Session 6 Slideshow

Download Report

Transcript Session 6 Slideshow

Session 6: Networking
Teaching Computing to GCSE Level with Python
Topics today
 Networking
 Topologies
 The Internet & Packet switching
 IP addresses
 Protocols
Specification Links
OCR
(a) explain the advantages of networking standalone computers into a local area network
(b) describe the hardware needed to connect
stand-alone computers into a local area network,
including hub/switches, wireless access points
(c) explain the different roles of computers in a
client-server and a peer-to-peer network
(d) describe, using diagrams or otherwise, the ring,
bus and star network topologies
(e) describe the differences between a local area
network and a wide area network such as the
Internet
(f) explain the terms IP addressing, MAC
addressing, packet and protocols
(g) explain the need for security measures in
networks, such as user access levels, suitable
passwords and encryption techniques
(h) describe and justify network policies such as
acceptable use, disaster recovery, failover, back
up, archiving.
AQA
a) understand what a computer network
is
b) be able to discuss the advantages
and disadvantages of using a
computer network
c) be able to describe and explain the
bus, ring and star networking
topologies
d) be able to discuss the advantages
and disadvantages of each of these
topologies
e) understand the client-server model
f) be able to explain, in simple terms, the
handshake process used in most
modern networking protocols
g) be able to explain how coding for a
client-server model is different from
coding for a stand-alone application
Networked Computers
 Computers and peripherals connected together
 May be in one building or site (LAN)
 Or across large geographical area (WAN)
LAN
 A LAN is a Local Area Network.
 It is a connected set of computers and other
devices.
 Each device is called a node.
 A LAN is installed on one site.
•
•
It does not cover a wide geographical area.
All the infrastructure is owned by the
organisation or individual who owns the LAN.
Stand-alone Computers
 Need own software installed
 Backups - own responsibility
 Need printer
 No access to centralised resources
Advantages of Networks
 Share resources
 Share information
 Centralised access to data
 Mail/messaging systems
 Access to own files from anywhere on network
Disadvantages of Networks
 Users’ dependence on network
 Busy network ---> delays
 Needs to be well-designed for optimum
performance
 Threat of viruses/hacking
Wide Area Network
 Spread over large geographical area
 May be public or private
 Communication may be by:
 telephone network
 satellite link
 dedicated cables
 microwave
Network Topologies
 Bus
 Star
 Ring
Network topologies: Bus
Bus Network Topology
One common or “omnibus” cable connects all nodes
Network topologies: Bus
 All workstations are connected by a single cable
(a bus)
 Max length of cable 500m
 Only suitable for LANs (Ethernet)
 One PC used as a file server/print server
Advantages of Bus
 Cheaper to install than ring
 Requires least amount of cable
 Easy to install and extend
 Failure of one workstation does not affect
network
Disadvantages of Bus
 Network performance degrades under heavy
load
 Dependent on reliable main cable
 Cable failure difficult to isolate
Network topologies: Star
 Suitable for LAN or WAN
 If one link or node (other than the central one) fails, the rest of the
network can still function
 All data passes through the central node, so if it fails the whole
network “goes down”
 Formerly commonly used for
multi-user systems
(terminals plus “mainframe”)
Network topologies: Star
 Suitable for central computer (hub) and dumb terminals
 Very popular for WAN where organisation relies on central
computer for bulk of processing tasks, limiting the nodes to their
local processing needs and the validation of data, prior to
transmission to central computer
Advantages of Star
 If one node or cable faulty the network can still function
 Centralised control of message switching allows high degree of
security control
 Methods of data transmission and speeds used can vary from one
spoke to another
e.g. public phone line or leased line
 No problems with collisions of data
Disadvantages of Star
 Needs a lot of cable (costly)
 Dependent on central node functioning
 Control of communication requires expensive
technology at the hub
Network topologies: Ring
Ring Network Topology
Each node connected to two neighbouring nodes
Network topologies: Ring
 No central server
 Not suitable for a WAN
 None of the nodes have overall control
 Messages flow in one direction only
Advantages of Ring
 No dependence on central computer
 High transmission rates are possible
 More predictable than bus
 Transmission of messages relatively simple
Disadvantages of Ring
 Difficult to extend as new cable must preserve
the ring topology
 If one node breaks down, transmission between
the other nodes is disrupted
Bus Network
The type of network topology in which all of the
nodes of the network are connected by a
backbone which has two endpoints. All data that
is transmitted between nodes in the network is
transmitted via the backbone.
Star Network
The type of network topology in which each of the
nodes of the network is connected to a central
node. All data that is transmitted between nodes in
the network is transmitted to the central node,
which is usually a switch or a hub that then
retransmits the data to some or all of the other
nodes in the network.
 Network Topologies
Star Network with hub
Client
Workstati
on
Printer
Data
Packet
Hub
File
server
 Network Topologies
 Star Network with switch
Client
Workstati
on
Printer
Data
Packet
Switch
File
server
AQA Computing A Level © Nelson Thornes 2008
LAN hardware
 NIC – network interface card


Each node needs a NIC to connect to the LAN.
Produces the electrical signals that carry data.
 Hub




A device that connects nodes together.
Makes them act as a single segment.
Not smart – all data packets are transmitted.
Cheap devices – USB hubs useful in home
computer installations.
OCR Computing for GCSE
2011
© Hodder Education
LAN hardware
• Wireless access point

