Wired and wireless networks

Cards (76)

  • What is the purpose of networking computers?
    Networking computers brings many benefits to users and enables many computing applications.
  • What does the concept of layering in networking refer to?
    Layering refers to breaking up communication into separate components or activities.
  • What is the TCP/IP model?
    The TCP/IP model is a model that describes how messages are sent over a network in layers.
  • What are the four layers of the TCP/IP model?
    1. Application layer
    2. Transport layer
    3. Network layer
    4. Link layer
  • What is the function of the application layer in networking?
    The application layer encodes or decodes a message in a form that is understood by the sender and the recipient.
  • What is the purpose of networking computers?
    Networking computers brings many benefits to users and enables many computing applications.
  • What does the transport layer do in networking?
    The transport layer breaks down the message into small chunks (packets) and manages their transmission.
  • What is encryption?
    • The process of disguising a message.
    • Makes the message unreadable to unauthorized parties.
    • Requires the use of a secret key.
  • What are unencrypted messages referred to as?
    Plaintext messages.
  • How does the transport layer help the recipient of a message?
    The transport layer provides packet numbers and the total number of packets to help the recipient assemble them in the correct order.
  • What are encrypted messages known as?
    Ciphertext messages.
  • What is the primary benefit of networking computers?
    It enables many computing applications that would not be possible without it.
  • What is the role of the network layer in networking?
    The network layer determines where a message is sent from and to by adding the sender's and recipient's IP addresses.
  • How does the Caesar cipher work?
    • Each plaintext letter is replaced by a new letter.
    • The new letter is found by shifting the original letter's position in the alphabet by a key value.
    • Example: A key value of three changes "see you tonight" to "vhh brx wrqljkw".
  • What are the two types of networks discussed?
    • Wired networks
    • Wireless networks
  • What is an IP address?
    An IP address is a unique address for each computer device on a network.
  • What is a wired network?
    A wired network is a connection that needs wires or cables to transmit data.
  • What is required to decrypt a message encrypted with the Caesar cipher?
    The process is reversed using the same key value.
  • What does the link layer do in networking?
    The link layer facilitates the transmission of a message across a network and enables the transfer of packets between nodes.
  • Where are wired networks most often used?
    They are most often used for office networks or for devices that are unlikely to move.
  • What is the purpose of networking computers?
    Networking computers brings many benefits to users and enables many computing applications.
  • What is asymmetric encryption?
    • Uses two keys: a public key and a private key.
    • The public key encrypts messages, while the private key decrypts them.
    • The private key must remain secret for security.
  • What are the key factors managed by communication protocols?
    • Transmission speed
    • Error checking
    • Methods of addressing
  • What is a wireless network?
    A wireless network uses radio waves to carry signals.
  • How does layering benefit networking standards?
    Layering allows standards to be developed and adapted to new hardware and software over time.
  • What is a protocol in the context of networking?
    A protocol is a set of rules that governs the transmission of data.
  • How does online banking utilize encryption?
    Online banking uses a public key for users to log in, while only the bank can decrypt messages with its private key.
  • What is the typical range of a wireless network signal?
    The typical range is usually up to 50 metres.
  • What does IP stand for in networking?
    IP stands for Internet Protocol.
  • How is encryption used in online communications?
    • Purchases made online are encrypted to protect credit card details.
    • Tools allow users to encrypt documents before sending them.
    • Satellite TV transmissions are encrypted to restrict access to subscribers.
  • How does the transition from IPv4 to IPv6 affect networking layers?
    The transition affects only the network layer, while the other layers remain unaffected.
  • What can block wireless signals?
    Walls can block wireless signals.
  • What is the role of algorithms in encryption?

    Algorithms are sequences of logical instructions used to encrypt messages.
  • What is a MAC address?
    A MAC address is a unique identifier assigned to each piece of hardware on a network.
  • What is the definition of an algorithm in computing?
    An algorithm is a sequence of logical instructions for carrying out a task.
  • Why is it important that improvements can be made without redefining whole communication methods in networking?
    This allows for more efficient updates and enhancements to the network without disrupting existing communication processes.
  • Why are wireless networks ideal for mobile devices?
    Because a device can connect to a network as long as it is in the range of a wireless access point (WAP).
  • What is an IP address?
    An IP address is a unique address for each computer device on a network.
  • What is the maximum transmission speed for Ethernet in wired networks?
    Up to 1 gigabit per second.
  • How is an IP address structured?
    An IP address consists of four sets of up to three digits, each with a maximum value of 255, separated by dots.