IB Computer Science SL/HL Topic 3 Networks

studied byStudied by 5 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 108

flashcard set

Earn XP

Description and Tags

All networking terms for topic 3 of IB Computer Science.

109 Terms

1

Network

A connection of two or more computers to enable data sharing. Networks evolved from early single-room setups to larger, interconnected areas, leading to the creation of the World Wide Web by Tim Berners-Lee in 1989, which uses protocols like HTTP and HTML.

New cards
2

World Wide Web (WWW)

A system of protocols, languages, and web pages accessible over the Internet, distinct from the Internet itself, which is the physical network enabling data transfer.

New cards
3

Local Area Network (LAN)

A network within a limited geographic area (e.g., a building) used to share resources like printers and files, sometimes connected to the Internet via a web server.

New cards
4

Virtual Local Area Network (VLAN)

A network subdivision within a LAN, logically grouping devices regardless of physical location, to control traffic and enhance security across both small and large areas.

New cards
5

Wide Area Network (WAN)

A network spanning large geographic regions, such as cities or countries, facilitating resource sharing and communication over long distances.

New cards
6

Wireless Local Area Network (WLAN)

A wireless version of LAN using radio signals to connect devices in areas like homes or offices, commonly providing Internet access to laptops and mobile devices.

New cards
7

Personal Area Network (PAN)

A small network that connects devices within a person's close range, typically for short-distance communications among devices like smartphones, tablets, or wearables.

New cards
8

Virtual Private Network (VPN)

A secure connection over a public network, enabling remote access to private networks and securing data transmission for remote workers or travelers.

New cards
9

Storage Area Network (SAN)

A high-speed network providing centralized access to large data storage devices, commonly used in enterprise settings for efficient data management.

New cards
10

Network Topology

The configuration of network connections. Common types include Ring, Bus, Star, Mesh, and Hybrid, each with unique benefits in managing data flow and redundancy.

New cards
11

Router

A device that forwards data between IP addresses, typically linking an ISP connection to client devices, managing the transfer of web data to correct devices.

New cards
12

Access Point

A device in a network that distributes network access to users, enabling wireless connectivity in areas such as offices and public spaces.

New cards
13

Gateway

A network component that connects networks using different protocols, enabling communication and compatibility across diverse network architectures.

New cards
14

Switch

A device that directs data to its specific destination within a network, improving efficiency by routing data only to the intended recipient, unlike older hubs.

New cards
15

Hub

A network device connecting multiple devices by broadcasting data to all ports, less commonly used today due to security and efficiency improvements in switches.

New cards
16

Bridge

A device that links different transmission mediums, such as copper and optical cables, often used to connect buildings in a network infrastructure.

New cards
17

Workstation

Any computer connected to a network, often used for tasks that require network resources or data access.

New cards
18

Node

Any device or computer that is part of a network, capable of sending or receiving data.

New cards
19

Internet Service Provider (ISP)

A company that provides users access to the Internet, enabling connectivity and data transfer.

New cards
20

Server

A powerful computer in a network managing data flow and device management, crucial for resource sharing and software updates across devices.

New cards
21

Proxy Server

A specialized server that manages data flow between a LAN and a WAN, filtering and storing data to improve network speed and security by reducing repetitive external requests.

New cards
22

Network Standards

Rules and guidelines that ensure compatibility and efficient operation across network devices, crucial for interoperability, reliability, scalability, security, and innovation.

New cards
23

Interoperability

The ability of devices from different manufacturers to work together within a network, ensuring a broad range of device choices and integration.

New cards
24

Reliability

Ensuring network components work consistently as expected, reducing compatibility issues, failures, and downtime by adhering to established standards.

New cards
25

Scalability

The capacity of a network to grow without needing major infrastructure changes, allowing adaptability to new technologies or organizational needs.

New cards
26

Security Standards

Guidelines for implementing protective measures against cyber threats and unauthorized access, essential for safeguarding networked environments.

New cards
27

OSI Model

A theoretical model with seven layers (Physical, Data Link, Network, Transport, Session, Presentation, and Application) describing data transmission between networked devices.

