1.5 Network Topologies V2

Beschreibung

Kool kids only
William Suputra
Mindmap von William Suputra, aktualisiert more than 1 year ago
William Suputra
Erstellt von William Suputra vor fast 7 Jahre
24
0

Zusammenfassung der Ressource

1.5 Network Topologies V2
  1. The majority of computers are connected together through via networks.
    1. A network is a unit of computers linked together to allow them to contribute resources they have done to other users.
      1. Networked computers can share hardware, software and data.
        1. Networks are all around you; school, at home, in businesses and hospitals.
    2. Key Words
      1. Topology
        1. Mesh Network
          1. Where some or all of the workstations or other devices are connected directly to each other. most are usually connected to the noode that they exchange the most data with.
          2. Star Network
            1. In a star network, each device is connected by an individual cable directly to the server. Star networks are usually the layout of choice in schools and offices because they tend to be the most reliable of the topologies.
            2. Wifi
              1. Encryption
                1. Ethernet
                2. Ethernet
                  1. Stable connection, reduction possibility to be hacked, more secure, faster traffic speed, generally will have a good quality signal
                  2. Wifi
                    1. Cheap set up costs , more vulnerable to hacking, the signal quality will reduce through walls or obstructions, can connect multiple devices without the need for extra hardware
                      1. Interference can occur, less disruption to the building due to no wires being installed, user not tied down to a specific location, may not be able to receive signal, the connection is not as stable as wired network and can 'drop off'. Tend to have slow transfer speeds
                    2. IMAP - Used to retrieve emails. HTTP - Used to retrieve email. SMTP - Used to send emails.
                      1. Upgrading from a b series to a n series make faster data transmission due to the fact of additional bandwidth carrying more non-overlapping channels, less interference.
                        1. The encryption process
                          1. 1)Client requests HTTPS session
                            1. 2) Certificate sent to client from the server
                              1. 3)Client creates session key
                                1. 4) Session encrypted with session key
                                  1. 5) The session key is decrypted with the private key
                                    1. 6) Session encrypted with session key
                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                          ähnlicher Inhalt

                          Types and Components of Computer Systems
                          Jess Peason
                          Input Devices
                          Jess Peason
                          Output Devices
                          Jess Peason
                          Computing
                          Kwame Oteng-Adusei
                          Pack of playing cards answer
                          Karl Taylor
                          Code Challenge Flow Chart
                          Charlotte Hilton
                          Computing Hardware - CPU and Memory
                          ollietablet123
                          Computer Systems
                          lisawinkler10
                          Computer science quiz
                          Ryan Barton
                          Input, output and storage devices
                          Mr A Esch
                          Neurobiologie Übersicht
                          Laura Overhoff