IB Computer Science SL: Networks

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Different types of networks

LAN - Local Area Network

WAN - Wide Area Network

VLAN - Virtual Local Area Network

SAN - Storage Area Network

WLAN - Wireless Local Area Network

Internet

Extranet

VPN - Virtual Private Network

PAN - Personal Area Network

P2P - Peer-to-Peer

2
New cards

Server

Computer system that provides a service to other computer systems that are connected to the same network

3
New cards

Client

Computer system that requests a service from a server connected to the same network

4
New cards

Ethernet

Set of protocols for exchanging data

5
New cards

Differences between hub, switch, and router

  • Hub = connection point for devices on a single network and it has a set limit of ports for wired connection via Ethernet cables

  • Switch = connection point for devices on a single network. Unlike a hub, data is sent to the exact port.

  • Router = joins multiple networks to efficiently exchange data between network devices so they can access the Internet.

6
New cards

The Internet + how it works

  • Globally connected network system

  • Uses TCP/IP protocol to transmit data

  • Hosts web pages that make the World Wide Web

Data travels in the form of packets and they can take different routes but ultimately reach the same destination and are reassembled.

7
New cards

Local Area Network (LAN)

Connects computer systems that are within a limited geographical area.

  • High data transfer rates

  • Client-to-server relationship

  • Can be wired or wireless

8
New cards

Wide Area Network (WAN)

Connects computer systems that are within a large geographical area.

  • multiple LANs

  • wired or wireless

9
New cards

Virtual Local Area Network (VLAN)

Collection of servers that appear to be on the same LAN but are in a different geographical location.

  • 1 or more physical LANs

10
New cards

Storage Area Network (SAN)

Large storage devices that can connect to multiple servers easily.

  • Backup servers

  • Purpose-specific servers (email servers, application servers)

11
New cards

Wireless Local Area Network (WLAN)

Links two or more computer systems within a limited geographical area

  • also called “Wifi network”

12
New cards

Intranet

  • Private network

  • Uses TCP/IP

13
New cards

Extranet

  • Controlled private network that allows specific users from a specific LAN or WAN to access a private part of a website

  • Requires authentication mechanisms

14
New cards

Virtual Private Network (VPN)

Clients can access a network remotely by encrypting the connection between two or more computer sites.

15
New cards

Advantages of VPN

  • Authentication

  • Encryption

  • Tunneling

16
New cards

Personal Area Network

Connects devices that are centered around an individual’s workplace

17
New cards

Peer-to-peer

Each node acts as a client and server.

18
New cards

Similarities and differences between LAN and WLAN

Similarities

  • Both act on a local level

  • Both allow communication

  • Both used to connect devices

  • Both allow sharing of resources

Differences

  • Use different transmission mediums

  • LAN is safer

  • LAN is faster

  • WLANs offer greater flexibility

19
New cards

Similarities and differences between LAN and VLAN

Similarities

  • Both act on a local level

  • Both allow communication

  • Both used to connect devices

  • Both allow sharing of resources

Differences

  • VLAN delivers better performance

  • VLAN is safer

  • VLAN offer greater flexibility

20
New cards

Similarities and differences between LAN and WAN

Similarities

  • Both allow communication

  • Both used to connect devices

  • Both allow sharing of resources

Differences

  • LAN is faster

  • WAN costs more

  • LAN easier to maintain

21
New cards

Similarities and differences between VPN and Extranet

Similarities

  • Both use the internet

  • Both inexpensive

  • Both provides security

Differences

  • VPN provides a secure connection for employees whereas an extranet limits access to a company network by selecting users who can access VPN is more secure

22
New cards

Similarities and differences between LAN and PAN

Similarities

  • Used for data transmission

Differences

  • LAN connects computers and devices that belong to different people, PAN suits the needs of a single person

  • PAN operates on a smaller area than LAN
    PAN uses USB and Bluetooth as opposed to a hub or switch

23
New cards

Similarities and differences between P2P and Client-server

Similarities

  • Serves a lot of devices and users

  • Can act on different scales, local and wide

Differences

  • Client-server is centralised, P2P is decentralised

  • Client-server is more secure

  • P2P acts as both clients and servers

24
New cards

The importance of standards in the construction of networks

Provides a common international language that enables compatibility for all computer systems throughout the globe.

