Topic 3: Networks Flashcards
LAN
Computer network that interconnects computers within a limited geographical area such as a building or a school.
PAN
Computer network for interconnecting electronic devices centered on an individual person’s workspace. Bluetooth for example. Can be wired or wireless.
WLAN and pros/cons
Wireless LAN
- Free movement
- Less expensive
- Less secure
WAN
Network that extends over a large geographic area for the primary purpose of computer networking. The best example is the Internet.
- Wired with fiber optic
- Wireless by microwaves or satellite transmissions
Extranet
Computer network that uses the Internet to allow controlled access by specific users to a specific LAN or WAN.
It can be used by an enterprise to secure part of its network and allow people from outside of the company to access to some data.
Intranet
Collection of private computer networks within a company, school, or organization.
- It uses the TCP/IP protocol.
- It main purpose is to facilitate the communication between individuals or work groups, and improve data sharing.
SAN
Network created so that large storage devices can be accessible from servers in a convenient and easy way.
- Secure high speed data transfer network
- SAN can be accessed from multiple servers
Importance of standards
Without standards, manufacturers of networking products have no common ground on which to build their systems.
Makes communication easier
Hub
Connection point for devices on a single network, which consists of sevral ports.
- Network devices and computer systems connect to a hub with a wire to a port.
- The data sent to a hub is copied and sent to all the other devices attached to it.
- The device that is expecting the data receives it, and the others just ignore the entering data.
- This slows down a network.
P2P
Distributed network where all the computer systems in the networks are both clients and servers at the same time.
Layers of OSI model
Physical (physical communication) Data Link Network Transport Session presentation Application (virtual communication)
VPN
Technology that creates a safe and encrypted connection over a less secure network, such as the internet.
Server
Can either be a computer system or a software app that provides a service to other computer systems connected to the same network.
Client
Can either be a computer system or a software app that requests a service from a server connected to the same network.
Protocol
Set of rules for data communication over a network to enable 2 or more devices understand eachother.
Used so that both sender and receiver are using/expecting the same formats/methods, to allow data to be transmitted successfully / without errors;
Protocol functions
Data integrity: Ensures that information has not been changed or corrupted.
Source integrity: Sender identity validated
Flow control: It ensures at which rate a node can transfer information in relation with the capability of other node to receive that information.
Congestion management: Modern networks avoids this collapses with some specifics applications.
Deadlock prevention: The protocol needs to stop both and requeue them so that they can happen sequentially.
Error Checking: Techniques used to detect noise or other impairments, while transmitting from the source to the destination. F.e. Parity bit