ICT A2 Revision

HideShow resource information
  • Created by: Victoria
  • Created on: 27-02-14 13:30
Advantages of a peer-to-peer network
Cost saving as no server required, No network manager required, Easy to set up, No reliance on server so no issue of breakage of the server, Lower operating costs, Users decide which files are stored - peer responsibility
1 of 26
Disadvantages of a peer-to-peer network
No central backup, users require more IT knowledge, poorer security, some computers may run slowly, users may not be able to find needed files, only suitable for small networks
2 of 26
Define a peer-to-peer network
Each computer has the same status. Can be used for home sharing and are popular in sharing p-p networks across the internet
3 of 26
Define a client server
A more powerful computer serves the client terminals. All the files and programs are stored on the server
4 of 26
Advantages of Client Server
Security is better - 1 person has admin rights rather than a hierarchy of passwords, centralised data - all users can access the same set of data, Backups are taken carefully, Faster access to programs as the server is more powerful than Peer-to-peer
5 of 26
Disadvantages of Client Server
More expensive - servers are expensive, Need specialist knowledge to maintain, Software is -specialised -sophisticated - expensive, if the server breaks down the network is unusable
6 of 26
Define a Network Topology
The physical configuration of a network, which shows how it is linked together
7 of 26
Describe a ring topology
No central computer, computers are all linked to one and other
8 of 26
Advantages of ring topologies
Network not dependent on central server, each computer has same access as others - no one computer can hog the network
9 of 26
Disadvantages of ring topologies
If there is a break in the connection, the whole network fails. Faults are difficult to locate. It is impossible to keep the network running whilst equipment is added or removed, because there is only one path for the data to follow
10 of 26
Describe a star topology
All computers connected to a central point such as a hub or central powerful computer
11 of 26
Advantages of a star topology
Fault tolerant - if one of the cables fails, then the other computers can still be used. Load tolerant - computers can be added without loss in performance as all computers have their own path to the server. Easy to add extra computers -no disruption
12 of 26
Disadvantages of star topology
Higher cost - large amount of cabling needed. Dependence on the central server
13 of 26
Name the 6 factors for choosing which topology
1) Cost 2) Size of the organisation 3) Existing Systems 4) Performance 5) How the System will be used 6) Security
14 of 26
How does Wi-Fi work?
Router connected to the internet by a high-speed broadband connection. Router receives data from internet. Transmits this data as radio signal via an antenna. Computer's wireless adapter picks up the signal and changes it from radio to electrical
15 of 26
Advantages of Wi-Fi
Inexpensive LANs can be set up without cables. Freedom of working anywhere with signal. Listed buildings cannot install cable alternatives. Health & safety - no trailing cables `
16 of 26
Disadvantages of Wi-Fi
High power consumption - laptop batteries will run out faster. Possible health problems? Security problems even with encryption. Limited range (150ft.) Interference when signals overlap
17 of 26
Describe network operating systems and when they are used
e.g. Linux. Complex as coordinates all activities of all devices on network. Needed for larger, more complex networks
18 of 26
Describe network management software and its uses
All computers can have security and software updated. Checks user activity is allowable. Check bandwidth is being used correctly
19 of 26
Describe the features of a user account
Users can change their password. Change desktop settings - personalised interface. Manage own files in personal storage area. Network manager determines access to software and shared files
20 of 26
Describe the features and uses of a user log
A record of the successful and failed logins and resources used by authorised users. Keeps unauthorised users out of the network. Provides an audit trail
21 of 26
Describe network security strategies
Used to protect the network from threats. Passwords & IDs restrict access. Virus checkers scan the system. Firewalls protect the network from hackers. Encryption prevents intercepted data from being read
22 of 26
Describe the uses of Remote Management
See which users are on the network, whether sites visited are appropriate, check hardware, guide users through problems, log off users, check components. NOT manage passwords
23 of 26
Describe disaster planning and why it is needed
Loss of hardware, software or data communication services is inevitable eventually. Disaster planning minimises the disruption caused & restarts the system ASAP
24 of 26
Describe backups and why they are needed
Data cannot be replaced like hardware and software. Loss of data may lead to great financial losses to a company. Several methods of backing up. Backups must be taken regularly
25 of 26
Describe auditing and its uses
Auditing keeps records of who has done what on a network, where and when - usernames, logging times, programs used, files accessed, changes. Auditing is used to identify abuses of the system by authorised staff and investigate unauthorised access.
26 of 26

Other cards in this set

Card 2


Disadvantages of a peer-to-peer network


No central backup, users require more IT knowledge, poorer security, some computers may run slowly, users may not be able to find needed files, only suitable for small networks

Card 3


Define a peer-to-peer network


Preview of the front of card 3

Card 4


Define a client server


Preview of the front of card 4

Card 5


Advantages of Client Server


Preview of the front of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Networks resources »