Networks

HideShow resource information
View mindmap
  • Networks(2)
    • Hardware
      • cables
        • UTP - unsheilded twisted pair
        • light and flexible
        • fibre optic
          • long distances
          • light waves
          • cheaper
      • Switches
        • connect systems / devices
        • can also connect networks
        • sends info only to the node
      • Router
        • receives data
        • forwards packets to destination
        • direct traffic through large networks
    • Types of network
      • Client server
        • most common
        • computers are set up to handle network functions
        • typically high end computers
          • enough speed and storage to serve the needs of the connected computers.
        • server = physical machine / virtual
      • Peer to Peer
        • all computers are equal
          • each computer is responsible for carrying out network functions
        • easy to set up
        • harder maintenance
        • poor security
        • slow due to multitasking
    • Topologies
      • layout of the components
      • Bus
        • attatched by a single line with a terminator at each end
        • easy to set up
        • cheap
        • problem with the line can bring entire network down
        • limited distance
        • many collisions = slower
      • Star
        • machines connected to central switch/hub
        • robust
        • fewer collisions - faster
        • needs expertise to maintain
        • expensive
          • more building work needed
          • more hardware needed
      • ring
        • all nodes connected
        • no collisions - one way
        • vunerable to malfunctions - data goes through every node
    • packet switching
      • sending data in packets through different routes
      • improved reliability - another route can be found
    • Security
      • Unauthorised access
        • data loss
        • data theft
        • malware
      • backups
        • protect against data loss
      • archives
        • old data no longer in use
        • for future purposes or legal reasons
      • Failover
        • software detects potential disaster and transfers operations to a duplicate system
      • disaster recovery
        • prevention, backups
        • documented plan - what to do in catastrophy
      • Authentication
        • users are identified by username and password

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »