4.3.1 Networks Flashcards
what are the advantages and disadvantages of having a client server network?
Adv:
- BACKUPS and software installations can be done centrally
- in SEARCHING OF FILES: easier to find files as they are stored centrally
- in SECURITY: stronger as it is centralised and one person’s responsibility
- in terms of NETWORK SIZE: more efficient/ load tolerant for large networks
Dis:
- in terms of COST: more expensive as the servers are expensive to buy and maintain
- leads to higher OPERATING COST due to the higher cost of setup and maintenance
- harder to SET UP as the network operating system requires technical knowledge to set up and maintain
- there is a RELIANCE ON THE SERVER so if the server breaks down the network is unusable.
what are the advantages of a Peer-2-Peer network?
Adv:
- BACKUPS can not be made centrally which places responsibility on all users to back up their own data
- in SEARCHING OF FILES: hard to find files as they are not stored centrally
- in SECURITY: poorer security as resources are shared
- in terms of NETWORK SIZE: only suitable for very small networks (15 or less)
Dis:
- in terms of COST: no server needed so all the computers can be the same
- leads to lower OPERATING COST as less set up is required and maintenance is lower
- Easy to SET UP as the simplest of computer networks and can be set up by anyone
- no RELIANCE ON THE SERVER so need to worry about server breaking down
what are the factors that influence the choice of a network?
COST:
-the organisation will have to consider the costs involved -e.g Hardware costs (cabling, filer server, routers) or Staffing cost (network manager which is big cost)
HOW WILL THE SYSTEM BE USED?:
- need to consider are they going to use network for a wide range of applications? what type of applications will be used?
- will they need large data storage (shop/large catalogue of items)
- are they going to store a larger number of files
SIZE OF THE ORGANISATION:
- Needs can range from a LAN to a WAN
- some communications media are limited by the distance they have to travel
- amount of data processing must also be considered
EXISTING SYSTEMS TO INTEGRATE:
- often networks not developed from scratch
- network will need to be compatible with company’s existing system
- has to be able to work with the current OS & peripherals e.g printer, bar code reader
- they should check PC and peripherals can be used on new network
PERFORMANCE IN TERMS OF SPEED OF PROCESSING:
-if the new network is required for a real-time e-commerce system then the company may need a very fast speed of processing.
state the advantages and disadvantages of a Ring network
Adv:
- each computer has the same access as the other so no one computer can hog the network
- data flows in one direction so data transmission speeds are high which allows for fast transmission of large vols of data
- no collisions of data as data flows in one direction
Dis:
- faults are difficult to locate
- a break in the cable means a network will not work
- impossible to keep the network running when equipment is being added as there is only one path for data to flow
state the advantages and disadvantages of a Star network
Adv:
- fault tolerant: if one cable fails then the other computer can still be used
- load tolerant: extra computers can be added without much loss in performance as all computers have their own path to the server
- different speeds are possible on different spokes of the network
Dis:
- higher cost involved as the large amount of cabling that is needed is more expensive
- this topology is reliant on the central server
state the advantages and disadvantages of a Bus network
Adv:
- easy to install and add new devices within the network
- cost effective to a business as only cable is needed
Dis:
- if a large number of devices (e.g 15-20) are using the network, performance could be degraded
- if the cable itself is damaged, the network will not work
what are the advantages and disadvantages of wireless?
Adv:
- allows inexpensive LANs to be set up without cables
- allows employees the freedom of working anywhere a signal can be received
- ideal for networks in old listed buildings were cables would not be allowed to be installed
- as there is a global set of standards for devices, employees can use a variety of devices e.g Tablets, mobile phones etc
- Using wifi leads to tidier desktops as there is no trailing cables. good for health and safety
Dis:
- power consumption is high using wifi, means laptops soon exhaust their rechargeable batteries
- some people there are health problems using wifi
- wifi networks have a very limited range (apx. 150ft) as well as some building have wifi blackspots where connections are not possible
in remote management what does the network manager do?
- shut down workstations
- log off users who have forgotten to do so
- update, build or re-install software on workstations
- check to see that no unauthorised software is loaded on machines
- set regular times for virus scanning to be carried out
- clear printer ques remotely
- send instant messages to users of the network
what does the use of user accounts and logs allow the network manager to do?
- allows the manager or system to manage user accounts by ALLOCATING OF ACCESS LEVELS to users
- investigates instances of unauthorised access (i.e by hackers)
- identifies abuses of the systems by authorised staff (e.g downloading illicit material)
OR Auditing keeps a record of who has done what on the network -Auditing keeps record of who has logged on through their 'username' (WHO) And the details: -programs they have used -files accessed -changes made (WHAT) and from which machine -the times they logged on and off (WHEN)
Auditing:
Auditing keeps a record of who has done what on the network -Auditing keeps record of who has logged on through their 'username' (WHO) And the details: -programs they have used -files accessed -changes made (WHAT) and from which machine -the times they logged on and off (WHEN)
In software components what are the type of security strategies are used?
- lock computer rooms
- username and password
- virus and checker
- firewall
- data encryption
- real time check e.g email attachments