2.WiredAndWirelessNewtorks

Description

GCSE Computing Mind Map on 2.WiredAndWirelessNewtorks, created by Sam Houghton on 17/11/2016.
Sam Houghton
Mind Map by Sam Houghton, updated more than 1 year ago
Sam Houghton
Created by Sam Houghton about 8 years ago
15
1

Resource summary

2.WiredAndWirelessNewtorks
  1. L5 Protocols and layers
    1. Protocols
      1. HTTP
        1. HTTP (hypertext transfer protocol) is used for accessing and receiving web pages in the form of HTML files on the Internet
        2. HTTPS
          1. HTTPS (secure protocol) encrypts the information so that it cannot be understood if it is hacked
          2. FTP
            1. Used for sending or retrieving files to or from a remote server or computer Works just like Windows’ File Explorer
            2. POP
                1. POP will download entire messages to your local device and delete them from the server
                2. IMAP
                  1. These email retrieval protocols fetch message data and attachments from your remote mail server
                    1. IMAP will only download the message header until the message is opened and will leave the message on the server This means other devices checking the same mailbox will also see the messages
                    2. SMTP
                      1. Email protocol used for transferring email between remote email servers Client email software sends message to outgoing mail server Mail server contacts destination mail server to pass on email using SMTP
                      2. TCP/IP
                        1. TCP (Transmission Control Protocol)
                          1. Resends lost messages
                            1. Detects errors
                              1. Reassembles the packets at the other end
                                1. Breaks up messages sent over the Internet into small chunks called packets
                                2. IP protocol
                                  1. Routes the individual packets
                                  2. The TCP/IP protocol stack sending
                                    1. Application layer
                                      1. The network applications you are using operate on the Application layer The application selects the correct protocol to use depending on which application it is and what you are trying to do
                                      2. Transport layer
                                        1. The Transport layer creates the connection between two computers, or ‘hosts’ The two computers agree the communication settings and the size of the packets they will send and receive
                                          1. Data is then divided up into packets and numbered e.g. 1 of 6 Packets are reassembled by the recipient’s Transport layer Lost packets are resent
                                          2. Network layer
                                            1. Routers operate on the Network layer Destination addresses are written on to the packets ready for transmission
                                            2. Link layer
                                              1. The Link layer is the physical hardware that connects the two hosts such as the NIC and the cabling
                                              2. Layers are self-contained
                                              3. The TCP/IP protocol stack receiving
                                                1. The link layer removes the MAC address and passes packets up to the Network layer The Network layer removes the IP addresses and passes packets up to the Transport layer The Transport layer reassembles the packets and passes the data to the Application layer The Application layer uses the correct protocol to correctly display the data, web page or email for the user
                                              4. Email
                                                1. How email works
                                                  1. Mail servers pass on or store emails until they are collected You must log in to a mail server to collect mail Examples of mail providers are Gmail or Yahoo
                                            3. L1 The Internet
                                              1. Internet Vs World Wide Web
                                                1. World Wide Web
                                                  1. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data
                                                  2. The Internet
                                                    1. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally
                                                      1. Information that travels over the Internet does so via a variety of languages known as protocols.
                                                    2. IP address and MAC address
                                                      1. IP address
                                                        1. belongs to the router
                                                          1. can change
                                                            1. geographical location can be determined by its IP address
                                                            2. Media Access Control (MAC) address
                                                              1. belongs to the Network Interface Card (NIC)
                                                                1. may have more than one
                                                                  1. Format 3B:14:E6:39:0A:2C
                                                                    1. never changes
                                                                  2. Data packets
                                                                    1. Each packet is given a header containing
                                                                      1. The IP (Internet Protocol) address it is going to
                                                                        1. The IP address it has come from
                                                                          1. The sequence number of the packet
                                                                            1. The number of packets in the whole communication
                                                                              1. Error checking data
                                                                              2. Each data packet will contain the same number of bytes
                                                                              3. Domain Name System (DNS)
                                                                                1. DNS technology allows you to type a name such as google.co.uk into your web browser It translates the web address google.co.uk into an IP address e.g. www.google.co.uk = 74.125.131.94
                                                                                  1. When a DNS server receives a request not in its database, it will pass the request on to another server until it reaches one with the matching name and IP address
                                                                                2. L2 Local Area Networks
                                                                                  1. Network topologies
                                                                                    1. Star
                                                                                      1. Advantages
                                                                                        1. Fast data transfer as there are fewer data collisions
                                                                                          1. If one cable fails the other workstations are not affected
                                                                                          2. Disadvantages
                                                                                            1. Requires additional hardware such as the central switch
                                                                                              1. If the central device fails the whole network goes down
                                                                                            2. Mesh
                                                                                              1. Partial Mesh network
                                                                                                1. Full Mesh network
                                                                                                  1. Wireless mesh networks
                                                                                                    1. The more nodes that use the network, the more the signal can travel
                                                                                                      1. Only one node needs a wired Internet connection – no other cabling or infrastructure is required
                                                                                                      2. Nodes act as routers for data in order to relay and propagate data in the network
                                                                                                        1. Partial mesh network model usually used, often in conjunction with star topologies to create larger networks
                                                                                                          1. Advantages
                                                                                                            1. No single point of failure – It is a self-healing network
                                                                                                              1. Expansion and modification can be done without disrupting the network
                                                                                                                1. Data can be transmitted from different devices simultaneously
                                                                                                                2. Disadvantages
                                                                                                                  1. Can involve redundant connections
                                                                                                                    1. Expensive to install cabling if using wired connections
                                                                                                                      1. Network maintenance and administration is difficult
                                                                                                                    2. There are many
                                                                                                                    3. Ethernet protocols
                                                                                                                      1. Ethernet’ refers to a family of standard local networking ‘protocols’ or rules
                                                                                                                        1. Two nodes attempting to transmit simultaneously will stop and each wait a random period before reattempting
                                                                                                                          1. Two nodes attempting to transmit simultaneously will stop and each wait a random period before reattempting
                                                                                                                            1. Ethernet transmission
                                                                                                                              1. Ethernet systems divide data into frames, similar to Internet packets Each frame contains source and destination addresses and error checking data Frames are broadcast to all nodes – only the intended recipient will open the frame. Others will be discarded Frames which are detected to contain transmission errors are dropped or resent
                                                                                                                            2. Routers, hubs and switches
                                                                                                                              1. Routers
                                                                                                                                1. Sends data packets on their way in the best direction
                                                                                                                                2. hubs
                                                                                                                                  1. Central, multi-plug adaptor for computers and printers in a network
                                                                                                                                    1. When a packet of data is received, it broadcasts the packet to all devices on the network
                                                                                                                                    2. switches
                                                                                                                                      1. Smart multi-plug adaptor only sends packets to the intended recipient, using its MAC address
                                                                                                                                        1. Reduces network traffic and increases speed
                                                                                                                                    3. L4 Client-server and peer-to-peer networks
                                                                                                                                      1. client-server structure
                                                                                                                                        1. client
                                                                                                                                          1. Role of the client
                                                                                                                                            1. The client sends requests to the server
                                                                                                                                              1. Waits for a reply
                                                                                                                                                1. Receives the reply
                                                                                                                                              2. Server
                                                                                                                                                1. A print server
                                                                                                                                                  1. may organise printing on different printers
                                                                                                                                                  2. A file server
                                                                                                                                                    1. holds all the data files and databases and manages backups
                                                                                                                                                    2. An email server
                                                                                                                                                      1. may receive emails, detect and block spam, distribute emails to users
                                                                                                                                                      2. A web server
                                                                                                                                                        1. may host an external website
