What does VPN stand for
Virtualized Private Network
List two types of networks.
LAN • WAN • VLAN • SAN • WLAN • Internet • Extranet • VPN • PAN • P2P
What is held in a packet?
Data
List one reason why wireless networks are advantagious.
Uses unlicensed radio spectrum – Doesn't cost anything • LANs can be set up without cabling – Doesn't take space or time to lay the cables. No extra cost on cables • WiFi can support roaming between access points – People can switch from router to router automatically depending in which connection is best • Global standards (eg. 802.11n) • Setup costs are minimal – Many types are available on the market and they are affordable
Data compression involves encoding information to use fewer bits than the original data entity.
What technology is used to encode and decode data that travels through the internet
encryption
What is a Network
A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a range of users.
Define protocol.
Set of rules for data communication over a network
What are two disadvantages of Wireless netowrks?
Interference – as the 2.4GHz spectrum is often crowded with other devices • Limited Range • WEP – this encryption is not difficult to hack and WPA2 has solved this problem • Access Points – these can be used to steal data • Health Concerns
Does Lossy compression loose data?
yes
Telecommuting
What is the difference between a LAN and a WAN?
A LAN in local in one area or home while WAN is Wide and encompasses a large area.
What does the header contain in a packet?
Destination, Original location, Time stamp.
list three hardware components of a wireless network.
Node: PC, Laptop, Tablet, Printer • Wireless network interface card • Radio waves (Bluetooth/WiFi) • Connection point: Wireless AP / Router
Define packet?
A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
What technology is used to establish and maintain a newtork connection and encapsulate that connection within some carrier protocal.
Tunnelling
What is the reason for implementing a VLAN?
to achieve scalability, security and ease of network management and can quickly adapt to changes in network requirements and relocation of workstations and server nodes.
What are two Essential functions of protocols?
Ensure data integrity • Manage flow control • Prevent deadlock • Manage congestion • Perform error checking
List the three software components of a wireless network.
Software components • Network Operating System (with drivers) • Protocol stack (TCP/IP) • Applications (Browser/File explorer)
Define packet switching.
Packet-switching describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
This type of server is simular to a VPN server, but does not feature encryption.
Proxy
What type of networks does the internet have?
it can have all types!
What are two disadvantages of radio waves?
- Unsecure
- susceptible to interference
- relatively slow
What does Wi-Fi stand for?
Wireless Fidelity
What are all the factors of authentication?
Level1 - something you know
Level2 - something you have
Level3 - something you are