KEMBAR78
Networks (Workbook) | PDF | Computer Network | Network Topology
0% found this document useful (0 votes)
230 views7 pages

Networks (Workbook)

The document discusses key topics in computer networks including network fundamentals, data transmission, and wireless networking as outlined by the International Baccalaureate Computer Science curriculum. It defines different types of networks such as WAN, MAN, LAN, VLAN, SAN, and VPN. It also covers network components like hosts, nodes, servers, and clients. Advantages of networks include sharing peripherals, programs, data, improved communication, and information security. Local area networks can be either client-server or peer-to-peer architectures.

Uploaded by

Mritraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
230 views7 pages

Networks (Workbook)

The document discusses key topics in computer networks including network fundamentals, data transmission, and wireless networking as outlined by the International Baccalaureate Computer Science curriculum. It defines different types of networks such as WAN, MAN, LAN, VLAN, SAN, and VPN. It also covers network components like hosts, nodes, servers, and clients. Advantages of networks include sharing peripherals, programs, data, improved communication, and information security. Local area networks can be either client-server or peer-to-peer architectures.

Uploaded by

Mritraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NETWORKS PAGE 1 OF 7 MR. WACHS: I.B.

COMPUTER SCIENCE

NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 2 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

NETWORKS
INTERNATIONAL BACCALAUREATE COMPUTER SCIENCE
DESCRIPTION:

The section on “Networks” in the International Baccalaureate Computer Science curriculum has content that will be covered throughout
the 3-year Computer Science program here at Sturgeon Heights. A lot of this material is very open ended and can be interpreted in a number
of different ways in terms of the examination questions that you could face during the I.B. external examinations worth 65% of your final
I.B. grade out of 7. As a result, I will be having you cover this material in a variety of ways including:
 Group discussions
 Supplementary reading HEADS UP: The ACTUAL assignment for
 Investigative projects/assignments Networks starts on the top of the last page of
 Integration into regular classroom instruction this booklet
BREAKDOWN:

The section on Networks from the curriculum suggests 9 hours of your time investment. The details of this are seen below:
( 1 ) Network fundamentals ( 3 ) Wireless networking
( 2 ) Data transmission

SPECIFICS:

In order to ensure you feel you are adequately prepared for the I.B. computer Science external assessment (the exams); I list
below the specific criteria from the I.B. Computer Science curriculum on this section of Networks:

Network fundamentals

(1) Identify different types of networks


(2) Outline the importance of standards in the construction of networks
(3) Describe how communication over networks is broken down into different layers
(4) Identify the technologies required to provide a VPN
(5) Evaluate the use of a VPN

Data transmission

(6) Define the terms: protocol, data packet


(7) Explain why protocols are necessary
(8) Explain why the speed of data transmission across a network can vary
(9) Explain why compression of data is often necessary when transmitting across a network
( 10 ) Outline the characteristics of different transmission media
( 11 ) Explain how data is transmitted by packet switching

Wireless networking

( 12 ) Outline the advantages and disadvantages of wireless networks


( 13 ) Describe the hardware and software components of a wireless network
( 14 ) Describe the characteristics of wireless networks
( 15 ) Describe the different methods of network security
( 16 ) Evaluate the advantages and disadvantages of each method of network security

NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 3 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

NOTES:

Communication Networks

 Communication channels and hardware may be used in different layouts or networks, varying in size from large to small
 Networks allow us to share peripheral devices, programs, and data
 They allow us to have better communications, share an have more access to more information
 Whether wired, wireless, or both – computing devices can be linked together to form a network
 A network is a system of interconnected devices that can communicate with one
another and share applications and data
 A network and its devices requires a Network Operating System NOS to manage
the network resources
Various Types of Networks

 Networks are generally categorized into three main sizes:


 Wide Area Network (WAN): is a communication network that covers a wide
geographical area, such as a state or country
 The internet links together hundreds of WANs
 Most telephone systems are in fact WANs
 Metropolitan Area Network (MAN): is a communication network covering a
geographical area the size of a city or suburb
 The purpose of a MAN is often to avoid long distance telephone charges
 An example of a MAN is a cellular phone system
 Local Area Network (LAN): is a privately owned communication network that
serves users within a confined geographical area
 The range is usually within one mile – and is often within one office, building, or
group of buildings close together (e.g. a university)
 All these networks may consist of various combinations of computing devices,
storage devices, communications devices, etc.
 Other network definitions can include:
 Virtual LAN (VLAN): a network of computers that behave as if they are
connected to the same wire even though they may actually be physically located
on different segments of a LAN
 VLANs are configured through software rather than hardware, which makes them
extremely flexible
 One of the biggest advantages of VLANs is that when a computer is physically moved
to another location, it can stay on the same VLAN without any hardware reconfiguration
 Storage Area Network (SAN) is a dedicated network that provides access to
consolidated, block level data storage
 SANs are primarily used to make storage devices, such as disk arrays, tape libraries,
and optical jukeboxes, accessible to servers so that the devices appear like locally
attached devices to the operating system
 A SAN typically has its own network of storage devices that are generally not
accessible through the local area network by other devices
 Wireless Local Area Network (WLAN) links two or more devices using some wireless
distribution method (typically spread-spectrum or OFDM radio), and usually providing a
connection through an access point to the wider Internet
 This gives users the ability to move around within a local coverage area and still be
connected to the network
 Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-
Fi brand name
 Virtual Private Network (VPN) extends a private network across a public network,
such as the Internet
 It enables a computer to send and receive data across shared or public networks as
if it were directly connected to the private network, while benefiting from the
functionality, security and management policies of the private network
 This is done by establishing a virtual point-to-point connection through the use of
dedicated connections, encryption, or a combination of the two
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 4 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

