Session 6: Networking Teaching Computing to GCSE Level with Python.
-
Upload
anna-greer -
Category
Documents
-
view
229 -
download
2
Transcript of Session 6: Networking Teaching Computing to GCSE Level with Python.
Specification LinksOCR
(a) explain the advantages of networking stand-alone computers into a local area network
(b) describe the hardware needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points
(c) explain the different roles of computers in a client-server and a peer-to-peer network
(d) describe, using diagrams or otherwise, the ring, bus and star network topologies
(e) describe the differences between a local area network and a wide area network such as the Internet
(f) explain the terms IP addressing, MAC addressing, packet and protocols
(g) explain the need for security measures in networks, such as user access levels, suitable passwords and encryption techniques
(h) describe and justify network policies such as acceptable use, disaster recovery, failover, back up, archiving.
AQAa) understand what a computer
network is b) be able to discuss the advantages
and disadvantages of using a computer network
c) be able to describe and explain the bus, ring and star networking topologies
d) be able to discuss the advantages and disadvantages of each of these topologies
e) understand the client-server model f) be able to explain, in simple terms,
the handshake process used in most modern networking protocols
g) be able to explain how coding for a client-server model is different from
coding for a stand-alone application
Networked ComputersComputers and peripherals connected together
May be in one building or site (LAN)
Or across large geographical area (WAN)
LAN
A LAN is a Local Area Network.
It is a connected set of computers and other devices.
Each device is called a node.
A LAN is installed on one site.• It does not cover a wide geographical area.• All the infrastructure is owned by the
organisation or individual who owns the LAN.
Stand-alone ComputersNeed own software installed
Backups - own responsibility
Need printer
No access to centralised resources
Advantages of NetworksShare resources
Share information
Centralised access to data
Mail/messaging systems
Access to own files from anywhere on network
Disadvantages of NetworksUsers’ dependence on network
Busy network ---> delays
Needs to be well-designed for optimum performance
Threat of viruses/hacking
Wide Area NetworkSpread over large geographical area
May be public or private
Communication may be by: telephone network satellite link dedicated cables microwave
Network topologies: BusAll workstations are connected by a single
cable (a bus)
Max length of cable 500m
Only suitable for LANs (Ethernet)
One PC used as a file server/print server
Advantages of BusCheaper to install than ring
Requires least amount of cable
Easy to install and extend
Failure of one workstation does not affect network
Disadvantages of BusNetwork performance degrades under heavy
load
Dependent on reliable main cable
Cable failure difficult to isolate
Network topologies: StarSuitable for LAN or WAN
If one link or node (other than the central one) fails, the rest of the network can still function
All data passes through the central node, so if it fails the whole network “goes down”
Formerly commonly used formulti-user systems(terminals plus “mainframe”)
Network topologies: StarSuitable for central computer (hub) and dumb terminals
Very popular for WAN where organisation relies on central computer for bulk of processing tasks, limiting the nodes to their local processing needs and the validation of data, prior to
transmission to central computer
Advantages of Star If one node or cable faulty the network can still function
Centralised control of message switching allows high degree of security control
Methods of data transmission and speeds used can vary from one spoke to anothere.g. public phone line or leased line
No problems with collisions of data
Disadvantages of StarNeeds a lot of cable (costly)
Dependent on central node functioning
Control of communication requires expensive technology at the hub
Network topologies: RingNo central server
Not suitable for a WAN
None of the nodes have overall control
Messages flow in one direction only
Advantages of RingNo dependence on central computer
High transmission rates are possible
More predictable than bus
Transmission of messages relatively simple
Disadvantages of RingDifficult to extend as new cable must preserve
the ring topology
If one node breaks down, transmission between the other nodes is disrupted
Bus NetworkThe type of network topology in which all of the nodes of the network are connected by a backbone which has two endpoints. All data that is transmitted between nodes in the network is transmitted via the backbone.
Star NetworkThe type of network topology in which each of the nodes of the network is connected to a central node. All data that is transmitted between nodes in the network is transmitted to the central node, which is usually a switch or a hub that then retransmits the data to some or all of the other nodes in the network.
AQA Computing A Level © Nelson Thornes 2008
Network Topologies
Star Network with switch
File server
Printer
Switch
Client Workstation
Data Packet
LAN hardware NIC – network interface card
Each node needs a NIC to connect to the LAN. Produces the electrical signals that carry data.
Hub A device that connects nodes together. Makes them act as a single segment. Not smart – all data packets are transmitted. Cheap devices – USB hubs useful in home
computer installations.
OCR Computing for GCSE © Hodder Education 2011
LAN hardware• Wireless access point
Wireless technology has many advantages over wired networks.
• No building work needed
• Quick to add new workstations
• Flexible deployment of nodes
• Visitors can access network / internet
• But there are drawbacks Slower performance Security issues
Peer-to-peer networksAll computers have the same status.
May be very slow because of• data collisions• shared processor power
Only suitable for small low traffic networks.
