1.3.2 Wired and Wireless Networks, Protocols and Layers - OCR GCSE
1.3.2 Wired and Wireless Networks, Protocols and Layers - OCR GCSE
www.computerscienceuk.com
Computer Science UK www.computerscienceuk.com
OCR GCSE Computer Science
Starter Activity
3 minutes
Which ‘Learning Habits’ we will need to make use of to be a success in this lesson?
Lesson Objectives
Lesson Objectives
• To understand how different data transfer mediums carry data.
• To understand how data is transmitted across a network.
• To understand what is meant by the term ‘protocol’.
• To understand the purpose of a variety of common network protocols.
Success Criteria
• ALL: To be able to explain how packet switching works.
• MOST: To also be able to discuss the advantages and disadvantages of different
data transfer mediums and to be able to describe some common protocols.
• SOME: To also be able to explain the purpose of common protocols and
explain the layers of a network.
Literacy – Key Words
Protocols The rules that govern the workings of a network.
Packet Switching The method of routing data packets towards their destination according to the available
routes at that time.
Data Transfer The mechanism used to transfer data (via wires or Wi-Fi)
Medium
Modes of Connection
Data Transfer Media
All networks must enable computers to communicate with one
another.
This can be done using two main data transfer mediums:
Wired (Ethernet)
Modes of Connection
Cables (Ethernet)
There are two main types of cable which can transport data between computers using
ethernet:
Copper Cables
These are made up of twisted pairs of copper wires with the data being transported via
electrical signals. Because they carry electrical signals, they can suffer from interference.
Fibre optic cables are more effective…nothing travels faster than the speed of light! They
also do not suffer from interference.
Modes of Connection
Wireless (Wi-Fi)
Wi-Fi allows network access to portable devices by using radio waves to send data (not wires!).
Wi-Fi is a ‘standard’. This means that all Wi-Fi devices are using the same standard technology.
In particular they send and receive data using standard radio frequency bands:
Furthermore, each band is split into channels that cover smaller frequency ranges, within the band.
Modes of Connection
Wireless (Wi-Fi)
This is so that if two devices are sending signals using the same band (e.g.
2.4GHz)…
…they can each use different channels and therefore slightly different
frequencies (e.g. 2.41GHz and 2.45GHz)…
…so that they do not suffer from interference with one another.
Modes of Connection
Wireless (Bluetooth)
Bluetooth is another wireless data transfer medium, allowing devices to connect
and share data without wires!
Unlike, Wi-Fi (which can support the transfer of data amongst multiple devices
at once), Bluetooth can only support data transfer between a small number of
devices at any one time.
Furthermore, Bluetooth has a shorter range than Wi-Fi and as such, two
communicating devices will need to be relatively close to one another for the
transfer of data to work.
Modes of Connection
Encryption
To ensure that communication between devices is secure, data can be encrypted.
Encryption is where data is scrambled before being sent across a network so that it is
unreadable if intercepted.
To encrypt data, an encryption key is used which will convert ‘plain text’ into ‘cipher text’.
An encryption key is an algorithm which will systematically alter each piece of data in a file.
For example, a key may convert each letter in a text file to the next letter in the alphabet:
e.g. ‘hello’ becomes ‘ifmmp’
For the ‘cipher text’ to be converted back to ‘plain text’, the same key is required by the
recipient to reverse the encryption.
The Internet
What is the Internet?
The internet is a massive network of networks.
Undersea cables
connecting continents.
Data Packets
• When files are sent over the internet they are split into millions of data
packets.
Data
Error Check
Packet Header
Sequence No. Return Address Destination Address
Data Packets
An error check is an important
aspect of a data packet. The Header contains 3 pieces of information:
This this the data
itself.
This aspect of the packet is a Sequence Number
‘checksum number’. A Return Address
checksum is made up of a Destination Address.
calculation and its correct
answer. Once the packet has
been received by the destination Data
computer, If the calculation is
run and still produces the
Error Check
As data is split into packets, When data arrives, the computer Obviously a data packet
the sequence number allows which sent the data can be notified needs a destination address
the file to be rebuilt by that it arrived safely. And if a packet so that it can be routed to
putting the packets back arrives corrupted, the computer which the correct location.
together in the correct sent the data can be asked to send it
order. again.
So, we have now seen how data is sent around networks in data packets, but because the
internet has billions of computers and devices attached to it, these devices will only be able
to communicate with one another if they ‘speak the same language’ (i.e. if these data
packets are produced and sent in the same standard way).
Because of this, the internet is full of protocols, which is really just a fancy name for rules.
By manufacturing nodes and network devices to the same standards, they can adhere to
these rules, and as such all devices on the internet can work effectively with one another –
the are compatible.
We shall now take a look at some of the major protocols which enables the internet to
work.
A MAC address is hard coded into each and every network device and cannot change.
It is there so that data being sent over a network can be sent to the correct network card.
The main difference is that an IP address is not hard coded into the computer. It can change and is therefore said
to be dynamic.
The reason for this is so that on a network, similar types of hardware can be grouped by being assigned similar
IP addresses.
For example, computers could all be given IP address starting 190, printers could be given IP address staring
200 and so on.
This means that different types of device can be more easily managed on a network.
Computer Science UK www.computerscienceuk.com
OCR GCSE Computer Science
IP – Internet Protocol
This rule is in place to ensure that data packets are directed towards their destination in the most
appropriate way (which may not be the shortest way).
This is called ‘Packet Switching’ and we will now look at this in more detail.
Computer Science UK www.computerscienceuk.com
OCR GCSE Computer Science
Data 2
Data 3
4. If the packets are in the
wrong order, the packet
number can be used to
reorder them back into the
original file.
This is the protocol which governs the way in which websites and web servers are
accessed by web browsers. By conforming to the same standards it means that all
browsers can access all websites on the WWW.
This protocol is almost identical to HTTP. The only difference is that it ensures all data
being sent is encrypted and so makes web data communication far more secure.
If you have your documents / files stored on a file server, the way you access them will be
governed by the File Transfer Protocol.
This standard (FTP) ensure that all clients (computers) on a network can access files from
a server in the same way.
Network Layers
The Layers of a Network
The protocols which enable the Internet to function correctly can be divided into ‘Layers of the
Internet’.
Each layer has a particular function and provides a base for the layer above it – in other words,
each layer does all the hard work for the layer above it!
Application Layer – Layer 4 FTP, HTTP, SMTP Provides user access to applications websites,
files, email.
Transport Layer – Layer 3 TCP Provides transport of data between devices by
splitting files into data packets and checking that
they have been sent and received correctly.
Network Layer – Layer 2 IP Provides the routing of data across the network
by making use of addressing.
Data Link Layer & Physical Ethernet Provides the physical transport of data through
Layer – Layer 1 electrical signals etc.
For example, if you are accessing a website (HTTP - layer 4), it requires data to be split into packets and sent
across the internet (TCP – layer 3 / IP – layer 2), which in turns requires the physical transport of data via
cables Computer
(cables / Wi-Fi – layer
Science UK 1) www.computerscienceuk.com