BOOKLET 1 Flashcards

1
Q

LAN#

A

-Local area networks
-A network of computers that is spread over a small geographical area
-E.g. school

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of LAN#

A

-Devices dont have to be physically connetcted
-Additional devices can be added using a wireless card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages of LAN#

A

-Security can be a risk unless the system is password protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAN#

A

-Metropolitan area networks
-A small WAN that is optimised to connect computers within a large city or campus
-E.g. university

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAN#

A

-Wide area network
-A network of computers that are spread by large geographical distances
-E.g. the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server-based networks

A

A network organised around one or more servers. The server maintains a database of authorised users, passwords and access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Features of a server-based network

A

-There is a controlling node
-The client is a ‘dumb’ terminal
-Clients request resources
-The server then allocates the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of a server-based network

A

-Better security (all data stored on servers which hold access rights)
-Easier to update (data storage is centralised)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages of a server-based network

A

-Overloading (if the number of simultaneous client requests increases)
-Lacks robustness (if a critical server fails, client’s requests cannot be fulfilled)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Peer-to-peer networks

A

A network that provides shared resources such as printers and storage, but may offer little else in the wayof additional features such as file security. There is no controlling node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of peer-to-peer networks

A

-Low installation costs as there is no need to resource a dedicated server
-Robust
-Performance is greater as each node increases the bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantages of peer-to-peer networks

A

Low level of security as cannot be controlled centrally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIC#

A

-Network interface card
-Provides the physical connection between the network and the computer workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switched hub#

A

-‘Intelligent hub’ that sends data packets straight to the destination without being copied to all the computers
-Stores all the addresses directly or indirectly connected to it which increases network performance and offers greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Server functions#

A

-Stores all programs and data
-Logs all file accesses
-Controls access to software and user data
-Provides a backup facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Repeater#

A

-As electrical signals travel down a cable, their initially clean signal gets ‘smeared’ and indistinct with distance, the role of the repeater is to clean up the signal by regenerating it so it can pass long a further segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WAP#

A

-Wireless access point
-Networking hardwarre device that allows a wifi compliant device to connect to a wired network
-AKA hotspot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Media converter#

A

-Flexible and cost-effective devices for implementing and optimising fibre links in all types of networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP address#

A

-Internet protocol address
-Uniquely identifies any device connected to the internet
-Data is transmitted as packets, containing data in the ‘body’ and the IP address of the sender and receiver in the ‘header’
-Large ietms of data are split into several packets that are reassembled by the receiving device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MAC address#

A

-Media access control address
-Unique identifier assigned to network interfaces for communications at the data link layer of a network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Router#

A

-Used to determine an efficient route for data transfer between computer systems and to transmit web pages to users throughout the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP definition#

A

A protocol is a standard set of rules used to ensure the proper transfer of infromation between computers on the internet. It defines how data is to be structures and what control signals are to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP/IP#

A

The set of working practices that allow all internet users and providers to communicate with eachother whatever their equiptment is. Specifies how individula signals are sent over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP/IP functions#

A

-Used tpo transmit actual data packets on the internet
-Responsible for transmitting data between LANs ansd WANs regardless of the type of hardware and software being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TCP layer#

A

Responsible for the correct delivery of packets and reassessment of packets at the destination, if they are incorrect, an error message is displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IP layer#

A

Responsible for transferring packets of data from node to node, detects errors or lost data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Bus network definition#

A

Each network node is connected directly to a common/shared communication line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How does a bus network send data#

A

-The data is sent by one computer to the address of another computer
-Travels along the backbone until it reaches it’s destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Advantages of a bus network#

A

-Inexpensive as each node only requires a network card and cabling
-Easy to build and maintain
-Works well as long as traffic is light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Disadvantages of a bus network#

A

-A break in the main cable causes network failure
-Data packets can collide due to two nodes sending data packets at the same time
-Performance rapidly falls if traffic is high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do you add a new node to a bus network?#

A

The new computer is connected by it’s own cable to the backbone, causing the backbone to have to be broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ring network#

A

-There is no controlling node
-Each node can communicate with any other node in the network

