Topic 3 - Networks
What is the use of a VPN
A protected LAN from outside access, workers to connect to companies internal network from anywhere, more people to work from their homes, remote working also known as telecommuting
Define the term Data Packet
Anything that is suitable for use with the computer, a small unit of data used in a network communication
Why compression of data be necessary when transmitting across a network
Easier to transmit data across a network due to size or space given or connectivity limitations
Define the word Compression
Encoding information using fewer bits than the original representation
Explain what is mean by a Firewall
Hybrid of software and hardware that controls incoming and outgoing network traffic, analyses data packets pre-determined by a set of rules
What are some of the names of compressed files
Lossy, Lossless, MP3, WAV, ZIP
Describe the difference methods of network security
Making sure systems dont get hacked, breaching of information, making sure data is not stolen or leaked
Name 4 hardware components of a wireless network
NIC, radio waves,
Name 3 software components of a wireless network
OS system, protocol stack, applications
What does the acronym for the network P2P stand for
Peer to Peer
Define the term: Topology
Physical layout of a network
What are some characteristics of different transmission media
Security, reliability, cost, speed
What are the three basic types of Topologies called?
Star, Ring, Bus
Define the acronym for the network called SAN
Storage Area Network
Define the term Protocol
The format and the order of messages exchanged between two or more communicating entities.
What are the outlines for the importance of standards in the construction of a network
The role in the network, manufacturers of network products to have a common ground on which system to build, interconnecting products
Define the acronym for the network called VLAN
Virtual Local Area Network
Define the acronym for the network called (W)PAN
Wireless Personal Area Network
User ID advantages and disadvantages
access rights, user groups, id can be stolen, system bypass, intercepting messages
What are the properties of network security called
confidentiality, integrity, maintaining accuracy of data, availability, dos attacks
What are the five functions of a protocol
ensuring data integrity, manage flow control, prevent deadlock, manage congestion, perform error checking
What are the 7 layers of communication over a network
physical, data link, network, transport, session, presentation, application
Encryption Security advantages and disadvantages
strong encryption, faster computers, easy to guess passwords, encryptions are designed to have backdoors built in
Network connection speeds can vary due to
time of day, distance, provider, cable quality
Outline the advantages and disadvantages of wireless networks
uses unlicensed radio spectrum, can be set up without cabling, roaming between access points, cheaper, interference, limited range, health concerns