Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M.
Muttur
NOTES: 2.1 - NETWORKS INCLUDING THE INTERNET – PART 1
LEARNING OBJECTIVES
Candidates should be able to:
(a) Show understanding of the purpose and benefits of networking devices
(b) Show understanding of the characteristics of a LAN (local area network) and a WAN (wide area network)
(c) Explain the client-server and peer-to-peer models of networked computers
Roles of the different computers within the network and sub network models
Benefits and drawbacks of each model
Justify the use of a model for a given situation
(d) Show understanding of thin-client and thick-client and the differences between them
(e) Show understanding of the bus, star, mesh and hybrid topologies
Understand how packets are transmitted between two hosts for a given topology
Justify the use of a topology for a given situation
(f) Show understanding of cloud computing
Including the use of public and private clouds.
Benefits and drawbacks of cloud computing
(g) Show understanding of the differences between and implications of the use of wireless and wired
networks
Describe the characteristics of copper cable, fibreoptic cable, radio waves (including WiFi),
microwaves, satellites
(h) Describe the hardware that is used to support a LAN
Including switch, server, Network Interface Card (NIC), Wireless Network Interface Card (WNIC),
Wireless Access Points (WAP), cables, bridge, repeater
(i) Describe the role and function of a router in a network
(j) Show understanding of Ethernet and how collisions are detected and avoided
Including Carrier Sense Multiple Access / Collision Detection (CSMA / CD)
(k) Show understanding of bit streaming
Methods of bit streaming, i.e. real-time and on-demand
Importance of bit rates / broadband speed on bit streaming
(l) Show understanding of the differences between the World Wide Web (WWW) and the internet
(m) Describe the hardware that is used to support the internet
Including modems, PSTN (Public Switched Telephone Network), dedicated lines, cell phone
network
(n) Explain the use of IP addresses in the transmission of data over the internet
format of an IP address including IPv4 and IPv6
use of subnetting in a network
how an IP address is associated with a device on a network
difference between a public IP address and a private IP address and the implications for security
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 1
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
difference between a static IP address and a dynamic IP address
(o) Explain how a Uniform Resource Locator (URL) is used to locate a resource on the World Wide Web
(WWW) and the role of the Domain Name Service (DNS)
2.1(A) – NETWORKING DEVICES: PURPOSE AND BENEFITS
Standalone Computers
A standalone computer is a computer not connected to any network at all. Data on this type of computer is
safe from viruses and hackers. It cannot be accessed from remote locations. The user needs to be physically
present.
Networks
Networks was the obvious upgrade to standalone computers. There are two main types of networks: LAN and
WAN.
A network is computers and other electronic devices connected together. This allows users to be more
productive and allows company to cut-costs.
2.1(B) – LAN AND WAN
LAN (Local Area Network) connects computers and devices located in a single building or site. Cables are most
often used.
WAN (Wide Area Network) connects computers and devices spread over large distances (or even found in
different countries). Telecommunication links and satellites are used to connect the devices.
Benefits of WAN to users
Run programs on remote computers (if software was correctly installed)
Access data found on remote computers
Exchange message with other users
Characteristics of WAN
Can be used by an organisation having branches in several countries
Uses Public Switched Telephone Network (PSTN)
Not owned by the company
Will mostly use fibre optic cables
A switch will be used to connect the WAN to each site
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 2
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Not many devices are directly connected to the WAN
Benefits of LAN
Sharing of hardware resources (e.g. an expensive printer)
Sharing of software resources (e.g. an application program installed on a server)
Sharing of data files among users (e.g. centrally stored on a server)
Easy communication between users (e.g. own email or chat system)
Characteristics of LAN
Used within a branch of an organisation
Owned by the company
There may be more than one LAN at one site
Twisted Pair or WiFi is the preferred transmission medium
The LAN will contain a device to allow it to connect to other devices
2.1 (C) – CLIENT/SERVER AND PEER-TO-PEER MODELS
Client/Server Network Model
a network where each computer or process is either a client or a server
one server can handle several clients (servers can even be networked together)
clients: PCs on which users run applications (programs – network software)
Clients rely on servers for resources such as files, devices or processing power
The server is a powerful computer to which all other computers are connected
Drawback: too many client requests can affect server performance negatively – even lead to shut down.
Technique used by hackers to affect services of a particular organization: Denial-of-service (DDoS)
attacks.
