Revision topic: Communications and Networking

Introduction

I am going to be setting revision guides for topics that I feel will get you the most marks as well as making sure we cover the other topics we have not looked at yet.

I will go through a list of different activities and I will include hints and clues to help you answer the questions taking from different exam papers. It is important that you attempt to try and answer the questionfirst before looking for the answer on here or online.

What this revision is going to be covering:

  • Networks
  • Topologies
  • IP address
  • Router
  • Wireless: Wi-Fi & Bluetooth
  • P2P and Server model


To be able to tackle this diagram we need to know the following:

Research Task 1

  1. Find out what a segment is
  2. Find out the difference between physical and logical topology

Things you should already know: (if you don’t, you need to do a quick revision on them)

LAN / WAN

Topologies

IP addresses

IP address classes

IP addresses are identified by the classes they use. The IP address is defined by the subnet mask, although classful addresses are no longer used, an IP address can be categorised into a class unless the subnet mask tells us otherwise.

Some examples of different classes:

Class A: 255.0.0.0Start add: 0.0.0.0Finish add: 126.255.255.255

Class B: 255.255.0.0Start: 128.0.0.0Finish: 191.255.255.255

Class C: 255.255.255.0Finish: 223.255.255.255

Class D: 224.0.0.0 Start: 224.0.0.0Finish: 239.255.255.255

This is an example of a class C IP address:

192.168.2.8

I know this IP address is a class C address because it starts with 192, which is between192 – 223 in the class list. I can only make this guess because there is no subnet mask that has been given to us, such as: 255.255.255.0. If there was a subnet mask given to us, then we cannot guess and we would have to rely on the subnet mask to tell us other wise. For example, the above address could have the subnet mask 255.255.0.0

The IP address above is broken down into4 octets. This is 8 bits which means that each section can have 2^8 address (0 – 255). The address is then splits into two sections, the Network and the Host portion. The left hand side of the IP address is always the network address and the right hand side is always going to be the host portion. The host address can change but the network address will usually stay the same. The more bits that are given to the network, the more networks there will be but the fewer hosts within each network.

Questions section 1

Q1. Find out the class that computer D is going to have

Q2. Find out the starting IP address for a class C address

Q3. If you are given a class C address of 192.168.2.1, identify the network portion of this address and the host portion

Q4. State the number of addresses that can be given to the host in this class (Class C)

Q5. What is so special about an IP address that ends with .255 or .0?

Advice (To help with the research/questions)

A router, which is a device that works in the layer 3 of the OSI model, is responsible for making sure the packets are routed to the correct destination. It will usually have several ports. It will have ports for serials, fast ethernet and also gigabit. These ports are like tiny slots where a cable would be connected to. Each slot or port will have a different address or segment. Imagine a router having two ports, which means, that particular router is going to have two different IP addresses and it will be two separate networks. This is useful to know when asked to label a port on the router.

For example:

192.168.2.1 & 192.168.2.2 > Are both on the same network. They are class C, so the network address is going to be 192.168.2.0 and three octets, 192, 168 and 2 is going to be the same on both of them.

We can also have ports on a router with IP addresses which are on a separate network. This means that the network address is going to be different for each of the addresses that is assigned to a device. In order for these devices with different network addresses to communicate, they will need to have a router as they have two separate network addresses. The router is the device that allows separate networks to communicate with each other.

192.168.2.1 & 192.168.0.1

I know they are different networks because the first 3 octets, or the first three numbers before the dot do no match together.

It seems weird having two separate networks on the same physical device but that is the beauty of a router as it can be used to stop broadcast domains. This is essentially when a network has too many devices and you want to break the network down into smaller chunks so the broadcast is reduced i.e. the network is not slowed down.

The router or computer cannot have an IP address ending with 255, this is because this is the last IP address or the broadcast address. The broadcast address is a unique address that cannot be assigned to any devices. You may want to look at why this is the case. The router or host device cannot also have an address ending with 0 for the most part as this is another unique address assigned for network address.

Questions section 2

Refer to the diagram above:

Suggest a suitable address:

Q1a) The “router 1” port labelled A

Q1b) Which two addresses can this router not have?

