2.1 Communications.networking Flashcards

1
Q

What does ARPAnet stand for?

A

Advanced Research Projects Agency Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does WAN stand for, and what does it represent?

A

Wide Area Network; a network covering a very large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define LAN.

A

Local Area Network; a network covering a small area, such as a single building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a MAN?

A

Metropolitan Area Network; a network larger than a LAN but smaller than a WAN, typically covering several buildings in a single city (e.g., university campus).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a file server?

A

A server on a network where central files and data are stored, accessible by users logged onto the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a hub do in a LAN?

A

Connects devices in a LAN and directs incoming data packets to all devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a switch differ from a hub?

A

A switch connects devices in a LAN but directs incoming data packets to a specific destination address only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of a router?

A

Enables data packets to be routed between different networks (e.g., joining LANs to form a WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a modem do?

A

Converts digital data to analog for transmission via telephone wires and vice versa for processing by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define WLAN.

A

Wireless Local Area Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a (W)AP?

A

(Wireless) Access Point; allows a device to access a LAN without a wired connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a PAN?

A

Personal Area Network; a network centred around a person or their workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe a client-server network.

A

A network with dedicated servers and specific client workstations, where all clients connect to the servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spread spectrum technology?

A

Wideband radio frequency technology with a range of 30 to 50 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a node in networking.

A

A device connected to a network, such as a computer, storage device, or peripheral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a peer-to-peer network?

A

A network where each node can share files with other nodes without a central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the difference between thin and thick clients?

A

Thin clients depend on the internet and a powerful computer for processing, while thick clients can work offline and perform processing independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the bus network topology.

A

Uses a single central cable, where all devices connect, and data travels in one direction with only one device transmitting at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a data packet?

A

A message or data sent over a network containing the sender’s address, recipient’s address, and the actual data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Explain the star network topology.

A

A network where all devices connect to a central hub or switch, and data packets are directed through this hub/switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define the mesh network topology.

A

Interlinked devices that use routing logic to send data packets via the shortest route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a hybrid network?

A

A network combining multiple topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is cloud storage?

A

A method of storing data on off-site servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define data redundancy.

A

Storing the same data on multiple servers for maintenance or repair purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Wi-Fi?

A

Wireless connectivity using radio waves or microwaves, implementing IEEE 802.11 protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Bluetooth?

A

Wireless connectivity using radio waves in the 2.45 GHz frequency band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe spread spectrum frequency hopping.

A

Transmitting radio signals by randomly picking one of 79 channels; switches channels if the chosen one is busy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define WPAN.

A

Wireless Personal Area Network; a local wireless network for devices in close proximity (e.g., a laptop, smartphone, printer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a twisted pair cable?

A

A cable with two wires of a single circuit twisted together, multiple pairs form a single cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe a coaxial cable.

A

A cable with a central copper core, insulation, copper mesh, and outer insulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a fiber optic cable?

A

A cable using glass fibers and pulses of light to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the role of a gateway?

A

Connects LANs that use different protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define a repeater in networking.

A

A device that boosts signals on both wired and wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are repeating hubs?

A

Hybrid devices combining hub and repeater functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a bridge do?

A

Connects LANs using the same protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a softmodem?

A

A software-based modem using minimal hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a NIC?

A

Network Interface Card; allows devices to connect to a network or the internet, associated with a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a WNIC?

A

Wireless Network Interface Card/Controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define Ethernet.

A

A protocol (IEEE 802.3) used by many wired LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a conflict in networking?

A

A situation where two devices have the same IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does broadcast mean in networking?

A

Communication where data is sent from a sender to multiple receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a collision in networking?

A

When two messages or data from different sources attempt to transmit along the same data channel simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Explain CSMA/CD.

A

Carrier Sense Multiple Access with Collision Detection; a method used to detect and resolve data collisions in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is bit streaming?

A

A contiguous sequence of digital bits sent over a network or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is buffering?

A

Temporary storage that holds data before it is processed or transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Define bit rate.

A

The number of bits per second that can be transmitted over a network, measuring the data transfer rate in digital telecommunications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is on-demand bit streaming?