Thin Client
The user chooses the application to run on the server
The user sends data to the server when requested by the application.
The user receives output from the application
Thick Client
The user chooses an application provided by the server
The user carries out some processing before running the application on the server and also after
receiving output from the server
User can also download the application from the server and run the application itself
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 3
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Applications of Client/Server Model
Server stores a database which is accessed from the client system
Server stores a web application which allows the client system to find information
The server stores a web application which allows the client system to carry out an e-commerce or
financial transaction
File Sharing
In a client/server architecture, files can be shared by uploading them to the server. The client systems can then
download the files needed.
Peer-to-Peer Networking
BitTorrent is a protocol for peer-to-peer (P2P) sharing that is used to distribute large amounts of data over the
Internet.
A user must have a BitTorrent client in order to send/receive large files. This client is actually a program that
implement the BitTorrent protocol.
BitTorrent tackers provide a list of files available for transfer. It is a central server that lists all computers that
have the required file or part of it for download. The tracker also stores data about the peers downloading the
uploading the file. The protocol was designed in 2001. BitTorrent is used by around 150 million active monthly
users.
The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather
than downloading a file from a single source server, the BitTorrent protocol allows users to join a group of hosts
to download and upload from each other simultaneously. This protocol is better than multiple mirror sources
techniques and works well over networks with lower bandwidth.
A basic home computer can be turned into a server.
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 4
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Peer-to-peer is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology.
All the computers connected over the P2P network and sharing a torrent make up the swarm.
P2P file sharing allows users to access media files such as books, music, movies and games using a P2P software
that searches for other connected computers on a P2P. The P2P software also locates the desired content.
The nodes (peers) of such networks are end-user computer systems connected via the Internet.
The computer sharing the complete file for download is a seeder. A leecher is someone who is downloading
the file but has yet to complete it.
If you are downloading a file and it has no seeders then there is a good chance you'll never be able to complete
the download.
Advantages of Peer-to-Peer over Client/Server Model
Reduced congestion on the network (when many clients are simultaneously attempting to download
files)
Parts of a file can be downloaded separately
Parts of a file can be downloaded from more than one host
Advantages of Client/Server Model over Peer-to-Peer
It allows an organisation to control the downloading and use of files
The files can be better protected from malware attacks because the files are stored on server which can
be regularly scanned using appropriate anti-virus software
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 5
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
2.1(E) – NETWORK TOPOLOGIES
There are five requirements for a data communications system: a sender, a receiver, a transmission medium, a
message and a protocol. Transmission medium can be air (e.g. for WiFi) or cables (e.g. Ehternet).
Modes of Data Transmission
If data is to be transmitted between devices, there are three different modes of transmission possible:
simplex mode
half-duplex mode
duplex mode
Simplex Mode
data can only travel in one direction
there is no way to send data in the other direction
e.g. television signals broadcast to TV sets, sensor to computer, computer to speaker
Transmitter Receiver
Half Duplex Mode
data can pass in both directions, but in only one direction at a time
e.g. walkie-talkie as only one person can send data at a time while must wait for its turn
Device 1 Device 2
Duplex Mode
data can pass in both directions at the same time
e.g. telephone conversation where both users can speak and be heard at the same time
e.g. Voice over IP
video conferencing
Device 1 Device 2
Ways of Sending a Message
a broadcast which is a one-to-all communication (e.g. traditionally used to radio and television)
a multicast which is from one source to many destinations
a unicast which is a one-to-one communication
Network Topologies
A network topology is the configuration of a network that defines how the different devices on the network are
connected.
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 6
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Point-to-point network
A simple network link is used. A dedicated link is used. Transmission might be simplex or duplex. A message
can only be unicast.
Bus Topology
Every station receives all network traffic. Traffic from each station has equal priority. It is a multi-point
connection. There is no direct connection between any pair of terminals. A message must be broadcast even
though it might only be intended for one terminal.
All communications travel along a common connecting cable (bus). Information can be transmitted in any
direction between computers. Before transmitting, the computer checks that the main communicating cable is
not busy. If it is busy, it has to wait before transmission can begin. This type of network is used when a few
microcomputers are to be linked.
At each end of the bus, a ‘terminator’ is used. This is a piece of hardware which prevents signals bouncing back
and forth (echoes).
Bus network is the best choice for temporary networks and small networks.
A bus network may not work well if the nodes are located at scattered points that do not lie near a common
line.
