SSL
Secure sockets layer, encrypts data sent between website and browser
Handshaking
sender and receiver decide on a set of protocols for transmission
Synchronous transmission
continuous and consistent transfer of data
Asynchronous transmission
data is transmitted in regular intervals with gaps
Intranet
private network, secure environment
Extranet
private network extended to allow access to or from selected external organisations
Internet
completely public network to share and access information
Telecommuting tools
Telecommuting (advantages)
Telecommuting disadvantages
Volume test data
used to test if system can perform as intended even with large amounts of data, designed for systems that are subjected for large amounts of data
Role of a network administrator
Network diagram main components
Wired:
- lines to indicate cabling
- topologies
- boxes for PC
- switcher
- router
- cloud
Wireless:
- UTP
- cloud
- router
Email notation (BCC and CC)
BCC –> blind carbon copy, can see which CC have received the email but the CC do not know that the BCC have received the email
CC –> carbon copy, can see which CC have received the email
Microwave transmission media
Satellite transmission media
Star topology
all nodes are linked to the central server but not to each other
Benefit:
- Even if one node fails, the other clients and the server will be unaffected
- Central server helps to minimise data collisions
This is because star topologies use an Ethernet protocol and CSMA/CD to manage the flow of data
Disadvantage:
Topology is expensive to set up
Ring topology
Does not require a central server and all nodes are connected to each other
Benefits:
- Does not require as many nodes as star topologies and a central server → very effective for small networks
- Uses Token ring to manage the flow of data and minimise collisions as there are less nodes as compared to star topology
Disadvantages:
If a cable or node stops working then the whole system doesn’t work
Functions of a network operating software
Gateway
connect networks with different transmission protocols
Bridges
connect networks with the same transmission protocols
Identifying suspicious email addresses
Ethernet
Token Ring