Chapter 2 Communication and Networking - Full Lesson Notes-YEAR 12 COMPUTER SCIENCE PAPER 1
Chapter 2 Communication and Networking - Full Lesson Notes-YEAR 12 COMPUTER SCIENCE PAPER 1
2023-2024
1. Draw one line from each term to its most appropriate description
(i) Tick (v) one box in each row to identify whether the task is performed by the router or
not
3 Miya mainly uses the internet to watch films and play computer games.
Tick (v) one box to identify whether Miya should connect to the router using a wired
(a) State whether the network will be a LAN (local area network) or a WAN (wide
areanetwork). Justify your choice
(b) One classroom in the building has 30 computers. The computers need to be connected to
the network. Each computer has a network interface card (NIC).
Identify two possible devices that can be used to physically connect the 30 computers to the
(c) Give two benefits and one drawback of using cloud computing.
Benefit 1 ...................................................................................................................................
Benefit 2 ...................................................................................................................................
Drawback ..................................................................................................................................
(a) Networks transmit data using various types of connection shown in the following table.
Complete the table
(b) Explain how the client-server model enables the employees to access the same files
Communication and internet Technologies
from different computers
…………………………………………………………………………………………………..
7
ANS:
Important Notes
Wide area network (WAN) -In a WAN, the networked computers could be thousands of
kilometres apart.
It was called a local area network because it typically connected PCs that were in
one room or in one building or on one site.
• Within one building / small geographical area
• LAN consists of number of computers connected/devices like printer
connected
• Hub or switch is connected to a router.
• LAN- 10 m to 1000m
Thin Client
Examples:
Software Example: web browser with limited function unless it is connected to a server.
Mobile phone Apps- which needs constant access to server
Hardware Example:
POS Terminal – which needs constant access to a server to get the price/updation.
Thick Client
• A thick client can be a software or hardware which can work offline or online.
• It is still able to do some processing whether it is connected to a server or not.
• A thick client can either be connected to LAN/MAN/WAN, virtual network, the internet or
cloud computing server. chooses an application provided by the server
• possibly carries out some processing before running the application on the server and
also after receiving output from the application
• alternatively, possibly downloads the application from the server and runs the application
itself.
• The server stores a database which is accessed from the client system.
• The server stores a web application which allows the client system to find or, sometimes, supply
information.
• The server stores a web application which allows the client system to carry out an e-commerce or
financial transaction.
Peer-to-peer networking.
Instead of having one server that many clients access, a peer-to-peer network
Communication and internet Technologies
operates with each peer (networked computer) storing some of the files.
Each peer can therefore act as a client and request a file from another peer or
it can act as a server when another peer requests the download of a file.
• Files can be shared directly between systems on the network without the
need of a central server.(Easy file sharing)
• Less load on centralized server.
• Each computer on a P2P network becomes a file server as well as client.
• Software for Peer to Peer network is included with most modern operating
systems.
• BitTorrent is a communication protocol for peer-to-peer file sharing (P2P),
that enables users to distribute data and electronic files over the Internet in a
decentralized manner.
• An architecture that has no structure and no controlling mechanism.
• Peer act as both client and server
• All people engaged in the activity of sharing the torrent are called peers.
• The people who are uploading are called seeders.
• The people who are downloading are called leechers.
• If the number of seeders is more, you are likely to download the file faster. If
the number of leechers is more, the download is likely to be slow
• it avoids the possibility of congestion on the network when many clients are
simultaneously attempting to download files.
• parts of a file can be downloaded separately
• the parts are available from more than one host.
• Cost effective way.(no need to manage and maintain a server)
• An entire library of files is available for you to find online.
• Your internet speed may not impact the downloading time for your files.
• The failure of one computer won’t disrupt the rest of the system.
Disadvantages
• The files or resources are not centrally organized with a P2P network.
• P2P networks often have very little security.
• There is no way to back up files or folders centrally.
• peer to peer protocols require you to upload and download
• peer to peer networks may place illegal content on your device without your
knowledge.
• Virus introduction risks rise with a peer to peer network.
Transmission medium can be air (e.g. for WiFi) or cables (e.g. for Ethernet).
Bus topology
It uses a single central cable to which all computers and devices are connected.
Easy to expand and requires little cabling
Data can travel in one direction
Terminators are needed at each end to prevent signal reflection.
Bus network is peer to peer network
These are most suitable for situations with a small number of devices with light traffic occurring. For
example, a small company or an office environment.
Advantages
Even If one node fails, the remainder of the network continues to function.
It is easy to increase the size of the network by adding additional nodes.
Disadvantages
If the main cable fails, the whole network goes down.
The performance of the network deteriorates under heavy loading.
The network is not secure since each packet passes through every node.
Star Topology
• A star network topology uses a central hub/switch and each computer/device is connected to the
hub/switch.
• Data going from host to host is directed through the central hub/switch.
• Each computer/device has its own dedicated connection to the central node (hub/switch) – any
type of network cable can be used for the connections .
