Networks and the internet Flashcards
Network
an interconnected set of devices
Physical network topology
The actual architecture of a network i.e. how its laid out
Positives of Networks
- allows sharing of data
- allows collaberative working
- good for communication
- allows sharing of resources e.g. printers, storage and scanners
- easy to backup to a central point
Drawbacks of networks
- The user can become dependent on the network (If the network stops operating then it may not be possible to access various resources)
- Efficiency of a network can be very dependent on a network manager
- It is difficult to make a network of computer secure for hackers and outside threats
- As traffic increases on a network the performance can degrade
Protocol
A protocol is a set of rules relating to the communication between devices.
TCP
Transmission Control Protocol – used with IP to ensure error free transmission and package switching
IP
Internet Protocol – used to transfer all packets across the internet between routers
NIC
receive and send electrical signals in a network.
Router
devices which are used to connect networks. they receive data packets from one network and based on the address on the packet forward them of
Switches
devices used to connect devices on a network, they use the physical hardware MAC address to send data on to the required destination node.
MAC Address
identifier that is permanently added to a device by the manufacturer
Hubs
connects nodes together by broadcasting a signal to all possible destinations. The correct destination will accept the signal
WAP (wireless access point)
use wireless to connect a node to a WiFi network avoiding the need for lots of physical caballing
Transmission media
the wires that connect a network
Coacial Copper Cables
older, slower and cheaper
Fibre Optic Cables
newer, faster and high-capacity
Bus Topology
an arrangement where nodes are connected to a central communication channel. Each end of the backbone is connected to a terminator. Each node is passive and data is sent in one direction at a time only
Bus topology advantages
Inexpensive to set up
Devices can easily be added
Good for small networks
Bus Topology Disadvantages
Main cable is a single point of failure
Limited cable length
Performance degrades with heavy use
Poor security
Star Topology
an arrangement where a central node or hub provides a common connection point for all other nodes.
Star Topology advantages
Easy to isolate problems
Good performance
More secure is a switch is used a data is sent only to the recipient
Star topology disadvantages
Can be expensive to set up because of the length of cable required
Central device is a point of failure
Ring topology
an arrangement where on node is connect to two others to form and ring.
Mesh Topology
an arrangement where ever node is connected to every other node.
Client-Server Model:
one device (the client) requests services from another device (the server).
Peer-to-Peer Model:
all terminals have equal status and there is no powerful central server, each computer acts as both a client and a server.
advantages of Client-Server
- User IDs, passwords and access levels centrally controlled
- Backup is centralised and usually automated
- No access to other users’ files
disadvantages of Client-Server
- Can be expensive to set up and to manage
- Server is single point of failure
advantages of peer-to-peer
- cheap to set up and maintain
- easy sharing
disadvantages of peer-to-peer
- no central backing up
- slower performance
- bad security
client side processing
Client Processing is where webpages use JavaScript to validate data before it gets sent to the sever for further validation.
advantages of client side processing
- Allows for more interactivity by immediately responding to a users’ action
- Removes potentially unnecessary processing from the server
Disadvantages of client side processing
- Not all browsers support all script
- Because the scripts are processed by the client, they are dependent on the performance of the clients’ machine
Application Programming Interface (API)
a prewritten set of subroutines that provide access to the
companies data
Gateway
A gateway is a node on a network that serves as an entrance to another network.
Port
software construct serving as a communication endpoint. Each has a number used by protocols to specify what data is being sent.
Circuit Switching
Circuit Switching: a complete circuit or route between two nodes is established before transmission begins. Once the rout is established all data follows this route until transmission is complete.
Packet Switching
the data to be transmitted is broke up into individual packets at the source computer. each packet is labelled with an address and sequence number. The packet is then forwarded onto the network and follows its own individual route. Depending on network traffic each packet will take different routes at different times to reach their destination where is is then reassembled.
Proxies
A proxy ensures there is no direct physical connection between a single user and a remote source.
Encryption
A method of transforming data into an unintelligible way so that it cannot be read by unauthorised individuals.
Malicous Software
is software that annoys users or damages their data. For example, Worms, Viruses, Trojans, Spyware and ransomware.
Worm
A Worm is a standalone program that does not require a user to run it in order for it to spread.
Trojan
A Trojan is software that misleads the user of its true intent. Often, they serve to open up back doors in your computer.
Phishing
Phishing is using email to manipulate a victim into visiting a fake website and giving away personal information.
protecting agaisnt hacking:
- Packet snifferes
- User access logs
Layering
the principle of dividing a complex system into separate slices of functionality
Open Systems Interconnection 7 layer model
(7) Application Layer
(6) Presentation Layer
(5) Session Layer
(4) Transport Layer
(3) Networking Layer
(2) Data Link Layer
(1) Physical Layer
TCP/IP stack
Application Layer
Transport Layer
Internet layer
Link Layer
Transport Layer
(2) Makes and breaks connections with routers
Internet Layer
(3) provides links across different network types.