1.3 - Networks and topologies

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

Completed flashcard set

Last updated 7:43 PM on 4/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

What is a network?

Give advantages and disadvantages for networking

A network is more than one computer system connected together allowing for communication and sharing of resources

Advantages:

  • Sharing of resources:

    • Folders and files can be stored on a file server so they can be accessed by authorised users from any computer on a network

    • Peripheral devices can be shared

    • Internet connection can be shared

  • Centralised management:

    • User accounts can be stored centrally on a server, meaning that users can log into any device on the network and access their account

    • Security can be managed centrally, ensuring all devices are up to date

    • Software (eg. security software (antimalware), applications) can be downloaded and distributed across a network, rather than having to install it individually

    • All files can be backed up centrally

Disadvantages:

  • Network infrastructure is expensive

  • Managing a large network is complicated

  • Malware may be able to infiltrate the network and infect every computer

2
New cards

Describe the two types of networks and given common examples for each

  • LAN (local area network)

    • Computer systems situated geographically close together

    • The network infrastructure is usually owned and managed the network owner (usually a single person or organisation)

Examples:

  • Home network

  • School network

  • Office network

  • Library/ cafe

Usually covers one building.

  • WAN (wide area network)

    • Computer systems situated geographically far away/ distant from each other

    • WAN’s often use third party communication channels

Examples:

  • The internet

  • National bank network

  • International supermarket chain network

3
New cards

Explain the factors that affect the performance of networks

  • Bandwidth

    • Bandwidth is the maximum amount of data that can be transferred over a network in a given time (usually Mbps)

    • If a network has a high bandwidth, large amounts of data can be sent and received at the same time, so things load faster.

    • If bandwidth is low, data has to queue until there is enough bandwidth for it to be sent, causing slow transfer speeds and buffering.

    • Bandwidth is shared between users

  • Transmission media: wired/wireless

    • Wired is faster and more reliable (as it uses a direct, stable connection, avoiding wireless interference and signal loss due to distance of obstacles), whereas wireless are slower as they are affected by interference

  • Number of users

    • The bandwidth is shared between users on a network; the more users, the less available bandwidth per person, so each user will not be able to send/ receive as much data across the network per given time, so the data will have to queue until there is sufficient bandwidth, causing slow transfer speeds.

  • Interference

    • Wireless networks send data using radio wave signals; interference occurs when those radio waves are weakened or disrupted

    • Walls/ objects can absorb or block radio waves, weakening the signal; a weaker signal means data may be lost so data may have to be resent, slowing the network

    • Other devices that use radio wave signals can cause their signals to overlap with the wireless computer system’s signals, causing data packets to become corrupted so data must be resent (binary data has been altered)

  • Latency

    • Latency is the time taken/ time delay between the transmission of data and when it is received at its destination.

  • Amount of data being transferred

    • If the amount of data being transferred is greater than the available bandwidth, packets will have to queue to be sent, causing slow transfer speeds

4
New cards

Describe the different roles of computers in a client-server and peer-to-peer network and give the advantages and disadvantages for both

Client-server network:

  • Client: A computer which requests services or resources provided by the server

  • Server: A powerful computer that manages and responds to requests from clients by providing services or resources required by any of the clients

Advantages:

  • Data backup, software updates and security can be controlled centrally on the sever (eg. downloading and deploying anti-malware to all clients, controlling access levels)

  • Hardware, software and resources can be shared across the network

  • The network allows for improved scalability, as more clients can easily be added to the central server

Disadvantages:

  • All clients are dependent on the central server, so if a fault occurs with the server, the whole network will go down

  • Malware (eg. viruses) can be spread quickly across the network

  • IT technicians may be required to manage and maintain the network; servers can be expensive

Peer-to-peer network:

Data is shared directly between computer systems without requiring a central server.

  • Peers: all peers have equal status and the same role in the network, so all are equally responsible for providing data.

Advantages:

  • Easy and simple to set up

  • Clients are not dependent on a server

  • Doesn’t need expensive IT technicians or a server

Disadvantages:

  • Data backup, software updates and security are not centrally controlled, so must be done individually for each computer

  • Poor security as each computer manages its own security (may have irresponsible users that cause virus’ to spread)

  • Less suitable for large networks, as it is may become difficult to connect every computer system to each other

5
New cards

Describe how data is transferred across networks

Data transmission is the process of sending data from one device to another over a network.

  • When sending data across a network, files are broken down into smaller parts called data packets

    • Each packet contains a portion of the data along with a packet header.

    • The packet header contains:

      • Destination IP address

      • Source IP address

      • Sequence number of the packet

      • Number of packets in the entire data

      • Error checking data

  • Routers receive packets and use the IP address in the packet header to determine the best, most efficient route to send the data; packets are sent individually and may take different routes to reach their destination

  • Data is transmitted from router to router across the network towards the destination

  • The destination device receives the data packets and as the packet may arrive out of order, the device uses the packet’s header to put them in the correct order and reassembles them back into the original file

  • If any packets are missing or have been corrupted, they will be re-transmitted

6
New cards

Name network hardware and explain their purposes

  • Wireless access points

  • Routers

  • Switches (and hubs)

  • NIC

  • Transmission media

  • Wireless access points

    • Provides a link between wired and wireless networks

    • Receives data from a network via its physical connection and then converts this data into radio waves which are then transmitted. It also receives radio waves and converts this data back and transmits it via its physical connection.

  • Routers

    • Used to transfer data packets by using the destination IP address in the packet’s header to determine the best route to transmit data, transferring data from router to router across a WAN

    • A router stores the IP address of each computer connected to it on the network and uses a routing table to calculate the quickest and shortest route to transfer data

  • Switches

    • A switch is used to connect devices together on a LAN

    • Receives packets from a device on the LAN, reads the destination address in the packet header and forwards it directly to its destination.

    • A switch generates a list of all of the MAC addresses of the devices connected to it when it receives data and must scan for a matching destination address before sending

An alternative to a switch is a hub, however a hub is slower and less secure as it forwards a copy of the received data to all connected nodes (not just directly to the destination).

  • NIC (Network interface card)

    • Internal piece of hardware required for a computer to connect to a network

    • Each NIC has a unique MAC address, which enables the device to be identified on the network, allowing it to send and receive data on the network

    • It converts data from the computer into signals that can be transmitted over the network and receives data from the network and converts it back into data that the computer can use

  • Transmission medium

    • Ethernet cables

    • Fibre optic cables (very fast, but more expensive and fragile)

    • Coaxial cables (older, slower, affected by electromagnetic interference)

The communication channel on which data is sent over affects network performance

7
New cards

What is the internet?

A global network of interconnected networks

8
New cards

What’s a URL?

Uniform resource locator

It is the address of a resource (the web page) on the internet.

It tells the browser the location of the server hosting the web page and the path to the resource.

9
New cards

What is the DNS?

The DNS (domain name system) is a system of servers and rules that translate human-readable domain names into their corresponding IP addresses.

The IP address tells devices the location of the web server where the website is hosted.

10
New cards

Explain how a user searches and receives a web page

  • The user enters the URL (uniform resource locator) into the web browser

  • The browser extracts the domain name from the URL

  • The browser acts as a client and sends a DNS lookup request/ query to the local DNS server to get the domain name’s corresponding IP address

  • The DNS server checks if it holds an IP address corresponding to the domain name, and if it does the DNS server returns the IP address to the browser

  • The IP address tells the browser the location of the web server where the website is hosted

  • The browser then sends a request to the web server of the IP address for the web page

  • The web server processes the request and responds by sending back the web page data

  • The browser receives the web page data and displays it

11
New cards

What is the DNS, whats a DNS server and how does it work?

The domain name service is a system that translates URLs into IP addresses; it is made up of multiple domain name servers.

A DNS server stores a list of domain names and the corresponding IP addresses of the location of the web server where the web site is stored.

  • A web browser send a DNS lookup request/ query to the local DNS server.

  • The local DNS server will check if it holds an IP address corresponding to that domain name, and if it does it will return the IP address to the web browser

  • If the local DNS server does not hold the IP address, the query is passed to another DNS server at a higher level until it is found

  • If the IP address is found, it is passed on to DNS servers lower in the hierarchy until it is passed to the local DNS server and then returned to the web browser

  • If not found, an error is returned and the web browser displays this error

12
New cards

What is the cloud? Give advantages and disadvantages for using the cloud

The cloud refers to storing and accessing data and software through networks of servers over the internet.

