Networks
- Created by: jacksie
- Created on: 13-11-19 15:21
View mindmap
- Factors of networks
- Networks
- hardware
- Nic
- internal bit of hardware
- usually on motherboard
- allows device to connect to a network
- Switch
- switch transfers data in a network
- Transfers data with the right MAC address
- switch transfers data in a network
- Router
- transfers data between networks
- important in transferring data in the ineternet
- they transfer units called packets
- Nic
- wireless
- wireless networks uses radio waves
- they need a WAP, wireless access point
- to connect wirellessly, they need capability
- but you can use a dongle
- dmi dongle used for streaaming
- but you can use a dongle
- to connect wirellessly, they need capability
- they need a WAP, wireless access point
- WiFi
- transfers around 2.4 to 5 ghz
- 2.4 covers a larger range
- 5 is quicker
- the connection is split into a number of channels that overlap
- transfers around 2.4 to 5 ghz
- wireless networks uses radio waves
- peer-peer and client server
- Clirnt server
- stores data centrally in the server
- The client makes a request, processed and executed by server
- server stores users, passwords, data
- some functions need a required password
- server stores users, passwords, data
- pros and cons
- Central storage, easier to backup
- More secure
- however, hard to maintain
- needs IT specialist
- Central storage, easier to backup
- peer-peer
- P2P, is more for domestic LAN
- No centralised management
- Backing up data has to be done individually
- May lead to multiple copies that aren't needed
- Backing up data has to be done individually
- doesn't rely on a server
- will run if a node fails
- Clirnt server
- Topolgies
- Star Network
- A central switch in the middle
- Allows fewer data collisions than a bus
- More than one device can run
- Needs IT specialist
- in a wireless network, easy to add a node
- hardware may be expensive
- however may be expensive with an office with 50 terminals
- if switch or server crashes whole network fails
- A central switch in the middle
- Ring and bus
- problem of data collisions and the fact that only one device can transfer
- Mesh
- Ideal
- if a node fails, since there are other routes
- however, would cost a lot in a wired network
- becoming more wireless
- however, would cost a lot in a wired network
- if a node fails, since there are other routes
- Ideal
- Star Network
- Network Protocols
- protocols are a set of rules of how to communicate
- MAC
- A mac is a 64 bit or 128 bit binary num,ber
- Created by the manufacturer
- they are the unique identifier
- permanent
- translated into hexadecimal
- Created by the manufacturer
- A mac is a 64 bit or 128 bit binary num,ber
- Ip adresses
- communicate between networks
- IP/TCIP, are used over the internet
- there are two types: static and dynamic
- static IP
- they are permanent, meaning they don't change
- Big companies pay a lot for static ip
- This is because they don't wanthe Ip adress to change
- dynamic IP
- THis is changes
- used by ISPs
- internet service providers
- more cost effective
- used by ISPs
- THis is changes
- static IP
- either a 32 bit or 128 bit binary number
- 32 bit is translated into four denary numkbers
- 128 bit is 8 hexadecimal numbers numbers
- Packets
- when data is transferred it is plit into packets
- packets have 3 componenets
- header
- this contains the destination, this is like an envelope
- payload
- this is the contents of the packet
- liek the inside of a letter
- this is the contents of the packet
- checsum
- this is a number at the end to check data is not corrupted
- header
- packets have 3 componenets
- Packet switching
- when transferring data
- data is split into packets
- a router reads the packet header and decides the way it travels depending on IP rules
- If a router recives to many packets it may priotise some
- Some packets may be lost, so it checks periodically all packets are there, if so a timeout message is sent
- the packets may not be order so they are arranged
- If the checksum is coorect, a reciept confirmation is sent
- the packets may not be order so they are arranged
- Some packets may be lost, so it checks periodically all packets are there, if so a timeout message is sent
- If a router recives to many packets it may priotise some
- a router reads the packet header and decides the way it travels depending on IP rules
- data is split into packets
- when transferring data
- when data is transferred it is plit into packets
- there are two types: static and dynamic
- IP/TCIP, are used over the internet
- communicate between networks
- IP/TCP
- TCP, is in charge of splitting data into packets
- Other protocols build upon IP/TCp
- HTTP
- hyper text transefr protocol
- transfer data from browser to web server
- HTTps
- encrypts all data
