1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Ethernet
Wired connection using cables for fast and reliable data transfer
Wi-Fi
Wireless connection using radio waves to connect devices to a network
Bluetooth
Wireless connection for short-range communication between devices
Advantages of Wired Connections
Faster speeds and more reliable connection
Disadvantages of Wired Connections
Limited movement and cables can be messy
Advantages of Wireless Connections
Portable and easy to connect many devices
Disadvantages of Wireless Connections
Slower speeds and more interference
When to Use Wired Connections
Gaming PCs and office computers needing stable connections
When to Use Wireless Connections
Phones and laptops needing mobility
Encryption
Scrambling data so only authorised users can read it
Why Encryption is Important
Protects sensitive data and prevents hacking
IP Address
Unique number identifying a device on a network
IPv4
32-bit IP address format using four numbers separated by dots
IPv6
128-bit IP address format designed for more available addresses
MAC Address
Unique address built into a network device
Format of a MAC Address
Six pairs of hexadecimal numbers separated by colons
Standard
Agreed set of rules allowing devices and software to work together
Why Standards Are Important
Compatibility between manufacturers and reliable communication
Protocol
Set of rules for transferring data across a network
TCP/IP
Main protocol suite used for communication over the Internet
Purpose of TCP/IP
Splits data into packets and reassembles them correctly
HTTP (HyperText Transfer Protocol)
Protocol used to transfer web pages
Key Feature of HTTP
Not secure because data is not encrypted
HTTPS (HyperText Transfer Protocol Secure)
Secure version of HTTP using encryption
Key Feature of HTTPS
Encrypts data and protects sensitive information
FTP (File Transfer Protocol)
Protocol used to transfer files between computers
Key Features of FTP
Uploads/downloads files and commonly used by websites
POP (Post Office Protocol)
Email protocol that downloads emails to one device
Key Features of POP
Emails can be accessed offline and may delete from server
IMAP (Internet Message Access Protocol)
Email protocol that stores emails on a server
Key Features of IMAP
Syncs across devices and requires Internet access
SMTP (Simple Mail Transfer Protocol)
Protocol used to send emails between servers
Key Features of SMTP
Sends outgoing mail and works with POP or IMAP
Layers
Different stages in a network system with specific jobs
Benefits of Layers
Easier troubleshooting and updates can be made without changing everything
4-Layer TCP/IP Model
Example model showing how network communication is organised into layers