A

A system that allows users to stream video or music files from a central server as needed, without saving the files on their device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Describe real-time bit streaming.

A

A system where an event is captured (e.g., via camera and microphone), encoded on a server, and made accessible to users live, as it happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is ARPAnet, and why is it significant?

A

ARPAnet was an early form of packet-switching WAN (circa 1970, USA) connecting large computers in the Department of Defense. It later included university computers and developed the technical foundation for the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How did local area networks (LANs) emerge?

A

LANs developed in the 1980s alongside personal computers and connected computers and shared devices, such as printers, within a single building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the relationship between WANs and LANs?

A

WANs typically consist of multiple LANs connected via public communication networks, such as telephone lines or satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How is a WAN different from the internet?

A

WANs are private networks requiring passwords and user IDs, while the internet is a decentralised network with a common access point, open to anyone with internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a metropolitan area network (MAN)?

A

A MAN connects multiple smaller networks (e.g., LANs) within a limited geographical area, such as a city or a university campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How does the geographical scope of a WAN compare to a MAN?

A

A WAN covers much larger areas, such as countries or continents, while a MAN is restricted to a single city or region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are the benefits of networking devices and computers?

A
  1. Shared devices, such as printers, reduce costs.
  2. Software licenses for networks are cheaper than for stand-alone computers.
  3. Users can share files and data.
  4. Reliable data access from a central source, such as a file server.
  5. Centralised backup of data and files.
  6. Communication via email and instant messaging.
  7. Network managers can oversee access rights and restrict external access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the drawbacks of networking devices and computers?

A
  1. High initial costs for cabling and servers.
  2. Managing large networks can be complex and challenging.
  3. Device breakdowns, such as file server failures, can impact the entire network.
  4. Malware and hacking risks, especially for LANs connected to larger WANs, though firewalls offer some protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What infrastructure components enable networked computers to communicate?

A
  • Hardware: LAN cards, routers, switches, wireless routers, cabling.
  • Software: Network operation and management, firewalls, security applications/utilities.
  • Services: DSL, satellite communication channels, wireless protocols, IP addressing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How are private networks defined?

A

Private networks are owned by a single company or organization. They often consist of LANs or intranets with restricted user access requiring passwords and user IDs. Companies are responsible for equipment, software, maintenance, and staff training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What characterises public networks?

A

Public networks are owned by communication carrier companies, such as telecoms providers. They are used by multiple organizations, often without specific password requirements, though sub-networks may have security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a LAN?

A

A Local Area Network (LAN) is contained within one building or a small geographical area. It connects computers and devices (e.g., printers) through hubs or switches, with at least one hub or switch connected to a router or modem for internet access or integration into a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Define a Wireless LAN (WLAN).

A

A WLAN provides wireless network communications over short distances (up to 100 meters) using radio or infrared signals instead of cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What are wireless access points (WAPs)?

A

WAPs are devices connected to the wired network at fixed locations, enabling WLAN connectivity. They transmit data between the WLAN and the wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Why do commercial WLANs require multiple WAPs?

A

Due to the limited range of wireless signals (up to 100 meters for radio and 1-2 meters for infrared), multiple WAPs ensure uninterrupted wireless communication over larger areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What technologies do WAPs use?

A

Spread Spectrum Technology: Wideband radio frequency with a range of a few meters to 100 meters.
Infrared: Very short range (1-2 meters), easily blocked, and of limited use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

How do end users access WLANs?

A

Through wireless LAN adapters, either built into devices or as plug-in modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is the approximate size range of a WAN, MAN, LAN, and PAN?

A
  • WAN (Wide Area Network): 100 km to over 1000 km.
  • MAN (Metropolitan Area Network): 1 km to 100 km.
  • LAN (Local Area Network): 10 m to 1000 m.
  • PAN (Personal Area Network): 1 m to 10 m (typically a home system)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the client-server networking model?

A

A model where dedicated servers manage files, security, and shared resources, and client workstations connect to the servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are key features of the client-server model?

