Network topologies Flashcards

1
Q

Will Every computer on a network have an IP address?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does packet switching operate?

A
  1. A file is split into data packets
  2. Routers follow the IP rules and direct data packets towards their destination.
  3. Due to network traffic, packet switching may occur where the packets may take different routes and be directed to other routers before arriving at the destination.
  4. If the packets are in the wrong order, the sequence number can be used to reorder them back into the original file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a protocol and why are they needed?

A

Protocols are rules that computers follow when transmitting and receiving data over a network.
They are needed to ensure that to ensure computers on a network can understand each others so that
1. data is sent and received correctly
2. data is sent to the correct place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is SSID?

A

Stands for “Service Set Identifier.” An SSID is a unique ID that consists of 32charactersand is used for namingwirelessnetworks. When multiple wireless networks overlap in a certain location, SSIDs make sure that data gets sent to the correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Devices on a wireless network send and receive data using?

A

standard radio frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IMAP – Internet Message Access Protocol?

A

IMAP – Internet Message Access Protocol
This is similar to POP but with one important difference. With IMAP, the email will remain on the server once it has been downloaded by a mail client. This allows other devices to also access the emails which is important for users with multiple devices – they can synchronise their emails across all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the features of an Ethernet - STAR topology?

A

Twisted pair cabling allows duplex transmission (signal can travel in both directions at the same time)

Doesn’t need CSMA/CD protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must happen to data broadcasted on a wireless network?

A

Data must be encrypted when broadcasted on a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices can communicate with each other when …?

A

Devices can communicate with each other when

The use the same frequency and channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do we call an a 32 bit number written as 4 decimal numbers eg: 129.168.1.101

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the features of an Ethernet - BUS topology?

A

Shared backbone

Used CSMA/CD protocol
Device listens to the line prior to transmission
Stops if it detects a transmission on the line
Repeats the attempt after a random period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the Advantages

of using wireless networks?

A

Advantages
Easier to set up so less expensive
Can move around and access the network from anywhere
Can handle large numbers of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mesh topology

A

This is a fully connected network;
Every node is connected to all others;
This means that if a cable breaks or if there is heavy traffic on one area, there are other routes for the data to take

BUT:
It can be a very expensive set up due to the cabling required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What has the following?:
1. Header
Destination IP address
Source IP address
A sequence number
2. The data itself
3. A checksum which is used for error checking
A

A data packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

partial mesh topology

A

Some, but not all computers are connected to each other
There are still alternative routes between computers
It is an effective compromise between cabling cost and effective communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hardware identification number that uniquely identifies each device on a network.

A

A MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
If you have your documents / files stored on a file server, the way you access them will be governed by the xxxx  xxxxxxxx  xxxxxxxx?
This standard (XXX) ensure that all clients (computers) on a network can access files from a server in the same way.
A

FTP – File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cables (wired)

There are two main types of cable which can transport data between computers.

they are?

A

Cables (wired)

There are two main types of cable which can transport data between computers.

Ethernet Cables
These are made up of copper wires with the data being transported via electrical signals. Because they carry electrical signals, they can suffer from interference.

Fibre Optic Cables
These are made up of glass fibres with the data being transported via light signals.

Fibre optic cables are more effective…nothing travels faster than the speed of light! They also do not suffer from interference.

They are however more expensive that Ethernet cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Devices on a wireless network send and receive data using standard radio frequency bands:

what bands?

A

Devices on a wireless network send and receive data using standard radio frequency bands:

2.4 GHz Band (frequencies between 2.4GHz & 2.5GHz)
5 GHz Band (frequencies between 5.725GHz & 5.875GHz)

Each band is split into channels that cover smaller frequency ranges, within the band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
The TCP (Transmission Control Protocol) defines the rules for sending data packets on the Internet
It ensures that?? (3 Things)
A

The TCP defines the rules for sending data packets on the Internet
It ensures that
all data is split up into data packets in the same way.
the data packets are put back together when received by the destination device.
any data received is the same as that sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Ethernet Cables made of?

A

Ethernet Cables
These are made up of copper wires with the data being transported via electrical signals. Because they carry electrical signals, they can suffer from interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the Disadvantages

of using wireless networks?

A
Disadvantages
Slower than a wired network
Relies on signal strength to WAP
Signal can be obstructed
Less secure than a wired network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does the encryption process work?