• How packets are handled depends on whether the central node is a switch or a hub. If it is a hub,
all the packets will be sent to every device/node on the star network – if the address in the packet
matches that of the node, it will be accepted; otherwise, it is ignored (this is similar to the way
• packets are handled on a bus network). If the central node is a switch, packets will only be sent to
nodes where the address matches the recipient address in the packet.
Advantages
• Data collisions are greatly reduced due to the topology.
• It is a more secure network since security methods can be applied to the central node and packets
only travel to nodes with the correct address.
• If one of the connections is broken it only affects one of the nodes.
Mesh Topology
Routing
Flooding
Routing works by giving the nodes routing logic(Acts like a router) so that the data is directed to its
destination by the shortest route and can be re-routed if one of the nodes in the route has failed.
Flooding simply sends the data via all the nodes and uses no routing –logic, which can lead to
unnecessary loading on the network.
Disadvantages of Mesh
Hybrid topology
A hybrid network is a mixture of two or more different topologies (bus and star, bus and mesh,and so on).
The main advantages and disadvantages depend on which types of network are used to make up the
hybrid network, but an additional disadvantage is that they can be very complex to install, configure and
maintain.
Advantages
Cable
A network cable can be twisted pair, coaxial or fibre-optic. The twisted pair and coaxial cables both use
copper for the transmission medium.
Wireless
The alternative to cable is wireless transmission. The three options here are radio, microwave or
infrared. These are all examples of electromagnetic radiation; the only intrinsic difference between the
three types is the frequency of the waves.
The highest altitude satellites are in geostationary Earth orbit (GEO) over the equator and these are
used to provide long-distance telephone and computer network communication. ‘Geostationary’ means
that the satellite orbits at the same speed as the Earth spins, so from a point on the Earth the satellite
always appears to be at the same point in the sky. Only three GEO satellites are needed for full global
coverage.
Closer to Earth are a group of medium-Earth-orbit (MEO) satellites some of which provide
the global positioning system (GPS). Ten MEO satellites are needed for global coverage.
Finally, low-Earth-orbit (LEO) satellites work in ‘constellations’ to supplement the mobile phone
networks. Fifty LEO satellites are needed for full global coverage but currently there are several hundred
LEO satellites in orbit.
The disadvantage of satellites is that the greater transmission distance causes transmission
delays, which can cause technical problems for the network.
Hub
• Hubs are hardware devices that can have a number of devices or computers connected to them.
• Used mainly to connect LAN’s
• hub’s main task is to take any data packet (a group
• of data being transmitted) received at one of its ports and then send the data to every computer in
the network.
• Using hubs is not a very secure method of data distribution
• hubs can be wired or wireless devices.
Switch
• Switches are similar to hubs, but are more efficient in the way they distribute the data packet.
• As with hubs, they connect a number of devices or computers together to form a LAN
• However, unlike a hub, the switch checks the data packet received and works out its destination
address (or addresses) and sends the data to the appropriate computer(s) only.
• This makes using a switch a more secure and efficient way of distributing data.
• Each device or computer on a network has a media access control (MAC) address which
• identifies it uniquely.
• Data packets sent to switches will have a MAC address identifying the source of the data and
additional addresses identifying each device which should receive the data.
• switches can be wired or wireless devices.
• When signals are sent over long distances, they suffer attenuation or signal loss. Repeaters are
devices which are added to transmission systems to boost the signal so it can travel greater
distances.
• They amplify signals.
• Repeaters can also be used on wireless systems. These are used to boost signals to prevent any
‘dead spots’ in the Wi-Fi zone. These devices plug into electric wall sockets and send out booster
signals. They are termed non-logical devices because they will boost all signals which have been
detected; they are not selective.
• Hubs contain repeaters and are known as repeating hubs. All signals fed to the hub are boosted
before being sent to all devices in the network, thus increasing the operational range.
Bridge
Bridges are devices that connect one LAN to another LAN that uses the same protocol (communication
rules). They are often used to connect together different parts of a LAN so that they can function as a
single LAN.
Router
• Routers enable data packets to be routed between the different networks for example, to join a
LAN to a WAN.
• It can act as a default gateway
• Can move data between networks
• Can calculate the best route
• The router inspects the data package sent to it from any computer on any of the networks
• connected to it. Since every computer on the same network has the same part of an internet
• protocol (IP) address, the router is able to send the data packet to the appropriate switch and it
will then be delivered using the MAC destination address. If the MAC address doesn’t match any
device on the network, it passes on to another switch on the same network until the appropriate
device is found. Routers can be wired or wireless devices.
Gateway
• A gateway is a network point (or node) that acts as an entrance to another network. It is a key
point for data on its way to or from other networks.
• It can be used to connect two or more dissimilar LANs (LANs using different protocols). The
gateway converts data packets from one protocol to another.
• Gateways can also act as routers, firewalls or servers – in other words, any device that allows
traffic to flow in and out of the networks.
• Gateways can be wired or wireless devices.
Modem
This device converts digital data to analogue data. It also does the reverse and converts data received
over the analogue network into digital data which can be understood by the computer.
