You are on page 1of 16

GCSE Unit 1.

5 | Network topologies, protocols and layers

Name:

Specification & learning objectives


• Star and mesh network topologies.
• Wi-Fi.
• Ethernet.
• The uses of IP addressing, MAC addressing, and protocols.
• The concept of layers.
• Packet switching.

Resources
PG Online text book page ref:23-33
CraignDave videos for SLR 1.5
GCSE Unit 1.5 | Network topologies, protocols and layers

Star network topology


GCSE Unit 1.5 | Network topologies, protocols and layers

Star network topology

The weakness of the star network topology as illustrated in the diagram on the previous slide is:
If the switch breaks then all devices lose connection

Full mesh network topology


The advantage of connecting computers together in a full
mesh topology is:

If any connection breaks their are always more connections


that can be made

The disadvantages of connecting computers together in a


full mesh topology are that:

It is expensive for so much transmission media


GCSE Unit 1.5 | Network topologies, protocols and layers

Partial mesh network topology

The internet is an example of a partial mesh network:


GCSE Unit 1.5 | Network topologies, protocols and layers

Mesh wireless network topology


GCSE Unit 1.5 | Network topologies, protocols and layers

Mesh wireless network topology

The advantages of a wireless mesh network topology are: Using fewer wires means it costs less to set up a network, particularly for large areas of
coverage.
The more nodes you install, the bigger and faster your wireless network becomes.
esh networks are "self healing," since the network automatically finds the fastest and
most reliable paths to send data, even if nodes are blocked or lose their signal.

The disadvantages of a wireless network topology are: wireless network require greater resources such as cabling, switch/hub and network cards to insta
and to maintain therefore the initial and long term costs are much higher
GCSE Unit 1.5 | Network topologies, protocols and layers

Wi-Fi frequency and channels

2.4 GHz (802.11b/g/n) wireless channels and frequencies:

Adjacent channels can cause interference with each other, so only 3 or 4 channels are used as shown.

CH1 CH2 CH3 CH4 CH5 CH6 CH7 CH8 CH9 CH10 CH11 CH12 CH13
2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 GHz

22 MHz
GCSE Unit 1.5 | Network topologies, protocols and layers

Wi-Fi encryption
• A wireless device broadcasts an SSID to other devices to enable connections to be made between devices on the same network.
• An older encryption method called WEP has been replaced by a more secure method called WPA.
• A master key is created and used to encrypt and decrypt data between two wireless devices.
• A simple illustration of how master keys can work using a substitution cipher:

character B A S I C S U B S T I T U T I O N C I P H E R

key 1 3 4 8 7 3 4 3 7 6 1 7 6 8 8 9 6 9 1 3 4 8 7

cipher text C D W Q J V Y E Z Z J A A B Q A S L J R L M Y

character

key

cipher text
GCSE Unit 1.5 | Network topologies, protocols and layers

Wi-Fi encryption
Wireless device Before communication between devices using the master key takes Wireless device
place, each wireless device is authenticated as having the correct
master key using a four-way handshake. This ensures that data can
only be sent and received by devices who have a correct master key.

⓿ ⓿
.


GCSE Unit 1.5 | Network topologies, protocols and layers

Ethernet

Ethernet is a used for communication on a .

Ethernet has largely replaced competing wired LAN technologies.

The original Ethernet used , while the newer Ethernet uses

with a to connect components together. Over the course of its history, Ethernet data transfer rates have been

increased from the original 2.94 megabits per second to 100 gigabits per second.

Systems communicating over Ethernet divide a stream of data into shorter pieces called a .

Each contains a , and a used for error checking so that damaged transmissions can be detected.

Ethernet provides networking protocols up to the of the open standards interconnection

model.
GCSE Unit 1.5 | Network topologies, protocols and layers

Ethernet

An Ethernet frame:

CSMA/CD on coaxial cable and twisted pair:

Half duplex and full duplex:

Coaxial cable & BNC connector: Twisted pair & RJ45 connector:
GCSE Unit 1.5 | Network topologies, protocols and layers

The uses of IP addressing, MAC addressing, and protocols Sending files between computers. Used for uploading web
pages and associated files to a web server for hosting.

There are two types of addressing used for local and wide area networks: Layer 3
Layer 7 TCP/IP

ets on a wide area network between routers. POP


HTTP
Media Access Control a
Layer 7
Layer 7 HTTPS Hypertext Transfer Protocol
Layer 7 Laye
Layer 1 and 2
A network protocol is a set of rules governing the communication between devices on a network. Some protocols include:

ound on network interface cards. Routes frames on a local SMTP IMAP


rea network between network interface cards. Post Office Protocol

Used by email clients to retrieve email from a mail server, and


to manage remote mail boxes. Better than POP. Used by email clients to retrieve email from a mail server.

ption and authentication for client-server data. Layer 7 Provides an error free transmission between two routers (TCP)
and routing of packets on a wide area network (IP).

IP address Internet Protocol address FTP


File Transfer Protocol

Transmission Control Protocol /


Internet Protocol Internet Message Access Protocol A client-server metho
Simple Mail Transfer Protocol

MAC address Hypertext Transfer Protocol Secure


Layer 3-5 Sends mail to a mail server.
GCSE Unit 1.5 | Network topologies, protocols and layers

The concept of layers

The concept of layering is to divide the complex task of networking into smaller, simpler tasks that
work with each other.

The hardware and/or software for each layer has a defined responsibility.

Each layer provides a service to the layer above it.

The advantages of layering include:

TCP
Error Layer 3
handling
Layer 2
Encrypt
data
Layer 7

MAC
Layer 1
frames Layer 5
Web server
connection
Layer 4 Browser
Twisted IP
pair Layer 6 routing
GCSE Unit 1.5 | Network topologies, protocols and layers

Packet switching

Packet switching allows for the most efficient and secure use of a wide area network. How packet switching works:
GCSE Unit 1.5 | Network topologies, protocols and layers

Assessment Target: Overall grade:

Minimum expectations by the end of this unit


□ You should have learnt terms 41-58 from your GCSE Level Key Terminology during this unit.
□ You have completed all the pages of the workbook
□ Score 80% in the end of unit test.

Feedback
Breadth Depth Understanding

□ All aspects complete □ Excellent level of depth □ All work is accurate

□ Most aspects complete □ Good level of depth □ Most work is accurate

□ Some aspects complete □ Basic level of depth shown □ Some work is accurate

□ Little work complete □ Little depth and detail provided □ Little work is accurate

Comment & action Student response


GCSE Unit 1.5 | Network topologies, protocols and layers

Reflection & Revision checklist


Confidence Clarification
☹😐☺ I can explain the concept of virtual networks

☹😐☺ I can explain what a start network is

☹😐☺ I can explain what a mesh network is

☹😐☺ I can explain what is meant by the frequency of a wireless network

☹😐☺ I can explain what network encryption is


☹😐☺ I can explain what ethernet is
☹😐☺ I can explain what the TCP/IP protocol col
☹😐☺ I can explain what the HTTP & HTTPS protocol is
☹😐☺ I can explain what the FTP protocol is
☹😐☺ I can explain what the POP protocol is
☹😐☺ I can explain what the SMTP & IMAP protocol is
☹😐☺ I can explain the concept of layers
☹😐☺ I can explain what packet switching is
My revision focus will need to be:

You might also like