                                                                                                                                                        2. Role of the server
                                                                                                                                                          1. The server waits for requests from a client
                                                                                                                                                            1. Acknowledges the request
                                                                                                                                                              1. The server may need to pass the request (e.g. for a web page) to another server – in which case, it becomes the “client”
                                                                                                                                                                1. The requested data is sent back to the client
                                                                                                                                                              2. Client-server networking
                                                                                                                                                                1. A central server is used to manage security
                                                                                                                                                                  1. Some files are held on the central server
                                                                                                                                                                    1. Some processing tasks are performed by the server
                                                                                                                                                                      1. Clients issue requests to the server for services such as email, file storage, backup and printing
                                                                                                                                                                        1. Suitable for many different types of organisation, small and large
                                                                                                                                                                          1. Can require specialist IT staff to administer the network
                                                                                                                                                                          2. In a school network, there may be dozens or even hundreds of clients and several servers
                                                                                                                                                                          3. Peer-to-peer (P2P) structure
                                                                                                                                                                            1. Peer-to-peer networking
                                                                                                                                                                              1. Suitable for a small companies with fewer computers
                                                                                                                                                                                1. No central server controls files or security
                                                                                                                                                                                  1. All computers can easily see files on all other computers
                                                                                                                                                                                    1. All computers can communicate with each other without going through a server
                                                                                                                                                                                      1. If a computer is switched off, data cannot be retrieved
                                                                                                                                                                                    2. Peer-to-peer on a WAN
                                                                                                                                                                                      1. The P2P configuration can also be used for file-sharing websites
                                                                                                                                                                                        1. This means that with thousands of people downloading, data can be passed between computers rather than just from the server
                                                                                                                                                                                      2. L3 Wireless networking
                                                                                                                                                                                        1. Wireless access point
                                                                                                                                                                                          1. A wireless Access Point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi
                                                                                                                                                                                            1. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself
                                                                                                                                                                                            2. Wi-Fi Frequencies and channels
                                                                                                                                                                                              1. The 802.11 standard uses five frequencies: 2.4GHz, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz
                                                                                                                                                                                                1. Each frequency is subdivided into various channels: Each channel has a central frequency and bandwidth
                                                                                                                                                                                                  1. 802.11 standards
                                                                                                                                                                                                    1. 802.11b/g/n uses the 2.4GHz frequency 802.11a/n/ac uses the 5GHz frequency
                                                                                                                                                                                                      1. 2.4GHz
                                                                                                                                                                                                        1. Advantages
                                                                                                                                                                                                          1. Greater range and coverage
                                                                                                                                                                                                          2. Disadvantages
                                                                                                                                                                                                            1. More interference from other devices, and only three non-overlapping channels
                                                                                                                                                                                                          3. 5GHz
                                                                                                                                                                                                            1. Advantages
                                                                                                                                                                                                              1. Less crowded space with 23 non-overlapping channels with higher data transmission rates
                                                                                                                                                                                                              2. Disadvantages
                                                                                                                                                                                                                1. Fewer devices can use the 5GHz frequency, less able to penetrate through walls
                                                                                                                                                                                                          4. Encryption
                                                                                                                                                                                                            1. Encryption terminology
                                                                                                                                                                                                              1. Plaintext: the original message to be encrypted
                                                                                                                                                                                                                1. Ciphertext: the encrypted message
                                                                                                                                                                                                                  1. Encryption: the process of converting plaintext into ciphertext
                                                                                                                                                                                                                    1. Key: a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula
                                                                                                                                                                                                                      1. Encryption algorithm : the formula for encrypting the plaintext
                                                                                                                                                                                                                      2. Encryption techniques
                                                                                                                                                                                                                        1. Private key (Symmetric encryption)
                                                                                                                                                                                                                          1. This is more secure as it means that you never have to send or reveal your decryption key
                                                                                                                                                                                                                            1. Two keys are used - one to encrypt and the other to decrypt data
                                                                                                                                                                                                                            2. Public key (Asymmetric encryption)
                                                                                                                                                                                                                              1. A single key is used to encrypt and decrypt a message and must be given to the recipient of your message to decrypt the data
                                                                                                                                                                                                                            3. Caesar shift cipher
                                                                                                                                                                                                                              1. A to B to C
                                                                                                                                                                                                                              2. Cryptanalysis
                                                                                                                                                                                                                                1. Brute-force attack
                                                                                                                                                                                                                                  1. Every possible key is tried On average, half of all possible keys need to be tried, so the longer the key, the more time it takes to find it
                                                                                                                                                                                                                                  2. Non-brute-force attack (cryptanalytic attack)
                                                                                                                                                                                                                                    1. eg: One important clue was that some messages always started with the words “Heil Hitler”
                                                                                                                                                                                                                                      1. Frequency analysis
                                                                                                                                                                                                                                    2. Modern ciphers
                                                                                                                                                                                                                                      1. using two very large prime numbers multiplied together
                                                                                                                                                                                                                                      2. Algorithmic security
                                                                                                                                                                                                                                    3. By Samuel Houghton
                                                                                                                                                                                                                                      Show full summary Hide full summary

