Network Topologies V2

Description

GCSE Computing (1.5 Network Topologies) Mind Map on Network Topologies V2, created by 2402 2003 on 10/02/2018.
2402 2003
Mind Map by 2402 2003, updated more than 1 year ago
2402 2003
Created by 2402 2003 almost 7 years ago
34
0

Resource summary

Network Topologies V2
  1. Mesh Network
    1. A network where some or all of the workstations or devices are connected directly to each other
      1. Most devices are usually connected to the 'node' (device) that they exchange the most data with
        1. If one device fails, not all data is lost
        2. Star Network
          1. A network where each device is individually connected via a single cable to the server
            1. More commonly used in schools and offices
              1. Very reliable; harder to hack
                1. However, great amount of pressure is put on the Central Device
                  1. More expensive to set up
                  2. Wi-Fi (Wireless Frequency)
                    1. Radiowaves which are used to transmit packets
                      1. No need for wires and cables
                        1. Slower than Ethernet; more vulnerable to attack by hackers
                          1. Can be set up in remote locations e.g. Building, Planes etc.
                          2. Encryption
                            1. A method of scrambling data with a key code that doesn't make sense on its own
                              1. Can only be 'decrypted' (unscrambled) with a encryption key (same key used to 'encrypt' the device in the first place)
                                1. Encryption method used is called SSL (Secure Socket Layer); Used on websites e.g. Twitter
                                  1. Makes it harder for hackers to hack encrypted data
                                  2. Computer Network
                                    1. A number of computers linked together to share resources with each other; Can share Hardware, Software, Data
                                      1. Printers, Tablets, Laptops and Webcams can also be connected devices that work in a computer network
                                      2. IP Address
                                        1. A unique set of numbers separated by full stops
                                          1. Identifies each computer or device using the Internet Protocol to communicate and interact with a network
                                            1. Similar to a postcode to identify a house in a area
                                              1. Sent with the packets to identify which computers are being sent data and where the data was sent from
                                                1. Is broken down into 4 numbers which can represent a number between 0 and 255 separated with a full stop
                                                  1. IP Classes
                                                    1. IP Addresses have different classes which identify the class of network which the user is on
                                                      1. Indicates the number of total possible users and purpose of the network
                                                      2. Static IP - Never changes Dynamic IP - Periodically changes
                                                      3. MAC Address (Media Access Control Address)
                                                        1. Uniquely identifies a device on a network by identifying the network adapter that it is using
                                                          1. Allows you to distinguish between different devices
                                                            1. Unique code built into the NIC (Network Interface Card)
                                                              1. Embedded onto the device when made and cannot be changed by the user
                                                                1. Written individually and made up of 48 bits, normally in hexadecimal
                                                                2. Protocols
                                                                  1. A set of rules or conventions which control the communication between devices on a network
                                                                    1. Key Protocols
                                                                      1. TCP/IP (Transmission Control Protocol/ Internet Protocol)
                                                                        1. Used to transmit data between different networks
                                                                        2. HTTP (Hyper Text Transfer Protocol)
                                                                          1. HTTPS (Hyper Text Transfer Protocol Secure)
                                                                            1. Used when transferring files around the World Wide Web (websites etc.) HTTPS encrypts data, making it more secure
                                                                            2. FTP (File Transfer Protocol)
                                                                              1. Transfer files between computers on a network
                                                                              2. POP (Post Office Protocol)
                                                                                1. POP3 (Post Office Protocol v3)
                                                                                  1. Retrieves mail; doesn't send email
                                                                                2. IMAP ( Internet Message Access Protocol)
                                                                                  1. Retrieves and stores email messages on a mail server and allows you to manipulate them as if they were your own
                                                                                  2. SMTP (Simple Mail Transfer Protocol)
                                                                                    1. Transmits email over the Internet on mail servers (e.g. Yahoo, Gmail)
                                                                                3. Packet Switching
                                                                                  1. Breaking down data into packets which are sent through the router and then reassembling it
                                                                                    1. Contains IP Address of sender and reciever
                                                                                      1. Contains Sequence Number (Order of Packets)
                                                                                        1. Contains time for when it's alive
                                                                                          1. If not all packets are recieved, an error message is sent and the packets are resent, if that still does't work, then packets are deleted
                                                                                            1. Packets are reassembled in the right order once all packets have been recieved
                                                                                              1. Contains Payload (actual data it's carrying)
                                                                                                1. Contains Error Detection Codes
                                                                                                  1. Confirmation message is sent once all packets have recieved and placed in the right order
                                                                                                  2. Layers
                                                                                                    1. Where packets travel through while data is being recieved
                                                                                                      1. Protocols manage the data which have gone through the layers, adding or removing data if necessary
                                                                                                        1. If one layer fails/ not all layers are affected
                                                                                                        Show full summary Hide full summary

                                                                                                        Similar

                                                                                                        Types and Components of Computer Systems
                                                                                                        Jess Peason
                                                                                                        Input Devices
                                                                                                        Jess Peason
                                                                                                        Output Devices
                                                                                                        Jess Peason
                                                                                                        Computing
                                                                                                        Kwame Oteng-Adusei
                                                                                                        Pack of playing cards answer
                                                                                                        Karl Taylor
                                                                                                        Code Challenge Flow Chart
                                                                                                        Charlotte Hilton
                                                                                                        Computing Hardware - CPU and Memory
                                                                                                        ollietablet123
                                                                                                        Computer science quiz
                                                                                                        Ryan Barton
                                                                                                        GCSE Computing - 4 - Representation of data in computer systems
                                                                                                        lilymate
                                                                                                        OCR gcse computer science
                                                                                                        Jodie Awthinre
                                                                                                        GCSE Subjects
                                                                                                        KimberleyC