21 Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Network

A
  • A collection of two or more computers connected together to share resources and data
  • An arrangement of computers and other devices connected together to share resources and data
  • All types of computer can be linked in networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network service

A

An app running on a server which provides facilities or operations such as data storage, printing or communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server

A

A powerful computer that provibes the network with services like
* storing files
* sending/receiving emails
Many networks include servers.

In client-server network, the server -
* Authenticate the user
* Give user access to the files that they have permitted to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are networks used?
Why computers are connected in a network?

A

A network can support multiple users accessing multiple services at the same time.
Network allows users -
* to access the internet
* to communicate with each other (through email or video)
* to access shared files among serveral users
* to read/write personal files on a central server (Network provides extra storage space and a back-up facility)
* to download data or updates to computer programs
* to send data to peripherals like a shared printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of network

A
  • PAN - Personal Area Network (My phone and car bluetooth)
  • LAN - Local Area Network (My home wifi)
  • WAN - Wide Area Network (Internet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAN

A

==================================

  • Personal Area Network
  • Network used for data transmission over short distance by computer devices, such as laptops, moblie phones, tablets, media players and printers
  • Devices may belong to oner person or serveral.
  • connection of local devices usually wirelessly by radio waves using Bluetooth

=================================

Examples:
* A smartphone connected to wireless earbuds for audio streaming
* A laptop connected to a smartphone for internet tethering.
* Using a smartphone to control a television
* Directly transferring files between two smartphones without needing a Wi-Fi router
* Printing documents wirelessly from a laptop to a Wi-Fi Direct-enabled printer.
* Controlling various smart home devices through a smartphone to manage home automation tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LAN

A

==================================

  • Local Area Network
  • A network that covers a relatively small geographical area, often a single site such as a home, a hospital, an office, a school or a factory
  • Connection of hardware (cables, routers,..), computers, servers and other hardware devices, usually owned by the organisation
  • Wireless Local Area Network (WLAN) at home

=================================

Examples:
* Home: A wireless router allows all the computer devices in a household to access the Internet and share devices such as printer
* Office: Enabling employees to share resources such as printers and files, communicate through email and VoIP, and access company servers for applications and data storage
* Business: Supporting the operations of a large organization, including file sharing, application hosting, communication, and data management across multiple departments and floors of a building.
* School: Facilitating access to educational resources, managing administrative tasks, supporting e-learning platforms, and enabling communication between students and teachers.
* Campus (University, Business): Connecting multiple buildings within a campus to provide seamless access to resources, support collaboration, and manage large-scale IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WAN

A

==================================

  • Wide Area Network
  • A network thet covers a large geographical area
  • Connection of two or more LANs (usually under a shared ownership)
  • Internet is largest WAN.

=================================

Examples:
* Employees on different sites communicating and sharing data
* A bank using a WAN to connect its ATMs, branches, and data centers globally for reliable and secure financial operations
* Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of network architecture

A
  • Client-server
  • Peer-to-peer (P2P)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Client-server network

A

==================================

A network that has at least one server (one powerful computer) to provide services to the client computers (individual computers)
The server -
* Authenticate the user
* Give user access to the files that they have permitted to access

Process of a client accessing data/ files from a server:
1. A client will make a connection/ connect to server using its address. The server will know the address of the client that is included in the connection request.
2. Then, the client will make a request for a service/ data to the server.
3. If the request is valid, the server will send the requested data to the client using the address from the initial connection request.
In short, client connects to server using its address&raquo_space; then request for service&raquo_space; If valid request, server serves the request
Additional steps, such as authentication may be required sometimes.

