Topic 3: Networks Flashcards

1
Q

LAN

A

Computer network that interconnects computers within a limited geographical area such as a building or a school.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAN

A

Computer network for interconnecting electronic devices centered on an individual person’s workspace. Bluetooth for example. Can be wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WLAN and pros/cons

A

Wireless LAN

  • Free movement
  • Less expensive
  • Less secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN

A

Network that extends over a large geographic area for the primary purpose of computer networking. The best example is the Internet.

  • Wired with fiber optic
  • Wireless by microwaves or satellite transmissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Extranet

A

Computer network that uses the Internet to allow controlled access by specific users to a specific LAN or WAN.
It can be used by an enterprise to secure part of its network and allow people from outside of the company to access to some data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intranet

A

Collection of private computer networks within a company, school, or organization.

  • It uses the TCP/IP protocol.
  • It main purpose is to facilitate the communication between individuals or work groups, and improve data sharing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAN

A

Network created so that large storage devices can be accessible from servers in a convenient and easy way.

  • Secure high speed data transfer network
  • SAN can be accessed from multiple servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Importance of standards

A

Without standards, manufacturers of networking products have no common ground on which to build their systems.

Makes communication easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hub

A

Connection point for devices on a single network, which consists of sevral ports.

  • Network devices and computer systems connect to a hub with a wire to a port.
  • The data sent to a hub is copied and sent to all the other devices attached to it.
  • The device that is expecting the data receives it, and the others just ignore the entering data.
  • This slows down a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

P2P

A

Distributed network where all the computer systems in the networks are both clients and servers at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layers of OSI model

A
Physical (physical communication)
Data Link
Network
Transport
Session
presentation
Application (virtual communication)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A

Technology that creates a safe and encrypted connection over a less secure network, such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Server

A

Can either be a computer system or a software app that provides a service to other computer systems connected to the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Client

A

Can either be a computer system or a software app that requests a service from a server connected to the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protocol

A

Set of rules for data communication over a network to enable 2 or more devices understand eachother.

Used so that both sender and receiver are using/expecting the same formats/methods, to allow data to be transmitted successfully / without errors;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protocol functions

A

Data integrity: Ensures that information has not been changed or corrupted.
Source integrity: Sender identity validated
Flow control: It ensures at which rate a node can transfer information in relation with the capability of other node to receive that information.
Congestion management: Modern networks avoids this collapses with some specifics applications.
Deadlock prevention: The protocol needs to stop both and requeue them so that they can happen sequentially.
Error Checking: Techniques used to detect noise or other impairments, while transmitting from the source to the destination. F.e. Parity bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Deadlock

A

The situation where two nodes processes are trying to access the same node at the same time. This cause that neither of them can be processed.

18
Q

Congestion

A

State where a network node or link is carrying more data than it can handle. This can cause:

  • Deterioration of server quality
  • Queuing delay
  • Frame or data packet loss
  • Blocking of new connections.
19
Q

Data packet

A

Portion of a message that is transmitted through a network. Contains data such as check digits and destination address.

  • Contains a set amount of data;
  • Contains a fixed structure: Header, Data, Trailer
  • Contains data that is to be sent via a communications channel;
  • Contains specific details for transmission.
20
Q

Parts of a data packet

A

Header: Contains instructions about the data carried by the packet (length, packet number, destination, protocol, origin…)

Payload/Data/Body: Actual data that the packet is delivering to the destination.
If a packet is fixed-length, then the payload may be padded with blank information to make it the right size

Footer/Trailer: Contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking.

21
Q

What can affect transfer speed?

A
  • Traffic: The more network traffic, the slower the data transfer on a particular connection will be
  • Time of the day
  • Distance
  • Infrastructures
  • Environmental issues (tempreature, etc)
  • Data types transmitted (large files, streaming data…)
22
Q

Bandwidth

A

Maximum rate of data transfer across a given path.

23
Q

Throughput

A

The amount of data that can be sent and received within a specific timeframe.

24
Q

Bottleneck

A

Occurs when the capacity of an application or a computer system is limited by a single component

25
Q

Goodput

A

The application-level throughput of a communication

The number of useful information bits delivered by the network to a certain destination per unit of time.

26
Q

Data compression types

A

Lossy and Lossless

27
Q

Lossy compression

A

Lossy compression permanently removes bits of data that are redundant, insignificant or unnoticeable. A file does not restore in its original form.

Suitable with graphics, audio, video and images, where the deletion of some data bits has little or no apparent effect on the illustration of the content.

Data’s quality is compromised. IRREVERSABLE

28
Q

Lossless compression

A

Allows the potential for a file to return to its original size, without the loss of a single bit of data, when the file is uncompressed. A file can be restored in its original form.

Suitable with text, images, sound. Data’s quality is no compromised. REVERSABLE

29
Q

Packet Switching

A

Method of grouping data that is transmitted over a digital network into packets.

30
Q

Characteristics of media

A

Security
Reliability
Cost
Speed

31
Q

Advantages of wireless networking

A
  • It’s free (Uses unlicensed radio spectrum)
  • Doesn’t take space or time to lay the cables and no extra cost on cable (LANs don’t need cabling)
  • Global standards
  • People can switch from router to router automatically depending in which connection is best (WiFi acn support roaming between access points)
  • Setup costs are minimal (many and affordable types in the market)
32
Q

Disadvantages of wireless networking

A
  • Interferences (spectrum is often crowded with other devices)
  • Limited range
  • Easy to hack (WEP inscription)
  • Health concerns
33
Q

Hardware components of wireless networking

A
  • Node: PC, Laptop, Tablet, Printer
  • Wireless network interface card
  • Radio waves (Bluetooth/WiFi)
  • Connection point: Wireless AP / Router
34
Q

Software components of wireless networking

A
  • Network Operating System (with drivers)
  • Protocol stack (TCP/IP)
  • Applications (Browser/File explorer)
35
Q

Types of wireless networks

A
  • WiFi
  • Wimax
  • Lte
  • 3G
36
Q

WIFI

A

• Used in laptops/mobile devices to connect wirelessly to
home network
• Most preferred network type to implement a home network
• Allows relatively slow to fast data transmissions (depending on the version)
• Backwards compatible with most older Wi-Fi standards
(a/b/g/n)
• Small transmitting radius makes it suited for homes, usually <20m

37
Q

WIMAX

A

• Designed for large distance high speed internet access
• Relatively cheap method of providing internet over a large area - suited
for poorer countries
• Rivalled by Long Term Evolution (LTE) standard
• Can be used as a form of wireless variant of DSL phone transmission lines

38
Q

3G

A
  • The primary way mobile phones access the internet today.
  • Third generation of wireless mobile telecommunications technology
  • Provides the ability to transfer voice and non-voice data, such as downloading programs, exchanging e-mails, and instant messaging.
39
Q

Wireless Networks security methods

A
Authentication
Encryption
Firewalls
MAC address control
Physical security
Antivirus
Disable SSID broadcast (security through obscurity)
40
Q

NIC

A

Network Interface card/controller is a computer hardware component that connects a computer to a computer network.

41
Q

VPN

A

When you connect to a VPN, it creates an encrypted tunnel that secures data travelling between you and the VPN server. To secure each data packet, the VPN wraps each data packet with an outer packet whish is encrypted through encapsulation.

In this way, it encrypts your internet traffic and hides your IP and virtual location. Thaks to its encryption, 3rd parties cannot spy on your online activity or access that data.