IB Computer Science HL - Topic 3 - Networks

studied byStudied by 18 people
5.0(1)
Get a hint
Hint

Define network

1 / 77

flashcard set

Earn XP

Description and Tags

Flashcards on topics 3.1.1 - 3.1.16

78 Terms

1

Define network

A group of nodes that are linked together through a transmission media to allow for communication and the sharing of resources.

New cards
2

Name 4 features of a LAN

  • Small geographical area

  • Uses MAC addressing and switching for routing

  • Uses private infrastructure

  • Uses ethernet: wireless and UTP cables

New cards
3

Name 4 features of a WAN

  • Large geographical area

  • Uses IP addressing for routing

  • Uses public infrastructure

  • Can be wired or wireless: fibre optic or satellite/radio

New cards
4

Name 2 features of a VLAN

  • All devices appear to be on same LAN despite geographical distribution.

  • Software implemented and creates a virtual partition on hardware

New cards
5

What is a SAN

A secure, high-speed data transfer network that provides access to consolidated block level centralised storage.

New cards
6

What is a WLAN

Same as a LAN but the permissions allow for users to be mobile with devices as they are not restricted by cables

New cards
7

What is the internet

Decentralised global network which uses the TCIP/IP protocols to transmit data via various types of media.

New cards
8

What is the intranet

A collection of private networks used within an organisation

New cards
9

What is the extranet

Controlled private network allowing businesses to gain information without granting access to the organisations entire network

New cards
10

What does a VPN do

Uses the internet to allow remote access to a private LAN whilst encrypting the connection to thwart eavesdroppers.

New cards
11

How does a VPN work

Transmits data through a secure pathway (tunnelling) and anomalies ones IP address

New cards
12

What is a PAN

A network covering a very small area

New cards
13

Name three examples of a PAN(2 wireless and 1 wired)

USB, Blutooth and Wi-Fi

New cards
14

What are standards

Rules for data transmission which help with interoperability on network devices, and transmission with integrity and minimum latency

New cards
15

Why do we need standards

Without them, manufacturers of networks have no common grounds on building their systems.

New cards
16

What is tunnelling

Transmission of data through a secure pathway using packet encapsulation.

New cards
17

Name 4 components of a VPN

  • VPN software (client application)

  • VPN router

  • VPN server

  • Internet

New cards
18

Define protocol

Set of rules that determine communication across a network.

New cards
19

What do protocols define

The format and order of messages exchanged and the action taken on transmission of a message.

New cards
20

Payload definition

Data that is going to be sent

New cards
21

Define packet

A small unit of data used in network communication, they have a certain size

New cards
22

Name 5 functions of protocols

  • Ensure data integrity

  • Flow control

  • Congestion control

  • Deadlock

  • Error checking

New cards
23

Explain how protocols are necessary in ensuring data integrity

They manage the overall completeness, accuracy and consistency of data.

New cards
24

Explain how protocols are necessary in flow control

Makes sure that the sender is transmitting data at a rate at which the receiver can digest

New cards
25

Explain how protocols are necessary in congestion control

When a node carries too much data, network service quality can deteriorate, resulting in queuing delay, data packet loss and the loss of new connections. Protocols help to prevent this by using congestion control algorithms which take network capacity into account.

New cards
26

What does the term deadlock refer too?

When 2 nodes or processes are trying to access the same node simultaneously causing neither to be able to proceed

New cards
27

Explain how protocols are necessary in Deadlock

The relevant protocol stops both and re-queues them so that they can happen sequentially letting traffic flow.

New cards
28

What is error checking in a network

A method which detects noise or other impairments introduced to data during transmission

New cards
29

Explain how protocols are necessary in error checking

By making use of parity bits, bits at the end of a packet that are calculated to be either a 1 or 0.

New cards
30

Name 2 primary concepts which slow data transmission

Network traffic and Number of users

New cards
31

Why does more traffic = slow data transmission

More traffic = lower bandwidth available per user on network so slower upload download speeds.

New cards
32

Bandwidth

Total amount of data per second

New cards
33

Name 3 secondary causes of slow data transmission

Time of day, Distance, Infrastructure

New cards
34

How does infrastructure slow data transmission

If a network is not set up in a way that lets it develop, quality can be affected

New cards
35

Name 3 tertiary causes of slow data transmission on a network

  • Environmental issues (like temperature, interference, etc.),

  • Infrastructure limitations due to financial reasons (cheaper equipment)

  • The type of data being transmitted (large files)

New cards
36

How does the type of cabeling affect transmission on a network

Some types are subject to more or less resistance (copper vs fibre optic) or interference (WiFi)

New cards
37

Name 4 broadband WAN connections

DSL, Fibre Optic, 3G,4G

New cards
38

What is lossy compression usually used to compress

Multimedia such as audio, image and video

New cards
39

What is lossless compression usually used to compress

Text data files and images

New cards
40

Negatives of lossy

Irreversible and reduces quality

New cards
41

Negatives of lossless

The file is not as small as in lossy

New cards
42

Why is compression used ?