Example 1:
A wants to check her web-based email from her laptop.
1. She uses a web browser to access the website, hosted on a server.
2. The website serves a web page that asks for her username and password. (Authentication)
3. She enters and submit it to the server.
If correct details, the server serves the web page that display her emails and allows her to manage her email. (requested service)

Example 2:
B wants to buy a book from an online store using his smartphone.
1. B opens the online store’s app, which connects to the store’s server.
2. The server displays the store’s homepage with various book categories.
3. B selects a book, and adds it to his cart. The server processes the request and updates the cart. (requested service)

Example 3:
C wants to access her cloud-stored documents from her desktop computer.
1. C opens her cloud storage application, which connects to the cloud server.
2. The server displays a login page. C enters her username and password and submits them. (Authentication)
3. If the credentials are correct, the server displays her stored documents, allowing her to view, download, or upload files. (Requested service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Peer-to-peer network

A

==================================

A network that doesn’t have any dedicated servers
Each computer in P2P network can -
* act as both client and server
* provide a service (sharing some files, providing access to a printer)
* request service from any other computer

Examples
1. Some instant messaging systems that allows users to chat in real time where the messages are sent directly to each other
2. Users download and upload files simultaneously, such as movies, software, or large datasets, making file distribution faster and reducing the load on any single server like pirated websites
3. Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network topologies

A

The arrangement of connections between networked devices is referred to as the network topology.
* Bus
* Ring
* Star
* Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bus network topology

A
  • A bus network consists of a single cable to which each networked device is connected.
  • Messages are sent along the cable in the form of electronic signals.
  • At the end of each cable, there is terminator to absorb signals that have reached the end of the cable, preventing them from bouncing back and causing interference.
  • Only one message can be sent at any one time.
  • When more than one network devices send a message at the same time, a collision occurs, making all the messages unreadable.
  • It is used in modern cars and some aircraft.
  • CAN - Controller Area Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSMA/CD

A
  • Carrier Sense Multiple Access with Collision Detection
  • to deal with multiple devices sending a message at the same time in bus network
  • to minimize collisions and efficiently manage data transmission

How it works:
1. Check if bus is busy.
2. If not busy then send message, else go to 1.
3. Listen to see if message received correctly.
4. If message not received correctly then go to 5, else go back to listening for messages.
5. Wait any amoiunt of time, go to 1 to retry sending message.

Making each device wait any amount of time before checking whether it is safe to send, prevents the different senders from repeatedly sending at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages and disadvantages of bus network topology

A

Pros:
* Relatively cheap to install since only one cable is needed
* Easy to add/remove extra network devices
* Easy to implement
————————————
———————————————————

Cons:
* If the cable is damaged, the whole network will fail.
* It can be difficult to identify where a fault is on the cable.
* More devices&raquo_space; more collisions&raquo_space; slower
* Security risk: all data sent is received by all devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ring network topology

A
  • Network in which the** cable connects one network device to another** in a closed loop/ ring
  • Messages sent all travel in the same direction.
  • Data is passed from one device to the next around the ring untill it reaches its destination.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantages and disadvantages of ring network topology

A

Pros:
* There are no data collisions.
* Adding extra devices doesn’t affect the perfromance of the network.
* Easy to add extra network devices

Cons:
* If the cable is damaged/ a networked device fails, the whole network will fail.
* Adding/ removing a device invloves shutting down the network temporarily.
* It can be difficult to identify where a fault is on the network.
* More expensive to install than bus network as it requires more cable to complete the ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Star network topology

A
  • Each network device is connected to a central point (hub/ switch)
  • A central hub receives and directs messages to the correct recipients.
  • It is most widely used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Advantages and disadvantages of star network topology

A

Pros:
* A damaged cable won’t stop the whole network from working, just the network device connected to it.
* Security and efficiency: Switch sends the message to only the intended devices. Not all devices will see the message.
* It’s easy to locate faults.
* A new device can be added or removed without haveing to close the whole network down.

Cons:
* If the central point (hub/switch) fails, the whole network will fail
* It’s expansive to install as a lot of cables and switch or hub is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mesh network topology

A

In a fully connected mesh network,
every devices is connected to every other network device.
* A large number of failures could happen, and the rest of the network devices would still be able to communicate.

