Professional Documents
Culture Documents
Aaron Thomas - 1.5 Workbook
Aaron Thomas - 1.5 Workbook
Name:
Resources
PG Online text book page ref:23-33
CraignDave videos for SLR 1.5
GCSE Unit 1.5 | Network topologies, protocols and layers
The weakness of the star network topology as illustrated in the diagram on the previous slide is:
If the switch breaks then all devices lose connection
The advantages of a wireless mesh network topology are: Using fewer wires means it costs less to set up a network, particularly for large areas of
coverage.
The more nodes you install, the bigger and faster your wireless network becomes.
esh networks are "self healing," since the network automatically finds the fastest and
most reliable paths to send data, even if nodes are blocked or lose their signal.
The disadvantages of a wireless network topology are: wireless network require greater resources such as cabling, switch/hub and network cards to insta
and to maintain therefore the initial and long term costs are much higher
GCSE Unit 1.5 | Network topologies, protocols and layers
Adjacent channels can cause interference with each other, so only 3 or 4 channels are used as shown.
CH1 CH2 CH3 CH4 CH5 CH6 CH7 CH8 CH9 CH10 CH11 CH12 CH13
2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 GHz
22 MHz
GCSE Unit 1.5 | Network topologies, protocols and layers
Wi-Fi encryption
• A wireless device broadcasts an SSID to other devices to enable connections to be made between devices on the same network.
• An older encryption method called WEP has been replaced by a more secure method called WPA.
• A master key is created and used to encrypt and decrypt data between two wireless devices.
• A simple illustration of how master keys can work using a substitution cipher:
character B A S I C S U B S T I T U T I O N C I P H E R
key 1 3 4 8 7 3 4 3 7 6 1 7 6 8 8 9 6 9 1 3 4 8 7
cipher text C D W Q J V Y E Z Z J A A B Q A S L J R L M Y
character
key
cipher text
GCSE Unit 1.5 | Network topologies, protocols and layers
Wi-Fi encryption
Wireless device Before communication between devices using the master key takes Wireless device
place, each wireless device is authenticated as having the correct
master key using a four-way handshake. This ensures that data can
only be sent and received by devices who have a correct master key.
⓿ ⓿
.
❹
GCSE Unit 1.5 | Network topologies, protocols and layers
Ethernet
with a to connect components together. Over the course of its history, Ethernet data transfer rates have been
increased from the original 2.94 megabits per second to 100 gigabits per second.
Systems communicating over Ethernet divide a stream of data into shorter pieces called a .
Each contains a , and a used for error checking so that damaged transmissions can be detected.
model.
GCSE Unit 1.5 | Network topologies, protocols and layers
Ethernet
An Ethernet frame:
Coaxial cable & BNC connector: Twisted pair & RJ45 connector:
GCSE Unit 1.5 | Network topologies, protocols and layers
The uses of IP addressing, MAC addressing, and protocols Sending files between computers. Used for uploading web
pages and associated files to a web server for hosting.
There are two types of addressing used for local and wide area networks: Layer 3
Layer 7 TCP/IP
ption and authentication for client-server data. Layer 7 Provides an error free transmission between two routers (TCP)
and routing of packets on a wide area network (IP).
The concept of layering is to divide the complex task of networking into smaller, simpler tasks that
work with each other.
The hardware and/or software for each layer has a defined responsibility.
TCP
Error Layer 3
handling
Layer 2
Encrypt
data
Layer 7
MAC
Layer 1
frames Layer 5
Web server
connection
Layer 4 Browser
Twisted IP
pair Layer 6 routing
GCSE Unit 1.5 | Network topologies, protocols and layers
Packet switching
Packet switching allows for the most efficient and secure use of a wide area network. How packet switching works:
GCSE Unit 1.5 | Network topologies, protocols and layers
Feedback
Breadth Depth Understanding
□ Some aspects complete □ Basic level of depth shown □ Some work is accurate
□ Little work complete □ Little depth and detail provided □ Little work is accurate