2.1 Networks including the internet Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a LAN (local area network)?

A

A LAN (Local Area Network) is a computer network that connects computers within a local limited area, such as a home, a school or an office building.

A LAN was traditionally connected via cables, meaning all devices had to be connected to a network port or another computer within the network system.

As technology developed, LAN networks allowed for local wifi connections, allowing devices to connect wirelessly to the local network connection. This allowed more flexibility on the number and type of devices that could connect to the network. (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Show understanding of the characteristics of a WAN (wide area network)

A

A WAN network (Wide Area Network) is a telecommunications network that extends the network device over a large geographical area.

The most common WAN network is the internet, as you are able to access it via a cabled or wireless connection anywhere in the world. Mobile broadband connections such as 4G and 5G allow mobile devices to access the internet from anywhere with a strong enough wireless signal, usually within range of an area’s telecommunications satellite.

WAN networks are also used within companies and organisations, allowing communications and file sharing across multiple campuses. InterHigh is a good example of a WAN as students and staff may access content anywhere in the world.

WAN networks typically consist of a number of LANS connected connected via public communications networks (telephone lines or satellites).

Because a WAN consists of LANs joined together, it may be private, requiring user IDs and passwords to access it. (e.g. InterHigh)

The internet is not a private network and consists of a number of decentralised networks and computers which have a common point of access, so that anyone with access to the internet can access devices on these networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What benefits are there to networking devices?

A

• Devices, such as printers, can be shared (reducing costs of the number of devices needed)
• Licenses to run software on networks are often far cheaper than buying licenses for an
equivalent number of standalone computers (e.g. Office 365)
• Users can share files and data
• Access to reliable data comes from a central source, such as a file server.
• Data and files can be backed up centrally at the end of each day.
• Users can communicate using email and instant messaging
• A network manager can oversee the network and offer support to user or apply/restrict access to external networks, such as the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the drawbacks of network devices?

A
  • Cabling and server connections can be expensive to initially set up.
  • Managing large networks can be a complex task
  • A breakdown of devices, such as file servers, can affect the whole network
  • Malware and hacking can affect entire networks (particularly if a LAN is part of a much larger WAN), although firewalls do offer some protection in this respect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Networked computers form an infrastructure which enables internal and external communications to take place. What is the network infrastructure?

A

Hardware:
• LAN cards, Routers, Switches, Wireless Routers, Cables
Software:
• Operation & management of a network, Operation of firewalls, Security
applications/utilities
Services:
• DSL (Digital Subscriber Line), Satellite communication channels, Wireless
protocols, IP Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are wireless access points (WAP)?

A

When connecting to a wireless network, devices known as Wireless Access Points (WAP), are connected into the wired network at fixed locations.
The WAP received and transmits data between the WLAN and the wired network structure.
As their connection is limited to within a short distance, many establishments require several WAPs to maintain a consistent wireless connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the client-server model

A

The client-server model uses separate dedicated servers and specific client workstations; client computers will be connected to the server computer(s).
Users are able to access most of the files, which are stored on dedicated servers. The server dictates which users are able to access which files, and can install software onto clients’ computers.

The model uses central security database with control access to shared
resources, and can be implemented on a large scale as they are easily scalable. Further, if someone deletes a shared resources from the server, a nightly back-up would restore the deleted resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The issues caused by bottle necking can become expensive if it causes disruption within a computer system. How can this be reduced?

A

Some methods for reducing this include:
• Segmenting the LAN into a series of virtual networks (VLANs) to distribute the
data load more evenly
• Cabling the network so the data travels between the appropriate switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the peer-to-peer server model

A

A peer-to-peer model does not have a central server. Each of the nodes on the
network can share its files/data and communicate with all the other nodes, and each node will have its own data. Because there is no central storage, and no requirement to authenticate users. The services available are listed on a nominated ‘look-up’ computer.

The provision of services to all other network users; the services available are listed on a nominated ‘look-up’ computer.
-When a node requests a service, the ‘look-up’ computer is contacted to find out which node can provide the required service.

