OCR GCSE - Computer Science - Paper 1 - Network Topologies, Protocols, and Layers

Description

GCSE Computing Flashcards on OCR GCSE - Computer Science - Paper 1 - Network Topologies, Protocols, and Layers, created by Malachy Moran-Tun on 10/04/2021.
Malachy Moran-Tun
Flashcards by Malachy Moran-Tun, updated more than 1 year ago
Malachy Moran-Tun
Created by Malachy Moran-Tun about 4 years ago
19
0
1 2 3 4 5 (0)

Resource summary

Question Answer
What is a Network Topology? The layout of the network, including how the devices are connected and communicate with eachother
What is a Star Topology? > Devices are connected to a central switch / server > Central switch allows many devices to access the server simultaneously > Can be wired or wireless
What are the Advantages of Star Topology? > If one device / node fails, the rest of the network is unaffected > Easy to add more devices > High performance - data goes straight to the central device, so all devices can transmit data at once > Little data collisions
What are the Disadvantages of Star Topology? > Can be expensive to setup: if wired, every device needs a cable to connect; the server requires maintenance > If the switch / server fails, the whole network is affected
What is Mesh Topology? > Decentralised - devices are directly or indirectly connected to eachother but there is NO central switch / server > Partial: majority of nodes are connected to eachother - sends data along the fastest route > Full: all nodes are connected to eachother - fastest route is direct
What are the Advantages of Mesh Topology? > No single point of failure - if ANY device fails, the network stays up and data can be sent along a different route to get to its target > High performance - if it is a full mesh topology, every machine has a direct route for data travel > Less expensive if wireless
What are the Disadvantages of Mesh Topology? > Extremely expensive - you need a lot of wiring to connect many devices together, however, if wirelessly connected, it is less expensive
What is Wi-Fi? > Standard for wireless networking > Uses two frequency bands - 2.4 GHz and 5 GHz > Bands are split into channels that cover a range - in 2.4 GHz, these channels overlap > Performance is affected by adjacent channels
What are the Advantages of 2.4 GHz Wi-Fi? > Greater range - can serve devices across a wide area > Better at getting through solid objects / walls
What are the Advantages of 5 GHz Wi-Fi? > Extremely fast (when communicating over a short distance) > Less overlapping channels, so a lower chance of interference
What are the Disadvantages of Wi-Fi? > Limited range, usually <50m > Signals can suffer from electromagnetic interference > Wireless Access Points have a limited amount of bandwidth to share - the more connections, the slower the network > Signals pose a security risk as they can be intercepted by unauthorised users
What is Encryption? Process of purposely scrambling data and disguising a message so it cannot be understood until it is decrypted by the intended recipient - it makes networks secure
What is a MAC Address? > Unique identifier assigned to all network-enabled devices by the manufacturer > Unique and unable to be changed > Used by Ethernet and LANs > Switches read MAC addresses to direct data
What is an IP Address? > Used when sending data between TCP / IP networks (usually over the Internet) > Not linked to hardware - assigned manually (static) or automatically (dynamic) > IPv4 - 32-bit denary number (255.255.255.0) > IPv6 - 128-bit hexadecimal numbers (FEC0:0000:0000:0000:0000:0000:0000:0001)
Where are Static IP Addresses Used? > Connecting printers on a LAN > Hosting websites on the Internet (they are be expensive for this reason)
Where are Dynamic IP Addresses Used? > Devices that log onto a network (usually the Internet) > Has a different address every time it connects > Internet Service Providers (ISPs) use these since they are cost effective and reusable
What is a Network Protocol? Set of rules for how devices should communicate and how data is transmitted across a network, including how it should be organised, and what to do if data goes missing
What is TCP? > Transmission Control Protocol > Rules for how devices connect on the network > Responsible for splitting data into packets, reassembling the data, and checking the data was correctly sent / delivered
What is IP? > Internet Protocol (creative name) > Responsible for packet switching (next card)
What is Packet Switching? Used by routers to direct data packets on IP networks (usually the Internet) > Sending device splits data into packets, with each packet having a number to show the order of the data > Router reads the packet header and decides the fastest route to send the packet, using the IP address as a destination > Fastest route depends on network traffic, so routes change very often > Packets can arrive in the wrong order, so the receiving device uses the packet numbers to reassemble them > Some packets may go missing, so the receiving device sends a timeout message, at which the sending device can send that packet again > Once all data is received and the checksums match (making sure all data is correct), a receipt confirmation is sent to the sending device
What is HTTP(S)? > Hyper Text Transfer Protocol (Secure) > Used by web browsers to access websites and communicate with web servers > Secure encrypts all information
What is FTP? > File Transfer Protocol > Used to access, edit, and move files between devices on a network (e.g. between a server and a client computer)
What is POP3? > Post Office Protocol (3) > Used to retrieve emails from a server > The server holds the email UNTIL it is downloaded, at which point it is deleted from the server
What is IMAP? > Internet Message Access Protocol > Used to retrieve emails from a server > Server holds and keeps the email until it is requested to be deleted by the user > A copy is downloaded when accessed
What is SMTP? > Simple Mail Transfer Protocol > Used to send emails and transfer emails between servers
What are Layers in Network Protocols? > Network protocols are divided into layers with similar functions > Self-contained - the protocols in each layer do their job without needing to know what's happening elsewhere > Each layer serves the layer above it
What are the Advantages of Using Layers? > Breaks network communication into manageable pieces, so developers can concentrate on one area of the network > Since they are self-contained, they can be changed without other layers being affected > Companies must make compatible and universal software due to the set rules for each layer
Show full summary Hide full summary

Similar

Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
GCSE Computing - 4 - Representation of data in computer systems
lilymate