Topic 2 - Networks 2 Flashcards
Bandwidth:
The maximum amount of data that can be transferred between devices in a set amount of time.
Speed:
The rate at which data is transferred from one device to another.
Throughput:
The actual amount of data that successfully passes through a network.
Availability:
A measure of how often a network is accessible for use.
Error Rate:
A measure of how many errors occur in data transmission.
Jitter:
The amount of variation in data packet arrival times causing disruption in transmission.
Latency:
The delay in data transmission across a network.
Packet Loss:
A measure of data packets sent from a source but not received at the destination.
Scalability:
The ability of a network to increase or decrease capacity based on data transfer needs.
Bluetooth:
A short-range wireless technology (up to 10m) that allows data transfer between devices.
Pairing:
The process of establishing a Bluetooth connection between two devices.
ZigBee:
A wireless data transmission technology using radio waves commonly used in IoT (Internet of Things).
Base Station:
A large tower that transmits data across a cellular network.
Cellular Network:
A network composed of multiple cells, each with a base station to transmit signals for mobile phones.
OSI Model:
A theoretical model that forms the basis of many network protocols.
TCP/IP Model:
A protocol suite used to transmit data across the internet.
SIP (Session Initiation Protocol):
A protocol used for VoIP communication.
VoIP (voice over Internet protocol):
A protocol that enables voice calls over the internet.
Dynamic Host Configuration Protocol (DHCP):
A protocol that assigns IP addresses to devices when they connect to a network.
Authentication:
Security methods are used to verify a user’s identity when accessing a device or account.
Hack:
Gaining unauthorised access to data.
Malware:
Malicious software designed to harm data or devices.
Access Rights:
Restrictions on who can view or edit data.
Anti-Malware:
Software that scans, removes, or quarantines malware.
Security Settings:
User-controlled settings to manage data visibility and access.
Encryption:
A security method that scrambles data to make it unreadable without a decryption key.
Firewall:
A security system that monitors incoming and outgoing network traffic to block threats.
Physical Controls:
Security measures such as CCTV cameras and door locks to protect data and devices.