3.1.12 Outline the advantages and disadvantages of wireless networks
3.1.13 Describe the hardware and software components of a wireless network
3.1.14 Describe the characteristics of wireless networks
3.1.15 Describe the different methods of network security
3.1.16 Evaluate the advantages and disadvantages of each method of network security
A mechanism that ensures the rate at which a sender is transmitting is in proportion to the receiver. Since in data communications multiple different devices are used, and each device may bring about different transmission parameters, this may lead to conflict if the sender starts transmitting data faster than the receiver can receive. By using flow control, this makes sure that the sending/receiving capabilities of both nodes are managed efficiently and there are no concerns.
Latency is the “lag” in a system. High latency creates congestion in any network communication. It prevents the data from fully utilizing the network pipe and decreases the communication bandwidth.
Propagation delay
Transmission Delay
Processing Delay
Queuing Delay
Propagation time is the amount of time required for a message to travel from sender to receiver. This can be affected by:
Type of physical cable (e.g. Copper or Fiber-optic)
Problems with the transmission medium. Quality of network infrastructure, if packets degrade then needs to be resent.
Transmission is the amount of time to push all packets's bits into the link, a function of packet's length and data rate fo the link.
Processing is the amount of time needed to process the packet header, check for errors and determine the packet destination
Speed of packet header examination and data integrity check is based on the processor speed in network nodes like the router and switches.
Errors with routers or switches at each gateway takes time to examine and change the packet header
Malware, Spyware and Viruses slow operations due to it slowing down the speed of connectivity by monopolizing network resources.
Queuing the amount of time the incoming packet waits in the queue until it can be processed.
Heavy Traffic Load/Congestion on network segments causes the packets to have rerouted, causing more bandwidth to be used up.
Storage delays when packets are slowed down by storage or disk access delays at switched or routers
RAM storage on nodes and switches, cause if RAM is full then it rejects incoming packets.
Total latency is the sum of all delays, usually in ms.
Network state where a node or link carries so much data it may deteriorate (make/get worse) the network server quality - queuing delay, frame or data packet loss & blocking new connections.
Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
Congestion has been described as fundamental effect of limited network resources, especially router procession time throughput. Intermediate routers may actually discard data packets when they exceed its handling capacity. In this case, additional data packets may be sent to make up unreceived packets, which exacerbates the problem.
Routers capable of reordering or dropping data packets when received rates reach critical level
Flow control mechanisms that respond appropriately when data flow rates reach critical levels.
Xon-Xoff is an example of flow control protocol: that syncs (happens at same time) the sender with the receiver. It transmits a transmit off signal when the receiver no longer has space in its buffer and transmit on signal when the receiver can resume taking data. The sending node buffers its data until it receives an on signal from the destination node.
A buffer is a storage in a router on a packet switching network that can hold or store packets until the packet can be sent or resent if there is an error.
If a network is congested and all the buffers are full, obviously it can’t accept any further data, therefore ignores and rejects additional frames.
If two adjacent routers are sending packets to each other, since both are waiting for each other to accept a packet neither can proceed, and all buffers are full and no packets can be accepted, neither can proceed.
Deadlock occurs in a network
when packets are unable to act because of waiting for each other to release some resource.
when two more competing actions are waiting for others to finish and thus neither ever does.
Transmission Control Protocol/Internet Protocol refers to protocols and utility programs used for low-level network communication. Name reflects the nature of the relationship TCP on top and IP at the bottom.
TCP/IP is a packet switching protocol that divides the transmission into packets of information, suitable for retransmission across the internet. Depending on the scheme it moves through the internet on different routes to reach the intended address.
IP software deals with the routing of packets through the web of interconnected networks to their final destination.
TCP software breaks messages into packets hands them off to IP software for delivery and then orders and reassembles them back together at the destination.
TCP deals with any errors like a packet never arriving.
Application Data - Messages, Data etc. everything that wants to be sent
Segments - Data is broken up into different parts so it is easier to send
Transport Header - Sequence number, destination/port address
Internet Header - IP address and routing information (how to get there)
Network Access Header - Physical address of device where it is going to
Network Access Trailer - Error checking
UDP - User Datagram Protocol. Alternative to TCP. Main difference TCP is highly reliable but slower while UDP is faster but less reliable.
High Level Protocols - Deals with specific types of network connections (SMTP, FTP, HTTP). Built on the foundation of TCP/IP
Hyper Text Transfer Protocol (HTTP)
Defining exchange of the world wide web documents, usually written in Hypertext Markup Language (HTML)
Client Server model where the web browser is the client and communicates with the web server that hosts the website.
Browser uses HTTP, which is carried over to TCP/IP to communicate with the server and retrieve web content for user.