A peer-to-peer model is used in workplace applications where no more than 10 nodes are required (e.g. a small business) where it is relatively easy for users to be in contact with each other on a regular basis. More than 10 nodes leads to performance and management issues.

Peer-to-peer offers little data security since there is no central security system. This means it is impossible to know who is authorised to share certain data. Users can create their own network node share point which is the only real security aspect since this gives them some kind of control, although there are no real authentication procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give two differences between the client-server model and the peer-to-peer model

A
  • Peers to be both suppliers and consumers (unlike the client-server model where consumers and resources are kept separate from each other)
  • Peers can participate as equals on the network (again this is different to the client-server model where a web server and client have different responsibilities)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The client-server model offers thin clients and thick clients. What are thin clients?

A

A thin client is heavily dependent on having access to a server to allow constant access to files and to allow applications to run uninterrupted.

A thin client can either be a device or software which needs to be connected to a powerful computer or server to allow processing to take place.

The thin client will not work unless it is connected at all times to the computer or server. A software example would be a web browser which has very limited functions unless it is connected to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pros and cons of a thin client

A

Pros
• Less expensive to expand (low-powered and cheap devices can be used)
• All devices are linked to a server (data updates and new software installation is done centrally)
• Server can offer protection against hacking and malware

Cons
• High reliance on the server; if the server goes down or there is a break in the communication link then the devices cannot work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a thick client?

A

A thick client can either be a device or software that can work offline or online; it is still able to do some processing whether it is connected to a server or not.

A hardware example is a normal PC/laptop/tablet since it would have its own storage, RAM and operating system which means it is capable of operating effectively online or offline.

An example of software is a computer game which can run independently on a user’s computer, but can also connect to an online server to allow gamers to play and communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pros and cons of a thick client

A

Pros
• More robust (devices can carry out processing even when they are not connected to the server)
• Clients have more control (they can store their own programs and data/files)

Cons
• Less secure (relies on clients to keep their own data secure)
• Each client needs to update data and software individually
• Data integrity issues, since many clients access the same data which can lead to inconsistencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a bus network topology?

A

A bus network topology uses a single central cable to connect all devices. It is easy to expand and requires little cabling, but data can only travel in one direction; so if data is being sent between devices, then other devices cannot transmit.

Bus networks are typically peer-to-peer and terminators are needed at each end to prevent signal reflection (bounce).

Each node looks at each packet and determines whether or not the address of the recipient in the packet matches the node address. If it is a match, the node accepts the packet; if not, the packet is ignored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What pros and cons are there of a bus topology network?

A

Disadvantages to bus networks include:
• If the main cable fails, the whole network goes down
• The performance of the network deteriorates under heavy loading
• The network is not secure since each packet passes through every node

Advantages of bus networks include:
• Even if one node fails, the remainder of the network continues to function
• It is easy to increase the size of the network by adding additional nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a star topology?

A

A star network uses a central hub/switch, which each node is connected to.
Data going from host to host is directed through the central hub/switch.
Each computer/device has its own dedicated connection to the central node
(hub/switch) – any type of network cable can be used for the connections.

A star network typically uses a client-server model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What advantages and disadvantages are there to a star topology network?

A

Disadvantages of a star network include:
• The initial installation costs are high
• If the central switch/hub fails, then the whole network goes down

Advantages of star networks include:
• Data collisions are greatly reduced due to the topology
• It is a more secure network since security methods can be applied to the central node and packets only travel to nodes with the correct address
• It is easy to improve by simply installing an upgraded central node
• If one of the connections is broken it only affects one of the nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain how packets are handled differently in a star topology depending if the central node is a switch or a hub.

A

If the central node is a hub, all the packets will be sent to every device/node on the star network – if the address in the packet matches that of the node it will be accepted; if not, it will be ignored (similar to a bus network)

If the central node is a switch, packets will only be sent to the nodes where the
packet address matches the recipient address. This is clearly more secure, since only the intended nodes will receive the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a mesh topology?

