click below
click below
Normal Size Small Size show me how
Network
Additional LU 1-3
Question | Answer |
---|---|
Peer-to peer model | no computer has authority over another computer, each computer has access to its own resources and they communicate directly to other computers |
Advantages of P2P | Simple configuration Less expensive compared to other network models |
Disadvantages of P2P | Not scalable Not secure Not practice for large installations |
Client-Server Application | A web browser requests a web page from a web server, the web server then returns the requested data to the client |
Two primary network protocols | TCP, IP |
Different types of client-server applications | web, email, dns, ftp, database, remote access |
LAN, WAN, MAN, PAN | LAN- usually contained in a small space WAN- group of LANs that spread over a wide geographical area MAN- group of LANs that are in the same geographical area PAN- small network area of personal devices |
OSI Layer and hardware/protocol | |
Peer-to peer model | no computer has authority over another computer, each computer has access to its own resources and they communicate directly to other computers |
Advantages of P2P | Simple configuration Less expensive compared to other network models |
Disadvantages of P2P | Not scalable Not secure Not practice for large installations |
Client-Server Application | A web browser requests a web page from a web server, the web server then returns the requested data to the client |
Two primary network protocols | TCP, IP |
Different types of client-server applications | web, email, dns, ftp, database, remote access |
LAN, WAN, MAN, PAN | LAN- usually contained in a small space WAN- group of LANs that spread over a wide geographical area MAN- group of LANs that are in the same geographical area PAN- small network area of personal devices |
OSI Layer and hardware/protocol | |
Safety procedures | 1. wear ppe 2. keep tools in good condition and properly store tools that are not in use 3. use the right tools for the job and operate according to manufacturers instructions 4. Watch out for trip hazards, you or others may stumble on tools or cords |
Troubleshooting steps 1-4 | 1. Identify the problem and its symptoms 2. Establish theory of probable cause 3. Test your theory to determine cause 4. Establish a plan for resolving the problem |
steps 5-7 | 5. Implement the solution or escalate the problem 6. Verify full functionality and implement preventative measures 7. Document findings, actions, outcomes |
Define EF (Entrance facility) | location where the incoming network connects with the school/corporate network |
Define Demarc (demarcation point) | the device that marks where the telecommunications service provider network ends and the organisations network begins |
Main distribution frame | the centralised point of interconnection for an organisations LAN or WAN |
Data room | an enclosed space that holds network equipment |
Network Address Translation | Is the technique used to conserve a public IP address needed by a network |
Port Address Technique | Is the process of assigning a TCP port number on ongoing sessions between a local and Internet host |