IB Computer Science SL/HL Topic 3 Networks

0.0(0)
studied byStudied by 7 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/108

flashcard set

Earn XP

Description and Tags

All networking terms for topic 3 of IB Computer Science.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

109 Terms

1
New cards

Network

A connection of two or more computers to enable data sharing. Networks evolved from early single-room setups to larger, interconnected areas, leading to the creation of the World Wide Web by Tim Berners-Lee in 1989, which uses protocols like HTTP and HTML.

2
New cards

World Wide Web (WWW)

A system of protocols, languages, and web pages accessible over the Internet, distinct from the Internet itself, which is the physical network enabling data transfer.

3
New cards

Local Area Network (LAN)

A network within a limited geographic area (e.g., a building) used to share resources like printers and files, sometimes connected to the Internet via a web server.

4
New cards

Virtual Local Area Network (VLAN)

A network subdivision within a LAN, logically grouping devices regardless of physical location, to control traffic and enhance security across both small and large areas.

5
New cards

Wide Area Network (WAN)

A network spanning large geographic regions, such as cities or countries, facilitating resource sharing and communication over long distances.

6
New cards

Wireless Local Area Network (WLAN)

A wireless version of LAN using radio signals to connect devices in areas like homes or offices, commonly providing Internet access to laptops and mobile devices.

7
New cards

Personal Area Network (PAN)

A small network that connects devices within a person's close range, typically for short-distance communications among devices like smartphones, tablets, or wearables.

8
New cards

Virtual Private Network (VPN)

A secure connection over a public network, enabling remote access to private networks and securing data transmission for remote workers or travelers.

9
New cards

Storage Area Network (SAN)

A high-speed network providing centralized access to large data storage devices, commonly used in enterprise settings for efficient data management.

10
New cards

Network Topology

The configuration of network connections. Common types include Ring, Bus, Star, Mesh, and Hybrid, each with unique benefits in managing data flow and redundancy.

11
New cards

Router

A device that forwards data between IP addresses, typically linking an ISP connection to client devices, managing the transfer of web data to correct devices.

12
New cards

Access Point

A device in a network that distributes network access to users, enabling wireless connectivity in areas such as offices and public spaces.

13
New cards

Gateway

A network component that connects networks using different protocols, enabling communication and compatibility across diverse network architectures.

14
New cards

Switch

A device that directs data to its specific destination within a network, improving efficiency by routing data only to the intended recipient, unlike older hubs.

15
New cards

Hub

A network device connecting multiple devices by broadcasting data to all ports, less commonly used today due to security and efficiency improvements in switches.

16
New cards

Bridge

A device that links different transmission mediums, such as copper and optical cables, often used to connect buildings in a network infrastructure.

17
New cards

Workstation

Any computer connected to a network, often used for tasks that require network resources or data access.

18
New cards

Node

Any device or computer that is part of a network, capable of sending or receiving data.

19
New cards

Internet Service Provider (ISP)

A company that provides users access to the Internet, enabling connectivity and data transfer.

20
New cards

Server

A powerful computer in a network managing data flow and device management, crucial for resource sharing and software updates across devices.

21
New cards

Proxy Server

A specialized server that manages data flow between a LAN and a WAN, filtering and storing data to improve network speed and security by reducing repetitive external requests.

22
New cards

Network Standards

Rules and guidelines that ensure compatibility and efficient operation across network devices, crucial for interoperability, reliability, scalability, security, and innovation.

23
New cards

Interoperability

The ability of devices from different manufacturers to work together within a network, ensuring a broad range of device choices and integration.

24
New cards

Reliability

Ensuring network components work consistently as expected, reducing compatibility issues, failures, and downtime by adhering to established standards.

25
New cards

Scalability

The capacity of a network to grow without needing major infrastructure changes, allowing adaptability to new technologies or organizational needs.

