IB Comp Sci - Topic 3

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 136

flashcard set

Earn XP

137 Terms

1

Server

A computer that provides client stations with access to files and printers as shared resources to a computer network

New cards
2

Client

A computer that requests data stored on a server.

New cards
3

Hub

the connection point for devices on a single network. network devices and computer systems connect to a hub using Ethernet cables that attach to a port.

New cards
4

Switch

the connection point for multiple devices on a single network. unlike a hub, the switch can identify which network device is connected to which port.

New cards
5

Router

a more sophisticated device than both a hub and a switch. its use is to join multiple networks and serve as an intermediary between these networks so that data can be exchanged effectively.

New cards
6

LAN

Local Area Network. A small group of computers connected, usually over a very small area. Copper cables. high data transfer rates

New cards
7

MAN

Metropolitan Area Network. Networks over a larger area, city-size, connecting computers and LANs. Sometimes with fibre optics.

New cards
8

WAN

Wide Area Network. Network over large geographical areas, often across continents. Most common WAN is the internet. Connects to many computers.

New cards
9

VLAN

Virtual Local Area Network. Computers behave as if in LAN but in reality they are far apart in different network, where they tunnel into a virtual LAN. Done when playing online computer games.

New cards
10

WLAN

Wireless LAN, just with radio wave connections instead of wires. Slower than LAN.

New cards
11

GAN

Global Area Network. The nodes are spread out globally.

New cards
12

WPAN

Wireless Personal Area Network. (Bluetooth). Consists of computers, phones, tablets, etc.

New cards
13

Extranet

Your home computer can access your work network. Can be considered a restricted internet in a certain environment.

New cards
14

Intranet

In a school. We can see out to internet, but internet cannot see in. (Like one way mirror)

New cards
15

Internet

The name for world wide web.

New cards
16

P2P

Peer to peer. All computer systems in the network are decentralized and are both clients and servers at the same time, consuming and supplying resources from and to the other computer systems on the network.

New cards
17

SAN

Storage Area Network. Network which provides dedicated access to storage. (own storage device, not wider network) appears as a device to OS.

New cards
18

LAN vs WLAN Similarities

Both act on a local level. Both allow communication. Both used to connect devices. Both allow sharing of resources.

New cards
19

LAN vs WLAN Differences

They use different transmission medium. LAN is safer. LAN is faster. WLANs offer greater flexibility.

New cards
20

LAN vs VLAN Similarities

Both act on a local level. Both have same attributes. Both allow communication. Both used to connect devices. Both allow sharing of resources.

New cards
21

LAN vs VLAN Differences

VLAN delivers better performance. VLAN is safer. Formation of virtual workgroups is easy. VLANs offer greater flexibility. VLANs are independent on the medium and the physical topology. Sometimes the management/administration of a VLAN is complex.

New cards
22

Standards

Common rules providing "international language" enables compatibility for all computer systems around the world

New cards
23

OSI Model

Open system interconnection model defines a networking framework to implement protocols in seven layers. (to communicate)

New cards
24

Physical (Layer One)

Provides mechanic, electric and functional help to activate and deactivate physical connections. How a bit is transferred across a medium, transmits as 0s and 1s.

New cards
25

Data Link (Layer Two)

Ensure faultless transmission of data. Error handling of physical transmission. Amends transmission rates according to buffer of receiver.

New cards
26

Network (Layer Three)

Handles routing of packets across a network through devices to reach destination.

New cards
27

Transport (Layer Four)

End to end connections. Definition of data segments - assignment of numbers - data transfer - reassemble of data at the destination.

New cards
28

Session (Layer Five)

Manages sessions between two users.

New cards
29

Presentation (Layer Six)

Provides data format information, data compression information and data encryption information to the application.

New cards
30

Application (Layer Seven)

Performs various services for the applications used by the end users.

New cards
31

Please Do Not Teach Students Pointless Acronyms

Physical, Data (Link), Network, Transport, Session, Presentation, Application

New cards
32

TCP/IP Model

Describes all the functions that take place at each layer of protocols within the TCP/IP suite. Hierarchical model protocol that models and represents all the functionality required for successful communication between users.