A

There are two types of mesh network topologies: Routing and Flooding

Routing works by giving the node routing logic (making them act like a router) so that data is directed to its destination by the shortest route and can be re-routed if one of the nodes in the route has failed.

Flooding simply sends the data via all the nodes and uses no routing logic, which can lead to unnecessary loading on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What advantages and disadvantages are there of mesh topology networks?

A

Disadvantages of mesh networks include:
• A large amount of cabling is needed, which is expensive and time consuming
• Set-up time and maintenance is difficult and complex

Advantages of mesh networks include:
• It is easy to identify where the faults on the network have occurred
• Any broken links in the network do not affect the other nodes
• Good privacy and security, since packets travel along dedicated routes
• The network is relatively easy to expand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a hybrid topology?

A

A hybrid network is a mixture of two or more different topologies (bus & star, bus & mesh, etc.)

The main advantages and disadvantages depend on which types of network are used to make up the hybrid network, but an additional disadvantage is that they can be very complex to install, configure and maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What advantages and disadvantages are there to a hybrid topology network?

A

Advantages of a hybrid network include:
• They can handle a large volume of traffic
• It is easy to identify where the network fault has occurred
• They are very well suited to the creation of larger networks

Disadvantages of a hybrid network include:
• very complex to install, configure and maintain.

Other main advantages and disadvantages depend on which topology types of are used to make up the hybrid network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is cloud computing?

A

Cloud Storage is a method of data storage where data is stored, managed, and processed on remote servers on the internet, rather than a local server or a personal computer – the physical infrastructure covers hundreds of servers in many locations.

The same data will be copied and stored in more than one location in case of server maintenance and repairs, allowing clients to access data at any time.
This process is known as data redundancy and will be carried out by a cloud hosting company to protect the data of their clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is private cloud storage?

A

Private Cloud storage allows a company to implement security measures across the company whilst keeping all of their files on a cloud server.

The storage on a private cloud will be provided by a dedicated environment behind a company firewall. The customer/client and cloud storage provider will be integrated and operate as a single entity.

A company that would use a private cloud is IBM. They will have their own dedicated service that will require logins for staff and clients. They are not hosted by Google or Microsoft and have their own dedicated infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is public cloud storage?

A

Public cloud storage is where the customer/client and the cloud storage provider are different entities/companies.

An example of this is the personal use of Google Drive or OneDrive. As a client/customer, you are not affiliated with either Google of Microsoft, but you are able to store and share your personal files using their cloud network.

27
Q

What is hybrid cloud?

A

Some companies will pay to use a service provided by a larger company such as Google or Microsoft, but will still have access restrictions to some of their content.

This is an example of a hybrid network, which combines elements of private and public clouds. Some data will reside in a private cloud, and less sensitive data can be accessed from a public cloud storage provider.

InterHigh is a good example of a hybrid cloud. Personal and sensitive information about staff and students will be securely stored on a private cloud, but files can be stored and shared using One Drive, making lesson content accessible to everyone affiliated with InterHigh.

28
Q

What advantages are there to cloud storage?

A
  • Customer/client files stored on the cloud can be accessed at any time from any device anywhere in the world (provided internet access is available)
  • No need for a customer/client to carry an external storage device with them, or use the same computer to store and retrieve information
  • Provide the user with remote back-up of data to aid data loss and disaster recover
  • Recovers data if a customer/client has a hard disk or a back-up device failure
  • Offers almost unlimited storage capacity
29
Q

What disadvantages are there to cloud storage?

A
  • If the customer/client has a slow or unstable internet connection, they would have problems accessing their data/files
  • Costs can be high if large storage capacity is required
  • Expensive to pay for high download/upload data transfer limits with the customer/client internet service provider (ISP)
  • Potential failure of the cloud storage company is possible – this poses a risk of loss of all back-up data - power cuts? natural disasters?
  • Security breaches/exploits such as the XEN security threat forcing reboots, leaked data, and permanent data loss
30
Q

What is bluetooth?

