Network topologies Flashcards

1
Q

Will Every computer on a network have an IP address?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does packet switching operate?

A
  1. A file is split into data packets
  2. Routers follow the IP rules and direct data packets towards their destination.
  3. Due to network traffic, packet switching may occur where the packets may take different routes and be directed to other routers before arriving at the destination.
  4. If the packets are in the wrong order, the sequence number can be used to reorder them back into the original file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a protocol and why are they needed?

A

Protocols are rules that computers follow when transmitting and receiving data over a network.
They are needed to ensure that to ensure computers on a network can understand each others so that
1. data is sent and received correctly
2. data is sent to the correct place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is SSID?

A

Stands for “Service Set Identifier.” An SSID is a unique ID that consists of 32charactersand is used for namingwirelessnetworks. When multiple wireless networks overlap in a certain location, SSIDs make sure that data gets sent to the correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Devices on a wireless network send and receive data using?

A

standard radio frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IMAP – Internet Message Access Protocol?

A

IMAP – Internet Message Access Protocol
This is similar to POP but with one important difference. With IMAP, the email will remain on the server once it has been downloaded by a mail client. This allows other devices to also access the emails which is important for users with multiple devices – they can synchronise their emails across all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the features of an Ethernet - STAR topology?

A

Twisted pair cabling allows duplex transmission (signal can travel in both directions at the same time)

Doesn’t need CSMA/CD protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must happen to data broadcasted on a wireless network?

A

Data must be encrypted when broadcasted on a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices can communicate with each other when …?

A

Devices can communicate with each other when

The use the same frequency and channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do we call an a 32 bit number written as 4 decimal numbers eg: 129.168.1.101

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the features of an Ethernet - BUS topology?

A

Shared backbone

Used CSMA/CD protocol
Device listens to the line prior to transmission
Stops if it detects a transmission on the line
Repeats the attempt after a random period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the Advantages

of using wireless networks?

A

Advantages
Easier to set up so less expensive
Can move around and access the network from anywhere
Can handle large numbers of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mesh topology

A

This is a fully connected network;
Every node is connected to all others;
This means that if a cable breaks or if there is heavy traffic on one area, there are other routes for the data to take

BUT:
It can be a very expensive set up due to the cabling required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What has the following?:
1. Header
Destination IP address
Source IP address
A sequence number
2. The data itself
3. A checksum which is used for error checking
A

A data packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

partial mesh topology

A

Some, but not all computers are connected to each other
There are still alternative routes between computers
It is an effective compromise between cabling cost and effective communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hardware identification number that uniquely identifies each device on a network.

A

A MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
If you have your documents / files stored on a file server, the way you access them will be governed by the xxxx  xxxxxxxx  xxxxxxxx?
This standard (XXX) ensure that all clients (computers) on a network can access files from a server in the same way.
A

FTP – File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cables (wired)

There are two main types of cable which can transport data between computers.

they are?

A

Cables (wired)

There are two main types of cable which can transport data between computers.

Ethernet Cables
These are made up of copper wires with the data being transported via electrical signals. Because they carry electrical signals, they can suffer from interference.

Fibre Optic Cables
These are made up of glass fibres with the data being transported via light signals.

Fibre optic cables are more effective…nothing travels faster than the speed of light! They also do not suffer from interference.

They are however more expensive that Ethernet cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Devices on a wireless network send and receive data using standard radio frequency bands:

what bands?

A

Devices on a wireless network send and receive data using standard radio frequency bands:

2.4 GHz Band (frequencies between 2.4GHz & 2.5GHz)
5 GHz Band (frequencies between 5.725GHz & 5.875GHz)

Each band is split into channels that cover smaller frequency ranges, within the band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
The TCP (Transmission Control Protocol) defines the rules for sending data packets on the Internet
It ensures that?? (3 Things)
A

The TCP defines the rules for sending data packets on the Internet
It ensures that
all data is split up into data packets in the same way.
the data packets are put back together when received by the destination device.
any data received is the same as that sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Ethernet Cables made of?

