Networks Flashcards

1
Q

A network connects a number of digital devices. As well as these devices it requires:

A

-NIC/ network interface card
- Cabling or WAP/ wireless access point
- A router
- A hub or switch in some networks
- Standards and Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIC

A

Network interface card either installed or plugged into the computer. Most computers have them installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to connect a wired Vs wireless network

A

Wired: cabling
Wireless: WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Router purpose

A

Connect network to other networks like the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hub Vs Switch

A

Hub is “dumb” and sends messages down every wire

A switch has a processor which it uses to direct messages down the correct wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standards

Protocols

A

Standards - shared methods

Protocols - standards for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are internet standards/protocols enforced

A

No one enforced them but it makes sense to follow them if they want to be connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Local area network- all computers on the same site , connections privately owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Wide Area Network - a collection of LANS. That communicate with each other eg. The internet

Joins devices remotely using public infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus network type

A

One cable connects every node / device

All data is transmitted via said cable

  • cheap
  • slow
    -insecure
    -cable fail = total fail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Star network

A

Each device has it’s own cable. Seperately connected to a hub or switch which directs traffic

  • fast , large
  • greater privacy
  • more robust
  • expensive to set up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless network

A

No wired connections , every device uses a wireless adapter.
WAP at the centre , around 20m .

Devices can be portable
Every device needs an adapter
Signals could be inercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mesh network

A

Many routes through the network
No central hub

Most reliable form of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Peer to peer

A

All computers are equal

Cheap, slow , smaller capabilities/capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Client server networks

A

Server stores files for other computers (clients)

More data can be used more work can be done faster

if server has a fault the network fails
Needs technicians
Expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Client side processing

A

Work done by the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Server side processing

A

Work done by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fat client pros and cons

A
  • works even if network down
  • less strain on server
  • more capable computers needed
  • need to buy more software
  • less control of clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Thin client pros and cons

A
  • cheaper computers
  • buy less software
  • control over clients
  • relies entirely on server
  • created more traffic as constantly communicating w server
20
Q

Print server

A

Connected to a shared printer and pass files through to it

21
Q

Mail server

A

Sent messages from one client to another

22
Q

Internet server

A

Store process and deliver requested info / web pages to users

23
Q

Name 3 network threats

A
  • hackers
    -malware
  • social engineering
24
Q

Virus

A

Creates copies of itself
Not a complete file, a short bit of code
Has an effect when copied into an executable file

When run the virus is executed and does harm

25
Worm
Similar to a virus but is a complete file Hidden in storage Runs on its own and makes copies of itself
26
Trojan
Looks like a desired file When opened it infects PC with unwanted code
27
4 examples of social engineering
- tricks to get past security - get people to give you their password/ bank details - scammers and email hoaxes - phishing and pharming
28
Spam
Emails sent to you without knowledge or consent often contain marketing
29
Phishing
Fake email
30
Pharming
Fake website
31
Commercial reasons to need security
If a business exposed as having been hacked it looks bad
32
Personal reasons to n ed security
Protect private data and personal devices from harm
33
Legal reasons to have security
If a company is handling a clients sensitive data it must be secure
34
Military and political reasons to have security
Secrets from One country want to be protected from spies from it's enemy cohtty
35
Virus checker
Anti malware software on pc
36
Spam filter
Emails filtered out for suspected spam and put into separate folder
37
Firewall
Monitors incoming / outgoing network traffic and decides the wether to allow or block traffic based on a defined set of security rules Eg. Company may block certain sites
38
Packet filtering
Type of firewall feature Allows or drops data packets based on simple pre defined rules
39
Proxy server
Ensures no malware is entering network, and no sensitive data is being shared to outside entities
40
Internet
A huge mesh network based on shared protocols Data is transmitted as packets that travel from node to node (packet switching)
41
Internet adresses
Every internet connection has an IP address - a large number These numbers are mapped to more useful word based addresses (URLS) using the domain name system (DNS) Within a local network every individual device also has a MAC address set in the factory
42
WORLD WIDE WEB
not the same as the internet!!! Made up of web pages Defined using protocols: HTTP = hypertext transfer protocol HTTPS= same but SECURED
43
Internet protocols
TCP / transmission control protocol IP / Internet Protocol HTTP/ Hypertext transfer protocol FTP/ file transfer protocol
44
TCP/IP STACK
layers added in this order - application layer: added by the software in used - transport layer: split into packets w TCP - Internet layer: address added w IP - Link layer: passed through using MAC addresses They are taken off in reverse order
45
Search engines
A web crawler indexes all the pages it can reach Stores web address plus key words Use to run search engine
46
Page ranking
As well as matching key words some sites have priority: - recently updated - lots of links to them - links from high value sites They will appear higher in the search engine list of links
47
HTML
Hypertext Markup Language A declarative language Paired tags such as and are used to turn format features on and off