GCSE (9-1) Computer Science 1.5 Lesson 1

1.5 NETWORK TOPOLOGIES,
PROTOCOLS AND LAYERS 1
© OCR 2016
Thought for the day – IP Typo
© OCR 2016
The Big Picture:
Network topologies, protocols and layers
 Star and mesh network topologies
 Networks using wifi and ethernet
 Wi-fi : frequency and channels
 Encryption
 The uses of IP addressing, MAC addressing, and
commonly used protocols
• The concept of layers
• Packet switching
© OCR 2016
Learning Objectives
By the end of today’s lesson, you will understand:
• Compare Wi-Fi and Ethernet
• Understand and explain what encryption is and
why it is required
• Understand the main internet protocols and what
they do
© OCR 2016
Starter: Recap
1. What is an IP address?
2. Are you likely to have a dynamic or static IP
address on your tablet when connected to your
PAN at home?
3. How does an IP address differ from a MAC
address?
4. What is the difference between IPv4 and IPv6?
5. Give an example of an IPv4 IP address.
6. What does a router do? (in networking)
© OCR 2016
IP Address
192.168.1.23
• Data travelling on a Network are sent as packets
• Each device on the internet has a unique IP address
which is sent with the packets to identify which computer
to send the data to.
• The address is broken down into four numbers which can
represent a number between 0 and 255 separated by a
full stop.
• Routers route the data packets from one router to the
next
© OCR 2016
MAC address
• The MAC address is embedded into the device
when it is manufactured and the owner cannot
change it.
• A MAC address is a unique code which is built into
the Network Interface Card (NIC)
• Each address is individual and is made up of 48
bits, usually written in hexadecimal. (why?)
AA-34-G4-44-23-F1
© OCR 2016
Starter: Acronyms (more later!)
© OCR 2016
Wired vs Wireless
• You will be given a
selection of cards that
show the advantages
and disadvantage's of
Wired and Wireless
networks (Ethernet
and WiFi)
• Sort them into groups
• Compare you answers
with other students.
© OCR 2016
Answers
© OCR 2016
WiFi vs Wired
• Compare wi-fi and wired connections. Consider:
bandwidth, installation, cost, security,
interference, mobility of devices once
connected.
Eg: WiFi uses radio waves to transmit data packets
without the need for wires.
© OCR 2016
Cables (wired)
There are two main types of cable which can transport data between computers.
Ethernet Cables
These are made up of copper wires with the data being transported via electrical
signals. Because they carry electrical signals, they can suffer from interference.
Fibre Optic Cables
These are made up of glass fibres with the data being transported via light signals.
Fibre optic cables are more effective…nothing travels faster than the speed of light!
They also do not suffer from interference.
They are however more expensive that Ethernet cables.
© OCR 2016
Wi-Fi (wireless)
Wi-Fi allows network access to portable devices by using radio waves to send data
(not wires!).
Wi-Fi is a ‘standard’. This means that all Wi-Fi devices using the same standard
technology.
In particular they send and receive data using standard radio frequency bands:
2.4 GHz Band (frequencies between 2.4GHz & 2.5GHz)
5 GHz Band (frequencies between 5.725GHz & 5.875GHz)
0GHz
1GHz
2GHz
3GHz
4GHz
5GHz
6GHz
Furthermore, each band is split into channels that cover smaller frequency ranges,
within the band.
CH1
Ch2
Ch3
Ch4
Ch5
Ch6
Ch7
2.40GHz
2.41GHz
2.42GHz
2.43GHz
2.44GHz
2.45GHz
2.46GHz
© OCR 2016
Wi-Fi (wireless)
This is so that if two devices are sending signals using the same band
(e.g. 2.4GHz)…
0GHz
1GHz
2GHz
3GHz
4GHz
5GHz
6GHz
…they can each use different channels and therefore slightly different
frequencies (e.g. 2.41GHz and 2.45GHz)…
…so that they do not suffer from interference with one another.
CH1
Ch2
Ch3
Ch4
Ch5
Ch6
Ch7
2.40GHz
2.41GHz
2.42GHz
2.43GHz
2.44GHz
2.45GHz
2.46GHz
© OCR 2016
Craig and Dave
• https://youtu.be/Svm06j2_x5w?list=PLCiOXwirraUA
vkTPDWeeSqAKty3LAG37-
© OCR 2016
Encryption
• Encryption is used to protect data in case it has been
hacked or access illegally.
