computer networks, connections + protocols

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

What are the two types of networks?

  • LAN (Local Area Network)

  • WAN (Wide Area Network)

2
New cards

What are the characteristics of a LAN?

  • It connects computer systems over a small geographical area, like in a school

  • It is owned and managed by the network owner

3
New cards

What are the characteristics of a WAN?

  • It connects computer systems over a large geographical area, like in a country

  • It is often managed by internet service providers like BT

4
New cards

What is the largest WAN?

The internet.

5
New cards

What factors affect the performance of networks?

  • Number of devices connected

  • Bandwidth

6
New cards

What are the roles of computers in a client-server network?

The client is the computer that makes requests to the server.

The server is the computer that manages said requests and responds to them.

7
New cards

What are the roles of computers in a peer-peer network?

Each computer can act as a client or server.

8
New cards

What are the key pieces of network hardware?

  • WAP (wireless access point)

  • Router

  • Switch

  • NIC (Network Interface Controller/Card)

  • Transmission media

9
New cards

What is the role of a WAP?

To allow wireless (Wi-fi enabled) devices to connect to a wired network by creating a wireless local area network.

10
New cards

What is the role of a router?

To transfer data packets between different networks by:

  • connecting networks to the internet

  • assigning computers IP addresses

  • directing data packets using IP addresses

  • storing IP addresses in a routing table (to calculate most efficient way to transfer data)

11
New cards

What is the role of a switch?

To connect computers within a LAN by:

  • using MAC addresses to identify devices

  • sending data directly to an intended destination

12
New cards

What is the role of an NIC?

To allow a computer to connect to a network by having a unique MAC address and exchanging data between the device + network.

13
New cards

What is the role of transmission media?

To connect devices in a network together.

EX: ethernet cables

14
New cards

What is network topology?

The way in computers are connected in a network.

15
New cards

How are computers connected in a star topology?

Each computer is connected to a central server such as a hub or switch.

16
New cards

What are the advantages of a star topology?

  • If one device fails, all others are unaffected

  • Computers can be added to the network by directly connecting them to the switch

  • Improved security and performance as data is sent directly to the switch

17
New cards

What are the disadvantages of a star topology?

  • If the central server fails, the whole network will fail

  • Expensive to install wiring in larger networks as each computer requires a cable

18
New cards

How are computers connected in a mesh topology?

Each computer is connected to every other computer.

19
New cards

What are the advantages of a mesh topology?

  • If one cable/computer fails, data packets can take an alternative route

  • Traffic can take multiple other paths due to the number of possible routes

20
New cards

What are the disadvantages of a mesh topology?

  • Expensive and complex to set up due to the number of cables

  • Some connections may be unnecessary where the computers are unlikely ever to communicate

  • High maintenance due to the number of connections

21
New cards

What is the internet?

It is a global network made up of many other networks.

22
New cards

What is a domain name service (DNS) made up of?

Multiple domain name servers.

23
New cards

What is the role of a domain name server (DNS)?

To convert website URLs into IP addresses.

24
New cards

How does a DNS convert website URLs into IP addresses?

  1. A domain name is searched in a browser.

  2. A query is sent to the local DNS server for the corresponding IP address of the domain name.

  3. The local DNS checks whether it stores an IP address corresponding to that domain name.

  4. If yes, it passes the IP address to the browser.

  5. The browser then accesses the website by connecting to the IP address of the server.

25
New cards

What is the role of web hosting?

To provide clients with access to web pages 24/7 by storing website files on servers.

26
New cards

How does web hosting work?

A client requests access to a web page.

As a result, the server transfers the website file to the client in response.

27
New cards

What is the cloud?

A remote service provision that has multiple purposes like storing data, running applications and processing on remote severs.

28
New cards

What are the advantages of the cloud?

  • Ability to access files from anywhere and any device (with an internet connection)

  • Automatic built-in backups

  • Huge capacity and ability to increase it

29
New cards

What are the disadvantages of the cloud?

  • Require internet connection

  • No control over the way data your data is stored and high risk of a data breach by hackers

30
New cards

What are the two ways in which a network can be connected?

  • Wired connection (requires NIC)

  • Wireless connection (requires WNIC)

31
New cards

What is the most common type of wired connection?

Ethernet

32
New cards

What are the two most common types of wireless connection?