Wireless technology has many
advantages over wired
networks.
•
No building work
needed
•
Quick to add new
workstations
•
Flexible deployment of
nodes
•
Visitors can access
network / internet
•
But there are drawbacks
 Slower performance
 Security issues
Peer-to-peer networks
All computers have the same status.
May be very slow because of
•
•
data collisions
shared processor power
Only suitable for small low traffic
networks.
Client–server networks
 One or more computer is
designated as a server.
•
•
•
•
•
•
•
A high specification machine.
It offers services to client machines,
such as centrally held software, data,
file storage and peripheral access.
Servers control network traffic.
Log usage of resources.
Provide security.
Clients have to log in – this identifies
users and assigns rights.
Big networks may have hundreds of
servers.
OCR Computing for GCSE
2011
© Hodder Education
Protocols
Protocol
Meaning
Application
 Protocols are the rules for
communication between devices.
DNS
Domain Name
System
Translates domain names
such as ocr.org.uk into IP
addresses.
 Standard protocols encourage
network development.
TLS/SSL
Transport Layer
Security / Secure
Sockets Layer
Cryptographic protocols
designed for secure
communications.
FTP
File Transfer
Protocol
For copying files from one
host to another.
 Network protocols are constructed
in layers.
Gopher
 This allows independent
development of small parts of a
protocol.
 Internet Protocol is a group of
protocols that underlies the
internet.
An early means of
searching for files on the
Internet.
HTTP
Hypertext
Transfer
Protocol
For distributing
hypermedia files –
essentially web pages.
IMAP
Internet
Message Access
Protocol
One method for
accessing emails.
POP3
Post Office
Protocol (version
3)
Another method for
accessing emails, used
by most webmail
services.
 TCP/IP now the most important set
of protocols.
Telnet
 Includes many special protocols.
OCR Computing for GCSE
2011
Allows bidirectional text
communications on a
network.
© Hodder Education
IP Addresses
 Every Web site has a ‘Home page’ with a unique address
known as its IP address
 4 numbers, each in range 0 to 255, separated by full-stops.
e.g. 177.234.243.186
 IP addresses are difficult to remember, so can use Domain
Name instead
 Domain name system maps the domain names onto the IP
addresses
Ethernet Addressing
 Each Ethernet card that is manufactured is assigned a
unique Ethernet hardware address.
 Ethernet header contains two addresses:
- 48-bit source address that uniquely identifies the
source of the frame
- 48-bit destination address that uniquely
identifies the destination of the frame
 The Ethernet address enables the frames to be routed
between two computers that are in communication.
The frame just looks for a matching hardware address
in each network card it encounters over the Ethernet
cable.
 IP addresses are different from Ethernet addresses.
They may be moved from computer to computer.
Sending a file over a
network
 User sends file using FTP
 File is passed to another layer of software – the
TCP/IP protocol stack
(A protocol stack has multiple layers)
 TCP/IP software breaks file up into packets
What is a packet?
 “A packet is a discrete collection of information
that includes user data plus protocol information,
such as destination and source addresses, and
controls for error detection/correction,
sequencing, flow control etc.”
Packet Switching
 Messages are broken down into smaller blocks
(packets)
 Packets routed individually through the network
 Packets from a particular message may travel
along different routes through network
 At the receiver, packets are reassembled to
construct complete message.
Datagram Packet Switching
Network
Original message
Network
EDCBA
Message packets
D C
E D C B A
A
1
D
A
3
5
C
Computer X
E
D
B
Computer Y
A
E
2
Packet switch node
2
E
4
C
B
E D C B A
6
EDCBA
Re-assembled message
Packet switching demo
 Packet switching demo here
Client/Server Model of the
Internet
 A server provides a service requested by a client
 A client that requests and uses services provided
by a server
 In the client-server model of the internet the
client and server are software processes that fulfil
these roles
 HTTP is a client/server protocol
Protocols
A protocol is a set of rules that is used to ensure
successful communication between different
computers
FTP
 File Transfer Protocol
 An application-layer protocol
 Enables on one computer to be copied to
another computer
 Uses port 20 for data and port 21 for commands
 A port is an address for a software process
HTTP
 Hypertext Transfer Protocol
 An application-layer protocol
 Used to enable web pages to be viewed
 A client machine sends a request message to the
server and the server responds with a message,
usually in the form of a web page.
 Uses port 80 and 8080
POP3
 Post Office protocol 3
 Application layer protocol
 Used to retrieve stored mail
 Uses port 110
SMTP
 Simple Mail Transfer Protocol
 Application layer protocol
 Used by email clients to send email.
 Recipients of the message are specified and the
message text is transferred to a mail server
listening on port 25
HTTPS
 HyperText Transfer Protocol over Secure Sockets
layer
 Application-layer web protocol
 Encrypts and decrypts user web page requests
 Uses port 443
Security
 Transmitted data is vulnerable.
 Users on a network do not need to see all the data.
 Access levels
•
Users granted privileges.
•
Associated with login names.
 Passwords
•
Must be changed regularly.
•
Passwords should be strong.
 Encryption
•
Especially important on wireless networks.
•
WEP or WPA should be used.
OCR Computing for GCSE
2011
© Hodder Education
Policies
 Network owners should have policies to protect their
assets.
 Users have responsibilities.
 Acceptable use policies are common.
 Policy ensures that users understand what is expected of
them.
 Sanctions used if users misuse resources.
OCR Computing for GCSE
2011
© Hodder Education
Disasters
 Disasters do happen.
 Need to plan for worst case scenario.
 Example strategies:
• mirrors of systems
• use of disk protection technology such as RAID
• surge protectors — to minimise the effect of power surges on
delicate electronic equipment
• uninterruptible power supply (UPS)
• back-up generator in case of a power failure
• fire preventions — alarms, fire extinguishers
• anti-virus software and other security measures
• failover systems
OCR Computing for GCSE
2011
© Hodder Education