A
  • Most files are stored on dedicated servers, accessible by users.
  • Central security databases control access using passwords and user IDs.
  • Allows installation of software on client computers.
  • Offers scalability and centralised backup systems.
  • Provides access control and better security than peer-to-peer networks.
  • Central servers manage email storage, delivery, and sending.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the role of a file server in a client-server network?

A
  • Central storage and management of data files.
  • Enables file sharing without offline devices like memory sticks.
  • Can be configured as a host machine, allowing remote access to storage as if it were local.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What are advantages of the client-server model over peer-to-peer networks?

A
  • Greater scalability.
  • Centralised security and resource control.
  • Reliable data backup and recovery.
  • Better stability and support for large user bases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are potential drawbacks of the client-server model?

A

Bottlenecks can occur if multiple client requests are made simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

When is the client-server model typically used?

A
  • For large user bases or small groups needing data sharing.
  • When access to network resources must be controlled.
  • When strong network security is required.
  • To ensure data is protected from accidental loss through centralised backups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Provide an example of a client-server model in use.

A

Amazon uses a client-server network model for order processing, billing, and data security. Each user experiences a unique front-end without interaction with other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the primary difference between the client-server and peer-to-peer models?

A

In the client-server model, sharing of data is the most important aspect, while in the peer-to-peer model, connectivity is the primary focus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the primary structure of a peer-to-peer network?

A

A network model where each node can share its files with all others, acts as both supplier and consumer of resources, and there is no central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How do services work in a peer-to-peer network?

A
  • Services available on the network are listed on a designated “look-up” computer.
  • Nodes contact the “look-up” computer to locate the required services from other nodes.
77
Q

What is a key difference between peer-to-peer and client-server models?

A

In peer-to-peer networks, peers are equal participants, sharing resources and responsibilities, while in the client-server model, consumers and resources are separated, and servers manage resources centrally.

78
Q

What are the limitations of peer-to-peer networks?

A
  • No central storage or authentication, leading to limited data security.
  • Performance and management issues arise with more than 10 nodes.
  • No robust security system, making it unclear who is authorised to share certain data.
79
Q

What are the advantages of peer-to-peer networks?

A
  • Simple setup for small networks (10 or fewer nodes).
  • Allows nodes to share resources and communicate directly.
  • No need for a central server or complex infrastructure.
80
Q

In what scenarios is a peer-to-peer network ideal?

A
  • Small networks with minimal security needs.
  • Situations requiring workstation-based applications.
  • Frequent interaction among users, such as small businesses or workgroups.
81
Q

Provide an example of a peer-to-peer network use case.

A

A small business like a builder and five associated workers needing access to each other’s schedules, past jobs, and skills without requiring robust security or central servers.

82
Q

Why is there limited security in peer-to-peer networks?

A

Because there is no central security system or authentication procedures, users rely on their own node’s share point for control.

83
Q

What is a thin client in the client-server model?

A

A thin client is a device or software that relies heavily on a server for processing and access to files, requiring a constant connection to function. Examples include web browsers and POS terminals.

84
Q

What is a thick client in the client-server model?

A

A thick client is a device or software capable of functioning both offline and online, using local resources like storage and RAM for processing. Examples include PCs and offline computer games.

85
Q

What are the advantages of thin clients?

A
  • Less expensive to expand (uses low-powered, cheap devices).
  • Centralised data updates and software installations.
  • Server-based protection against hacking and malware.
86
Q

What are the disadvantages of thin clients?

A
  • High reliance on the server; devices fail if the server or connection is down.
  • Higher start-up costs compared to thick clients despite cheaper hardware.
87
Q

What are the advantages of thick clients?

A
  • More robust; can process tasks even without a server connection.
  • Clients have more control over programs and data/files.
88
Q

What are the disadvantages of thick clients?

A
  • Less secure; clients manage their own data security.
  • Data and software must be updated individually on each client.
  • Potential data integrity issues from inconsistent updates among clients.
89
Q

What are the key features of thin client software?

A
  • Requires a constant connection to a remote server to function.
  • Uses minimal local resources like SSD or RAM.
  • Relies on a fast, stable network connection.
  • Data is stored remotely on a server.
90
Q

What are the key features of thick client software?

A
  • Can run some features offline without a server connection.
  • Relies on local resources like SSD, RAM, or CPU for processing.
  • Tolerant of slower network connections.
  • Stores data locally on resources like HDD or SSD.
91
Q

Compare the cost structure of thin and thick clients.

A

Thin clients have cheaper hardware but higher start-up costs due to server reliance, whereas thick clients have higher individual hardware costs but no need for a robust server infrastructure.

92
Q

Why might a company choose thin clients over thick clients?

A

Thin clients are preferable for centralised management, lower hardware costs, and enhanced security managed through the server.

93
Q

In what situation would thick clients be more suitable?

A

Thick clients are better for environments where offline functionality is critical and users need direct control over their data and programs.

94
Q

What is a bus network topology?

A

A bus network uses a single central cable to which all devices are connected, with data traveling in one direction. Terminators at each end prevent signal reflection.

95
Q

What are the advantages of a bus network?

A
  • Easy to expand by adding nodes.
  • If one node fails, the rest of the network continues to function.
96
Q

What are the disadvantages of a bus network?

A
  • The entire network fails if the main cable breaks.
  • Performance deteriorates under heavy traffic.
  • Low security, as packets pass through every node.
97
Q

When is a bus network most suitable?

A

For small-scale environments with light traffic, such as small offices.

98
Q

What is a star network topology?

A

A star network uses a central hub or switch, with each device having a dedicated connection to the hub. Data is directed through this central node.

99
Q

What are the advantages of a star network?

A
  • Greatly reduced data collisions.
  • High security, as packets travel only to nodes with matching addresses.
  • Easy to upgrade by replacing the hub.
  • Failure of a single connection affects only that node.
100
Q

What are the disadvantages of a star network?

A
  • High initial installation costs.
  • Entire network fails if the central hub/switch malfunctions.
101
Q

What is the difference between using a hub and a switch in a star network?

A

Hub: Broadcasts packets to all devices; less secure.
Switch: Sends packets only to intended recipients; more secure.

102
Q

When is a star network ideal?

A

For networks with heavy data traffic and frequent device changes.

103
Q

What is a mesh network topology?

A

A mesh network connects nodes directly and dynamically, using either routing (directed paths) or flooding (sending data through all nodes).

104
Q

What are the advantages of a mesh network?

A
  • Faults are easily identified, and broken links don’t affect other nodes.
  • High privacy and security due to dedicated routes.
  • Easy to expand the network.
105
Q

What are the disadvantages of a mesh network?

A
  • Expensive and time-consuming due to extensive cabling.
  • Complex to set up and maintain.
106
Q

What are common applications of mesh networks?

A
  • The internet, WANs, and MANs.
  • Industrial and medical monitoring systems.
  • Vehicle component connectivity and home electronics systems.
107
Q

What is the difference between routing and flooding in mesh networks?

A

Routing: Uses logic to find the shortest route and reroutes around failures.
Flooding: Sends data to all nodes, potentially causing network congestion.

108
Q

What is a hybrid network?

A

A hybrid network combines elements of different topologies (e.g., bus, star, or mesh) to create a tailored network structure.

109
Q

Why are hybrid networks used?

A

They leverage the strengths of multiple topologies to meet specific needs, balancing performance, cost, and scalability.

110
Q

What is a hybrid network?

A

A hybrid network combines two or more topologies (e.g., bus and star) to create a mixed network structure.

111
Q

What are the advantages of hybrid networks?

A
  • Handles large volumes of traffic.
  • Easy fault identification.
  • Well-suited for creating larger networks.
  • Allows seamless integration of different existing network types.
112
Q

What is a disadvantage of hybrid networks?

A

They are complex to install, configure, and maintain.

113
Q

What is an example of hybrid network use?

A

A company integrating three hotel chains using bus, star, and mesh networks into a single hybrid network while maintaining their individual setups and allowing easy expansion.

114
Q

What is cloud storage?

A

Cloud storage is the storage of data on offsite servers, managed by hosting companies, providing redundancy and accessibility.

115
Q

What is data redundancy in cloud storage?

A

Data redundancy involves storing the same data on multiple servers to ensure access during maintenance or repair.

116
Q

What are the types of cloud computing?

