5 - Networks Flashcards

https://studyrocket.co.uk/revision/gcse-computer-science-aqa/written-assessment/network-protocols

1
Q

What is a computer network?

A

2 or more computers connected to each other by wired/wireless connections to allow communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some advantages of computer networks?

A

-sharing data is easier + faster
-shared peripheral hardware (printers)
-central management of security/updates/backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the disadvantages of computer networks?

A

-security issues (malware can spread faster)
-cost of setup + maintenance
-if server fails the whole network fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the main types of networks:

A

-LAN (local area), small geographical area, managed by a single person/organisation
-WAN (wide area), large geographical area (eg the Internet), collective/distributed ownership, and it usually uses encryption
-PAN (personal area), used for temporary data transmission among very localised devices with Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you connect a network?

A

-wired (twisted pair copper cable, fibre optics for higher bandwidth)
(coaxial too, but not used in networks as much now)

-wireless (Wi-Fi, Bluetooth)

LANs that use Wi-Fi are called a Wireless LAN (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why might a wireless network be worse than a wired one?

A

-sent by radio waves, which can be subject to interference (due to obstructions/other devices)
-susceptible to interception attacks from hackers
-slower (less bandwidth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give 3 advantages of wireless networks in comparison to wired networks:

A

-flexibility of expanding network to other users
-no need for drilling holes/installing cabling
-mobility of users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network topology? Describe the main types of LAN topology:

A

A given arrangement of all the elements you need for networking

bus:
-devices connected along one main backbone with 2 terminators at either end

star:
-devices connected to a central switch

The terminators stop signals being reflected back down the cable and causing interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pros and cons of a bus topology:

A

-cheap (less cabling)
-not dependent on a central switch

-if backbone is broken, network is all broken
-less secure, every computer sees the data being transferred
-doesn’t perform well under large amounts of traffic (frequent collisions of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pros of a star topology:

A

-secure, data only travels to the necessary device
-break in cable means only the device which it connected to will disconnect
-performs well under heavy traffic (no collisions)
-multiple computers can connect to server at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the downsides of using a star topology?

A

-if switch breaks, the entire network fails
-expensive (more cabling)

The first point is actually a valid answer in most cases surprisingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a node?

A

A device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a network protocol?

A

a set of rules that allow 2 devices on a network to communicate in some way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the ethernet protocols:

A

standard set of protocols used on wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the Wi-Fi protocols:

A

trademark + standard set of protocols, used for wireless data transmission on WLANs

Wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TCP, and what does it do?

A

-Transmission Control Protocol splits data into packets and rejoins them
-ensures packets arrive at the destination to provide error free transmission across a network
-connects users to the Internet

It uses acknowledgement messages from the receiving device, which tells the sending device which packets have been received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is IP and what is it responsible for?

A

-Internet Protocol is responsible for packet switching, by defining the start and destination address of each packet, so that it gets routed to the correct place
-it relays data across network boundaries

Packet switching just means routing packets across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do TCP and IP make up together?

A

-TCP/IP model (with 4 layers)
-controls communication over the Internet

Also known as the TCP/IP stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is UDP and how is it different to TCP?

A

User Datagram Protocol has a similar function to TCP but has no error checking, for lower latency

20
Q

What is UDP used for?

A

-used for sending short messages with datagrams where speed is more important than accuracy (ideal for online gaming, lower latency)
-now obsolete as it is less reliable than TCP

21
Q

What is HTTP and what does it allow the client to do?

A

-Hypertext Transfer Protocol
-allows the client to send requests for HTML web pages (to the server)

22
Q

What is HTTPS, and how does it differ from HTTP?

A

-secure version of HTTP
-has encryption and authentication protocol alongside it

23
Q

What is FTP and what is it used for?

A

-File Transfer Protocol
-allows for secure transfer of files between a client and server

24
Q

How is FTP usually used?

A

-FTP clients which are software programs that sit on top of the actual protocol
-interacting with the program generates and sends the appropriate FTP commands

25
Q

What is SMTP and what is it used for?

A

-simple mail transfer protocol
-used to send emails from a client machine to an email server

Between email servers, TCP/IP stack is used

26
Q

What is IMAP and what does it control?

A

-internet message access protocol
-controls download/upload of emails to and from a mail server

27
Q

How does IMAP allow for emails to be viewed from other devices?

A

retrieves the email on the device being used, but also leaves a copy on the mail server so it can be viewed on other devices

this process is known as “store and forward”

28
Q

Name the 5 types of protocols in order:

A

-transmission (TCP, UDP)
-addressing (IP)
-connection (Wi-Fi/ethernet)
-email (SMTP, IMAP)
-transfer (HTTP(S), FTP)

(TACET)

29
Q

Why do we need network security?

A

-keep sensitive data safe from cyber attacks
-ensures that the network is usable and can be trusted

30
Q

What are the 4 ways of managing a network’s security? How can they be improved?

A

-authentication
-encryption (turns info into unreadable data, only decrypted with a key)
-MAC address filtering
-firewall

-when used in combinations it provides a network with a greater level of security

31
Q

What does MAC address filtering do?

A

MAC address filtering allows/blocks devices from accessing a network based on the physical media access control address embedded within the device’s network adapter

32
Q

What is authentication? Give some ways a user can be authenticated:

A

-methods to make sure a user is who they say they are, so that they are only allowed access if they match stored information about them, and then they are given corresponding access rights on the network

-credentials, biometrics, 2FA

33
Q

What does a firewall do? What doesn’t it do?

A

-software that monitors incoming/outgoing network traffic to see if any packets are malicious
-controls whether to allow/block certain packets based on a defined set of security rules

-they do not prevent virus attacks

34
Q

What are the 4 layers involved in the TCP/IP model?

A

-application
-transport
-internet
-link (network access/interface layer)

(ATIL)

35
Q

Why is the TCP/IP model split into layers?

A

-decomposes complex task of networking into smaller/simpler tasks, where each layer handles a different part of the communication

-easier to fix certain layers without affecting the others

36
Q

What happens at the application layer, and what types of protocols are used?

A

-network applications (web browsers/email programs) operate here
-transfer and email protocols

37
Q

What happens at the transport layer, and what types of protocols are used?

A

-sets up the communication between the two hosts and agrees settings (eg language, packet size)
-transmission protocols

38
Q

What happens at the internet/network layer, and what types of protocols are used?

A

-addresses (adds IP to) packets for transmission
-addressing (IP) protocols

Internet layer is also known as the network layer

39
Q

What happens at the link layer, and what soft/hardware are found here?

A

-data sent over the network by wired/wireless connections
-network hardware (eg NIC) and OS device drivers are found here

The drivers allow the OS to communicate with certain devices

40
Q

What are routers responsible for?

A

transmitting data between devices on a network

41
Q

What is the role of the server?

A

store/retrieve/send data on a network

42
Q

What is a packet of data, and what is sent along with it?

A

-a block of data to be transferred over a packet-switching network
-contains information like its start/destination IP address

43
Q

How is packet switching used to send data across a network?

A

-sending device splits data into numbered packets with destination address
-directed across network between routers across a path determined by current network traffic

-at destination, packets are ordered to check if none are missing/corrupt
-sends acknowledgement message to tell receiving device which packets were received, so packet loss can be identified

This error checking is only used for TCP, and not UDP

44
Q

What is the bandwidth of a network?

A

the maximum rate of data transfer across a network

45
Q

Why might only using usernames and passwords be less secure in an authentication system?

A

-susceptible to shouldering
-user might not choose a strong password, can be cracked easily
-difficult to verify actual identity of the person logging in (compared to biometrics/2FA)