• On an open or public WiFi network anyone can join and
sniff out packets of data from other users.
• Therefore encryption is used. If intercepted the data will
have no meaning (although this doesn’t stop the actual
hacking it just means the data is unreadable)
• In order to read the data the user is required to decrypt
the data using the key.
© OCR 2016
Secure shopping
• When you are using a secure site for example
your bank, or purchasing on Amazon, encryption
is applied to keep your details safe
• The encryption method used is called 'SSL'
(Secure Socket Layer).
• A tiny padlock appears in your browser window,
usually on the left hand side of the address bar
and the website address starts with HTTPS://
© OCR 2016
Secure communications egTwitter
• Twitter users a HTTPS when you log in, why?
• What’s app encrypts messages.
• Why does the data need to be encrypted?
• What could happen if it was not encrypted?
• But – what about if the police or security services need
access to someone’s messages…..and they are
encrypted….and can’t be accessed……
http://www.bbc.co.uk/news/uk-39396578
© OCR 2016
Encryption videos
• https://www.youtube.com/watch?v=w0Qbn
xKRD0w
• https://youtu.be/TImdsUglGv4
© OCR 2016
Key terms
Plaintext – the orginal
message to be encrypted
Ciphertext – the encrypted
message
Encryption – the process of
converting plaintext into
cipher text
Key – a sequence of numbers
used to encrypt or decrypt
often using a mathematical
formual
Encryption algortiim – the
mehod for encrypting the
plain text
© OCR 2016
Encryption task
http://www.cryptoclub.org/
© OCR 2016
Protocols
• Network protocols are a set of rules or conventions which
control the communication between devices on a network.
• If one computer transmits a stream of binary to another,
the receiving computer needs to know what the rules are.
• Protocols are rules and standards that define how devices
communicate and make it possible for the to ‘talk’ to each
other,
• Without these international standards,
devices from different manufacturers
wouldn’t be able to interact with each other
across networks.
© OCR 2016
Key Protocols
• TCP/IP (Transmission Control Protocol/Internet
Protocol)
• HTTP (Hyper Text Transfer Protocol)
• HTTPS (Hyper Text Transfer Protocol Secure)
• FTP (File Transfer Protocol)
• POP (Post Office Protocol)
• IMAP (Internet Message Access Protocol)
• SMTP (Simple Mail Transfer Protocol)
© OCR 2016
Key Protocols - Files
• TCP/IP (Transmission Control Protocol/Internet Protocol) –
error free transmission of packets between 2 IP address on
a WAN
• HTTP (Hyper Text Transfer Protocol) – client server method
of requesting HTML filems
• HTTPS (Hyper Text Tranffer Protocol Secure) – encryption
and authtication of clier-server deata from web pages eg
transfer a username and password from a web pagetext
entry box to web server to log in
• FTP (File Transfer Protocol) – sending files between
compuers Typical use would be for uploading web pages
and associated firles to the server for hosting
© OCR 2016
Key Protocols - Mail
• SMTP – simple mail transfer protocol – sends mail
to a mail server
• POP (Post Office Protocol) – used by email clients
to get email from a mail server
• IMAP (Internet Message Access Protocol) – used
by email clients to get mail from a mail server and
to manage remote mail boxes. More advancee than
pop
• SMTP (Simple Mail Transfer Protocol)
© OCR 2016
Show your understanding
• Complete the worksheet on today’s topics
• Log into Moodle
• ICT & Computing > GCSE Computer Science >
Computer Systems
• Scroll down to 1.5
• 5. 1 Folder
• Download, save and complete Wifi, encryption
and protocols.docx
© OCR 2016
Explanation Videos
•
•
•
•
•
An Overview:
https://www.youtube.com/watch?v=WmymBI-X7Tc
IP
https://www.youtube.com/watch?v=zyL1Fud1Z1c
IMAP vs POP3:
https://www.youtube.com/watch?v=BK4ng6Gcits
© OCR 2016
Plenary
Stretch yourself!
• Investigate the Caesar shift cipgher
• Devise a simple encryption program eg
shift left 3
• Code an encryption program using a
programming language of your choice.
© OCR 2016