NETWORKS PAGE 1 OF 7 MR. WACHS: I.B.
COMPUTER SCIENCE
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 2 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS
INTERNATIONAL BACCALAUREATE COMPUTER SCIENCE
DESCRIPTION:
The section on “Networks” in the International Baccalaureate Computer Science curriculum has content that will be covered throughout
the 3-year Computer Science program here at Sturgeon Heights. A lot of this material is very open ended and can be interpreted in a number
of different ways in terms of the examination questions that you could face during the I.B. external examinations worth 65% of your final
I.B. grade out of 7. As a result, I will be having you cover this material in a variety of ways including:
Group discussions
Supplementary reading HEADS UP: The ACTUAL assignment for
Investigative projects/assignments Networks starts on the top of the last page of
Integration into regular classroom instruction this booklet
BREAKDOWN:
The section on Networks from the curriculum suggests 9 hours of your time investment. The details of this are seen below:
( 1 ) Network fundamentals ( 3 ) Wireless networking
( 2 ) Data transmission
SPECIFICS:
In order to ensure you feel you are adequately prepared for the I.B. computer Science external assessment (the exams); I list
below the specific criteria from the I.B. Computer Science curriculum on this section of Networks:
Network fundamentals
(1) Identify different types of networks
(2) Outline the importance of standards in the construction of networks
(3) Describe how communication over networks is broken down into different layers
(4) Identify the technologies required to provide a VPN
(5) Evaluate the use of a VPN
Data transmission
(6) Define the terms: protocol, data packet
(7) Explain why protocols are necessary
(8) Explain why the speed of data transmission across a network can vary
(9) Explain why compression of data is often necessary when transmitting across a network
( 10 ) Outline the characteristics of different transmission media
( 11 ) Explain how data is transmitted by packet switching
Wireless networking
( 12 ) Outline the advantages and disadvantages of wireless networks
( 13 ) Describe the hardware and software components of a wireless network
( 14 ) Describe the characteristics of wireless networks
( 15 ) Describe the different methods of network security
( 16 ) Evaluate the advantages and disadvantages of each method of network security
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 3 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
NOTES:
Communication Networks
Communication channels and hardware may be used in different layouts or networks, varying in size from large to small
Networks allow us to share peripheral devices, programs, and data
They allow us to have better communications, share an have more access to more information
Whether wired, wireless, or both – computing devices can be linked together to form a network
A network is a system of interconnected devices that can communicate with one
another and share applications and data
A network and its devices requires a Network Operating System NOS to manage
the network resources
Various Types of Networks
Networks are generally categorized into three main sizes:
Wide Area Network (WAN): is a communication network that covers a wide
geographical area, such as a state or country
The internet links together hundreds of WANs
Most telephone systems are in fact WANs
Metropolitan Area Network (MAN): is a communication network covering a
geographical area the size of a city or suburb
The purpose of a MAN is often to avoid long distance telephone charges
An example of a MAN is a cellular phone system
Local Area Network (LAN): is a privately owned communication network that
serves users within a confined geographical area
The range is usually within one mile – and is often within one office, building, or
group of buildings close together (e.g. a university)
All these networks may consist of various combinations of computing devices,
storage devices, communications devices, etc.
Other network definitions can include:
Virtual LAN (VLAN): a network of computers that behave as if they are
connected to the same wire even though they may actually be physically located
on different segments of a LAN
VLANs are configured through software rather than hardware, which makes them
extremely flexible
One of the biggest advantages of VLANs is that when a computer is physically moved
to another location, it can stay on the same VLAN without any hardware reconfiguration
Storage Area Network (SAN) is a dedicated network that provides access to
consolidated, block level data storage
SANs are primarily used to make storage devices, such as disk arrays, tape libraries,
and optical jukeboxes, accessible to servers so that the devices appear like locally
attached devices to the operating system
A SAN typically has its own network of storage devices that are generally not
accessible through the local area network by other devices
Wireless Local Area Network (WLAN) links two or more devices using some wireless
distribution method (typically spread-spectrum or OFDM radio), and usually providing a
connection through an access point to the wider Internet
This gives users the ability to move around within a local coverage area and still be
connected to the network
Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-
Fi brand name
Virtual Private Network (VPN) extends a private network across a public network,
such as the Internet
It enables a computer to send and receive data across shared or public networks as
if it were directly connected to the private network, while benefiting from the
functionality, security and management policies of the private network
This is done by establishing a virtual point-to-point connection through the use of
dedicated connections, encryption, or a combination of the two
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 4 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
Hosts and Nodes
Many computer networks, particularly large ones are served by a host computer
The host computer (or simply the host) is the main, central computer controlling the network
On a LAN, the functions of the host may be performed by a computer called the server
A node is simply a device attached to the network (which may be a client computer, terminal, storage device, printer, or some other
peripheral)
Advantages of Networks
Most advantages apply to LANs, but can apply to WANs and MANs also
Sharing of peripherals: printers, disk drives, and scanners are examples of peripherals that can be shared over a network
