4. Networks

Descripción

-topologies -hardware -protocols -network security measures -network policies
Asia Dixon~Nyah!
Mapa Mental por Asia Dixon~Nyah!, actualizado hace más de 1 año
Asia Dixon~Nyah!
Creado por Asia Dixon~Nyah! hace casi 9 años
10
0

Resumen del Recurso

4. Networks
  1. Definition: Collection of computers and other hardware connected to allow the communication and sharing of resources
    1. Network types
      1. LAN
        1. Occupy an office or building
        2. WAN
          1. e.g Internet
        3. Advantages
          1. Allow software to be installed
            1. Communication: email,IM
              1. Sharing resources
                1. Share file access
                  1. Share printers
                    1. Internet connection
                    2. Network management
                      1. Access to files wherever you log in(LAN)
                    3. Devices
                      1. Router
                        1. Enables connection between LAN and internet
                        2. Hub
                          1. Where multiple computers can be connected by ethernet cables.
                            1. Computers can communicate with eachother
                              1. Allows internet connection to be shared
                              2. Switch
                                1. Same as hub, Learns location of the computers and other devices plugged in
                                  1. More efficient(fewer unnecessary signals
                                2. Network interface card (NIC)
                                  1. Where ethernet cable plugged in
                                    1. Wireless signals recieved
                                  2. Topology
                                    1. Bus
                                      1. 2 Terminators
                                        1. Backbone
                                          1. Advantages
                                            1. Cheap/Minimal cabling
                                              1. Easy to remove computers
                                              2. Disadvantages
                                                1. Slowed by by highway network traffic
                                                  1. Main cable fails-entire network fails
                                                2. Star
                                                  1. Single central device(switch?hub)
                                                    1. Advantages
                                                      1. Faults easy to find
                                                        1. Easy to add extra devices
                                                          1. System is secure as data is only sent to needed device
                                                            1. If 1 cable fails only that device at end fails
                                                            2. Disadvantages
                                                              1. Lots of cable(expensive)
                                                            3. Ring
                                                              1. Connected in a "circle"
                                                                1. Advantages
                                                                  1. Very high rates of transmission possible
                                                                    1. No collisions
                                                                    2. Disadvantages
                                                                      1. Failure of single device or cable brings entire network down
                                                                        1. Security not ensured
                                                                    3. Protocols
                                                                      1. Used in communication between computers and their periphaerals and between computers across a network
                                                                        1. Set of rules that computers mus follow in order for successful communication
                                                                          1. HTTP(Hyper Text Transfer Protocol)
                                                                            1. Set of rules governing how hypertext is moved around the internet from device to device
                                                                            2. FTP(File transfer Protocol)
                                                                              1. How files are moved from one computer to the other across the internet
                                                                                1. Relies upon building websites,moving files from developer's computer to a server, from which they can be accessed publicly
                                                                                2. TCP(Transmission Control Protocol)
                                                                                  1. Used by email and web pages to ensure data is sent securely and in an orderly way.
                                                                                  2. IP(Internet Protocol)
                                                                                    1. Provides computer with its own unique address
                                                                                    2. Protocol Stack
                                                                                      1. Combination of pieces of software that allow multiple protocols to be used on a single computer in the correct order
                                                                                    3. Networks Security Measures
                                                                                      1. Passwords
                                                                                        1. Strong passwords
                                                                                          1. Symbols,Numbers, upper/lower case words
                                                                                        2. User access levels
                                                                                          1. Different access and privileges levels according to user
                                                                                            1. Student: Manage own files
                                                                                              1. Trainee network technician: Install software + student level access
                                                                                                1. Network manager: Format drives, delete/create user accounts + Trainee access
                                                                                                2. Encryption
                                                                                                  1. Turns readable data into apparent nonsense
                                                                                                    1. Decrypted after sent over internet
                                                                                                      1. Encryption key
                                                                                                        1. Samll program that encyptes or decrypts data
                                                                                                    2. Network Policies
                                                                                                      1. Acceptable use
                                                                                                        1. Sets out what users are allowed to do and not allowed to do in a networj
                                                                                                          1. e.g Whether users can play games
                                                                                                            1. e.g What personal information should be entered into a network
                                                                                                              1. Without employees signing this they may break laws by accident and cause their company legal problems
                                                                                                            2. Backup
                                                                                                              1. States what data will be backed up from the network,how often it will be backed up, where it will be stored and how it would be used to restore any lost data
                                                                                                                1. Data is less likely to be lost
                                                                                                                2. Archive
                                                                                                                  1. Long-term storage for data that is not needed on a day-to-day basis
                                                                                                                    1. Archive policy will stipulate what data is to be achieved,where it will be stored and how old data needs to be before it is archived
                                                                                                                      1. For legal reasons, organisations need to keep data for longer than it is useful to them
                                                                                                                      2. Disaster recovery
                                                                                                                        1. Describes how an organisation's IT infrastructure will keep it running in the event of a disaster
                                                                                                                          1. Contains parts of the backup and failover policies
                                                                                                                            1. Important because an organisation without an IT capability is likely to lose income
                                                                                                                              1. Loose people's trust in their ability to operate
                                                                                                                          Mostrar resumen completo Ocultar resumen completo

                                                                                                                          Similar

                                                                                                                          Computing Hardware - CPU and Memory
                                                                                                                          ollietablet123
                                                                                                                          SFDC App Builder 2
                                                                                                                          Parker Webb-Mitchell
                                                                                                                          Data Types
                                                                                                                          Jacob Sedore
                                                                                                                          Intake7 BIM L1
                                                                                                                          Stanley Chia
                                                                                                                          Software Processes
                                                                                                                          Nurul Aiman Abdu
                                                                                                                          Design Patterns
                                                                                                                          Erica Solum
                                                                                                                          CCNA Answers – CCNA Exam
                                                                                                                          Abdul Demir
                                                                                                                          Abstraction
                                                                                                                          Shannon Anderson-Rush
                                                                                                                          Spyware
                                                                                                                          Sam2
                                                                                                                          HTTPS explained with Carrier Pigeons
                                                                                                                          Shannon Anderson-Rush
                                                                                                                          Data Analytics
                                                                                                                          anelvr