3 Networks Flashcards

(36 cards)

1
Q

Local Area Network

A

It’s a network that covers a small area, like your home, office, or school. LANs are always used in most organizations, connecting computers, printers, and other devices in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wide Area Network (WAN)

A

WANs cover large geographical areas, connecting multiple LANs across cities, countries, or even continents.
*The internet is the largest WAN in existence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Local Area Network (WLAN)

A

WLANs are like LANs that have cut the cord. They use wireless technology (usually Wi-Fi) to connect devices without the need for physical cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personal Area Network (PAN)

A

They connect devices within arm’s reach, like your smartphone, smartwatch, and wireless earbuds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual Private Network (VPN)

A

VPNs are the secret tunnels of the internet. They provide a secure, encrypted connection over a public network (usually the internet). And provide secure, private connections for remote users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Importance of Standards in Network Construction

A
  • Interoperability: Standards ensure that devices from different manufacturers can communicate seamlessly. It’s like having a universal language for technology.
  • Reliability: By following established standards, networks become more reliable and predictable in their behavior.
  • Security: Standards provide guidelines for implementing robust security measures, helping to protect networks from cyber threats.
  • Scalability: As networks grow, standards ensure they can expand smoothly without major overhauls.
  • Cost-effectiveness: Standardization leads to wider availability of compatible equipment, often resulting in lower costs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technologies Required for VPNs

A
  • Encryption
  • Tunneling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

This scrambles your data, making it unreadable to anyone who might intercept it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tunneling

A

This process encapsulates your data packets within other packets, creating a secure “tunnel” through the public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advantages of a VPN

A
  • Enables remote work and secure access to corporate networks
  • Enhances privacy and security through encryption
  • Allows bypassing of geographical restrictions
  • Provides anonymity by masking your real IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantages of a VPN

A
  • Can slow down internet speeds due to encryption overhead
  • Requires technical setup and maintenance
  • Some VPN providers may log user data
  • Not all devices or networks support VPN connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do VPNs guarantee total anonymity?

A

NO
While VPNs enhance privacy, they don’t guarantee total anonymity. Your VPN provider can still potentially see your internet activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocols

A

They’re standardized sets of rules that determine how data is transmitted, received, and processed across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Packets

A

They’re units of data transmitted over a network, containing both address and routing information, plus the actual data being sent. +IP+TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why Protocols Matter

A
  • They ensure data integrity
  • Manage flow control to prevent network congestion
  • Provide error checking to identify and correct transmission errors
  • Offer built-in security features
    Enable compatibility between different devices and systems
  • Without protocols, network communication would be like a conversation where everyone speaks a different language and follows different social norms - chaos!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Factors Affecting Data Transmission Speed

A
  1. Network Traffic: Just like rush hour on the roads, networks can get congested.
  2. Time of Day: Internet usage often peaks during certain hours, affecting speeds.
  3. Distance: The further data has to travel, the longer it takes.
  4. Hardware Limitations: Outdated or overloaded equipment can slow things down.
  5. Packet Loss: Sometimes data packets get lost in transmission and need to be resent.
  6. Network Topology: The structure of the network can impact data flow.
17
Q

Reasons for compressing data

A
  • Faster Transmission: Smaller data sizes mean quicker transfers.
  • Reduced Storage Requirements: Compressed data takes up less space.
  • Efficient Bandwidth Usage: Compression allows more data to be sent using the same bandwidth.
18
Q

Lossless Compression

A

Reduces file size without losing any data quality (great for text and critical data).

19
Q

Lossy Compression

A

Achieves greater size reduction by discarding some data (commonly used for images, audio, and video).

20
Q

Wired Media

A
  1. Copper cables (Ethernet)
  2. Fiber Optic: Uses light to transmit data, offering high speeds over long distances.
  3. Coaxial Cable: Have a central core and shielding, offer higher bandwidth and are better protected from interference, making them suitable for longer distances and high-speed data transmission like cable TV and internet connections
21
Q

Wireless Media

A

Wi-fi
Infrared
Bluetooth
Satellite

22
Q

Things to consider when using wireless media

A
  • Security: How vulnerable is the medium to interception?
  • Reliability: How consistent and error-free is the transmission?
  • Cost: What are the installation and maintenance expenses?
  • Speed: How quickly can data be transmitted?
23
Q

Packet Switching

A
  1. Fragmentation: Large data is broken into smaller packets.
  2. Routing: Each packet is sent independently, potentially taking different paths to the destination.
  3. Reassembly: The packets are put back together at the destination in the correct order.
24
Q

Advantages of Wireless Networks

A
  • No need for physical cables, offering flexibility and mobility
  • Easy to set up and expand
  • Cost-effective for covering large areas
  • Compatible with a wide range of devices
25
Disadvantages of Wireless Networks
* Limited range compared to wired networks * More susceptible to interference and security risks * Generally slower than wired connections * Can be affected by physical obstacles
26
Hardware Components of a Wireless Network
* Nodes (client devices like laptops, smartphones) * Wireless Router or Access Point * Antennas for transmitting and receiving signals * Network Interface Cards (NICs) in devices
27
Software Components of a Wireless Network
* Network Operating System * Device Drivers * Network Protocols (like TCP/IP) * Applications that use the network (web browsers, email clients, etc.)
28
Network Security Strategies
1. Authentication: Verifying the identity of users and devices 2. Firewalls: Monitoring and controlling incoming and outgoing network traffic 3. Encryption: Scrambling data to make it unreadable without the proper key 4. MAC Address Filtering: Allowing only specific devices to connect to the network 5. Physical Security: Protecting network hardware from unauthorized access 6. Wireless Security Protocols: Standards like WPA3 for securing wireless networks
29
Authentication pro and con
Pros: Prevents unauthorized access Cons: Can be bypassed if credentials are stolen
30
Firewalls pros and cons
Pros: Provides a barrier against many types of attacks Cons: May block legitimate traffic if not configured correctly
31
Firewall
Controls and monitors incoming and outgoing network traffic based on a defined set of security rules
32
Encryption pros and cons
Pros: Makes data unreadable to interceptors Cons: Can slow down network performance
33
Latency
The latency of a network connection represents the amount of time required for data to travel between the sender and receiver.
34
Data integrity
In the context of networking, refers to the overall completeness, accuracy and consistency of data.
35
Ways for Authentication
- One Factor - One way (something you know) - Examples - password, security question, or PIN code - Two Factor - Two ways (something you know, something you have) - Examples - smartphone, smart card, hardware token, in addition to first factor - Three factor - Three ways (something you know, something you have, something you are - Examples - fingerprint, retinal scan, facial recognition, in addition to first two factors
36