Module 1 Flashcards

Learning Unit 1 (39 cards)

1
Q

Physical vs Logical Topologies
- how roads are laid out vs route taken regardless of actual road layout

A
  • Physical Topology: the hardware layout of devices, cables, or radio signals in a network.
  • Logical Topology: how software manages access to resources and controls how data is transmitted across the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-To-Peer (P2P) Network Model: Key features and disadvantages
- neighbours delivering directly to each other without post office

A
  • Each device manages its own resources without centralised control.
  • Features:
  • simple to set up
  • low costs
  • ideal for small networks (<15 devices)

*Disadvantages:
- not scalable
- weak security
- hard to manage many users/resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client-Server Network Model
- everyone sends and receives mail through a central post office that manages all deliveries

A
  • Model uses a central server with a Network OS to manage access via a directory like Active Directory

*Benefits:
- centralised account and resource control
- scalable
- easier management and troubleshooting

  • requires more memory, processing, and storage (often use RAID) to handle multiple client requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Roles of a Network Operating System (NOS) in a client-server network
- postmaster running the central post office: manages routes, deliveries, and access

A
  • Manage data/resources for clients
  • Authorize and restrict user access
  • Enforce file access rules
  • Control login timing and location
  • Set communication rules
  • Provide apps and files to clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Client-Server Application
- system where the sender asks the post office to deliver a letter, and the post office handles the entire process from end to end

A
  • A client requests data or a service from a server over a network.
  • Involves at least two endpoint devices (e.g. PC, smartphone).
  • Can operate across different networks (e.g. Internet).
  • These applications are examples of network services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role of Protocols in Client-Server Communication
- agreed-upon mailing formats and delivery rules between the sender, the post office, and the receiver

A
  • Devices use protocols to communicate.
  • Protocols define how data is requested, transmitted, and received.
  • Client and server must agree on a protocol.
  • Two key protocols: TCP (Transmission Control Protocol) and IP (Internet Protocol).
  • Protocols are part of the TCP/IP suite.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web Services & HTTP/HTTPS
- Sending/receiving digital postcards or packages through express (HTTP) or secured (HTTPS) services

A
  • Web servers deliver web pages to clients (browsers) using HTTP.
  • HTTPS = HTTP + SSL/TLS for encryption.
  • Popular web server software: Apache, Nginx (Linux-based, open source), IIS (Windows Server).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Email Services & Protocols
- Standard mailboxes and mail trucks designed for email

A
  • Sending: SMTP (Simple Mail Transfer Protocol).
  • Receiving:
  • POP3: Downloads and removes email from server.
  • IMAP4: Manages email on the server.
  • Secure versions use SSL/TLS.
  • Examples: Microsoft Exchange Server (server), Outlook (client).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS (Domain Name System) Service
- phonebook that tells the post office where a person lives when you give their name instead of an address

A
  • DNS translates domain names into IP addresses.
  • Used to find web servers on the Internet or internal networks.
  • Provided by ISPs, companies, or public servers (e.g. Google DNS).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTP (File Transfer Protocol) Service
- courier service for sending large packages between businesses

A
  • Used to transfer files between client and server.
  • Not encrypted = insecure.
  • Browsers can act as clients, but apps like FileZilla or CuteFTP offer more features.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Database Services & SQL
- mailroom with filing cabinets; you send in a form (SQL query) asking for specific documents, and it finds and returns them

A
  • Databases store large amounts of organized data.
  • Accessed via a DBMS (Database Management System).
  • Uses SQL (Structured Query Language) to manage data.
  • Examples: Microsoft SQL Server, Oracle, MySQL.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote Access Services (Telnet, SSH, RDP)
- authorized individuals controlling the mailroom remotely to read or manage letters without being there in person

A
  • Allow users/admins to control remote computers.
  • Telnet: Unencrypted, outdated.
  • SSH: Encrypted, used in Linux.
  • RDP: Encrypted, used in Windows.
  • Used for remote support, troubleshooting, or software maintenance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LAN and Switch Basics
- local neighborhood post office and a sorting center that sends mail only to the intended local house

A
  • A LAN (Local Area Network) connects devices in a small area (e.g., office).
  • Devices connect to a switch via wired connections.
  • A switch forwards data only to the intended device(s), reducing traffic.
  • The physical layout with devices connecting to one central switch is called a star topology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hubs
- loud postman who shouts out every letter to every house, regardless of who it’s for

