Save
OCR Computer Science GCSE
Computer Systems
Wired and wireless networks
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Christelle Nacino
Visit profile
Cards (76)
What is the purpose of networking computers?
Networking computers
brings many benefits to users
and
enables many computing applications.
What does the concept of layering in networking refer to?
Layering refers to
breaking up communication
into
separate components
or
activities.
What is the TCP/IP model?
The
TCP/IP
model is a model that describes how messages are sent over a
network
in
layers.
What are the four layers of the TCP/IP model?
Application
layer
Transport
layer
Network
layer
Link
layer
What is the function of the application layer in networking?
The
application
layer
encodes
or
decodes
a message in a form that is understood by the
sender
and the
recipient.
What is the purpose of networking computers?
Networking computers
brings many benefits to users
and
enables many computing applications.
What does the transport layer do in networking?
The transport layer
breaks down the message into small chunks
(
packets
) and
manages their transmission.
What is encryption?
The process of
disguising a message.
Makes the message
unreadable
to
unauthorized
parties.
Requires the use of a
secret key.
What are unencrypted messages referred to as?
Plaintext
messages.
How does the transport layer help the recipient of a message?
The transport layer provides
packet numbers
and the
total number of packets
to help the recipient
assemble
them in the
correct order.
What are encrypted messages known as?
Ciphertext
messages.
What is the primary benefit of networking computers?
It
enables
many
computing applications
that would
not
be
possible
without it.
What is the role of the network layer in networking?
The
network
layer determines where a message is sent from and to by adding the
sender's
and
recipient's
IP addresses.
How does the Caesar cipher work?
Each
plaintext
letter is replaced by a
new
letter.
The
new
letter is found by shifting the
original
letter's position in the alphabet by a
key value.
Example: A
key value
of
three
changes "
see you tonight
" to "
vhh brx wrqljkw
".
What are the two types of networks discussed?
Wired
networks
Wireless
networks
What is an IP address?
An IP address is a
unique address
for each
computer device
on a
network.
What is a wired network?
A wired network is a
connection
that needs
wires
or
cables
to
transmit data.
What is required to decrypt a message encrypted with the Caesar cipher?
The process is
reversed
using the same
key value.
What does the link layer do in networking?
The link layer
facilitates the transmission of a message across a network
and
enables the transfer of packets between nodes.
Where are wired networks most often used?
They are most often used for
office
networks or for devices that are
unlikely to move.
What is the purpose of networking computers?
Networking computers
brings many benefits to users
and
enables many computing applications.
What is asymmetric encryption?
Uses two keys: a
public
key and a
private
key.
The public key
encrypts
messages, while the private key
decrypts
them.
The private key must remain
secret
for security.
What are the key factors managed by communication protocols?
Transmission speed
Error checking
Methods of addressing
What is a wireless network?
A wireless network uses
radio waves
to
carry signals.
How does layering benefit networking standards?
Layering allows standards to be
developed
and
adapted
to
new hardware
and
software
over time.
What is a protocol in the context of networking?
A protocol is a
set of rules that governs the transmission of data.
How does online banking utilize encryption?
Online banking uses a
public key
for users to log in, while only the bank can
decrypt
messages with its
private key.
What is the typical range of a wireless network signal?
The typical range is usually up to
50
metres.
What does IP stand for in networking?
IP
stands for
Internet Protocol.
How is encryption used in online communications?
Purchases made online are
encrypted
to protect
credit card details.
Tools allow users to
encrypt documents
before sending them.
Satellite TV transmissions are encrypted to
restrict access to subscribers.
How does the transition from IPv4 to IPv6 affect networking layers?
The transition affects only the
network
layer, while the other layers remain
unaffected.
What can block wireless signals?
Walls
can block wireless signals.
What is the role of algorithms in
encryption
?

Algorithms are
sequences
of
logical
instructions used to encrypt messages.
What is a MAC address?
A MAC address is a
unique identifier
assigned to each piece of
hardware
on a network.
What is the definition of an algorithm in computing?
An algorithm is a
sequence of logical instructions
for
carrying out a task.
Why is it important that improvements can be made without redefining whole communication methods in networking?
This allows for more
efficient updates
and
enhancements
to the network without
disrupting existing communication processes.
Why are wireless networks ideal for mobile devices?
Because a device can
connect to a network
as long as it is in the range of a
wireless access point
(
WAP
).
What is an IP address?
An IP address is a
unique address
for each
computer device
on a
network.
What is the maximum transmission speed for Ethernet in wired networks?
Up to
1 gigabit per second.
How is an IP address structured?
An IP address consists of
four
sets of up to
three
digits, each with a maximum value of
255
, separated by
dots.
See all 76 cards