1.3.3 Networks Flashcards
Protocol
“A set of rules that allow two devices to communicate.”
TCP/IP Stack
Transmission Control Protocol / Internet Protocol: “The most common general-purpose standard protocol that allows any networked computers (including those on The Internet) to communicate with each other whatever their equipment.”
DNS
Domain Name System: “The Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines access websites based on IP addresses.”
Protocol Layering
“The concept of a protocol not simply being a set of rules but those rules being built up into very specific layers and those rule layers behind built on top of each other in a deliberate order creating a layered protocol stack. This results in the rules of a protocol being executed in a specific sequence as you move through the protocol stack.”
LAN
Local Area Network: “A collection of computers / computing devices on the same network which are physically close together, for example, all located within one building or site e.g. a home or school network.”
WAN
Wide Area Network: “A collection of computers / computing devices on the same network which are spread out over a geographically large area, for example a university across several campuses, or a multinational corporation with offices / sites in different cities or even different countries.”
Packet Switching
“A method of sending data over a wide area network in which the message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.”
Circuit Switching
“A method of sending data over a wide area network in which two network nodes establish a dedicated communications channel through the network before the nodes may communicate. All data then follows this same path for the duration of the data transfer.”
Firewall
“A computer application used in a network to prevent external users gaining unauthorised access to a computer system.”
Proxies
“A computer application that accesses data on a different computer system or network. It controls the access of authorised users to data and allows the operation of the system to be isolated from control by external users.”
Encryption
“The process of making data in a computer system unintelligible.”
Client-Server
“A method of network organisation in which network stations make use of resources available at one or more servers.”
Peer to Peer
“A method of network organisation in which network stations can share resources on other network stations, so one station can use a printer on another station or save data on another station’s local storage.”