of
another user illegally or accidentally.
Passwords should not be easy to crack (e.g. your favourite colour, name of a pet or
favourite rock group); passwords are grouped as either strong (hard to crack or
guess) or weak (relatively easy to crack or guess).
Strong passwords should contain:
at least one capital letter
at least one numerical value
at least one other keyboard character (such as @, *, & etc.).
An example of a strong password is: Sy12@#TT90kj=0
An example of a weak password is: GREEN1
Assignment
1. Explain why switches are said to be more secure than Hub.
2. Describe how the router gets data packet from one network to another.
3. Outline three differences between a router and a switch.
4. Explain the term spread-spectrum frequency hopping.
5. List five characteristics that describes Wi-Fi and Bluetooth transmission.
6. State five differences between Wi-Fi and Bluetooth.