CH4- Networks and the effects of using them Flashcards
What are Network Interface Cards?
These are needed to allow a device to connect to a network. Turns binary data into an electrical signal that allows network access. Usually integrated into the motherboard.
Each NIC is given a unique hardwired media access control (MAC) address: a number that uniquely identifies a device when connected to a network.
What are Hubs?
They are hardware devices that can have several other devices connected to them. They are used to connect devices together to form a local area network (LAN). It takes a data packet received by one of its ports and sends it to all relevant or irrelevant devices that are connected to it.
Disadvantages of hubs
- Broadcasting data to all devices is not very secure.
- Unnecessary network traffic.
What are switches?
intelligent hubs. Used to connect devices to form a LAN. Unlike hubs, the switches store the MAC addresses of all devices on a lookup table. So, it only sends data to the relevant device.
Compare hubs and switches
- Both are used to connect devices in LAN.
- Both use data packets.
- Hubs send data to every device on the network,
Switches send data to a relevant device only. - Switches have better security.
- Switches use lookup tables to determine the destination for a data packet.
What are bridges?
Devices that connect one LAN to another LAN that use the same protocol. Unlike routers, they can’t communicate with external networks, such as the Internet.
What is a router?
A device that enables data to be sent between different types of networks. It can be connected through cables or wirelessly to connect a LAN to the internet.
Uses of routers
- connecting networks and devices to the internet
- storing computer addresses
- routing data packets
How a router works
When a data packet is received, the router checks if the packet is intended for it or another network. The data packet is routed to the local switch/hub if it’s meant for its network. If not, the data packet is sent to the relevant router, which sends it to the relevant device.
They consult routing cables to know where to send the data.
Differences between routers and bridges
- Bridges connect LANs together; routers connect various types of networks together.
- Bridges scan MAC addresses while routers scan the IP addresses.
- Bridges connect networks with the same protocol; routers can connect networks with different protocols.
- The router uses routing tables to direct data packets, but bridges don’t.
- Bridges have only two ports; routers have multiple ports.
- Both send out data in the form of data packets.
What are Wi-Fi and Bluetooth used for?
Both are used for wireless communication between devices. They both use electromagnetic radiation as the carrier of data transmission.
What is Wi-Fi used for?
- Full-scale networks.
- When the data transfer rate is crucial.
- For uses where a higher range and better security are required.
What is Bluetooth used for?
- When transferring data between 2 or more devices that are very close together.
- When the speed of data transmission isn’t crucial.
- For low-bandwidth applications.
Differences between Wi-Fi and Bluetooth
- Bluetooth uses a transmission frequency of 2.4 GHz, whereas Wi-Fi uses a 2.4 – 5.0 GHz range.
- Wi-Fi has a much faster data transfer rate.
- Wi-Fi has a higher geographical range in which it is effective.
- Bluetooth only allows up to 7 devices to be connected simultaneously, whereas the number of devices connected to a Wi-Fi network depends on the router/routers used.
- Bluetooth uses key-matching encryption. However, Wi-Fi uses WPA (Wi-Fi protected access) and WEP (wireless equivalent privacy).
What is cloud computing?
This method is where data is stored on remote servers accessed online.
The three types of cloud storage are:
Public Cloud - The customer and the cloud storage provider are different companies.
Private Cloud - The customer and the cloud storage provider are a single organization.
Hybrid Cloud - Combines public and private cloud options and allows sensitive data to remain private while providing public cloud services for less sensitive information.
Cloud data is duplicated and stored on other servers to ensure availability during system failures, upgrades, and maintenance.