Flashcards in Networks Deck (74):
When two or more computers are connected together through a communication medium, either physically using a cable or wirelessly.
What is the purpose of a Computer Network?
To exchange information and data and to share network resources like printers.
A powerful computer that provides services to the other computers on the net work
Computers that use the service of a server. Less powerful than the server.
This describer how the computers are connected and provides a communication channel along which data can be sent.
Guided Medium: Cables- fibre optic, coaxial, CAT6
Unguided Medium: Wireless.
Can provide a wired and wireless connectivity.
Commonly referred to as a NIC- Network Interface Card
A formal set or written rules that control the communication process. There are different protocols for different purposes: mail, file transfer.
Transmission Control Protocol
Breaks data into small units called packets to be sent across the internet, puts packets in correct order at receiving end.
Provides an addressing scheme that is used to identify individual computers/networks on the internet.
Simple Mail Transfer Protocol
Post office protocol
Hypertext Transfer Protocol
Allows you to send website pages
Used for secure connections such as online banking
File Transfer Protocol
Used to copy files from one computer to another over a network.
Advantages of a Computer Network
• Sharing devices such as printers saves money.
• Files can easily be shared between users.
• Site (software) licences are likely to be cheaper than buying several standalone licences.
• Data is easy to backup as all the data is stored on the File server.
• Security is good - users cannot see other users' files unlike on stand-alone machines.
Disadvantages of a Computer Network
• Purchasing the network cabling and file servers can be expensive.
• Managing a large network is complicated, requires training and a network manager usually needs to be employed.
• Virus can spread to other computers throughout a computer network.
• There is a danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, e.g. a firewall
• The network has to be administrated.
Wide Area Network
It is created when LANs are connected.
Wide area network. The internet is a WAN.
Uses services of telecommunications companies i.e. BT, Virgin media
Local Area Network
A LAN (local area network) is a network of computers within the same building, such as a school, home or business. Uses physical cable or wireless.
PAN - WiFi - MiFi
Personal area network
Interconnects devices centred around an individual persons workspace- within 10m
Uses wireless technology such as Bluetooth
MIFI - wireless devices that enable multiple users to share a single mobile broadband connection while they are on the go.
i.e. personal hotspot
Defines the way in which all network devices are interconnected to create a LAN.
There are three main types: Bus, Star
Most used topology?
Star topology is most commonly used.
What is a bus topology?
In a bus network all the workstations, servers and printers are joined to one cable (the bus). At each end of the cable a terminator is fitted to stop signals reflecting back down the bus.
What is a star topology?
In a star network each device on the network has its own cable that connects to a switch or hub. A hub sends every packet of data to every device, whereas a switch only sends a packet of data to the destination device.
Advantages of Bus topology
-Easy to install
-Cheap to install, as it doesn't require much cable
Disadvantages of Bus topology
-If the main cable fails or gets damaged the whole network will fail.
-As more workstations are connected the performance of the network will become slower because of data collisions.
-Every workstation on the network "sees" all of the data on the network - this is a security risk
Advantages of star topology
- Very reliable - if one cable or device fails then all the others will continue to work.
-High performing as no data collisions can occur
Disadvantage of star topology
-Expensive to install as this type of network uses the most cable (network cable is expensive)
-Extra hardware required (hubs or switches) which adds to cost.
-If a hub or switch fails all the devices connected to it will have no network connection
Benefits of a wireless network
Portable, no wires
Drawbacks of a wireless network
Slower connection speed poor reception.
Benefits of a wired network
Drawbacks of a wired network
Client Server Network
A computer network in which one centralised, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. Reliance on server.
What is handshaking?
The process by which two devices initiate communications. Handshaking begins when one device sends a message to another device indicating that it wants to establish a communications channel. The two devices then send several messages back and forth that enable them to agree on a communications protocol.
Request to connect send,
Protocol parameters agreed,
Where the data originates
device used to transmit
cables or other method
Where data will be placed or displayed.
What are the five basic needs of a communication system?
The amount of data that can be sent from one point to another in a certain period of time. It is measured as a bit rate expressed in bits per second (bits/s). Is a measure of transmission speed.
The measure of how fast a change of state occurs i.e. zero to one
A data packet is a unit of data made into a single package that travels along a given network path. Data packets are used in Internet Protocol (IP) transmissions for data that navigates the Web, and in other kinds of networks.
Web browser that runs on users device and connects to a server as necessary. not secure.
a computer application such as a web server that runs on a remote server. secure.
4 security measures
Why is network security necessary?
protects your information.
What is encryption?
The process of converting information or data into code, especially to prevent unauthorised access.
a field that you use to sort data.
a set of instructions to solve a problem.
What is Authentication?
The process of identifying an individual, usually based on a username and password.
What is a MAC address?
a unique identifier assigned to network interfaces for communication at the data link layer of a network.
What is a white list?
a list of items that are granted access to a certain system or protocol. when someone isn't on the list they cannot log on.
What is a firewall?
a system designed designed to prevent unauthorised access to or from a private network.
What is a port?
an endpoint of a communication in an operating system.
What are the four layers in the TCP/IP protocol stack, in order?
Advantages to a layered approch
-each layer decomposes th problem
-changes in one layer does not impact the other layers
-provides a universal standard for hardware and software manufactures to follow
-Each layer carries out a specific function and therefore avoids repetition of tasks.
what does a 'suite' of protocols mean?
it consists of a number of protocols.They collectively allow data packets to be sent and retrieved.
closest layer to user
Is where applications such as web browsers and email clients operate.
data being sent is encoded so that it will be understood by the recipient.
an appropriate header is added, according to the protocol being used, before passing the data to the transport layer.
File transport protocol- determins rules for files being transmitted between computers.
Hypertext transfer protocol-used for accessing and receiving webpages in the form of HTML files.
Hypertext transfer protocol secure- combination of HTTP with secure socket layer (SSL).
This provides a layer of encryption to keep personal information secure, such as payment details.
simple mail transfer protocol - used for sending email messages from client to server and server to server until it reaches its destination.
Post office protocol- used by a client to retrieve emails from a mail server. All emails are downloaded when there is a connection between client and server.
Internet Message Access Protocol- similar to POP but messages do not have to be downloaded as they can be read and stored on the server. this is better for users with multiple devices as they can be accessed from all devices.
Sets up the communication between the hosts and agrees settings such as language and packet size.
divides data received from application layer into packets the correct size and adds packet information such as packet number and total number of packets.
Checks that packets arrive safely (TCP) and sends acknowledgements when receiving data.
Transmission Control Protocol- defines how messages are split into packets and reassembled at the destination.
detects errors and resends lost packets.
User Datagram Protocol- has no error checking or correction.
maintains an open connection between sender and receiver for the duration of the communication.
Often used for online gaming and live broadcasting where speed id desirable and error correction in not necessary.
Internet Protocol- identifies the location of a device on the internet.
Routes individual packets from source to destination via routers.
Concerned with transmitting the data through the local network using the protocols of the specific network.
The MAC address of the sender and recipient are attached to the data allowing the packet to be directed to a specific device on a local network.
This is where network hardware is located, such as the NIC, and the operating system device drivers.
refers to a suite of networking protocols used in LANs.
describes hoe devices should format data ready for transmission between computers on the same network
nodes wait until the connection is quiet before attempting to transmit
two nodes attempting to transmit simultaneously will stop and wait a random period of time before re attempting.
What protocols are in the application layer?
FTP, HTTP, HTTPS, SMTP, POP, IMAP
What protocols are in the transport layer?
What protocols are in the Network layer?
What protocols are in the link layer?