Client–server networksOne or more computer is
designated as a server.• A high specification machine.• It offers services to client machines,
such as centrally held software, data, file storage and peripheral access.
• Servers control network traffic.• Log usage of resources.• Provide security.• Clients have to log in – this identifies
users and assigns rights.• Big networks may have hundreds of
servers.
OCR Computing for GCSE © Hodder Education 2011
Protocols Protocols are the rules for
communication between devices.
Standard protocols encourage network development.
Network protocols are constructed in layers.
This allows independent development of small parts of a protocol.
Internet Protocol is a group of protocols that underlies the internet.
TCP/IP now the most important set of protocols.
Includes many special protocols.OCR Computing for GCSE © Hodder Education
2011
Protocol Meaning Application
DNS Domain Name System
Translates domain names such as ocr.org.uk into IP addresses.
TLS/SSL Transport Layer Security / Secure Sockets Layer
Cryptographic protocols designed for secure communications.
FTP File Transfer Protocol
For copying files from one host to another.
Gopher An early means of searching for files on the Internet.
HTTP Hypertext Transfer Protocol
For distributing hypermedia files – essentially web pages.
IMAP Internet Message Access Protocol
One method for accessing emails.
POP3 Post Office Protocol (version 3)
Another method for accessing emails, used by most webmail services.
Telnet Allows bidirectional text communications on a network.
IP Addresses Every Web site has a ‘Home page’ with a unique address
known as its IP address 4 numbers, each in range 0 to 255, separated by full-
stops. e.g. 177.234.243.186
IP addresses are difficult to remember, so can use Domain Name instead
Domain name system maps the domain names onto the IP addresses
Ethernet AddressingEach Ethernet card that is manufactured is
assigned a unique Ethernet hardware address.
Ethernet header contains two addresses:- 48-bit source address that uniquely
identifies the source of the frame- 48-bit destination address that uniquely
identifies the destination of the frame
The Ethernet address enables the frames to be routed between two computers that are in communication. The frame just looks for a matching hardware address in each network card it encounters over the Ethernet cable.
IP addresses are different from Ethernet addresses. They may be moved from computer to computer.
Sending a file over a networkUser sends file using FTP
File is passed to another layer of software – the TCP/IP protocol stack
(A protocol stack has multiple layers)
TCP/IP software breaks file up into packets
What is a packet? “A packet is a discrete collection of information
that includes user data plus protocol information, such as destination and source addresses, and controls for error detection/correction, sequencing, flow control etc.”
Packet Switching
Messages are broken down into smaller blocks (packets)
Packets routed individually through the network
Packets from a particular message may travel along different routes through network
At the receiver, packets are reassembled to construct complete message.
Datagram Packet Switching Network
E D C B A
E
D
C
B
A
E C B E D C B A
Original message
Re-assembled message
Packet switch node
EDCBA
EDCBA
Message packets
Network
E
C A D
A
D
1
2
3
4
5
6
2
Computer X
Computer Y
Client/Server Model of the InternetA server provides a service requested by a
client
A client that requests and uses services provided by a server
In the client-server model of the internet the client and server are software processes that fulfil these roles
HTTP is a client/server protocol
ProtocolsA protocol is a set of rules that is used to ensure successful communication between different computers
FTPFile Transfer Protocol
An application-layer protocol
Enables on one computer to be copied to another computer
Uses port 20 for data and port 21 for commands
A port is an address for a software process
HTTPHypertext Transfer Protocol
An application-layer protocol
Used to enable web pages to be viewed
A client machine sends a request message to the server and the server responds with a message, usually in the form of a web page.
Uses port 80 and 8080
SMTPSimple Mail Transfer Protocol
Application layer protocol
Used by email clients to send email.
Recipients of the message are specified and the message text is transferred to a mail server listening on port 25
HTTPSHyperText Transfer Protocol over Secure
Sockets layer
Application-layer web protocol
Encrypts and decrypts user web page requests
Uses port 443
Security
Transmitted data is vulnerable.
Users on a network do not need to see all the data.
Access levels• Users granted privileges.• Associated with login names.
Passwords• Must be changed regularly.• Passwords should be strong.
Encryption• Especially important on wireless networks.• WEP or WPA should be used.
OCR Computing for GCSE © Hodder Education 2011
Policies
Network owners should have policies to protect their assets.
Users have responsibilities.
Acceptable use policies are common.
Policy ensures that users understand what is expected of them.
Sanctions used if users misuse resources.
OCR Computing for GCSE © Hodder Education 2011
Disasters
Disasters do happen.
Need to plan for worst case scenario.
Example strategies:• mirrors of systems • use of disk protection technology such as RAID • surge protectors — to minimise the effect of power surges on delicate
electronic equipment• uninterruptible power supply (UPS) • back-up generator in case of a power failure• fire preventions — alarms, fire extinguishers • anti-virus software and other security measures• failover systems
OCR Computing for GCSE © Hodder Education 2011