3.5 Flashcards

1
Q

Define Computer Network.

A

A computer network is a collection of computers linked together to facilitate communication and the sharing of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some advantages networks?(5)

A

+ Share resources like printers and scanners
+ Software can be distributed across the network rather than having to install it on each individual computer
+ All files can be backed up centrally
+ Folders and files can be stored on a file server so they can be accessed by authorised users from any computer on the network.
+ Internet connection can be shared and any authorised user on the network can use email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some disadvantages of networks?(5)

A
  • If the file server goes down, no one can access their files or do any work.
  • Network faults could lead to loss of data
  • The larger the network becomes, the more difficult it is to manage; specialist staff may be required
  • Viruses may be able to infiltrate the network and infect every computer
  • As network traffic increases, performance degrades so accessing resources may become slow.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the properties of a wired network?(3)

A

File transfer speeds are generally faster with a wired connection.
Wired connection are not obstructed by walls and ceilings if cables are laid.
Wired tethers user to a single point.
More secure than wireless because they are harder to hack into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the properties of a wireless network?(2)

A

Users can move around freely.
Generally cheaper than wired because no ethernet cables.
Easy to add new devices.
Can be obstructed through walls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a WAN?(3)

A

A Wide Area Network is a collection of computers and network connected together using resources supplied by a ‘third party carrier’ such as BT.
It uses cables, telephone lines, satellites and radio waves to connect the components which are usually spread over a wide geographical area.
WANs tend to be under collective or distributed ownership and are not necessarily owned by one organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a LAN?(3)

A

A Local Area Network usually covers a relatively small geographical area. It consists of a collection of computers and peripheral devices connected together, often on a single site.
For example, schools may use a LAN connecting the computers in the buildings across the site.
A LAN is usually owned and managed by a single person or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe a PAN?(2)

A

A Personal Area Network is a computer network used for data transmissions among devices such as computers, cell phones and laptops.
The most common kind of technology used in a wireless PAN is Bluetooth, which uses short-range radio waves over distances up to roughly 10 metres.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are routers and switches?(2)

A

A switch is a component of a LAN that knows the MAC dresses of each individual device connected to it locally. Its function is to send the packets only to the intended recipient, using its MAC address.
A router is designed to route data packets across a WAN such as the internet. Packets are passed from router to router to their destination. If a packet is routed for a computer in a LAN it will be routed to a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of a NIC?(2)

A

Network Interface Card. Required to connect any network-enabled device. It contains MAC address. Has either a wired connection using an Ethernet cable or a wireless connection.
All devices that can connect to a network have a NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purpose of a MAC address?(2)

A

Media Access Control address. Each Network Interface Card has a MAC address assigned to it. by the manufacturer. A computer may have more than one MAC address, one for wire Ethernet and one for wireless.
A MAC address is a 48-bit address written as 12 Hex numbers - the first 6 identify manufacturer, and the next 6 are unique to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of an IP address?

A

When connected to a network each device is given a unique IP address. Routes the individual packets from source to destination via routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a wireless access point?

A

Uses a radio transceiver to allow wireless connections to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a packet?

A

A small unit of data, contains a header contains:
IP address it is going to, and the IP address it has come from
Sequence number
Total number of packets in transmission
Error checking data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is packet switching?

A

Packets are usually sent to their destination along different routes, and then reassembled in the right order when they arrive. This is packet switching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the differences between Star Networks and Bus Networks?(3)

A

Bus Networks are much cheaper than Star Networks.
Bus Networks also don’t rely on a central node.
Star Networks have more consistent performance and security - data is received only by the node for which it is intended.
Star Networks are also much quicker than bus networks as more devices are added.
Star Networks are easier to manage because cable failures are hard to isolate on Bus Networks.
Star Networks continue to function if one cable fails, but in Bus Networks if one cable fails, the whole network is affected.

17
Q

What is TCP?(2)

A

Transmission Control Protocol is the standard internet protocol for sending files and documents.
It guarantees that all information will be sent to the recipient in a trade off for speed.

18
Q

What is UDP?(2)

A

User Datagram Protocol is similar to TCP, but because messages are sent in chunks instead of packets it is often faster, allowing for gaming or video calls over the internet.
UDP transmission also maintains an open connection between the sender and the recipient for the duration of communication, this two-way communication is what makes it faster.