New hardware devices like this are expensive, so sharing them using a network is cheaper than buying one for each client computer
Sharing of programs and data: in most organizations, people use the same software and need access to the same information
To save time and money, software and data can be shared across the network on a shared storage device which all clients have
access to
Also this allows users to work together on data in shared projects
Better Communications: one of the best features of networks is communication
This allows users to keep each other posted about important information
This eliminates the need for travel messages, printed messages, and phone messages
Security of information: This allows data to be backed up or duplicated on a network storage device
Thus, damage or data loss to a client computer can ensure the data will be recoverable
Access to databases: allowing user to tap into numerous databases (either private to that network, or public domain)
These and many more features justify the wide spread use of computer networks
Types of Local Networks
LANs are typically two types: client-server and peer-to-peer
Client-server LANs consist of computers which request services
called clients
And, the central supplying devices called servers manage shared
information or devices (e.g. printers)
One piece of the NOS resides on each client machine, and another
resides on the server(s)
The NOS allows the remote drives on the servers to be accessed as if
they were local drives on the client machine
The server is usually a powerful computer with lots of RAM and
secondary storage
NOS software for Windows and Mac users have it built into the OS
There may be different servers for managing different tasks
The file server is a computer that stores the program and data files shared by users on the LAN (acting like a disk drive on the local
machine)
A database server is a computer in a LAN that stores data but not programs
A printer server is a computer in a LAN that controls one or more printers, storing the print jobs from the client computers on the
network, then feeding to the printer as it becomes available
Mail Servers mange e-mail
Peer-to-peer LANs are networks where all computers on the network communicate with one another without the use of a server
The NOS allows each station to be both client and server
Thus files stored on one peer machine can be accessed by the other peers
These networks are less expensive and are usually effective for around 25 users (but slow down under heavy use)
Many LANs mix elements from both
Components of a LAN
LANs are made up of several standard components:
Connection or cabling system: LANs do not use telephone networks, instead they are wired (or even wireless)
Wiring connection may be twisted-pair wiring, coaxial cable, or fiber-optic cable
Wireless connections may be infrared or radio-wave transmissions (however they can be subject to interference)
Microcomputers with network interface cards: two or more computers are needed to form a network along with network interface
cards inserted into an expansion slot on the motherboard
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 5 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
The network card can also exist in a separate box, which can serve a number of devices
Network operating system: the NOS manages the activity of the network – providing multi-user, multitasking capabilities
Other shared devices: printers, scanners, storage devices, and other devices can be added to the network and shared by all users
Bridges, routers and gateways: a LAN may stand alone, but it may also connect to other networks, either using similar or different
technologies
Network Topology
Networks can be laid out in different ways, the physical layout, or
shape of the network is called a topology
The basic topologies are: star, ring, bus, and hybrid
Star topology: is one in which all computers and other devices
are connected to a central hub, such as a file server or host
This connection is made through UTP (unshielded twisted pair) or
STP (shielded twisted pair)
Some intelligent hubs can provide switching, bridging and routing
capabilities
Electronic messages are sent through the central hub to their
destinations
The advantage of the star topology is that the hub prevents
collisions between messages
Also if a connection is broken between a device and the hub, the
rest of the network will continue to function
However, a hub failure is a catastrophe
Ring topology: is one in which all computers are connected in a
continuous loop
Messages are passed around the ring in one direction, with each
node serving as a repeater, until they reach the right destination
There is no central host computer or server (also known as a
token ring)
The advantage of the ring network is that messages flow in one
direction, thus no danger of collision
The disadvantage is that the failure of one node can disrupt the
entire network
Bus topology: this works like a bus system at rush hour, where
computers are connected to a common channel (this uses no
server)
Each communication device transmits messages to other devices,
if they collide, the device waits and transmits again
The advantage of bus topology is that it can be organized as a
client-server or peer-to-peer
The disadvantage is the extra circuitry and software needed to
avoid collisions, also if the buss itself is compromised, the entire
network collapses
Hybrid topology: is a combination of star, ring, and bus
topologies
For example, universities might use a bus to connect buildings,
and star and rings to connect with those buildings
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 6 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
The Impact of Networks
Sales of mainframe computer systems and midsize computers have fallen due to the rise in popularity of LANs
Companies have discovered that LANs can take their place at a considerably less expense
Still, a LAN requires a skilled support staff
Also, LANs lack the storage capacity and security of mainframes
Data Representation in Networks
In order for a computer network to function effectively, it has a
need for standard protocols within it’s network, as well as
between networks
Protocol basically means “rules” that hardware/software
agrees upon to move data around
When you send information out onto a network, your computers
network software controls how it goes out
This software breaks the information into packets
This is known as packet switching
The network’s protocols are used to package the requests
from the client computers, as well as send requests across the
network
The protocols handle the nitty-gritty details (addressing,
routing, ensuring delivery, ensuring accuracy, etc.)
