1.3.3 - networks Flashcards

chapter 21

1
Q

network

A

Two or more computers connected together to share info or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 advantages of using a network

A

1- Users can share files.
2- Users can share resources like peripherals and Internet connection.
3- Users can access files from any computer on the network.
4- Servers can control security, software updates and backup of data.
5- Communication like email and social networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 disadvantages of using a network

A

1- Increased security risks to data.
2- Malware and viruses spread very easily between computers.
3- If a server fails, the computers connected to it may not work.
4- Computers may run slower if there is a lot of data travelling on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

standards

A

A set of hardware and software specifications that allow manufacturers to create products and services that are compatible with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocol

A

A set of rules defining common methods of data communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

transmission control protocol (TCP)

A

Provides error-free transmission between 2 routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

internet protocol (IP)

A

Routes packets across a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

user datagram protocol (UDP)

A

Uses a simple, connectionless transmission mode. Has no error checking and is used to send short messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hypertext transfer protocol (HTTP)

A

A way for a client and server to send, receive, request and deliver HTML web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes HTTPS special?

A

Added encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file transfer protocol (FTP)

A

Used for sending files between computers, typically over a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

simple mail transfer protocol (SMTP)

A

Used to send emails and forward them from mail servers to their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

post office protocol (POP)

A

Downloads email stored on a remote server to a local client, removing it from the server in the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

internet message access protocol

A

Manages emails on a server so multiple clients can access the same email account in synchronicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

modem

A

Transforms digital info from computer into analogue signals that can be transmitted through wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

router

A

Routes data between devices on a network and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3 main types of wired connections

A
  • twisted pair
  • coaxial
  • fibre optic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are twisted pair cables made up of?

A

A pair of insulated copper wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

advantage of twisted pair cables

A

More affordable than other options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

disadvantages of twisted pair cables

A
  • Can be affected by noise from external magnetic fields.
  • Can only provide low bandwidth.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

uses of twisted pair cables

A
  • telephone networks
  • data networks
  • cable shielding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are coaxial cables made up of?

A

Made up of 4 cylindrical components:
1- a solid conductor wire
2- a layer of insulation
3- a grounding conductor wire
4- a layer of exterior insulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

uses of coaxial cables

A
  • computer network connections
  • digital audio
  • cable television
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are fibre optic cables made up of?