33
Q

Sending data on a ring network#

A

-A token is passed around the network ready to carry data
-When it reaches a node with data to send, it picks up the data and travels around the ring to the destination
-A signal is then attached to the token and it returns to the node that sent the data
-The token is then free to move around the network again
-Nodes can add a message to a token or remove one if it is addressed to

34
Q

Ring networks are most suitable where…#

A

-Large number of nodes with heavy traffic, can transfer data quickly
-Where a cable fault must not disrupt the entire network
-Devices are frequently added or removed

35
Q

Advantages of a ring network#

A

-Very fast and reliable as there is no collisons because the data moves in one direction
-No node can dominate the network, so all can use the network without clogging

36
Q

How do you add an additional node to a ring network#

A

An existing connection between two nodes must be split, and a new computer added between the two connections

37
Q

Star network#

A

-Each node is connected to the central node by a dedicated line
-The central node is in control of the whole network

38
Q

Sending data on a star network#

A

-Central computer where all nodes are directly connected
-All data is sent to this central computer
-The central node redirects the data to the destination

39
Q

A star network is most suitable where…#

A

-Large number of computers with heavy traffic
-Where a cable fault must not disable the entire network
-Devices are frequently added and removed

40
Q

Advantages of a star network#

A

-If one node fails, none of the other nodes fail
-Easy to expand the network
-Collisions are greatly reduced since each computer is directly connected to the central node
-Security is high as the central node is in complete control

41
Q

Disadvantages of a star network#

A

-Failure of the central node causes failure of the whole system
-Network uses a large amount of cabling as each node is direcly connected to the central node
-Central node can be expensive and requires software

42
Q

How is another computer added to a star network#

A

If there is a free access point, the computer can simply connect the cable with no disruption to the system

43
Q

Protocols definition#

A

Protocols enable hardware devices from different manufacturers to pass data to one another in a coherent way using a strict set of rules and preocedures regarding data formats

44
Q

Communications software controls transmission by specifying:

A

-Speed of transmission
-Direction of data flow
-Type of parity used
-Which device has control
-How errors are detected/corrected

45
Q

Why do we need communications protocols#

A

Common standards led to open systems which allow users to use components from more than one manufacturer. Users are not restricted to one paerticular manufacturer

46
Q

Advantages of protocols#

A

-Can connect different manufacturer’s devices
-Users not confined to one manufacturer
-Greatly assisted the development of WANs
-Very effective for the communication and sharing of data

47
Q

Disadvantages of protocols#

A

-Prevents new enterprise/ stops innovation
-Agreeing a common standard can be time consuimg and difficult
-Protocol may not be the best but it happens to be the most common

48
Q

OSI model definiton#

A

A set of protocols allowing computers of different origins to be linked together

49
Q

OSI model functions#

A

-Each layer interacts only with the layer immediately beneath it and provides facilities for use by the layer above
-Each layer deals with a specific functionality (control is passed from one layer to the next)

50
Q

Wi-fi definition#

A

Wi-fi is a wireless networking technology that allows computers and other devices to communicate over a wireless signal, using radiowaves toprovide high-speed internent and network connections

51
Q

Wi-fi features#

A

-Enables two or more devices to connect wirelessly for data sharing
-It can connect wirelessly to a wireless router over a limited distance (60-90m)
-Wi-fi networks can either be open (anyone can use them) or closed (a password is needed)

52
Q

To set up a small wi-fi network you would need:#

A

-A broadband connection to the internet
-A router
-Wi-fi enabled computers

53
Q

Advantages of wi-fi#

A

-Ethernet LANs can be set up without cables
-Can be used to extend the range of a LAN
-Wi-fi hubs can act as hardware firewalls, giving an extra layer of security

54
Q

Disadvantages of wi-fi#

A

-If security is not properly configured, then anyone within a certain radius can access sensitive data
-Wi-fi transceivers may drain batteries in portable devices very quickly
-Devices on the edge of the hub’s range may be disconnected, unless repeaters are used

55
Q

Bluetooth definition#

A

A wireless technology for exchanging data over short distances. Bluetooth is an example of PAN technology, and is most associated with connecting mobile phones to earpieces or sharing data between handsets

