5 - Networks Flashcards

https://studyrocket.co.uk/revision/gcse-computer-science-aqa/written-assessment/network-protocols

1
Q

What is a computer network?

A

2 or more computers connected to each other by wired/wireless connections to allow communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some advantages of computer networks?

A

-sharing data is easier + faster
-shared peripheral hardware (printers)
-central management of security/updates/backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the disadvantages of computer networks?

A

-security issues (malware can spread faster)
-cost of setup + maintenance
-if server fails the whole network fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the main types of networks:

A

-LAN (local area), small geographical area, managed by a single person/organisation
-WAN (wide area), large geographical area (eg the Internet), collective/distributed ownership, and it usually uses encryption
-PAN (personal area), used for temporary data transmission among very localised devices with Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you connect a network?

A

-wired (twisted pair copper cable, fibre optics for higher bandwidth)
(coaxial too, but not used in networks as much now)

-wireless (Wi-Fi, Bluetooth)

LANs that use Wi-Fi are called a Wireless LAN (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why might a wireless network be worse than a wired one?

A

-sent by radio waves, which can be subject to interference (due to obstructions/other devices)
-susceptible to interception attacks from hackers
-slower (less bandwidth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give 3 advantages of wireless networks in comparison to wired networks:

A

-flexibility of expanding network to other users
-no need for drilling holes/installing cabling
-mobility of users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network topology? Describe the main types of LAN topology:

A

A given arrangement of all the elements you need for networking

bus:
-devices connected along one main backbone with 2 terminators at either end

star:
-devices connected to a central switch

The terminators stop signals being reflected back down the cable and causing interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pros and cons of a bus topology:

A

-cheap (less cabling)
-not dependent on a central switch

-if backbone is broken, network is all broken
-less secure, every computer sees the data being transferred
-doesn’t perform well under large amounts of traffic (frequent collisions of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pros of a star topology:

A

-secure, data only travels to the necessary device
-break in cable means only the device which it connected to will disconnect
-performs well under heavy traffic (no collisions)
-multiple computers can connect to server at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the downsides of using a star topology?

A

-if switch breaks, the entire network fails
-expensive (more cabling)

The first point is actually a valid answer in most cases surprisingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a node?

A

A device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a network protocol?

A

a set of rules that allow 2 devices on a network to communicate in some way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the ethernet protocols:

A

standard set of protocols used on wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the Wi-Fi protocols:

A

trademark + standard set of protocols, used for wireless data transmission on WLANs

Wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TCP, and what does it do?

A

-Transmission Control Protocol splits data into packets and rejoins them
-ensures packets arrive at the destination to provide error free transmission across a network
-connects users to the Internet

It uses acknowledgement messages from the receiving device, which tells the sending device which packets have been received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is IP and what is it responsible for?

A

-Internet Protocol is responsible for packet switching, by defining the start and destination address of each packet, so that it gets routed to the correct place
-it relays data across network boundaries

Packet switching just means routing packets across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do TCP and IP make up together?

A

-TCP/IP model (with 4 layers)
-controls communication over the Internet

Also known as the TCP/IP stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is UDP and how is it different to TCP?

A

User Datagram Protocol has a similar function to TCP but has no error checking, for lower latency

20
Q

What is UDP used for?

A

-used for sending short messages with datagrams where speed is more important than accuracy (ideal for online gaming, lower latency)
-now obsolete as it is less reliable than TCP

21
Q

What is HTTP and what does it allow the client to do?

A

-Hypertext Transfer Protocol
-allows the client to send requests for HTML web pages (to the server)

22
Q

What is HTTPS, and how does it differ from HTTP?

A

-secure version of HTTP
-has encryption and authentication protocol alongside it

23
Q

What is FTP and what is it used for?

A

-File Transfer Protocol
-allows for secure transfer of files between a client and server

24
Q

How is FTP usually used?

A

-FTP clients which are software programs that sit on top of the actual protocol
-interacting with the program generates and sends the appropriate FTP commands

25
What is SMTP and what is it used for?
-simple mail transfer protocol -used to send emails from a client machine to an email server ## Footnote Between email servers, TCP/IP stack is used
26
What is IMAP and what does it control?
-internet message access protocol -controls download/upload of emails to and from a mail server
27
How does IMAP allow for emails to be viewed from other devices?
retrieves the email on the device being used, but also leaves a copy on the mail server so it can be viewed on other devices ## Footnote this process is known as "store and forward"
28
Name the 5 types of protocols in order:
-transmission (TCP, UDP) -addressing (IP) -connection (Wi-Fi/ethernet) -email (SMTP, IMAP) -transfer (HTTP(S), FTP) (TACET)
29
Why do we need network security?
-keep sensitive data safe from cyber attacks -ensures that the network is usable and can be trusted
30
What are the 4 ways of managing a network's security? How can they be improved?
-authentication -encryption (turns info into unreadable data, only decrypted with a key) -MAC address filtering -firewall -when used in combinations it provides a network with a greater level of security
31
What does MAC address filtering do?
MAC address filtering allows/blocks devices from accessing a network based on the physical media access control address embedded within the device’s network adapter
32
What is authentication? Give some ways a user can be authenticated:
-methods to make sure a user is who they say they are, so that they are **only allowed access if they match stored information about them**, and then they are given corresponding access rights on the network -credentials, biometrics, 2FA
33
What does a firewall do? What *doesn't* it do?
-software that monitors incoming/outgoing network traffic to see if any packets are malicious -controls whether to allow/block certain packets based on a defined set of security rules -they **do not prevent virus attacks**
34
What are the 4 layers involved in the TCP/IP model?
-application -transport -internet -link (network access/interface layer) (ATIL)
35
Why is the TCP/IP model split into layers?
-decomposes complex task of networking into smaller/simpler tasks, **where each layer handles a different part of the communication** -easier to fix certain layers without affecting the others
36
What happens at the application layer, and what types of protocols are used?
-network applications (web browsers/email programs) operate here -transfer and email protocols
37
What happens at the transport layer, and what types of protocols are used?
-sets up the communication between the two hosts and agrees settings (eg language, packet size) -transmission protocols
38
What happens at the internet/network layer, and what types of protocols are used?
-addresses (adds IP to) packets for transmission -addressing (IP) protocols ## Footnote Internet layer is also known as the network layer
39
What happens at the link layer, and what soft/hardware are found here?
-data sent over the network by wired/wireless connections -network hardware (eg NIC) and OS device drivers are found here ##Footnote The drivers allow the OS to communicate with certain devices
40
What are routers responsible for?
transmitting data between devices on a network
41
What is the role of the server?
store/retrieve/send data on a network
42
What is a packet of data, and what is sent along with it?
-a block of data to be transferred over a packet-switching network -contains information like its start/destination IP address
43
How is packet switching used to send data across a network?
-sending device splits data into **numbered** packets with destination address -directed across network between routers across a path determined by current network traffic -at destination, packets are ordered to check if none are missing/corrupt -sends acknowledgement message to tell receiving device which packets were received, so packet loss can be identified ## Footnote This error checking is only used for TCP, and not UDP
44
What is the bandwidth of a network?
the maximum rate of data transfer across a network
45
Why might only using usernames and passwords be less secure in an authentication system?
-susceptible to shouldering -user might not choose a strong password, can be cracked easily -difficult to verify actual identity of the person logging in (compared to biometrics/2FA)