IB Computer Science HL - Topic 3 - Networks

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

flashcard set

Earn XP

Description and Tags

Flashcards on topics 3.1.1 - 3.1.16

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

Define network

A group of nodes that are linked together through a transmission media to allow for communication and the sharing of resources.

2
New cards

Name 4 features of a LAN

  • Small geographical area

  • Uses MAC addressing and switching for routing

  • Uses private infrastructure

  • Uses ethernet: wireless and UTP cables

3
New cards

Name 4 features of a WAN

  • Large geographical area

  • Uses IP addressing for routing

  • Uses public infrastructure

  • Can be wired or wireless: fibre optic or satellite/radio

4
New cards

Name 2 features of a VLAN

  • All devices appear to be on same LAN despite geographical distribution.

  • Software implemented and creates a virtual partition on hardware

5
New cards

What is a SAN

A secure, high-speed data transfer network that provides access to consolidated block level centralised storage.

6
New cards
What is a WLAN
Same as a LAN but the permissions allow for users to be mobile with devices as they are not restricted by cables
7
New cards

What is the internet

Decentralised global network which uses the TCIP/IP protocols to transmit data via various types of media.

8
New cards

What is the intranet

A collection of private networks used within an organisation

9
New cards

What is the extranet

Controlled private network allowing businesses to gain information without granting access to the organisations entire network

10
New cards

What does a VPN do

Uses the internet to allow remote access to a private LAN whilst encrypting the connection to thwart eavesdroppers.

11
New cards

How does a VPN work

Transmits data through a secure pathway (tunnelling) and anomalies ones IP address

12
New cards
What is a PAN
A network covering a very small area
13
New cards
Name three examples of a PAN(2 wireless and 1 wired)
USB, Blutooth and Wi-Fi
14
New cards

What are standards

Rules for data transmission which help with interoperability on network devices, and transmission with integrity and minimum latency

15
New cards
Why do we need standards
Without them, manufacturers of networks have no common grounds on building their systems.
16
New cards

What is tunnelling

Transmission of data through a secure pathway using packet encapsulation.

17
New cards

Name 4 components of a VPN

  • VPN software (client application)

  • VPN router

  • VPN server

  • Internet

18
New cards
Define protocol
Set of rules that determine communication across a network.
19
New cards

What do protocols define

The format and order of messages exchanged and the action taken on transmission of a message.

20
New cards
Payload definition
Data that is going to be sent
21
New cards
Define packet
A small unit of data used in network communication, they have a certain size
22
New cards

Name 5 functions of protocols

  • Ensure data integrity

  • Flow control

  • Congestion control

  • Deadlock

  • Error checking

23
New cards

Explain how protocols are necessary in ensuring data integrity

They manage the overall completeness, accuracy and consistency of data.

24
New cards
Explain how protocols are necessary in flow control
Makes sure that the sender is transmitting data at a rate at which the receiver can digest
25
New cards

Explain how protocols are necessary in congestion control

When a node carries too much data, network service quality can deteriorate, resulting in queuing delay, data packet loss and the loss of new connections. Protocols help to prevent this by using congestion control algorithms which take network capacity into account.

26
New cards
What does the term deadlock refer too?
When 2 nodes or processes are trying to access the same node simultaneously causing neither to be able to proceed
27
New cards
Explain how protocols are necessary in Deadlock
The relevant protocol stops both and re-queues them so that they can happen sequentially letting traffic flow.
28
New cards

What is error checking in a network

A method which detects noise or other impairments introduced to data during transmission

29
New cards

Explain how protocols are necessary in error checking

By making use of parity bits, bits at the end of a packet that are calculated to be either a 1 or 0.

30
New cards
Name 2 primary concepts which slow data transmission
Network traffic and Number of users
31
New cards

Why does more traffic = slow data transmission

More traffic = lower bandwidth available per user on network so slower upload download speeds.