A

Ethernet Cables
These are made up of copper wires with the data being transported via electrical signals. Because they carry electrical signals, they can suffer from interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the Disadvantages

of using wireless networks?

A
Disadvantages
Slower than a wired network
Relies on signal strength to WAP
Signal can be obstructed
Less secure than a wired network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does the encryption process work?

A

Encryption process works as follows
data is converted into cipher text prior to transmission using a key created using the SSID and the password
the data is decrypted by the receiver using the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a hardware identification number that uniquely identifies each device on a network.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the TCP / IP protocol?

A

This is probably the most important protocol as it determines how all data is sent over the internet.
It stands for
TCP – Transmission Control Protocol

26
Q

Does Ethernet STAR topology need CSMA/CD protocol?

A

no

27
Q

what is Ethernet?

A

Ethernet is a standard for network technologies on wired local area networks.

28
Q

What is the POP – Post Office Protocol?

A

POP – Post Office Protocol
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server.

29
Q

what is Needed to ensure that data being sent over a network can be sent to the correct node.

A

IP address

30
Q

The topology of a network affects?

3 things

A

The topology of a network affects:
cost,
performance,
ease of set-up.

31
Q

What is this?
“This is similar to POP but with one important difference. With IMAP, the email will remain on the server once it has been downloaded by a mail client. This allows other devices to also access the emails which is important for users with multiple devices – they can synchronise their emails across all devices.
“?

A

IMAP – Internet Message Access Protocol

32
Q

What is the HTTPS – Hyper Text Transfer Protocol (SECURE)?

A

HTTPS – Hyper Text Transfer Protocol (SECURE)
This protocol is almost identical to HTTP. The only difference is that it ensures all data being sent is encrypted and so makes web data communication far more secure.

33
Q

Wi-Fi allows network access to portable devices by using what????

A

Wi-Fi allows network access to portable devices by using radio waves to send data (not wires!).

34
Q

How is data transmitted over a network?

A

Data is transmitted in frames/packets

35
Q

What is SMTP – Simple Mail Transfer Protocol?

A

SMTP – Simple Mail Transfer Protocol
This protocol governs how data is sent between mail servers. By conforming to the same standards, emails can be sent to and from all mail servers across the internet.

36
Q

Ethernet

each frame consists of?
5 things

A

Each frame consists of
Bits to synchronise clocks of transmitting and receiving device
Start frame deliminator to indicate start of the data being sent
Source/ destination MAC addresses
Actual data
Cyclic redundancy check(CRC) for error checking purpose

37
Q

Data Transfer Media

All networks must enable computers to communicate with one another.
This can be done using two main data transfer mediums.
which are….?

A

Data Transfer Media

All networks must enable computers to communicate with one another.
This can be done using two main data transfer mediums.

Cables (wired)

Wi-Fi (wireless)

38
Q

What are Fibre Optic Cables made of?

A

Fibre Optic Cables

These are made up of glass fibres with the data being transported via light signals.

39
Q

What is the HTTP – Hyper Text Transfer Protocol?

A

HTTP – Hyper Text Transfer Protocol
This is the protocol which governs the way in which websites and web servers are accessed by web browsers. By conforming to the same standards it means that all browsers can access all websites on the WWW.

40
Q

The topology is ….?

A

Topology is the way in which a network is laid out.

41
Q

What is The main difference between an IP address and a MAC address?

A

The main difference between an IP address and a MAC address is that an IP address is not hard coded into the computer. It can change and is therefore said to be dynamic.

42
Q

What does this describe?

  1. A file is split into data packets
  2. Routers follow the IP rules and direct data packets towards their destination.
  3. Due to network traffic, packet switching may occur where the packets may take different routes and be directed to other routers before arriving at the destination.
  4. If the packets are in the wrong order, the sequence number can be used to reorder them back into the original file.
A

Packet Switching

43
Q

what is the a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server?