26
New cards

Security Standards

Guidelines for implementing protective measures against cyber threats and unauthorized access, essential for safeguarding networked environments.

27
New cards

OSI Model

A theoretical model with seven layers (Physical, Data Link, Network, Transport, Session, Presentation, and Application) describing data transmission between networked devices.

28
New cards

Physical Layer

The OSI layer responsible for the physical connection of devices, managing raw data transmission over media like copper cables, fiber optics, or wireless signals.

29
New cards

Data Link Layer

Ensures reliable data transfer between two directly connected nodes, managing error detection, correction, and flow control.

30
New cards

Network Layer

Manages data routing between different networks, handling address assignment, packet forwarding, and network traffic management.

31
New cards

Transport Layer

Provides reliable, end-to-end communication between applications on separate devices, supporting flow control and error correction.

32
New cards

Session Layer

Establishes, manages, and terminates communication sessions between applications, handling the start, maintenance, and end of a data exchange session.

33
New cards

Presentation Layer

Responsible for data format translation and encryption/decryption, ensuring data is in a usable form for the application layer.

34
New cards

Application Layer

The OSI model's top layer, offering services to applications such as email, web browsing, and file transfer by interfacing with network resources.

35
New cards

VPN Security

VPNs encrypt data between client and server to prevent unauthorized access, especially useful for safeguarding sensitive information over public networks.

36
New cards

VPN Privacy

VPNs conceal the user's IP address and location, helping protect online activity from tracking and promoting user privacy.

37
New cards

VPN Remote Access

Allows secure remote access to private networks, enabling employees to work from diverse locations while maintaining data security.

38
New cards

VPN Cost Savings

Provides a cost-effective alternative to dedicated private networks, reducing the need for leased lines while maintaining secure communications.

39
New cards

VPN Tunneling

The process of encapsulating data in another protocol for secure transmission over insecure networks, enhancing privacy and data integrity in VPNs.

40
New cards

Tunneling Process

Establishes a connection between devices, encapsulates data in a new packet, encrypts it, transmits it through a secure channel, and decrypts it upon arrival.

41
New cards

VPN Protocols

Specific methods (e.g., OpenVPN, IKEv2) enabling secure connections between VPN clients and servers, essential for maintaining private, encrypted communications.

42
New cards

Data Transmission

The process of sending data from one device to another over a network. This involves breaking data into smaller units called packets, which are sent across the network to the destination.

43
New cards

Data Packets

Small units of data used in network transmission. Each packet contains a header with routing information, a payload with the actual data, and a trailer for error checking.

44
New cards

Packet Header

The section of a data packet containing information such as the source and destination addresses, sequence number, and error detection codes, allowing the packet to be routed correctly.

45
New cards

Packet Payload

The part of a data packet that holds the actual data being transmitted, which can be text, images, or other digital information.

46
New cards

Packet Trailer

Contains error-checking data, such as CRC values, to help verify the integrity of the packet upon arrival at the destination.

47
New cards

Packet Switching

A network method where data is broken down into packets, each potentially taking a different route to the destination. Upon arrival, packets are reordered and checked for errors before reassembly.

48
New cards

Router Role in Packet Switching

A router directs each packet to its destination, determining the most efficient route based on current network conditions, which may result in packets arriving out of order.

49
New cards

Protocols

Standardized rules for data transmission, ensuring devices from different manufacturers communicate effectively, securely, and efficiently over a network.

50
New cards

Protocol Compatibility

Protocols allow devices with different technical specifications from various manufacturers to communicate, ensuring broad device integration in networks.

51
New cards

Protocol Efficiency

Protocols specify efficient data transmission methods, minimizing delays and errors to improve network performance.

52
New cards

Protocol Reliability

Ensure that data reaches the correct destination intact and in the correct sequence, protecting against data loss or corruption.

53
New cards

Protocol Security

Provide encryption, authentication, and access control, securing data against unauthorized access and potential cyber threats.

