networks

Cards (138)

  • Wired networks
    Networks identified by their use of physical wiring to connect devices
  • Wired networks

    • Most often used for office networks or for devices that are unlikely to move as the cables limit the ability to move away from the connection point
  • Wireless networks
    Networks that use radio waves to carry signals
  • Wireless networks

    • Signals are limited in range - usually up to 50 metres
    • Subject to interference
    • Can be blocked by walls
    • Ideal for mobile devices as a device can connect to a network as long as it is in the range of a wireless access point (WAP)
  • Bluetooth
    A form of wireless communication that enables different devices to connect
  • Bluetooth
    • Works like a small private network between two devices, allowing them to share data and documents
    • Many modern devices incorporate Bluetooth
    • Often used to connect wireless devices such as a keyboard or a mouse to a computer, a speaker to a smartphone, a smartphone to a car's multimedia system
  • Bluetooth transmission speed
    Often only up to 2 megabits per second
  • Bluetooth provides a simple way of connecting devices
  • Bluetooth is limited in transmission speed and range
  • Encryption
    The process of disguising a message so that it cannot be understood by anyone but its intended recipient
  • Encryption
    • Requires the use of a key
    • The key is secret as to how the message has been disguised
  • Five facts about encryption

    • Encryption does not prevent someone from intercepting a message - instead it prevents them from being able to understand it
    • Unencrypted messages are referred to as plaintext messages. Encrypted messages are known as ciphertext
    • A simple method of encryption requires the use of a technique known as the Caesar cipher
    • To decrypt the message, the process is reversed
    • Although this is a good example of encryption, in real life much more complicated algorithms are used to encrypt messages
  • Protocol
    A set of rules that governs transmission of data
  • Protocols that govern addressing

    • Internet Protocol (IP) addressing
    • media access control (MAC) addressing
  • IP Addressing

    When connected to a network each device is given a unique IP address
  • IP address
    • 192.168.0.254
  • Sending a message to another node
    1. Use the recipient node's address as the destination
    2. Switch on the network knows where the node with this address is and routes the message to it accordingly
  • Static IP address

    A node given a static address always keeps the same address
  • Dynamic IP address

    A node given a dynamic address has a different address assigned to it each time it connects to the network
  • Dynamic host configuration protocol (DHCP)

    Method of assigning dynamic IP addresses
  • IPv4 allows for up to 4.3 billion addresses to be used
  • IPv4 has run out of addresses due to the huge increase in internet-enabled devices
  • IPv6
    New version with eight sets of four-digit hexadecimal values, separated by colons, greatly increasing the number of possible addresses, to around 340 trillion, trillion, trillion
  • MAC address

    Unique serial number assigned to each network interface controller (NIC)
  • MAC address

    • 1A:5B:6H:98:78:35
  • The MAC address is assigned by the NIC's manufacturer and cannot be changed
  • Other common protocols

    • TCP/IP
    • HTTP and HTTPS
    • FTP
    • SMTP
    • POP and IMAP
  • Layering
    Breaking up the sending of messages into separate components and activities, where each component handles a different part of the communication
  • TCP/IP

    Transmission Control Protocol/Internet Protocol - enables communication over the internet
  • TCP/IP model

    The model for layering in networking
  • HTTP and HTTPS
    Hypertext Transfer Protocol - governs communication between a webserver and a client. HTTPS (secure) includes secure encryption to allow transactions to be made over the internet
  • Layers in the TCP/IP model

    • Application layer
    • Transport layer
    • Network layer
    • Link layer
  • FTP
    File Transfer Protocol - governs the transmission of files across a network and the internet
  • SMTP
    Simple Mail Transfer Protocol - governs the sending of email over a network to a mail server
  • Application layer

    Encodes/decodes the message in a form that is understood by the sender and the recipient
  • POP and IMAP

    Post Office Protocol and Internet Message Access Protocol - govern retrieving emails from email servers. POP is an older implementation, largely replaced by IMAP
  • Transport layer

    Breaks down the message into small chunks (packets), gives each packet a number and the total number of packets, allows the recipient to assemble the packets in the correct order and see if any are missing
  • Network layer

    Adds the sender's IP address and that of the recipient, so the network knows where to send the message and where it came from
  • Link layer

    Enables the transfer of packets between nodes on a network, and between one network and another
  • Layering
    • Allows standards to be developed and adapted to new hardware and software over time
    • Different software packages (applications) may use the same transport, network and link layers but have their own application layer