A

Very thin optical fibres made of glass or plastic that are bundles together in a single cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why do fibre optic cables have the highest noise immunity?
The light rays are unaffected by electrical noise;
26
Uses of fibre optic cables.
- long distance connections - data centres
27
network interface controller (NIC)
Convert data signals from nodes into date signals that can be transferred across the network.
28
wireless access point (WAP)
A device that creates a wireless LAN by connecting to a wired router, switch or hub using an Ethernet cable and projects a Wi-Fi signal within a designated area.
29
hub
A device that connects multiple nodes together on one network. It broadcasts any transmissions it receives to all other connected devices even if it is not meant for them.
30
switch
A device that connects multiple devices together on a network. Has software installed on it to inspect transmissions and route them to the correct device, keeping unnecessary traffic to a minimum.
31
definition of the internet
A network of networks set up to allow computers to communicate with each other globally.
32
world wide web
A collection of web pages that are stored on computers connected to the internet. It uses the internet as a service to communicate the info contained within these pages.
33
Internet Service Providers (ISP)
Connect directly to backbone cables and distribute the internet connection to smaller providers who in turn, provide access to individual businesses and homes.
34
uniform resource locator (url)
The full address of an internet resource.
35
internet registrars
Hold records of all existing website names and the details of those domains that are currently available to purchase.
36
domain name
Identifies the area or domain name that an Internet resource resides in.
37
layering in protocols
Divides the complex task of networking into smaller, simpler tasks that work in tandem with each other. The hardware/software for each layer has a defined responsibility, and each one provides a service to the layer above it.
38
3 advantages of layering in protocols
1- Reduces a complex problem into smaller sub-problems. 2- Devices can be manufactured to operate at a particular layer. 3- Products from different vendors will work together.
39
4 layers of the TCP/IP stack
1- link 2- network 3- transport 4- application
40
application layer of the TCP/IP stack
Used to provide services for applications that want to communicate across a network. Specifies the rules of what should be sent.
41
transport layer of the TCP/IP stack
Uses the TCP as well as other conversion protocols like UDP to establish an end-to-end connections with the recipient computer. It splits the data into packets and adds the following info to them sequentially: 1- its number/ sequence 2- the total number of packets 3- the port number that the packet should use
42
network layer of the TCP/IP stack
Uses the IP to address packets with: - Source IP address - Destination IP address
43
link layer of the TCP/IP stack
Represents the actual physical connection between network devices. It is responsible for adding the unique MAC address of the source and destination device to the header.
44
circuit switching
Creates a direct link between two devices for the duration of the communication.
45
disadvantages of circuit switching
1- bandwidth is wasted during the periods when no data is being sent 2- can only connect devices that operate at the same transfer rate 3- electrical interference may corrupt data if the path is used to transfer data.
46
advantage of circuit switching
Packets arrive in the same order that they were sent, simplifying the process of reconstructing the message at the recipient end.
47
packet switching
A method of communicating packets of data across a network on which other similar communications are happening simultaneously.
48
How is data corruption checked for in data packets?
The Cyclical Redundancy Check (CRC) is recalculated for each packet upon receipt and matched to ensure that the payload data has not changed during transmission.
49
Time to live/ hop limit
After this point, the data packet expires and is discarded.
50
When is a gateway used instead of a router?
When protocols differ between networks, a gateway is used to translate between them.
51
firewall
A security checkpoint designed to prevent unauthorised access between 2 networks.
52
How does a typical firewall work?
Consists of a separate computer containing 2 Network Interface Cards, with one connected to the internal network and one connected to the external network. Using special software, each packet that attempts to pass between the 2 NICs is analysed against packet filters, then accepted or rejected.
53
packet filtering/ static filtering
Controls network access according to network administrator rules and policies by examining the source and destination IP addresses. If they match those on the administrator's 'permitted' list, they are accepted. Can also block packets based on the protocols being used and the port number they are trying to access.
54
proxy server
Intercepts all packets entering and leaving a network, hiding the true network addresses of the source from the recipient. This enables privacy and anonymous surfing.
55
What is a use of a proxy server?
Proxy servers are often used to filter requests providing administrative control over the content that users may demand.
56
3 types of malware
- worms - trojans - viruses
57
viruses
Rely on other host files to be opened in order to spread themselves. Once it is in memory, any other uninfected file that runs becomes infected when it is copied into memory.
58
worms
Standalone software that can replicate itself without any user intervention. Can send copies to other users from your computer.
59
macro viruses
Reside in macro files usually attached to word processing and spreadsheet data files. When the data file is opened, the virus spreads to infect the template and subsequently other files that you create.
60
trojans
A type of malware that downloads onto a computer disguised as a legitimate program. A common use for a Irojan is to open a back door to your computer system that the Trojan creator can exploit. This can be in order to harvest your personal information, or to use your computer power and network bandwidth to send thousands of spam emails to others.
61
examples of system vulnerabilities
- people may switch off firewalls - failure to renew virus protection - cracks in software - administrative rights - people
62
buffer overflow
Occurs when a program accidentally writes values to memory locations too small to handle them, and inadvertently overwrites the values in neighbouring locations that t is not supposed to have access to.
63
buffer overflow attack
The virus could force the program to write something to memory which may consequently alter its behaviour in a way that benefits the attacker.
64
ways to protect against malware threats
1- high quality code 2- spam filtering 3- education 4- regular OS updates 5- regular antivirus software updates
65
client-server network
One or more computers called clients are connected to a powerful central computer known as the server. each client can store some of its own files and resources and also access those held by the server.
66
3 advantages of a client-server network
- Easier to manage file security - Easier to back up shared data - Easier to install software, updates to all computers - Data and other resources can be shared
67
4 disadvantages of a client-server network
- Can be expensive to set up and maintain - Requires IT specialists to maintain - The server is a single point of failure - Users will lose network access if the server fails.
68
cloud computing
Provides access to software or files via the Internet using the client-server model.
69
peer-to-peer networks
No central server. Individual computers are connected to each other so they can share files.
70
5 advantages of peer-to-peer networks
1- cheap to set up 2- specialist staff not required 3- no single point of failure 4- no expensive hardware 5- easy to maintain
71
3 disadvantages of peer-to-peer networks
* The network is less secure * Users will need to manage their own backups * Can be difficult to maintain a well-ordered file store