New cards
28

Physical Layer

The OSI layer responsible for the physical connection of devices, managing raw data transmission over media like copper cables, fiber optics, or wireless signals.

New cards
29

Data Link Layer

Ensures reliable data transfer between two directly connected nodes, managing error detection, correction, and flow control.

New cards
30

Network Layer

Manages data routing between different networks, handling address assignment, packet forwarding, and network traffic management.

New cards
31

Transport Layer

Provides reliable, end-to-end communication between applications on separate devices, supporting flow control and error correction.

New cards
32

Session Layer

Establishes, manages, and terminates communication sessions between applications, handling the start, maintenance, and end of a data exchange session.

New cards
33

Presentation Layer

Responsible for data format translation and encryption/decryption, ensuring data is in a usable form for the application layer.

New cards
34

Application Layer

The OSI model's top layer, offering services to applications such as email, web browsing, and file transfer by interfacing with network resources.

New cards
35

VPN Security

VPNs encrypt data between client and server to prevent unauthorized access, especially useful for safeguarding sensitive information over public networks.

New cards
36

VPN Privacy

VPNs conceal the user's IP address and location, helping protect online activity from tracking and promoting user privacy.

New cards
37

VPN Remote Access

Allows secure remote access to private networks, enabling employees to work from diverse locations while maintaining data security.

New cards
38

VPN Cost Savings

Provides a cost-effective alternative to dedicated private networks, reducing the need for leased lines while maintaining secure communications.

New cards
39

VPN Tunneling

The process of encapsulating data in another protocol for secure transmission over insecure networks, enhancing privacy and data integrity in VPNs.

New cards
40

Tunneling Process

Establishes a connection between devices, encapsulates data in a new packet, encrypts it, transmits it through a secure channel, and decrypts it upon arrival.

New cards
41

VPN Protocols

Specific methods (e.g., OpenVPN, IKEv2) enabling secure connections between VPN clients and servers, essential for maintaining private, encrypted communications.

New cards
42

Data Transmission

The process of sending data from one device to another over a network. This involves breaking data into smaller units called packets, which are sent across the network to the destination.

New cards
43

Data Packets

Small units of data used in network transmission. Each packet contains a header with routing information, a payload with the actual data, and a trailer for error checking.

New cards
44

Packet Header

The section of a data packet containing information such as the source and destination addresses, sequence number, and error detection codes, allowing the packet to be routed correctly.

New cards
45

Packet Payload

The part of a data packet that holds the actual data being transmitted, which can be text, images, or other digital information.

New cards
46

Packet Trailer

Contains error-checking data, such as CRC values, to help verify the integrity of the packet upon arrival at the destination.

New cards
47

Packet Switching

A network method where data is broken down into packets, each potentially taking a different route to the destination. Upon arrival, packets are reordered and checked for errors before reassembly.

New cards
48

Router Role in Packet Switching

A router directs each packet to its destination, determining the most efficient route based on current network conditions, which may result in packets arriving out of order.

New cards
49

Protocols

Standardized rules for data transmission, ensuring devices from different manufacturers communicate effectively, securely, and efficiently over a network.

New cards
50

Protocol Compatibility

Protocols allow devices with different technical specifications from various manufacturers to communicate, ensuring broad device integration in networks.

New cards
51

Protocol Efficiency

Protocols specify efficient data transmission methods, minimizing delays and errors to improve network performance.

New cards
52

Protocol Reliability

Ensure that data reaches the correct destination intact and in the correct sequence, protecting against data loss or corruption.

New cards
53

Protocol Security

Provide encryption, authentication, and access control, securing data against unauthorized access and potential cyber threats.

New cards
54

Data Integrity in Protocols

Techniques used in protocols to ensure data is transmitted accurately and without corruption, employing methods like checksums and redundancy.

New cards
55

Flow Control in Protocols

Manages the rate of data transmission to prevent network congestion and overload, maintaining smooth data flow.

New cards
56

Deadlock Prevention

Protocols prevent network standstills caused by devices waiting for access to the same resources by setting rules for resource management.

New cards
57

Congestion Management

Techniques in protocols for controlling data flow during high traffic to prevent network slowdowns, often using packet prioritization and traffic shaping.

