Topic 3: Networks Flashcards
(41 cards)
LAN
Computer network that interconnects computers within a limited geographical area such as a building or a school.
PAN
Computer network for interconnecting electronic devices centered on an individual person’s workspace. Bluetooth for example. Can be wired or wireless.
WLAN and pros/cons
Wireless LAN
- Free movement
- Less expensive
- Less secure
WAN
Network that extends over a large geographic area for the primary purpose of computer networking. The best example is the Internet.
- Wired with fiber optic
- Wireless by microwaves or satellite transmissions
Extranet
Computer network that uses the Internet to allow controlled access by specific users to a specific LAN or WAN.
It can be used by an enterprise to secure part of its network and allow people from outside of the company to access to some data.
Intranet
Collection of private computer networks within a company, school, or organization.
- It uses the TCP/IP protocol.
- It main purpose is to facilitate the communication between individuals or work groups, and improve data sharing.
SAN
Network created so that large storage devices can be accessible from servers in a convenient and easy way.
- Secure high speed data transfer network
- SAN can be accessed from multiple servers
Importance of standards
Without standards, manufacturers of networking products have no common ground on which to build their systems.
Makes communication easier
Hub
Connection point for devices on a single network, which consists of sevral ports.
- Network devices and computer systems connect to a hub with a wire to a port.
- The data sent to a hub is copied and sent to all the other devices attached to it.
- The device that is expecting the data receives it, and the others just ignore the entering data.
- This slows down a network.
P2P
Distributed network where all the computer systems in the networks are both clients and servers at the same time.
Layers of OSI model
Physical (physical communication) Data Link Network Transport Session presentation Application (virtual communication)
VPN
Technology that creates a safe and encrypted connection over a less secure network, such as the internet.
Server
Can either be a computer system or a software app that provides a service to other computer systems connected to the same network.
Client
Can either be a computer system or a software app that requests a service from a server connected to the same network.
Protocol
Set of rules for data communication over a network to enable 2 or more devices understand eachother.
Used so that both sender and receiver are using/expecting the same formats/methods, to allow data to be transmitted successfully / without errors;
Protocol functions
Data integrity: Ensures that information has not been changed or corrupted.
Source integrity: Sender identity validated
Flow control: It ensures at which rate a node can transfer information in relation with the capability of other node to receive that information.
Congestion management: Modern networks avoids this collapses with some specifics applications.
Deadlock prevention: The protocol needs to stop both and requeue them so that they can happen sequentially.
Error Checking: Techniques used to detect noise or other impairments, while transmitting from the source to the destination. F.e. Parity bit
Deadlock
The situation where two nodes processes are trying to access the same node at the same time. This cause that neither of them can be processed.
Congestion
State where a network node or link is carrying more data than it can handle. This can cause:
- Deterioration of server quality
- Queuing delay
- Frame or data packet loss
- Blocking of new connections.
Data packet
Portion of a message that is transmitted through a network. Contains data such as check digits and destination address.
- Contains a set amount of data;
- Contains a fixed structure: Header, Data, Trailer
- Contains data that is to be sent via a communications channel;
- Contains specific details for transmission.
Parts of a data packet
Header: Contains instructions about the data carried by the packet (length, packet number, destination, protocol, origin…)
Payload/Data/Body: Actual data that the packet is delivering to the destination.
If a packet is fixed-length, then the payload may be padded with blank information to make it the right size
Footer/Trailer: Contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking.
What can affect transfer speed?
- Traffic: The more network traffic, the slower the data transfer on a particular connection will be
- Time of the day
- Distance
- Infrastructures
- Environmental issues (tempreature, etc)
- Data types transmitted (large files, streaming data…)
Bandwidth
Maximum rate of data transfer across a given path.
Throughput
The amount of data that can be sent and received within a specific timeframe.
Bottleneck
Occurs when the capacity of an application or a computer system is limited by a single component