Networks Flashcards

(62 cards)

1
Q

LAN (local area network)

A

A network covering a small geographic area, like a home, school, or office, where devices are connected directly.
🧠 Example: School computers connected to the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual local area network (VLAN)

A

A logical subdivision of a LAN that groups devices into separate virtual networks even if they’re on the same physical infrastructure.
🧠 Example: Separating teacher and student devices on the same school network using VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wide area network (WAN)

A

A network that covers a large geographic area and connects multiple LANs using routers and public lines.
🧠 Example: A multinational company’s offices connected across continents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Storage area network (SAN)

A

A specialized high-speed network that provides access to centralized data storage.
🧠 Example: A data center where servers access shared storage through a SAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless local area network (WLAN)

A

A LAN that allows devices to connect wirelessly via radio signals, typically Wi-Fi.
🧠 Example: Home Wi-Fi connecting your laptop, phone, and smart TV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet

A

The internet is a global network that connects millions of computers and other devices so they can share data and communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extranet

A

A private network that allows authorized external users to access parts of a company’s internal system.
🧠 Example: A supplier accessing a retail company’s inventory system to manage stock levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual private network (VPN)

A

A secure, encrypted connection over a public network that provides privacy and safe data transfer.
🧠 Example: An employee working from home using a VPN to access their company’s internal system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Personal area network (PAN)

A

A very small network used for personal devices within close range.
🧠 Example: A Bluetooth connection between a smartphone and wireless earbuds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Peer-to-peer(P2P)

A

A network model where all devices (peers) are equal and share resources without a central server.
🧠 Example: Torrenting files using software like BitTorrent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standards

A

Agreed rules that ensure devices and systems can communicate and operate together on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI seven layer model

A

A conceptual model that divides the communication process into seven layers, from hardware to user-facing applications.
🧠 Example: Sending a message over WhatsApp involves all seven OSI layers from physical transmission to app-level display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evaluate the use of a VPN

A

A VPN (Virtual Private Network) allows users to create a secure, encrypted connection over a public network such as the internet. It is commonly used to protect privacy, access restricted resources, and work remotely.

Advantages: Data security and privacy, remote access, bypassing restrictions
Disadvantages: Reduced speed, reliability and trust, compatibility issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protocol

A

A set of rules that defines how data is formatted, transmitted, and received over a network.
Analogy: With driving, there is a driving protocol, such that “right of way” prevents deadlocks and congestions
🧠 Example: HTTP for web browsing, TCP/IP for general internet communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data packet

A

A small unit of data sent across a network, which includes payload (the actual data) plus control information like destination address and error checking.
🧠 Example: A file sent over the internet is broken into multiple packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data integrity

A

Ensures that data is not altered or corrupted during transmission — the data received is exactly the same as what was sent.
🧠 Example: Using checksums or hashing to verify a file wasn’t changed during download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Flow control

A

A technique that manages the rate of data transmission between sender and receiver to prevent overwhelming the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Deadlock

A

A state in a network where two or more processes are waiting for each other to release resources, causing all to stop.
🧠 Example: Two devices waiting to send data, but each is waiting for the other to respond first — nothing moves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Congestion

A

Occurs when too much data is sent through a network at once, leading to packet loss, delays, or decreased performance.
🧠 Example: A video call lagging because many users are streaming or downloading large files at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Error checking

A

Error checking is a process where a small value (like a parity bit, checksum, or hash function) is added to data to detect changes during transmission or storage. The receiver recalculates the value and compares it; if it matches, the data is likely correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain why the speed of data transmissions across a network can vary

A

Network congestion: When too many devices are using the network at once, it can cause delays or packet loss.
Distance: Longer physical distances between sender and receiver can increase latency, especially over WANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Compression of data

A

The process of reducing the size of data files so that they take up less space and can be transmitted more quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain why compression of data is often necessary when transmitting across a network

