L.A.N.Β (Local Area Network): A LAN is a network that connects devices within a limited geographical area, such as a home, school, or office building.
Example: A home network connecting multiple computers, smartphones, and printers.
ποΈKey points to remember
Covers a small geographical area.
Devices are connected using cables or wirelessly.
High data transfer speeds.
Owned and managed by a single organisation or individual.
ββ Misconceptions
β LANs are always small.Β
β Some large organisations may have extensive LANs covering multiple buildings.
WAN (Wide Area Network): A WAN is a network that connects devices over a large geographical area, such as multiple cities, countries, or even continents.
Example: The internet is the largest WAN, connecting billions of devices worldwide.
ποΈKey points to remember
Covers a large geographical area.
Relies on telecommunication infrastructure to connect devices.
Lower data transfer speeds compared to LANs.
Often owned and managed by multiple organisations or service providers.
ββ Misconceptions
β WANs are always slow.Β
β Modern WANs can achieve high speeds, but they may still be slower than LANs due to the distances involved.
β WANs are always public.Β
β Some organisations may have private WANs for secure communication between their different locations.
Several factors can influence how well a network operates, affecting its speed, reliability, and overall user experience.
Examples:
Bandwidth: The maximum amount of data that can be transmitted over a network connection in a given time. Higher bandwidth generally results in faster data transfer rates.
Number of users: The more users or devices connected to a network, the more the available bandwidth is shared, potentially slowing down the network for everyone.
Latency: The time it takes for a data packet to travel from the source to the destination. High latency can cause delays in communication and affect real-time applications like video conferencing or online gaming.
Transmission media: The physical medium used to transmit data (e.g., copper cables, fibre optic cables, or wireless signals) can affect the network's speed and reliability.
Error rate: Errors can occur during data transmission due to various factors like interference or signal degradation. A high error rate can lead to data loss or retransmission, affecting network performance.
ποΈKey points to remember
Bandwidth, number of users, latency, transmission media, and error rate are all crucial factors affecting network performance.
Understanding these factors can help you design, manage, and troubleshoot networks effectively.
ββ Misconceptions
β Increasing bandwidth always solves performance issues.Β
β Other factors like latency or network congestion can still impact the overall user experience.
βWireless networks are always slower than wired networks.Β
β Modern wireless technologies can achieve high speeds, but they can be more susceptible to interference and signal degradation compared to wired connections.
Client-Server Network
In a client-server network, computers assume distinct roles: clients and servers. The server is a powerful computer that manages and provides resources or services, while clients are less powerful computers that request and utilise these resources. Β Β
Example: A school network where a central server stores student files and provides access to educational software. Students' computers act as clients, accessing these resources from the server. Β Β
ποΈKey points to remember
Centralised control: The server manages and controls network resources. Β Β
Dedicated roles: Clients request services, and the server fulfills those requests. Β Β
Scalability: Easy to add more clients to the network. Β Β
Security: Centralised security management on the server. Β Β
Peer-to-Peer Network
In a peer-to-peer network, all computers are considered equal, acting as both clients and servers. Each computer can share its own resources with others and request resources from other peers. Β Β
Example: A home network where multiple computers share files and printers directly with each other without a central server. Β Β
ποΈKey points to remember
Decentralised control: No single computer controls the network. Β Β
Shared responsibility: Each peer contributes resources and can request resources from others. Β Β
Resilience: The network can continue to function even if some peers are offline. Β Β
Cost-effective: No need for a dedicated server. Β Β
ββ Misconceptions
β Peer-to-peer networks are always insecure.Β
β While they can be more vulnerable to unauthorised access, proper security measures can be implemented.
WAP (Wireless Access Point)
Allows wireless mobile devices access to a LAN network and the internet.Β Β
It is a gateway for a wifi signal that gives access to a wired network.
Router (at home we have them bundled with a WAP hence the wireless ariels)
A router is a networking device that connects multiple networks together and forwards data packets between them.Β Β
Do not confuse this with a WAP, it is common for routers we use at home to have two devices in one a router and a WAP.Β
Switch
A switch is a networking device that connects multiple devices within a local area network (LAN).Β
It enables these devices to communicate and share data directly with each other via wires.
NIC (Network Interface Card) / Wireless NIC
A NIC, also known as a network adapter or Ethernet card, is a hardware component that connects a computer to a network.Β
It enables the computer to send and receive data over the network, allowing it to communicate with other devices and access network resources.
Network transmission media are the physical pathways or channels through which data travels in a network.