Basic HTTP request involves
Connection to HTTP server is opened
Request is sent
Some processing is done
Response from server is sent back
Connection is closed
A distributed system for managing hostname resolution
A hierarchical distributed system of Domain Name servers to maintain a directory of domain names and translate them to corresponding IP addresses. Used to go on web addresses and such.
Each web address has a corresponding IP address, and your operating system will either have already stored the IP address for the web address or query it form a series of DNS servers.
Protocol to allow transfer of files from 1 computer to another.
May need to be authenticated using usernames and passwords.
Anonymous FTP allows users to access files programs and other data from the Internet without the need for a user ID or password.
FTP allows for easy transfer of files from a computer to the Web.
Simple Mail Transfer Protocol (SMTP)
Protocol that specifies the sending and transmission of electronic mail. Used when email is delivered from an email client, like outlook, to an email server or when an email is delivered from one email server to another
Post Office Protocol (POP3)
A protocol that extracts and retrieves emails from a remote mail server for access by a client device. Creates local copies and deletes them from the server.
Internet Message Access Protocol (IMAP)
Protocol for accessing email on a remote server from a local client. Users don’t have to tied to a single email client allowing flexibility as if the emails were on the cloud. This allows for users to view email on phones computers etc. Very popular as compared to POP3 as IMAP allows for multiple devices to view while POP3 doesn’t.
Refers to the overall completeness, accuracy and consistency of data. Must be followed through throughout the sending process and can be achieved through error checking and correction protocols.
Error Detection
Class of techniques for detecting damaged messages.
Schemes include:
Parity Bits
Checksums
Each message is accompanied by a numerical value based on the number of set bits in the message. The receiving station then applies the same formula and checks to make sure the accompanying numerical value is the same. If not then the message is corrupt.
UDP and TCP use this
Advantage is their size and ease of computation, requires very little computation and the cost is negligible.
Basic Checksums may be the number of bytes in a file, but unreliable because bytes may be switched around but the total number will be the same.
Advanced Checksums
Different more advanced checksum algorithms like
Cyclic Redundancy Check
Cryptographic Hash Functions
Three common networking nodes:
Used to connect segments of a LAN. When something enters one port, it’s copied to all other ports so that ALL segments of the LAN can see it. Doesn’t really know who /should/ see it, just spams everyone. Can be a waste of traffic and it isn’t very secure. Cheap but wastes bandwidths.
Device that filters and forwards packets between LAN segments. Switches operate predominantly at the data link layer (layer 2) of the OSI Reference Model and therefore support any packet protocol. LANs or Ethernet networks that uses switches are called switched Lans or switched Ethernet LANs.
A network device that directs a packet between networks toward its final destination
Sorts incoming data and distributes to correct locations. Through using headers and forwarding tables, routers choose the best path for each packet, and use protocols like ICMP to communicate and configure the best route between hosts.
The internet uses routers to direct all the traffic on the web. Routers can be used for wired connections, wireless connections or both.
In order to connect different networks, they need to be communicating in a single protocol, but a Gateway interfaces networks that use different protocols. It is basically a router that has a protocol translator.
Allows network packets to be forwarded and routed and serves as an access point in a LAN. Works like a wired router but replaces the wires with radio signals that communicate within and to external network environments.
Almost every wireless router has one or more standard wire based Ethernet port, used to connect the router to a broadband modem.
Hardware device or configured node on a LAN that allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or bluetooth. A WAP is also known as a hotspot.
Access points allow wireless networks to join an existing wired network, usually deployed when growing a network that already has routers installed.
User interface used to provide connectivity to the network and configure the wireless router or access point. This will give the user options to configure authentication for the network.
A Network Interface Card (NIC) is a computer hardware component that allows a computer to connect to a network.
NICs may be used for both wired and wireless connections.
A NIC is also known as a network interface controller (NIC), network interface controller card, expansion card, computer circuit board, network card, LAN card, network adapter or network adapter card (NAC).
All computers need Network Information Card to talk to a wireless router.
Access points and routers often use a Wi-Fi wireless antenna that increase the communication range of the wireless radio signal.
A network device that strengthens and propagates a signal along a long communication lines before they degrade too much.
A wireless repeater connects to a router or an access point
As a radio wave goes it, it weakens
Basically called signal boosters or range expanders, they serve as a two way relay station for radio waves
Any packet that is to be sent to the Internet will be given an ‘address’ that is to be read by a proxy server
The proxy opens the packet and looks for the address (or URL)
If the address is acceptable, then it is sent to the Internet
The information is sent along a LAN through packet with a header
The router redirects
Proxy ⇒ the firewall
Blocks ‘nasty things’ from the Internet/network
Prevents sensitive corporate information from entering the Internet
Firewall ⇒ the Internet
Routers + switches establish links between networks
Is much larger and much less protected than a LAN
The Internet ⇒ Second firewall
Only lets in packets that meets its criteria
Request is then granted if packets meet the network criteria