Computer networks, connections and protocols Flashcards

1
Q

Network

A

A network is two or more devices connected together with the purpose of sharing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of networks

A

Users can share resources such as printers and connections to the internet.
Users can access their files from any computer on the network.
Communication can be made easier via email and social networks.
Users can share files and folders such as central databases and spreadsheets.
Servers can be used to provide centralised backups, updates and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages of networks

A

There are increased security risks to data.
Malicious software can infiltrate the network and render it unusable.
Servers and switches can provide a central point of failure, resulting in users not being able to complete tasks using their computer.
Factors can impact the performance of the network such as the number of users and data on the network at one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local area network (LAN)

A

A local area network is a network which has a small geographical area. All of the hardware is owned by the company / organisation / household.
LANs use unshielded twisted cables, fibre optic cables or wireless connections (Wi-Fi).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wide are network (WAN)

A

A wide area network is a network which has a large geographical area. They are a connection of LANs joined together. Computers on a WAN are connected via routers. The hardware used to connect the networks together are not all owned by the same company / organisation / household for example telephone lines. WANs use fibre optic cables, telephone lines and satellite to connect the LANs together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Factors of network performance (number of users)

A

This is how many users are on the network at the same time. Too many users can cause the network to slow down if there is not enough bandwidth for all of the data being sent and received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Factors of network performance (bandwidth)

A

Bandwidth is the amount of data that can be sent and received at any given time. it is measured in bits per second. a smaller bandwidth means less data can be sent and the network can slow down, potentially to the point of becoming unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Factors of network performance (Latency)

A

Latency is the delay between data being sent and received. If there is a big delay between the two, more data will be on the network causing collisions. This can lead to even more packets of data being sent as the error rate has increased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Factors of network performance (error rate)

A

Error rate is the measure of how many packets of data do not reach their destination. An increased error rate occurs in less reliable connections - a poor wireless signal would be a contributing factor to an increased error rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Factors of network performance (transmission media)

A

Transmission media is the type of cable used in wired connections. Wired connections offer a higher bandwidth than wireless connections. The main option for transmission media are unshielded twisted pair and fibre optic. Fibre optic has a higher bandwidth than copper cabling as well as faster transfer speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Factors of network performance

A

Bandwidth, Transmission media, Error rate, Number of users and Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Local area network hardware

A

Network hardware is a selection of essential components that enable the connectivity and communication of devices within computer networks.
Router, Wireless access point (WAP), Switch, Network interface card (NIC) and Transmission media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Router

A

The router is responsible for routing data packets between different networks. The router connects networks together. The router can manage and prioritise data traffic, which can help to keep connections stable. The router will assign IP addresses to the devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless access point (WAP)

A

The wireless access point allows wireless devices to connect to a local area network. The WAP connects to a switch or hub via an ethernet cable. The WAP range is limited so the use of multiple WAPs can be used for complete complete coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switch

A

A switch allows multiple wired devices to connect to a local area network. The switch is an active device, which means it can inspect network data and route it to the correct devices, thus reducing traffic on the network. A switch can contain extra software to allow administration and configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network interface card (NIC)

A

The network interface card is required for a computer to connect to a network. A NIC can be both wired and wireless and allows your computer to send and receive data over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transmission media

A

Transmission media is the phrase used to describe the method of connecting a wired network.
Unshielded twisted pair (UTP), Coaxial (copper) and fibre optic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unshielded twisted pair (UTP)

A

A twisted pair cable is made up of insulated pairs of copper wires twisted around each other. Twister pair is low bandwidth and more affordable than the other two cables, so it is commonly found in local area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Coaxial

A

A coaxial cable (uses electricity) is medium bandwidth and more expensive than UTP. Coaxial cables are used to connect large scale networks such as telephone networks and digital cable / satellite television.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fibre optic