19
Q

What is FTP?(2)

A

File Transfer Protocol governs the transmission of files across a network and the internet.
FTP uses separate control and data connections between the client and server
as

20
Q

What is SMTP?(2)

A

Simple Mail Transfer Protocol governs the sending of email messages between servers.
After they are sent to one server to another the messages can then be retrieved using IMAP.

21
Q

What is HTTP and HTTPS?(2)

A

Hypertext transfer Protocol (secure) is used for accessing and receiving web pages in the form of HTML.
HTTPS includes secure encryption of the information so that it cannot be understood if it is hacked by a hacker. Banks use HTTPS.

22
Q

What is IMAP?(2)

A

Internet Message Access Protocol governs retrieving emails from email servers.
Emails are stored on a server but IMAP allows users to view and manipulate the messages as if they were stored locally on their own computers.

23
Q

What is IP?(2)

A

The IP protocol identifies the location of a device on the Internet and routes the individual packets from source to destination via routers.

24
Q

What are the four layers of Network?(4)

A

Application layer - HTTP(S), FTP, SMTP, IMAP operate here.
Transport layer - TCP, UDP operate here.
Internet layer - IP operates here
Link layer
Internet.

25
Q

What are the functions of all of the four Network Layers?(4)

A

Application - Where network applications or user software operates.
Transport - This layer sets up the communication between the two hosts and
Internet - Adds IP addresses and routes the packets across the network. May also provide error checking.
Link - This is where the network hardware such as the NIC is located. Operating system device drivers also sit here.

26
Q

What is Ethernet?(3)

A

Ethernet refers to a family of networking rules or protocols widely used in LANs. It describes how devices should format data ready for transmission between computers on the same network.
Nodes will wait until the connection is quiet before attempting to transmit. If two nodes attempt to transmit simultaneously, they will both stop and wait a random period of time each before reattempting.
Ethernet systems divide data into frames, similar to internet packets. Each frame contains source and destination MAC addresses and error checking data.

27
Q

Describe how Authentication keeps a network secure?(3)

A

In a networked environment, many of the computers are used by more than one person. The easiest way to stop unauthorised access to your computer or files is to use a combination of a username and password.
Passwords should be ‘strong’ so they are not easy to guess, and for additional security - accounts may be locked after a certain number of failed attempts.
Forms of biometrics such as Face ID or Fingerprint ID are also used because these are obviously hard to replicate.

28
Q

Describe how Encryption keeps a network secure?(3)

A

Encryption is used to protect data and prevent it being hacked or accessed illegally. For example, people that use online shopping sites will have to type in their payment details, credit card and debit card numbers.
This information needs to be kept safe from anyone trying to intercept the transmission(hackers). Encryption can’t prevent hackers from trying, but it does make the data unreadable.
Encryption uses an Encryption Algorithm to turn plaintext into cipher text. The mathematical formula used to decrypt or encrypt is called the key.

29
Q

Describe how Firewall keeps a network secure?(2)

A

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules(which you can adjust).
Operating systems like MS Windows have firewall utilities built in but firewall software can also be bought separately.

30
Q

Describe how MAC Address Filtering keeps a network secure?(2)

A

Every computing device has a unique MAC address, and so it is possible to use MAC filtering a wireless network to determine which devices are allowed access to the network.
The weakness of this is that while is identifies the permitted devices, it can not identify which individual is using a device.

31
Q

Describe how User Access Levels keep a network secure?(2)

A

User Access Levels should be set for disks, folders and files so users can only access what they need to. At schools for example, lots of students will have Read-Only access on lots of files, where teachers may have Read-Write access.
Lots of files and folders may not even be viewable to students. The Data Protection Act stipulates that employers must keep personal data secure so setting appropriate access rights is a legal responsibility.

32
Q

What is Wi-Fi?(3)

A

Wi-fi is the name for the technology that allows electronic devices to connect to a wireless LAN(WLAN). Wi-fi devices connect to the internet via a wireless LAN and a WAP(Wireless Access Point).
The WAP receives data from a network via its physical connection, the transmitter then converts this data into radio waves which are then transmitted.
Any device on the network receives this radio signal via a Wi-Fi adaptor which allows it to communicate or download data from the data source.

33
Q

Describe how MAC Address Filtering keeps a network secure?(2)

A

Every computing device has a unique MAC address, and so it is possible to use MAC filtering a wireless network to determine which devices are allowed access to the network.
The weakness of this is that while is identifies the permitted devices, it can not identify which individual is using a device.