A

Bluetooth offers wireless communication between devices. It uses electromagnetic radiation as the carrier of data transmission.
Bluetooth sends and receives radio waves in a band of 79 different frequencies (known as channels). These are all centred on a 2.45 GHz frequency.

Devices using Bluetooth automatically detect and connect to each other, but they do not interfere with other devices since each communicating pair uses a different channel.

When a device wants to communicate, it picks one of the 79 channels at random. If the channel is already being used, it randomly picks another channel. This is known as spread spectrum frequency hopping.

To further minimise the risks of interference with other devices, the communication pairs constantly change the frequencies/channels they are using several times a second.

31
Q

When is bluetooth useful?

A

Bluetooth creates a secure wireless personal area network (WPAN). Bluetooth is useful when:
• Transferring data between two or more devices which are less than 30 meters apart.
• The speed of data transmission is not critical
• Using low bandwidth applications (for example, sending music files from a mobile phone to a headset)

32
Q

What is Wi-Fi?

A

Wi-Fi also uses spread spectrum technology. However, Wi-Fi is best suited to operating full-scale networks, since it offers much faster data transfer rates, better range and better security than Bluetooth.

A Wi-Fi enabled device (such as a computer or smart phone) can access, for example, the internet wirelessly at any wireless access point (WAP) or ‘hot spot’ up to 100m away. Wireless connectivity uses electromagnetic radiation: radio waves, microwaves or infrared.

33
Q

Wireless networks will operate on three levels of transmission: Bandwidth, Penetration and Attenuation. What is bandwidth?

A

Bandwidth refers to the range of frequencies within a given band. The higher the bandwidth, the more data can be transmitted over a given amount of time. Bandwidth refers to the volume of data on a network, not the speed.

34
Q

What is penetration?

A

Penetration measures the ability of the electromagnetic radiation to pass through different media.

35
Q

What is attenuation?

A

Attenuation is the reduction in amplitude of a signal (infrared, for example, would have a low attenuation because it can be affected by rain or internal walls.)

36
Q

Why use satellites in wireless networking?

A

Wireless connectivity uses electromagnetic radiation: radio waves, microwaves or infrared. The scale of frequency and wavelength of magnetic radiation is satisfactory for short distances – the electromagnetic waves carry the
signals – but the curvature of the Earth prevents these methods transmitting data globally. To overcome this problem, we need to adopt satellite technology.

The communication between antennae and satellite is carried out by radio waves and microwaves. Different frequency bands are used to prevent signal interference and to allow networks across the Earth to communicate through the use of satellites.

37
Q

What are twisted pair cables?

A

Twisted pair cables are the most common cable type used in LANs. However, of the three types of cables, it has the lowest data transfer rate and suffers from the most external interference (e.g. electromagnetic radiation).

Despite its drawbacks, it is the cheapest option. There are two types of twisted pair cable, unshielded and shielded.

Unshielded twisted pair cable is used by residential users.
They typically come in the form of standard ethernet cables.

Shielded twisted pair cable is used commercially. The cable contains a thin metal foil jacket which cancels out some of the external interference.

38
Q

What are coaxial cables?

A

Coaxial cables are the most commonly used cables in MANs and by cable television companies.

The cost of coaxial cables is greater than twisted pair cables, but they offer a better data transfer rate and are less affected by external interference. They also have about 80 times the transmission capacity of twisted pairs.

It suffers the greatest signal attenuation, but offers the best anti-jamming capabilities.

39
Q

What are fibre optics?

A

Fibre optic cables are most commonly used to send data over long distances, because they offer the best data transfer rate, the smallest signal attenuation and have a very high resistance to external interference.

The main drawback is the high cost. Unlike the other cable types, fibre optic uses pulses of light rather than pulses of electricity to transmit data. They have about 26,000 times the transmission capacity of twisted pair cables.

Fibre optic cables can be single- or multi-mode. Single-mode uses a single mode light source and has a smaller central core, which results in less reflection along the cable. This allows the data to travel faster and further, making them a good choice for a CATV and telecommunications. Multi core allows for a multi-mode light source; the construction causes higher light
reflections in the core, so they work best over shorter distances (in a LAN for
example)

40
Q

What benefits and drawbacks are there to wireless networks?