New cards
33

OSI and TCP/IP

The OSI Model and the TCP/IP Model are two separate network protocol models. They can be used separately or together.

New cards
34

VPN

A virtual private network makes a "tunnelled" connection through the Internet or any other public network.

New cards
35

Hardware and Software of VPN

Internet Access, VPN Software, VPN Routers, VPN Appliances, VPN Concentrators.

New cards
36

Secure VPN

All traffic must be encrypted, authenticated and then sent along virtual tunnels.

New cards
37

Internet protocol security protocol (IPsec)

Secure transmission over public IPs. Standard encryption algorithm provide confidentiality Authentication via digital certificates.

New cards
38

Secure Socket Layer or Transport Layer Security

Doesn't need special client software. All web servers and browsers support this method of providing a VPN.

New cards
39

Remote access VPN

Connects individual hosts to private networks and facilitate teleworkers who need to access their company's network securely using the Internet.

New cards
40

Use of a VPN

VPNs gave rise to home offices as it allowed workers to connect to a company's internal network. For example, a mother can work from home that their own speed in time to pick her kids up from school.

New cards
41

Benefits of a VPN

Communication is easier, companies take advantage to provide secure connections, improves overall productivity, offers flexibility to remote offices.

New cards
42

Protocol

a set of rules that defines the rule and conventions for communication between network devices.

New cards
43

Data packet

A unit of data in a form suittransfer between computers that communicate on a network.

New cards
44

Source integrity

Identity of sender has been validated. digital signatures verify identity.

New cards
45

Data integrity

Information has not been changed/corrupted deliberately or accidentally during transmission. Checked using things like checksums.

New cards
46

Flow control

Network infrastructures have limited memory and bandwidth. Transport layer takes advantage of protocols where overload of resources occurs. It slows down transfer rates.

New cards
47

Congestion management

Request on network resources exceeds capacity.

New cards
48

Deadlock prevention

Two or more networks competing action are each waiting for the other to finish and as such they are stuck doing nothing.

New cards
49

Why protocols are necessary

Without protocols, no information can be transmitted as computers do not know how to interpret the signals coming through the network.

New cards
50

Bandwidth

theoretical speed of data

New cards
51

Bottleneck

affects throughput as a smaller segment in the communication compared to a larger segment next to it slows down the bandwidth, like the shape of a bottleneck.

New cards
52

Why speed can be affected

Many users, interference can corrupt many data packages, causing retransmission.

New cards
53

Lossy

Some loss of information is acceptable and there is no way to get the original file back.

New cards
54

Lossless

this compression method reduces the number of bits by first identifying and then eliminating any statistical redundancy.

New cards
55

Why compression is necessary

Compressing data for faster transmission used to be essential. Transmission speeds have improved, but we are transmitting more, so compression is required to transmit the vast amounts of data without using up all the bandwidth.

New cards
56

Metal conductors

  • Cheap

  • Average to high speed

  • High reliability

  • Relatively secure

New cards
57

Fibre optics

  • Expensive

  • Very high speed

  • High reliability

  • Relatively secure

New cards
58

Wireless

  • Price varying by size of network (WLAN is usually very cheap)

  • Middle speed

  • Average reliability

  • Insecure

New cards
59

Copper

Most common cable

New cards
60

Coaxial

Two copper conductors. used in computers and TV

New cards
61

Unshielded Twisted Pair (UTP)

Popular in LANS. good for short distances.

New cards
62

Shielded Twisted Pair (STP)

More difficult to install that unshielded.

New cards
63

Fibre Optic Cable

Carries beams of light through glass. Used in data transmission and telephone lines.

New cards
64

Microwave Radio

Mobile telephone networks and LANs. Information is carried through the air. High bandwidth, but lower than cables. Weather can effect the performance.

New cards
65

Infrared

Short distances. Cannot pass through objects. Line of sight is required.

New cards
66

Bluetooth

Microwaves to exchange data. Very low power levels. Personal Area Network

New cards
67

Datagram Packet Switching

Each packet contains receiver address. The path between the source and the destination can be different.

New cards
68

Virtual Circuit Packet Switching

With this method, a route from source to destination is set up before any transmission takes place.

