Networks

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:13 AM on 4/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Identify different types of networks

local area network (LAN), virtual local area network (VLAN), wide area network (WAN), storage area network (SAN), wireless local area network (WLAN), internet, extranet, virtual private network (VPN), personal area network (PAN), peer-to-peer (P2P)

2
New cards

Outline the importance of standards in the construction of networks

Standards allow devices to communicate with each other, providing a common ground for manufacturers to build systems and enabling interconnectivity between products from different manufacturers.

3
New cards

Describe how communication over networks is broken down into different layers

The Application layer provides interfaces for user applications to access network services, such as email, file transfer, and web browsing.The Presentation layer handles data representation, translation, encryption, and compression to ensure data exchanged between applications is in a format understood by both sender and receiver.The Session layer establishes, manages, and terminates communication sessions between applications, ensuring reliable data exchange.The Transport layer ensures end-to-end communication between devices, providing error detection, recovery, and reliable data delivery.The Network layer is responsible for routing and forwarding data packets between networks, handling addressing, and determining the optimal path for data transmission.The Data Link layer provides error detection and correction, data framing, and flow control to ensure reliable communication over the physical medium.The Physical layer deals with the transmission and reception of raw data bits over a physical medium, such as cables or wireless signals.

4
New cards

Identify the technologies required to provide a VPN

  • Two endpoints

  • Authentication protocol– verifying the identity of each end point

  • Connection protocol(s) to connect the two endpoints and create the VPN tunnel

  • Encryption protocol to secure the tunnel (i.e.  Nobody can read the packets in the tunnel)

5
New cards

Evaluate the use of a VPN

A VPN allows users to connect to a protected LAN through the internet, enabling workers to access a company’s internal network from anywhere in the world.

6
New cards

protocol

a set of standards that allow devices to communicate, governing data transmission, including the format of data packets, addressing, and transmission speed. TCP/IP is a commonly used set of protocols

7
New cards

data packet

a formatted unit of data carried by a packet-switched network. Data is broken into small pieces (packets), sent separately, and reassembled at the destination to complete the message;  consists of a header (source/destination address and packet position), the body (payload), and a footer (indicating the end of the packet)

8
New cards

Explain why protocols are necessary

Protocols are the set of rules computers follow when communicating across a network. Without them, no information can be transmitted, as computers wouldn’t know how to interpret the signals.

9
New cards

Explain why the speed of data transmission across a network can vary

  • Download and upload speed/bandwidth of the client

  • Download and upload speed/bandwidth of the server

  • Amount of traffic across the network

    • Your local network

    • The ISP’s network

    • The Internet itself

  • Demand for the network or web resource

    • It takes longer to access something that is being accessed by everybody

10
New cards

Explain why compression of data is often necessary when transmitting across a network

  • Compress / shrink the size of a file

  • Transfer is faster because the data is smaller and will take less time to send completely

11
New cards

Outline the characteristics of different transmission media

UTP cable offers OK security (if encrypted), is susceptible to electromagnetic interference (EMI), costs less than £1 per metre, and has a speed of 100Mbps to 1Gbps.Fibre-optic cable is highly secure, generally fragile, costs between £2 and £8 per metre, and offers speeds of 5Gbps to 100Gbps.Wireless transmission via radio waves is insecure unless encrypted, susceptible to interference, technically free, and offers speeds of 5Mbps to 200Mbps

12
New cards

Explain how data is transmitted by packet switching

Data is divided into small, fixed-size packets, each containing a portion of the original data along with header information.Each packet is routed independently through the network based on its header information. Routers make dynamic routing decisions to determine the best path for each packet.Packets are transmitted individually, potentially taking different paths and arriving out of order. Upon arrival, the receiving device reassembles them into the original data using information from the packet headers.

13
New cards

Outline the advantages and disadvantages of wireless networks

Advantages include using unlicensed radio spectrum, no need for cables, support for roaming between access points, minimal setup costs, and affordability of wireless devices. Disadvantages include security issues (vulnerability to packet sniffing), interference (crowded 2.4GHz spectrum), limited range, data theft risks from access points, and health concerns regarding radio waves.

14
New cards

Describe the hardware and software components of a wireless network

The hardware components of a wireless network include nodes (PC, laptop, tablet, printer), Wireless Network Interface Card (WNIC), radio waves (bluetooth/Wi-Fi), and connection points like wireless access points (AP) or routers.The software components include the network operating system (with drivers), protocol stack (such as TCP/IP), and applications (such as browsers and file explorers).

15
New cards

Describe the characteristics of wireless networks

  • Wireless network card

    • Network card w/ an antenna

  • Wireless router or access point

    • Access point may be physically wired to a router

  • Signal

    • Strong enough signal to communicate

    • Stronger signals have less packet loss

    • WiFi

      • Trademarked name for marketing by Wireless Ethernet Compatibility Alliance (Wi-Fi Alliance)

      • IEEE 802.11b Direct Sequence

      • WiMAX (Worldwide Interoperability for Microwave Access)

      • Wi-Fi standard designed for 30-40 Mbit/s wireless transfer

      • WiMAX updated to 1 Gbit/s transfer

      • Based on IEEE 802.16 (wireless broadband standards)

    • 3G (3rd generation of mobile telecommunications tech)

      • Mobile data transfer standard

      • Mostly replaced at this point by 4G LTE

16
New cards

Describe the different methods of network security

Authentication is the process of verifying the identity of users accessing the wireless network, using methods like passwords, digital certificates, or biometric authentication. It can involve 1FA, 2FA, or 3FA.A firewall is a security device that monitors and controls network traffic, blocking unauthorized access, preventing malware attacks, and protecting sensitive data. It can be hardware, software, or a hybrid.A MAC (Media Access Control) address is a hard-coded address assigned to devices by manufacturers, used to identify specific hardware. Devices can be blocked or allowed based on their MAC addresses.Physical security protects hardware and network components from threats like theft, fire, or natural disasters. Measures include locked doors, access control (biometrics), off-site backups, and CCTV.Methods include encryption, UserIDs, passwords, PSK (pre-shared keys), WEP (Wired Equivalent Privacy), and WPA2 (Wi-Fi Protected Access 2)

17
New cards

Evaluate the advantages and disadvantages of each method of network security

User IDs allow for setting access rights for each user and creating user groups to manage rights in batches.User IDs can be stolen, systems can be bypassed, and they do not protect against intercepting messages or insider attacks.Encryption is very hard to break, and computers are fast enough to decrypt in real time.Users may use easy-to-guess passwords, the password must be transmitted over the network, and some encryptions have built-in backdoors.