Networks Flashcards

1
Q

How are files separated so they can be sent across the Internet?

A

Files are separated into smaller units called packets. Each packet contains a portion of
the data, along with information that helps reassemble the packets into the original file
once they reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the device which directs packets across the Internet?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does your router have a connection to the router of the computer you are
communicating with?

A

No – packets travel through a series of routers forwarding the packet to the next router
closer to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the physical address of your computer called?

A

MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the address used to get the packets to the correct router called?

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software as a Service (SaaS)

A

subscription software delivered through the internet, usually via a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why use a Thin client

A
  1. Simpler installation/updating of software (as only done on server).
  2. Cheaper to purchase due to a lower hardware specification.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why use a Thick client

A

Applications performance will not differ depending on network strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Thin Client

A

computer where applications/programs are executed on an application server. (processes done by server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thick client

A

a computer that performs the majority of processing tasks
locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

client server

A

one computer is nominated as a central server, the rest are seen as clients. (centralized management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

peer to peer network

A

all computers have equal status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

servers and clients

A

server: A server provides services required by a client
clients: requesting device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

benefits vs negatives: client server

A
  • single point of access and failure(data stored centrally)

+easier to back up and perform updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

negatives: peer to peer network

A
  • offers less security (multiple points of weakness)
  • potential data loss (self management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

benefits:
peer to peer network

A

+ each node can request and provide to each other
+ potentially more cheaper to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Packet Switching

A

Routers switching packet destinations via the routing table to make an efficient hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

benefits: serial

A

+ cheaper and still fast
+ doesn’t suffer crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Benefits: parallel

A

+ faster since simultaneous
+ reduced latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

synchronous

A

transfer at regular intervals, receiver and transmitter (continuously) synchronized by system clock pulses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asynchronous

A

Start and stop bits to synchronize receiver and transmitter devices temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Latency

A

Time delay between data being transmitted and data arriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Baud rate

A

Rate at which signal changes (pulses/second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bit rate

A

Rate of data transmission (bits per second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bandwidth
range of signal frequencies that can be transmitted (simultaneously) through a transmission medium (Hz)
26
POP3 (Post office protocol v3)
RETRIEVES MESSAGES FROM MAIL SERVERS
27
IMAP (internet access protocol)
RETREIVES MESSAGES FROM MAIL SERVERS
28
SMTP
TRANSFERS DATA TO MAIL SERVERS
29
SSH
SSH: Used for the management, access and control, remotely. requires username/password combo and encrypts information during transmission.
30
DNS servers
translates each (URL) request into an IP address (DNL resolution) (now built into devices)
31
Network devices and their operations (3)
Hub sends to all Switch directs to specific devices Router can send between networks
32
repeaters
Repeaters boost signal: needed over long distance 🗣️
33
SSID
Display identifier for people to differentiate between networks
34
Wireless Network Adapter
Adds wireless connectivity to (laptop) device
35
Wireless access point
allows Wi-Fi devices to connect to wired network point
36
symmetric encryption
1 key for encryption and decryption
37
asymmetric encryption
2 keys (private and public). only the receiver can decrypt the data encrypted with his key
38
Hashing
irreversible mathematical process that produces a value from the input.
39
purpose of digital signatures?
confirms authentication of sender confirms preservation of the message
40
Go through: Data collision avoidance
1. Sender listens for signals and will wait until clear. If data is being sent by other nodes, it will not send. (Backs off) 2. When there is no signal present, the computer sends a RTS (Request To Send) 3. If it goes to send data at the same time as another node, then it cancels and waits for a random amount of time before checking again to see if the recipient is free. 4. The receiver (WAP in wireless networks) will send a CTS (Clear To Send) if it is ok to send. 5. The RTS/CTS signals block other transmissions. 6. Start to transmit when CTS received – otherwise wait until transmission has ended 7. Receiver sends ack (acknowledgement) after all the data has been received 8. The ack signal notifies other nodes they can transmit again
41
Port forwarding
external computers to connect to network nodes directly (greenlit by the router)
42
issues with port forwarding
internal node is immediately accessible; no longer shielded from unauthorized access
43
subnet mask
used to 'mask out' the host bits of an IP address and reveal the network to which the device belongs.
44
how do carry out masking
with a bitwise logical AND operation on the IP address and the subnet mask
45
Identifiers of a mask
- signed 32 bit number - 1s is the network part (determines number of subnets) - 0s is the host part (determines number of devices on a subnet)
46
CheckSum Error check
apply (checksum algorithm) to block of data returns "checksum" value value added to block of data/ packets and is used as a comparison
47
check digits
checks that human has input correctly 🤖
47
Parity Checking
Even parity is where each byte consists of an even number of 1s Odd parity is where each byte consists of an odd number of 1s If as odd number of bits are manipulated an error is detected
47
majority voting
parity checking but you send each bit 3x (to avoid mistakes)
48
1. Role of application layer
Applies protocols for software being used. For making requests to the server
49
2. Role of transport Layer
Establishes end to end connection and performs error detection. Packets split here.
50
3. Role of Internet Layer
Responsible for adding IP addresses of sender and recipient
51
4. Role of the Link Layer
Physical (WiFi/Ethernet) connection established and sender and recipient MAC addresses added. Routing happens here.
52
What is a Subnet? and why do we use them?
Divisions of network that prevent unnecessary congestion during shared Bandwidth.
53
What is a port?
Numerical identifier that corrects data to the right software
54
Gateway
connects protocols on different network's. Protocol conversion
55
JSON benefits over XML
Both are used to retrieve data from the web server. 1. JSON is more compact 2. JSON is faster for a computer to parse 3.JSON is easier to read for humans
56
difference between TCP and UDP
TCP establishes end-to-end connection whereas UDP doesn’t UDP is faster though
57
difference between physical and logical topology
logical: how the data flows around the net physical: cabling layout btw devices on the network
58
set of protocols for software applications to communicate with each other
API (Application Programming Interface)
59
REST
enables CRUD to be mapped onto sql, using http protocol request types and using an API
60
CRUD
create read update delete on a database application
61
Internet registries (Hierarchical organisation)
Manage ownership of domain names. Companies can have multiple Name alternatives to remembering a specific IP address.
62
FTP
Sends data to file servers
63
HTTP(S)
establishes communication with web servers (w/ encryption)
64
A socket
Ip address with a port number attached to it, assigned when the connection is agreed at the transport layer. (entry card)
65
Well known ports
Fixed port numbers used by servers