In a partially connected mesh network,
some network devices may be connected to multiple other devices or one device.
* The ability to carry on working correctly depends on how many connections to each device are avaliable.

  • Each device will pass the message on to the other devices within the network.
  • Very fault tolerant
  • Largest mesh network = Internet
  • are used to communicate between sensors in the IoT
  • esp devices are mobile
21
Q

Advantages and disadvantages of mesh network topology

A

Pros:
* Very fault tolerant (esp in fully connected): if one device fails, message can be rerouted.
* Very high performance: each network device is liekly to be connected to multiple other devices.
* In a wireless network, each node extends the range of the network.

Cons:
* Diffifcult and expansive to install wired network
* Can be difficult to manage due to the number of connecitons within the network.

22
Q

Communication media in network

A
  • methods used to connect and transmit data between computers and other networked devices
  • Wired
  • Wireless
23
Q

Wired communication media

A
  • Involve a physical conneciton between computer and the network
  • Copper wire: electrical signals
  • Fibre optic cable: light signals: transmit data faster and allows signals to travel over greater distancess

Pros:
* Reliable and stable network
* Not easy to intercept or eavesdrop on data
* Less prone to be interfernce or security breaches than wireless connectivity

Cons:
* Expensive to install and reconfigure
* Requires many cables at a premises
* ** Limit the mobility/ portablity** of connected devices

24
Q

Wireless communication media

A
  • doesn’t require a physical connection between devices.
  • Radio signals
  • ** Infra-red ligh**t: limited distances
    Methods:
  • Moblie phone network
  • Buletooth
  • WiFi

Pros:
* No cables needed
* Device mobility and flexible network access from various locations
* Easier to expand the range of the network.

Cons:
* Interference from other wireless devices can adverselt affect the performance.
* Walls, ceilings and other physical objects can adversely/negatively affect the performance
* Data is less secured, hence needs encryption to prevent eavesdropping or interception

25
Q

Network data speed and its merits

A
  • The speed that data can be transmitted through a communication medium in a network
  • bits per second (bps, b/s, bit/s)
  • Modern high-speed networks can transmit billions of bps.
  • Depends on bandwidth and latency

Being able to measdure the speed of a network allow to:
* estimate how long it will take to download/ upload a file
* discover whether an equipment upgrade is necessary.
* discover whether actual performance lives up to the promises made by the service provider

26
Q

Calculating the time needed to transmit a file

A

Time = file size (in bits) / network data speed (in bps)

Transmission speeds are not constant and other factors affect the speed&raquo_space; the results are only theoretical

27
Q

Bandwidth

A
  • The amount of data that can be carried on a network in a given period of time
  • The number of bits that can be carried by a connection in one second
  • bits per second
  • Higher bandwidth&raquo_space; more data can be transferred every second&raquo_space; faster uploads and downloads
28
Q

Latency

A
  • Any kinds of delay that data travelling through a network might encounter
  • The amount of time it takes to send data between devices
    Lower latency&raquo_space; smaller delays&raquo_space; faster data transmission
29
Q

Protocol

A
  • A set of rules that control how communications between devices on a network should be formatted and how data is transmitted and received

A protocol might contain details of:
* how each computer will be identified (its address)
* what route the data will take to get to its destination (routing information)
* how errors will be found and dealt with (error checking)
* whether each part of a message should be acknowledged as received correctly
* what to do if data isn’t received correctly
* how the data is to be formatted
* how the data is to be sequenced/ ordered
* how the speed of the sender and receiver can be sychronised

  • Email protocols (SMTP, POP3, IMAP)
  • Network protocols (Ethernet, Bluetooth, WiFi, TCP, TCP/IP, HTTP, HTTPS, FTP, UDP)
  • Internet protocols (TCP, TCP/IP, HTTP, HTTPS, FTP, UDP)
  • All the internet protocols are network protocols but not all network protocols are internet protocols.
30
Q

Email protocols

A
  • SMTP
  • Simple Mail Transfer Protocol
  • used for sending emails
  • details the format that messages are sent in, what commands email servers should understand and how they should respond to them
  • ensures that emails are properly routed and delivered
  • If a server is temporarily unavailable, SMTP will queue the message and attempt delivery later.

