Chapter 7.2 Network types Flashcards

1
Q

What is a LAN?

A

it is a local area network serves a local area. It is usually housed within a building or a number of buildings within a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Bus topology?

A

In this type of topology, all the nodes (computers as well as servers) are connected to the single cable (called bus), by the help of interface connectors. This central cable is the backbone of the network and is known as Bus (thus the name). Every workstation communicates with the other device through this Bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of Linear Bus Topology

A

1) It is easy to set-up and extend bus network.
2) Cable length required for this topology is the least compared to other networks.
3) Bus topology costs very less.
4) Linear Bus network is mostly used in small networks. Good for LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disadvantages of Linear Bus Topology

A

1) There is a limit on central cable length and number of nodes that can be connected.
2) Dependency on central cable in this topology has its disadvantages.If the main cable (i.e. bus ) encounters some problem, whole network breaks down.
3) Proper termination is required to dump signals. Use of terminators is must.
4) It is difficult to detect and troubleshoot fault at individual station.
5) Maintenance costs can get higher with time.
6) Efficiency of Bus network reduces, as the number of devices connected to it increases.
7) It is not suitable for networks with heavy traffic.
8) Security is very low because all the computers receive the sent signal from the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Star topology?

A

In Star topology, all the components of network are connected to the central device called “hub” which may be a hub, a router or a switch. Unlike Bus topology where nodes were connected to central cable, here all the workstations are connected to central device with a point-to-point connection. So it can be said that every computer is indirectly connected to every other node by the help of “hub”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of Star Topology

A

1) As compared to Bus topology it gives far much better performance, signals don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended destination after passing through no more than 3-4 devices and 2-3 links. Performance of the network is dependent on the capacity of central hub.
2) Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of the network. Similarly components can also be removed easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time its easy to detect the failure and troubleshoot it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disadvantages of Star Topology

A

1) Too much dependency on central device has its own drawbacks. If it fails whole network goes down.
2) The use of hub, a router or a switch as central device increases the overall cost of the network.
3) Performance and as well number of nodes which can be added in such topology is depended on capacity of central device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ring Topology?

A

In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop. Each workstation is connected to two other components on either side, and it communicates with these two adjacent neighbors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of Ring Topology

A

1) This type of network topology is very organized. Each node gets to send the data when it receives an empty token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in only one direction at very high speed.
2) Even when the load on the network increases, its performance is better than that of Bus topology.
3) There is no need for network server to control the connectivity between workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages of Ring Topology

A

1) Each packet of data must pass through all the computers between source and destination. This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) MAU’s and network cards are expensive as compared to Ethernet cards and hubs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Hybrid Topology ?

A

Hybrid Network topology is and why it finds its application in Wide Area Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of topology we integrate two or more different topologies to form a resultant topology which has good points(as well as weaknesses) of all the constituent basic topologies rather than having characteristics of one specific topology. This combination of topologies is done according to the requirements of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of Hybrid Network Topology

A

1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of topology. The part in which fault is detected can be isolated from the rest of network and required corrective measures can be taken, WITHOUT affecting the functioning of rest of the network.
2) Scalable: Its easy to increase the size of network by adding new components, without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the organization and by optimizing the available resources. Special care can be given to nodes where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in such a way that strengths of constituent topologies are maximized while there weaknesses are neutralized. For example we saw Ring Topology has good data reliability (achieved by use of tokens) and Star topology has high tolerance capability (as each node is not directly connected to other but through central device), so these two can be used effectively in hybrid star-ring topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disadvantages of Hybrid Topology

A

1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its not easy to design this type of architecture and its a tough job for designers. Configuration and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs are different from usual hubs as they need to be intelligent enough to work with different architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot of cables, cooling systems, sophisticate network devices, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is intranet?

A

An intranet is a private network that is contained within an enterprise.The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of Intranets to an organisation

A

1 Better internal communications - intranets can act as communication hubs for staff. Corporate information such as memos, staff news and announcements can be stored centrally and accessed at any time.
2 Sharing of resources and best practice - a virtual work space and community can be created to facilitate information storing, sharing and collaborative working. An intranet can also act as a training platform when providing online training content to staff.
3 Improved customer service - better access to accurate and consistent information by your staff can lead to enhanced levels of customer service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Extranet?

A

is an intranet for outside authorized users using same internet technologies. The outside users are trusted partners of the organization who have access to
information of their interest & concern.
It extends the intranet concept to provide a network that connects a company‟s network to the networks of its business partners, selected customers, or suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is extranet different from Intranets?

A

Intranets differ from extranet in that the former are generally restricted to employees of the organization while extranets may also be accessed by customers, suppliers, or other approved parties. Extranets extend a private network onto the Internet with special provisions for access, authorization and authentication.

18
Q

What are the different types of Extranet?

A

1 Public Network Extranet
2 Private Network Extranet
3 Virtual Private Network (VPN)

19
Q

Explain Public Network Extranet

A

Exists when an organization allows the public to access its intranet from any public network. Security is an issue in this configuration, because a public network does not provide any security protection.

20
Q

Explain Private Network Extranet

A

Is a private, leased-line connection bet. Two companies that physically connects their intranets to one another. The single advantage of this is Security. The single largest drawback is Cost.

