3.1.9-Explain why compression of data is often necessary when transmitting across a network-(Computer Science Illuminated Page 54):
Data Compression: Reducing the amount of space needed to store a piece of data.
http://en.wikipedia.org/wiki/Data_compression:
Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying marginally important information and removing it. The process of reducing the size of a data file is popularly referred to as data compression, although its formal name is source coding (coding done at the source of the data, before it is stored or transmitted).
3.1.11-Explain how data is transmitted by packet switching-Computer Science Illuminated Page 494 Packet-A unit of data sent across a network Packet Switching-The approach to network communication in which packets are individually routed to their destination then reassembled. Key Points-
Packets may take up to several different routes, so can arrive in a different order
Routers direct the packets as they move between networks
On arrival the the final destination the packets are put back into the proper order.
3.1.16-Evaluate the advantages and disadvantages of each method of network security.
3.1.5-Evaluate the use of a VPN
Refer back to VPN notes in Networks sub-section 3.14:
http://dpcsish.wikispaces.com/Network+Fundamentals
3.1.7-Explain why protocols are necessary:Computer Science Illuminated Page 495
Network Protocols
TCP/IP-TCP is Transmission Control Protocol and IP is Internet protocol.
Other Key Protocols:
3.1.8-Explain why the speed of data transmission across a network can vary
- Data Transfer Rate (Bandwidth)-The speed with which data is moved from one place to the next.
- Bandwidth is usually measured in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.).
- Latency: Term used to measure interference of network:http://compnetworking.about.com/od/speedtests/a/network_latency.htm
Possible Factors that can effect speed:http://en.wikipedia.org/wiki/Bandwidth_%28computing%29
3.1.9-Explain why compression of data is often necessary when transmitting across a network-(Computer Science Illuminated Page 54):
http://en.wikipedia.org/wiki/Data_compression:
Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying marginally important information and removing it. The process of reducing the size of a data file is popularly referred to as data compression, although its formal name is source coding (coding done at the source of the data, before it is stored or transmitted).
3.1.11-Explain how data is transmitted by packet switching-Computer Science Illuminated Page 494
Packet-A unit of data sent across a network
Packet Switching-The approach to network communication in which packets are individually routed to their destination then reassembled.
Key Points-
3.1.16-Evaluate the advantages and disadvantages of each method of network security.
Advantages & Disadvantages of each point-Please add these to the list below
Firewalls
Pros:
Cons:
Firewalls
Advantages
- Keeps unwanted traffic out
- Makes it possible to monitor
DisadvatagesAntivirus software
Advantages
- Removes virus and malware from the system
- Makes sure the system has integrity
DisadvantagesAuthentication
Advantages
- Ensures that the user accessing the data is in fact credible and allowed to access the data
- Extra layer of security on top of other systems.
DisadvantagesPolicy Agreements
Advantages
- Ensures user loyalty and requires them by law to follow the policy agreement
DisadvantagesWi-Fi-range
Advantages
- Limits the area from one can access the Wi-Fi therefore making it more secure
DisadvantagesDiffie–Hellman key exchange:
http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange