1.3 - wired and wireless networks Flashcards

1
Q

pros of wired networks

A

reliable
faster
not subject to interface
more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cons of wired networks

A

not portable
more expensive
installation requires technical knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pros of wireless network

A

cheap and easy to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cons of wireless network

A

Limited in range
Subject to magnetic interference
Walls block them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is bluetooth

A

Form of wireless communication that enables different devices to connect. It works like a small private network between two devices, allowing them to share data and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluetooth vs WiFi

A

Wifi uses a WAP to connect to a network to communicate with other devices. Multiple devices access the one point.
Bluetooth uses a direct network connection to another device e.g. headphones, speakers, printer. It has shorter range than WiFi
Similarities – both use radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is encryption

A

The process of disguising a message so that it cannot be understood by anyone but its intended recipient. Encryption requires the use of a key. The key is secret as to how the message has been disguised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are encrypted and unencrypted data known as

A

Cipher text and plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Caesar cipher work

A

The cipher works by giving a number value to a key. Each plaintext letter is replaced by a new letter, the one found at the original letter’s position in the alphabet plus the value of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public and private keys

A

A public key can be given to anyone. Anyone can then use this key to encrypt a message. However, the public key cannot decrypt a message - only the second key (the private key) can do that. So long as the private key is never given out, messages will stay safely encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IP addressing

A

When connected to a network each device is given a unique IP address. This address consists of four sets of up to three digits, each with a maximum value of 255, which are separated by dots. When a node wants to send a message to another node, it uses the recipient node’s address as the destination. A switch on the network knows where the node with this address is and routes the message to it accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Static vs dynamic IP addresses

A

A node with a static address always remains the same. A node with a dynamic address has a new one assigned each time it connects to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MAC addressing

A

A unique serial number assigned to each
network interface controller (NIC). This allows a network to uniquely identify any device. A MAC address consists of a string of hexadecimal numbers and it can not be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TCP/IP

A

Transmission Control Protocol/Internet Protocol - enables communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is HTTP and HTTPs

A

Hypertext Transfer Protocol - governs communication between a webserver and a client. HTTPS (secure) includes secure encryption to allow transactions to be made over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is FTP

A

File Transfer Protocol - governs the transmission of files across a network and the internet.

17
Q

What is SMTP

A

Simple Mail Transfer Protocol - governs the sending of email over a network to a mail server.

18
Q

What is POP and IMAP

A

Post Office Protocol and Internet Message Access Protocol - govern retrieving emails from email servers. POP is an older implementation, largely replaced by IMAP.

19
Q

Encryption in use

A
  • purchases made online are encrypted to try to prevent theft of credit card details
  • tools enable a user to encrypt a document, such as a spreadsheet, before sending it to a colleague via the internet
  • satellite TV transmissions are encrypted to prevent users who are not subscribed from watching TV shows
20
Q

What is network layering

A

Breaking up the sending of messages into separate components and activities. Each component handles a different part of the communication.

21
Q

4 networking layers

A

Application layer
Transport layer
Network layer
Link layer

22
Q

What is the application layer

A

encodes/decodes the message in a form that is understood by the sender and the recipient

23
Q

What is the transport layers

A

breaks down the message into small chunks (packets). Each packet is given a packet number and the total number of packets. The recipient uses this information to assemble the packets together in the correct order. It also allows the recipient to see if there are any missing packets.

24
Q

What is the network layer

A

adds the sender’s IP address and that of the recipient. The network then knows where to send the message, and where it came from.

25
Q

What is the link layer

A

enables the transfer of packets between nodes on a network, and between one network and another.

26
Q

What does layering allow

A

standards to be developed, but also to be adapted to new hardware and software over time.

27
Q

Drawbacks of bluetooth

A

is limited in transmission speed and range