A

A fibre optic cable (uses light) unlike the other two, is unaffected by electrical noise making it the fastest in terms of data transfer. Fibre optic is high bandwidth and the most expensive. It is commonly used for high data volume networks and long distance connections such as between cities and countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Internet

A

The internet is a collection of networks spanning the whole world. The internet is the largest wide area network. The internet is used to provide connectivity and is different from the World wide web, which is a collection of web pages you access via a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does the internet work

A

In your home, you have a router. Inside the router is a modem which allows you to connect to your internet service provider (ISP) via a telephone line or fibre optic. An ISP is connected to a domain name system (DNS). This results in other routers also connecting together, forming a large interconnection of networks containing servers, other routers and other LANs. All of these inter connected networks are known as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Domain name system (DNS)

A

The domain name system is a directory of domain names and is used to translate human readable domain names to the numeric IP addresses that computers use. When you type a Uniform resource locator (URL) into your browser, the DNS translates the domain name into its associated IP address so your computer can connect to the server hosting the website. Without DNS we would have to remember the IP address of every site we want to visit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does DNS work

A
  1. URL entry
  2. DNS query - the web browser sends a query to the DNS server to translate the URL into an IP address.
  3. DNS resolver - it checks its cache to see it it has the IP address for the requested domain. If not it is sends the request to the DNS root server.
  4. Root server query - The root server directs the resolver to a Top level domain (TLD) server based on the extension of the URL.
  5. TLD server query - The TLD server then provides the resolver with with the IP address of the domain’s authoritative DNS server.
  6. Retrieve IP address - DNS server responds with the IP address for the requested domain.
  7. Request the web page - the web browser sends an HTTP or HTTPS request to the IP address it received.
  8. Server response - The server at the given IP address processes the request and sends back the data for the web page.
  9. Render the web page - The web browser renders the received data into the web page that you see.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Web servers

A

Web servers are dedicated servers that store web pages / websites and other resources. They have a dedicated IP address to ensure that users can access them 24/7.
The most common web servers in use are Hosting websites and Dealing with client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Clients

A

Clients are end users who make requests of web servers. For example a client may request a webpage such as www.patesgs.org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hosting

A

Hosting is the storing of websites, files and other content on servers. The servers need to be accessible by thousands of users and need to be available 24/7.
The servers must be reliable and secure from any form of attack.
The IP address for the server must remain the same so that users can access the website whenever they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Advantages of the cloud

A

Content in the cloud can be accessed from anywhere at any time.
Users can use any device to access their content.
Users have a large storage capacity available to them.
Low cost / free to set up and use.
Responsibility for backups and security is with the cloud service provider.
Users can easily collaborate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The Cloud

A

The cloud is a collection of servers which are used to store data, applications and files over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Disadvantages of the cloud

A

Accessing content and software is only possible when the user has an internet connection.
Expanding capacity can be expensive if using it across a business.
Vulnerable to security threats such as data leaks and photo leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network topologies

A

A network topology is the physical structure of the network.
It defines how the network hardware will be arranged to create the network.
Many different topologies have been used in the world of networking however, there are two popular topologies.
Star Topology
Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Star Topologies

A

A star topology has a central switch which all other devices connect to.
A switch is an intelligent device which ensures that traffic only goes to the intended device.
A star topology is commonly seen in most homes, businesses, organisations and schools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Advantages of star topologies

A

Fast data transfers to the hub as each wire isn’t shared with other computers.
If one cable fails, the other computers are not affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

disadvantages of star topologies

A

Requires additional hardware such as the central switch and network cables.
If the central switch fails, the whole network fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Mesh networks

A

A mesh topology allows all computers to be connected to all other computers
This is known as a full mesh network topology
LANs can make use of mesh networks however, they are more commonly seen in IoT devices such as wearable technology and smart home devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Advantages of mesh networks

A

No single point of failure - If any single cable stops working, the rest of the network will continue to work as the data can find a different route to get to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Disadvantages of mesh networks

