KEMBAR78
Notes 2.1 - Networks (Part 1) | PDF | Peer To Peer | Computer Network
0% found this document useful (0 votes)
45 views11 pages

Notes 2.1 - Networks (Part 1)

The document discusses computer networks and networking concepts. It covers local area networks (LANs) which connect devices within a single site using cables, and wide area networks (WANs) which connect devices over large distances using telecommunications links. Two common network models are described: client-server, where servers provide resources to clients; and peer-to-peer where nodes share resources directly with each other in a decentralized manner. BitTorrent is presented as an example of a popular peer-to-peer protocol used for file sharing across the internet. Thin and thick-client configurations are also defined in relation to client-server networks.

Uploaded by

dragongskdbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views11 pages

Notes 2.1 - Networks (Part 1)

The document discusses computer networks and networking concepts. It covers local area networks (LANs) which connect devices within a single site using cables, and wide area networks (WANs) which connect devices over large distances using telecommunications links. Two common network models are described: client-server, where servers provide resources to clients; and peer-to-peer where nodes share resources directly with each other in a decentralized manner. BitTorrent is presented as an example of a popular peer-to-peer protocol used for file sharing across the internet. Thin and thick-client configurations are also defined in relation to client-server networks.

Uploaded by

dragongskdbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M.

Muttur

NOTES: 2.1 - NETWORKS INCLUDING THE INTERNET – PART 1


LEARNING OBJECTIVES
Candidates should be able to:

(a) Show understanding of the purpose and benefits of networking devices


(b) Show understanding of the characteristics of a LAN (local area network) and a WAN (wide area network)
(c) Explain the client-server and peer-to-peer models of networked computers
 Roles of the different computers within the network and sub network models
 Benefits and drawbacks of each model
 Justify the use of a model for a given situation

(d) Show understanding of thin-client and thick-client and the differences between them
(e) Show understanding of the bus, star, mesh and hybrid topologies
 Understand how packets are transmitted between two hosts for a given topology
 Justify the use of a topology for a given situation

(f) Show understanding of cloud computing


 Including the use of public and private clouds.
 Benefits and drawbacks of cloud computing

(g) Show understanding of the differences between and implications of the use of wireless and wired
networks
 Describe the characteristics of copper cable, fibreoptic cable, radio waves (including WiFi),
microwaves, satellites

(h) Describe the hardware that is used to support a LAN


 Including switch, server, Network Interface Card (NIC), Wireless Network Interface Card (WNIC),
Wireless Access Points (WAP), cables, bridge, repeater

(i) Describe the role and function of a router in a network


(j) Show understanding of Ethernet and how collisions are detected and avoided
 Including Carrier Sense Multiple Access / Collision Detection (CSMA / CD)

(k) Show understanding of bit streaming


 Methods of bit streaming, i.e. real-time and on-demand
 Importance of bit rates / broadband speed on bit streaming

(l) Show understanding of the differences between the World Wide Web (WWW) and the internet
(m) Describe the hardware that is used to support the internet
 Including modems, PSTN (Public Switched Telephone Network), dedicated lines, cell phone
network
(n) Explain the use of IP addresses in the transmission of data over the internet
 format of an IP address including IPv4 and IPv6
 use of subnetting in a network
 how an IP address is associated with a device on a network
 difference between a public IP address and a private IP address and the implications for security
Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 1
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
 difference between a static IP address and a dynamic IP address

(o) Explain how a Uniform Resource Locator (URL) is used to locate a resource on the World Wide Web
(WWW) and the role of the Domain Name Service (DNS)

2.1(A) – NETWORKING DEVICES: PURPOSE AND BENEFITS

Standalone Computers
A standalone computer is a computer not connected to any network at all. Data on this type of computer is
safe from viruses and hackers. It cannot be accessed from remote locations. The user needs to be physically
present.

Networks
Networks was the obvious upgrade to standalone computers. There are two main types of networks: LAN and
WAN.

A network is computers and other electronic devices connected together. This allows users to be more
productive and allows company to cut-costs.

2.1(B) – LAN AND WAN

LAN (Local Area Network) connects computers and devices located in a single building or site. Cables are most
often used.

WAN (Wide Area Network) connects computers and devices spread over large distances (or even found in
different countries). Telecommunication links and satellites are used to connect the devices.