A

POP – Post Office Protocol

44
Q

What is the protocol which governs the way in which websites and web servers are accessed by web browsers. By conforming to the same standards it means that all browsers can access all websites on the WWW?

A

HTTP – Hyper Text Transfer Protocol

45
Q

What does Each data packet consists of?

(3 sections)`

A
Each data packet consists of
1. Header
Destination IP address
Source IP address
A sequence number
2. The data itself
3. A checksum which is used for error checking
46
Q

What do we call rules that computers follow when transmitting and receiving data over a network?

A

protocols

47
Q

Bus topology

A

There is only one cable which all nodes are connected to
It is therefore very cheap due to little cabling
But:
Because data travels both ways along one cable, data collides which slows the network
If the cable has a fault the whole network may suffer
Only really useful over small areas

48
Q

What is th FTP – File Transfer Protocol?

A
FTP – File Transfer Protocol
If you have your documents / files stored on a file server, the way you access them will be governed by the File Transfer Protocol.
This standard (FTP) ensure that all clients (computers) on a network can access files from a server in the same way.
49
Q

What is Packet switching ?

A

Packet switching ensures that data gets to its destination as fast as possible – this may not be the shortest distance however.

50
Q

What is the protocol is almost identical to HTTP. The only difference is that it ensures all data being sent is encrypted and so makes web data communication far more secure.

A

HTTPS – Hyper Text Transfer Protocol (SECURE)

51
Q

What is manufactured into every network card, such as an Ethernet card or Wi-fi card and therefore cannot be changed (static)?

A

The MAC address

52
Q

RIng topology

A

Again, only one cable
But this time data travels
in only one direction
This means no collisions

BUT:
Again if the cable breaks then the whole network may go down.

53
Q

WHAT IS A mac ADDRESS?

A

A MAC address is a hardware identification number that uniquely identifies each device on a network.

The MAC address is manufactured into every network card, such as an Ethernet card or Wi-fi card

and therefore cannot be changed.

54
Q

What is:

This protocol governs how data is sent between mail servers. By conforming to the same standards, emails can be sent to and from all mail servers across the internet.”

A

SMTP – Simple Mail Transfer Protocol

55
Q

Star topology

A

All cables connect to a hub or a switch and therefore data doesn’t share one cable
This results in fewer data collisions and therefore a fast network

BUT – the most expensive topology as it requires the most cable

56
Q

IP Protocol

why is it in place?

A

This rule is in place to ensure that data packets are directed towards their destination in the most appropriate way (which may not be the shortest way)
This is called ‘Packet Switching’

57
Q

Can a MAC address be changed?

A

No

58
Q

What are the features of an Ethernet - PARTIAL MESH TOPOLOGY?

A

Transmitting device checks that line is free and if it is proceeds as follows
1. Data frame is transmitted to a switch
Frame consists of
header which contains MAC source and destination address
data
CRC
2. Switch checks the frame using the CRC and requests retransmission if a problem with the data is identified
3. Switch looks at the address and forwards the frame to the next switch/ destination device

Steps 1-3 are repeated until the frame arrives at its destination. The receiving device will also perform the CRC

Note: frame is directed from source to destination directly via the necessary switches

59
Q

How are Traditional MAC addresses represented in terms of numbers?

A

Traditional MAC addresses are 12-digit (6bytesor 48bits) hexadecimal numbers.

60
Q

why is data encrypted and how does it work?

A

Data is broadcast on a wireless network so it must be encrypted
Encryption process works as follows
data is converted into cipher text prior to transmission using a key created using the SSID and the password
the data is decrypted by the receiver using the same key
a handshake protocol is used to ensure that the receiver has a valid master key before transmission starts

61
Q

What is a handshake protocol for?

A

a handshake protocol is used to ensure that the receiver has a valid master key before transmission starts