Book-Chapter 8 ISTM Flashcards
Computer Network
defined as two or more computers connected together to communicate and share resources
Clients
Consider a network made up of computers like desktops, laptops, and smartphones
Server
connected to a central computer called a
Node
Every device connected to a network is called a node
5 Reasons to use a Network
Economics, Software, Collaboration, Back Up, Internet
Network Interface Controller ( NIC)
The first of these is a Network Interface Controller (NIC) (shown below) card for each computer. The NIC is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers.
“network ready”
Most computers today are purchased “network ready” as they already come with an NIC
Ethernet Card
The most common NIC is called an Ethernet card
MAC (media access control) address
Ethernet cards provide the computer with a unique 48-bit address called a MAC (media access control) address, meaning that no two Ethernet cards have the same address; therefore, each computer on a network can be uniquely identified
“protocol”
When an Ethernet card is installed, a standard language (called a “protocol”) must exist in order for the connected computers to communicate; this is the second basic component of a network
“Physical Cable System”
The third component that all networks have in common is the physical cable system that connects them together.
Network Hub
A network Hub is the fourth component of a computer network, and the most common hub is an Ethernet hub. The hub, as the term suggests, is a central location of the computer network that serves as a traffic cop for network connection and communication.
Transmission Control Protocol / Internet Protocol ( TCP/IP)
The hub governs data travelling through network cables so that data collisions do not occur and so that the data is directed to the appropriate computer on the network’s/IP checks to see that the receiving computer accepts all of the packets that make up the spreadsheet and that the packets are in the correct order. If not, the spreadsheet will be corrupted and not usable for the receiving end user. TCP/IP guarantees the reliability of the computer file received by the network’s end user.
Packets
Because of the spreadsheet’s large file size, the network breaks the file down into smaller, more manageable pieces, called “ packets.”
User Datagram Protocol (UDP).
Since TCP/IP is too restrictive for video, UDP protocols are used instead. It is much faster than TCP/IP. However, UDP does not guarantee a file’s reliability.