  • POP3
  • Post Offcice Protocol, Version 3
  • used for retrieving email from an email server to** a single device**
  • Download and Delete: POP3 downloads emails from the server to the client and usually deletes them from the server afterward.
  • Offline Access: Once downloaded, emails are stored locally on the device and can be accessed without an internet connection.

(The protocol used by a client to retrieve emails from a mail server where all the emails are downloaded when there is a connection between client and server)

  • IMAP
  • Internet Message Access Protocol
  • used for retrieving emails from a server, allowing users to access their emails from multiple devices
  • IMAP leaves messages on the server until the user deletes them.
  • Email Synchronization: IMAP allows emails to be stored on the server and synchronized across multiple devices.

(Messages can be read and stored on the message server unlike POP3, This is better for users with many different devices as they can be read from each other, rather than being downloaded to just one device.)

31
Q

Ethernet

A
  • Network protocol
  • A family of protocols that are used in wired LANs
  • cover everything from physical parts of a network (type of cable, type of connector) to the logical parts (how data is sent and checked for errors and the speed of data transmission).
32
Q

Wi-Fi

A
  • A digital communication protocol that sets out** how data is transmitted on wireless LANs**
  • Wireless Fidelity
33
Q

Bluetooth

A

A protocol for short-range wireless interconnection of mobile phones. computers and other electronic devices

34
Q

TCP

A
  • **Transmission Control Protocol **
  • is used for accessing web pages/ web browsing
  • sending/ receiving email
  • uploading/ downloading files
  • streaming media
  • Provides a reliable, ordered, and error-checked connection between computers
  • (reliable = receiving computer can ensure that it has received all the data that is correct)
  • Ordered Delivery: TCP ensures that data sent is received in the same order by the receiving computer (sends acknowledgements that each section of data has been received)
  • Error Checking: TCP uses checksums to detect and correct errors in transmitted data packets (to ensure that the data received is correct).
  • Flow Control: TCP allows the receiving computer to tell the sending computer to slow down transmission so that receiving computer has time to process the received data.
  • Ensuring data sent up to the application layer contains no duplicates and is in correct order.
35
Q

Checksum

A
  • A technique for finding errors
  1. A mathematical formula is applied to the data and the resulting value (checksum) is transmiited with the data.
  2. The recipient computer applies the same formula to the received data.
  3. It then compares the checksum sent with the data to the calculated checksums.
  4. If the checksums don’t match, the data is likely to have been corrupted. (data is incorrect)
  5. So, recipient computer requests the data again.
36
Q

TCP/IP

A
  • Transmission Control Protocol/Internet Protocol
  • A protocol stack/ collection of protocols that work together to interconnect network devices on the internet and private networks.

Application Layer
* Top layer of TCP/IP stack
* HTTP, HTTPS, FTP, SMTP, POP3, IMAP
* interacts with the user to provide access to services and data sent/ received over a network.
* encodes/ decodes the message into a form that sender/ receiver device will understand.
* Network application such as web browser or email programs operate at this layer.

Transport Layer
* Set up/ Manage communication between the two hosts over a network and they agree settings such as language and size of packets
* TCP, UDP
* Ensures reliable data transmission

In sending computer
* it breaks down the data into the packets
* Adds packet number and total number of packets (so that the recipient computer can use this information to assemble/ arrange the packets in the correct order and can check if there are any missing packets).
* passes the packets onto next layer

In receiving computer
* checks whether it receives all the correct packets in correct order or not
* request the resending of the packets if the data is incorrect services

Internet Layer/ Network Layer
* Handles addressing and routing of data packets.
* IP
* Addresses the data packets for transmission and routes the packets accross the network.
* In sending computer, it adds the source and destination IP addresses into the packet header (so that the network will know where to send the message, and where it came from.)
* In receiving computer, it removes the packet headers

(Data) Link Layer
* Handles **physical network hardware **
* Ethernet, Wi-Fi
* Actual network hardware (NIC/ Network Interface Card, Operating System Device Drivers)
* Adds source and destination MAC addresses to data packets.

