Section Five: Networks and web technologies Flashcards
Chapter 21 – Structure of the Internet
The Internet
The internet is a global network of computers that use protocols and data packets to exchange information. There are a range of different protocols to do different jobs on the network.
Chapter 21 – Structure of the Internet
The physical structure of the Internet
Each continent uses backbone cables connected by trans continental leased lines fed across the sea beds. National Internet Service Providers (ISPs) connect directly to this backbone and distribute the Internet connection to smaller providers who in turn provide access to individual homes and businesses.
Chapter 21 – Structure of the Internet
Uniform Resource Locators (URLs)
A Uniform Resource Locator is the full address of an Internet resource. It specifies the location of a resource on the Internet, including the resource name and usually the file type, so that a browser can request it from the website server.
Chapter 21 – Structure of the Internet
Internet registries and registrars
Internet registrars hold records of all existing website names and the details of those domains that are currently available to purchase. These are companies that act as resellers for domain names and allow people and companies to purchase them. All registrars must be accredited by their governing registry.
Internet registries are five global organisations governed by the Internet Corporation for Assigned Names and Numbers (ICANN) with worldwide databases that hold records of all the domain names currently issued to individuals and companies, and their details. These details include the registrant’s name, type (company or individual), registered mailing address, the registrar that sold the domain name and the date of registry. The registries also allocate IP addresses and keep track of which address(es) a domain name is associated with as part of the Domain Name System (DNS).
Chapter 21 – Structure of the Internet
Domain names
A domain name identifies the area or domain that an Internet resource resides in. These are structured into a hierarchy of smaller domains and written as a string separated by full stops as dictated by the rules of the Domain Name System (DNS).
<Root>
Generic TLDs= .com, .edu, .org
Country TLDs= .uk, .fr, .de
2LDs= .co, .gov, .sch
3LDs= . bbc, .ebay, .lidl
</Root>
Chapter 21 – Structure of the Internet
Domain Name System (DNS)
Each domain name has one or more equivalent IP addresses. The DNS catalogues all domain names and IP addresses in a series of global directories that domain name servers can access in order to find the correct IP address location for a resource. When a webpage is requested using the URL a user enters, the browser requests the corresponding IP address from a local DNS. If that DNS does not have the correct IP address, the search is extended up the hierarchy to another larger DNS database. The IP address is located and a data request is sent by the user’s computer to that location to find the web page data.
Chapter 21 – Structure of the Internet
Fully Qualified Domain Name (FQDN)
A fully qualified domain name is one that includes the host server name, for example www, mail or ftp depending on whether the resource being requested is hosted on the web, mail or ftp server. This would be written as www.websitename.co.uk or mail.website.co.uk for example.
Chapter 21 – Structure of the Internet
IP addresses
An IP or Internet Protocol address is a unique address that is assigned to a network device. An IP address performs a similar function to a home mailing address.
130.142.37.108
The IP address indicates where a packet of data is to be sent or has been sent from. Routers can use this address to direct the data packet accordingly. If a domain name is associated with a specific IP address, the IP address is the address of the server that the website resides on.
Chapter 21 – Structure of the Internet
Wide Area Networks (WANs)
As a network of inter-connected networks, the Internet comprises millions, if not billions of Local Area Networks and individual users to form the world’s largest Wide Area Network. A Wide Area Network is generally defined to be one that relies on third party carriers or connections such as those provided by British Telecom. WANs are typically spread over a large geographical area, even across continents.
Chapter 21 – Structure of the Internet
Local Area Networks (LANs)
A Local Area Network consists of a number of computing devices on a single site or in a single building, connected together by cables. The network may consist of a number of PCs, other devices such as printers and scanners, and a central server. Users on the network can communicate with each other, as well as sharing data and hardware devices such as printers and scanners. LANs can transmit data very fast but only over a short distance.
Chapter 21 – Structure of the Internet
Physical bus topology
A LAN can use different layouts or topologies. In a bus topology, all computers are connected to a single cable. The ends of the cable are plugged into a terminator.
Chapter 21 – Structure of the Internet
Advantage and disadvantage of a bus topology
Advantage of a bus topology
- Inexpensive to install as it requires less cable than a star topology and does not require any additional hardware
Disadvantages of a bus topology
- If the main cable fails, network data can no longer be transmitted to any of the nodes
- Performance degrades with heavy traffic
- Low security – all computers on the network can see all data transmissions
Chapter 21 – Structure of the Internet
Physical star topology
A star network has a central node, which may be a switch or computer which acts as a router to transmit messages. A switch keeps a record of the unique MAC address of each device on the network and can identify which particular computer on the network it should send the data to.