To allow the transmission of digital data over analogue communication channels we need to use a
modem (modulator demodulator).
A network interface card (NIC) is needed to allow a device to connect to a network (such as the internet).
It is usually part of the device hardware and frequently contains the MAC address generated at the
manufacturing stage.
Wireless network interface cards/controllers (WNICs) are the same as the more ordinary NICs, in that
they are used to connect devices to the internet or other networks.
They use an antenna to communicate with networks via microwaves and normally simply plug into a USB
port or can be internal integrated circuit plug in.
Ethernet
Conflicts
Collision
Ethernet supports broadcast transmission and are used to send messages to all devices connected to a
LAN.
The risk is that two messages using the same data channel could be sent at the same time, leading to a
collision.
Carrier sense multiple access with collision detection (CSMA/CD) was developed to try and resolve
this issue.
Collison detection depends on simple physics: when a frame is sent it causes a voltage change on
the Ethernet cable. When a collision is detected, a node stops transmitting a frame and transmits a ‘jam’
signal and then waits for a random time interval before trying to resend the frame. CSMA/CD protocol will
define the random time period for a device to wait before trying again.
• An ISP (Internet service provider) is a company that provides individuals and other
companies access to the Internet and other related services such as Web site
building & web hosting.
• Provides internet services like email, access to software tools, security service and
Web hosting.
Leased line
an organisation could instead pay for a leased line service that provided a dedicated,
permanently connected link with guaranteed transmission speed. Typically, organisations
made use of leased lines to establish WANs (or possibly MANs (metropolitan area
networks))
A leased line is a fibre-optic service that connects directly to the customer's home or
business.
This helps to connect to the internet in a secure, reliable, and highly efficient manner,
with maximum download capacity.
services provided by ISP with leased line services are:
Broadband network Connection
Wifi hotspot technology
For users of devices with mobile (cell) phone capability there is an alternative method for
gaining Internet access. This is provided by mobile phone companies acting as ISPs. The
mobile phone, equipped with the appropriate software, communicates with a standard
cell tower to access the wireless telephone network, which in turn provides a connection
to the Internet.
Internet
• The internet is a massive network of networks
• It stands for interconnected network.
• The internet makes use of transmission control protocol (TCP)/internet protocol
(IP).
Cloud computing
• The organisation takes full responsibility for creating and managing the cloud installed on-
site and connected to a private network
• The organisation outsources to a third-party the creation and management of an on-site
installation connected to a private network
• The organisation outsources the creation and management of an Internet accessible
system by a third-party.
Public cloud.
This is created, managed and owned by a third-party cloud service provider.
• the advantages include the better performance when running software and the increased storage
capacity.
• For the platform provision, the cloud can offer facilities for software development and testing.
• For the software provision, the cloud will be able to run applications that require high performance
systems.
•
Alternatively, it could be that the costs to a company of buying and installing a software package
themselves would be far too high.
The other advantage is the familiar one with regard to outsourcing.
The cloud user no longer needs technical expertise.
The disadvantages to a cloud user relate to the use of a public cloud. The cloud service provider has
complete access to all of the data stored on the cloud. The cloud user cannot be sure that their data is
not being shared with third-parties. This is a concern with regard to data privacy. The security of the
data stored is an issue; the cloud service provider is being relied on to ensure data cannot be lost.
Bit streaming
Explain the term bit streaming
IP addressing
IPv4 addressing
There were five classes; we are going to look at the first three classes.
• This retains the concept of a netID and a hostID but removes the rigid structure and allows the
split between the netID and the hostID to be varied to suit individual need.
• The simple method used to achieve this is to add an 8-bit suffix to the address that specifies the
number of bits for the netID.
Example: If, for instance, we define the suffix as 21, that means that 21 bits are used for the netID and
there are 11 bits remaining (of a 32-bit address) to specify hostIDs allowing 211 (i.e. 2048) hosts.
One example of an IP address using this scheme is shown below. The 21 bits representing the netID
have been highlighted. The remaining 11 bits represent the hostID which would therefore have the
binary value 11000001110.
Sub-netting
Sub-netting divides a LAN into two or more smaller networks. This helps reduce
network traffic and can also hide the complexity of the overall network.
Advantages/Disadvantages of NAT
Advantages
• It can prevent the depletion of IPv4 addresses
Public addresses are provided by ISP and private address are provided by router.
Public addresses are unique & private address are(unique within their network)
can be duplicated within other networks.
IPv6 Addressing
IPv6 –uses 128-bit addressing scheme. The addresses are written in a colon
hexadecimal notation. The code is broken into 16 bit parts with each of these
represented by four hexadecimal characters.
The domain name system is an internet service that translates domain names into
IP addresses. Domain names are alphabetic, they are easier to remember.
Ethernet nodes also listen to the medium while they transmit to ensure that they
are the only station transmitting at that time. ... When stations detect a collision,
they cease transmission, wait a random amount of time, and attempt to transmit
when they again detect silence on the medium.