A

The topology requires a lot of hardware, cables and switches to set up.
This means there is a higher cost for setting up the network
Adding new devices is not as easy as in a star topology, making it more challenging to scale the network.
The solution to these disadvantages is called a ‘Partial Mesh Topology’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Partial mesh networks

A

A partial mesh topology is very similar to a full mesh, with the difference being that each device is not connected to every other device directly
This means -
Less cables and hardware are required.
Multiple routes still exist between devices.
It is a compromise solution to reduce the amount of hardware needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Addresses

A

Devices on a network send and receive data, a device needs an address to ensure it sends data to the correct place
There are two types of network address systems:
IP Address
MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Internet protocol (IP) address

A

An IP (Internet Protocol) address is a unique identifier given to devices which communicate over the Internet (WAN)
IP addresses are dynamic, they can change.
IP addresses make it possible to deliver data to the right device.
A device connecting to a network will be given an IP address, if it moves to a different network then the IP address will change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

IPv4

A

Internet Protocol version 4 is represented as 4 blocks of denary numbers between 0 and 255, separated by full stops.
Each block is one byte (8 bits), each address is 4 bytes (32 bits).
IPv4 provides over 4 billion unique addresses, however, with over 7 billion people and countless devices per person, a solution was needed.

41
Q

IPv6

A

Internet Protocol version 6 is represented as 8 blocks of 4 hexadecimal digits, separated by colons.
Each block is 2 bytes (16 bits), each address is 16 bytes (128 bits).
IPv6 could provide over one billion unique addresses for every person on the planet.

42
Q

Media access control (MAC) address

A

A MAC (Media Access Control) address is a unique identifier given to devices which communicate over a local area network (LAN).
MAC addresses are static, they can never change.
MAC addresses make it possible for switches to efficiently forward data to the intended recipient.
Any device that contains a Network Interface Card (NIC) has a MAC address assigned during manufacturing.
A device connecting to a local network already has a MAC address, if it moves to a different network then the MAC address will stay the same.

43
Q

Packet switching

A

Packet switching is the process of breaking data down into packets, sending them across the Internet to another computer, and then re-assembling the data.
The file is broken down into data packets of 512 bytes.
Each packet is given a header containing: the IP address it is going to, the IP address it has come from, the sequence number of the packet, the number of packets in the whole communication and error checking data.

44
Q

Data packets

A

Each data packet contains the same number of bytes.
The packets may flow through the internet via different routes.
The packets may not arrive in the correct order so each packet is marked with a sequence number to be reassembled.

45
Q

Reassembling the data

A

The recipient computer reorders the packets into the correct order.
Each packet is checked for errors.
Corrupt packets are requested to be resent.

46
Q

Moving packets on the net

A

Points on a network diagram are called nodes.
Routers are any node that can route packets from one place to another.

47
Q

Wireless mesh networks

A

Only one node requires a wired internet connection - no other cabling or infrastructure is required.
The more nodes that use the network, the more routes there are for data to travel through.
A node within broadcast distance of three other nodes will have triple the standard bandwidth.
As the distance between two nodes is halved, signal strength becomes 4 times stronger.

48
Q

Bluetooth

A

Bluetooth is a wireless method of connecting devices over a short distance. It uses radio waves at 2.4GHz. devices are typically within 10 metres of each other. devices need to be paired to connect them.

49
Q

Bluetooth pairing

A

A persistent link is made between the two devices.
A device can ask for a passkey in order to pair - this gives it an extra layer of security.
They only need to be entered once and will be remembered.
When a paired device is close enough to communicate it will say that it is connected.
This means data can be communicated between them.

50
Q

Wi-fi standards

A

There are many different WiFi standards which operate at different speeds. For example:
802.11g operates at 54Mb/s.
802.11n operates at 600Mb/s.
802.11ac operates at 3.2Gb/s.

By creating devices which use the same standards, we can guarantee that devices from different manufacturers will be compatible.