21
Q

Explain Virtual Private Network (VPN)

A

Is a network that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees by using system called “tunneling”. Tunnels are private passage ways through the public internet that provide secure

22
Q

Companies can use an extranet to?

A

1 Exchange large volumes of data using Electronic Data Interchange (EDI)
2 Share product catalogs exclusively with wholesalers or those “in the trade”
3 Collaborate with other companies on joint development efforts.
4 Jointly develop and use training programs with other companies.
5 Provide or access services provided by one company to a group of other companies, such as an online banking application
managed by one company on behalf of affiliated banks
6 Share news of common interest exclusively with partner companies

23
Q

Some example uses for a VPN network include?

A

1 Access your computers, servers and files in your office from your home
2 Connect 2 or more remote offices together to
make it appear they are all on the same computer network. You’ll have access to all files stored on a server, access to all printers, etc.. It will seem like all remote offices are in the same building. Employees will have access to all resources on the computer networks of all offices setup in your VPN.
3 Work from a public hotspot, like at an internet
cafe, and still have access to your files, computers and servers in your office.
4 While on vacation or off-island you can have access to your files, computers and servers from anywhere in the world
5 If you have a dialup internet account, you can use your computer/laptop from a remote location to connect to your office using the public telephone network.
6 Work from home using your DSL or broadband connection while still having access to your office computer network

24
Q

How can A well-designed VPN can greatly benefit a company?

A

1 Extend geographic connectivity
2 Improve security
3 Reduce operational costs versus traditional WAN
4 Reduce transit time and transportation costs for remote users
5 Improve productivity
6 Simplify network topology
7 Provide global networking opportunities
8 Provide telecommuter support
9 Provide broadband networking compatibility
10 Provide faster ROI (return on investment) than traditional WAN

25
Q

How is intranet different from Internet?

A

The technologies used in Intranet and Internet may be same but the main difference between them is that the information shared in intranet can be access only by authorized persons especially members or employees of the organization or company where as in internet the information is shared world wide with any public user to explain in simple terms, intranet is private, within the organization while internet is public available for global access requirement.

26
Q

Wireless Networking: What is it?

A

To loosely define the term wireless networking is to say that it is any connection between two points for the purpose of transmitting information without any physical connection, i.e. fiber optics, copper wires, phone lines, etc.

27
Q

What is WLANs (Wireless local area networks)?

A

Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied. This
results in a much greater bandwidth than the signal would have if its frequency were not varied.

28
Q

what is Wi-Fi?

A

Wi-Fi is short for ‘wireless fidelity’. The term Wi-Fi refers to the technology used in most WLANs.
Wi-Fi is wireless networking-the ability to connect to a network or PC using radio waves instead of cabling

29
Q

How does Wi-Fi transmit data?

A

1 Data is translated into a radio signal and then transmitted.
2 A wireless router receives the signal and then decodes it.
3 The router then sends the data via cable using Ethernet protocols to the internet.
4 When data comes from the internet to the WLAN the router translates the data into a radio signal for transmission to a network device

30
Q

What is a wireless network interface controller?

A

Performs exactly the same functions as an ordinary NIC but communicates by transmitting data in the form of radio waves rather than using cables.

31
Q

What are the different features built into a wireless router?

A

1 Wi-Fi protected access (WPA) a complex encryption system
2 Wireless MAC address Filtering, which only allows access to the network by devices with certain MAC addresses.
3 ‘Invisible mode’configuration, so that wireless network cannot be scanned by outside wireless clients. In order to connect they will have to type in the wireless network name - if they can’t they will be unable to communicate with the router

32
Q

What is a Wireless access point?

A

A wireless access point (WPA) is a means of connecting wireless devices to a wired network. It plugs into the network via cable, which then provides all the facilities of that network to the wireless devices.

33
Q

What devices can be used in a WLAN?

A

1 Mobile phones
2 Printers
3 PDA’s
4 Portable media players

34
Q

What are the methods of Data transmission?

A

1 Spread spectrum radio wave transmission

2 The use of Inferred in WLANs

35
Q

What are WPANs?

A

A wireless personal area network (WPAN) is one which is of very limited size and used by one person

36
Q

What is MANs?

A

A metropolitan area network (MAN) is similar to a LAN in that it can be owned by one organisation, but it covers a much larger area than a conventional LAN and is often owned by a consortium of users.

37
Q

What is Virtual private Networks?

A

A VPN is not a physically private network, as it uses the internet or another WAN to transmit data. The data remains encrypted throughout its journey and is only decrypted at the destination computer. This is called tunnelling.

38
Q

What is tunnelling?

A

it is using a secure means to tunnel through a publicly accessible network.

39
Q

What is used in telephone call centers?

A

1 Voice over IP (VOIP)

2 Computer telephony integration (CTI) software

40
Q

What is Voice over IP?

A

it is employed to transfer calls from the server to the operator.

41
Q

What is Computer telephony integration (CTI) software>

A

1 It allows the operator to see who is calling
2 In addition, the server can identify thee number being dialed by the caller and direct it towards the relevant operator together with any data held on the system about the caller, for example account details in the case of a bank’s call center.