Presentation is loading. Please wait.

Presentation is loading. Please wait.

Little work is accurate

Similar presentations


Presentation on theme: "Little work is accurate"— Presentation transcript:

1 Little work is accurate
Name: In this unit you will learn about: Star and mesh network topologies. Wi-Fi. Ethernet. The uses of IP addressing, MAC addressing, and protocols. The concept of layers. Packet switching. Grade Target Depth Understanding Comment 7-9 All aspects complete All work is accurate 5-6 Most aspects complete Most work is accurate 3-4 Some aspects complete Some work is accurate 1-2 Little work complete Little work is accurate Response: Unit description and mark scheme.

2 Star network topology Assume every member of staff has a computer on their desk. Assume reception has two computers. Assume the conference room has a computer. Using the computer, switch icons, and straight lines representing twisted pair cable, show how reception, Kelly and Toby’s computers can be connected together to a switch outside Toby’s office in a star network topology. Colour the twisted pair lines purple so they stand out on the illustration. Show how Michael, Liz, and her office colleagues can be connected to a second switch outside the conference room in a star network topology. Show how the two switches are connected together. Show how the server in the room next to Michael can be connected to the network.

3 Full mesh network topology
Star network topology The weakness of the star network topology as illustrated in the diagram on the previous slide is: Full mesh network topology The advantage of connecting computers together in a full mesh topology is: The disadvantages of connecting computers together in a full mesh topology are that: Explain the biggest weakness of a star network. Illustrate how a full mesh network overcomes this problem using computer, switch, and lines representing twisted pair connections. A computer only has one network card with one connection. Switches have multiple connections. Explain one advantage and two disadvantages of a full mesh network.

4 Partial mesh network topology
The internet is an example of a partial mesh network: Illustrate how the internet is an example of a partial mesh network using the icons provided, and lines representing connections between routers. Show the local area network connections in purple, and the wide area connections in green.

5 Mesh wireless network topology
Using the ruler, draw a circle with a radius of 8. (Click view… ruler…) Colour the circle so it is a transparent blue, and the office can be seen through the circle. (Drawing tools… format… shape fill… more fill colours…) Put a wireless access point in the middle of the circle, and group the objects. The circle represents the range of the access point. The colour represents the frequency. Show how the office could be connected in a wireless mesh topology: - each wireless access point must be in range of at least one other access point; - every computer and server must be connected; - a wireless access point must be screwed to a wall;

6 Mesh wireless network topology
The advantages of a wireless mesh network topology are: The disadvantages of a wireless network topology are: Complete the boxes to explain 4 advantages and 4 disadvantages of mesh wireless networks compared to wired networks.

7 Wi-Fi frequency and channels
2.4 GHz (802.11b/g/n) wireless channels and frequencies: Adjacent channels can cause interference with each other, so only 3 or 4 channels are used as shown. CH1 2.412 CH2 2.417 CH3 2.422 CH4 2.427 CH5 2.432 CH6 2.437 CH7 2.442 CH8 2.447 CH9 2.452 CH10 2.457 CH11 2.462 CH12 2.467 CH13 2.472 Make a 12cm thick black line representing the frequency range of b/g/n wireless networks in the middle of the slide. Put marks at 1cm intervals on the line to represent the channels: 1-13. Create a 4cm diameter white circle with a dotted outline. This represents the 22MHz frequency of a single Wi-Fi channel. Position 13 circles on the line at 1cm intervals. Fill the circles for channels 1, 6 and 11 to show how only 3 channels are used due to interference. GHz 22 MHz

8 Wi-Fi encryption A wireless device broadcasts an SSID to other devices to enable connections to be made between devices on the same network. An older encryption method called WEP has been replaced by a more secure method called WPA. A master key is created and used to encrypt and decrypt data between two wireless devices. A simple illustration of how master keys can work using a substitution cipher: character B A S I C U T O N P H E R key 1 3 4 8 7 6 9 cipher text D W Q J V Y Z L M character key cipher text Create your own key, and show how a message can be encrypted using a substitution cipher. Create a message for someone else in the class to decode. Note how it would be very difficult for them to work out what the message is without the key. Sharing the key makes it vulnerable to interception though, so master keys should be known, but not communicated.

