IB Computer Science HL - Topic 3 - Networks

5.0(1)
studied byStudied by 18 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

flashcard set

Earn XP

Description and Tags

Flashcards on topics 3.1.1 - 3.1.16

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

Define network

A group of nodes that are linked together through a transmission media to allow for communication and the sharing of resources.

2
New cards

Name 4 features of a LAN

  • Small geographical area

  • Uses MAC addressing and switching for routing

  • Uses private infrastructure

  • Uses ethernet: wireless and UTP cables

3
New cards

Name 4 features of a WAN

  • Large geographical area

  • Uses IP addressing for routing

  • Uses public infrastructure

  • Can be wired or wireless: fibre optic or satellite/radio

4
New cards

Name 2 features of a VLAN

  • All devices appear to be on same LAN despite geographical distribution.

  • Software implemented and creates a virtual partition on hardware

5
New cards

What is a SAN

A secure, high-speed data transfer network that provides access to consolidated block level centralised storage.

6
New cards

What is a WLAN

Same as a LAN but the permissions allow for users to be mobile with devices as they are not restricted by cables

7
New cards

What is the internet

Decentralised global network which uses the TCIP/IP protocols to transmit data via various types of media.

8
New cards

What is the intranet

A collection of private networks used within an organisation

9
New cards

What is the extranet

Controlled private network allowing businesses to gain information without granting access to the organisations entire network

10
New cards

What does a VPN do

Uses the internet to allow remote access to a private LAN whilst encrypting the connection to thwart eavesdroppers.

11
New cards

How does a VPN work

Transmits data through a secure pathway (tunnelling) and anomalies ones IP address

12
New cards

What is a PAN

A network covering a very small area

13
New cards

Name three examples of a PAN(2 wireless and 1 wired)

USB, Blutooth and Wi-Fi

14
New cards

What are standards

Rules for data transmission which help with interoperability on network devices, and transmission with integrity and minimum latency

15
New cards

Why do we need standards

Without them, manufacturers of networks have no common grounds on building their systems.

16
New cards

What is tunnelling

Transmission of data through a secure pathway using packet encapsulation.

17
New cards

Name 4 components of a VPN

  • VPN software (client application)

  • VPN router

  • VPN server

  • Internet

18
New cards

Define protocol

Set of rules that determine communication across a network.

19
New cards

What do protocols define

The format and order of messages exchanged and the action taken on transmission of a message.

20
New cards

Payload definition

Data that is going to be sent

21
New cards

Define packet

A small unit of data used in network communication, they have a certain size

22
New cards

Name 5 functions of protocols

  • Ensure data integrity

  • Flow control

  • Congestion control

  • Deadlock

  • Error checking

23
New cards

Explain how protocols are necessary in ensuring data integrity

They manage the overall completeness, accuracy and consistency of data.

24
New cards

Explain how protocols are necessary in flow control

Makes sure that the sender is transmitting data at a rate at which the receiver can digest

25
New cards

Explain how protocols are necessary in congestion control

When a node carries too much data, network service quality can deteriorate, resulting in queuing delay, data packet loss and the loss of new connections. Protocols help to prevent this by using congestion control algorithms which take network capacity into account.

26
New cards

What does the term deadlock refer too?

When 2 nodes or processes are trying to access the same node simultaneously causing neither to be able to proceed

27
New cards

Explain how protocols are necessary in Deadlock

The relevant protocol stops both and re-queues them so that they can happen sequentially letting traffic flow.

28
New cards

What is error checking in a network

A method which detects noise or other impairments introduced to data during transmission

29
New cards

Explain how protocols are necessary in error checking

By making use of parity bits, bits at the end of a packet that are calculated to be either a 1 or 0.

30
New cards

Name 2 primary concepts which slow data transmission

Network traffic and Number of users

31
New cards

Why does more traffic = slow data transmission

More traffic = lower bandwidth available per user on network so slower upload download speeds.