A

Pros
• It is easier to expand networks and is not necessary to connect devices using cables
• Devices have increased mobility, provided they are within range of WAPs

Cons
• Increased chance of interference from external sources
• Data is less secure than wired connections (it is easier to intercept radio aves
and microwaves, so encryption is essential to protect data [WEP, WPA2])
• Although improving, data transmission rate is slower than wired networks
• Signals can be stopped by thick walls and signal strength can vary or ‘drop out’

41
Q

What benefits and drawbacks are there to wired networks?

A

Pros
• More reliable and stable than wireless connectivity
• Data transfer rates tend to be faster with no ‘dead spots’
• Tends to be cheaper overall, in spite of the need to buy and install cable

Cons
• Devices are not mobile; they must be close enough to allow for cable connections
• Lots of wires can lead to trip hazards, overheating connections and disconnection of cables during routine office cleaning

42
Q

What other considerations may there be for wired/wireless networks?

A

• If mobile phones and tablets are connected to a network, it will need to offer Wi-Fi & Bluetooth connectivity
• There may be regulations in some countries regarding which wireless transmission frequencies can be used legally
• Permission from authorities and landowners may be required before laying cables underground
• There are numerous competing signals in the air around us; it is important to
consider this when deciding whether to go for wired or wireless connectivity

43
Q

What is a switch?

A

As with hubs, switches will connect a number of devices to form a LAN network (star topology). Switches are similar to hubs, but are more efficient or ‘intelligent’ in the way they distribute the data packet.

Unlike a hub, a switch checks the data packet received and works out its destination address (or addresses), sending the packet to the appropriate computer(s)

When first installed, a switch will begin by sending packets to all devices and will keep track of data traffic on the network to ‘learn’ which port each device is using as soon as devices start sending and requesting data.

Every device on a network will have a Media Access Control (MAC) address which uniquely identifies it. Data packets sent to a switch will have a MAC address identifying its source and destination; the switch will ‘switch’ between ports to send data to the appropriate devices only.

44
Q

What is a repeater?

A

Repeaters are devices which are added to transmission systems to boost the signal so it can travel greater distances without suffering from attenuation.

They amplify signals on both analogue (copper cable) and digital (fiber optic) communication links.

Repeaters can also be used on wireless systems. These are used to boost signals and prevent ‘dead spots’ in the Wi-Fi zone.

These devices plug into electric wall sockets and send out booster signals.
They are considered ‘non-logical’ as they will boost all signals which have been detected; they are not selective.

45
Q

What is a bridge?

A

Bridges are devices used to interconnect LANs (or parts of LANs), to another LAN that use the same protocol, often to function as a single LAN.

Bridges are used to interconnect LANs (or parts of LANs) since sending data to all possible locations would quickly flood larger networks with unnecessary traffic.

For this reason, a router is used to communicate with other networks (such as the internet), and bridges are used to distribute the data traffic across the LAN for local devices.

46
Q

What is a router?

A

Routers transmit internet and transmission protocols/enable data packets to be routed between different networks and allow private networks to be connected. For example, connecting a LAN to a WAN.

The router takes data transmitted in one format from a network (which is using a particular protocol) and converts it to a protocol and format understood by another network, allowing them to communicate via the router.

The role of the router can be summarised as follows:
• Routers restrict broadcasts to a LAN
• Routers act as a default gateway
• Routers can perform protocol translation (allowing a wired network to communicate with a wireless network by removing the ethernet protocol and assigning an IP address recognised by the wireless protocol)
• Routers can move data between networks
• Routers can calculate the best route to a network destination address\

The router inspects the data packets sent to it from any computer on any of the networks connected to it. Since every computer on the same network has the same part of an internet protocol (IP) address, the router is able to send the data packet to the appropriate switch, where the MAC address will be used to transmit the packets to the correct device.

Home internet connections will use small routers (also known as home hubs) to send data. These devices behave as routers and hubs since home networks rarely have additional switches for personal devices.