51
Q

Frequency channels - 2.4GHz

A

To maximise the amount of data we can send, we subdivide the frequency bands into smaller channels.
There are 13 channels in the 2.4 GHz frequency band.
Only three of these channels do not interfere with each other.
This means that the 2.4 GHz range is not effective at supporting many networks.

52
Q

Frequency channels - 5GHz

A

There are 24 non-overlapping channels in the 5 GHz band.
This makes the 5 GHz band much more effective for supporting a high number of networks.

53
Q

2.4GHz vs 5GHz frequency

A

2.4GHz has a long range and better reliability through walls and obstructions.
However it is slower than 5GHz wi-fi and is more crowded so more susceptible to interference.

5GHz has faster transfer speeds than 2.4GHz and is less susceptible to interference.
However it has less range and worse reliability through walls and obstructions.

54
Q

Intercepting data

A

Data that is transmitted over a network can be intercepted. any intercepted data can be understood unless measures are taken to prevent It from being intercepted. these measures are known as encryption.

55
Q

Encryption

A

Encryption is the encoding of data so that It can be no longer be easily understood.

56
Q

Encryption terminology

A

plaintext - the original message to be encrypted.
cipher text - the encrypted message.
key - a sequence of numbers used to encrypt or decrypt, often data using mathematical formula.
encryption algorithm - the formula for encrypting the plaintext.

57
Q

Encryption techniques

A

private key (symmetric technique) - a single key is used to encrypt and decrypt the plaintext and must be given to the recipient of the message to decrypt the data.

public key (asymmetric technique) - two keys are used - one (public key) to encrypt and one (private key) to decrypt the message. this is more secure as you have to send or reveal your decryption key.

58
Q

Caesar shift cipher

A

Each letter is replaced by a letter n positions further on in the alphabet. This is an example of symmetric encryption.

59
Q

Wireless equivalent privacy (WEP)

A

WEP is the weakest protection of all.
WEP simply needs a password to join the network.
No data is encrypted, so it can be easily intercepted.

60
Q

Wi-fi protected access

A

WPA also uses a password to join the network.
WPA also uses encryption to scramble the data being sent:
This means that only devices with the correct key can decode the data.
WPA is much stronger than WEP.

61
Q

Wireless equivalent privacy v2

A

WPA2 is the successor of WPA.
WPA2 uses a stronger encryption algorithm to prevent unauthorised parties from accessing the encrypted data.

62
Q

Servers

A

The server is a powerful computer which provides services or resources required by any clients.

63
Q

Types of servers

A

A file server holds all the data files and database and manages backups.
A print server may organise printing on different printers.
An email server may receive emails, detect and block spam and distribute emails to users.
A web server may host the companies external website.
A database server may hold records.

64
Q

Role of the server

A

The server waits for requests from a client.
Performs any processing required to fulfil the request.
The request data is sent back to the client.

65
Q

Advantages of client server networks

A

User’s files can be stored centrally so it is easy to access them from any networked computer.
Team members can easily share files.
Client machines can be monitored centrally.
This means that administrators can make sure that nobody breaks the terms and conditions of the network.
User accounts can be managed centrally. For example, an administrator could:
Retrieve lost files.
Recover lost passwords.
Software and security updates can be managed centrally and applied to all computers.
This saves time.

66
Q

Disadvantages of client server networks

A

Servers can be expensive to purchase, setup and maintain.
A specialist network manager would be required as servers require specialist IT knowledge.
Servers can be a single point of failure, meaning all users would lose access to the network if the server fails.

67
Q

Peer-to-peer networks

A

A peer is a computer on a network which is equal to all other computers.
Each peer on the network Often have their own printer attached, Will provide access to their own files, Is responsible for their own backups, Is responsible for their own security, Is responsible for carrying out their own backups.
A network with no server providing services is a peer-to-peer network.
Most homes will have a peer-to-peer network model.

68
Q

Advantages of p2p networks

A

Very easy to set up and maintain.
Very cheap to set up because there is no expensive hardware to purchase.
No specialist knowledge or staff are required to run the network.

