Chapter 5 - Network Topologies And Protocols Flashcards
How many layers are there in the layer concept?
7, 7 from client to receiver, then data makes its way back up the 7 layers to the receiver
What is a topology?
How all the nodes/ devices are connected to each other in LANs and WANs
What are the main types of topologies?
Bus stop topology, ring topology, double ring topology, full mesh topology, star topology, partial mesh topology
Which is the most basic of the topologies and least used and why?
A bus stop topology because if the main wire goes so does all the other devices, also it was hard for the devices to communicate
What is the problem with a ring topology? How was this fixed?
If one wire went down so did all the computers, this is why they introduced a double ring of wires, but this wasted cabling
What is a star network topology? Is it popular?
Yes, it is a popular topology. All devices are connected to one central hub so if one of the wires goes down only that computer goes down. However if the hub or centre goes down so do all the others
What is a solution to the faults in a star topology?
A partial mesh/ full mesh topology as they link other computers together so that if a wire goes down data has an alternate route to the computer
Which is better full or partial mesh? Why?
Partial as it is cheaper as it uses less wires and it is still almost as reliable
Name some advantages of WiFi
Users can move around freely, less expensive, convenient, uploads to social media is easy, larger number of users and devices can be added easily
Name some disadvantages of WiFi
Speeds are slower, signal can be disrupted/ obstructed, network is less secure , relies on strength of WAP (Wireless Access Point)
What is WiFi ?
WIreless FIdelity, it works by sending data on a certain frequency/ channel to the receiver
What is used to block interference from adjacent channels?
Filters
What do devices have to be doing in order to share data?
Be on the same channel
What is encryption and why is it used?
Encryption is when data is scrambled into a cipher using the “master key” ,created from the Service Set Identifier (SSID) ,and your password, then is decrypted by the client using the same master key. This master key is never transmitted in order to secure safety and security of the transmitted data
What protocol is used to insure the receiver of data has a valid master key?
A handshake protocol takes place before the transmission of data begins