32
New cards
Bandwidth
Total amount of data per second
33
New cards
Name 3 secondary causes of slow data transmission
Time of day, Distance, Infrastructure
34
New cards
How does infrastructure slow data transmission
If a network is not set up in a way that lets it develop, quality can be affected
35
New cards

Name 3 tertiary causes of slow data transmission on a network

  • Environmental issues (like temperature, interference, etc.),

  • Infrastructure limitations due to financial reasons (cheaper equipment)

  • The type of data being transmitted (large files)

36
New cards
How does the type of cabeling affect transmission on a network
Some types are subject to more or less resistance (copper vs fibre optic) or interference (WiFi)
37
New cards
Name 4 broadband WAN connections
DSL, Fibre Optic, 3G,4G
38
New cards
What is lossy compression usually used to compress
Multimedia such as audio, image and video
39
New cards
What is lossless compression usually used to compress
Text data files and images
40
New cards

Negatives of lossy

Irreversible and reduces quality

41
New cards
Negatives of lossless
The file is not as small as in lossy
42
New cards

Why is compression used ?

Reduces the time of transmission and optimises storage space.

43
New cards
What are the 4 types of media comparison points
Security, reliability, cost and speed
44
New cards
How good is the security of UTP
ok if encrypted
45
New cards

How reliable are UTP cables

Suseptible to electrical magnetic interferance

46
New cards
How much do UTPs cost
47
New cards
How fast are UTP cables
100Mbps-1Gbps
48
New cards
How good is the security of Fibre Optic
Very secure, difficult to break in
49
New cards
How good is the security of Radiowaves(WLAN/WiFi)
Very insecure unless encrypted
50
New cards
How reliable are Fibre optic cables
Generally quite fragile
51
New cards
How reliable are Radiowaves(WLAN/WiFi)
Very susceptible to interference
52
New cards
How much do Fibre Optic cables cost
Ā£2-Ā£8 per unit
53
New cards
How much do radiowaves cost
Technically free but have to pay for service provider
54
New cards

How fast are Fibre optic cables

5-100 Gbps

55
New cards

How fast are radiowaves

5-200 Mbps

56
New cards
1st step of packet switching
A payload is split into smaller data packets (packetization)
57
New cards

2nd step of packet switching

The data packet is assembled with a header and tail, containing the IP addresses, sequence number and checksum

58
New cards
3rd step of packet switching
The packets are sent through multiple and optimal routes the the receiver
59
New cards
4th step of packet switching
Receiver re-orders the packet using the sequence number
60
New cards
5th step of packet switching
Receiver checks for lost and corrupted packets using the checksum
61
New cards
6th step of packet switching
The receiver requests a resend for corrupted or missing packets.
62
New cards
What does the header of a packet contain(packet switching)
IP address of sender/receiver nodes(or MAC if it is an internal network)
63
New cards
What does the tail of a packet contain(packet switching)
Sequence number for reordering packets at the receiver node and the checksum.
64
New cards

WAP

Allows for users to connect to a wireless network

65
New cards
Router
Maps out routes for data to follow, allowing transmission in a network
66
New cards
NIC
Holds the MAC address to identify nodes on a network
67
New cards
Name 3 pieces of hardware needed for a wireless network
WAP, Wireless router and a Wireless Network Interface card
68
New cards
Name 2 pieces of software needed for a wireless network
Software protocol stack and Network OS (specific for data transmission)
69
New cards

Name positives of a wireless network (5)

  • Flexible position of nodes(extended range/availability)

  • Easy to set up and maintain

  • Easy to add/remove nodes

  • Cheaper as there is no cabling

  • BYOD- bring your own device (companies donā€™t have to pay for infrastructure)

70
New cards

Name negatives of a wireless network (3)

  • Less secure so subject to interception

  • Slower data transmission than wired (As there is a lower bandwidth and channel interference)

  • Limited range-easily worsened by obstacles

71
New cards

Name characteristics of a wireless network (5)

  • No cabling

  • Uses radio waves as transmission media

  • Limited range

  • Needs specialist hardware/software to set up

  • Encryption is main mode of security

72
New cards
Give examples of types of wireless networks
* WiFi- Radiowaves
* WiMax- Microwaves(Longer range)
* LTE Networks/ Mobile networks
* 4G- fast internet access
* 5G- Internet of things
73
New cards
What are the two security methods for wireless networks
Encryption and Authentication
74
New cards
What are the two encryption algorithms
WEP and WPA2
75
New cards

What is WPA2

WiFi protected access, encryption algorithm which makes data very secure as it has a longer encryption key

76
New cards
What is authentications role in Wireless network security
Used to gain access to the network, by verifying the user.
77
New cards
+/- of encryption
* If one gains access to the private key then the algorithm isnā€™t effective
* Longer keys = more secure
* Encryption is reversible
78
New cards

+/- of Authentication

  • Secure access

  • Username+ Password can be shared/Stolen