Networks Flashcards

(77 cards)

1
Q

What is a Network?

A

A set of interconnected devices (computers, printers, servers) designed to communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Network Protocols?

A

Defines the rules and formats that devices must follow to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of Network Protocols?

A

HTTP
FTP
TCP/IP
SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Standard?

A

A set of guidelines that govern how a task should be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Purpose and Need for Standards?

A

-Standards ensure compatibility and consistency across different devices and software.
-They ensure that data can be correctly interpreted and processed by the receiving device, regardless of where or how it was sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is HTTP?

A

Hypertext Transfer Protocol;
Primary protocol for transferring web content (text, images, video)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HTTPS?

A

A version of HTTP, but with encryption for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SMTP?

A

Single Mail Transfer Protocol;
The standard for sending E-Mail messages between servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is FTP?

A

File Transfer Protocol;
Used for transferring files from one host to another over a network.
-Provides authentication (username and password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IP?

A

Internet Protocol;
Functions mainly by addressing and routing packets of data from the source to the target device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP?

A

Transmission Control Protocol;
Part of the main suite of protocols used in the Internet Protocol suite.
-Provides reliable, ordered, and error checked delivery of a stream of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Protocol Layering?

A

They way in which network protocols are divided into layers, each of which performs specific functions.
This allows for modular design, simplifies troubleshooting, and promotes interoperability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why use layering?

A

Modularity; More manageable layers, easier to design, implement, and troubleshoot networks.

Interoperability; Allows different technologies to work together seamlessly.

Ease of Updates; changes can be made to one layer without disrupting the others.

Specialisation; each layer can be specialised to perform its functions without worrying about the specifics of other layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 layers of TCP/IP protocol?

A

Application
Transport
Internet
Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Application Layer?

A

Where the communication begins;
Interacts directly with the software applications, such as web browsers.
-It prepares data for transmissions over the network by converting it into a format that can be sent and received over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Transport Layer?

A

Receives data from the application layer;
Is responsible for the end-to-end communication between the source and the destination.
The transport layer breaks down the data it receives into smaller units called packets.
Each packet is given a port-number so it can be reassembled into the correct order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Internet Layer?

A

Receives packets from the transport layer;
Adds a header onto each packet, including the sender’s and receiver’s IP address.
Is responsible for routing each packet across the network using the IP addresses in the headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Link Layer?

A

Receives packets from the internet layer and prepares them for transmission over the network;
It translates the digital packets into an electrical, optical, or wireless signal that can be sent over the network.
Once the signal reaches the receiving end, it is translated back into digital packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an IP Address?

A

A unique identifier for a device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Domain Name System (DNS)?

A

Converts domain names to IP addresses so the computer can connect to the server hosting the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 4 components of DNS?

A

-DNS Resolver
-Root Servers
-Top-Level Domain Servers
-Authorative DNS Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a DNS Resolver?

A

The first stop in the DNS lookup process, usually provided by your Internet Service Provider or a third-party service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Root Servers?

A

The Resolver asks it to find the Top-Level Domain (.com, .org, ,.edu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are Top-Level Domain Servers?

