Networks 2
Networks 2
A network is more than one computer system The server controls network security, backups data. Peer to peer is optimal for sharing files
connected allowing for communication and and can be upgraded to manage higher that can then be downloaded.
sharing of resources. demand.
Advantages:
Local Area Network (LAN): Advantages:
This is a simpler network than client-
A local area network has computer systems The network can be controlled centrally server to set up as no server is required.
situated geographically close together, usually from the server to easily backup data and Clients are not dependent on a server.
within the same building or small site, like a update software. Perfect for quickly sharing files between
school or office. Hardware, software and resources can be systems, such as downloading media files.
shared across the network, such as
The network infrastructure of LAN (such as Disadvantages:
printers, applications and data files.
servers and routers) is usually owned and
The network allows for improved Without a dedicated server there is no
managed by the network owner.
scalability, meaning more clients can be central device to manage security or
Wide Area Network (WAN): easily added to the central server. backups. Backups must be performed on
each individual system.
A wide area network has computer systems Disadvantages:
Computer performance will decrease with
situated geographically distant to each other,
Large amounts of traffic congestion will more devices connected to the network,
possibly across a country or even across the
cause the network to slow down. especially if other machines are slow.
world.
If a fault occurs with the server then the
Data Packets:
WANs often use third party communication whole network will fail.
channels, such as connections by internet IT technicians may be required to manage When sending data across a network, files are
services providers like BT or Virgin Media. and maintain the network. broken down into smaller parts called data
Malware, such as viruses, can spread packets.
Client to Server Network: quickly across the network.
Whole files are too large to transfer as one
Clients make requests to a server; the server Peer to Peer: unit, so data packets allow data to be
manages that request and responds.
transferred across a network quickly.
Data is shared directly between systems
The client is completely dependent on the without requiring a central server. Each
server to provide and manage the information. computer is equally responsible for providing
NETWORKS
Used to transfer data packets between matching destination address before hardware such as switches. E.g. Cat5e and
networks. sending. Cat6
Routers receive data packets and use the An alternative to a switch is a hub but a Fibre Optic cables – very fast but more
IP address in the packet header to hub is slower and less secure as it expensive and fragile cables typically used
determine the best route to transmit the forwards a copy of received data to all to send data quickly along a WAN. Data is
data. connected nodes. sent as pulses of lights.
Data is transferred from router to router Coaxial cables – older, slower, copper
Network Interface Controller (NIC):
across the internet towards the cables that are not used as much in
destination. A NIC is an internal piece of hardware that modern times as they can be affected by
A router stores the IP address of each is required for the computer to connect to electromagnetic interference.
computer connected to it on the network a network.
The Internet:
and uses a list called a routing table to The card includes a MAC address which is
calculate the quickest and shortest route used when sending data across a LAN. The internet is a global network of
to transfer data. An ethernet cable is plugged into the interconnected networks.
network card to allow data to be The world wide web (WWW) is not the
exchanged between the device and a same as the Internet. It is a way of
network. accessing information, using protocols
A NIC used to be separate expansion card such as HTTPS to view web pages.
Switch:
but is now typically embedded on the Servers provide services on the internet,
Used to connect devices together on a motherboard. such as a web server which responds to
LAN. the web browser (client) request to
Transmission Media:
It receives data packets from a connected display a web page. The web server
node, reads the destination address in the The communication channel along which data processes the client request to prepare
packet header and forwards the data is transferred will affect the performance. the web page and return it so the web
directly to its destination. Three common types of transmission media browser can display it to the user.
A switch will generate a list of MAC include: A website must be hosted (stored) on a
addresses of all devices connected to it web server so that it can be accessed by
Ethernet cables – used typically on a LAN others using the internet.
when it receives data and must scan for a
to transfer data between nodes and
NETWORKS
A unique domain name (e.g. 4. The browser then connects to the IP hosting company. The hosting company (such
csnewbs.com) must be registered with a address of the server and accesses the web as Google) is responsible for keeping the
domain register – this is a company that site. servers running and making your data
checks the name is valid and not already accessible on the internet.
taken. If the local DNS server does not hold the IP
address, then the query is passed to another Cloud storage is very convenient as it allows
DNS Servers (Domain Name System): DNS server at a higher level until the IP people to work on a file at the same time and
address is resolved. it can be accessed from different devices.
