IB Computer Science SL - Topic 3: Computer Networks

This guide covers the key concepts for IB CS SL Topic 3, focusing on understanding different network types, transmission, protocols, and security. Estimated study time: 20-25 minutes.

3.1.1: Types of Networks

Networks connect computers (nodes) to share resources and communicate.

Basic Topologies (Physical Layout)

3.1.2: Importance of Standards

Standards are agreed-upon rules and specifications for hardware and software.

3.1.3: Layered Communication Model

Communication over networks is broken down into layers (like the OSI or TCP/IP model). Each layer performs specific tasks and passes data to the next layer.

Data is encapsulated (headers added) as it goes down the layers on the sending side, and decapsulated (headers removed) as it goes up on the receiving side.

3.1.4 & 3.1.5: Virtual Private Networks (VPN)

VPN (Virtual Private Network): A technology that creates a secure and encrypted connection (a "tunnel") over a less secure network, such as the internet, allowing users to access a private network remotely as if they were directly connected.

Technologies Required:

Evaluation of VPN Use:

Advantages

  • Security: Encrypts data, protecting it from eavesdropping on public networks (like public WiFi).
  • Remote Access: Allows users to securely access internal resources (files, servers) from anywhere. Enables telecommuting/remote work.
  • Bypass Geo-restrictions: Can make traffic appear to originate from the VPN server's location.
  • Anonymity: Hides the user's real IP address from websites/services.

Disadvantages

  • Speed Reduction: Encryption/decryption adds overhead, potentially slowing down the connection.
  • Complexity: Can require some technical setup (though many services simplify this).
  • Cost: Commercial VPN services often have subscription fees. Setting up a private one requires resources.
  • Trust: Users must trust the VPN provider not to log or misuse their traffic (for commercial VPNs).
  • Blocking: Some services or countries may block VPN traffic.

3.1.6 & 3.1.7: Protocols & Data Packets

Protocol: A set of rules that govern how data is formatted, transmitted, and received between devices in a network. Essential for communication. (Examples: HTTP, TCP, IP, Ethernet, WiFi).
Data Packet: A small unit of data transmitted over a network. Contains a portion of the original data plus control information (header/trailer) like source/destination addresses, sequence numbers, error detection codes.

Why Protocols are Necessary:

3.1.8: Variable Data Transmission Speed

Network speed (bandwidth/throughput) can vary significantly due to:

3.1.9: Data Compression

Compression: Encoding data using fewer bits than the original representation.

Why Compression is Necessary:

Types of Compression:

3.1.10: Transmission Media Characteristics

How data physically travels. Key characteristics: Speed, Cost, Reliability/Distance, Security.

Medium Description Speed Cost Reliability/Distance Security
UTP Cable (Ethernet) Twisted pairs of copper wires. Common in LANs. Good (100Mbps - 10Gbps) Low Moderate (~100m), Susceptible to EMI Moderate (Physical access needed)
Coaxial Cable Central copper core, insulation, braided shield. Cable TV/Internet. Okay (10Mbps - 1Gbps) Moderate Better than UTP (~500m), Less EMI susceptible Moderate
Fiber Optic Cable Transmits data as pulses of light through glass/plastic strands. Very High (Gbps - Tbps) High (Cable & installation) Very High (Long distances, km), Immune to EMI High (Difficult to tap without detection)
Wireless (Radio Waves - WiFi/Bluetooth/Cellular) Transmits data through the air using radio frequencies. Varies (Mbps - Gbps, depends on standard & conditions) Low (No cabling), Moderate (Access Points) Lower (Shorter range, affected by obstacles, interference) Lower (Signals broadcast, relies heavily on encryption - WPA2/3)

3.1.11: Packet Switching

The dominant method for data transmission on the internet.

3.1.12 & 3.1.13: Wireless Networking

Hardware & Software Components:

Evaluation of Wireless Networks:

Advantages

  • Mobility & Flexibility: Users can connect from anywhere within range.
  • Ease of Installation: No need to run physical cables. Quicker setup.
  • Scalability: Relatively easy to add new devices.
  • Cost (Cabling): Saves on the cost and effort of installing physical wires.
  • Standards: Global standards (e.g., WiFi 802.11 series) ensure compatibility.

Disadvantages

  • Security Risks: Signals are broadcast, making them easier to intercept. Relies heavily on strong encryption (WPA2/WPA3).
  • Interference: Signals affected by other devices (microwaves, cordless phones), walls, and distance.
  • Speed/Bandwidth: Often slower and less consistent than wired connections (though modern WiFi is fast). Bandwidth is shared among users on an AP.
  • Limited Range: Signal strength decreases with distance and obstacles.
  • Health Concerns (Debated): Some concerns raised about long-term exposure to radio frequencies (generally considered safe by most health organizations).

3.1.14: Characteristics of Wireless Network Types

3.1.15 & 3.1.16: Network Security Methods

Protecting networks and data from unauthorized access, use, disclosure, alteration, or destruction. Key concepts: Confidentiality (preventing unauthorized disclosure), Integrity (maintaining accuracy/completeness), Availability (ensuring access when needed).

Methods & Evaluation:

Important Note: Security often involves multiple layers (defense in depth). No single method is foolproof.