A

Speeds up transmission — less data = faster delivery, especially on slower or congested networks
Lowers cost — especially for mobile data or cloud storage providers that charge by usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bandwidth

A

The maximum amount of data that can be transmitted over a network in a given amount of time, usually measured in bits per second (bps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Transmission media
Transmission media are the physical or wireless pathways used to transmit data between devices in a network.
26
Transmission media types
metal conductor (inexpensive but slow), fibre optic (high speed but expensive), wireless/radio waves (convenient but security risks)
27
Characterstics of different transmission media
speed, reliability, cost and security
28
Explain how data is transmitted by packet switching
Packet switching is a method of transmitting data over a network by breaking it into small packets, which are sent independently and can take different routes to reach the destination, where they are reassembled into the original message.
29
Wirelss network
A wireless network allows devices to connect and communicate without physical cables, using radio waves (such as Wi-Fi or Bluetooth).
30
Advantages of wireless networks
Mobility, easy installation, supports many devices, convenient
31
Disadvantages of wireless networks
Slow speed, signal interference (from walls, etc), security risks, limited range
32
Describe hardware components of wireless networks
Wireless router, Wireless network interface card (NIC), Access points (APs), Modem
33
Describe the software components of wireless networks
Protocols, Network operating system (NOS), Security software
34
Describe the characteristics of wireless networks
WiFi, Worldwide interoperability for Microwave access, 3G mobile, future networks, connectivity between different locations
35
Encryption
Converts data into unreadable form to protect it during transmission. ✅ Advantages: Secures data from unauthorized access during transmission Protects sensitive information even if intercepted ❌ Disadvantages: Requires processing power, which may slow performance If encryption keys are lost or stolen, data can be exposed
36
UserID (method of network security)
Requires a user to log in with a username and password. ✅ Advantages: Helps control access to network resources Allows for individual tracking and auditing of user activity ❌ Disadvantages: Can be guessed or stolen if passwords are weak or reused Does not protect against users inside the network who misuse access
37
Trusted MAC (media access control) address (method of network security)
Allows only devices with approved MAC addresses to connect to the network. ✅ Advantages: Blocks unauthorized devices from connecting Works automatically — no login required by the user ❌ Disadvantages: MAC addresses can be spoofed (faked by attackers) Requires manual management — not practical for large networks
38
What are the layers in the OSI model? (Name at least 2)
1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data Link 7. Physical
39
Physical Layer (1)
The layer that transmits raw binary data over physical mediums like cables or radio waves.
40
Data Link Layer (2)
The layer that ensures error-free data transfer between two directly connected devices using MAC addresses.
41
Network Layer (3)
The layer that routes data between devices on different networks using IP addresses.
42
Transport Layer (4)
The layer that provides reliable data transfer, error correction, and flow control between host systems (e.g., TCP/UDP).
43
Session Layer (5)
The layer that manages, opens, and closes sessions between applications on different devices.
44
Presentation Layer (6)
The layer that translates, encrypts, and compresses data to ensure it's readable by the receiving system.
45
Application Layer (7)
The layer that provides network services directly to user applications (like email, file transfer, or web browsing).
46
Protocol vs standards
🔁 Protocol = specific rules for communication 📏 Standard = official guide that defines those rules (and more) so everyone can follow the same system
47
Circuit switching
Circuit switching is a method of communication where a dedicated path is established between two devices for the entire duration of a session, ensuring data follows the same route in order. It's like a traditional phone call — the line stays open the whole time, even during silence, providing consistent quality but using resources inefficiently.
48
HTTPS - Hypertext Transfer Protocol Secure
This is the secure version of the protocol used to load websites. It makes sure the information you send or receive (like passwords or credit card numbers) is encrypted, so no one can read it if they intercept it. Used in almost all modern websites (you’ll see the 🔒 lock icon in your browser).
49
SFTP - Secure File Transfer Protocol