Chapter 21 – Structure of the Internet
Advantages of a star topology
- If one cable fails, only one station is affected, so it is simple to isolate faults
- Consistent performance even when the network is being heavily used
- Higher transmission speeds can give better performance than a bus network
- No problems with ‘collisions’ of data since each station has its own cable to the server
- The system is more secure as messages are sent directly to the central computer and cannot be intercepted by other stations
- Easy to add new stations without disrupting the network
Disadvantages of a star network
- May be costly to install because of the length of cable required
- If the central device goes down, network data can no longer be transmitted to any of the nodes
Chapter 21 – Structure of the Internet
Advantage and disadvantage of a star topology
Advantages of a star topology
- If one cable fails, only one station is affected, so it is simple to isolate faults
- Consistent performance even when the network is being heavily used
- Higher transmission speeds can give better performance than a bus network
- No problems with ‘collisions’ of data since each station has its own cable to the server
- The system is more secure as messages are sent directly to the central computer and cannot be intercepted by other stations
- Easy to add new stations without disrupting the network
Disadvantages of a star network
- May be costly to install because of the length of cable required
- If the central device goes down, network data can no longer be transmitted to any of the nodes
Chapter 21 – Structure of the Internet
Physical vs logical topology
The physical topology of a network is its actual design layout, which is important when you select a wiring scheme and design the wiring for a new network.
The logical topology is the shape of the path the data travels in, and describes how components communicate across the physical topology. The physical and logical topologies are independent of each other, so that a network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.
For example, any variety of Ethernet uses a logical bus topology when components communicate, regardless of the physical layout of the cable.
Chapter 21 – Structure of the Internet
Wi-Fi
Wi-Fi is a local area wireless technology that enables you to connect a device such as a PC, smartphone, digital audio player, laptop or tablet computer to a network resource or to the Internet via a wireless network access point (WAP). An access point has a range of about 20 metres indoors, and more outdoors.
In 1999, the Wi-Fi Alliance was formed to establish international standards for interoperability and backward compatibility. The Alliance consists of a group of several hundred companies around the world, and enforces the use of standards for device connectivity and network connections.
Chapter 21 – Structure of the Internet
Wireless Access Point (WAP)
In order to connect to a wireless network, a computer device needs a wireless network adaptor. The combination of computer and interface controller is called a station. All stations share a single radio frequency communication channel, and each station is constantly tuned in on this frequency to pick up transmissions. Transmissions are received by all the stations within range of the wireless access point.
To connect to the Internet, the WAP usually connects to a router, but it can also be an integral part of the router itself.
Chapter 21 – Structure of the Internet
Mesh network topologies
Mesh networks are becoming more common with the widespread use of wireless technology. Each node in a mesh network has a connection to every other node, by transmitting data across any intermediate nodes. Only one node requires a connection to the Internet and all others can share this connection. Mesh networks can quickly become big enough to cover entire cities.
Chapter 21 – Structure of the Internet
Advantages of a wireless mesh network
The advantages of a mesh network include:
- No cabling costs
- The more nodes that are installed, the faster and more reliable the network becomes, since one blocked or broken connection can easily be circumvented by another route. In this respect, the mesh topology can be described as ‘self healing’.
- New nodes are automatically incorporated into the network
- Faster communication since data packets do not need to travel via a central switch
Chapter 22 – Internet communication
Circuit switching
Circuit switching creates a direct link between two devices for the duration of the communication. The public telephone system is an example of a circuit switched network. When a caller dials a number, various switches in telephone exchanges set up a path between the caller and the recipient. The connection is set up for the entire duration of the call including periods of silence and pauses. This enables two people to hold a call without any delay in the delivery of speech.
Chapter 22 – Internet communication
Packet switching
Packet switching is a method of communicating packets of data across a network on which other similar communications are happening simultaneously. Website data that you receive arrives as a series of packets and an email will leave you in a series of packets.
Chapter 22 – Internet communication
Data packet
A unit of data made into a single package that travels along a given network path. Data packets are used in Internet Protocol (IP) transmissions for data that navigates the Web, and in other kinds of networks
Chapter 22 – Internet communication
Routing packets across the Internet
The success of packet switching relies on the ability of packets to be sent from sender to recipient along entirely separate routes from each other. At the moment that a packet leaves the sender’s computer, the fastest or least congested route is taken to the recipient’s computer. They can be easily reassembled in the correct order at the receiving end and any packets that don’t make it can be requested again.