69
Q

Disadvantages of p2p networks

A

Viruses and malware are more easily transferred over this type of network as there is no central firewall.
Data recovery and backup is not done centrally, so each computer has to have its own backup system.
Files are not centrally organised, but stored on individual computers and may be hard to locate if the computer’s owner does not have a logical filing and naming system.
If a computer is switched off, data on that machine cannot be retrieved from other machines.

70
Q

Wireless transmission

A

Wireless transmission media uses radio waves and is relatively slow compared to wired methods. The signal can be blocked by obstacles such as walls and is not very secure. However is easy to add to a network and can be used anywhere provided there is a signal.

71
Q

Web hosting

A

Web hosting is the act of keeping a website on a server, and allowing clients to request to see the pages of the website.

72
Q

Website

A

A website is a collection of webpages which are linked together using hyperlinks.
A user can click on hyperlinks to navigate the website.

73
Q

Web server

A

A web server is a dedicated computer on the Internet which responds to HyperText Transfer Protocol (HTTP) requests by returning webpages.

Some people choose to host their own website, but this can be difficult for many reasons:
There are a lot of security risks.
It can be difficult to make sure that the server does not go down, for example if there is a power cut.
Web servers are expensive.

74
Q

Client server networks

A

In the client-server model, computers on the network each take the role of either the central server or a client.
The client can request a service from the server.
The server will process the request, and then send a response.

75
Q

Wired networks

A

A wired network is a network where physical cables are used to join devices together and transmit data
Computers can be connected to networks using many different types of wires to transmit data
The most common type of cable in a local area network (LAN) is Ethernet

76
Q

Ethernet

A

Ethernet is a wired networking standard to carry electrical signals between devices
Ethernet is common in most offices and homes to connect devices such a desktop computers & servers
Ethernet uses twisted pair cables to allow duplex communication

77
Q

Advantages of ethernet

A

Speed - Fast data transfer
Security - Better physical security
Range - High (up to 100m), less susceptible to interference

78
Q

Disadvantages of ethernet

A

Portability - Can’t move easily, location is limited by physical cable
Cost - Need more cables to add a new device
Safety - Cables can be trip hazards, need routing along walls, under floors

79
Q

Wireless networks

A

A wireless network is a network where connections are made using radio waves to transmit data through the air
The most common types of wireless connections are:
Wi-Fi
Bluetooth

80
Q

Wi-fi

A

Wireless fidelity (Wi-Fi) is a common standard for wireless networks
Wi-Fi is common in most homes and offices to connect devices such as laptops, tablets & smart phones
Using Wi-Fi, devices communicate with a wireless access point (WAP), which can be a standalone device or built into a router or switch

81
Q

Advantages of wi-fi

A

Portability - Easy to move around, location is only limited by range
Cost - Less expensive to setup and add new devices
Compatibility - Most devices are manufactured with a built in Wi-Fi adapter

82
Q

Disadvantages of wi-fi

A

Speed - Slower data transfer than Ethernet
Security - Less secure than Ethernet
Range - Relies on signal strength to the WAP, signals can be obstructed (up to 90m)

83
Q

Advantages of bluetooth

A

Compatibility - Ideal for personal devices and ad-hoc connections
Power - Very low power consumption

84
Q

Disadvantages of bluetooth

A

Speed - Very slow transfer speeds
Security - Data can be intercepted by anyone in range
Range - Very short range (10m)

85
Q

Standards in computing

A

A computing standard is a set of guidelines that when used with different hardware and software allows them to work with each other (compatibility) and allow data exchange (interoperability)
Standards give manufacturers and software developers the ability to create hardware and software that will function together
Countries that use different plug sockets and devices that use different charger cables are examples of where standards are not used.

