Networks
# Topic 3 Revision from Computer Science Cafe.
Topic 3 Key Terminology from Computer Science Cafe.
Topic 3 Video from CS Classroom.
Key Terminology
# Key Terminology
↕
Term Meaning Local Area Network (LAN) A LAN is a computer network that interconnects devices within a small geographic area, such as a single building or a campus. Virtual Local Area Network (VLAN) A VLAN is a network that logically separates devices into different broadcast domains, even though they are physically connected to the same network infrastructure. Wide Area Network (WAN) A WAN is a computer network that covers a large geographic area, such as a city, state, or country. Storage Area Network (SAN) A SAN is a specialized high-speed network that provides block-level access to data storage. Wireless Local Area Network (WLAN) A WLAN is a LAN that uses wireless communication, such as Wi-Fi, to connect devices. Internet The Internet is a global network of computers connected through the Internet Protocol (IP). Extranet An extranet is a private network that is partially accessible to authorised external parties, such as customers or partners. Virtual Private Network (VPN) A VPN is a private network that is created by using public communication infrastructure, such as the Internet. Personal Area Network (PAN) A type of computer network that is used for personal or individual use, typically covering a small area such as a home, office or small group of offices. Peer-to-Peer (P2P) A type of network architecture where each node is capable of acting as both a client and a server, allowing data to be shared directly between nodes without the need for a central server. OSI Seven Layer Model The Open Systems Interconnection (OSI) Seven Layer Model is a theoretical model that describes how data is transmitted between networked devices. The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Physical Layer The lowest layer of the OSI model, responsible for transmitting and receiving raw bitstreams over a physical medium, such as copper wire, fiber optic cable, or wireless transmission. Data Link Layer The layer responsible for the reliable transfer of data between two adjacent nodes on a network. This layer is responsible for error detection and correction, and can also manage flow control. Network Layer The layer responsible for routing data between different networks. This layer is responsible for addressing and routing data packets between networks, and can perform functions such as fragmentation and reassembly. Transport Layer The layer responsible for reliable end-to-end communication between applications running on different hosts. This layer provides services such as connection-oriented or connectionless data transmission, flow control, and error recovery. Session Layer The layer responsible for establishing, managing, and terminating communication sessions between applications. This layer manages the dialogue between applications, and can also provide services such as checkpointing and recovery. Presentation Layer The layer responsible for representing data in a format that can be understood by applications. This layer can perform functions such as data encryption and decryption, compression and decompression, and data formatting. Application Layer The highest layer of the OSI model, responsible for providing application services to users. This layer includes all the protocols and services that support applications, such as email, file transfer, and web browsing. Protocol A set of rules and guidelines that govern the communication between devices on a network. Data Packet A unit of data that is transmitted over a network. A packet typically contains a header with routing information and a payload with the actual data being transmitted. Packet Switching A method of transmitting data in which packets are sent individually over a network and reassembled at the destination. Circuit Switching A method of transmitting data in which a dedicated circuit is established between the sender and receiver. Speed of Data Transmission The rate at which data is transmitted over a network, typically measured in bits per second (bps). Data Compression A technique used to reduce the size of data being transmitted over a network, allowing for more efficient use of network resources and faster transmission times. Transmission Media The physical medium through which data is transmitted over a network. Examples include metal conductors (such as copper cables), fibre optic cables, wireless (such as Wi-Fi or WiMAX), and others. Wireless Networks A type of network that uses wireless transmission media (such as Wi-Fi or WiMAX) to connect devices, allowing them to communicate without the need for physical cables. Changes in Working Patterns Refers to shifts in the way people work, such as increased telecommuting, remote work, and flexible work arrangements. These changes have been driven by advancements in technology and the availability of high-speed Internet connectivity. WiFi A popular wireless networking standard that is used to connect devices such as computers, smartphones, and tablets to the Internet or to local networks. Worldwide Interoperability for Microwave Access (WiMAX) A wireless networking standard that provides high-speed Internet connectivity over long distances. Network Security The set of technologies, processes, and practices designed to protect a network and its associated devices from unauthorised access, use, disclosure, disruption, modification, or destruction. Encryption Types Methods used to scramble data so that it can only be decrypted and read by authorised parties. Examples include symmetric encryption, asymmetric encryption, and hash functions. Data Integrity The accuracy, completeness, and consistency of data during transmission, storage, and retrieval. Flow Control A technique used to regulate the flow of data between two devices or systems in order to prevent data loss or buffer overflow. Deadlock A situation that occurs when two or more processes or devices are waiting for each other to release resources, resulting in a standstill or system failure. Congestion A situation that occurs when a network or communication channel becomes overloaded with data traffic, resulting in slower data transmission or even data loss. Error Checking A technique used to detect errors in data transmission, storage, and retrieval. This can involve various methods, such as parity checking, checksums, or cyclic redundancy checks (CRC).