Cloud services run on remote servers hosted in off-site data centres maintained by third parties; data is stored on large servers owned by the hosting company.

Advantages:

  • Data can be accessed from anywhere in the world where there is an internet connection

  • Data can be shared with other people in different locations, allowing remote collaboration

  • Data is usually automatically backed up on the cloud provider’s servers

  • Users don’t have to purchase and maintain their own personal servers or storage

  • Easy to increase storage by upgrading subscription

Disadvantages:

  • You are dependent on having an internet connection to access data

  • Security risks as data is stored on external servers which could potentially be accessed by a hacker

  • Ongoing cost, subscriptions

13
New cards

What are network collisions?

  • A network collision occurs when devices attempt to send data at the same time on the same network segment

  • When this occurs, data packets interfere with each other, causing errors

  • Devices must stop, wait a random time and resend the data which slows down network performance

14
New cards

Describe the different types of network topologies and give their advantages and disadvantages

Star network:

  • Each computer system is connected to a central device (usually hub or switch) and transfers their data packets there; the central device looks at the destination address in the packet header and transfers the packets to the intended computer

Advantages

  • If one cable/ computer system fails, the other workstations are not affected

  • New computer systems can be added

  • Transfer speeds are fast as there are minimal network collisions

Disadvantages

  • Can be costly to install as there is lots of cabling and extra hardware (central device)

  • If the central device fails, the entire network goes down

Mesh network:

  • Each computer system is connected to every other computer system; data packets are transferred to the destination address along the quickest path, travelling from node to node

  • If a pathway is broken, there are many alternative pathways that the data packets can take

Advantages

  • If one cable or computer system fails, the data packets can take alternative routes to reach the destination address

  • Can withstand large amounts of data traffic due to large number of systems, connections and therefore alternative routes

  • Don’t have to pay for and maintain expensive central device

Disadvantages

  • Because of large amounts of cables, network can be expensive to install and maintain

  • Difficult to expand and add new devices as it means creating many new connections, which takes time and planning

15
New cards

Give the advantages and disadvantages for wired and wireless connections

Wired:

  • Restricted movement

  • Highest bandwidth, so better network performance/ faster transmission of large amounts of data

  • More secure (as people need to be physically close to and have a physical connection to access the network)

  • Less interference

Wireless:

  • Freedom of movement

  • Lower bandwidth, so worse network performance

  • Less secure (people can intercept radio wave signals without being physically close to the network)

  • More interference

16
New cards

What is Ethernet?

A wired technology used to connect devices together on a LAN using cables

17
New cards

What is Wi-Fi?

Wi-Fi is a family of wireless networking protocols that use radio waves to allow devices to connect to a LAN, which can provide access to the internet if the LAN is connected to an ISP through a router.

18
New cards

What is Bluetooth?

Bluetooth is a short-range wireless technology that allows devices to directly communicate with each other using radio waves.

Bluetooth devices typically have built-in radio antennas so they can send and receive signals from other Bluetooth devices.

19
New cards

Compare Ethernet, WiFi and Bluetooth

These are all standards.

Ethernet:

  • Highest bandwidth, so better network performance/ faster transmission of large amounts of data

  • Lowest amount of interference

  • No mobility

  • More secure

Wireless:

  • Bluetooth directly connects two devices together wirelessly, whereas WiFi connects multiple devices together wirelessly by connecting them to a LAN

  • Bluetooth has lower bandwidth, WiFi has greater bandwidth (wireless connections have a lower bandwidth than wired)

  • Bluetooth has less interference (frequency hopping), WiFi has more interference (radio wave signals from multiple devices can overlap and interfere with each other)

  • Bluetooth usually only works over a short distance, whereas WiFi works over a longer distance

20
New cards

Describe what encryption is

  • Encryption is the process of converting plaintext (original data)

  • into ciphertext (encrypted message)

  • using an encryption algorithm (the method for encryption the plaintext),

  • so that data cannot be understood by individuals without access to the key (a sequence of lettters, numbers and other characters used to encrypt or decrypt data).

Encryption is performed so attackers cannot understand information if the data is intercepted.

21
New cards

What are standards? Name some

Standards provide rules that allow hardware and software to interact, exchange data and interpret signals the same way across different manufacturers or producers.

  • Ethernet

  • WiFi

  • Bluetooth

22
New cards

What is a protocol?

