null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12222121
1.5 Network Topologies, Protocols and Layers
Description
Mind Map on 1.5 Network Topologies, Protocols and Layers, created by शॉन Bainton on 12/02/2018.
No tags specified
bonce adviser
Mind Map by
शॉन Bainton
, updated more than 1 year ago
More
Less
Created by
शॉन Bainton
over 6 years ago
39
0
0
Resource summary
1.5 Network Topologies, Protocols and Layers
reasons why you may have chosen to use a Star network topology
• They are very reliable
• If one connection fails it does not affect the rest of the network
• It is relatively easy to add additional devices onto the network
• It is relatively fast as each device has its own connection to the switch / server.
• There are few data collisions
disadvantages of using a Star network topology instead of a Mesh network topology
• There is a high level of dependence on one single, central device.
• If the central device fails the whole network will fail.
• The use of a switch or router could increase the cost of the whole network.
• The performance of the network will be dependent upon the specification of the central device / switch.
• The number of additional devices that can be added to the network could be restricted by the central device / switch.
protocol
A set of rules that govern how devices communicate
protocol that is used to transmit data between different networks
Transmission Control Protocol / Internet Protocol. TCP/IP
POP
Post office protocol.
HTTP and HTTPS
HTTP transmits data over the internet in a unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless
Data is transmitted across a network in packets. Three items that each data packet will contain
Network address source
Network address destination
Packet number / sequence
Payload
HTTP
Used by web browsers to communicate with web servers.
IMAP
Used to retrieve emails
SMTP
Used to send emails
Protocols are divided into layers. Why are layers used
Network communication components are standardised which helps to ensure that different types of hardware and software are able to communicate.
Through separating the overall network communication processes it makes troubleshooting easier should an error occur
• To ensure that if changes are made in one layer they do not affect any other layers
Through dividing overall network communication into smaller, individual components it makes the software development process more straightforward.
Packet switching is used to send data on the internet
The difference between an IP address and a MAC address
A MAC address is permanently assigned to a device on the network whereas an IP address may change when the device joins a different network.
Devices may have either a static or dynamic IP address
A static IP address never changes, whereas a dynamic IP address may change when you log on to a network or change networks.
FTP
File Transfer Protocol.
POP3
Post Office Protocol version 3
To retrieve emails, only award the mark for retrieve (or similar). The protocol cannot be used to send emails
steps of sending a packet
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
The Digestive System
cian.buckley
Crime and Deviance with sociological methods key terms
emzelise1996
Maths Quiz
Andrea Leyden
GCSE Maths Symbols, Equations & Formulae
Andrea Leyden
Resumo para o exame nacional - Fernando Pessoa Ortónimo, Alberto Caeiro , Ricardo Reis e Álvaro Campos
miminoma
A-level Psychology Revision
philip.ellis
med chem 2
lola_smily
GCSE REVISION TIMETABLE
TheJileyProducti
MATTERS OF LIFE AND DEATH - UNIT 1, SECTION 2 - RELIGIOUS STUDIES GCSE EDEXCEL
Khadijah Mohammed
GCSE Maths: Geometry & Measures
Andrea Leyden
GCSE Geography - Causes of Climate Change
Beth Coiley
Browse Library