A
  • A hub is an outdated device that broadcasts data to all connected devices.
  • Hubs were once central points in star topologies but are inefficient.
  • Switches replaced hubs because they reduce unnecessary network traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Ports and NICs
- mail slots and personal mailboxes at each house (device) and the mail carrier tags that identify who they belong to

A
  • Network ports connect devices via network cables.
  • Ports can be built into the motherboard or added via NICs (Network Interface Cards).
  • NICs allow devices to communicate on a network and are sometimes called network adapters.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multiple Switches and Network Backbone
- several post offices connected by a superhighway for efficient mail delivery across towns

A
  • Networks can have multiple switches connected in series (daisy-chained).
  • The high-capacity connection between switches is called a backbone.
  • Backbones often use faster media and cabling to handle heavy traffic and longer distances.
17
Q

Types of Topologies
- bus: a single long street.
- star: all houses connect to one central post office.
- ring: houses arranged in a circle; each house passes the mail to the next.
- mesh: every house has a direct line to every other house

A
  • Star: Devices connect to central switch; easy to manage.
  • Bus: Devices connected in a line with backbone; vulnerable to backbone failure.
  • Ring: Devices form a circle; token controls who transmits; rare now.
  • Mesh: Devices connect to multiple others; very reliable but complex.
  • Hybrid: Mix of topologies (e.g., star + bus); flexible and scalable.
18
Q

Routers and Their Role
- smart post offices that decide the best route to send a letter across cities

A
  • Routers connect multiple networks and route traffic between them.
  • In small offices, consumer-grade routers connect LANs to the Internet.
  • Enterprise routers connect multiple LANs and have different network addresses for each network.
  • Routers act as gateways; switches only operate within one LAN.
19
Q

Nodes vs. Hosts
- nodes: any location involved in the mail process (sorters, trucks)
- hosts: the homes sending/receiving letters

A
  • A node is any network device that can be addressed (e.g., router, switch, computer). * A host is a node that provides or accesses network resources (e.g., server, computer, printer). * Networking devices (routers, switches) are nodes but not hosts; hosts are called end devices or endpoints.
20
Q

Types of Networks by Size
- LAN: Neighborhood mail delivery.
- MAN: City-wide delivery.
- WAN: Country-to-country delivery.
- PAN: Person-to-person delivery.

A
  • LAN: Local Area Network (small geographic area).
  • MAN: Metropolitan Area Network (LANs connected within a city or campus).
  • WAN: Wide Area Network (LANs connected over large geographic areas).
  • PAN: Personal Area Network (personal devices like smartphone and computer syncing).
21
Q

Other Network Types
- BAN: sending messages between gadgets on your own body
- SAN: private mail system just for moving big files between storage rooms (not for people)
- WLAN: sending neighborhood mail using drones (Wi-Fi) instead of mail trucks (cables)

A
  • BAN (Body Area Network): Wearable personal devices (smartwatch, fitness tracker).
  • SAN (Storage Area Network): High-capacity storage devices connected in a dedicated network.
  • WLAN (Wireless LAN): Two or more devices connected wirelessly.
22
Q

OSI Layer 7 – Application Layer
- you write the letter and decide what you want to say. (User interface)

A
  • Defines the interface between applications on different hosts
  • Uses protocols like HTTP, SMTP, FTP, DNS, Telnet, SSH, SNMP, RDP
  • Supports user-facing services (e.g., web browsing) and system utilities (e.g., SNMP monitoring)
  • Data exchanged is called the payload
  • Devices at each end are called hosts
23
Q

OSI Layer 6 – Presentation Layer
- you translate your message into a language the receiver understands. (Encoding/encryption)

A
  • Handles data formatting, compression, and encryption
  • Ensures the receiving application can properly interpret the data
  • Example: Email encryption handled by the email client or OS
24
Q

OSI Layer 5 – Session Layer
- you start the conversation by opening a channel with the receiver. (Start/end connection)

