Professional Documents
Culture Documents
SLR 3 Workbook
SLR 3 Workbook
Resources
We recommend the AQA-endorsed text book from PG Online for use during your GCSE studies.
Craig 'n’ Dave videos for SLR 3
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
About networks
A computer network is: Two Computers Linked so that they can communicate with other computers and Share files.
Types of networks
Representation of a local area network (LAN): Representation of a wide area network (WAN):
A network that works over a very small geographical Area with a only a A network Comprised of many smaller networks that can traverse a
few Devices Very large Geographical Area.
Computers that are not connected to a network are called standalone computers.
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
Types of networks
A personal Area network is comprised of a few Devices and works within a set Radius
• Bluetooh
Advantages: Advantages:
Connections and speeds tend to be more reliable. Transfer speeds tend to be faster.
Easier to secure. Easier to share files, as physical connections are not required.
Far less complicated and disruptive to set up. Users can access this network from anywhere within range.
Disadvantages: Disadvantages:
Less convenient to share files, as a physical connection is required. Transfer speeds tend to be slower.
User location is limited by the need for a cable connection. More steps need to be taken to make sure it’s secure.
Printer
Workstation
Terminator
Server
Star network:
Advantages Disadvantages
Reliable if one device fails others will work Signals are sent to all devices instead of just the targeted device
High performance no data collisions Expensive to install as this type of network uses the most cable
Bus network:
Advantages Disadvantages
Easy to deploy and set up devices connect in a linear manner If the main Bus Backbone cable fails the network fails
Easy to extend Every workstation on the network sees all of the data on the network
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
Wireless networks
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
The original Ethernet used Coaxial Cable as a shared medium , while the newer Ethernet uses Twisted pair and fibre optic Links
with a switch to connect components together. Over the course of its history, Ethernet data transfer rates have been
increased from the original 2.94 megabits per second to 100 gigabits per second.
Systems communicating over Ethernet divide a stream of data into shorter pieces called a Frame .
Each contains a source and destination address and a cyclic redundancy check for error
Layer 3
IP Internet Protocol Provides routing of packets on a wide area network (IP).
(internet)
Layer 1
Layer 1
HTTP Hypertext Transfer Protocol A client-server method of requesting and delivering HTML files. (application)
(application)
UDP User Datagram Protocol Encryption and authentication for client-server data.
Layer 2 Layer 1
(transport) (application)
Layer 1
Layer 1 Used by email clients to retrieve email from a mail server, and (application)
SMTP Simple Mail Transfer Protocol
(application) to manage remote mailboxes.
Layer 1 Layer 2
(application) (transport)
TCP Transmission Control Protocol Provides an error free transmission between two routers (TCP).
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
The hardware and/or software for each layer has a defined responsibility.
Each layer provides a service to the layer above it. The advantages of layering include:
• Allows for categorising the Protocols therefore packets can be transfereed easier
• Allows for
TCP,
Link error Transport Link
layer IP handling layer layer
TCP,
UDP
IP routing
Internet Application Browser
layer layer
Twisted Application
pair, fibre layer Twisted
optic, Wi-Fi Internet
FPT, HTTP, pair
layer
SMTP, Transport
IMAP layer
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig'n'Dave
Network security
Making sure any network is secure is an essential task. By their very nature, networks are much more vulnerable to attacks
than a standalone system because a potential hacker could access any device of an unsecure network via a single
point of entry.
Once a way into a network has been found, the potential implications are serious, from the installation of malware causing corruption and
There are many goals to network security, but the two mains ones are to make sure authroized users are able to access
everything they need while preventing unathorized access to any area of the network.
Various methods and techniques can be used to help increase and maintain a networks security, including the use of firewalls ,
encrypting files and data traffic, implementing a robust and strong password policy and setting up
[picture here]
Encryption When it would be used: MAC address filtering When it would be used:
Encryption is a critical method in network On banking websites or MAC Address Filtering is a security Permit or deny network
security that involves converting data into important files that’s can technique used to control access to a accsess to the computer
a coded form to prevent unauthorized be accsessed easily if a data network based on the physical addresses
access. It ensures that even if data is breach coulkd occur (MAC addresses) of devices. Each network
intercepted, it cannot be read without the device has a unique MAC address, which
correct decryption key. can be used to permit or deny network
access.
Feedback
Breadth Depth Understanding
Some aspects complete Basic level of depth shown Some work is accurate
Little work complete Little depth and detail provided Little work is accurate
I can explain the difference between copper and fibre optic cables for wired networks.
I can explain what the Ethernet protocol family is and why it is important.
I can explain what the Wi-Fi protocol family is and why it is important.
I can describe the use of a range of common network protocols including TCP, UDP, IP, HTTP, HTTPS, FTP, SMTP and IMAP.
I can describe the four layers that make up the TCP/IP protocol model.
I can list which common network protocols operate at each layer of the TCP/IP model.
I can explain the need for and importance of network security.
I can explain the following method of network security: MAC address filtering.
My revision focus will need to be: