1
Q

What is a topology?

A

The topology is the shape of the network – how the computers are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a star topology?

A

A central device such as a hub/switch/server provides connections to each device (computer/printer/laptop…) on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of a star topology?

A
  • very reliable, if one connection fails, it doesn’t affect the other users
  • few data collisions
  • good security
  • simple to add or remove a node
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the disadvantages of a star topology?

A
  • most expensive network topology to install because of the amount of cables needed
  • installing the network normally needs experts to set it up
  • if the central switch or server fails, the whole network is down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a mesh topology?

A

It doesn’t rely on a central node, but has multiple connections to other devices in its environment. This requires a lot more cable but it is very robust as if one cable fails there are many other routes available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of a mesh topology?

A
  • very robust, if one path fails the rest can still be used
  • no central node to rely on
  • can handle very high traffic rates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of a mesh topology?

A
  • rapidly becomes impractical as a wired network because of the amount of cables needed
  • needs complex coordination to be effective
  • very expensive due to the amount of cables and switches needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Wi-Fi?

A

A wireless method of transmitting data in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What hardware does Wi-Fi use?

A

It uses a WAP (Wireless Access Point) or base station to transmit radio waves to and from devices which have WiFi capability (a wireless NIC is required). The WAP will be connected by cables to a switch or router which will then connect to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How should passwords be treated on a Wi-Fi network?

A

Passwords should be password protected to only allow authorised users to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an advantage and disadvantage of Wi-Fi?

A

WiFi is great for portability of devices as you don’t need a cable for your device, but the transmission of data is not as fast or reliable as using a cabled connection (Ethernet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two frequency bands for Wi-Fi?

A

There are two frequency bands: 2.4 GHz and 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the features of the different frequency bands of Wi-Fi?

A

-the 2.4 band can cover a greater distance
-the 5 GHz band is quicker if you are closer to the WAP
There are a number of channels within each band but only certain channels are non-overlapping, so these are used more frequently to prevent interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

Encryption scrambles your original data by using a cipher key, transmits it in this unintelligible format, then decrypts it at the receiver’s device to turn it back into plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should data be encrypted?

A

Data sent via radio waves should be encrypted to prevent people intercepting your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocols can perform encryption?

A

This can be done with WPA or WPA2 (WiFi Protected Access) security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Ethernet?

A

Is a method of transmitting data via cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are examples of Ethernet?

A

Common cable types are UTP, STP and co-axial, as well as fibre optic for high performance. The most common are CAT 5 cables, which are unshielded twisted pair copper cables and are low cost but have reasonable performance. For a faster performance CAT 6 cables can be used, but these are more expensive to purchase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are network protocols?

A

A set of rules to determine how devices communicate across a network and how data is transmitted. There are lots of different protocols to control different aspects of the network communication.

20
Q

What does HTTP(s) stand for and what is the protocol for?

A

HTTP(s) – Hypertext Transfer Protocol (secure) – for the web

21
Q

What does FTP stand for and what is the protocol for?

A

File Transfer Protocol

22
Q

What does POP stand for and what is the protocol for?

A

POP - Post Office Protocol – receive email from a server (deleted from server once you have downloaded it)

23
Q

What does IMAP stand for and what is the protocol for?

A

IMAP - Internet Message Access Protocol – retrieve email keeps original on server – you get a copy (web based email clients like gmail)

24
Q

What does SMTP stand for and what is the protocol for?

A

SMTP - Simple Mail Transfer Protocol – send email

25
Q

What is the protocol Ethernet for?

A

Ethernet – wired data transfer

26
Q

What is the protocol Wi-Fi for?

A

WiFi – wireless data transfer

27
Q

What does TCP stand for and what is the protocol for?

A

TCP – Transmission Control Protocol - allows two or more computers to communicate - it splits data into packets, checks that the data has been received correctly and re-assembles packets once delivered

28
Q

What does IP stand for and what is the protocol for?

A

IP - Internet Protocol

29
Q

What does UDP stand for and what is the protocol for?

A

UDP - User Datagram Protocol is an alternative to TCP, it doesn’t check for errors, so is slightly quicker (used in gaming and video calls)

30
Q

What is the protocol Bluetooth for?

A

Bluetooth – wireless data transfer

31
Q

What are the layers in networking?

A

Application Layer
Transport Layer
Internet Layer
Network/Data Link Layer

32
Q

What is the purpose of layers in networking?

A

Layers help to separate the different protocols so that they can be actioned without needing to know about protocols on other layers.

33
Q

What are the protocols in the application layer?

A
HTTP(s) 
FTP 
POP 
IMAP 
SMTP
34
Q

What are the protocols in the transport layer?

A

TCP

35
Q

What are the protocols in the Internet layer?

A

IP

36
Q

What are the protocols in the Network layer?

A

Ethernet

Wi-Fi

37
Q

What is the purpose of the application layer?

A

The protocols in this layer provide access to email, files and websites across an IP network

38
Q

What is the purpose of the transport layer?

A

The TCP part of the TCP/IP protocols resides in this layer. It is responsible for dividing messages into packets, adding sequence numbers and error correction information. It also checks and deals with errors of received data packets

39
Q

What is the purpose of the internet layer?

A

The IP part of the TCP/IP protocols resides in this layer. It is responsible for managing the address of source and destination locations

40
Q

What is the purpose of the network layer?

A

The protocols in this layer are responsible for actually transmitting and receiving data through cables or wireless

41
Q

What is packet switching?

A

Data sent across a network is split into packets to relieve the load on the network and make for a more efficient use of the network as a whole. The packets are sent to routers which forward the data onto its destination.

42
Q

What are the steps of packet switching?

A
  • The data is split into equal sized packets
  • Each packet has the destination IP address, and the source IP address added to it
  • Each packet is given a sequence number
  • Error checking data is added to each packet (a checksum) to make sure no errors have occurred in transit
  • The packets are sent across the network via a series of routers, at each router the most efficient path at the moment is chosen, until the packet reaches its destination address
  • packets have to be re-ordered at the destination device before the data can be viewed
43
Q

What happens if packets of data have been lost when being sent across a network?

A

a request to re-send that packet will be sent

44
Q

What is an advantage of packet switching?

A

-security is increased as packets may travel on different routes so not all of the message will be intercepted

45
Q

What is the TTL of a packet?

A

Time To Live
-Each packet has a time to live value which is decreased at every router so that if it is caught in a loop the router will drop the packet when the TTL reaches zero

46
Q

What is circuit switching?

A

connecting two devices using the same network path, which is then reserved until the message is completed. This is an inefficient use of the network.