Benefits of WAN to users


 Run programs on remote computers (if software was correctly installed)
 Access data found on remote computers
 Exchange message with other users

Characteristics of WAN
 Can be used by an organisation having branches in several countries
 Uses Public Switched Telephone Network (PSTN)
 Not owned by the company

 Will mostly use fibre optic cables


 A switch will be used to connect the WAN to each site

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 2


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
 Not many devices are directly connected to the WAN

Benefits of LAN
 Sharing of hardware resources (e.g. an expensive printer)
 Sharing of software resources (e.g. an application program installed on a server)
 Sharing of data files among users (e.g. centrally stored on a server)
 Easy communication between users (e.g. own email or chat system)

Characteristics of LAN
 Used within a branch of an organisation
 Owned by the company
 There may be more than one LAN at one site
 Twisted Pair or WiFi is the preferred transmission medium
 The LAN will contain a device to allow it to connect to other devices

2.1 (C) – CLIENT/SERVER AND PEER-TO-PEER MODELS

Client/Server Network Model


 a network where each computer or process is either a client or a server
 one server can handle several clients (servers can even be networked together)
 clients: PCs on which users run applications (programs – network software)
 Clients rely on servers for resources such as files, devices or processing power
 The server is a powerful computer to which all other computers are connected
 Drawback: too many client requests can affect server performance negatively – even lead to shut down.
Technique used by hackers to affect services of a particular organization: Denial-of-service (DDoS)
attacks.

Thin Client
 The user chooses the application to run on the server
 The user sends data to the server when requested by the application.
 The user receives output from the application

Thick Client
 The user chooses an application provided by the server
 The user carries out some processing before running the application on the server and also after
receiving output from the server
 User can also download the application from the server and run the application itself

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 3


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Applications of Client/Server Model
 Server stores a database which is accessed from the client system
 Server stores a web application which allows the client system to find information
 The server stores a web application which allows the client system to carry out an e-commerce or
financial transaction

File Sharing
In a client/server architecture, files can be shared by uploading them to the server. The client systems can then
download the files needed.

Peer-to-Peer Networking

BitTorrent is a protocol for peer-to-peer (P2P) sharing that is used to distribute large amounts of data over the
Internet.

A user must have a BitTorrent client in order to send/receive large files. This client is actually a program that
implement the BitTorrent protocol.

BitTorrent tackers provide a list of files available for transfer. It is a central server that lists all computers that
have the required file or part of it for download. The tracker also stores data about the peers downloading the
uploading the file. The protocol was designed in 2001. BitTorrent is used by around 150 million active monthly
users.

The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather
than downloading a file from a single source server, the BitTorrent protocol allows users to join a group of hosts
to download and upload from each other simultaneously. This protocol is better than multiple mirror sources
techniques and works well over networks with lower bandwidth.

A basic home computer can be turned into a server.

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 4


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur

Peer-to-peer is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology.
All the computers connected over the P2P network and sharing a torrent make up the swarm.

P2P file sharing allows users to access media files such as books, music, movies and games using a P2P software
that searches for other connected computers on a P2P. The P2P software also locates the desired content.

The nodes (peers) of such networks are end-user computer systems connected via the Internet.

The computer sharing the complete file for download is a seeder. A leecher is someone who is downloading
the file but has yet to complete it.

If you are downloading a file and it has no seeders then there is a good chance you'll never be able to complete
the download.

Advantages of Peer-to-Peer over Client/Server Model


 Reduced congestion on the network (when many clients are simultaneously attempting to download
files)
 Parts of a file can be downloaded separately
 Parts of a file can be downloaded from more than one host

Advantages of Client/Server Model over Peer-to-Peer


 It allows an organisation to control the downloading and use of files
 The files can be better protected from malware attacks because the files are stored on server which can
be regularly scanned using appropriate anti-virus software

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 5


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur

2.1(E) – NETWORK TOPOLOGIES


There are five requirements for a data communications system: a sender, a receiver, a transmission medium, a
message and a protocol. Transmission medium can be air (e.g. for WiFi) or cables (e.g. Ehternet).

Modes of Data Transmission


If data is to be transmitted between devices, there are three different modes of transmission possible:
 simplex mode
 half-duplex mode
 duplex mode

Simplex Mode
 data can only travel in one direction
 there is no way to send data in the other direction
 e.g. television signals broadcast to TV sets, sensor to computer, computer to speaker

Transmitter Receiver

Half Duplex Mode


 data can pass in both directions, but in only one direction at a time
 e.g. walkie-talkie as only one person can send data at a time while must wait for its turn

Device 1 Device 2

Duplex Mode
 data can pass in both directions at the same time
 e.g. telephone conversation where both users can speak and be heard at the same time
 e.g. Voice over IP
 video conferencing
Device 1 Device 2

Ways of Sending a Message


 a broadcast which is a one-to-all communication (e.g. traditionally used to radio and television)
 a multicast which is from one source to many destinations
 a unicast which is a one-to-one communication

Network Topologies
A network topology is the configuration of a network that defines how the different devices on the network are
connected.

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 6


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Point-to-point network
A simple network link is used. A dedicated link is used. Transmission might be simplex or duplex. A message
can only be unicast.

Bus Topology
Every station receives all network traffic. Traffic from each station has equal priority. It is a multi-point
connection. There is no direct connection between any pair of terminals. A message must be broadcast even
though it might only be intended for one terminal.