A

Stores the information about the Domain; (.com, .org) and responds with the IP Address of the Domain’s Authoritative DNS Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are Authoritative DNS Servers?
Where the Resolver asks for the IP of the domain.
26
What are the Benefits of DNS?
-Allows us to use easily remembered domain names instead of whole IP Addresses. -Handles mapping between domain names and IP addresses, relieving end users from the task.
27
What happens when you type a URL into a web browser? (11 Steps).
1.URL Entry 2.Computer checks local Cache to see if it holds IP Address from a previous request 3.DNS Query 4.DNS Resolver 5.Root Server Query 6.TLD Server Query 7.Authoritative Server Query 8.Retrieve IP Address 9.Request Web Page (HTTP/HTTPS) 10.Server Response sends back HTML, CSS, JavaScript etc 11.Render Web Page
28
What is a Local Area Network (LAN)?
Networks that are contained within a small geographical location.
29
What are some characteristics of a LAN?
-Typically all Hardware is owned by one company, making them more secure than WAN. -They are built using hubs and/or switches that connect several devices.
30
What is a Wide Area Network (WAN)?
A network that connects devices located in a large geographical area.
31
What is a characteristic of a WAN?
-Often use third party communication channels, such as connection by internet services providers like BT, making it less secure than LAN.
32
What are some Advantages of a Networks?
-Centralised Management of updates, backups, software installations -Can secure devices with firewalls, antivirus, etc -Allows users to share resources like printers and files or folders
33
What are some Disadvantages of a Networks?
-If hardware fails, the network may nor function at all -Networks are more prone to attacks -Access to data and such can be slow depending on traffic compared to locally stored data -Require maintenance to ensure it's up-to-date
34
What is Packetising
A process where a large message is divided into smaller, manageable units called packets.
35
What are the components of a Packet?
Header -Payload (Actual Data) -Footer
36
What 5 things do Headers contain and why?
They often contain; -Source IP Address and Destination IP Address -Sequence Number to help when reassembling the packets back into the original message at the destination -Protocol -Packet Length -Checksum for error checking
37
What is Packet Switching?
Breaking down large data into smaller packets and sending them along different routes to be reassembled at their destination.
38
What are the Benefits of Packet Switching?
-Efficient use of resources as they follow different paths, using more available bandwidth -More reliable as if one packet fails to reach its destination, only that one needs to be resent, not the entire data stream -Lower cost due to shared network resources
39
What are the Drawbacks of Packet Switching?
-Not ideal for real-time services like video calling as there can be delays (suited for e-mails and web pages) -Packets can arrive out of order, requiring reassembly and error-checking -Potential for congestion in the Network and packet loss
40
What is Circuit Switching?
Where a dedicated route is established between the two devices for the duration of their 'conversation' (i.e phone calls), and all packets are sent down the same route in a continuous stream.
41
What are the Benefits of Circuit Switching?
-Ideal for real-time services with a constant stream of data transmission. -No delays as dedicated paths are established. -Data arrives in order as it follows the same path
42
What are the Drawbacks of Circuit Switching?
-Less efficient as resources remain allocated during the whole 'conversation' even when no data is being sent. -More costly due to the dedicated paths. -Less flexible as adding new devices can be complex.
43
What are Hackers?
Individuals who exploit system vulnerabilities to gain unauthorised access to data.
44
What are Viruses?
Malicious Software programs designed to spread from one computer to delete data or damage hardware by attaching itself to a legitimate file and then replicating itself.
45
What is Malware?
Malicious Software designed to harm or gain unauthorised access to a system or network.
46
What are 5 types of Malware?
-Worm -Trojan Horse -Spyware -Adware -Ransomware
47
What is a Worm?
Similar to a Virus but is a standalone program that can spread and replicate itself over networks. It can take up storage space or bandwidth.
48
What is a Trojan Horse?
A program that disguises itself as a legitimate program or file, but when installed can delete data or damage hardware.
49
What is Spyware?
Software that records all key presses and transmits this data to a third-party.
50
What is Adware?
Software that displays unwanted advertisements on the computer without the user's consent, some may contain spyware or link to viruses when clicked.
51
What is Ransomware?
Malware that encrypts the user's files and demands a ransom payment to decrypt them. Can cause data loss and financial damage and disrupt business operations.
52
What is a Denial of Service (DoS) attack?
-Where a computer floods a server with lots of requests at the same time, which the server can't respond to, causing it to crash. -Can be DDos (Distributed Denial of Service) where multiple computers are used as bots to send the requests.
53
What is SQL Injection?
Where malicious SQL statements are inserted into an entry field for execution. Can expose a company's database to hackers.
54
What is Phishing
Attempting to acquire sensitive information by imitating a trustworthy entity. Can be done by sending an e-mail containing a link to a fake website where users are encouraged to enter their details.
55
What is Pharming?
Cyber attack that redirects a websites traffic to another fake site where they're are encouraged to enter personal details. Involves malware being downloaded without the user's knowledge.
56
What is Social Engineering?
Involves manipulating individuals to gain access to confidential information. -Posing as an IT support personnel, Bank representative, etc
57
What are 8 forms of Network Security?
-Firewalls -Secure Passwords -Anti-Virus Software -Anti-Spyware Software -Two-Factor Authentication -Regular Software Updates -Employee Training -A strong Security Policy
58
What is a Modem?
Transforms digital information from your computer into analogue signals that can be transmitted through wires.
59
What is a Router?
A Hardware device that routes data from a LAN to another network connection. They analyse data packets and direct them to their destination.
60
What 3 steps does a Router take when directing packets?
1.Receives incoming data packets and analyses the packet header to determine the destination of the IP address. 2.Looks up the IP Address to determine the next network it should be sent to. 3.It forwards the packet to the appropriate network or device.
61
What is a Cable?
Cables are the physical paths for data to travel between devices in a network
62
What is a Network Interface Card (NIC)?
A hardware component that enables a device to connect to a network.
63
What is the Primary Function of a NIC?
To send and receive data packets between the computer or device, and network.
64
What is a MAC address?
A unique identifier found in every NIC, used to identify the device on the network.
65
What is a wireless access point (WAP)?
Act as a central transmitter and receiver of Wi-Fi Signals. They connect to the wired network from a fixed location, using Ethernet or Fibre Optic cable to project a Wi-Fi signal to an area.
66
What is a Hub?
Networking device which used to connect multiple devices in a network. They pass on anything received on one connection to all other connections. They allow multiple devices to be connected to them.
67
What are the Issues with Hubs?
Although generally cheaper, when a hub receives a data packet, it will broadcast it to every device on the network, making unnecessary traffic and potentially disrupting security as each device receives it.
68
What is a Switch?
Networking Device that connects devices on a network and uses packet switching to receive, process, and forward data to destinations. Unlike a Hub, they only send data to the device it was intended for.
69
What is a Client-Server Network
Powerful and reliable 'server' computers control the network and 'serve' the clients with services such as files, e-mails, web access, etc. Clients connect to the servers to access network services.
70
What are the Benefits of Client-Server Network?
-Easier Central Management -New clients can easily be added -Higher reliability as resources are managed centrally
71
What are the Drawbacks of Client-Server Network?
-If the server goes down, services are unavailable -Can be expensive to set up and maintain
72
When are Client-Server Networks used?
Larger organisations, where centralised control is needed.
73
What is a Peer-to-Peer Network?
All computers in the network have equal responsibility and there is no central server. Each machine is the responsibility of that machine's user.
74
What are the Benefits of Peer-to-Peer Network?
-Easy to set up and less expensive than Client-Server as no administrative staff are needed. -No dependency on a central server. -Data can be shared directly between systems.
75
What are the Drawbacks of Peer-to-Peer Network?
-Lack of central control can lead to security issues and vulnerabilities. -Not suitable for large networks as it can have performance issues.
76
When are Peer-to-Peer Networks used?
Home Networks, Small Businesses, or for specific applications like file sharing.
77