Q2. The router labelled port B

Q3. List 3 addresses that the network adapter on the student’s computer can have and one IP address that it cannot have

Revision

LAN

LAN stands for local area network. It is a type of network that uses the standard IEEE 802.3, which is also known as Ethernet. This means that the computer is part of a network. If the computer is not connected to a network, then we refer to them as standalone computers. It is a network that is used in homes, offices and small buildings. The term you need to remember is that it is a network used in close proximity i.e. computers close to each other. This type of network by in large is connected by wire and it is a network designed for performance.

WAN

WAN stands for wide area network and it is a type of network that consists of multiple computers connected together over a large geographical region. LANs are perfect for sharing resources within one building whereas, WAN, is just a collection of LANs connected together. These networks would be connected via satellite, radio waves, fibre-optic cable etc… The Internet is an example of a WAN network. It is the biggest public network available.

Topology

The topology of a network is how all of the computers are connected together. It is the physical layout.

Research Task 2

If you are not familiar with topologies then I would look at Star, Ring and Bus as a minimum and find out how they communicate with each other as well as their strengths and weaknesses.

Questions section 3

Q1. Explain the difference between LAN and WAN

Q2. Give a brief description of the following topologies and explain one advantage and one disadvantage

Bus

Ring

Star

Q3. Explain the difference between physical and logical topology

Q4. Explain the role of a network adapter and why it is needed in communication

Q5. Give a definition of the Internet

Q6. Explain the role of a buffer and why it is used

Revision

Network adapter

A device can only participate in the communicate within the network if it has a network adapter. The network adapter can be integrated or it can be external adapter connected to the computer via USB. They can be wired using Ethernet or wireless using Wi-Fi. Network adapters convert the digital data produce by computers into a form that can be transmitted or received over the cable. The data from the computer motherboard is transmitted to a memory area called buffer, from here it then goes through a checksum which is a procedure for error checking and other bits of data are added such as source address, destination address etc… Each network adapter is assigned a unique address which was added during the manufacturing process. This address is known as the MAC address and it is unique to network adapters.

The data that the network adapter transmits is known as a frame. This operates in the second layer of the OSI which is the data link layer. This is where MAC addresses operate as well.

Questions section 4

Q1. Explain the difference between P2P and server-based networks

Q2. When would you use a P2P network?

Q3. When would you use a server-based network?

Q4. List the strengths and weaknesses of the two networks

P2P

A peer to peer network is a type of network where all of the computers have equal power. This means that the computers are not central managed by anyone so there isn’t any policies that have been set. It is a type of network that is setup where you have up to 10 computers. It is a network that is easy to setup, cheap and doesn’t require maintenance or a lot of specialist equipment i.e. hardware or software. This type of network does have its drawbacks when it comes to management and implementation of security policies. As all of the computer have equal privileges it is difficult to setup a policy and there might be many accounts with different usernames. There is no central location to manage things so when the computers are sharing resources, they are acting as client and server at the same time. A machine could be accessing another computer for data whilst its resources maybe access by another computer.

The machines within this network can take on different roles. The role of a file server, application server, print server etc…

Server-based networks

A server-based network is a type of network that is used where the requirements are to support 10 or more users within the network. This type of network is more expensive and it requires management as dedicated servers are needed to provide different services. If we compare this with P2P, this type of network is more secure, easier to manage and implement policies as well as make changes.

The server offers the following:

  • The ability to login users and authenticate them to the network and give them access to their user area
  • The ability to share files and manage quotas and security of files
  • The ability to share resources such as printers and applications

Questions section 5

Q1. Some other students using laptops are connected to the LAN by Wi-Fi through theWireless Access Point that is labelled E on Figure 8. Wireless communication isless secure than communication using cables.

Describe one measure that could be implemented by the Wireless Access Point to

improve the security of the network.

Q2. Explain why Wi-Fi has been chosen for this connection rather than Bluetooth.

Revision: Wired and wireless communication

Wired

There are two main ways to transfer data in data communication across the network. It can either be done by wired or wireless. If we are going to be using wired, we are using a standard called IEEE 802.3 which is also known as Ethernet. Ethernet will be using a cable called ‘Unshielded Twisted Pair’ and it is a popular cable used in homes and offices. The cable is broken down into categories which define the speed i.e. throughput and the distance the data can travel in. For example, you may have heard of CAT5, which is ‘Fast Ethernet’ i.e. 100 MBPS or Cat 6 which is known as ‘Gigabit’, 125 M/bytes per second.