9 Wi-Fi encryption      
Wireless device Before communication between devices using the master key takes place, each wireless device is authenticated as having the correct master key using a four-way handshake. This ensures that data can only be sent and received by devices who have a correct master key. Wireless device . Research the IEEE i-2004 WPA2 protocol. Show how wireless encryption works by putting the correct text in the boxes: Master key is generated from the wireless password. An acknowledgement is sent confirming communication can begin. A random number is sent with a message integrity code. Transient key is calculated from the master key, the random number sent, my random number generated, and the network card addresses. Transient key is calculated. A random number is sent with the network interface card address. A group temporal key is calculated and sent with a message integrity code.

10 Ethernet Ethernet is a used for communication on a . Ethernet has largely replaced competing wired LAN technologies. The original Ethernet used , while the newer Ethernet uses with a to connect components together. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 megabits per second to 100 gigabits per second. Systems communicating over Ethernet divide a stream of data into shorter pieces called a . Each contains a , and a used for error checking so that damaged transmissions can be detected. Ethernet provides networking protocols up to the of the open standards interconnection model. Find out about the Ethernet standard, and complete the blanks using the words: source and destination address switch data link layer standard for networking technologies coaxial cable as a shared medium frame wired local area network twisted pair and fibre optic links cyclic redundancy check

11 Ethernet Illustrate the 6 parts of an Ethernet frame.
CSMA/CD on coaxial cable and twisted pair: Half duplex and full duplex: Illustrate the 6 parts of an Ethernet frame. Explain in bullet points what CSMA/CD is, why it was necessary with old Ethernet on coaxial cable, and is not necessary on modern Ethernet with twisted pair. Explain half duplex and full duplex in relation to coaxial cable and twisted pair connections. Show a picture of a coaxial cable and BNC connector, and a twisted pair and an RJ45/8P8C Ethernet connector. Coaxial cable & BNC connector: Twisted pair & RJ45 connector:

12 The uses of IP addressing, MAC addressing, and protocols
Sending files between computers. Used for uploading web pages and associated files to a web server for hosting. There are two types of addressing used for local and wide area networks: Layer 7 Layer 3 TCP/IP Routes packets on a wide area network between routers. POP HTTP Media Access Control address Layer 7 Layer 7 HTTPS Hypertext Transfer Protocol Layer 7 Layer 7 Layer 1 and 2 A network protocol is a set of rules governing the communication between devices on a network. Some protocols include: SMTP IMAP Found on network interface cards. Routes frames on a local area network between network interface cards. Post Office Protocol Used by clients to retrieve from a mail server, and to manage remote mail boxes. Better than POP. Used by clients to retrieve from a mail server. Encryption and authentication for client-server data. Sort the cards into 4 columns: acronym, protocol name, description and position on the OSI 7 layer model. Layer 7 Provides an error free transmission between two routers (TCP) and routing of packets on a wide area network (IP). IP address Internet Protocol address FTP File Transfer Protocol Transmission Control Protocol / Internet Protocol Internet Message Access Protocol Simple Mail Transfer Protocol A client-server method of requesting and delivering HTML files. MAC address Hypertext Transfer Protocol Secure Layer 3-5 Sends mail to a mail server.

13 The concept of layers Layer 2 Layer 3 Layer 7
The concept of layering is to divide the complex task of networking into smaller, simpler tasks that work with each other. The hardware and/or software for each layer has a defined responsibility. Each layer provides a service to the layer above it. The advantages of layering include: Layer 3 TCP Error handling Layer 2 Encrypt data Layer 7 State 3 advantages of layering a complex task like networking. Complete the jigsaw puzzle to show how all the component parts of networking that you have learned operate together in different layers. Show a second puzzle for the scenario of sending a HTML presented with no encryption over a WiFi link to a mail server. MAC frames Layer 1 Layer 5 Web server connection Layer 4 Browser IP routing Twisted pair Layer 6

14 Packet switching Packet switching allows for the most efficient and secure use of a wide area network. How packet switching works: Show what might happen to different packets of an when routed with the IP protocol on a wide area network between a browser and a mail server. Use as many or as few copies of the illustration as you need. Show each packet as a different colour on the connection between routers. Write a brief explanation of what the illustration shows in the blue box. State what TCP does to the message before it is sent, and what TCP does when it arrives at the mail server.


Download ppt "Little work is accurate"

Similar presentations


Ads by Google