A

Public Cloud: Storage where the provider and client are separate entities.
Private Cloud: Dedicated storage behind a company firewall, integrating client and provider.
Hybrid Cloud: Combines private and public clouds, with sensitive data in private storage and other data in public storage.

117
Q

What are the advantages of cloud storage?

A
  • Access files from any device globally with an internet connection.
  • Eliminates the need for physical storage devices.
  • Provides remote backup for disaster recovery.
  • Recovers data in case of local hard disk or backup failure.
  • Offers nearly unlimited storage capacity.
118
Q

What are the disadvantages of cloud storage?

A
  • Issues with accessing data if internet is slow or unstable.
  • High costs for large storage capacity.
  • Expensive data transfer limits from ISPs.
  • Risk of losing backup data if the cloud storage company fails.
119
Q

How does a hybrid cloud function?

A

A hybrid cloud stores sensitive data in a private cloud while using a public cloud for less sensitive data.

120
Q

What concerns arise when companies use cloud storage for vast amounts of confidential data?

A

Concerns include:
- Physical security of the building housing the data.
- Resistance to natural disasters or power cuts.
- Safeguards regarding personnel accessing confidential data for monetary purposes.

121
Q

What risks are associated with data loss in cloud storage?

A

Risks include:

  • Actions by hackers, such as pharming attacks.
  • Loss or corruption of data due to insufficient safeguards.
  • Potential breaches, such as:
    1. XEN hypervisor security threat forcing server reboots.
    2. Data loss during routine back-up by cloud providers.
    3. Celebrity photos hacking scandal exposing private data.
    4. The 2016 breach of Mexico’s voter database involving Amazon cloud servers.
122
Q

What is a hypervisor in cloud computing?

A

A hypervisor is software, firmware, or hardware that creates and manages virtual machines.

123
Q

What are cloud software services?

A

These are software applications hosted and managed by cloud providers, including maintenance, upgrades, and security, accessed via the internet for a monthly fee.

124
Q

How do cloud software applications differ from web-based apps?

A

Cloud software can perform tasks on a local device and store data locally if the internet connection is lost, syncing data later. Web-based apps require a constant internet connection.

125
Q

What are the main advantages of cloud software applications?

A
  • Fully tested software hosted by the provider.
  • No need to install on the user’s device.
  • Usable offline, with data syncing when the internet is restored.
126
Q

What is the primary function of a cloud services supplier in providing software?

A

To connect users to required software applications, ensuring hosting, maintenance, upgrades, and security.

127
Q

What is Bluetooth and how does it work?

A

Bluetooth is a wireless communication technology that uses 79 frequency channels centred on 2.45 GHz. Devices connect automatically, using spread spectrum frequency hopping, where communication pairs constantly change channels several times per second to minimise interference. Bluetooth supports secure wireless personal area networks (WPANs) with key encryption.

128
Q

What are the primary uses of Bluetooth?

A

Bluetooth is useful for:
- Transferring data between devices less than 30 metres apart.
- Applications where data transmission speed is not critical.
- Low bandwidth tasks (e.g., sending music files from a phone to a headset).

129
Q

How does Wi-Fi compare to Bluetooth?

A

Wi-Fi is suited for full-scale networks due to:

  • Faster data transfer rates.
  • Better range (up to 100 metres).
  • Better security. Wi-Fi uses spread spectrum technology and supports wireless access at WAPs or hotspots.
130
Q

What types of electromagnetic radiation are used in wireless communication?

A

Wireless communication uses radio waves, microwaves, or infrared. Their characteristics include:

Bandwidth: Infrared > Microwaves > Radio waves.
Penetration: Radio waves > Microwaves > Infrared.
Attenuation: Radio waves > Microwaves > Infrared.

131
Q

What is the relationship between frequency and wavelength in electromagnetic waves?

A

The relationship is given by 𝑓=𝑐/𝜆, where: 𝑓 = frequency (Hz), 𝜆 = wavelength (m), 𝑐 = speed of light (3*10⁸m/s)

132
Q

Why is infrared suitable for indoor use only?

A

Infrared has low penetration and high attenuation, meaning:

  • Signals are blocked by walls, which prevents interference.
  • Infrared is affected by rain or internal walls, limiting its range.
133
Q

Why are microwaves considered a good compromise for wireless communication?

A

Microwaves offer reasonable bandwidth, penetration, and attenuation, making them effective for many applications.

134
Q

Why can’t radio waves and microwaves transmit data globally?

A

The curvature of the Earth prevents short-distance electromagnetic waves from global data transmission.

135
Q

How does satellite technology overcome the limitations of short-distance electromagnetic waves?

A

Satellites use radio waves and microwaves for communication between antennae and satellites, enabling global data transmission through the use of different frequency bands to avoid interference.

136
Q

What is attenuation in wireless communication?

A

Attenuation refers to the reduction in amplitude of a signal, impacting its strength over distance. Radio waves have the least attenuation, making them better for long-distance transmission.

137
Q

What are the three main types of cables used in wired networks?

A

The three main types are:

  1. Twisted pair cables: Common in LANs, cheapest, low data transfer rate, most affected by external interference.
    Types: Unshielded (residential) and shielded (commercial).
  2. Coaxial cables: Common in MANs and cable TV; higher cost, better data transfer rate, less interference, but high signal attenuation.
  3. Fibre optic cables: Best for long distances, highest data transfer rate, least signal attenuation, highly resistant to interference, but expensive.
138
Q

What is the main difference between unshielded and shielded twisted pair cables?

A

Unshielded cables are used by residential users and lack protection against interference. Shielded cables have a thin metal foil jacket that reduces external interference, making them suitable for commercial use.

139
Q

What are the advantages and disadvantages of coaxial cables?

A

Advantages:

  • Better data transfer rate than twisted pair cables.
  • Less affected by external interference.
  • Excellent anti-jamming capabilities.

Disadvantages:

  • High signal attenuation.
  • Higher cost than twisted pair cables.
140
Q

How do fibre optic cables transmit data, and what are their key features?

A

Fibre optic cables transmit data using pulses of light, not electricity. Key features:

  • Best data transfer rate.
  • Minimal signal attenuation.
  • High resistance to external interference.
  • Transmission capacity is 26,000 times that of twisted pair cables.
141
Q

What are the two types of fibre optic cables, and when are they used?

A
  • Single-mode: Smaller core, less light reflection, faster and further data travel. Suitable for CATV and telecommunications.
  • Multi-mode: Larger core, more light reflections, best for short distances (e.g., LANs).
142
Q

What are the advantages of wireless networking?

A
  • Easier to expand networks without cables.
  • Increased device mobility (within range of WAPs).
  • No cable-related tripping hazards or fire risks.
143
Q

What are the disadvantages of wireless networking?

A
  • Increased chance of external interference.
  • Less secure; data can be intercepted more easily.
  • Slower data transmission rates compared to wired.
  • Signal strength can vary or be blocked by thick walls.
144
Q

What are the advantages of wired networking?

A
  • More reliable and stable connections.
  • Faster data transfer rates without dead spots.
  • Cheaper overall, despite cable installation costs.
145
Q

What are the disadvantages of wired networking?

A
  • Devices lack mobility; cables restrict placement.
  • Potential tripping hazards and overheating risks.
  • Risk of cable disconnections during cleaning.
146
Q

What additional factors should be considered when choosing between wired and wireless networking?

A
  • Wireless compatibility for mobile phones and tablets (e.g., Wi-Fi or Bluetooth).
  • Legal regulations on wireless transmission frequencies.
  • Permissions for laying underground cables.
  • Competing wireless signals in the area.
147
Q

What is a hub, and what is its function in a network?

A

A hub is a hardware device used to connect multiple devices or computers to form a LAN (e.g., a star network).

Function: Receives data packets at one port and sends them to all devices in the network.
Limitations:
Not secure for data distribution.
Wasteful of bandwidth.

148
Q

What is the difference between a hub and a switch?

A

Hub: Sends data packets to all devices in the network, regardless of destination.
Switch: Checks data packets and sends them only to the intended recipient(s) based on the destination MAC address.
Result: Switches are more secure and efficient than hubs.

149
Q

What is a MAC address, and how is it used by a switch?

A

A MAC (Media Access Control) address is a unique identifier for each device or computer on a network.

Switches use MAC addresses to identify:
- The source of the data packet.
- The destination device(s) for the data.

150
Q

A repeater amplifies signals to counteract attenuation (signal loss) over long distances.

A

A repeater amplifies signals to counteract attenuation (signal loss) over long distances.
Works on both:
- Analogue communication (copper cables).
- Digital communication (fibre optic cables).

151
Q

What is attenuation, and how do repeaters address it?

A

Attenuation is the reduction in signal strength over long distances.

Solution: Repeaters boost and amplify signals, allowing them to travel further.

152
Q

Can hubs and switches be wireless devices?

A

Yes, both hubs and switches can be either wired or wireless.

153
Q

How can repeaters be used in wireless systems?

A

Wireless repeaters boost signals to eliminate ‘dead spots’ in the Wi-Fi zone.

Plugs into electric sockets and sends out booster signals.
Non-logical devices: Boost all detected signals indiscriminately.

154
Q

What are repeating hubs, and what are their drawbacks?

A

Repeating hubs are hubs containing repeaters, boosting all signals before sending them to all devices.

Drawbacks:
- Single collision domain: Collisions are not resolved immediately, reducing performance.
- Unmanaged devices: Cannot manage delivery paths or network security.

155
Q

What is a bridge, and what is its function in a network?

A

A bridge connects one LAN to another LAN using the same protocol.

Used to:
- Connect parts of a LAN to function as a single LAN.
- Prevent flooding of networks with unnecessary traffic.
Note: Bridges are wired or wireless devices.

156
Q

What is the main difference between a bridge and a router?

A
  • Bridge: Connects LANs with the same protocol.
  • Router: Routes data between different networks and converts protocols for communication.
157
Q

What are the main roles of a router?

A
  1. Restricts broadcasts to a LAN.
  2. Acts as a default gateway.
  3. Performs protocol translation (e.g., Ethernet to Wi-Fi).
  4. Moves data between networks.
  5. Calculates the best route to a network destination.
158
Q

How do broadband routers enhance network security?

A

Broadband routers sit behind a firewall, which:

  • Protects the network’s computers.
  • Ensures data transmitted between networks - follows security protocols
159
Q

How does a router deliver data packets to the correct device in a network?

A
  1. Inspects the data packet’s destination IP address.
  2. Sends the packet to the appropriate switch.
  3. The switch delivers it using the MAC destination address.
  4. If the MAC address doesn’t match any device, the packet is passed to another switch.
160
Q

What is the primary function of a gateway in a network?

A

A gateway acts as an entrance point to another network, connecting dissimilar LANs by converting data packets from one protocol to another.

161
Q

What additional roles can gateways perform in a network?

A

Gateways can also function as routers, firewalls, or servers, allowing traffic to flow in and out of networks.

162
Q

How does a gateway differ from a router?

A
  • Gateway: Converts data packets between different protocols; serves as an entry/exit point for networks but does not support dynamic routing.
  • Router: Forwards data packets between networks and supports dynamic routing for flexible data forwarding.
163
Q

Why are modems necessary in networking?

A

Modems allow digital data to be transmitted over analogue communication channels by:

  • Converting digital data to analogue (modulation).
  • Converting received analogue data back to digital (demodulation).
164
Q

What are wireless modems, and how do they operate?

A

Wireless modems transmit data in a modulated form, enabling multiple simultaneous wireless communications without interference.

165
Q

What is the relationship between a modem and a router in a home network?

A
  • Modem: Connects to external networks (e.g., the internet).
  • Router: Creates a local network and distributes the internet connection.
    Combined devices integrate both functions into a single unit.
166
Q

What is a softmodem?

A

A softmodem (software modem) uses minimal hardware and relies on software running on the host computer, using the computer’s processor and RAM to replace traditional modem hardware.

167
Q

What are some key features of routers?

A
  1. Forward packets of data between networks.
  2. Route traffic to different networks or connect LANs to the internet.
  3. Support dynamic routing for flexible data forwarding.
168
Q

What are the limitations of gateways compared to routers?

