null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
12199578
Network Topologies V2
Descrição
GCSE Computing (1.5 Network Topologies) Mapa Mental sobre Network Topologies V2, criado por 2402 2003 em 10-02-2018.
Sem etiquetas
computing
1.5 network topologies
gcse
Mapa Mental por
2402 2003
, atualizado more than 1 year ago
Mais
Menos
Criado por
2402 2003
quase 7 anos atrás
34
0
0
Resumo de Recurso
Network Topologies V2
Mesh Network
A network where some or all of the workstations or devices are connected directly to each other
Most devices are usually connected to the 'node' (device) that they exchange the most data with
If one device fails, not all data is lost
Star Network
A network where each device is individually connected via a single cable to the server
More commonly used in schools and offices
Very reliable; harder to hack
However, great amount of pressure is put on the Central Device
More expensive to set up
Wi-Fi (Wireless Frequency)
Radiowaves which are used to transmit packets
No need for wires and cables
Slower than Ethernet; more vulnerable to attack by hackers
Can be set up in remote locations e.g. Building, Planes etc.
Encryption
A method of scrambling data with a key code that doesn't make sense on its own
Can only be 'decrypted' (unscrambled) with a encryption key (same key used to 'encrypt' the device in the first place)
Encryption method used is called SSL (Secure Socket Layer); Used on websites e.g. Twitter
Makes it harder for hackers to hack encrypted data
Computer Network
A number of computers linked together to share resources with each other; Can share Hardware, Software, Data
Printers, Tablets, Laptops and Webcams can also be connected devices that work in a computer network
IP Address
A unique set of numbers separated by full stops
Identifies each computer or device using the Internet Protocol to communicate and interact with a network
Similar to a postcode to identify a house in a area
Sent with the packets to identify which computers are being sent data and where the data was sent from
Is broken down into 4 numbers which can represent a number between 0 and 255 separated with a full stop
IP Classes
IP Addresses have different classes which identify the class of network which the user is on
Indicates the number of total possible users and purpose of the network
Static IP - Never changes Dynamic IP - Periodically changes
MAC Address (Media Access Control Address)
Uniquely identifies a device on a network by identifying the network adapter that it is using
Allows you to distinguish between different devices
Unique code built into the NIC (Network Interface Card)
Embedded onto the device when made and cannot be changed by the user
Written individually and made up of 48 bits, normally in hexadecimal
Protocols
A set of rules or conventions which control the communication between devices on a network
Key Protocols
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Used to transmit data between different networks
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
Used when transferring files around the World Wide Web (websites etc.) HTTPS encrypts data, making it more secure
FTP (File Transfer Protocol)
Transfer files between computers on a network
POP (Post Office Protocol)
POP3 (Post Office Protocol v3)
Retrieves mail; doesn't send email
IMAP ( Internet Message Access Protocol)
Retrieves and stores email messages on a mail server and allows you to manipulate them as if they were your own
SMTP (Simple Mail Transfer Protocol)
Transmits email over the Internet on mail servers (e.g. Yahoo, Gmail)
Packet Switching
Breaking down data into packets which are sent through the router and then reassembling it
Contains IP Address of sender and reciever
Contains Sequence Number (Order of Packets)
Contains time for when it's alive
If not all packets are recieved, an error message is sent and the packets are resent, if that still does't work, then packets are deleted
Packets are reassembled in the right order once all packets have been recieved
Contains Payload (actual data it's carrying)
Contains Error Detection Codes
Confirmation message is sent once all packets have recieved and placed in the right order
Layers
Where packets travel through while data is being recieved
Protocols manage the data which have gone through the layers, adding or removing data if necessary
If one layer fails/ not all layers are affected
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer science quiz
Ryan Barton
GCSE Computing - 4 - Representation of data in computer systems
lilymate
OCR gcse computer science
Jodie Awthinre
Ação Penal
Carolina Fernanda Silva
Explore a Biblioteca