1/77
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Define network
A group of nodes that are linked together through a transmission media to allow for communication and the sharing of resources.
Name 4 features of a LAN
Small geographical area
Uses MAC addressing and switching for routing
Uses private infrastructure
Uses ethernet: wireless and UTP cables
Name 4 features of a WAN
Large geographical area
Uses IP addressing for routing
Uses public infrastructure
Can be wired or wireless: fibre optic or satellite/radio
Name 2 features of a VLAN
All devices appear to be on same LAN despite geographical distribution.
Software implemented and creates a virtual partition on hardware
What is a SAN
A secure, high-speed data transfer network that provides access to consolidated block level centralised storage.
What is the internet
Decentralised global network which uses the TCIP/IP protocols to transmit data via various types of media.
What is the intranet
A collection of private networks used within an organisation
What is the extranet
Controlled private network allowing businesses to gain information without granting access to the organisations entire network
What does a VPN do
Uses the internet to allow remote access to a private LAN whilst encrypting the connection to thwart eavesdroppers.
How does a VPN work
Transmits data through a secure pathway (tunnelling) and anomalies ones IP address
What are standards
Rules for data transmission which help with interoperability on network devices, and transmission with integrity and minimum latency
What is tunnelling
Transmission of data through a secure pathway using packet encapsulation.
Name 4 components of a VPN
VPN software (client application)
VPN router
VPN server
Internet
What do protocols define
The format and order of messages exchanged and the action taken on transmission of a message.
Name 5 functions of protocols
Ensure data integrity
Flow control
Congestion control
Deadlock
Error checking
Explain how protocols are necessary in ensuring data integrity
They manage the overall completeness, accuracy and consistency of data.
Explain how protocols are necessary in congestion control
When a node carries too much data, network service quality can deteriorate, resulting in queuing delay, data packet loss and the loss of new connections. Protocols help to prevent this by using congestion control algorithms which take network capacity into account.
What is error checking in a network
A method which detects noise or other impairments introduced to data during transmission
Explain how protocols are necessary in error checking
By making use of parity bits, bits at the end of a packet that are calculated to be either a 1 or 0.
Why does more traffic = slow data transmission
More traffic = lower bandwidth available per user on network so slower upload download speeds.
Name 3 tertiary causes of slow data transmission on a network
Environmental issues (like temperature, interference, etc.),
Infrastructure limitations due to financial reasons (cheaper equipment)
The type of data being transmitted (large files)
Negatives of lossy
Irreversible and reduces quality
Why is compression used ?
Reduces the time of transmission and optimises storage space.
How reliable are UTP cables
Suseptible to electrical magnetic interferance
How fast are Fibre optic cables
5-100 Gbps
How fast are radiowaves
5-200 Mbps
2nd step of packet switching
The data packet is assembled with a header and tail, containing the IP addresses, sequence number and checksum
WAP
Allows for users to connect to a wireless network
Name positives of a wireless network (5)
Flexible position of nodes(extended range/availability)
Easy to set up and maintain
Easy to add/remove nodes
Cheaper as there is no cabling
BYOD- bring your own device (companies donāt have to pay for infrastructure)
Name negatives of a wireless network (3)
Less secure so subject to interception
Slower data transmission than wired (As there is a lower bandwidth and channel interference)
Limited range-easily worsened by obstacles
Name characteristics of a wireless network (5)
No cabling
Uses radio waves as transmission media
Limited range
Needs specialist hardware/software to set up
Encryption is main mode of security
What is WPA2
WiFi protected access, encryption algorithm which makes data very secure as it has a longer encryption key
+/- of Authentication
Secure access
Username+ Password can be shared/Stolen