SLR 11/ Networks Flashcards
Define Peer-to-Peer networks
Each PC on the network has equal responsibility
No single point of failure
PCs not reliant on each other for resources
Generally easier to maintain and set up
Define Client-Server networks
One central server controls the network
Central point of failure
Network access centrally controlled
Generally more complex to manage
Many tasks can be handled by the server
Define Authentication
Require a username and password to log on
Multiple credentials
Smart cards
Define Proxies
Physical computers
Placed between the network and outside world
Traffic must pass through
Define Firewalls
Software and hardware
Isolate network traffic
Configured to allow or deny traffic in or out
Stateful packet inspection
Define Encryption
Encrypts traffic so it can’t be read without being decrypted. Data is encrypted and decrypted using a set of
keys.
Name the 4 methods of securing a network
Authentication
Proxies
Firewalls
Encryption
Factors for Dedicated Servers
There for Server farms in professional data centres.
Costly to set up and maintain.
Extremely reliable.
Low Latency
High performance
Factors for Listen Servers
Half-way between dedicated client-server and peer-to-peer. One client acts as a temporary server.
Dependent on speed of host internet connection.
Host advantage requires lag compensation.
Host migration if host leaves.
Factors for Peer-to-peer
All data is sent as raw streams to all other computers in the game.
No specialist infrastructure required.
Number of connections and players is limited.
Same latency for all players.
What are Protocols
A protocol is a set of rules defining how two computers communicate with each other.
Protocols are standard so that all devices have a designated method of communicating
with each other, regardless of manufacturer.
HTTP and POP3 are types of Protocols.
Name the Layers of the TCP/IP stack and protocol layering.
Stage 1 - Application Layer
Stage 2 - Transport Layer
Stage 3 - Network Layer
Stage 4 - Link Layer
What is Stage1 - Application Layer
The application layer is based at the top of the stack. It specifies what
protocol needs to be used in order to relate the application that’s being sent
What is Stage 2 - Transport Layer
The transport layer uses TCP to establish an end-to-end connection
between the source and recipient computer.
The transport layer splits data up into packets and labels these packets with
their packet number
The total number of packets the original data was split
up into and the port number being used for communication.
What is Stage 3 - Network Layer
The network layer adds the source and destination IP addresses. The
combination of the IP address and the port number is called a socket
address