Welcome to the World of Networking!
Ever wondered how a video from a server halfway across the world appears on your phone in seconds? Or how your printer knows exactly what to print when you click a button? That is the magic of Networking. In this chapter, we are going to look at the "rules of the road" for data. We will explore how data travels, the different ways computers can be linked together, and how wireless signals stay secure. Don't worry if it seems like a lot of jargon at first—we will break it down piece by piece!
Section 1: Communication Methods
Before computers can talk to each other, they need to agree on how to send the data bits (the 1s and 0s).
Serial vs. Parallel Transmission
Imagine you are sending a group of 8 friends to a party.
Serial Transmission: Data is sent one bit at a time over a single wire. It is like your friends walking down a narrow path in a single file line.
Why use it? It is reliable over long distances because there is no risk of the bits getting out of order or interfering with each other (this interference is called "crosstalk").
Parallel Transmission: Multiple bits are sent simultaneously over several wires. It is like your 8 friends walking side-by-side down a wide highway.
Why use it? It is very fast, but only over very short distances (like inside a computer). If the wires are too long, the bits might arrive at slightly different times (this is called skew), which corrupts the data.
Key Takeaway: Serial is better for long distances (reliable); Parallel is for very short distances (fast but messy over distance).
Synchronous vs. Asynchronous
Synchronous Transmission: Data is sent in a steady stream timed to a clock signal. The sender and receiver are perfectly in sync, like two dancers following the same beat.
Asynchronous Transmission: Data is sent when it is ready, rather than in a steady stream. To make this work, we use Start and Stop bits.
- The Start bit wakes up the receiver and says "Get ready, data is coming!"
- The Stop bit tells the receiver "That's the end of this character."
Quick Review: Memory Aid
Think of Asynchronous as "Anytime." It can start at Anytime because it uses Start/Stop bits to manage the timing.
Key Takeaway: Synchronous uses a clock; Asynchronous uses Start and Stop bits.
Section 2: Communication Basics
To measure how "good" a connection is, we use specific terms. You might recognize some of these from your home Wi-Fi contract!
The Big Five Terms
1. Bit Rate: The number of bits sent per second (bps). This is the actual speed of data.
2. Baud Rate: The number of signal changes per second.
3. Bandwidth: The maximum amount of data that can be transmitted over a communication channel in a given time.
4. Latency: The time delay between a bit being sent and it arriving at its destination (the "lag").
5. Protocol: A set of rules that allow two devices to communicate. Without a protocol, the devices wouldn't understand each other.
The Relationship Between Bit Rate and Baud Rate
Did you know? Bit rate can actually be higher than baud rate.
Imagine a signal change is like a car passing by (Baud). If each car carries only one person (one bit), then the Baud Rate and Bit Rate are the same. But if we "carpool" and put 4 people in each car, the Bit Rate becomes 4 times higher than the Baud Rate!
The formula for this relationship is:
\( \text{Bit Rate} = \text{Baud Rate} \times \text{number of bits per signal change} \)
Important Point: Bit rate is directly proportionate to bandwidth. If you increase the bandwidth, you increase the potential bit rate.
Key Takeaway: Bit rate is speed, Latency is delay, and Protocols are the rules of the game.
Section 3: Network Topology
A "topology" is just a fancy word for the layout or structure of a network.
Physical Star Topology
In a Star Topology, every device is connected to a central switch or hub.
- Pros: if one cable breaks, only that computer is affected. It is also easy to add new devices.
- Cons: if the central switch fails, the whole network goes down!
Logical Bus Topology
A Logical Bus behaves as if all devices are connected to a single main cable (the "bus"). Even if the physical wires look like a star, the logic (the way data flows) might follow a bus protocol where data is broadcast to everyone, but only the intended recipient keeps it.
Don't worry if this seems tricky: Just remember that Physical is how the wires are actually plugged in, while Logical is how the data behaves as it travels through those wires.
Key Takeaway: Star connects to a center; Bus acts like a single shared line.
Section 4: Types of Networking
How do the computers on the network relate to each other? There are two main ways:
1. Client-Server Networking: Most computers are clients (they ask for things) and one or more powerful computers are servers (they provide things).
Example: When you check your email, your phone is the client asking the Google server for your messages.
Pros: Centralized backups and security.
2. Peer-to-Peer (P2P) Networking: Every computer is equal. There is no central server. Computers share files directly with each other.
Example: A small home office where two computers share a single printer.
Pros: Easy to set up and no expensive server needed.
Key Takeaway: Client-Server has a "boss" (the server); Peer-to-Peer is a group of equals.
Section 5: Wireless Networking
Wireless networking (WiFi) allows us to connect without being "tethered" by cables. It is based on international standards to ensure all devices can talk to each other.
What do you need?
- Wireless Network Adapter: The device inside your laptop/phone that sends and receives signals.
- Wireless Access Point (WAP): The "station" that receives wireless signals and connects them to the wired network.
Keeping it Secure
Because wireless signals travel through walls, anyone nearby could try to "listen in." We use these methods to stay safe:
- WPA/WPA2: Strong encryption that scrambles the data so only people with the password can read it.
- SSID (Service Set Identifier): This is the name of your network. You can disable "SSID Broadcast" to make your network invisible to casual searchers.
- MAC Address Whitelist: You give the router a list of the unique IDs (MAC addresses) for your specific devices. Any device not on that list is blocked.
The "Traffic Controller": CSMA/CA
Wireless is a shared medium. If two devices talk at the exact same time, the signals crash! To prevent this, we use CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).
Step-by-Step Process:
1. The device "listens" to the airwaves to see if anyone else is talking.
2. If it's quiet, it sends a Request to Send (RTS).
3. The Access Point replies with a Clear to Send (CTS) if the coast is clear.
4. The device sends its data.
5. If a collision occurs, the device waits a random amount of time before trying again.
Common Mistake to Avoid!
Don't confuse CSMA/CA (Wireless) with CSMA/CD (Wired). For your AQA AS exam, you only need to focus on CSMA/CA for wireless networking.
Key Takeaway: Wireless uses WPA2 for safety and CSMA/CA to prevent data collisions.
Final Summary Review
1. Serial: 1 wire, 1 bit at a time. Long distance.
2. Bit Rate: Speed of bits. Baud Rate: Speed of signal changes.
3. Star Topology: Central switch, very common.
4. P2P: All computers are equal.
5. CSMA/CA: Listen before you talk!