A

Gateways do not support dynamic routing and are primarily used for protocol conversion rather than packet forwarding.

169
Q

What is the role of a Network Interface Card (NIC)?

A

A NIC allows a device to connect to a network (e.g., the internet) and frequently contains the MAC address generated during manufacturing.

170
Q

How does a Wireless Network Interface Card/Controller (WNIC) function?

A

A WNIC connects devices to the internet or networks using an antenna to communicate via microwaves. It operates in two modes:
- Infrastructure mode: Requires WAPs (Wireless Access Points) for data transfer.
- Ad hoc mode: Allows devices to connect directly without WAPs.

171
Q

What layers of the OSI model do NICs and WNICs work on?

A

They work on layers 1 (Physical Layer) and 2 (Data Link Layer).

172
Q

What is Ethernet and its IEEE designation?

A

Ethernet is a protocol used in wired LANs, also known as IEEE 802.3.

173
Q

What are the components of an Ethernet network?

A
  • Node: Any device on the LAN.
  • Medium: The path (e.g., Ethernet cable) used by LAN devices.
  • Frame: Data transmitted in frames containing source and destination MAC addresses.
174
Q

What is an IP address conflict, and how can it occur?

A

IP address conflict happens when devices on the same network are assigned the same IP address. This often occurs when dynamic IP addresses overlap with static IP addresses.

175
Q

How can IP address conflicts be resolved?

A

Restarting the router reassigns dynamic IP addresses, potentially resolving the conflict.

176
Q

What is a collision in Ethernet networks?

A

A collision occurs when two messages are sent simultaneously on the same data channel, leading to interference.

177
Q

How does Ethernet handle collisions?

A

Using Carrier Sense Multiple Access with Collision Detection (CSMA/CD):

Detects a collision by monitoring voltage changes.
Stops frame transmission and sends a ‘jam’ signal.
Waits for a random time interval before resending the frame.

178
Q

What is the function of transmission counters in CSMA/CD?

A

Transmission counters track how many collision detection routines have been entered, with a defined limit as part of the CSMA/CD protocol.

179
Q

What is bit streaming?

A

Bit streaming is a contiguous sequence of digital bits sent over the internet or a network, requiring high-speed communication (e.g., fast broadband).

180
Q

Why is data compression necessary for bit streaming?

A

Bit streaming often involves large files, such as videos, which require data compression to reduce transmission size and improve efficiency.

181
Q

What is the purpose of buffering in bit streaming?

A

Buffering ensures smooth playback by temporarily storing data and regulating the bit rate sent to the media player.

182
Q

What determines the effectiveness of a buffer in bit streaming?

A

The effectiveness is determined by the transmission rate from the server to the buffer, which must exceed the rate from the buffer to the media player.

183
Q

What are the “low water mark” and “high water mark” in buffering?

A
  • Low water mark: Minimum data threshold in the buffer.
  • High water mark: Maximum data threshold in the buffer.
184
Q

What are the advantages of bit streaming?

A
  • Immediate playback without downloading the entire file.
  • No need to store large files locally.
  • On-demand playback for videos/music.
  • No specialist hardware required.
  • Protection against piracy (harder to copy streamed files).
185
Q

What are the disadvantages of bit streaming?

A
  • Requires an active broadband connection.
  • Playback pauses if the buffer capacity or broadband speed is insufficient.
  • High bandwidth usage.
  • Security risks associated with downloads.
  • Copyright issues.
186
Q

What is on-demand bit streaming?

A

In on-demand streaming:

  1. Digital files are encoded and uploaded to a server.
  2. A link to the file is provided on a web server.
  3. Users can stream files as needed, with options to pause, rewind, or fast-forward.
187
Q

What is real-time bit streaming?

A

In real-time streaming:

  1. Events are captured live using cameras and microphones.
  2. The video signal is encoded into a streaming media file.
  3. The encoded file is uploaded to a video streaming server.
  4. The server broadcasts the live stream to the user’s device.
188
Q

What is the main difference between on-demand and real-time bit streaming?

A

On-demand: Files are pre-recorded and allow pausing, rewinding, or fast-forwarding.
Real-time: Broadcasts live events without options to pause, rewind, or fast-forward.