Understanding Network Protocols and Addressing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Protocols

Rules that govern communication, determining how it is made and managing factors like transmission speed and error checking.

2
New cards

Internet Protocol (IP) addressing

A method of assigning a unique IP address to each device on a network, consisting of four sets of up to three digits separated by dots.

3
New cards

Node

A device on a network that can send or receive messages.

4
New cards

Switch

A network device that routes messages to the correct node based on its address.

5
New cards

Static address

An IP address that remains the same each time a device connects to the network.

6
New cards

Dynamic address

An IP address that changes each time a device connects to the network, assigned by a method known as dynamic host configuration protocol (DHCP).

7
New cards

Dynamic Host Configuration Protocol (DHCP)

A method that assigns dynamic IP addresses to devices each time they connect to a network.

8
New cards

IPv4

An addressing method that uses four sets of digits, allowing for up to 4.3 billion addresses (4,300,000,000).

9
New cards

IPv6

A newer addressing method that uses eight sets of four-digit hexadecimal values, allowing for approximately 340 trillion trillion trillion addresses.

10
New cards

MAC addressing

A method of assigning a unique serial number (MAC address) to each network interface controller (NIC) to identify devices on a network.

11
New cards

Network Interface Controller (NIC)

A hardware component that connects a device to a network and has a unique MAC address.

12
New cards

MAC address

A unique string of hexadecimal numbers assigned by the NIC's manufacturer that cannot be changed.

13
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol, which enables communication over the internet.

14
New cards

HTTP

Hypertext Transfer Protocol, which governs communication between a web server and a client.

15
New cards

HTTPS

Hypertext Transfer Protocol Secure, which includes encryption for secure transactions over the internet.

16
New cards

FTP

File Transfer Protocol, which governs the transmission of files across a network and the internet.

17
New cards

SMTP

Simple Mail Transfer Protocol, which governs the sending of email over a network to a mail server.

18
New cards

Hexadecimal

A base-16 number system used in MAC addresses, consisting of digits 0-9 and letters A-F.

19
New cards

POP

Post Office Protocol, an older implementation for retrieving emails from email servers.

20
New cards

IMAP

Internet Message Access Protocol, a newer implementation that largely replaces POP for retrieving emails.

21
New cards

Layering

The concept of breaking up the sending of messages into separate components and activities in networking.

22
New cards

TCP/IP model

A model that describes the layering of networking communication.

23
New cards

Application layer

The layer that encodes/decodes the message in a form that is understood by the sender and the recipient.

24
New cards

Transport layer

The layer that breaks down the message into small chunks (packets) and assigns packet numbers.

25
New cards

Network layer

The layer that adds the sender's IP address and that of the recipient to the message.

26
New cards

Link layer

The layer that enables the transfer of packets between nodes on a network and between different networks.

27
New cards

IP address

A unique address assigned to each device on a network, used for sending and receiving messages.

28
New cards

Nodes

Devices on a network that can send, receive, or forward information.

29
New cards

Standards

Established norms that allow for the development and adaptation of hardware and software over time.

30
New cards

Plaintext

Unencrypted messages that are readable and understandable.

31
New cards

Ciphertext

Encrypted messages that cannot be understood without decryption.

32
New cards

Caesar cipher

A simple method of encryption that replaces each plaintext letter with another letter a fixed number of positions down the alphabet.

33
New cards

Algorithms

Complex methods used in real-life encryption to secure messages.

34
New cards

Asymmetric encryption

A method that uses a public key and a private key for encryption, allowing secure communication.

35
New cards

Public key

A key that can be shared with anyone to encrypt messages.

36
New cards

Private key

A secret key used to decrypt messages that were encrypted with the corresponding public key.

37
New cards

Public Key

A key that cannot decrypt a message; only the private key can do that.

38
New cards

Private Key

The key that can decrypt a message and must never be given out to maintain encryption.

39
New cards

Online Banking

A service that uses public and private keys for secure communication between users and banks.

40
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

41
New cards

Wired Networks

Networks that use physical wiring to connect devices, often used in office settings.

42
New cards

Wireless Networks

Networks that use radio waves to carry signals, allowing mobile devices to connect within range.

43
New cards

Maximum Transmission Speed for Ethernet

Up to 1 gigabit per second.

44
New cards

Maximum Transmission Speed for Wireless Networks

Up to 50 megabits per second.

45
New cards

Maximum Distance for Reliable Communication for Ethernet

Up to 100 metres for Ethernet and over 2 kilometres for fibre optic.

46
New cards

Maximum Distance for Reliable Communication for Wireless Networks

Up to 50 metres.

47
New cards

Security of Wired Connection

More secure as a physical connection is required to intercept data.

48
New cards

Security of Wireless Connection

Less secure as the wireless signal cannot be contained within a building.

49
New cards

Advantages of Wi-Fi

Allows setting up LANs without wires and enables users to log in from anywhere within the Wi-Fi network.

50
New cards

Disadvantages of Wi-Fi

Signal strength weakens with distance from the router and may not be as secure as wired connections.

51
New cards

Bluetooth

A form of wireless communication that enables devices to connect and share data.

52
New cards

Bluetooth Transmission Speed

Often only up to 2 megabits per second.

53
New cards

Advantages of Bluetooth

Low cost to set up and uses relatively little power.

54
New cards

Disadvantages of Bluetooth

Short range, low level of security, and low data transmission rate.

55
New cards

Encryption in Online Purchases

Online purchases are encrypted to prevent theft of credit card details.

56
New cards

Encryption for Document Sharing

Tools enable users to encrypt documents before sending them via the internet.

57
New cards

Encrypted Satellite TV Transmissions

Transmissions are encrypted to prevent non-subscribers from watching shows.