Welcome to the World of Networks!
Ever wondered how you can send a message to someone on the other side of the world in seconds, or how you can play a multiplayer game with friends from your own living room? That is all thanks to networks! In this chapter, we are going to explore how computers talk to each other, the different ways they are connected, and how we keep all that data safe. Don't worry if it seems like a lot of technical terms at first—we'll break it down piece by piece!
4.1 Networks: The Basics
What is a Network?
A network is simply two or more computers (or devices like phones and printers) connected together so they can share data and resources.
Why do we bother connecting them?
- Sharing Resources: You can share one printer between ten computers, saving money.
- Communication: Sending emails or instant messages.
- Sharing Data: Accessing the same files from different machines.
- Central Management: Software updates can be pushed to all computers at once.
LAN vs. WAN
We categorize networks based on how big an area they cover:
1. LAN (Local Area Network): Covers a small geographical area, like a single house, a school, or an office building. The hardware is usually owned by the person or organization using it.
2. WAN (Wide Area Network): Covers a large geographical area, like a city, a country, or even the whole world! The Internet is the biggest WAN in existence. WANs usually use hired telecommunication lines (like those from BT or Virgin Media).
Quick Review: Key Differences
LAN: Small area, high speed, owned by user.
WAN: Large area, lower speed (usually), uses third-party cables/satellites.
4.1.3 & 4.1.4 Staying Connected
How the Internet is Structured
The Internet isn't just magic in the air; it has a physical structure:
- IP Addressing: Every device on a network has a unique IP Address. Think of this like your home's postal address. Without it, the network wouldn't know where to send your data.
- Routers: These are the "traffic wardens" of the network. Their job is to look at the destination of a data packet and send it toward the correct IP address via the most efficient route.
Network Performance
Not all networks are equally fast. Several things affect performance:
- Bandwidth: The amount of data that can be sent in a certain amount of time. Analogy: A wider pipe allows more water to flow through at once.
- Latency: The delay between data being sent and received (often called "lag").
- Error Rate: How many "packets" of data fail to reach their destination.
Wired vs. Wireless
Wired (Ethernet/Fibre): Fast, very reliable, and difficult for hackers to "listen in" on. However, you are stuck in one place because of the cable!
Wireless (Wi-Fi): Very convenient as you can move around. However, the signal can be blocked by walls, it’s generally slower than wired, and it's easier for others to try and intercept the signal.
4.1.5 Measuring Speed
Network speeds are measured in bits per second (bps).
Common measurements:
- Kilobit (Kbps): 1,000 bits per second
- Megabit (Mbps): 1,000,000 bits per second
- Gigabit (Gbps): 1,000,000,000 bits per second
Important Tip: Be careful! Network speed is usually bits (lowercase 'b'), but file sizes are usually Bytes (uppercase 'B'). There are 8 bits in 1 Byte.
To calculate how long a file will take to send, use this formula:
\( \text{Time (seconds)} = \frac{\text{File Size (bits)}}{\text{Network Speed (bits per second)}} \)
4.1.6 & 4.1.7 Protocols and Layers
What is a Protocol?
A protocol is a set of rules that governs how devices communicate. If two computers use different protocols, they won't understand each other—it’s like one person speaking English and the other speaking French!
Key Protocols you need to know:
- TCP/IP: The main "language" of the internet. TCP breaks data into packets; IP routes them.
- HTTP / HTTPS: Used for accessing websites. (The 'S' stands for Secure/Encrypted).
- FTP: Used for sending or receiving files.
- POP3 / IMAP / SMTP: Protocols used for Email. (SMTP is for sending; POP3 and IMAP are for receiving).
The 4-Layer TCP/IP Model
Network communication is complex, so we divide it into layers. Each layer has a specific job:
- Application Layer: Where the user interacts with the network (e.g., your web browser).
- Transport Layer: Breaks data into packets and checks for errors.
- Internet Layer: Adds the source and destination IP addresses.
- Link Layer: The physical hardware (cables/Wi-Fi) that actually moves the data.
4.1.8 Network Topologies
A topology is the layout of how the computers are connected.
1. Star Topology: All computers connect to a central switch or hub.
- Pro: If one cable breaks, the rest of the network keeps working.
- Con: If the central switch fails, the whole network goes down.
2. Bus Topology: All computers connect to a single main cable (the "backbone").
- Pro: Cheap and easy to set up.
- Con: If the main cable breaks, the whole network fails.
3. Mesh Topology: Every device is connected to every other device (or most of them).
- Pro: Very "robust"—if one connection fails, there are many other paths data can take.
- Con: Very expensive and difficult to set up with cables (though common in wireless setups).
4.2 Network Security
Connecting to a network makes computers vulnerable. We need to protect them!
Identifying Vulnerabilities:
- Penetration Testing: Professionals are paid to try and "hack" a system to find its weaknesses so they can be fixed.
- Ethical Hacking: Using hacking skills for good—finding bugs and reporting them to the owner.
Methods of Protection
1. Firewalls: Software or hardware that monitors incoming and outgoing data and blocks anything suspicious. Think of it like a security guard at the door.
2. Access Control: Using usernames and passwords to ensure only authorized people can see certain data.
3. Physical Security: Locking server rooms, using CCTV, or using Kensington locks on laptops.
Key Takeaway Summary
Networks allow devices to share resources. LANs are local, WANs are wide. Data moves using Protocols (rules) through 4 Layers. We use Topologies like Star or Mesh to organize them, and Firewalls or Passwords to keep them safe.
Don't worry if the protocols seem confusing at first! Just remember that SMTP is for "Sending" (it starts with S) and HTTPS is "Secure" web browsing. You've got this!