New cards
58

Error Checking

Methods such as checksums and cyclic redundancy checks used in protocols to detect and correct transmission errors, ensuring accurate data delivery.

New cards
59

Transfer Speed Factors

The speed of data transfer on a network is influenced by bandwidth, network congestion, distance, network type, and device performance.

New cards
60

Bandwidth

Refers to the maximum amount of data that can be transmitted over a network in a set period. Limited bandwidth slows down data transmission speeds.

New cards
61

Network Congestion

Occurs when network traffic exceeds capacity, leading to slower data speeds, especially during peak usage times.

New cards
62

Distance and Transmission Speed

Longer distances can introduce delays and slower data speeds due to signal attenuation and interference, particularly in wireless networks.

New cards
63

Network Type and Speed

Wired networks like Ethernet generally offer faster speeds than wireless networks due to stable physical connections and less susceptibility to interference.

New cards
64

Network Devices and Speed

Routers, switches, and modems can impact network speed; older or slower devices may bottleneck data transmission.

New cards
65

Data Compression

Reduces data size for faster transmission over networks, conserving bandwidth and storage, often essential for transferring large files efficiently.

New cards
66

Bandwidth Optimization via Compression

Compression reduces the amount of data transmitted, helping avoid network congestion and improving transmission efficiency.

New cards
67

Cost Savings via Compression

Reducing data size through compression minimizes transmission costs, particularly valuable for organizations with high data transfer needs.

New cards
68

Improved User Experience with Compression

By reducing data size, compression decreases transmission time, enhancing user experience and productivity, especially on slower networks.

New cards
69

Optical Cable

A high-speed data transmission medium using light pulses over fiber optics, ideal for long-distance data transfer due to high bandwidth and resistance to interference.

New cards
70

Copper Twisted Pair Cable

Commonly used in local networks (e.g., Cat5 or Cat6 cables), consisting of twisted copper wires to reduce interference, but less secure and slower over long distances.

New cards
71

Coaxial Cable

A type of copper cable with layers of insulation and shielding, used for high-frequency transmission, though prone to damage and less secure than fiber optic.

New cards
72

Crosstalk

Interference between adjacent cables, commonly mitigated by using twisted pairs or shielded cables to minimize data corruption and maintain transmission quality.

New cards
73

Wireless Network Advantages

Wireless networks provide greater mobility, flexibility, and accessibility than wired networks, allowing users to connect from various locations within the signal range. They are often less expensive to install and maintain and are easily scalable for growing network needs.

New cards
74

Wireless Network Disadvantages

Wireless networks face security risks from unauthorized access, potential interference, limited range, lower speeds compared to wired networks, and compatibility issues with certain devices.

New cards
75

Guided vs. Unguided Medium

In guided (wired) media, data is directed to a specific location, whereas unguided (wireless) media broadcasts signals in all directions within a range, allowing users within reach to connect without a specific path.

New cards
76

Radio Frequency Categories

Data is wirelessly transmitted in three frequency bands. Radio (3KHz-3GHz), Microwave (3-300GHz), and Infrared (300GHz-400THz). Each frequency range has unique properties affecting transmission range, penetration, and application suitability.

New cards
77

Radio Transmission

Uses a low frequency range of 3KHz to 3GHz for broad coverage. It can pass through walls, making it widely used for long-distance communication.

New cards
78

Microwave Transmission

Operates in the 3-300GHz range with higher frequency than radio, allowing greater data capacity but is more affected by line-of-sight and obstacles, suitable for specific high-bandwidth applications.

New cards
79

Infrared Transmission

Uses a high frequency range (300GHz-400THz) but is limited by obstacles, as it cannot penetrate walls. Ideal for secure, short-range communication, such as home TV remotes or line-of-sight devices.

New cards
80

WiFi

A common wireless technology operating around 2.4-5 GHz, ideal for homes and workplaces, with a moderate wall penetration ability and a range of about 100 meters, depending on environmental conditions.

New cards
81

WiMax

Provides greater range than WiFi (up to 30km) with a wall-penetrating capability and speeds up to 70Mbps, suitable for long-range wireless connections in rural or expansive areas.