Example Problems
# Hardware
# Outline what is meant by a media access control (MAC) address. [2]
Describe the purpose of the following hardware component of a network: Router. [2]
Describe the purpose of the following hardware component of a network: Network interface card (NIC). [2]
Identify one additional hardware component in a wireless LAN. [1]
Types of Networks
# Identify two characteristics of a personal area network (PAN). [2]
Identify two differences between a wide area network (WAN) and a local area network (LAN).
[2]
Outline two advantages of a school using a computer network. [4]
Speed
# Explain why the speed of data transmission across a mobile network can vary. [3]
Explain why the speed of data transmission on the wireless network in the training room may vary. [4]
Markscheme
↕
Award [4 max]. Mark as [2] and [2].
The speed of data transmission on a wireless network can decrease as the distance between the receiver and the transmitter increases; Physical obstructions such as solid walls can interfere with the wireless signal, slowing down transmission; The available bandwidth on a wireless network is limited; As more users connect to the network, the bandwidth is shared, which can reduce transmission speeds for each user; Note to examiners: Answers must relate to wireless networks and not be a comparison between cabled and wireless networks.
Identify two factors that may affect the speed of data transmission. [2]
Protocols
# Outline why protocols are necessary. [2]
Outline one reason why protocols are used in communications between computers. [2]
Outline three reasons why protocols are necessary on a computer network. [6]
Markscheme
↕
Award [6 max] Award [1] for a reason, award [1] for an extension, x3.
Protocols define the rules for communication, ensuring devices can exchange data reliably and efficiently;For example, TCP/IP specifies how data is packaged, addressed, transmitted, and received; Protocols provide security services such as encryption and authentication to protect data during transmission;For example, HTTPS and SSL secure web traffic; Protocols include mechanisms for error checking, flow control, and congestion control to maintain data integrity and network performance;For example, error detection helps identify and correct transmission errors, while flow control prevents data loss; Outline one reason for the use of standards in the construction of networks.
OSI Model
# Identify two of the layers of the Open Systems Interconnection (OSI) seven-layer model. [2]
Security
# State one precaution a user can take to secure their data in case their laptop is stolen. [1]
Describe one method of security that may be used on this wireless network. [2]
Evaluate the use of trusted media access control (MAC) addresses as one method of network security. [4]
Describe the role of a firewall. [2]
The staff at a doctor’s practice consist of a receptionist and a doctor.
The patients’ medical records and payments, the doctor’s appointment calendar, and other important data are stored in a database on the central computer.
Outline one security measure that can be taken to prevent unauthorized access to the patients’ data stored on the central computer. [2]
VPN
# When the doctor visits a patient in their home, she needs to be able to access the patient’s medical records stored on the central computer in the practice.Outline two reasons for the use of a virtual private network (VPN) in this situation. [4]
State two technologies that are required to provide a virtual private network (VPN). [2]
Outline two features of a VPN that make it secure. [4]
Explain one benefit to the staff of using a VPN to remotely access the school network.
Markscheme
↕
Award [3 max]
Enhanced security of data; for example, using encryption;
This prevents unauthorised access;
Remote access to data and resources (from any location);
Normal access of materials on the network;
as though the user was using the network on site;
Packets
# Describe the structure of a data packet. [2]
State three pieces of information that a data packet must contain. [3]
Packet Switching
# Explain how data is transmitted by packet switching. [3]
Explain how data is transmitted by packet switching. [4]
Explain how data is transmitted using packet switching. [5]
Compression
# Outline the reason for compression when transmitting data. [2]
Markscheme
↕
Award [2 max]
The reason for compression when transmitting data is to save on transfer times;As it reduces the number of bits needed to represent data (when compared with the original data); Compressing data involves modifying/restructuring files, so that they take up less space;And this results in cost savings in cloud storage; To take up less bandwidth;Because data compression reduces the size of files to be transmitted over a network; Note to examiners: Award [1] for a reason (for example, to save data usage for sending files over the internet, to save storage capacity, to speed up file transfer, to decrease costs for network bandwidth, etc.), and award [1] for an expansion.
Explain why data compression would be used when data is transmitted. [3]
Encryption
# Define the term data encryption. [1]
Outline how encryption is used to protect data. [2]
Describe how encryption is used to protect data during transmission.
Transmission Medium
# Identify two characteristics of fibre optic cables as a transmission medium.
Identify two characteristics of wireless transmission.
Identify two reasons why fibre optic cable would be preferred over wireless connectivity.
Wireless Networks
# Distinguish between a wired network and a wireless network in terms of reliability of transmission. [4]
Outline why a wireless network may be less secure than a wired network. [2]
Identify two characteristics of wireless transmission. [2]