- hyper text transefr protocol
- FTP
- used to transfer files between devices on a network
- POP3
- Post office protocol
- retrieves email from a server
- deltes from the server once you download it
- retrieves email from a server
- Post office protocol
- IMAP
- intternet message aaccess protocol
- retrieves email
- deletes email when u delete
- web based clients
- deletes email when u delete
- retrieves email
- intternet message aaccess protocol
- SMTP
- used to send mails , and transfer emails between servers
- HTTP
- Other protocols build upon IP/TCp
- Layers
- A layer is a group of protocols with A SIMILAR FUNCTION
- Layers are self-contained- they don@t know whats happening with other layers
- Layers servethe layer above them
- Layers are self-contained- they don@t know whats happening with other layers
- Layer 4- application
- This layer sets up data as websites and other applications
- https, smtp
- Layer 3- transfer
- this is in charge of data flow, splitting data into packets
- TCP
- Layer 2- Network
- connections between networks, directing packets. Used by routers
- IP
- Layer 1--link layer
- This converts data into the lectrical signals, transfer data into a physical network
- Ethernet
- This converts data into the lectrical signals, transfer data into a physical network
- connections between networks, directing packets. Used by routers
- this is in charge of data flow, splitting data into packets
- This layer sets up data as websites and other applications
- A layer is a group of protocols with A SIMILAR FUNCTION
- TCP, is in charge of splitting data into packets
- Internet
- INternet is a netwrok of networks
- WWW is a collection of hosted web pages on a server
- URL are adresses for a specific webpage or file
- DNS(Domain name server- converts ip adress into a domain name
- URL are adresses for a specific webpage or file
- WWW is a collection of hosted web pages on a server
- Hosting is when a business stores files of another
- the most common use is the @cloud'
- third party commpany
- Don't need to pay for hardware
- Don't need to pay an IT staff to manage data
- automated backups
- easy to increase your storage
- however, subject to an attack
- another company has access to your fild
- subscription to cloud software may be expensive
- another company has access to your fild
- however, subject to an attack
- Don't need to pay an IT staff to manage data
- Don't need to pay for hardware
- third party commpany
- the most common use is the @cloud'
- Virtual networks
- this is networks made on software
- created by partitioning some bandwidth of a physical network
- several virtual networks can exist on a physical network
- more cost efficient
- Each network has is its own security and fire wall
- can have access to some of the physical network but not the virtual network
- Each network has is its own security and fire wall
- more cost efficient
- VPN
- virtual private network
- this encrypts data making it secure
- used over WANs
- school intanet
- this encrypts data making it secure
- virtual private network
- virtual LAN
- breaks up a LAN into several networks on the same hardware
- this is networks made on software
- INternet is a netwrok of networks
- SEcurity
- Passive attacks
- they monitor quietly data being transferred and pick up sensitive software
- they use software like packet sniffers
- best defnse is encryption
- they monitor quietly data being transferred and pick up sensitive software
- active attack
- they actively attack with malware
- best defense is firewall
- they actively attack with malware
- Insider attack
- steals information within a network
- Brute force attack
- creates hundreds of likely passwords until it gets it right
- automated software
- create a lockout after a certain number of attempts
- creates hundreds of likely passwords until it gets it right
- Denial of serive
- floods a network with data
- Malware
- delete or modify files
- scareware
- says its infected with viruses
- ransomware
- locks files
- monitoring data and sends it to the hscker
- Untitled
- viruses
- linked to file .exe
- spread when file is saved
- activated when file is open
- trojans
- data seems legitimate but isnt
- worms
- self replicate without user help
- linked to file .exe
- open backdoors for future attacks
- Passive attacks
- hardware
- bandwidth
- the amount of data that can be transferred
- mbps
- the better the bandwidth the greater the performance
- mbps
- the amount of data that can be transferred
- for wired networks
- the hardware
- Fibre optic cables are faster than copper wires
- the hardware
- The topology
- peer-peer faster than client server
- bandwidth availability
- heavy traffic and congestion slows down networks
- Networks
Similar Computing resources:
Teacher recommended
Comments
No comments have yet been made