54
New cards

Data Integrity in Protocols

Techniques used in protocols to ensure data is transmitted accurately and without corruption, employing methods like checksums and redundancy.

55
New cards

Flow Control in Protocols

Manages the rate of data transmission to prevent network congestion and overload, maintaining smooth data flow.

56
New cards

Deadlock Prevention

Protocols prevent network standstills caused by devices waiting for access to the same resources by setting rules for resource management.

57
New cards

Congestion Management

Techniques in protocols for controlling data flow during high traffic to prevent network slowdowns, often using packet prioritization and traffic shaping.

58
New cards

Error Checking

Methods such as checksums and cyclic redundancy checks used in protocols to detect and correct transmission errors, ensuring accurate data delivery.

59
New cards

Transfer Speed Factors

The speed of data transfer on a network is influenced by bandwidth, network congestion, distance, network type, and device performance.

60
New cards

Bandwidth

Refers to the maximum amount of data that can be transmitted over a network in a set period. Limited bandwidth slows down data transmission speeds.

61
New cards

Network Congestion

Occurs when network traffic exceeds capacity, leading to slower data speeds, especially during peak usage times.

62
New cards

Distance and Transmission Speed

Longer distances can introduce delays and slower data speeds due to signal attenuation and interference, particularly in wireless networks.

63
New cards

Network Type and Speed

Wired networks like Ethernet generally offer faster speeds than wireless networks due to stable physical connections and less susceptibility to interference.

64
New cards

Network Devices and Speed

Routers, switches, and modems can impact network speed; older or slower devices may bottleneck data transmission.

65
New cards

Data Compression

Reduces data size for faster transmission over networks, conserving bandwidth and storage, often essential for transferring large files efficiently.

66
New cards

Bandwidth Optimization via Compression

Compression reduces the amount of data transmitted, helping avoid network congestion and improving transmission efficiency.

67
New cards

Cost Savings via Compression

Reducing data size through compression minimizes transmission costs, particularly valuable for organizations with high data transfer needs.

68
New cards

Improved User Experience with Compression

By reducing data size, compression decreases transmission time, enhancing user experience and productivity, especially on slower networks.

69
New cards

Optical Cable

A high-speed data transmission medium using light pulses over fiber optics, ideal for long-distance data transfer due to high bandwidth and resistance to interference.

70
New cards

Copper Twisted Pair Cable

Commonly used in local networks (e.g., Cat5 or Cat6 cables), consisting of twisted copper wires to reduce interference, but less secure and slower over long distances.

71
New cards

Coaxial Cable

A type of copper cable with layers of insulation and shielding, used for high-frequency transmission, though prone to damage and less secure than fiber optic.

72
New cards

Crosstalk

Interference between adjacent cables, commonly mitigated by using twisted pairs or shielded cables to minimize data corruption and maintain transmission quality.

73
New cards

Wireless Network Advantages

Wireless networks provide greater mobility, flexibility, and accessibility than wired networks, allowing users to connect from various locations within the signal range. They are often less expensive to install and maintain and are easily scalable for growing network needs.

74
New cards

Wireless Network Disadvantages

Wireless networks face security risks from unauthorized access, potential interference, limited range, lower speeds compared to wired networks, and compatibility issues with certain devices.

75
New cards

Guided vs. Unguided Medium

In guided (wired) media, data is directed to a specific location, whereas unguided (wireless) media broadcasts signals in all directions within a range, allowing users within reach to connect without a specific path.

76
New cards

Radio Frequency Categories

Data is wirelessly transmitted in three frequency bands. Radio (3KHz-3GHz), Microwave (3-300GHz), and Infrared (300GHz-400THz). Each frequency range has unique properties affecting transmission range, penetration, and application suitability.

77
New cards

Radio Transmission

Uses a low frequency range of 3KHz to 3GHz for broad coverage. It can pass through walls, making it widely used for long-distance communication.

