1.5 Network Topologies, Protocols and Layers Flashcards

1
Q

Define topology

A

The technology behind the connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a mesh network?

A

Full – All devices are connected to each other.

Partial – Not all devices are connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of a mesh network?

A

1) No single point where the network can fail:
If the node in the route fails, the packet is sent a different way.

2) Can handle high volumes of traffic (why it’s faster).
3) Adding more nodes won’t hinder the process as all nodes help to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the disadvantages of a mesh network?

A

1) Expensive to set up - needs a lot of cables.

2) Hard to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a star network?

A

Each device is connected by an individual cable directly to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of a star network?

A

1) If a device fails, the rest of the network is unaffected.
2) Simple to add new devices.
3) Good performance.
4) Fewer data collisions.
5) Easier to manage from a central point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of a star network?

A

1) Switch depends on the network (switch dies = network dies).
2) Can be expensive for cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define encryption

A

A method of scrambling data with a key code which makes no sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is encryption used?

A

So if anyone intercepts other people’s packets, they would make no sense (the key is need to decrypt the packets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is packet switching?

A

Process of breaking down data and sending it in smaller “packets” then reassembling the data at the receiving end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the contents of the packets?

A

1) IP of origin location.
2) IP of destination.
3) Order (of packets).
4) Check Sum (checks correct number of packets have been).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which route do the packets take?

A

The fastest route; not the shortest (often differs for each packet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the sending device do?

A

Splits data into equal sized packets which will be given:

  • A number
  • The IP address of the receiver’s device
  • Error checking data.

The packets are sent across the network to the receiver’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the receiving device do?

A

1) Checks if all the packets have been received.
If they’re not received, it keeps checking.

2) Increments a timer and if the packets aren’t received in time, it sends timeout to the sender’s device.
3) If they are received, they order the packets numerically and display the sent thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IP address?

A

A unique string of numbers separated by full stops that identifies each computer using the internet protocol to communicate over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a Media Access Control address do?

A

Uniquely identifies a device on a network by identifying the network adapter that the device is using and assigns the IP address.

Each address is individual and is made up of 48 bits, written in hexadecimal for ease.

17
Q

Why can’t the owner change the MAC address?

A

Because it’s embedded into the device when it’s manufactured.

18
Q

What is a network protocol?

A

Defines rules and standards for data transmission.

19
Q

What is the TCP/ IP network protocol?

A

TCP/ IP (Transmission Control Protocol/ Internet Protocol):

Finds how data is sent and received over the internet.

20
Q

What are the client - server protocols?

A

HTTP (Hyper Text Transfer Protocol):
Makes the website work and defines how multimedia web pages are transferred over the internet.

HTTPS (Hyper Text Transfer Protocol Secure);
A more secure version of HTTP (adds another layer).

21
Q

What is the transfer files protocol?

A

FTP (File Transfer Protocol):

Transfers files between computers on the network.

22
Q

What are the mail protocols?

A

POP (Post Office Protocol) - Old
Retrieves emails from a remote mail server (local to the device) and must be downloaded to the device for it to be viewed.

IMAP (Internet Message Access Protocol) - New
Retrieves emails and the server holds it until it’s deleted.

SMTP (Simple Mail Transfer Protocol).
Sends emails between servers.

23
Q

What are the 4 different layers of TCP/IP?

A

1) Application Layer
Encodes data being sent so recipient understands it.

2) Transport Layer
Splits data into packets and adds info i.e. packet order and total no. of packets.

3) Network / Internet Layer
Attaches IP address of sender so recipient knows who sent it.

4) Link Layer
Attaches MAC address of sender and recipient, allowing packet to be directed to a specific device on a LAN.

24
Q

Why use layers?

A

1) It’s self - contained.
2) Allows different developers to concentrate on 1 aspect of the network.
3) A layer can be removed and edited without affecting other layers.
4) It promotes interoperability between vendors and systems.