47
Q

What is a gateway?

A

A gateway is a network point (or node) that acts as an entrance to another network can be used to connect two or more dissimilar LANs (that use different protocols). It is a key point for data on its way to or from other networks.

The gateway converts data packets from one protocol to another.
Gateways can also act as routers, firewalls or servers – in other words, any device that allows traffic to flow in and out of the networks.

All networks have boundaries so that all communication within the network is
conducted using devices such as switches or routers. If a network needs to communicate outside of its network, it needs to use a gateway.

48
Q

What is a modem?

A

Modern computers work with digital data, whereas many of the public communication channels still only allow analogue data transmission.

To allow the transmission of digital data over analogue communication channels we need to use a modem (Modulator Demodulator)
This device converts digital data to analogue data and vice versa.

Wireless modems transmit data in a modulated form to allow several simultaneous wireless communications to take place without interfering with each other.

A modem will connect to a public infrastructure (cable, telephone, fibre-optics or satellite) and will supply the user with a standard ethernet output which allows connection to a router.

While the router will allow the creation of a network in a home, the modem allows for connection to external networks (the internet).
Routers and modems can be combined into one unit; these devices have the
electronics and software to provide both router and modem functions.
This is what many standard ‘home hub’ devices are, which is why you do not need to purchase two devices to create a home network.

49
Q

What is a softmodem?

A

A softmodem (software modem) is a modem which uses minimal hardware, instead using software that runs on the host computer.

The computer’s resources (mainly the processor and the RAM) replace the hardware of a conventional modem.

Hardware can be purchased to convert a standard PC into a host machine with a softmodem

50
Q

What is an NIC?

A

A network interface card (NIC) is needed to allow a device to connect to a network.

It is usually part of the device hardware and usually contains the MAC address
generated at the manufacturing stage. Wireless network interface cards/controllers (WNICs) are the same as the more ordinary NICs, in that they are used to connect devices to the internet and other networks.

They use an antenna to communicate with networks via microwaves and normally simply plug into a USB port or can be an internal integrated circuit plug in.

51
Q

What is the ethernet protocol?

A

Ethernet is a protocol used by may wired LANs. It was adopted as a standard by the Institute of Electrical and Electronic Engineers (IEEE). The ethernet standards are also know as IEEE 802.3.

A network using ethernet consists of:
• A node (any device on the LAN)
• A medium (path used by the LAN devices, such as an Ethernet cable)
• A frame (data is transmitted in frames which are made up of source address and destination address – the addresses are often MAC addresses)

52
Q

What are ethernet IP address conflicts?

A

When using Ethernet, it is possible for IP addresses to conflict.

This may occur if devices on the same network have been given the same IP address; without a unique IP address it is not possible to connect to a network.

Conflicts are most likely to occur on a LAN where dynamic IP addresses may have been used. Dynamic IP addresses are temporary and may have been assigned to a device on the network, unfortunately, another device using static IP addresses may already have the same IP address.

This can be resolved by re-starting the router. Any dynamic IP addresses will be re-assigned, which could resolve the issue.

53
Q

Ethernet supports broadcast transmission (communications where pieces of data are sent from sender to receiver) and are used to send messages to all devices connected to a LAN.

The risk is that two messages using the same data channel could be sent at the same time, leading to a collision. How was this issue attempted to be resolved?

A

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) was developed to try and resolve this issue.

Collision detection depends on simple physics: when a frame is sent it causes a voltage change on the Ethernet cable. When a collision is detected, a node stops transmitting a frame and transmits a ‘jam’ signal and then waits a random interval of time before trying to resend the frame. The CSMA/CD protocol will define the time interval.

54
Q

What is bit streaming?

A

Bit streaming is a contiguous sequence of digital bits sent over the internet or a network that requires a high-speed data communication link (fast broadband). Since bit-streaming often involves very large files (such as video) it is necessary for the files to undergo some data compression before transmission.