A set of rules that define how devices communicate with each other on a network.

23
New cards

What is IP addressing? Describe the format of IP addresses

  • Every device on a network is assigned an IP (internet protocol) address, which is a unique numerical code

  • IP addresses can be dynamic, so they can change

IP addressing allows devices to be identified on a network and thus allows devices to send and receive data in the form of data packets; supports routing of data across networks.

There are two types of IP addressing: IPv4, IPv6

IPv4:

  • Four 8 bit segments of denary values (eight bits can give from 0 - 255 in denary); therefore (4 × 8) 32 bit address represented in denary

  • The four segments are separated by full stops

Eg. 145.13.218.102

IPv6:

  • Eight 16 bit segments of hexadecimal (four hexadecimal values 0000-FFFF), therefore (8 × 16) 128 bit address represented in hexadecimal

  • The eight segments are separated by colons

Eg. 736E:1029:A4B3:902D:77B2:72FF:AE62:0912

Summary:

IPv4 smaller, IPv6 bigger

IPv4: four of eight of denary, full stops

IPv6: (double that) eight of sixteen of hexadecimal, colons

24
New cards

What is MAC addressing? Describe the format of MAC addresses

  • Every networked device is assigned a unique MAC address, which is a unique hexadecimal number assigned to the NIC inside of the networked device

  • MAC addresses cannot change as they were assigned during manufacturing

MAC addresses uniquely identify physical devices on a LAN, allowing data to be transmitted and received by the correct devices.

Format of MAC address:

  • Six 8 bit pairs in hexadecimal, therefore (6×8), 48 bit address

  • Separated by dashes

Eg. 19-C2-D1-47-AA-38

25
New cards

Describe the format of IP addresses and MAC addresses

IP: IPv4, IPv6

IPv4:

  • Four 8 bit segments

  • Denary

  • Separated by full stops

IPv6:

  • Eight 16 bit segments

  • Hexadecimal (0000-FFFF)

  • Separated by colons

MAC addresses:

  • Six 8 bit pairs

  • Hexadecimal (00-FF)

  • Separated by dashes)

26
New cards

Describe the TCP/IP protocols

TCP (transmission control protocol):

  • Defines how messages are broken up into packets and reassembled at destination

  • Detects errors and resends lost packets

Allows packets to be sent and received between computer systems

IP (internet protocol):

  • Defines the location of a device on the internet

  • Addresses the packets with their source and destination IP addresses to allow individual packets to be routed from source to destination via routers

Allows devices to be identified on a network and packets to be addressed and routed so that they can be transmitted across networks and be received at the correct destination device.

27
New cards

Describe the HTTP and HTTPS protocols

Hypertext transfer protocol/ secure

HTTP:

  • Used to make a request for a web page; the server returns the page or an error code if there was a problem with the request

HTTPS:

  • Used to make an encrypted request for a web page; the server returns the encrypted web page or an error code if there was a problem with the request

28
New cards

Describe the FTP protocol

File transfer protocol

FTP:

  • It is used to transfer files across a network; used to upload or download files

29
New cards

Describe the email protocols

POP (post office protocol), IMAP (internet messaging access protocol), SMTP (simple mail transfer protocol)

SMTP:

  • Used to send an email to an email server; the server returns whether the email could or could not be delivered

POP:

  • Downloads emails from the server to the device

  • Deletes the emails from the server after downloading

  • After emails have been downloaded, they are no longer stored on the server and instead are stored locally on the device

This means that emails are now only downloaded on that specific device, so cannot be accessed from other devices even with the same email account. These emails can be accessed offline.

IMAP:

  • Stores emails on a server but synchronises devices with the email server

  • So users are able to view and manipulate emails as if they were stored locally

  • Emails remain on the server

Emails can be accessed from multiple devices as IMAP synchronises devices with the email server.

30
New cards

How are layers used in protocols? What are their benefits?

A layer is a division of network functionality - each layer provides a specific function to assist the transmission of data.

Benefits:

  • Layers are self-contained, so they allow different developers to work on a specific aspect of the network at a time, without needing to know how the rest of the layers function

  • Easier to identify errors in the network

  • Changes in one layer (eg. improvements) do not impact other layers

  • Each layer uses specific protocols, so using layers ensures that the protocols are applied in a specific order