paper 2 Flashcards

(37 cards)

1
Q

What does CSMA/CA stand for?

A

Carrier Sense Multiple Access with Collision Avoidance

It is a wireless protocol used to manage how devices communicate over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In CSMA/CA, what must the channel be before a device can send a message?

A

Idle

This means that there is no other communication taking place on the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the first step in the CSMA/CA process?

A

Listen to the frequency band

This step checks for the presence of any other signals before sending a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if a device detects an existing transmission on the channel in CSMA/CA?

A

Wait for a random amount of time

This is part of the collision avoidance strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must the sender receive after transmitting data in CSMA/CA?

A

Acknowledgement message

This verifies that the data was received successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the hidden node problem in wireless networks?

A

Interference with data transmission due to devices being out of range of each other’s broadcasts

This can lead to data collisions when multiple devices send data simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two optional methods used to alleviate the hidden node problem?

A
  • Request to Send (RTS)
  • Clear to Send (CTS)

These methods help manage communication and reduce collisions but may introduce additional overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is sent after determining the channel is idle in the RTS/CTS method?

A

Request to Send (RTS)

This signal indicates that a device wants to send data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the device send back in response to an RTS signal?

A

Clear to Send (CTS)

This reply allows the original sender to transmit its message without interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the RTS/CTS process, what happens if a CTS is not received?

A

The sender does not transmit data

This ensures that the channel remains clear for the intended transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of WiFi?

A

To enable wireless communication between devices using radio waves

WiFi revolutionised interconnecting devices without dedicated cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two most common frequencies for WiFi radio signals?

A
  • 2.4GHz
  • 5.0GHz

Each frequency has different speed capabilities and coverage ranges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a wireless access point (WAP)?

A

A device that allows devices to connect to a WiFi network

WAPs typically connect to the internet via a cabled connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when a WiFi channel becomes crowded?

A

Network speed slows down

The router can be set to another channel to alleviate the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary security concern with WiFi networks?

A

Data can be intercepted by eavesdroppers

This is due to the nature of radio wave transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does encryption do in a WiFi network?

A

Scrambles data to make it unreadable to unintended recipients

This is a key security measure for protecting data.

17
Q

What are the three main types of WiFi encryption?

A
  • WEP
  • WPA
  • WPA2

Each type offers varying levels of security.

18
Q

What does WEP stand for?

A

Wired Equivalent Privacy

WEP was designed to provide security comparable to wired networks.

19
Q

What is a key feature of WPA compared to WEP?

A

Introduces key management with a new encryption key for each data packet

This enhances security against potential intruders.

20
Q

What is the improvement of WPA2 over WPA?

A

Provides an even stronger encryption algorithm

Each message is encrypted several times based on key size.

21
Q

What is a Service Set Identifier (SSID)?

A

A string of alphanumeric characters used to differentiate wireless networks

SSIDs are case sensitive and can include spaces and underscores.

22
Q

True or false: An SSID is always broadcast for all to see.

A

TRUE

However, SSIDs can be hidden for added security, though this is not foolproof.

23
Q

What is a limitation of wired networks compared to WiFi?

A

Limited by the length of cable used

Ethernet is often restricted to cable runs of 100m due to interference.

24
Q

What is one benefit of WiFi over wired connections?

A

Allows devices to be moved wherever is convenient

This flexibility enhances network usability.

25
What is the **structure of the Internet**?
A global network of interconnected networks using common standards and protocols ## Footnote These networks are owned and managed by national governments, private companies, and academic institutions.
26
What is the **internet backbone**?
A mesh of super fast fibre-optic cables and industrial routers ## Footnote It moves data at high speeds and is primarily provided by giant telecommunication companies.
27
How do individuals and organizations connect to the Internet?
Through an **internet service provider (ISP)** ## Footnote Connections may be ADSL, fibre-optic, or via mobile technologies like 3G/4G.
28
What is a **network access device**?
A device supplied by the ISP that connects home networks to the service provider ## Footnote It typically includes an ethernet switch, wireless access point, router, and modem.
29
What is a **local area network (LAN)**?
A network covering a small geographic area, such as a home or school ## Footnote It connects users through a wireless access point or router.
30
What defines a **wide area network (WAN)**?
A network that connects multiple local area networks (LANs) ## Footnote Examples include company networks across different buildings or cities.
31
What is a **virtual private network (VPN)**?
A secure connection over the internet between sites ## Footnote It allows data to be sent as if devices were directly connected to a private network.
32
What technologies are used to connect networks to form the **internet**?
* Ethernet * ADSL * Coaxial * Fibre optics * 4G/5G * Wireless * Satellite * Undersea cable * Powerline transmission ## Footnote These connections create an interconnected global network.
33
What is the role of a **router** in networking?
To forward data packets between computer networks ## Footnote Different types of routers serve various functions in network connectivity.
34
What are **core routers**?
Routers that are part of the internet backbone with multiple high-speed interfaces ## Footnote They handle large volumes of data traffic.
35
What is the function of **edge routers**?
To link one network to another ## Footnote They serve as a bridge between different networks.
36
What are **subscriber routers**?
Routers provided to homes and small businesses ## Footnote They are low-cost devices with two interfaces for network connection.
37
What distinguishes **enterprise routers**?
They connect large businesses and ISP networks to the internet ## Footnote These routers are powerful and capable of handling high data volumes.