Networks Flashcards

1
Q

Advantages of networking computers

A

Communication
monitoring user activity
controlling and updating workstations
roaming
sharing information
resource sharing
software streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disadvantages of networking computers

A

Dependence - if the main server fails, every device connected to the network will also fail
Security issues
Initial installation can be expensive
Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages and disadvantages of wired networks

A

Advantages:
More secure as the network is only accessible with a physical cable connection
Less interference
Generally has faster data transfer compared to wireless networks

Disadvantages:
More time needed to install
High installation and replacement costs
Inconvenient due to many cables
More maintenance due to larger infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages and disadvantages of wireless networks

A

Advantages:
Cheap and easy to install
Multiple devices can be connected without any additional hardware

Disadvantages:
Slower compared to a wired network
Quality is disrupted due to obstructions
Security issues such as hacking - not as secure, as radio signals can be picked up by anyone
Lower bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a computer network

A

two or more devices that are connected together and can communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the different types of cabling for wired networks, including advantages and disadvantages

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe and compare common LAN topologies

A

Bus: consists of one long cable with terminators at either end. All the nodes on the network are then connected to this cable by their own separate cable
Advantages:
-cheap and easy to set up as it doesn’t require much cabling

Disadvantages:
-since all data travels along the central cable there is increased chance of data collisions which can cause a network to slow with large numbers of devices connected
-all data will travel along the main cable, meaning other nodes “see” it, presenting a security risk.
-if the main cable fails, the network will fail

Star: there is a central hub/switch, and all other devices are connected to this one device using its own cable
Advantages:
-High performing - tends to be faster than a bus network as there are fewer data collisions.
-Reliable - if one node fails then the others should continue to work.
-Secure (if a switch is used) as the data is only sent to the devices that should have access to it.

Disadvantages:
-Uses a lot of cable so is expensive to set up, and requires more expertise than a bus network.
-Requires additional hardware in the form of a hub or switch which also makes it more expensive.
-High reliance on the central hub/switch. If this fails, the network fails.
-Security issues if a hub is used, as this will send data to all nodes connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the term network protocol

A

An agreed way of communicating over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the full form, purpose and use of common network protocols including:
Ethernet
WiFi
Transmission protocols (TCP and UDP)
IP
HTTP
HTTPS
FTP
email protocols (SMTP and IMAP)

A

Ethernet: family of related protocols that deal with how data is sent along ethernet cables

Wifi: family of related protocols that deals with how data is sent through wireless connections

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol): both ensure that packets are addressed and tracked through the network, making sure they arrive at their destination safely. However, if the packet doesn’t arrive as they should, TCP ensures that it is resent correctly by the sender, whereas with UDP the packets aren’t resent. Therefore UDP is faster and used by organisations where speed > quality

IP (Internet Protocol): manages the addressing of the data packets, and is responsible for adding the sender and receiver IP addresses to each packet, as well as determining which data packets are addressed for that machine

HTTP (Hypertext Transfer Protocol): responsible for sending requests for and receiving web pages

HTTPS (Hypertext Transfer Protocol Secure): responsible for sending requests for and receiving web pages, but provides an encrypted version of HTTP for more secure web transactions

FTP (File Transfer Protocol): used to upload or download (i.e. transfer) files between computers and the internet

SMTP (Simple Mail Transfer Protocol): used by mail servers to send and receive mail from all other mail servers around the world

IMAP (Internet Message Access Protocol): controls the download/upload of emails to and from the mail server. It creates a copy of the email on the device that you have, but also leaves a copy on the mail server so that it can be viewed on other devices as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the 4-layer TCP/IP model

A

Application layer: this is where the network applications, such as web browsers or email programs, operate.
Transport layer: this layer sets up the communication between the two hosts and they agree settings such as the size of packets.
Internet layer: addresses and packages data for transmission. Routes the packets across the network.
Link layer: this is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify which protocols are used in each layer of the TCP/IP model

A

Application layer: HTTP, HTTPS, FTP, IMAP, SMTP
Transport layer: TCP/UDP
Internet Layer: IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State the similarities/differences between hubs and switches

A

Both devices are used to connect parts of a network together. Switches are intelligent devices that are able to send data packets to just the node that requires it, whereas a hub is passive, and just copies data packets to all ports it is connected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is authentication effective as a security method?

A

-can be used to prove that someone is who they say they are
-prevents unauthorised access
-commonly in the form of a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is encryption effective as a security method?

A

-turning data into an unreadable format that can only be decrypted by a key
-plain text is converted into cipher text and can only be converted back into plain text by the person with the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are firewalls effective as a security method?

A

-a piece of software that controls what information is allowed in and out of a network
-barrier between a trusted and untrusted network
-blocks unwanted data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is MAC address filtering effective as a security method?

A

-all devices with a network adapter have a MAC address, a permanent physical address that is unique to each device and cannot be changed
-using these, a network manager can choose which devices to allow to connect to the network, and filter out ones that should be blocked from access

17
Q

What is the importance of network security?

A

-hacking is occurring more often
-increasingly sophisticated ways of stealing data are being created