Computer Networks Flashcards
WAN
Wide Area Network
Internet is what type of network
WAN
Largest interconnected networks
IP address
Internet Protocol address is the unique number - changes slightly as device moves location as location is needed to recieve signals
Packet switching
File is broken up into data packets and each packet has a header saying IP address to go and from and the number of packets in the whole communication and error checking data
Network Hardware
Routers
Switches
Network Interface Cards (NICs)
Routers and Switches
A router is in a WAN and send packets along routers to intended recipient
Switch in LAN sends packets locally using MAC address
NIC
Required to connect any network enabled device
Physical component that can operate wirelessly or use a standard Ethernet cable.
Each NIC has a media access control (MAC). Computer may have more than one - separate ones for wired and wireless.and maybe Bluetooth. How many digits in what data types?
12 digits in hex
WiFi stands for and advantages
Wireless fidelity
Mobility
Sharing files doesn’t need without having to be connected to a port
Expense time and inconvenience of laying cables through walls.
Instant data transfer is quicker - uploading to Facebook
Disadvantages of wireless nextworka
File transfer speed are slow
Obstructed by walls furniture and ceilings
Less secure
Easier to hack
Risks of wireless networks
Criminal activity - hacking
Bandwidth stealing - intruders use connection for their purposes slowing network down
Confidentiality - if encryption doesn’t occur before transmission an intruder can easily access
LAN BENEFITS
Sharing resources - store files on file server so they can be accessed by authorised users from any computer on network, peripheral devices like printers and scanners can be shared,intenet connection can be shared
Centralised management - user profiles and security, software distributed across network rather than manual installation,files can be backed up centrally.
LAN disadvantages
File server goes down, no one can access any files or do any work
Network falls could lead to data loss
Access may be slow because network traffic increases
Difficulty securing system from trackers
Viruses would affect every computer
Topologies
Different layout of interconnected computers
Star description and advantages
All the computers are connected to a switch by their own cable
One cable fails but won’t disrupt other devices
Consistent performance even during heavy use
Good security as data is only received by node it is sent to
Star disadvantages
Expensive because of switch and cables
If switch fails entire network goes down
Bus topology description and advs
All devices are attached to backbone main cable
Easy to install
Cheap
No reliance on central node
Bus disadvantages
If the main cable fails the whole network goes down
Cable failures are hard to isolate because all computers are affected
Traffic increases so performance is slow
Low security as every node can see all the transmissions
PAN
Personal are neat work like Bluetooth
Ethernet
Protocols used in LANs - describes data transmission
Nodes will wait until connection is quiet before contacting each other
Two nodes attempting to transmit simultaneously will stop and each wait a random period before attempting
Ethernet cables types advantages and disadvantages
Two types Ethernet - fibre optic and twisted pair copper
Copper - cheaper, rural areas use for telephones, speed is alright for most apps
Fibre optic - greater bandwidth, faster transmission, more durable, do not break as easily, only loses 3% of signal over 100m compared to 94% loss in copper
Network security methods
Authentication
Encryption
Firewall
MAC address filtering
Authentication
Username % strong password which contains numbers alphabets and symbols and is not shared with anyone - account locks after certain amount of failed attempts.
User Access Levels - some files are read only some can’t be accessed by lower clearances
Encryption plus terminology
Protects data from being hacked or used illegally
Changes then original msg (plaintext) using code into ciphertext
An encryption algorithm is used and the other computer must have the key to access the data