IP, MAC & Encryption
Watch and follow the YouTube video, the lesson contains three parts:
Key Information and content - all you need to do here is watch and listen. We recommend you take some notes for this one!
Learning activity - You are to complete the sorting and fill in the blanks activity.
Consolidation - these are past exam question and are for deliberate practice to check your understanding.
Task - Sorting & Fill in the Blanks Activity
Task - Exam Questions - Deliberate Practice
IP addresses can be changed / are allocated as needed
MAC addresses can't be changed / every device has a fixed MAC address
IP(v4) addresses are 4 bytes long
MAC addresses are 6 bytes long
IP(v4) addresses are normally written in denary
MAC addresses are normally written in Hex
IP addresses are configured by software
MAC addresses are configured in hardware
IP addresses are used for routing across a WAN/Internet
MAC addresses are only used within the LAN
Uses an algorithm to
... jumble/scramble/mix up the data / turns it into a cipher
If it is accessed it cannot be understood // it is unintelligible
Use of keys to encrypt/decrypt data