Β There are two main types: wired and wireless
Wired Media
Twisted-pair cables,Β
coaxial cables,Β
fibre optic cables
ποΈKey points to remember
Offer faster and more reliable transmission over shorter distances. Β Β
Less prone to interference compared to wireless media. Β Β
Twisted-pair cables are commonly used for Ethernet connections. Β Β
Fibre optic cables provide high bandwidth and are ideal for long-distance communication.
Wireless Media
WiFi
Bluetooth
ποΈKey points to remember
Allow for greater mobility and flexibility.
Used for wireless networking technologies like Wi-Fi and Bluetooth.
Susceptible to interference from other wireless devices or environmental factors.
DNS (Domain Name Server)Β
The Domain Name System (DNS) is like a phonebook for the internet. It translates human-readable domain names (like www.example.com) into machine-readable IP addresses (like 192.0.2.1) that computers use to locate and communicate with each other.
Example: Β When you type "www.bbc.co.uk" into your web browser, your computer queries a DNS server to find the corresponding IP address of the BBC's web server. Once it has the IP address, it can then connect to the server and retrieve the webpage.
ποΈKey points to remember
Distributed database: DNS information is stored on many servers around the world, ensuring redundancy and fast access from different locations.
Essential for internet navigation: DNS is a critical component of the internet, enabling users to access websites and other online resources using easily memorable names.
STEP 1: Get the IP address from the DNS by sending the URL.
STEP 2: Access the server directly by using the returned IP address.
HostingΒ
Hosting, refers to the service of providing storage space and resources on a server to make websites, applications, or data accessible to others over the internet.
Example:
A company creates a website to showcase its products and services. It needs a hosting provider to store the website's files (HTML, images, CSS, etc.) on a server connected to the internet. When users access the company's domain name, the hosting provider delivers the website's content to their browsers.
ποΈKey points to remember
Essential for online presence: Hosting is necessary for any website or online application to be available on the internet.
Factors to consider: When choosing a hosting provider, factors like storage space, bandwidth, uptime guarantee, security features, and technical support should be considered.
ββ Misconceptions
β Hosting is the same as domain registration.Β
β While both are needed for a website, domain registration reserves a unique name for the website, whereas hosting provides the space to store the website's files.
β All hosting providers are the same.Β
β Different providers offer various features, performance levels, and pricing, so choosing one that fits your needs is important.
The CloudΒ
The "cloud" refers to a network of remote servers accessible over the internet, used to store, manage, and process data, rather than relying on a local server or personal computer.
Example:
Instead of storing files on your computer's hard drive, you can store them in cloud storage services like Google Drive or Dropbox. This allows you to access those files from any device connected to the internet.
Advantages of the Cloud
Cost-effectiveness: Cloud computing can significantly reduce IT costs as you only pay for the resources you use. This eliminates the need for large upfront investments in hardware and software.
Scalability: Cloud services can be easily scaled up or down to meet changing demands. This provides flexibility for businesses that experience fluctuations in workload.
Accessibility: Cloud resources can be accessed from anywhere with an internet connection, enabling remote work and collaboration.
Disaster recovery: Cloud providers offer robust data backup and disaster recovery solutions, ensuring business continuity in the event of a data loss or system failure. Β Β
Automatic updates: Cloud service providers handle the maintenance and updates of their infrastructure and applications, reducing the burden on IT teams.
Disadvantages of the Cloud
Internet dependency: Cloud services rely on a stable internet connection. Any disruptions in connectivity can impact access to data and applications.
Security concerns: Storing data in the cloud raises concerns about data security and privacy. While cloud providers implement security measures, data breaches can still occur. Β Β
Vendor lock-in: Migrating data and applications between different cloud providers can be challenging, potentially leading to vendor lock-in.
Limited control: Businesses have less control over the underlying cloud infrastructure, relying on the provider to manage and maintain it.
Unexpected costs: While cloud computing can be cost-effective, it's important to understand the pricing model and potential hidden costs to avoid surprises.
ποΈKey points to remember
On-demand access: Cloud computing provides on-demand access to computing resources like servers, storage, databases, and applications.
Scalability: You can easily scale resources up or down depending on your needs.
Pay-as-you-go: You typically pay only for the resources you use, making it a cost-effective solution.
Accessibility: You can access your data and applications from anywhere with an internet connection.
ββ Misconceptions
β The cloud is just another word for the internet.Β
β The internet is the infrastructure that enables cloud computing, while the cloud refers to the services and resources delivered over the internet.
β Cloud computing is only for large businesses.Β
β Cloud computing is accessible and beneficial for individuals and businesses of all sizes.
β Data stored in the cloud is not secure.Β
β Cloud providers implement various security measures to protect data, often offering better security than on-premises solutions.
Web servers and clientsΒ
Web servers and clients are the two fundamental components that facilitate the interaction between users and websites on the internet. Β Β
Web Server: A web server is a computer program or software that stores and delivers web pages and other web content to clients when requested. Β Β
It processes client requests, retrieves the relevant files from its storage, and sends them back to the client's web browser. Β Β
Web Client: A web client, typically a web browser like Chrome, Firefox, or Safari, is used to access and display web content from web servers.Β Β Β Β
It sends requests to web servers for specific web pages or resources. Β Β
It receives the requested content from the server and renders it for the user to view and interact with. Β Β
Example: When you type a website address (URL) into your web browser, it acts as a client and sends a request to the corresponding web server. The web server processes the request, locates the requested web page, and sends it back to the browser, which then displays the page for you. Β Β
ποΈKey points to remember
Web servers and clients are essential for accessing and interacting with websites on the internet. Β Β
Web servers store and deliver web content, while clients request and display that content. Β Β
Communication between servers and clients is based on the Hypertext Transfer Protocol (HTTP). Β Β
ββ Misconceptions
β Web servers and web browsers are the same thing.Β
β Web servers are the backend systems that store and deliver web content, while web browsers are the client-side applications used to access and display that content. Β Β
In a star topology, all devices (nodes) are connected directly to a central device, a switch.Β
The switch facilites the transmission of data between the connected nodes.Β
Example: A typical home network where multiple computers, smartphones, and other devices are connected to a central wireless router.
Advantages of Star Network Topology
Centralised Management: The central node (switch) simplifies network administration and monitoring, as all traffic passes through it. This makes it easier to identify and troubleshoot problems.
Scalability: Adding or removing devices is relatively straightforward, requiring only a connection to the central node. This allows the network to grow or shrink as needed.
Fault Isolation: If a single node or cable fails, only that specific connection is affected. The rest of the network remains operational, improving overall reliability.
Improved Performance: Each node has a dedicated connection to the central node, reducing the chance of collisions and improving overall network performance.
Disadvantages of Star Network Topology
Single Point of Failure: The central node is a critical component; its failure disrupts the entire network. Redundant central nodes can mitigate this risk but add to the cost.
Increased Cabling: Each node requires a separate cable to connect to the central node. This can lead to higher cabling costs, especially in larger networks.
Dependency on Central Node: The central node's capacity and performance directly impact the overall network performance. If the central node becomes overloaded, it can affect the entire network.
A mesh network is a type of network topology where each node (device) is connected to multiple other nodes, creating a decentralised and interconnected system.Β
This interconnectedness allows data to travel through various paths to reach its destination, enhancing network reliability and resilience. Β Β
Example: Imagine a group of friends standing in a circle, each holding a string connected to multiple others. They can pass messages or objects across the circle through different routes, ensuring communication even if one string breaks.
Advantages of Mesh Networks:
High Reliability and Fault Tolerance: Due to multiple interconnected nodes and paths, if one connection fails, data can still be transmitted through alternative routes, ensuring continuous network operation.
Scalability: It's relatively easy to add new nodes to a mesh network without disrupting existing connections, allowing the network to grow as needed.
Improved Performance: Multiple paths provide load balancing, distributing traffic efficiently and potentially improving overall network speed.
No Single Point of Failure: The absence of a central node means that the failure of a single device doesn't impact the entire network, making it more resilient.
Self-Healing Capability: The network can automatically reroute traffic around failed nodes, minimising downtime and maintaining connectivity.
Disadvantages of Mesh Networks:
Complexity: Setting up and configuring a mesh network can be challenging due to the numerous interconnections.
High Cost: The requirement for multiple network interfaces and cables for each node can increase the overall cost of implementation.
Maintenance: Troubleshooting and managing a complex mesh network can be more time-consuming compared to simpler topologies.
Ethernet: Information: This is the most common type of wired connection, using cables to transmit data between devices. Ethernet cables plug into network interface cards (N.I.C.s) in devices like computers and routers. Β Β
Example: Connecting your computer to a router using an Ethernet cable for a stable and fast internet connection. Β Β
ποΈKey points to remember
Offers high speeds and reliability. Β Β
Requires physical cables, which can limit device mobility. Β Β
Suitable for situations where consistent, high-bandwidth connections are needed. Β Β
ββ Misconceptions
β All Ethernet cables are the same
β There are different categories of Ethernet cables (e.g., Cat5e, Cat6) with varying speeds and capabilities. Β Β
Wi-Fi: Enables devices to connect to a network without physical cables, using radio waves. Requires a wireless access point (e.g., a router) to create the network. Β Β
Example: Connecting your smartphone or laptop to your home Wi-Fi network for internet access.
ποΈKey points to remember
Offers convenience and mobility. Β Β
Speeds can vary depending on factors like distance and interference. Β Β
Security is important to prevent unauthorised access. Β Β
ββ Misconceptions
β Wi-Fi is always secure
β Open Wi-Fi networks are vulnerable to eavesdropping. Β Β
Bluetooth: A short-range wireless technology used for connecting devices, often for transferring files or audio streaming. Β Β
Example: Connecting wireless headphones to your phone using Bluetooth. Β Β
ποΈ Key points to remember
Limited range compared to Wi-Fi.
Lower power consumption, making it suitable for battery-powered devices. Β Β
Not ideal for large file transfers or high-bandwidth applications. Β Β
ββ Misconceptions
β Bluetooth is only for audio
β It can also be used for other data transfers, such as sending files between devices. Β Β
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) to protect its confidentiality. Only authorised parties with the correct decryption key can convert the ciphertext back into plaintext. Β Β
Example: Sending a confidential email. Before sending, the email is encrypted using a key. The recipient, with the corresponding decryption key, can then decrypt the email and read its contents. Β Β
ποΈ Key points to remember
Encryption algorithms use mathematical functions to scramble data. Β Β
The strength of encryption depends on the algorithm and the key length. Β Β
There are two main types of encryption:
Symmetric encryption: The same key is used for both encryption and decryption. Β Β
Asymmetric encryption: Different keys are used - a public key for encryption and a private key for decryption. Β Β
Β Β
ββ Misconceptions
β Encryption is only for sensitive data
β Even non-sensitive data can benefit from encryption to protect against unauthorised access and tampering.
β Encryption makes data completely unbreakable
β While strong encryption is very difficult to break, no system is completely foolproof. Given enough time and resources, sophisticated attacks can potentially compromise encrypted data.
IP (Internet Protocol) addresses are unique numerical labels assigned to devices connected to a network. They enable devices to communicate with each other by identifying their location on the network. Β Β
Example: When you send an email, your computer's IP address is used to route the email to the recipient's computer.
ποΈ Key points to remember
There are two versions of IP addresses: IPv4 (32-bit) and IPv6 (128-bit). Β Β
IP addresses can be static (assigned permanently) or dynamic (assigned temporarily by a DHCP server). Β Β
IP addresses are used for routing data across networks, including the internet. Β Β
ββ Misconceptions
β An IP address reveals your physical location
β While IP addresses can provide general location information, they don't pinpoint your exact physical address.
β You can choose your own IP address
β IP addresses are assigned by your internet service provider (ISP) or network administrator.
MAC Addressing
MAC (Media Access Control) addresses are unique hardware identifiers assigned to network interface cards (N.I.C.s). They are used for communication within a local network. Β Β
Example: When your computer sends data to another device on the same network, the MAC address is used to ensure the data reaches the correct destination.
ποΈ Key points to remember
MAC addresses are 48-bit hexadecimal numbers, usually displayed in the format MM:MM:MM:SS:SS:SS.
MAC addresses are permanent and cannot be changed. Β Β
MAC addresses are used for local communication within a network segment. Β Β
ββ Misconceptions
β MAC addresses can be used to track you across the internet
β MAC addresses are only used within a local network and are not transmitted over the internet.
β You need to know the MAC address of a device to communicate with it
β IP addresses are used for communication between devices, not MAC addresses.
Standards are agreed-upon rules, guidelines, or specifications that ensure compatibility, interoperability, and quality in various areas of computer science.
Example: The USB standard defines the physical connectors, electrical signalling, and communication protocols used by USB devices, ensuring that devices from different manufacturers can work together seamlessly.
Networking Standards:
Ethernet: This standard defines how data is transmitted over wired networks using Ethernet cables, ensuring compatibility between devices and networks.
Wi-Fi (IEEE 802.11): A family of standards governing wireless network communication, allowing devices to connect to Wi-Fi networks and access the internet.
TCP/IP: The foundational protocols of the internet, defining how data is packetied, addressed, transmitted, and routed across networks.
Data Representation Standards:
ASCII: A character encoding standard that assigns unique numerical codes to represent letters, numbers, and symbols, enabling computers to store and process text.
Unicode: A more comprehensive character encoding standard that encompasses a vast range of characters from different languages and scripts.