It is also necessary to have some form of buffering to ensure smooth playback of the media files. The data transmission rate from the file server (containing the video/media file) to the buffer (temporary storage area in the computer) must be greater than the rate at which data is transmitted from the buffer to the media player.

The larger the buffer, the better the control over the bit rate being sent to the media player. The media player will always check to ensure data lies between a minimum value (often referred to as low watermark) and a maximum value (high water mark).

55
Q

What benefits are there to bit streaming?

A

With bit streaming, there is no need to wait for a whole video or music file to be downloaded before the user can watch or listen to media.

There is no need to store large files on your device, as you can access them from a server. Bit streaming allows video files and music files to be played on demand (as required)

With bit streaming, there is no need for specialist hardware to access/store media on your device

Bit streaming has piracy protection (more difficult to copy streamed files over files stored on a hard drive)

56
Q

What drawbacks are there to bit streaming?

A

With bit streaming, you cannot stream video or music files if broadband connection is lost.

Video or music files will pause to allow the data being streamed to ‘catch up’ if there is insufficient buffer capacity or slow broadband connection.

Streaming uses up a lot of bandwidth

Security risks associated with downloading files from the internet

With bit streaming, there can be issues with copyright

57
Q

What is the difference between on-demand and real-time bit streaming?

A
  • Real-time - a live stream of an event that is currently taking place
  • On-demand - streaming of an event/programme that has taken place in the past
  • Real time – the event is captured live with a video camera connected to a computer
  • On-demand – Existing media are encoded to bit streaming format and uploaded to a dedicated server
  • Real-time – cannot be paused / re-wound, etc.
  • On-demand – can be paused / re-wound / fast forwarded, etc.
58
Q

What is the difference between the internet and the WWW?

A
  • WWW is a collection of interlinked, hypertext documents/webpages/multimedia resources (accessed via the Internet) //WWW is content from web servers organised as web pages
  • Internet is the global connection of interconnected computer networks
  • The Internet uses TCP/IP protocol / WWW uses http protocols to transmit data
59
Q

What hardware/software requirements are there needed to connect to the internet?

A

The fundamental requirements for connecting to the internet are:
• A device (computer, tablet or mobile-phone)
• A telephone line connection or a mobile network connection
• A router (or a router and modem)
• An Internet Service Provider (ISP) – this is a combination of hardware and
software
• A web browser

60
Q

What is PSTN?

A

Public Switched Telephone Network (PSTN) uses a standard telephone connected to a telephone line. The telephone line connection is always open whether or not anybody is talking – the link is not terminated until the receivers are replaced by both parties. Existing phone lines use circuit switching (when a phone call is made the connection/circuit is maintained throughout the duration of the call – this is the basis of PSTN

Telephone lines remain active even during a power cut; they have their own power source. Telephone lines are usually buried underground and link directly to the telecommunications providers. During a power-cut that may take place during a storm and affect the over-head cables that provide electricity to your home, the phone lines will continue to function underground unaffected by the weather. In order to maintain service, telecommunications buildings will often be equipped with backup generators to ensure the phone lines remain active in the event of a power outage.

61
Q

What is full duplex communication?

A

Although modern phone lines are beginning to switch to fibre optic cables, most telecom lines are coaxial.

Coaxial cables are still the most common form as it is difficult to replace cables that are underground or under the seabed.

Coaxial cables allow for full duplex communication as they contain up to 4 copper wires, meaning both communicating devices can send and receive data simultaneously. This full duplex communication is maintained by the twisted pair cables that are used to connect a manual phone to the phone line.

62
Q

Why may computer networks use PSTN for data transmission?

A
  • It allows for full duplex communication, meaning it is likely to be faster and more reliable
  • Without having to deal with data collisions, the network speed will be more
    consistent
  • PSTN establishes a direct connection between two communicating devices, allowing for improved security
63
Q

Why may computer networks not se PSTN for data transmission?

A
  • It is expensive to set up and maintain due to the number of connections and
    automated switches required
  • It would cause disruption to the dedicated telecommunications line as they are primarily used for phone calls (this was an issue with dial up internet connections)