25
New cards

Protocols definition

A set of rules for data transmission. Examples:

  • TCP/IP: rules for transmitting data on the internet

  • HTTPS: rules for securely transmitting data between a web browser and server

  • SFTP: rules for securely transferring files from client to server

26
New cards

Roles of protocols

  • Maintains data integrity: same data that is sent, is received

  • Flow control: data is sent and received at the same rate

  • Prevents deadlock: two packets don’t ‘block each other’

  • Prevents errors

27
New cards

Importance of OSI (Open Systems Interconnection) model

Provides an abstract depiction and explanation of the network communication process. 7 layers: Physical, Data link, Network, Transport, Session, Presentation, Application

28
New cards

The TCP / IP Model (Transmission Control Protocol / Internet Protocol)

4 layers:

  1. Application - Program sends out data

  2. Transmission - Data is broken down into packets

  3. Network - Packets are addressed with destination and sender’s address

  4. Link - Packets are converted into binary and sent

29
New cards

Wifi vs ethernet

  • Ethernet faster, more consistent speed

  • Wifi easier to install, cheaper

  • Ethernet more secure

30
New cards

Fiber optic vs copper cabling

  • Fibre is faster, more expensive, immune to interference

  • Copper is susceptible to electromagnetic interference, shorter range, heavier and thicker

31
New cards

VPN technologies

  • Encryption: when data is encoded the computer with the correct decoder is able to read and use it

  • Tunneling: packets are encapsulated and transmitted between the VPN client and server

32
New cards

Requirements for VPN

  • A LAN that is connected to the internet

  • VPN routers

  • VPN softwares

33
New cards

Benefits of a VPN

  • Decreases operational costs

  • Enables global communication

  • Offers global networking opportunity

  • Improves security

  • Improves productivity

34
New cards

How VPN has changed traditional working patterns

VPNs make it possible to connect to a LAN that is protected from outside access through the internet. Therefore, it’s possible for workers to work anywhere and still be able to connect to the company’s internal network, hence the popularity of telecommuting, where people can work from home.

35
New cards

Factors that affect transmission speed

  • Primary: traffic

  • Secondary: time of day, distance, infrastructure

  • Tertiary: environmental issues, financial factors, type of data

36
New cards

Lossy compression

  • Removes original data

  • Smaller file size

  • Permanent removal = irreversible

  • Used when some data can be lost (videos, images)

37
New cards

Lossless compression

  • Uses algorithm to eliminate statistical redundancy

  • Larger than lossy but smaller than normal size

  • Can be reversed

  • Used when no data can be lost (text, audio)

38
New cards

Wired communication

Unshielded Twisted Pair:

  • OK security, if encrypted

  • Susceptible to EMI

  • Low cost

Shielded Twisted Pair:

  • OK security, if encrypted

  • Less susceptibility to EMI

  • Same cost to UTP

  • Harder to install than UTP

Fibre-optic cable:

  • Very secure

  • Fragile

  • Very expensive

  • Fastest

39
New cards

Wireless communication

Radio waves (WLAN / WiFi)

  • Generally unsecure

  • Susceptible to interference

  • Free

40
New cards

Authentication

  • One factor (something you know): password, security

  • Two factor (something you know, something you have)

  • Three factor (something you know, something you have, something you are)

41
New cards

Media Access Control (MAC) Address

  • Unique identifer

42
New cards

Firewalls

  • Can be hardware or software-based

  • Analyses data packets

  • Controls incoming and outgoing traffic

43
New cards

Physical security

  • Locked doors

  • Cages

  • Security guards

  • Secure rooms