A

Encryption process works as follows
data is converted into cipher text prior to transmission using a key created using the SSID and the password
the data is decrypted by the receiver using the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a hardware identification number that uniquely identifies each device on a network.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the TCP / IP protocol?
This is probably the most important protocol as it determines how all data is sent over the internet. It stands for TCP – Transmission Control Protocol
26
Does Ethernet STAR topology need CSMA/CD protocol?
no
27
what is Ethernet?
Ethernet is a standard for network technologies on wired local area networks.
28
What is the POP – Post Office Protocol?
POP – Post Office Protocol Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server.
29
what is Needed to ensure that data being sent over a network can be sent to the correct node.
IP address
30
The topology of a network affects? | 3 things
The topology of a network affects: cost, performance, ease of set-up.
31
What is this? "This is similar to POP but with one important difference. With IMAP, the email will remain on the server once it has been downloaded by a mail client. This allows other devices to also access the emails which is important for users with multiple devices – they can synchronise their emails across all devices. "?
IMAP – Internet Message Access Protocol
32
What is the HTTPS – Hyper Text Transfer Protocol (SECURE)?
HTTPS – Hyper Text Transfer Protocol (SECURE) This protocol is almost identical to HTTP. The only difference is that it ensures all data being sent is encrypted and so makes web data communication far more secure.
33
Wi-Fi allows network access to portable devices by using what????
Wi-Fi allows network access to portable devices by using radio waves to send data (not wires!).
34
How is data transmitted over a network?
Data is transmitted in frames/packets
35
What is SMTP – Simple Mail Transfer Protocol?
SMTP – Simple Mail Transfer Protocol This protocol governs how data is sent between mail servers. By conforming to the same standards, emails can be sent to and from all mail servers across the internet.
36
Ethernet | each frame consists of? 5 things
Each frame consists of Bits to synchronise clocks of transmitting and receiving device Start frame deliminator to indicate start of the data being sent Source/ destination MAC addresses Actual data Cyclic redundancy check(CRC) for error checking purpose
37
Data Transfer Media All networks must enable computers to communicate with one another. This can be done using two main data transfer mediums. which are....?
Data Transfer Media All networks must enable computers to communicate with one another. This can be done using two main data transfer mediums. Cables (wired) Wi-Fi (wireless)
38
What are Fibre Optic Cables made of?
Fibre Optic Cables | These are made up of glass fibres with the data being transported via light signals.
39
What is the HTTP – Hyper Text Transfer Protocol?
HTTP – Hyper Text Transfer Protocol This is the protocol which governs the way in which websites and web servers are accessed by web browsers. By conforming to the same standards it means that all browsers can access all websites on the WWW.
40
The topology is ....?
Topology is the way in which a network is laid out.
41
What is The main difference between an IP address and a MAC address?
The main difference between an IP address and a MAC address is that an IP address is not hard coded into the computer. It can change and is therefore said to be dynamic.
42
What does this describe? 1. A file is split into data packets 2. Routers follow the IP rules and direct data packets towards their destination. 3. Due to network traffic, packet switching may occur where the packets may take different routes and be directed to other routers before arriving at the destination. 4. If the packets are in the wrong order, the sequence number can be used to reorder them back into the original file.
Packet Switching
43
what is the a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server?
POP – Post Office Protocol
44
What is the protocol which governs the way in which websites and web servers are accessed by web browsers. By conforming to the same standards it means that all browsers can access all websites on the WWW?
HTTP – Hyper Text Transfer Protocol
45
What does Each data packet consists of? | (3 sections)`
``` Each data packet consists of 1. Header Destination IP address Source IP address A sequence number 2. The data itself 3. A checksum which is used for error checking ```
46
What do we call rules that computers follow when transmitting and receiving data over a network?
protocols
47
Bus topology
There is only one cable which all nodes are connected to It is therefore very cheap due to little cabling But: Because data travels both ways along one cable, data collides which slows the network If the cable has a fault the whole network may suffer Only really useful over small areas
48
What is th FTP – File Transfer Protocol?
``` FTP – File Transfer Protocol If you have your documents / files stored on a file server, the way you access them will be governed by the File Transfer Protocol. This standard (FTP) ensure that all clients (computers) on a network can access files from a server in the same way. ```
49
What is Packet switching ?
Packet switching ensures that data gets to its destination as fast as possible – this may not be the shortest distance however.
50
What is the protocol is almost identical to HTTP. The only difference is that it ensures all data being sent is encrypted and so makes web data communication far more secure.
HTTPS – Hyper Text Transfer Protocol (SECURE)
51
What is manufactured into every network card, such as an Ethernet card or Wi-fi card and therefore cannot be changed (static)?
The MAC address
52
RIng topology
Again, only one cable But this time data travels in only one direction This means no collisions BUT: Again if the cable breaks then the whole network may go down.
53
WHAT IS A mac ADDRESS?
A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-fi card and therefore cannot be changed.
54
What is: " This protocol governs how data is sent between mail servers. By conforming to the same standards, emails can be sent to and from all mail servers across the internet."
SMTP – Simple Mail Transfer Protocol
55
Star topology
All cables connect to a hub or a switch and therefore data doesn’t share one cable This results in fewer data collisions and therefore a fast network BUT – the most expensive topology as it requires the most cable
56
IP Protocol | why is it in place?
This rule is in place to ensure that data packets are directed towards their destination in the most appropriate way (which may not be the shortest way) This is called ‘Packet Switching’
57
Can a MAC address be changed?
No
58
What are the features of an Ethernet - PARTIAL MESH TOPOLOGY?
Transmitting device checks that line is free and if it is proceeds as follows 1. Data frame is transmitted to a switch Frame consists of header which contains MAC source and destination address data CRC 2. Switch checks the frame using the CRC and requests retransmission if a problem with the data is identified 3. Switch looks at the address and forwards the frame to the next switch/ destination device Steps 1-3 are repeated until the frame arrives at its destination. The receiving device will also perform the CRC Note: frame is directed from source to destination directly via the necessary switches
59
How are Traditional MAC addresses represented in terms of numbers?
Traditional MAC addresses are 12-digit (6 bytes or 48 bits) hexadecimal numbers.
60
why is data encrypted and how does it work?
Data is broadcast on a wireless network so it must be encrypted Encryption process works as follows data is converted into cipher text prior to transmission using a key created using the SSID and the password the data is decrypted by the receiver using the same key a handshake protocol is used to ensure that the receiver has a valid master key before transmission starts
61
What is a handshake protocol for?
a handshake protocol is used to ensure that the receiver has a valid master key before transmission starts