null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12199578
Network Topologies V2
Description
GCSE Computing (1.5 Network Topologies) Mind Map on Network Topologies V2, created by 2402 2003 on 10/02/2018.
No tags specified
computing
1.5 network topologies
gcse
Mind Map by
2402 2003
, updated more than 1 year ago
More
Less
Created by
2402 2003
almost 7 years ago
34
0
0
Resource summary
Network Topologies V2
Mesh Network
A network where some or all of the workstations or devices are connected directly to each other
Most devices are usually connected to the 'node' (device) that they exchange the most data with
If one device fails, not all data is lost
Star Network
A network where each device is individually connected via a single cable to the server
More commonly used in schools and offices
Very reliable; harder to hack
However, great amount of pressure is put on the Central Device
More expensive to set up
Wi-Fi (Wireless Frequency)
Radiowaves which are used to transmit packets
No need for wires and cables
Slower than Ethernet; more vulnerable to attack by hackers
Can be set up in remote locations e.g. Building, Planes etc.
Encryption
A method of scrambling data with a key code that doesn't make sense on its own
Can only be 'decrypted' (unscrambled) with a encryption key (same key used to 'encrypt' the device in the first place)
Encryption method used is called SSL (Secure Socket Layer); Used on websites e.g. Twitter
Makes it harder for hackers to hack encrypted data
Computer Network
A number of computers linked together to share resources with each other; Can share Hardware, Software, Data
Printers, Tablets, Laptops and Webcams can also be connected devices that work in a computer network
IP Address
A unique set of numbers separated by full stops
Identifies each computer or device using the Internet Protocol to communicate and interact with a network
Similar to a postcode to identify a house in a area
Sent with the packets to identify which computers are being sent data and where the data was sent from
Is broken down into 4 numbers which can represent a number between 0 and 255 separated with a full stop
IP Classes
IP Addresses have different classes which identify the class of network which the user is on
Indicates the number of total possible users and purpose of the network
Static IP - Never changes Dynamic IP - Periodically changes
MAC Address (Media Access Control Address)
Uniquely identifies a device on a network by identifying the network adapter that it is using
Allows you to distinguish between different devices
Unique code built into the NIC (Network Interface Card)
Embedded onto the device when made and cannot be changed by the user
Written individually and made up of 48 bits, normally in hexadecimal
Protocols
A set of rules or conventions which control the communication between devices on a network
Key Protocols
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Used to transmit data between different networks
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
Used when transferring files around the World Wide Web (websites etc.) HTTPS encrypts data, making it more secure
FTP (File Transfer Protocol)
Transfer files between computers on a network
POP (Post Office Protocol)
POP3 (Post Office Protocol v3)
Retrieves mail; doesn't send email
IMAP ( Internet Message Access Protocol)
Retrieves and stores email messages on a mail server and allows you to manipulate them as if they were your own
SMTP (Simple Mail Transfer Protocol)
Transmits email over the Internet on mail servers (e.g. Yahoo, Gmail)
Packet Switching
Breaking down data into packets which are sent through the router and then reassembling it
Contains IP Address of sender and reciever
Contains Sequence Number (Order of Packets)
Contains time for when it's alive
If not all packets are recieved, an error message is sent and the packets are resent, if that still does't work, then packets are deleted
Packets are reassembled in the right order once all packets have been recieved
Contains Payload (actual data it's carrying)
Contains Error Detection Codes
Confirmation message is sent once all packets have recieved and placed in the right order
Layers
Where packets travel through while data is being recieved
Protocols manage the data which have gone through the layers, adding or removing data if necessary
If one layer fails/ not all layers are affected
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer science quiz
Ryan Barton
GCSE Computing - 4 - Representation of data in computer systems
lilymate
OCR gcse computer science
Jodie Awthinre
GCSE Subjects
KimberleyC
Browse Library