A protocol that lets you safely send and receive files over the internet. It uses something called SSH (Secure Shell) to encrypt everything, so your files can’t be read or stolen while being transferred between computers.
50
TCP/IP - Transfer Control Protocol / Internet Protocol
This is actually a set of rules that runs the internet: IP (Internet Protocol) decides where data should go — like an address on an envelope. TCP (Transmission Control Protocol) makes sure all the data arrives, in the right order, without anything missing. Together, they’re like the postal system of the internet — delivering data to the right place safely and correctly.
51
HTTP - Hypertext Transfer Protocol
This is the basic rule that lets you load websites. It tells your browser how to ask a server for pages, images, videos, etc. Unlike HTTPS, HTTP does not protect your data — it’s like sending a postcard that anyone can read.
52
SNMP - Simple Network Management Protocol
Used by IT people to monitor and manage devices on a network (like printers, switches, routers). It can check if devices are working, report problems, or update settings — like a remote control panel for network stuff.
53
ICMP - Internet Control Message Protocol
A helper protocol used by computers and routers to send error messages or updates about what’s happening on the network. For example, when you use the “ping” command to see if a website is reachable, ICMP is what sends the reply back.
54
Code Obfuscation (method of network security)
Code obfuscation is the process of making source code intentionally difficult to read or understand without changing its function. Purpose: Protects intellectual property Prevents reverse engineering Secures sensitive logic ✅ Advantages: Increases code security Hides implementation details ❌ Disadvantages: Hard to debug or maintain May reduce performance Doesn't fully stop decompilation
55
Blacklisting (method of network security)
Blacklisting is a security method that blocks specific entities, such as IP addresses, users, websites, or applications that are known to be harmful or untrusted. Purpose: Prevents access to known threats Used in firewalls, email filters, web browsers, etc. ✅ Advantages: Easy to implement Efficient against known malicious sources ❌ Disadvantages: Cannot stop unknown/new threats Needs constant updating Can result in false positives
56
Whitelisting (method of network security)
Whitelisting is a security approach that only allows approved entities (like IP addresses, users, apps, or websites) to access a system or network. Everything else is blocked by default. Purpose: Ensures that only trusted sources are allowed Common in application control, email filtering, and network access control ✅ Advantages: Strong protection against unknown threats Reduces attack surface significantly ❌ Disadvantages: Requires careful setup and maintenance Can block legitimate access if not updated Less flexible than blacklisting
57
Firewalls (method of network security)
A firewall is a security system (hardware, software, or both) that monitors and controls network traffic based on predefined rules to block unauthorized access. Purpose: Acts as a barrier between trusted and untrusted networks Filters incoming and outgoing data packets Can allow, block, or limit traffic based on IP, port, or protocol ✅ Advantages: Prevents unauthorized access Protects against common network threats Can enforce security policies ❌ Disadvantages: Doesn’t protect against threats inside the network Can be bypassed if misconfigured May slow down traffic if overused
58
Asymmetric Encryption (encryption types)
Asymmetric encryption uses two keys: a public key to encrypt data and a private key to decrypt it. The keys are mathematically linked, but one cannot be used to derive the other. How it works: The sender encrypts data using the recipient’s public key Only the recipient’s private key can decrypt it The private key is kept secret; the public key is shared openly ✅ Advantages: No need to share a secret key Enables secure communication over insecure channels Used in digital signatures and SSL/TLS ❌ Disadvantages: Slower than symmetric encryption More computationally intensive
59
Tunnelling
Tunnelling is a method used to send data securely across a network by encapsulating it inside another data packet. It allows private network communications to be sent over public networks like the internet, often used in VPNs to protect data through encryption.
60
Router
A router is a networking device that forwards data packets between different computer networks. It determines the best path for the data to travel from the source to the destination using routing tables and protocols.
61
DNS server
A DNS (Domain Name System) server translates human-readable domain names (like www.example.com) into IP addresses that computers use to identify each other on the network. It acts as a directory for internet resources.
62
Email server
An email server is a computer system that sends, receives, stores, and manages emails. It uses protocols such as SMTP for sending and IMAP or POP3 for retrieving messages.