New cards
82

LiFi (Light Fidelity)

A high-speed wireless technology using LED lights for data transmission at around 200Gbps. LiFi requires line-of-sight, as signals cannot pass through walls, and is highly secure due to limited signal leakage.

New cards
83

Bluetooth

Short-range wireless technology operating around 2.5GHz, used for device pairing and low-energy data transfer. It’s commonly found in personal devices like speakers, headphones, and wearable technology.

New cards
84

Wireless Access Point (WAP)

A device that connects wireless devices to a wired network, transmitting data over radio waves and acting as the interface between the network’s wireless and wired segments.

New cards
85

Network Interface Card (NIC)

A hardware component that enables a device to connect to a wireless network, often built into laptops, tablets, and smartphones but sometimes added to desktop computers.

New cards
86

Router in Wireless Networks

Connects multiple networks, directs traffic, and acts as a gateway between wired and wireless networks, enabling data flow across network types.

New cards
87

Switch in Wireless Networks

Connects devices on a network, directing traffic within a network and linking wireless access points to the wired infrastructure.

New cards
88

Operating System (OS) Role in Wireless Networking

The OS provides device-level support for wireless connectivity, ensuring compatibility and managing wireless network settings and protocols.

New cards
89

Network Protocols in Wireless Networks

Define rules for data transmission over wireless networks, such as Wi-Fi, Bluetooth, and Zigbee, enabling compatible communication between devices.

New cards
90

Wireless Network Management Software

Used for configuring, managing, and monitoring wireless network components like access points and security settings to maintain network health.

New cards
91

Network Security Software

Protects wireless networks from unauthorized access and cyber threats using tools like firewalls, antivirus programs, and intrusion detection systems.

New cards
92

Wireless Network Encryption

A security measure encoding data so that only authorized users can access it, with common standards like WEP, WPA, and WPA2 to prevent interception by unauthorized users.

New cards
93

Encryption Advantages

Provides high security by encoding data for authorized access, supports various encryption standards, and is easy to implement on most wireless networks.

New cards
94

Encryption Disadvantages

Older methods like WEP are vulnerable, encryption can reduce performance, and keys or passwords need regular updates to maintain security.

New cards
95

Authentication in Wireless Networks

Verifies user identity before accessing the network, using methods like passwords, certificates, and biometric scans, often in combination with encryption for added security.

New cards
96

Authentication Advantages

Provides secure user verification, supports multiple authentication methods, and strengthens overall network security when combined with encryption.

New cards
97

Authentication Disadvantages

Can be vulnerable to password attacks and phishing, strong methods like biometrics may be costly, and methods require regular updates to remain secure.

New cards
98

Access Control in Wireless Networks

Limits network access to authorized devices, using techniques like MAC address filtering, network segmentation, and VPNs to prevent unauthorized access.

New cards
99

Access Control Advantages

Helps prevent unauthorized access to the network and resources, is generally easy to implement, and supports multiple security policies.

New cards
100

Access Control Disadvantages

Vulnerable to MAC address spoofing, can be challenging to manage in large networks, and complex to configure and troubleshoot.

New cards

Explore top notes

note Note
studied byStudied by 248 people
883 days ago
5.0(1)
note Note
studied byStudied by 7 people
101 days ago
5.0(1)
note Note
studied byStudied by 3 people
384 days ago
5.0(1)
note Note
studied byStudied by 27 people
316 days ago
5.0(1)
note Note
studied byStudied by 6 people
820 days ago
5.0(2)
note Note
studied byStudied by 35 people
834 days ago
5.0(1)
note Note
studied byStudied by 17 people
931 days ago
4.0(1)
note Note
studied byStudied by 5143 people
674 days ago
4.9(14)

Explore top flashcards

flashcards Flashcard (79)
studied byStudied by 2 people
361 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 18 people
719 days ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 194 people
94 days ago
5.0(1)
flashcards Flashcard (106)
studied byStudied by 1 person
671 days ago
5.0(1)
flashcards Flashcard (145)
studied byStudied by 8 people
732 days ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 5 people
853 days ago
5.0(1)
flashcards Flashcard (248)
studied byStudied by 9 people
776 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 7 people
21 hours ago
4.0(1)
robot