Hardware Interfaces:
USB: A widely used standard for connecting peripheral devices like keyboards, mice, and printers to computers.
HDMI: A standard for transmitting high-definition audio and video signals between devices.
Software Development Standards:
HTML: The standard markup language for creating web pages, defining the structure and content of web documents.
Programming Language Standards: Each programming language has its own standard defining its syntax, semantics, and libraries.
ποΈ Key points to remember
Standards promote consistency and compatibility, allowing different systems and components to interact effectively.
They facilitate innovation by providing a common framework for developers and manufacturers.
Standards can improve efficiency, safety, and reliability.
They can be developed by various organisations, including industry consortia, government agencies, and international bodies.
ββ Misconceptions
β Standards stifle innovationΒ
β While standards provide a framework, they also enable innovation by establishing a common ground for new technologies to build upon.
β All standards are mandatory
β Some standards are voluntary, while others may be mandated by law or regulation.
β Standards are static
β Standards evolve over time to accommodate new technologies and changing needs.
Protocols are sets of rules that govern how devices communicate and exchange data over a network.
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is the fundamental protocol suite for the internet. It defines how data is packetized, addressed, transmitted, and routed across networks.
Example: When you visit a website, TCP ensures reliable data transmission between your computer and the web server, while IP handles the addressing and routing of data packets.
TCP provides reliable, ordered delivery of data.
IP handles addressing and routing of data packets.
Forms the foundation of internet communication.
HTTP (Hyper Text Transfer Protocol)
This protocol is used for transferring web pages and other content over the internet.
Example: When you type a URL into your web browser, it uses HTTP to request the corresponding web page from the server.
Client-server protocol for requesting and delivering web content.
Uses plain text for communication, making it susceptible to eavesdropping.
HTTPS (Hyper Text Transfer Protocol Secure)
A secure version of HTTP that encrypts data transmitted between the client and server.
Example: Online banking and e-commerce websites typically use HTTPS to protect sensitive information like passwords and credit card details.
Provides confidentiality and integrity for data transmission.
Uses SSL/TLS encryption to secure communication.
FTP (File Transfer Protocol)
This protocol is used for transferring files between computers over a network.
Example: Uploading files to a web server or downloading files from an FTP server.
Supports both uploading and downloading files.
Can be used with or without authentication.
POP (Post Office Protocol)
An email protocol used for retrieving emails from a mail server.
Example: Configuring your email client to use POP to download emails from your inbox.
Typically downloads emails to your local device and deletes them from the server.
Not ideal for accessing emails from multiple devices.
IMAP (Internet Message Access Protocol)
Another email protocol that allows you to access and manage emails stored on a mail server.
Example: Using IMAP to view and organise your emails from different devices without downloading them.
Emails are kept on the server, allowing access from multiple devices.
Supports advanced features like folder synchroniation and message flagging.
SMTP (Simple Mail Transfer Protocol)
This protocol is used for sending emails between mail servers.
Example: When you send an email, your email client uses SMTP to send the email to your mail server, which then uses SMTP to deliver it to the recipient's mail server.
Handles the transmission of emails between servers.
Works in conjunction with POP or IMAP for retrieving emails.
ββ Misconceptions
β HTTP and HTTPS are the same
β While both are used for transferring web content, HTTPS adds encryption for security.
β POP and IMAP are interchangeable
β POP downloads emails to your device, while IMAP keeps them on the server.
β You only need SMTP to send and receive emails
β You also need POP or IMAP to retrieve emails from the server.
In computer networking, the concept of layers is a way to organise the complex process of communication between devices. It involves breaking down the communication process into smaller, more manageable tasks, with each layer responsible for a specific set of functions.
Example: Think of a layered cake. Each layer has its own distinct ingredients and purpose, but they all work together to create the final product. Similarly, in networking, each layer has its own protocols and responsibilities, but they all contribute to the successful transmission of data.
ποΈ Key points to remember
Abstraction: Each layer provides services to the layer above it, hiding the complexity of its own operations.
Modularity: Layers can be developed and modified independently, as long as they adhere to the interfaces defined between them.
Interoperability: Layering allows different technologies and protocols to work together seamlessly.
Flexibility: New protocols and technologies can be introduced at specific layers without disrupting the entire communication process.
ββ Misconceptions
β Layers are physical entities
β Layers are logical divisions of the communication process, not physical components of a network.
β All network models have the same number of layers
β Different network models, such as the OSI model and the TCP/IP model, have varying numbers of layers.
β Layers operate in isolation
β Layers interact with each other through well-defined interfaces, passing data and control information between them.