New cards
69

Datagram Packet Switching advantages

Single packets are small, waiting times are low. Resource will be given fairly to participants in the network. Small packets allow for faster error detection. High resistance against fallout. As route not assigned network utilised better.

New cards
70

Datagram Packet Switching disadvantages

Overloading can occur at transmitting station because transport routes aren't fixed. Packets do not arrive in order. All participants have to use the same network protocols. No constant bandwidth is guaranteed and big fluctuations in bandwidth can happen.

New cards
71

Point to point

Simplest definition. Permanent link between two endpoints.

New cards
72

Bus

All of the various devices in the network are connected to a single cable or line.

New cards
73

Star

Each individual piece of a network is attached to a central node.

New cards
74

Ring

Each node connects to exactly two other nodes, forming a single continuous pathway through each node.

New cards
75

Mesh

the infrastructure nodes connect directly, dynamically and non hierarchically to as many nodes as possible and cooperate with one another to efficiently route data from/to clients.

New cards
76

Tree

A multipoint electrical circuit with multiple branches of the trunk of the central, or root, or bus.

New cards
77

Fully connected

A fully connected network is which there is a direct link between all pairs of nodes.

New cards
78

Hybrid

Integration of two or more different topologies to form a resultant topology.

New cards
79

Advantages of wireless networks

  • Easy to set up

  • Can be installed

  • Allows mobility

  • Easy to add new participants

New cards
80

Disadvantages of wireless networks

  • Traffic through network can be intercepted by unauthorized people

  • Slow transmission speeds

  • Interference from other wireless stations, cables etc.

  • Signal range depends on participating devices' antenna

  • Many different standards may not compatible with each other.

New cards
81

Concerns with wireless networks

There is a change in working patterns. Physical and internet communication has become simultaneous. 26% of car crashes are phone related.

New cards
82

Modem/router

Connects you to the internet

New cards
83

Device

A device like a laptop is required to connect to the internet.

New cards
84

NIC Card

Required for the device where you can plug in Ethernet cables for example.

New cards
85

Antenna

Routers utilize antennas that significantly increase the effective communication area of the wireless network.

New cards
86

Repeater

Connects to router. Receives an existing signal from a wireless router or access point and rebroadcasts it.

New cards
87

Ethernet to Wireless Access Point or Repeater

Uses Ethernet cables to carry the signal to the wireless repeater or WAP.

New cards
88

DHCP

Dynamic Host Configuration Protocol. Allows server to automatically assign an IP address to a client device. The alternative is to have a static IP that stays the same every time you log onto the internet.

New cards
89

Firewall

Determines what data comes in and goes out of a network or PC.

New cards
90

SSID

Service set identification. 32 alphanumeric characters. It is used to differentiate on WLAN from another.

New cards
91

NIC Drivers

A device driver for the NIC card. Operates or controls the hardware of the card. Acts as a translator between the wireless card and the applications or OS of the device.

New cards
92

NOS

The network operating system handles system resources and is responsible for managing all the protocols, hardware and applications that have to cooperate in order that a network can exist and function correctly.

New cards
93

Security Software

Includes all software that prevents unauthorized access use, disruption, modification, just to name a few. By using intrusion detection systems, intrusion prevention system (IPS), etc.

New cards
94

WAP

Wireless Application Protocol specifies a set of protocols for accessing information over a mobile wireless network.

New cards
95

Web Browsers

Application software that is used to find retrieve and display content on the WWW, including web pages, text images, audio and videos and other content.

New cards
96

Encryption

Necessary to protect data from unauthorised access during internet use or any untrusted network.

New cards
97

Symmetric KEncryption

Same key is used for encryption and decryption. Each device has a secret code that is used to encrypt a packet before it is sent over an untrusted network.

New cards
98

Data Encryption Standard (DES)

56- bit key.

New cards
99

Advanced Encryption Standard (AES)

128 to 256 bit keys offering a much greater number of possible combinations.

New cards
100

Asymmetric key encryption

Uses a public key for encryption and a private key for decryption. Keys are mathematically linked. TLS and SSL encryption protocols.

New cards
robot