37
Q

Packet

A
  • A small quantity of data being sent through a network
  • Data sent using TCP/IP is broken up into packets.
  • A packet header contains details of
    • Sending computer (source address)
    • Receiving computer (destinaiton address)
    • How many packets are being transmitted
    • The position of this particular packet
38
Q

Packet switched network

A

A network that moves data in packets

39
Q

HTTP

A
  • **HyperText Transfer Protocol **
  • The rules to be followed by a web server and a web browser when requesting and supplying information.
  • used when sending and receiving data between web browsers and web servers
  • used for sending requests from a web clinet (a browser) to a web server and returning content from the server back to the client
  • covers how data should ve formatted, what commands the web server and web browser should understand and how they should react to each command.
40
Q

HTTPS

A
  • HyperText Transfer Protocol Secure
  • Secure version of HTTP
  • The data sent between the web browser and the web server is encrypted
  • Prevents the data sent/ received from being read by a third party
  • Allows for communication between a host and client to be secure.
  • Helps the web browser and user know that they are communicating with an intended web server
  • Helps to spot out fake web servers that are trying to steal sensitive data sucha s bank details
41
Q

FTP

A
  • File Transfer Protocol
  • The rules that must be followed:
  • when** files are being transimitted** between computers over a network.
  • when sending web pages and other associated files that have been created on a web developer’s computer to the web server
42
Q

Benefits of using networking layers

A

Networking technologies are seperated into layers, each one containing specific hardware and software protocols.
Each layer perform specific tasks and interacts with adjecent layers.

Benefits:
* Dividing it into smaller functional parts&raquo_space; easier to understand the overall model
* easier to idenfiy and correct networking errors and problems
* Each layer is specialised to perform a particular function.
* One layer can be changed/ developed without affecting the other layers.
* The different layers can be combined in different ways.
* Provides a universal standard for hardware and software manufacturers to follow.

43
Q

Mobile communication

A
  • **Mobile/ Cellular network **
  • is wireless
  • is distributed through cells where **each cell includes a base station **(a fixed location transceiver)
  • provides wiresless coverage over a large geographical area
  • Each cell provides coverage of 9 and 21 miles.
  • GSM/ Global System for Mobile Communication to describe protocols used
  • 2G, 3G, 4G, 5G (generations)
44
Q

Handover

A
  1. When a user moves out of range of one base station, the signal falls.
  2. So, the base station makes a request to transfer control to another base station that is receiving strongest signals without notifying the subscriber.
45
Q

2G

A
  • First to use digital communication (digital signals)
  • Enabled text messages to be sent
  • Multimedia messaging service (MMS)
  • Usage: Voice calls, SMS, basic data services like WAP browsing and MMS
46
Q

3G

A
  • Increased data transmissions to 2Mbit/s
  • Wireless acces to the Internet
  • Video calls
  • Downloading
  • Streaming
47
Q

4G

A
  • Higher capacity
  • Support greater number of users at the same time
  • More immediate response to a user’s commands
  • A film took more than 5 hrs to download in 3g&raquo_space; took less then 8 minutes in 4G
  • Mobile gaming
  • Usage: HD video streaming, fast mobile internet, online gaming, video conferencing
48
Q

5G

A
  • smater, faster and more efficient
  • peak speeds of 100 Gbps
  • 100 times faster than 4g and most home broadband nwtworks
  • Lower latency
  • Usage: Ultra-HD video streaming, AR/VR, IoT, autonomous driving, enhanced mobile broadband, real-time applications