Wired connections are quite secure because you have to have a device physically connect to it, in order for communication to take place. If someone wanted to intercept data, again they will have to be physically connected on the network. Wired is also good when it comes to performance and is usually prone from electromagnetic interferences.

Wireless

The other method used for communication is wireless. This uses the IEEE 802.11 standard which defines wireless communication. Wireless uses RF frequency to transmit data wirelessly. It is popular for businesses or home users that want portability so they can access the Internet from different locations within the building or even outside.

There are many factors that can affect the performance of wireless communication. For example, the distance from the wireless access point, i.e. the further you are from it, the slower it becomes. The interferences that can affect the signal and performance as well as the actual building and its structure. Buildings with thick walls tend to have issues and repeaters are generally used to rebroadcast the signal i.e. amplify the signal so it covers the whole building or location.

The performance of wireless is measured by the following standards, 802.11 a /b/g/n. The higher the letter, the better it will perform, such as the 802.11n which was recently in draft version supports distances of up to 300 metres and 300+ Mb/ps.

Bluetooth is another example of wireless connection, you have to remember that it is only used over a short distance to connect to devices to share resources. It is quite slow compared to wifi so you can’t transfer huge files, the word we are looking for is low bandwidth. The other problem with Bluetooth is that it only allows two devices to connect at any one time whereaswith Wi-Fi you can have multiple connections.

Security is very important and wireless access points are secured with a password so no one can access the actual setup but they are also secured by using encryption such as Wireless Equivalent Protocol (WEP), the use of Wi-Fi protected Access (WPA) or Advance Encryption System (AES). These are all the security solutions available in wireless networks where for some a key for passphrase is used and where the password is used for accessing the network. You may also consider the fact that a router will also have other security features such as once the key is entered to check if the mac address is set in the filtered section i.e. whether it should allow the user to the network or not.

Some people think that not broadcasting the SSID, which is the name that everyone will see when they are searching for a Wi-Fi will improve security but this is actually false, neither would reducing the power transmitted by the router or using two way authentication.

Notes section

If you need to make any notes, do so here. If there is a topic you are still not sure, then make a note here and remind of it during lesson.

The student now uploads a file from her computer to a web server over the Internet.

Question section 6

Write a detailed description of how one packet of data that the student is uploadingto the web server will be routed from her computer in the United Kingdom to the webserver that is located in Chicago in the United States of America. You may assume

that the web browser software on the student’s computer has already looked up, using

a domain name server, the IP address of the web server.

Your description should cover:

  • how the packet will be routed within the LAN from the student’s computer to thegateway and
  • how, once it has reached the gateway, the packet will be routed across the Internetto the web server that the data is being uploaded to.

In your answer you will be assessed on your ability to use good English, and to

organise your answer clearly in complete sentences, using specialist vocabulary where

appropriate.

Note:

Answer the question, and then you can look at the revision tip to see if there is anything you have missed.

Explain the difference between routable and non-routable IP address.

Revision tip

Something we should already know:

-the IP address is not a local address

-the DNS lookup has already been performed

It important that you understand that a LAN is like a room. If you want to communicate with people within the room, i.e. local IP addresses, then you do not need to pass those messages to a router. The student’s computer performs its own sophisticated checks. It will check the destination address and it will do a Bitwise ANDwith its own subnet mask and identify whether the destination IP address is in the same subnet.

If it was in the same subnet, then it will just pass the packets on but as in this case it is not, it will send the packets to the router as we do not know how to reach Chicago so we will send the packet to the gateway (router).

The packet has arrived at router 1, the router will check the packet and strip the destination address and check to see if is a local address, if is not a local address then the router will send the packet to the gateway. The reason why it is sending to the gateway and not router 2 is because router 1 and router 2 are on the same network, i.e. 192.168.0 network.

Once the gateway receives the packet, it will go through a hierarchical organisation of routers. It will go to the ISP, the ISP will then send it to the national router which will then pass it on to international routers and that then passes it down based on the hierarchical structure. The reason why routers are configured like this is to make it more efficient and it is broken down so one router does not have to deal with national and international packets. You have to remember routers are beautiful, intelligent and caring devices and if a packet cannot reach its destination due to congestion or any technical issues, it will re-route that particular packet.