A
  • Manages and maintains communication sessions between applications
  • Ensures synchronization and recovery if messages are lost or corrupted
  • Example: Zoom uses the session layer to keep a video call active and stable
25
OSI Layer 4 – Transport Layer -you decide how the letter is broken into parts and tracked. (Delivery reliability like certified mail)
* Transports data between applications using TCP (reliable) or UDP (fast, unreliable) * Adds headers with port numbers for application addressing * Breaks large data into segments (TCP) or datagrams (UDP) * Uses encapsulation to package payloads for delivery * Example: TCP for email/web, UDP for streaming or network monitoring
26
OSI Layer 3 – Network Layer - you write the full address on the envelope. (Routing and IP addressing)
* Moves packets between networks using IP protocol * Adds IP addresses for sender and receiver * Routers operate at this layer * Supports fragmentation if packets are too large * Uses protocols like ICMP and ARP for routing and delivery
27
OSI Layer 2 – Data Link Layer - you attach the correct postage and hand it to the mail carrier. (MAC addressing and local delivery rules)
* Interfaces with physical hardware on the local network * Uses protocols like Ethernet (wired) and Wi-Fi (wireless) * Frames data with MAC addresses for source and destination NICs * Messages are called frames, with headers and trailers * Operates switches (Layer 2 switches) for local network traffic * MAC addresses identify devices only within the local network segment
28
OSI Layer 1 – Physical Layer - actual truck or plane that moves the letter physically. (Cables, radio waves)
* Transmits raw bits over wired or wireless media * Uses signals like wavelengths (Wi-Fi), voltage (copper cables), or light (fiber optics) * Handles the physical transmission details unique to the medium * Works with Data Link Layer on NIC firmware for wired vs. wireless differences * Analogy: Different road or flight systems for postal delivery
29
How OSI Layers Work Together - 7-step mail delivery system that gets your letter from sender to receiver
* Sending host adds headers & trailer around data (encapsulation) like putting a letter in an envelope * Data passes through devices (switch, router) to reach destination * Receiving host removes headers & trailer in reverse (decapsulation) before delivering data to application * Ensures data is properly packaged and understood end-to-end
30
Protocol Data Unit (PDU) Names by OSI Layer - different names for packages at different stages (e.g., envelope, box, crate) as mail moves through the process
* Layers 7, 6, 5 (Application, Presentation, Session): Payload or Data (L7PDU) * Layer 4 (Transport): Segment (TCP) or Datagram (UDP) (L4PDU) * Layer 3 (Network): Packet (L3PDU) * Layer 2 (Data Link): Frame (L2PDU) * Layer 1 (Physical): Bit or Transmission (L1PDU)
31
Fire Suppression Systems – Levels of protection:
* Building Level - Protects structure & personnel - Active: Fire extinguishers - Passive: Firewalls, fire-rated floors * Room Level - Sprinkler/gas systems triggered by 2+ detectors - Gas agents (e.g., FM-200) lower oxygen or absorb heat - Safe for electronics (no residue/toxins) * Rack Level - Targeted detection & suppression inside cabinets - Faster response o Less disruption & cheaper to reset
32
Additional Fire Safety Tools
* Emergency alert systems: Noise, lights, texts, emails * Class C fire extinguishers: For electrical fires * Emergency power-off switch: Use only when necessary to avoid data loss
33
Fail Open vs Fail Close
* Fail Open: Allows access during failure (e.g., fire exit doors) - Fail Open = Safety priority * Fail Close: Denies access during failure (e.g., credit card DB firewall) - Fail Close = Security priority
34
SDS (Safety Data Sheet)
* Formerly MSDS * Details safe use, handling & disposal of chemicals * Includes: First aid, fire response, exposure control, storage * Usually packaged with chemical or available online
35
Safety Precautions - General Guidelines
* Regulated by OSHA (Occupational Safety and Health Administration * Regulations for electrical safety require devices to be turned off and electrical supply locked out before employees work near these devices. * Other guidelines: - Wear protection - Keep tools in good condition - Use right tool and only if trained & authorized - Look out for trip hazards.
36
Safe Lifting of Heavy Objects
To avoid back injuries: * Face the most balanced side * Stand close, feet apart * Bend knees, keep back straight * Lift with legs, arms & shoulders — not back * Hold load close; don’t twist * Lower by bending knees, back straight
37
Protecting Against Static Electricity (ESD)
* Grounding: 3rd prong connects to earth → prevents electrical fire * ESD = electrostatic discharge - Can destroy (catastrophic) or weaken (upset failure) components - As little as 10V can damage hardware
38
Preventing ESD:
Preventing ESD: * Wear ESD strap clipped to chassis * No strap? Touch metal case often * Store parts in antistatic bags (not on top!) * Always shut down & unplug before working * Know field-replaceable vs non-replaceable components
39
7 Steps to Troubleshooting Network Problems: - step-by-step process to figure out why a letter didn’t arrive — from checking the address to inspecting the delivery truck
1. Identify the problem and its symptoms. 2. Establish a theory of probable cause. 3. Test your theory to determine the cause. 4. Establish a plan for resolving the problem. 5. Implement the solution or escalate the problem. 6. Verify functionality and implement preventative measures. 7. Document findings, actions, and outcomes.