1.5

?
  • Created by: 11618
  • Created on: 31-03-19 18:07
Star
All of the computers have their own cable connecting them to a switch. A powerful computer called the server controls the network.
1 of 18
Mesh
There is no central connection point. Instead each point in the network acts as a node where information travels by hopping wirelessly from one mesh node to another. Choosing the quickest route.
2 of 18
Wifi frequency and channels
Almost all Wi-Fi installations use the 2.5GHz or 5GHz band.
3 of 18
Encryption
Used to protect data in case it has been hacked or accessed illegally. Data that is transmitted over the internet is vulnerable to hacking. Encryption makes the data unreadable unless the recipient has the necessary encryption tools.
4 of 18
Symmetric encryption
Uses a secret key which can be a combination of numbers, letters or other characters.
5 of 18
Asymmetric encryption
Uses both a public and private key which further increases data security.
6 of 18
Ethernet
A family of network protocols widely used in Local Area Networks. Ethernet systems divide data into frames, which are similar to packets. Each frame contains source and destination MAC addresses and error checking data.
7 of 18
Internet Protocol addressing
Every networked computer has a seperate, unique IP address.
8 of 18
MAC addressing
A 48-bit address that is written as 12 hex digits to make it easier for humans to work with. Each networked device in the world has a unique, unchanging MAC address.
9 of 18
TCP/IP
Consists of two separate protocols. TCP defines how messages are broken up into packets and reassembled at the destination. IP identifies the location of device on the internet and routes the individual packet.
10 of 18
HyperText Transfer Protocol
HTTP is used for accessing and receiving web pages in the form of HTML files on the internet.
11 of 18
HyperText Transfer Protocol
Encrypts the information passed between HTML files used, for example, by online shopping websites
12 of 18
File Transfer Protocol
A standard network protocol used when transferring computer files between a client and server on a computer network. FTP is based in the client server model.
13 of 18
Post Office Protocol
POP is a widespread method of receiving email. Pop creates local copies of the emails and deletes the originals from the server. This means the emails are tied to a certain device.
14 of 18
Internet Messaging Access Protocol
IMAP stores email messages on a server but allows users to view and manipulate the messages as though they were stored locally on their computer. IMAP allows a user to access the same email on multiple devices.
15 of 18
Simple Mail Transfer Protocol
SMTP is a protocol for sending email messages between servers.
16 of 18
Packet switching
When the data is broken down into packets of around 512 bytes. Packets are sent to their destination with a header containing information. This information is used to then reassemble the packets in the right order when they arrive.
17 of 18
Circuit switching
When a dedicated connection is set up between you and the computer you are connecting with.
18 of 18

Other cards in this set

Card 2

Front

Mesh

Back

There is no central connection point. Instead each point in the network acts as a node where information travels by hopping wirelessly from one mesh node to another. Choosing the quickest route.

Card 3

Front

Wifi frequency and channels

Back

Preview of the front of card 3

Card 4

Front

Encryption

Back

Preview of the front of card 4

Card 5

Front

Symmetric encryption

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »