Please enable JavaScript.
Coggle requires JavaScript to display documents.
Networks - Coggle Diagram
Networks
Internet and Networks
Wired vs. Wireless
Wired
-
-
Fibre optic cable
-
-
-
-
-
Used to connect LANs together to form WANs and provide broadband services to private users. Often runs under the ocean
-
Wireless
Wireless transmission media do not use a physical conductor, but they use waves to create connections between devices
Wi-Fi
-
-
-
Every device is fitted with a wireless adapter and antenna, so that it can send and receive radio wave frequencies - 2.4GHz to 5GHz, with a number of channels per frequency range
A router manages communications on the network and can have a built-in Wireless Access Point (WAP) which is a gateway to the internet for all devices
-
-
Comparing the two
-
-
Less time-consuming and disruptive to install, only cables are between WAPs - inside ceilings/walls/floors
-
-
Number of access points and locations have to be determined at start. Expanding or changing LAN requires additional cabling
Wi-Fi has a theoretical range of 100m, but physical objects and interference can obstruct the signal
-
Slow bandwidth - standard Wi-Fi can transmit 3.2Gbps, but available bandwidth is shared by all active devices
-
-
-
-
-
-
Data can only be accessed by devices physically attached to the network, so not easy to eavesdrop
Internet of Things
-
-
LAN
-
-
Employ a network manager who is responsible for installing, configuring and maintaining their LAN, supporting users and putting in backup and security measures
Network Topologies
Star
-
Every node is connected to a central node, which is likely to be a switch. All data traffic passes through the central node, which is responsible for routing it to its destination
Pros and Cons
If one node goes down, the rest can still work
If a cable is damaged, only the device connected to the wire by that line stops working
-
-
-
If the central node fails, the whole network dies
There is a maximum number of nodes, and the capacity of the central node can be low/high
-
Very flexible, so can be used in any situation
Mesh
Pros and Cons
Very fault tolerant - if one node fails, messages are rerouted
-
-
-
-
-
Communication is peer-to-peer (P2P), there is no central controlling device. Traffic hops from one node to another to reach its destination in the shortest distance possible
Usage in the IoT
Permit machinery to be wirelessly connected to networks and share diagnostic data - wherever they are located
Used for traffic management in smart cities - CCCTV etc and can be used to monitor and control traffic flow to prevent congestion
Ideal to home automation - lights, temperature, security, entertainment
Bus
-
Messages are sent along the cable as electrical signals. A terminator at the end absorbs the signals - to prevent interference
Only one message can be sent at a time, so the bus must find a way to prevent collisions
A collision occurs when 2 or more devices send a message at the same time - making them both unreadable
CSMA/CD - Carrier Sense, Method Access with Collision Detection
Pros and Cons
-
If one node fails, the rest can still work
-
If the cable is damaged, the whole network stops working
The more devices added, the more collisions, the slower it will run
-
-
-
-
Setup
Different levels
Internet Backbone
Cables, fibre optic links, satellites
-
POPs and ISPs
-
-
ISP network connects to a high-level network owned by a telecommunications company - i.e. BT or Verizon
-
Routers
-
-
IP Addresses
IPv4
32-bits, more than 4bn devices
-
Created in 1970s, so 4bn is no longer sufficient
IPv6
Eight 16-bit hexadecimal numbers, separated by colons
-
-
IP Address allocations
Router is allocated a unique IP address by its ISP, the router assigns every device on its network a local IP address. It uses these to forward data to the right device. Local IP addresses are not seen outside the network
Devices requiring constant access to a network, such as routers and servers, are assigned a static IP address
Most devices have a dynamic IP address which they only have when they are online. If all the available addresses are in use, then a new device will have to wait to connect
Domain Name System (DNS) - people can enter words instead of numbers for IP addresses, this is the first bit of a url, i.e: www.pearson.com
Packet switching
-
What happens
-
-
The ISP's router inspects the destination IP address and uses a routing table to determine where to send the packet next - it will often be forwarded many times from one router to another before reaching its destination
-
Once a packet arrives, the generated checksum is compared to the one in the packet header, if they don't match, the destination will request the packet to be resent
Packets from the same transmission can arrive in a different sequence, and will be reassembled using the sequence numbers once they have all arrived
Network Security
Staying Secure
Data Security Principles
-
Integrity - Only people authorised to do so should be able to update data, to prevent it from being incorrect
Availability - Data should be able to be accessed when people need it, a DoS attack aims to take servers offline
Network Security
To protect a network from internal and external threats. A security threat is an incident - malicious or unintended - that causes disruption, damage or data loss
-
-
Network Protocols
TCP/IP Model
-
Transport Layer
Establishes a dedicated channel between the source and destination devices to transfer the data along.
Determines how outgoing data is split up into packets and how incoming packets are reassembled, but doesn't know what the data represents
-
Internet Layer
Adds the source and destination IP addresses to the data packets received from the transport layer and routes them to the recipient
-
Link Layer
Defines how data is transferred from one device to another along the whole route from sender to recipient.
On a wired network, how the network card in the sending computer transmits the packets to the network switch and onwards. On a wireless network, how the Wi-Fi chip in the computer transmits data to the router and onwards
-
-
-