                                                                                                                                                                                                                                      Similar

                                                                                                                                                                                                                                      Types and Components of Computer Systems
                                                                                                                                                                                                                                      Jess Peason
                                                                                                                                                                                                                                      Input Devices
                                                                                                                                                                                                                                      Jess Peason
                                                                                                                                                                                                                                      Output Devices
                                                                                                                                                                                                                                      Jess Peason
                                                                                                                                                                                                                                      Computing
                                                                                                                                                                                                                                      Kwame Oteng-Adusei
                                                                                                                                                                                                                                      Pack of playing cards answer
                                                                                                                                                                                                                                      Karl Taylor
                                                                                                                                                                                                                                      Code Challenge Flow Chart
                                                                                                                                                                                                                                      Charlotte Hilton
                                                                                                                                                                                                                                      Computing Hardware - CPU and Memory
                                                                                                                                                                                                                                      ollietablet123
                                                                                                                                                                                                                                      Computer science quiz
                                                                                                                                                                                                                                      Ryan Barton
                                                                                                                                                                                                                                      GCSE Computing - 4 - Representation of data in computer systems
                                                                                                                                                                                                                                      lilymate
                                                                                                                                                                                                                                      GCSE Computing: Hardware
                                                                                                                                                                                                                                      Yasmin F
                                                                                                                                                                                                                                      OCR gcse computer science
                                                                                                                                                                                                                                      Jodie Awthinre