Wireless Networks
The rise and popularity of
wireless networking has had a
major impact on modern
networking
Like wired networking, a
device must have the proper
circuitry (a card, or other
device) and NOS on the
device to communicate with
the network
As well, the network must have a wireless transmitter for these
devices to connect to using radio waves or infrared signals
through the air
The standard protocols used in wireless networking mostly use a
system called Wi-Fi
In order to improve performance, Wi-Fi started developing a faster
hardware/software version of Wi-Fi called 802.11n
From there, 802.15 was developed for personal networks and
Bluetooth technology
Then 802.16 or WiMAX (worldwide interoperability for microwave
access) was developed to combine the benefits of wireless and
broadband
As well, the 3G (which is short for third generation)
telecommunications network has evolved for even faster network
communication
Future developments are still unclear as to which standards will
prevail, but leading standards include WiGig (the Wireless Gigabit
Alliance) and WirelessHD (a silicon valley consortium of hardware
manufacturers)
In addition to the speed of transmission, security over wireless is also a major concern to maintain user privacy and security of data
Wireless networking makes use of usernames and passwords (userID) as well as Media Access Control (MAC) technology
MAC assigns a unique number to each IP network adapter called the MAC address a 48 bit sequence commonly written in 12
hexadecimal digits like: 48-3F-0A-91-00-BC
These are often called physical addresses, and are often tracked by the internet service providers (ISPs)
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE
NETWORKS PAGE 7 OF 7 MR. WACHS: I.B. COMPUTER SCIENCE
ASSIGNMENT:
For each of the sections of Networks, your assignment is to present me with a “solution” to the “problem” I pose, but this “solution”
can take several forms:
- A written response (either hand written, or typed up, pictures can be included, no formal structure needed)
- A presentation (e.g. PowerPoint – given to me, or just sent to me electronically)
- A blog post (from a blog you have created – see me if not sure how to do this, but I recommend WordPress.org)
- A class discussion (either in class/group setting, or to Mr. Wachs individually)
- A video log or audio “podcast” (filmed on smartphone, webcam, etc. and either shared with Mr. Wachs as a video file, or
uploaded to youtube and shared with Mr. Wachs)
- Any other creative way to deliver your “solution” (e.g. skit, game show, etc. – please check with Mr. Wachs first)
You should choose the method of delivering your solution that you feel is best for you
You may always work on any or all of these alone, or in groups (of 2, and up to the entire class per group)
You may also use a hybrid method, combining several of the above methods together
You can research these “solutions” and I would strongly suggest investigating the vocabulary list to give you a good grounding in the
“problem” – but research is not entirely necessary if you can “solve” each problem using your prior knowledge of computing either
gained in class, or from your own experiences
If you are really struggling with these “problems” then please come see Mr. Wachs for help including: discussions with him, books,
websites, video, etc. to help you formulate a “solution”
The length of your “solution” is not determined, but try to cover all the points outlined in the problem, as you could consider this
studying for the I.B. exam and making sure you cover the material
In other words, whatever you leave out, you are missing for yourself and could be “stumped” by a question that might touch on it
during the exam
Remember, these “problems” mimic the types of questions you can expect on the I.B. examination at the end of grade 12, so
completing the assignment is also preparation for the exam (never too early to start studying)
THE PROBLEM:
In the context of the Networking content, please complete a short definition for each of the terms in this vocabulary
list:
(1) LAN (9) OSI seven layer model
(2) VLAN ( 10 ) Data packet
(3) SAN ( 11 ) Compression of data
(4) WLAN ( 12 ) Packet switching
(5) VPN ( 13 ) Wi-Fi
(6) PAN ( 14 ) WiMAX
(7) P2P ( 15 ) 3G
(8) Protocols ( 16 ) MAC
NETWORKS TUESDAY, APRIL 11, 2017 MR. WACHS: I.B. COMPUTER SCIENCE