All communications travel along a common connecting cable (bus). Information can be transmitted in any
direction between computers. Before transmitting, the computer checks that the main communicating cable is
not busy. If it is busy, it has to wait before transmission can begin. This type of network is used when a few
microcomputers are to be linked.

At each end of the bus, a ‘terminator’ is used. This is a piece of hardware which prevents signals bouncing back
and forth (echoes).

Bus network is the best choice for temporary networks and small networks.

A bus network may not work well if the nodes are located at scattered points that do not lie near a common
line.

Advantages
1. less expensive to install than star network (requires less cables)
2. easy to add new station without disrupting existing network (network is resilient)
3. easy to install

Disadvantages
1. network is down if main cable fails
2. extra hardware and software needed to avoid collisions between data and messages
3. If there are a lot of workstations on the network, data may travel slowly.
4. Difficult to identify problem if whole network shuts down
5. data collisions can happen as the network becomes busy
6. low security – every workstation can see all of the data in the network
7. limited cable length and a maximum number of workstations (300m without need for signal boosting)
8. terminators are required at both ends
9. Limitations of distance (300m) without need for signal boosting

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 7


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur

Local Local
File
Network Network
Server Disc
Station Station
Main communication cable Drive

Local
Print
Network
Local Server
Station
Network
Station

Printer

Star Topology
There is one central computer, a server (usually a mainframe), through which all other computers communicate.
Each workstation is connected by its own cable directly to the server. Star networks are usually the layout of
choice in schools and offices because they tend to be the most reliable of the topologies.

Transmission is duplex and messages from the central device might be unicast, multicast or broadcast. Star
topology is the usual way to configure a network

Local
Network
Station

Local Local
Network Network
Station Station

Local Local
Network Central Computer Network
Station (Host) Station

Local Printer
Network
Station

Advantages
1. Easy to add new stations to the network. (existing network will not be affected)
2. Network is not affected if a connection is broken. (rest of devices will continue to operate)
3. Very few data collisions as each workstations has its own cable to the server
4. Good security – no workstation can interact with another without going through the server first
5. Very high performing as no data collision can occur

Disadvantages
1. it is expensive to install (requires most cable)

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 8


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
2. if host computer fails, whole network goes down
3. usually experts are needed to set up the network
4. extra hardware such as hubs and switches may be needed

Mesh Topology
Local
Network
Station

Local Local
Network Network
Station Station

Local Local
Network Network
Station Station

Each end-system has a point-to-point connection to each of the other end-systems. Transmission is duplex.
Messages might be unicast, multicast or broadcast.

Advantages of Mesh topology


 Manages high amounts of traffic, because multiple devices can transmit data simultaneously.
 A failure of one device does not cause a break in the network or transmission of data.
 Adding additional devices does not disrupt data transmission between other devices.
 A fault is easily diagnosed.

Disadvantages of Mesh topology


 The cost to implement is higher than other network topologies, making it a less desirable option.
 Building and maintaining the network is difficult and time consuming.
 The chance of redundant connections is high, which adds to the high costs and potential for reduced
efficiency.

Hybrid Topology
Several LANs are connected and they can have different topologies or technologies. The collection of LANs then
become a hybrid network. A special connecting device is needed to ensure the hybrid network is fully
functional.

It is an advantage to be able to connect a new topology LAN to existing LANs. For e.g. a wired LAN is already
installed but a new wireless LAN is to be connected to it.
Advantages of Hybrid topology

 Hybrid network combines the benefits of different types of topologies

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 9


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
 Can be modified as per requirement
 It is extremely flexible.
 It is very reliable.
 It is easily scalable

Disadvantage of Hybrid topology


 It is expensive
 The design of a hybrid network is complex.
 Hardware changes are required in order to connect topology to another topology.

2.1 (F) – CLOUD COMPUTING


Cloud computing is providing computing services via the Internet.

Private Cloud
An organisation may choose to setup its own private cloud. A private cloud is a cloud service that is not
shared with any other organisation.

There are three possible approaches:

 The organisation takes full responsibility for creating and managing the cloud installed on-site and
connected to a private network
 The organisation outsources to a third-party the creation and management of an on-site installation
connected to a private network
 The organisation outsources the creation and management of an Internet accessible system by a third
party.

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 10


Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur

Public Cloud
This is an alternative to a private cloud. A public cloud is created, managed and owned by a third-party cloud
service provider.

Public cloud is accessed using a web browser and can therefore be accessed from any device in any location. A
public cloud can be accessed by an individual user or an organisation.

The services can be classified as being one of:


 Infrastructure provision
o Advantage of better performance when running software and increased storage capacity

 Platform provision
o Cloud can offer facilities for software development and testing

 Software provision
o Cloud can run application that require high performance systems

User no longer needs technical expertise. But cloud user is not sure that personal data is not being shared

Muzzammil Muttur |  5 493 1972 | learnatedutech@gmail.com | @mmuttur 11

You might also like