Hosts and Nodes

 Many computer networks, particularly large ones are served by a host computer
 The host computer (or simply the host) is the main, central computer controlling the network
 On a LAN, the functions of the host may be performed by a computer called the server
 A node is simply a device attached to the network (which may be a client computer, terminal, storage device, printer, or some other
peripheral)
Advantages of Networks

 Most advantages apply to LANs, but can apply to WANs and MANs also
 Sharing of peripherals: printers, disk drives, and scanners are examples of peripherals that can be shared over a network
 New hardware devices like this are expensive, so sharing them using a network is cheaper than buying one for each client computer
 Sharing of programs and data: in most organizations, people use the same software and need access to the same information
 To save time and money, software and data can be shared across the network on a shared storage device which all clients have
access to
 Also this allows users to work together on data in shared projects
 Better Communications: one of the best features of networks is communication
 This allows users to keep each other posted about important information
 This eliminates the need for travel messages, printed messages, and phone messages
 Security of information: This allows data to be backed up or duplicated on a network storage device
 Thus, damage or data loss to a client computer can ensure the data will be recoverable
 Access to databases: allowing user to tap into numerous databases (either private to that network, or public domain)
 These and many more features justify the wide spread use of computer networks
Types of Local Networks

 LANs are typically two types: client-server and peer-to-peer


 Client-server LANs consist of computers which request services
called clients
 And, the central supplying devices called servers manage shared
information or devices (e.g. printers)
 One piece of the NOS resides on each client machine, and another
resides on the server(s)
 The NOS allows the remote drives on the servers to be accessed as if
they were local drives on the client machine
 The server is usually a powerful computer with lots of RAM and
secondary storage
 NOS software for Windows and Mac users have it built into the OS
 There may be different servers for managing different tasks
 The file server is a computer that stores the program and data files shared by users on the LAN (acting like a disk drive on the local
machine)
 A database server is a computer in a LAN that stores data but not programs
 A printer server is a computer in a LAN that controls one or more printers, storing the print jobs from the client computers on the
network, then feeding to the printer as it becomes available
 Mail Servers mange e-mail
 Peer-to-peer LANs are networks where all computers on the network communicate with one another without the use of a server
 The NOS allows each station to be both client and server
 Thus files stored on one peer machine can be accessed by the other peers
 These networks are less expensive and are usually effective for around 25 users (but slow down under heavy use)
 Many LANs mix elements from both
Components of a LAN

 LANs are made up of several standard components:


 Connection or cabling system: LANs do not use telephone networks, instead they are wired (or even wireless)
 Wiring connection may be twisted-pair wiring, coaxial cable, or fiber-optic cable
 Wireless connections may be infrared or radio-wave transmissions (however they can be subject to interference)
 Microcomputers with network interface cards: two or more computers are needed to form a network along with network interface
cards inserted into an expansion slot on the motherboard

NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 5 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

 The network card can also exist in a separate box, which can serve a number of devices
 Network operating system: the NOS manages the activity of the network – providing multi-user, multitasking capabilities
 Other shared devices: printers, scanners, storage devices, and other devices can be added to the network and shared by all users
 Bridges, routers and gateways: a LAN may stand alone, but it may also connect to other networks, either using similar or different
technologies
Network Topology

 Networks can be laid out in different ways, the physical layout, or


shape of the network is called a topology
 The basic topologies are: star, ring, bus, and hybrid
 Star topology: is one in which all computers and other devices
are connected to a central hub, such as a file server or host
 This connection is made through UTP (unshielded twisted pair) or
STP (shielded twisted pair)
 Some intelligent hubs can provide switching, bridging and routing
capabilities
 Electronic messages are sent through the central hub to their
destinations
 The advantage of the star topology is that the hub prevents
collisions between messages
 Also if a connection is broken between a device and the hub, the
rest of the network will continue to function
 However, a hub failure is a catastrophe
 Ring topology: is one in which all computers are connected in a
continuous loop
 Messages are passed around the ring in one direction, with each
node serving as a repeater, until they reach the right destination
 There is no central host computer or server (also known as a
token ring)
 The advantage of the ring network is that messages flow in one
direction, thus no danger of collision
 The disadvantage is that the failure of one node can disrupt the
entire network
 Bus topology: this works like a bus system at rush hour, where
computers are connected to a common channel (this uses no
server)
 Each communication device transmits messages to other devices,
if they collide, the device waits and transmits again
 The advantage of bus topology is that it can be organized as a
client-server or peer-to-peer
 The disadvantage is the extra circuitry and software needed to
avoid collisions, also if the buss itself is compromised, the entire
network collapses
 Hybrid topology: is a combination of star, ring, and bus
topologies
 For example, universities might use a bus to connect buildings,
and star and rings to connect with those buildings

NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 6 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

The Impact of Networks

 Sales of mainframe computer systems and midsize computers have fallen due to the rise in popularity of LANs
 Companies have discovered that LANs can take their place at a considerably less expense
 Still, a LAN requires a skilled support staff
 Also, LANs lack the storage capacity and security of mainframes
Data Representation in Networks

 In order for a computer network to function effectively, it has a


need for standard protocols within it’s network, as well as
between networks
 Protocol basically means “rules” that hardware/software
agrees upon to move data around
 When you send information out onto a network, your computers
network software controls how it goes out
 This software breaks the information into packets
 This is known as packet switching
 The network’s protocols are used to package the requests
from the client computers, as well as send requests across the
network
 The protocols handle the nitty-gritty details (addressing,
routing, ensuring delivery, ensuring accuracy, etc.)
Wireless Networks

 The rise and popularity of


wireless networking has had a
major impact on modern
networking
 Like wired networking, a
device must have the proper
circuitry (a card, or other
device) and NOS on the
device to communicate with
the network
 As well, the network must have a wireless transmitter for these
devices to connect to using radio waves or infrared signals
through the air
 The standard protocols used in wireless networking mostly use a
system called Wi-Fi
 In order to improve performance, Wi-Fi started developing a faster
hardware/software version of Wi-Fi called 802.11n
 From there, 802.15 was developed for personal networks and
Bluetooth technology
 Then 802.16 or WiMAX (worldwide interoperability for microwave
access) was developed to combine the benefits of wireless and
broadband
 As well, the 3G (which is short for third generation)
telecommunications network has evolved for even faster network
communication
 Future developments are still unclear as to which standards will
prevail, but leading standards include WiGig (the Wireless Gigabit
Alliance) and WirelessHD (a silicon valley consortium of hardware
manufacturers)
 In addition to the speed of transmission, security over wireless is also a major concern to maintain user privacy and security of data
 Wireless networking makes use of usernames and passwords (userID) as well as Media Access Control (MAC) technology
 MAC assigns a unique number to each IP network adapter called the MAC address a 48 bit sequence commonly written in 12
hexadecimal digits like: 48-3F-0A-91-00-BC
 These are often called physical addresses, and are often tracked by the internet service providers (ISPs)
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 7 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE

ASSIGNMENT:

 For each of the sections of Networks, your assignment is to present me with a “solution” to the “problem” I pose, but this “solution”
can take several forms:
- A written response (either hand written, or typed up, pictures can be included, no formal structure needed)
- A presentation (e.g. PowerPoint – given to me, or just sent to me electronically)
- A blog post (from a blog you have created – see me if not sure how to do this, but I recommend WordPress.org)
- A class discussion (either in class/group setting, or to Mr. Wachs individually)
- A video log or audio “podcast” (filmed on smartphone, webcam, etc. and either shared with Mr. Wachs as a video file, or
uploaded to youtube and shared with Mr. Wachs)
- Any other creative way to deliver your “solution” (e.g. skit, game show, etc. – please check with Mr. Wachs first)
 You should choose the method of delivering your solution that you feel is best for you
 You may always work on any or all of these alone, or in groups (of 2, and up to the entire class per group)
 You may also use a hybrid method, combining several of the above methods together
 You can research these “solutions” and I would strongly suggest investigating the vocabulary list to give you a good grounding in the
“problem” – but research is not entirely necessary if you can “solve” each problem using your prior knowledge of computing either
gained in class, or from your own experiences
 If you are really struggling with these “problems” then please come see Mr. Wachs for help including: discussions with him, books,
websites, video, etc. to help you formulate a “solution”
 The length of your “solution” is not determined, but try to cover all the points outlined in the problem, as you could consider this
studying for the I.B. exam and making sure you cover the material
 In other words, whatever you leave out, you are missing for yourself and could be “stumped” by a question that might touch on it
during the exam
 Remember, these “problems” mimic the types of questions you can expect on the I.B. examination at the end of grade 12, so
completing the assignment is also preparation for the exam (never too early to start studying)

THE PROBLEM:

In the context of the Networking content, please complete a short definition for each of the terms in this vocabulary
list:

(1) LAN (9) OSI seven layer model


(2) VLAN ( 10 ) Data packet
(3) SAN ( 11 ) Compression of data
(4) WLAN ( 12 ) Packet switching
(5) VPN ( 13 ) Wi-Fi
(6) PAN ( 14 ) WiMAX
(7) P2P ( 15 ) 3G
(8) Protocols ( 16 ) MAC

NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE

You might also like