32
New cards

Bandwidth

Total amount of data per second

33
New cards

Name 3 secondary causes of slow data transmission

Time of day, Distance, Infrastructure

34
New cards

How does infrastructure slow data transmission

If a network is not set up in a way that lets it develop, quality can be affected

35
New cards

Name 3 tertiary causes of slow data transmission on a network

  • Environmental issues (like temperature, interference, etc.),

  • Infrastructure limitations due to financial reasons (cheaper equipment)

  • The type of data being transmitted (large files)

36
New cards

How does the type of cabeling affect transmission on a network

Some types are subject to more or less resistance (copper vs fibre optic) or interference (WiFi)

37
New cards

Name 4 broadband WAN connections

DSL, Fibre Optic, 3G,4G

38
New cards

What is lossy compression usually used to compress

Multimedia such as audio, image and video

39
New cards

What is lossless compression usually used to compress

Text data files and images

40
New cards

Negatives of lossy

Irreversible and reduces quality

41
New cards

Negatives of lossless

The file is not as small as in lossy

42
New cards

Why is compression used ?

Reduces the time of transmission and optimises storage space.

43
New cards

What are the 4 types of media comparison points

Security, reliability, cost and speed

44
New cards

How good is the security of UTP

ok if encrypted

45
New cards

How reliable are UTP cables

Suseptible to electrical magnetic interferance

46
New cards

How much do UTPs cost

<£1 per metre

47
New cards

How fast are UTP cables

100Mbps-1Gbps

48
New cards

How good is the security of Fibre Optic

Very secure, difficult to break in

49
New cards

How good is the security of Radiowaves(WLAN/WiFi)

Very insecure unless encrypted

50
New cards

How reliable are Fibre optic cables

Generally quite fragile

51
New cards

How reliable are Radiowaves(WLAN/WiFi)

Very susceptible to interference

52
New cards

How much do Fibre Optic cables cost

£2-£8 per unit

53
New cards

How much do radiowaves cost

Technically free but have to pay for service provider

54
New cards

How fast are Fibre optic cables

5-100 Gbps

55
New cards

How fast are radiowaves

5-200 Mbps

56
New cards

1st step of packet switching

A payload is split into smaller data packets (packetization)

57
New cards

2nd step of packet switching

The data packet is assembled with a header and tail, containing the IP addresses, sequence number and checksum

58
New cards

3rd step of packet switching

The packets are sent through multiple and optimal routes the the receiver

59
New cards

4th step of packet switching

Receiver re-orders the packet using the sequence number

60
New cards

5th step of packet switching

Receiver checks for lost and corrupted packets using the checksum

61
New cards

6th step of packet switching

The receiver requests a resend for corrupted or missing packets.

62
New cards

What does the header of a packet contain(packet switching)

IP address of sender/receiver nodes(or MAC if it is an internal network)

63
New cards

What does the tail of a packet contain(packet switching)

Sequence number for reordering packets at the receiver node and the checksum.

64
New cards

WAP

Allows for users to connect to a wireless network

65
New cards

Router

Maps out routes for data to follow, allowing transmission in a network

66
New cards

NIC

Holds the MAC address to identify nodes on a network

67
New cards

Name 3 pieces of hardware needed for a wireless network

WAP, Wireless router and a Wireless Network Interface card

68
New cards

Name 2 pieces of software needed for a wireless network

Software protocol stack and Network OS (specific for data transmission)

69
New cards

Name positives of a wireless network (5)

  • Flexible position of nodes(extended range/availability)

  • Easy to set up and maintain

  • Easy to add/remove nodes

  • Cheaper as there is no cabling

  • BYOD- bring your own device (companies don’t have to pay for infrastructure)

70
New cards

Name negatives of a wireless network (3)

  • Less secure so subject to interception

  • Slower data transmission than wired (As there is a lower bandwidth and channel interference)

  • Limited range-easily worsened by obstacles

71
New cards

Name characteristics of a wireless network (5)

  • No cabling

  • Uses radio waves as transmission media

  • Limited range

  • Needs specialist hardware/software to set up

  • Encryption is main mode of security

72
New cards

Give examples of types of wireless networks

  • WiFi- Radiowaves
  • WiMax- Microwaves(Longer range)
  • LTE Networks/ Mobile networks
  • 4G- fast internet access
  • 5G- Internet of things
73
New cards

What are the two security methods for wireless networks

Encryption and Authentication

74
New cards

What are the two encryption algorithms

WEP and WPA2

75
New cards

What is WPA2

WiFi protected access, encryption algorithm which makes data very secure as it has a longer encryption key

76
New cards

What is authentications role in Wireless network security

Used to gain access to the network, by verifying the user.

77
New cards

+/- of encryption

  • If one gains access to the private key then the algorithm isn’t effective
  • Longer keys = more secure
  • Encryption is reversible
78
New cards

+/- of Authentication

  • Secure access

  • Username+ Password can be shared/Stolen