computer networks, connections and protocols Flashcards

(58 cards)

1
Q

what are the advantages of networking

A
  • users can share files
  • users can share peripherals
  • users can access their files from any computer on the network
  • servers can control security, software updates and backup of data
  • commutation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is LAN

A

local area network
- covers a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is WAN

A

wide area network
- covers a large geographical area, connecting LANs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the disadvantages of networking

A
  • increased security risk to data
  • malware and viruses spread quicker
  • if a server fails, the computers connected to it may not work
  • computer may run more slowly if there is a lot of data travelling on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a network

A

two or more devices that are connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a sever

A

a computer that manages and stores files, or one that provides services to other computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a client

A

a computer that relies on other computers (servers) to provide and manage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the client-server model

A

when the computers in the network are dependant on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the advantages to the client-server model

A
  • easier to manage security files
  • easier to take backups of all shared data
  • easier to install software updates to all computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the disadvantages of the client-server model

A
  • can be expensive to setup and maintain
  • requires IT specialists to maintain
  • the server is a single point of failure
  • users will lose access if the sever fails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the peer-to-peer model

A

where a peer is a computer on a network, and it is equal to all other peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does each peer in a network usually do (peer to peer model)

A
  • serve their own files
  • responsible for its own security
  • responsible for its own backup
  • usually have their own printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the advantages to the peer-to-peer model

A
  • easy to maintain
  • no need for specialist staff
  • no dependency on a single computer
  • cheaper to set up
  • no expensive hardware required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the disadvantages to the peer-to-peer model

A
  • the network is less secure
  • users will need to manage their own backup
  • can be difficult to maintain a well ordered file store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is bandwidth

A

the amount of data the can be sent and received successfully in a given time
- measured in bits per second, often called bit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is meant by transmission media

A

the media in which data signals are carried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is latency

A

the delay from transmitting data to receiving it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what factors affect the performance of networks

A
  • bandwidth
  • number of users
  • transmission media
  • error rate
  • latency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what hardware is required to connect a LAN

A
  • a NIC
  • a switch
  • a router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is NIC

A

network interface controller
- provide a method of connecting to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the most common transmission medium in modern network

A

fibre-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a switch

A

a device which sends data between computers on a LAN
- receive data in frames and transmits this data to the another device on the network using the correct MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a router

A

sends data between networks
- creates a WAN from a number of LANs
- uses IP address to route traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is the internet

A

the most widely known WAN
- simple a collection of interconnected networks across the world

21
what do web servers do
store and maintain web content which is downloaded upon request to client computers
22
what is hosting
storing files and data on a web server, the web server is referred to as a host
23
what is URL
uniform resource locator - includes the host name
24
what is a DNS
domain name servers - translates a domain name into an internet address
25
why do we use domain names
network addresses are difficult to remember so instead we use simpler domain names
26
what is the cloud
a generic term for remotely accessed storage
27
what are the advantages of the cloud
- access data at any time - access data anywhere - access from any device - large storage capacity - automatic backup - easy online collaboration
28
what is the star network topology
all devices are connected into the central switch which is intelligent and makes sure traffic only goes where it is intended
29
what is a mesh network topology
every device is connected to every other device
30
what are the different modes of connection
- ethernet - wi-fi - bluetooth
31
which topologies typically use ethernet.
star and mesh
32
what are the advantages of wireless networks
- avoids the need to install cables - portable connection
33
what are the disadvantages of wireless networks
- bandwidth is lower than a wired connection - security is more of a problem than with the wired connections
34
when is Bluetooth ideal use
when connecting personal devices
35
how are wireless networks identified
by a unique SSID
36
how do wireless networks encrypt data
by scrambling the data into cipher text using a 'master key'
37
what are MAC addresses used to do
route frames on a local area network
37
what is an IP address
a unique number which is used to address/identify a host computer or node which communicated over IP on the internet
38
what is IPv4 format
4 numbers separated by periods - 4 8 bit numbers
39
give examples of standards
- character sets - HTML (for displaying of webpages)
40
what is a protocol
a set of standards, agreed rules which allow two devices to communicate
41
what are standards
set specifications for hardware and software
42
which two protocols are used together to create the foundation of communication over the internet
- transmission control protocol (TCP) = provides an error free transmission between two routers - internet protocol (IP) = routes packets across wide area network
43
what is HTTP
hypertext transfer protocol is a way for a client and server to send and receive requests and to deliver HTML web pages
44
what is HTTPS
hypertext transfer protocol secure is effectively the same as HTTP except it adds encryption and authentication
45
what is SMTP
simple mail transfer protocol = transfers outgoing emails from one server to another / from a email client to server
46
what is POP
post office protocol = retrieves emails from a mail server and then removes it from the server and transfer it to your device
47
what is IMAP
internet message access protocol = same as POP except it keeps the email on the mail server allowing synchronicity between devices
48
what is the concept of layering
a layer is a group of protocols which have similar functions - layers breaks network connection into manageable pieces which are self-contained
49
what different forms can attacks come in
- passive attack, monitoring data travelling on a network and intercepts sensitive information - active attack, attacking a network with malware or another planned attack - brute force attack, cracking passwords through combinations - denial of service attack - trying to stop users from accessing a part of a network or website
50
what are the different types of malware actions
- deleting or modifying files - scareware - locking files - spyware - viruses - worms - trojans
51
what is social engineering
a way of gaining sensitive information or illegal access to network by influencing people
52
what is an SLQ injections
pieces of SQL typed into a website's input box which then reveals sensitive information
53
how can you counteract network security threats
- penetration testing - physical attacks - passwords - user access levels - anti-malware software - encryption