1.3.2 - Wired and wireless networks, protocols and layers Flashcards

1
Q

Describe wired connections

A

Wired connections use physical cables, such as Ethernet and copper/coaxial or fibre optic wires, and require a network interface card (NIC) to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the drawbacks of a wired connection?

A

-Restricts movement
-Cables can be hazardous and unsightly
-Not all devices can connect via cable
-Can be expensive to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe wireless connections

A

Wireless connections, such as WiFi or bluetooth use no cables but require a wireless network interface card (WNIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of a wireless connection?

A

-No hazardous, unsightly wires
-Easy to connect to new devices
-Can be used freely (with freedom of movement) within range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the benefits of a wired connection?

A

-Faster connection
-Higher bandwidth
-Greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the drawbacks of a wireless connection?

A

-Connection can be slower
-Less secure
-Interference. From walls, objects and other electronic devices.
-Can be affected by the computer’s distance from the wireless router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain ethernet

A

Ethernet is a wired connection, standard and protocol. As it is a standard it has high bandwidth, inbuilt security, a reliable connection and is low cost for maintenance compared to other wired connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Wi-Fi

A

A set of standards that define how network devices communicate wirelessly over radio waves wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain bluetooth

A

A standard which allows for the very short range direct connection of devices to communicate with each other wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe encryption

A

Encryption is the process of encoding data so that it cannot be easily understood if stolen or intercepted. In this process plain text is converted into cipher text by using an encryption key. The original text can only be understood if the user has the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe IP addresses

A

IP addresses are configured by software and assigned by the router. They can change. They are used for routing across a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe how IPv4 addresses are structured

A

They are 4 bytes long. They consist of numbers written in denary from 0 to 255 separated by full stops

e.g. 10.208.113.14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe how IPv6 addresses are structured

A

They are written in the format of 8 hexadecimal numbers separated by colons where the largest number is FFFF.
e.g.2001:db8:3333:4444:5555:6666:7777:8888

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe MAC addresses

A

They are configured in hardware: in the NIC for computers. They cannot be changed as every device has a fixed MAC address. They uniquely identify every device on a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a networking standard

A

Networking standards are rules that allow hardware and software that use them to communicate across different manufacturers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What may make something a standard?

A

Standards are used in many devices
They allow compatibility with other devices
Any advantage of a standard enables this ability

17
Q

Define a protocol

A

A set of rules for communication

18
Q

Define TCP/IP

19
Q

Define HTTP

A

Hyper Text Transfer Protocol

A protocol used to make web page requests

20
Q

Define HTTPS

A

Hyper Text Transfer Protocol Secure

A protocol that encrypts all data transfers between the client and server for secure browsing of the web

21
Q

Define FTP

A

File Transfer Protocol

For downloading or uploading a file from or to a server

22
Q

Define POP

A

Post Office Protocol

Used to retrieve email with it being downloaded onto the device. The email is deleted from the email server once downloaded to the device

23
Q

Define IMAP

A

Internet Message Access Protocol

Used to retrieve email and it allows the user to view/access the email on the server

24
Q

Define SMTP

A

Simple Mail Transfer Protocol

Used to send emials

25
Q

Define a layer

A

A division of network functionality

26
Q

What are the advantages of using layers?

A

-Each layer is independent
-One layer can be changed without affecting the others / is self-contained
-Separates tasks so they can be developed independently
-A developer can focus on only one layer
-Allows for standards for individual tasks/layers to be developed
-To group together similar protocols