56
Q

Bluetooth features#

A

-It uses radiowaves to send information between two devices in close proximity that have been paired together
-A protocol which defines the communications standard
-It uses very little power
-The range is affected by obstacles eg furniture and walls

57
Q

Advantages of bluetooth#

A

-Ad hoc networks are easy to setup
-Wireless devices such as phones, can share sound files,videos and images without being charged by a network

58
Q

Disadvantages of bluetooth#

A

-Security is low in cases where developers have been lax when implementing software, and even novice users haveaccess to security settings (no password=low security)
-Short distances (10m)

59
Q

Bandwidth definition

A

Bandwidth is the measure of the amount of data which a network or trasnmission media can carry at once (mbps)

60
Q

Features of fibre optic#

A

-Uses light
-Consists of glass or plastic wires bundled together and encased in a jacket
-Very secure form weather and hackers as it has cladding which reflects light back along the core
-Not susceptible to interference (cutting the sheathing will immediately disrupt the flow of data)

61
Q

Advantages of fibre optic#

A

-High bandwidth
-Less signal degradation
-Difficult to intercept
-Not subject to interferance
-Non-flammable
-Lightweight
-Flexible
-Non-corrosive

62
Q

Disadvantages to fibre optic#

A

-More expensive per metre than copper

63
Q

Error detection and correction

A

-Typically happen because of some sort of interference eg loose or damaged connectors/cables
-Many errors occur invisibly when a user transmits data, but the network protocols normally corrects them without user intervention

64
Q

Two strategies of error detection and correction

A

-Error detecting coding (Sending a small amount of redundant data that allows a receiver to deduce that an error has occurred)
-Error correcting coding (sending each block of data with a large amount of redundant data that allows the receiver to detect an error and deduce what the transmitted data must have been)

65
Q

Why is error detecting coding the most common?

A

Less redundant data is needed and retransmission is very quick and efficient in the event of an error

66
Q

Parity checking definition

A

The technique of checking whether data has been lost or written over when it’s moved from one place in storage to another or when transmitted between computers

67
Q

Parity checking technique

A

-A parity bit (8th) is added to each byte
-In an even parity, the total number of on or ‘1’ bits in every byte must be even , odd must be odd
-When data is moved from one location to another in memory, the parity bits are checked again at the receiving end, and if they are different, an error message is displayed

68
Q

Weakness of parity checking

A

In an even parity check, if the number of bits that have ‘flipped’ is even, no error will be detected

69
Q

Echo checking definition

A

When data is received, a copy is transmitted back to the sender where it is compared with the original. If it differs, the original data is retransmitted

70
Q

Disadvantages of echo checking

A

-The method is slow
-A character may have been received correctly by the host device and an error could corrupt it on it’s way back, the operator has no way of knowing where the error occurred
-Error correction is manual

71
Q

Checksum

A

-Data is transmitted over a transmission line between computers in blocks of approx. 256 bytes
-Each block has a mathematical calculation applied to it
-The remainder of this calculation is sent with the block of data as part of it’s header information
-The receiver performs the same calculation and the new checksum is compared against the transmitted checksum
-If the numbers do not match, an error is detected and re-transmission is required

72
Q

OSI model in order#

A

1- Physical layer
2- Data link layer
3- Network layer
4- Transport layer
5- Session layer
6- Presentation layer
7- Application layer

73
Q

Physical layer

A

Defines how a cable is attached to the network and what transmission technique is used to send data over the cable

74
Q

Data link layer#

A

Packages raw bits into frames and transfers them from one computer to another without errors

75
Q

Network layer

A

Ensures that packets of data are routed efficiently over the network and manages traffic problems

76
Q

Transport layer

A

Hnadles error recognition and recovery. Makes sure packets of data arrive at the correct destination in the correct sequence

77
Q

Session layer

A

Establishes dialogue between the two computers in a session using a communication link

78
Q

Presentation layer

A

Manages security by providing encryption and compresses data so that fewer bits need transferred on the network

79
Q

Application layer#

A

Represents services that directly support applications, such as database access and email