S5 Networks Flashcards
What is a computer network?
A group of interconnected computers that can share data and resources.
What are the advantages of using a computer network?
-Resource Sharing, such as printers and files.
-Rapid sharing and updating of data.
-Reduces the need for duplicate hardware and software, cheaper
What are the disadvantages of using a computer network?
-Security Risks: Increased vulnerability to hacking and data breaches.
- Maintenance Costs: Ongoing costs for network maintenance and updates.
- Dependency: Reliance on the network can lead to disruptions if the network fails.
Describe the main types of computer network.
The main types are: Personal Area Network (PAN): Covers a small area, typically within a single person’s workspace, using Bluetooth. Local Area Network (LAN): Covers a small geographical area, like a school or office, and is often owned by a single organization. Wide Area Network (WAN): Covers a large geographical area, such as a city or country, and includes the Internet.
What is the difference between wired and wireless networks?
Wired networks use physical cables (e.g., Ethernet cables) to connect devices, offering faster and more reliable connections. Wireless networks use radio waves to connect devices, providing more flexibility and ease of access but potentially lower speeds and higher security risks.
What are the advantages of wireless networks compared to wired networks?
Advantages of wireless networks: Flexibility: Devices can be moved around without losing connection. Ease of installation: No need for extensive cabling, which can be more convenient. Accessibility: Can easily connect multiple devices, making it ideal for public areas or homes.
What are the disadvantages of wireless networks compared to wired networks?
Disadvantages of wireless networks: Security: Wireless networks are more susceptible to hacking and unauthorized access. Interference: Other devices or physical obstructions can cause signal interference. Speed and Reliability: Generally, wireless connections can be slower and less reliable than wired ones.
What is a network topology?
A network topology is the arrangement of different elements (nodes, links, etc.) in a computer network. Common topologies include star, bus, and ring.
Explain the star topology.
In a star topology, all nodes are connected to a central hub. If one connection fails, it doesn’t affect the rest of the network. It’s easy to manage and troubleshoot but requires more cabling and a central hub.
What are the pros and cons of star topology?
Pros: Easy to install and manage. Failure of one node doesn’t affect the rest of the network. Good performance with many devices. Cons: If the central hub fails, the whole network is affected. Requires more cabling than some other topologies, which can be expensive.
Explain the bus topology.
In a bus topology, all devices share a single central cable, called the bus or backbone. Data sent from one device travels along the bus until it reaches its destination. It’s easy to set up but can be slow and difficult to troubleshoot.
What are the pros and cons of bus topology?
Pros: Easy to install and extend. Requires less cabling than star topology. Cons: If the central bus fails, the whole network is affected. Can be difficult to troubleshoot. Performance issues with heavy traffic.
What is a network protocol?
A network protocol is a set of rules and conventions for communication between network devices. Examples include Ethernet, Wi-Fi, TCP/IP, HTTP, and FTP.
What is the purpose of network security?
Network security aims to protect data and resources from unauthorized access, misuse, or theft. Methods include authentication, encryption, firewalls, and MAC address filtering.
Why do we need network security?
We need network security to: Protect sensitive information from unauthorized access and breaches. Ensure the integrity of data, preventing unauthorized modifications. Maintain the availability of network services, preventing disruptions from attacks. Safeguard personal and financial information, reducing the risk of identity theft and fraud.