Reduces the time of transmission and optimises storage space.

New cards
43

What are the 4 types of media comparison points

Security, reliability, cost and speed

New cards
44

How good is the security of UTP

ok if encrypted

New cards
45

How reliable are UTP cables

Suseptible to electrical magnetic interferance

New cards
46

How much do UTPs cost

<ÂŁ1 per metre

New cards
47

How fast are UTP cables

100Mbps-1Gbps

New cards
48

How good is the security of Fibre Optic

Very secure, difficult to break in

New cards
49

How good is the security of Radiowaves(WLAN/WiFi)

Very insecure unless encrypted

New cards
50

How reliable are Fibre optic cables

Generally quite fragile

New cards
51

How reliable are Radiowaves(WLAN/WiFi)

Very susceptible to interference

New cards
52

How much do Fibre Optic cables cost

ÂŁ2-ÂŁ8 per unit

New cards
53

How much do radiowaves cost

Technically free but have to pay for service provider

New cards
54

How fast are Fibre optic cables

5-100 Gbps

New cards
55

How fast are radiowaves

5-200 Mbps

New cards
56

1st step of packet switching

A payload is split into smaller data packets (packetization)

New cards
57

2nd step of packet switching

The data packet is assembled with a header and tail, containing the IP addresses, sequence number and checksum

New cards
58

3rd step of packet switching

The packets are sent through multiple and optimal routes the the receiver

New cards
59

4th step of packet switching

Receiver re-orders the packet using the sequence number

New cards
60

5th step of packet switching

Receiver checks for lost and corrupted packets using the checksum

New cards
61

6th step of packet switching

The receiver requests a resend for corrupted or missing packets.

New cards
62

What does the header of a packet contain(packet switching)

IP address of sender/receiver nodes(or MAC if it is an internal network)

New cards
63

What does the tail of a packet contain(packet switching)

Sequence number for reordering packets at the receiver node and the checksum.

New cards
64

WAP

Allows for users to connect to a wireless network

New cards
65

Router

Maps out routes for data to follow, allowing transmission in a network

New cards
66

NIC

Holds the MAC address to identify nodes on a network

New cards
67

Name 3 pieces of hardware needed for a wireless network

WAP, Wireless router and a Wireless Network Interface card

New cards
68

Name 2 pieces of software needed for a wireless network

Software protocol stack and Network OS (specific for data transmission)

New cards
69

Name positives of a wireless network (5)

  • Flexible position of nodes(extended range/availability)

  • Easy to set up and maintain

  • Easy to add/remove nodes

  • Cheaper as there is no cabling

  • BYOD- bring your own device (companies don’t have to pay for infrastructure)

New cards
70

Name negatives of a wireless network (3)

  • Less secure so subject to interception

  • Slower data transmission than wired (As there is a lower bandwidth and channel interference)

  • Limited range-easily worsened by obstacles

New cards
71

Name characteristics of a wireless network (5)

  • No cabling

  • Uses radio waves as transmission media

  • Limited range

  • Needs specialist hardware/software to set up

  • Encryption is main mode of security

New cards
72

Give examples of types of wireless networks

  • WiFi- Radiowaves

  • WiMax- Microwaves(Longer range)

  • LTE Networks/ Mobile networks

  • 4G- fast internet access

  • 5G- Internet of things

New cards
73

What are the two security methods for wireless networks

Encryption and Authentication

New cards
74

What are the two encryption algorithms

WEP and WPA2

New cards
75

What is WPA2

WiFi protected access, encryption algorithm which makes data very secure as it has a longer encryption key

New cards
76

What is authentications role in Wireless network security

Used to gain access to the network, by verifying the user.

New cards
77

+/- of encryption

  • If one gains access to the private key then the algorithm isn’t effective

  • Longer keys = more secure

  • Encryption is reversible

New cards
78

+/- of Authentication

  • Secure access

  • Username+ Password can be shared/Stolen

New cards

Explore top notes

note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 128 people
... ago
5.0(4)
note Note
studied byStudied by 36 people
... ago
5.0(1)
note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(2)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 27 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (24)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 87 people
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 15 people
... ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 2 people
... ago
5.0(1)
robot