Advantages
1. less expensive to install than star network (requires less cables)
2. easy to add new station without disrupting existing network (network is resilient)
3. easy to install
Disadvantages
1. network is down if main cable fails
2. extra hardware and software needed to avoid collisions between data and messages
3. If there are a lot of workstations on the network, data may travel slowly.
4. Difficult to identify problem if whole network shuts down
5. data collisions can happen as the network becomes busy
6. low security – every workstation can see all of the data in the network
7. limited cable length and a maximum number of workstations (300m without need for signal boosting)
8. terminators are required at both ends
9. Limitations of distance (300m) without need for signal boosting
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 7
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Local Local
File
Network Network
Server Disc
Station Station
Main communication cable Drive
Local
Print
Network
Local Server
Station
Network
Station
Printer
Star Topology
There is one central computer, a server (usually a mainframe), through which all other computers communicate.
Each workstation is connected by its own cable directly to the server. Star networks are usually the layout of
choice in schools and offices because they tend to be the most reliable of the topologies.
Transmission is duplex and messages from the central device might be unicast, multicast or broadcast. Star
topology is the usual way to configure a network
Local
Network
Station
Local Local
Network Network
Station Station
Local Local
Network Central Computer Network
Station (Host) Station
Local Printer
Network
Station
Advantages
1. Easy to add new stations to the network. (existing network will not be affected)
2. Network is not affected if a connection is broken. (rest of devices will continue to operate)
3. Very few data collisions as each workstations has its own cable to the server
4. Good security – no workstation can interact with another without going through the server first
5. Very high performing as no data collision can occur
Disadvantages
1. it is expensive to install (requires most cable)
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 8
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
2. if host computer fails, whole network goes down
3. usually experts are needed to set up the network
4. extra hardware such as hubs and switches may be needed
Mesh Topology
Local
Network
Station
Local Local
Network Network
Station Station
Local Local
Network Network
Station Station
Each end-system has a point-to-point connection to each of the other end-systems. Transmission is duplex.
Messages might be unicast, multicast or broadcast.
Advantages of Mesh topology
Manages high amounts of traffic, because multiple devices can transmit data simultaneously.
A failure of one device does not cause a break in the network or transmission of data.
Adding additional devices does not disrupt data transmission between other devices.
A fault is easily diagnosed.
Disadvantages of Mesh topology
The cost to implement is higher than other network topologies, making it a less desirable option.
Building and maintaining the network is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costs and potential for reduced
efficiency.
Hybrid Topology
Several LANs are connected and they can have different topologies or technologies. The collection of LANs then
become a hybrid network. A special connecting device is needed to ensure the hybrid network is fully
functional.
It is an advantage to be able to connect a new topology LAN to existing LANs. For e.g. a wired LAN is already
installed but a new wireless LAN is to be connected to it.
Advantages of Hybrid topology
Hybrid network combines the benefits of different types of topologies
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 9
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Can be modified as per requirement
It is extremely flexible.
It is very reliable.
It is easily scalable
Disadvantage of Hybrid topology
It is expensive
The design of a hybrid network is complex.
Hardware changes are required in order to connect topology to another topology.
2.1 (F) – CLOUD COMPUTING
Cloud computing is providing computing services via the Internet.
Private Cloud
An organisation may choose to setup its own private cloud. A private cloud is a cloud service that is not
shared with any other organisation.
There are three possible approaches:
The organisation takes full responsibility for creating and managing the cloud installed on-site and
connected to a private network
The organisation outsources to a third-party the creation and management of an on-site installation
connected to a private network
The organisation outsources the creation and management of an Internet accessible system by a third
party.
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 10
Computer Science Compiled – Workbook 2023 – Part 1 | A Level 9618 (Lower Six) | © M. Muttur
Public Cloud
This is an alternative to a private cloud. A public cloud is created, managed and owned by a third-party cloud
service provider.
Public cloud is accessed using a web browser and can therefore be accessed from any device in any location. A
public cloud can be accessed by an individual user or an organisation.
The services can be classified as being one of:
Infrastructure provision
o Advantage of better performance when running software and increased storage capacity
Platform provision
o Cloud can offer facilities for software development and testing
Software provision
o Cloud can run application that require high performance systems
User no longer needs technical expertise. But cloud user is not sure that personal data is not being shared
Muzzammil Muttur | 5 493 1972 | learnatedutech@gmail.com | @mmuttur 11