  • Wi-fi

  • Bluetooth

33
New cards

What are the benefits of using a wired connection over a wireless connection?

  • Faster data transfer speeds

  • More secure

34
New cards

What are the weaknesses of using a wired connection over a wireless connection?

  • Restricted movement of devices as they must stay connected

  • More expensive as it requires the physical installation of cables

35
New cards

What are the benefits of using a wireless connection over a wired connection?

  • Cheaper to install and easier to connect (more) devices as no cables needed

  • Free movement of devices as they are not restricted by a cable

36
New cards

What are the weaknesses of using a wireless connection over a wired connection?

  • Slower data transfer speeds

  • Less secure

  • Prone to interference

37
New cards

What is encryption?

The process of scrambling data into a coded format that can only be decoded using the correct decryption key.

38
New cards

What is the purpose of encryption?

To secure data across network connections (particularly wireless ones which are less secure).

39
New cards

How does encryption make a network more secure?

It ensures only authorised users have access to confidential data.

It protects data if it is intercepted during transmission as the attacker cannot decipher the data without the correct decryption key.

40
New cards

What is a (network) protocol?

A set of rules for transferring data across a network that enable computers to communicate with each other.

41
New cards

What are the most common protocols?

  • TCP/IP (Transmission Control Protocol/Internet Protocol)

  • HTTP (Hyper Text Transfer Protocol)

  • HTTPS (Hyper Text Transfer Protocol Secure)

  • FTP (File Transfer Protocol)

  • POP (Post Office Protocol)

  • IMAP (Internet Message Access Protocol)

  • SMTP (Simple Mail Transfer Protocol)

42
New cards

What is the purpose of the TCP/IP?

The TCP divides data into packets and reorders them back into the original data at the destination.

The IP uses the IP addresses of the devices on the network to route and address the data packets so that they arrive to the correct destination.

43
New cards

What is the purpose of the HTTP?

It transfers web pages from servers to browsers.

It’s used when you see "http://" at the start of a URL.

44
New cards

What is the purpose of the HTTPS?

It is the secure version of HTTP that encrypts data during transmission.

45
New cards

What is the purpose of FTP?

It enables the transfer of files between computers over a network.

It is commonly used to upload/download files to/from a web server.

46
New cards

What is the purpose of POP?

It deletes emails stored in the mail server once they have been received and downloaded to the device.

47
New cards

What is the purpose of IMAP?

It stores emails on a remote mail server so that they can be accessed from any device.

48
New cards

What is the purpose of SMTP?

It is used to send an email to or between mail servers.

49
New cards

What are the two types of IP addressing currently used?

  • IPv4

  • IPv6

50
New cards

What are the key features of IPv4 addressing?

  • Each address has 32 bits

  • Represented in denary

  • Four 8-bit segments (0-255)

  • Separated by full stops

EX: 145.13.218.102

51
New cards

What are the key features of IPv6 addressing?

  • Each address has 128 bits

  • Represented in hexadecimal

  • Four 16-bit segments (0000-FFFF)

  • Separated by colons

EX: 2001:DB8:3333:4444:5555:6666:7777:8888.

52
New cards

What is a MAC address?

A unique hexadecimal number assigned to an NIC inside a networked device.

53
New cards

What is the purpose of a MAC address?

It allows a network to uniquely identify any device each time it connects to it.

It cannot be changed like an IP address.

54
New cards

What is the format of a MAC address?

It is a 48-bit address made up of 8-bit hexadecimal pairs, separated by dashes.

EX: 00-1B-63-84-45-E6

55
New cards

What are standards?

A set of rules for computing that allow hardware and software to interact across different manufacturers/producers.

56
New cards

What is a protocol layer?

A division of network functionality.

57
New cards

What are the key features of protocol layers?

  • Each layer provides a specific network function to assist the transmission of the data being sent

  • Layers operate independently but work together

  • Data passes through multiple layers when sent over a network

58
New cards

What are the benefits of using layers in protocols?

  • Each layer functions independently:

    • allowing changes to one layer without affecting others

    • enabling developers to specialise in specific layers

  • Enables standards development for individual layers, ensuring compatibility

  • Allows manufacturers to develop hardware specifically for particular layers

  • Groups similar protocols together for better organization