Chapter 22 – Internet communication
Routers
Each node in the diagram above represents a router. Routers are used to connect at least two networks, commonly two LANs or WANs, or to connect a LAN and its ISP’s network. The act of traversing between one router and another across a network is referred to as a hop. The job of a router is to read the recipient’s IP address in each packet and forward it on to the recipient via the fastest and least congested route to the next router, which will do the same until the packet reaches its destination. Routers use routing tables to store and update the locations of other network devices and the most efficient routes to them. A routing algorithm is used to find the optimum route. The routing algorithm used to decide the best route can become a bottleneck in network traffic since the decision making process can be complicated. A common shortest path algorithm used in routing is Dijkstra’s algorithm.
When a router is connected to the Internet, the IP address of the port connecting it must be registered with the Internet registry because this IP address must be unique over the whole Internet.
Chapter 22 – Internet communication
Gateways
Routing packets from one network to another requires a router if the networks share the same protocols, for example TCP/IP. Where these protocols differ between networks, a gateway is used rather than a router to translate between them. All of the header data is stripped from the packet leaving only the raw data and new data is added in the format of the new network before the gateway sends the packet on its way again. Gateways otherwise perform a similar job to routers in moving data packets towards their destination.
Chapter 22 – Internet communication
Media Access Control (MAC) addresses
Every computer device, whether it’s a PC, smartphone, laptop, printer or other device which is capable of being part of a network, must have a wired or wireless Network Interface Card (NIC). Each NIC has a unique Media Access Control address (MAC address), which is assigned and hard-coded into the card by the manufacturer and which uniquely identifies the device. The address is 48 bits long, and is written as 12 hex digits, for example:
00-09-5D-E3-F7-62
Chapter 22 – Internet communication
The importance of protocols and standards
A protocol is a set of rules defining common methods of data communication. These rules need to be standard across all devices in order for them to communicate with each other. HTTP (HyperText Transfer Protocol) has become the standard protocol for browsers to render web pages. TCP/IP is also used worldwide and enables communication with any other computer connected to the Internet regardless of its location.
Chapter 22 – Internet communication
The TCP/IP protocol stack
The Transmission Control Protocol / Internet Protocol (TCP/IP) protocol stack is set of networking protocols that work together as four connected layers, passing incoming and outgoing data packets up and down the layers during network communication.
There are four layers:
* Application layer
* Transport layer
* Network layer
* Link layer
Chapter 22 – Internet communication
The application layer
The application layer sits at the top of the stack and uses protocols relating to the application being used to transmit data over a network, usually the Internet. If this application is a browser, for example, it would select an appropriate higher level protocol for the communication such as HTTP, POP3 or FTP.
Imagine the following text data is to be sent via a browser using the Hypertext Transfer Protocol (HTTP):
Chapter 22 – Internet communication
The transport layer
The transport layer uses the Transmission Control Protocol (TCP) to establish an end-to-end connection with the recipient computer. The data is then split into packets and labelled with the packet number, the total number of packets and the port number through which the packet should route. This ensures it is handled by the correct application on the recipient computer. In the example below, port 80 is used as this is a common port used by the HTTP protocol, called upon by the destination browser.
If any packets go astray during the connection, the transport layer requests retransmission of lost packets. Receipt of packets is also acknowledged.
Chapter 22 – Internet communication
The network layer
The network layer, sometimes referred to as the IP layer or Internet layer, adds the source and destination IP addresses. Routers operate on the network layer and will use these IP addresses to forward the packets on to the destination. The addition of an IP address to the port number forms a socket, e.g. 42.205.110.140:80, in the same way that the addition of a person’s name is added to a street address on an envelope in order to direct the letter to the correct person within a building. A socket specifies which device the packet must be sent to and the application being used on that device.
Chapter 22 – Internet communication
The link layer
The link layer is the physical connection between network nodes and adds the unique Media Access Control (MAC) addresses identifying the Network Interface Cards (NICs) of the source and destination computers. These means that once the packet finds the correct network using the IP address, it can then locate the correct piece of hardware. The destination MAC address is that of the device that the packet is being sent to next. Unless the two computers are on the same network, the destination MAC address will initially be the MAC address of the first router that the packet will be sent to.
Chapter 22 – Internet communication
Transferring files with FTP
File Transfer Protocol (FTP) is a very efficient method used to transfer data across a network, often the Internet. FTP works as a high level protocol in the Application layer using appropriate software. The user is presented with a file management screen showing the file and folder structure in both the local computer and the remote website. Files are transferred simply by dragging them from one area to the other. FTP sites may also be used by software companies offering large updates, or by press photographers to upload their latest photographs to a remote newspaper headquarters, for example.
Most FTP sites require a username and password to authenticate the user, but some sites could be configured to allow anonymous use without the need for any login information.