78
New cards

Microwave Transmission

Operates in the 3-300GHz range with higher frequency than radio, allowing greater data capacity but is more affected by line-of-sight and obstacles, suitable for specific high-bandwidth applications.

79
New cards

Infrared Transmission

Uses a high frequency range (300GHz-400THz) but is limited by obstacles, as it cannot penetrate walls. Ideal for secure, short-range communication, such as home TV remotes or line-of-sight devices.

80
New cards

WiFi

A common wireless technology operating around 2.4-5 GHz, ideal for homes and workplaces, with a moderate wall penetration ability and a range of about 100 meters, depending on environmental conditions.

81
New cards

WiMax

Provides greater range than WiFi (up to 30km) with a wall-penetrating capability and speeds up to 70Mbps, suitable for long-range wireless connections in rural or expansive areas.

82
New cards

LiFi (Light Fidelity)

A high-speed wireless technology using LED lights for data transmission at around 200Gbps. LiFi requires line-of-sight, as signals cannot pass through walls, and is highly secure due to limited signal leakage.

83
New cards

Bluetooth

Short-range wireless technology operating around 2.5GHz, used for device pairing and low-energy data transfer. It’s commonly found in personal devices like speakers, headphones, and wearable technology.

84
New cards

Wireless Access Point (WAP)

A device that connects wireless devices to a wired network, transmitting data over radio waves and acting as the interface between the network’s wireless and wired segments.

85
New cards

Network Interface Card (NIC)

A hardware component that enables a device to connect to a wireless network, often built into laptops, tablets, and smartphones but sometimes added to desktop computers.

86
New cards

Router in Wireless Networks

Connects multiple networks, directs traffic, and acts as a gateway between wired and wireless networks, enabling data flow across network types.

87
New cards

Switch in Wireless Networks

Connects devices on a network, directing traffic within a network and linking wireless access points to the wired infrastructure.

88
New cards

Operating System (OS) Role in Wireless Networking

The OS provides device-level support for wireless connectivity, ensuring compatibility and managing wireless network settings and protocols.

89
New cards

Network Protocols in Wireless Networks

Define rules for data transmission over wireless networks, such as Wi-Fi, Bluetooth, and Zigbee, enabling compatible communication between devices.

90
New cards

Wireless Network Management Software

Used for configuring, managing, and monitoring wireless network components like access points and security settings to maintain network health.

91
New cards

Network Security Software

Protects wireless networks from unauthorized access and cyber threats using tools like firewalls, antivirus programs, and intrusion detection systems.

92
New cards

Wireless Network Encryption

A security measure encoding data so that only authorized users can access it, with common standards like WEP, WPA, and WPA2 to prevent interception by unauthorized users.

93
New cards

Encryption Advantages

Provides high security by encoding data for authorized access, supports various encryption standards, and is easy to implement on most wireless networks.

94
New cards

Encryption Disadvantages

Older methods like WEP are vulnerable, encryption can reduce performance, and keys or passwords need regular updates to maintain security.

95
New cards

Authentication in Wireless Networks

Verifies user identity before accessing the network, using methods like passwords, certificates, and biometric scans, often in combination with encryption for added security.

96
New cards

Authentication Advantages

Provides secure user verification, supports multiple authentication methods, and strengthens overall network security when combined with encryption.

97
New cards

Authentication Disadvantages

Can be vulnerable to password attacks and phishing, strong methods like biometrics may be costly, and methods require regular updates to remain secure.

98
New cards

Access Control in Wireless Networks

Limits network access to authorized devices, using techniques like MAC address filtering, network segmentation, and VPNs to prevent unauthorized access.

99
New cards

Access Control Advantages

Helps prevent unauthorized access to the network and resources, is generally easy to implement, and supports multiple security policies.

100
New cards

Access Control Disadvantages

Vulnerable to MAC address spoofing, can be challenging to manage in large networks, and complex to configure and troubleshoot.