Server stores a list of domain names and a
However, if the internet connection fails, or
list of corresponding IP address where the If the IP address is found, the address is the servers are attacked then the data could
website is stored. passed on to the DNS servers lower in the become inaccessible.
Every web page has a domain system that hierarchy until it is passed to your local DNS
is easy for humans to remember and type server and then to your browser. Huge Capacity and you can upgrade your
in as well as a related IP address which is a subscription if you need more storage.
unique address for the device that the Cloud storage is typically free for a certain
web page is stored on. amount of storage. Users can they buy a
subscription to cover their needs –
Dropbox allows 2GB for free.
Steps taken to display a web page: Cloud Storage: HOWEVER, Cloud storage is difficult to
rank in terms of PORTABILITY, DURABILITY
1. A domain name is typed into the address The cloud refers to networks of servers and ACCESS SPEED because it depends on
bar of a browser. accessed on the internet. Cloud computing is your internet connection. A fast
2. A query is sent to the local DNS server for an example of remote service provision. Cloud connection would mean that cloud
the corresponding IP address of the domain servers can have different purposes such as storage is very portable (can be accessed
name. running applications, remote processing and on a smartphone or tablet) but a poor
storing data. connection would make access difficult.
3.The local DNS server will check if it holds an
IP address corresponding to that domain When you store data ‘in the cloud’, using Wired Connections:
name. If it does it passes the IP address to services such as Google Drive or Dropbox, your
data is stored on large servers owned by the Wired connections use physicals cables, such
your browser.
as copper or fibre optic wires, and require a
NETWORKS
network interface card (NIC) to connect to a Less secure HTTP is used to transfer web pages over the
network. WNIC required Internet so that users can view them in a web
browser.
These weird connections use a wired Protocols:
connection protocol – most commonly All URLs start with either HTTP or HTTPS(e.g.
Ethernet. A protocol is a set of rules that allow the https://www.csnewbs.com).
devices on a network to communicate with
Restricted movement each other. HTTPS is a more secure version of HTTP that
Faster works with another protocol called SSL (Secure
More secure TCP/IP (Transmission Control Protocol/ Sockets Layer) to transfer encrypted data.
NIC required Internet Protocol):
Transfer Protocols:
TCP/IP are two separate protocols that
combine. FTP (File Transfer Protocol) is used to transfer
files across a network. It is commonly used to
TCP is a protocol that allows packets to be upload or download files to/from a web
sent and received between computer systems. server.
It breaks the data into packets and
SMTP (Simple Mail Transfer Protocol) is a
reassembles them back into the original data
Wireless Connections: protocol used to send emails to a mail server
at the destination.
and between mail servers.
Wireless connections, such as WiFi or
IP is a protocol in charge of routing and
Bluetooth, use no cables but require a wireless POP (Post Office Protocol) and IMAP (Internet
addressing data packets. This ensures data
network interface card (WNIC). Message Access Protocol) are both protocols
packets are sent across networks to the
for receiving and storing emails from a mail
Wireless connections generally have a slower correct destination.
server.
speed and can be affected by the computer’s
It is also an addressing system – every device
distance from the wireless router as well as POP will delete an email once it has been
on a network is given a unique IP address so
obstacles like walls or bad weather. downloaded to a device.
data packets can be sent to the correct
Freedom of Movement computer system. IMAP syncs the message with an email server
Slower so it can be accessed by different devices.
HTTP/HTTPS (Hypertext Transfer Protocol):
NETWORKS
IP vs MAC Addresses: The TCP/IP model is split into 4 layers. The 1. Data Link – Ethernet sets out the format of
model is used to visualize the different parts of data packets. This layer handles transmission
There are two versions of IP addressing
a network as each of the four layers has a errors and passes data to the physical layer.
currently used – IPv4 and IPv6.
specific role.
IPv4 uses a 32-bit address that allows for over
Splitting a network design into layers is
4 billion unique addresses.
beneficial to programmers as it simplifies
IPv4 uses a numeric dot-decimal notation like design, making it easier to modify and use.
this: 212.58.244.66.
Each layer has a certain purpose and is
A newer version – Ipv6 - was developed with associated with different protocols.
a 128-bit address, represented in
hexadecimal.