86
Q

Examples of computing standards

A

HTML - A standard for creating websites that allows them to be viewed on the World Wide Web (WWW) using web browser software
Ethernet - A standard for wired network cables that allows the network to function
USB - A standard that defines the physical connector used for connecting peripheral devices to computers
Wi-Fi - A standard that allows wireless devices to communicate on a local area network (LAN).

87
Q

Protocols

A

A protocol is a set of rules that govern communication on a network
There are protocols for different purposes, such as:
TCP/IP
HTTP & HTTPS
FTP
POP, IMAP & SMTP

88
Q

TCP / IP

A

TCP/IP is two protocols, transmission control protocol (TCP) and internet protocol (IP) that combined allow communication over the internet (WAN)
TCP is responsible for making sure communication between two routers is error free
IP is responsible for making sure data is delivered to the right device on a wide area network (WAN).

89
Q

HTTP / HTTPS

A

Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website viewing
HTTP allows clients to receive data from the sever (fetching a webpage) and send data to the server (submitting a form, uploading a file)
HTTPS works in the same way as HTTP but with an added layer of security. All data sent and received using HTTPS is encrypted
HTTPS is used to protect sensitive information such as passwords, financial information and personal data.

90
Q

FTP

A

File Transfer Protocol (FTP) allows sending and receiving files between computers
Uploading and downloading files to/from a web server is often completed using FTP
FTP offers greater efficiency and support for bulk transfers and large files such as resuming interrupted transfers
FTP clients are software applications that use the FTP protocol to make the process easier for users.

91
Q

SMPT

A

Simple Mail Transfer Protocol (SMTP) is a protocol that allows communication between an email sender and the email server, and between different email servers using the internet
In the diagram above, SMTP is used to transfer the senders email to their email providers server and SMTP is used to transfer the email to the recipients email server.

92
Q

POP

A

Post Office Protocol (POP) is a protocol for downloading emails to a device from an email server
Once the email has been retrieved it is removed from the server.

93
Q

IMAP

A

Internet Message Access Protocol (IMAP) is a protocol for downloading emails to a device from an email server
Once the email has been retrieved, a copy is retained on the mail server.

94
Q

Advantages and disadvantages of POP

A

Advantages - Frees up storage space on email servers
Faster on slow connections

Disadvantages - Only access emails from the device they’re downloaded to.
Emails deleted on the server once downloaded.

95
Q

Advantages and disadvantages of IMAP

A

Advantages - View and manage emails from any device with internet access.
Changes made on one device are synchronized on all connected devices.

Disadvantages - Server storage space can limit amount of retained emails
Requires internet access to view emails.

96
Q

The concept of layers

A

Networks rely on many complex parts all working together at the same time, from different types of network, the different operating models, the internet, wired and wireless to encryption, addressing and protocols
Managing the complexity of networks is helped with the use of layers.

97
Q

What is a layer

A

A layer is a sub part of a more complex task
Dividing network tasks into layers reduces the complexity and makes each layer more manageable
An example of layers can be seen in the TCP/IP protocol which uses a 4-layer model known as a ‘stack’

98
Q

Advantages of layers

A

Software developers and engineers can be employed to work within one specific layer.
This allows people to specialise in one area.
As long as the inputs and outputs of the layer remain consistent, then the layer can be changed without affecting the other layers.
This allows layers to be improved for efficiency without affecting other parts of the system.
Network engineers can diagnose and fix issues within individual layers when problems happen.
Application developers can create networked applications without knowing the details of how a network physically works.

99
Q

TCP model

A

The four-layer Transmission Control Protocol model

Application layer: Creates and interprets data (e.g. HTTP, IMAP, FTP).
Transport layer: Splitting / joining of data (e.g. TCP).
Internet layer: Adding addresses to data, responsible for routing packets. (e.g. IP).
Network Access layer: Converting data into electrical signal (hardware) (e.g. Ethernet, WiFi).

100
Q

OSI model

A

The seven-layer Open Systems Interconnection model
Application.
Presentation.
Session.
Transport.
Network.
Data Link.
Physical.