1.5 Network Topologies And Protocols Flashcards
Authentication
Method for confirming users’ identities often by checking if their username exist and then there subsequent password
Encryption
Process of turning data from a human readable format to a non human readable format
Firewall
a software or hardware used in a network to prevent external users gaining unauthorised access to the system
MAC address
a hardware address that uniquely identifies each node on the network,
Ethernet
A standard communication protocol used in most lans
Ethernet work
data is sent in frames -> node will wait for connection to be quiet before sending -> if 2 nodes try send data at the same time they will stop and wait a random amount of time before reattempting -> faulty frames are rejected and resent
Ethernet frame
source and destination address, data and crc
TCP/IP
Protocol that connects computers to the internet and tells computers how to exchange information over the internet
TCP
provides reliable ordered and error checked delivery of a stream of packets
IP
rules used to pass packets from one host to another using the best route
HTTP
the protocol used for transmitting web pages over the internet
HTTPS
encrypts http traffic with ssl or tls
SMTP
protocol used to send electronic mail from server to serve pr on the internet -> message is removed from mail server once received
IMAP
protocol used by email clients in communicating with email servers. Leaves a copy of the message on the mail server
FTP
a protocol that inclusively used for sending files from a host to a remote computer
POP
a standard for retrieving email from an email server
TCP/IP Layers
Application -> adds the protocol that is used
Transport -> splits data into packets and gives them order
Network -> attaches IP address of sender and recipient
Link -> attaches the MAC address of the sender and recipient
Protocols
Set of communication standards that govern the transfer of data
Packets
information broken down into single units of data containing the source data and destination
Channels
there is 22Mhz division of a frequency band where signals can be sent
2.4Ghz Advantages and Disadvantages
Slower than 5Ghz
Greater range and coverage than 5Ghz
More interference from overlapping devices on the three channels
5Ghz advantages and disadvantages
Faster than 2.4Ghz
less crowded with 23 non lapping channels
Fewer devices can use 5Ghz
Less able to penetrate through walls
Asymmetric encryption NEW
Two keys, a public key is known for everyone for encrypting and a private key for decrypting - also known as public key encryption
Symmetric encryption
Same key used to encrypt and decrypt a message
Star network
central switch with many computers connected to it -> cheaper, break means problem if switch
Full mesh network
Where all computers / devises are interconnected - expensive and break does not a problem
Partial mesh network
where some devices and computers are interconnected, e.g not all connected to the printer - less expensive, withstand high traffic