Networks Flashcards Preview

Computer Science > Networks > Flashcards

Flashcards in Networks Deck (28):
1

What is a packet

A collection of data that is transmitted over a network

2

What is inside a packet

Data, source/destination address, tracking info, reassembling info, corruption checks

3

What is a protocol

an agreed-upon format which allows two devices to communicate

4

What rules may include in a protocol

Sending device indicating the end of sending, recieving device indicating the end of recieving, agreement of dats compression

5

What is a TCP/IP

Transmission Control Protocol/Internet Protocol - IP sets the format of packets and TCP sends and recieves packets

6

What is a HTTP

Hypertext Transfer Protocol - Used to transfer multimedia web pages

7

What is a FTP

File Transfer Protocol - Transfer of files from one location to another

8

What is a protocol stack

The term used when a programmer takes the rules of a protocol and implements them when creating a program

9

Advantages of networks

Share hardware, share software, share data, central backup

10

Disadvantages of networks

Network manager needed, initial costs are expensive, files can spread a virus

11

What is a LAN

Local Area Network - A network for system close to each other e.g. smae building

12

What is a WAN

Wide Area Network - A network where the systems are distant from each otherm such as different countries

13

What are the different types of network topologies

Bus, Ring, Star

14

Advantages of a bus network

Easy to implement new systems, less cabling so cheap

15

Disadvantages of a bus network

If the main cable fails, the entire network goes down, data collisions are likely

16

Advantages of a ring network

Prevents data collisions, data is quickly transferred without a bottleneck

17

Disadvantages of a ring network

If one system fails, then the network will fail, it is difficult to add a node

18

Advantages of a star network

Easy to set up, minimal network collisions

19

Disadvantages of a star network

Expensive to install, extra hardware required

20

What is needed for a system to join a network

A Network Interface Card

21

How is security applied on a system

User access levels, suitable passwords, encryption techniques

22

What should be included in a suitable password

Letters, numbers and non-alphanumerics

23

What is a common encryption technique

XOR logical operator

24

What are some disasters

Fire, power supply fail, virus damage, hacking

25

What are the three parts of a disaster recovery policy

Before(risk analysis), During(staff response) and After(reinstalling software)

26

What is a backup

the process of copying data so that it can be preserved and restored

27

What is a typical backup policy

Grandfather-father-son method

28

What is archiving

the process of storing data which is no longer in current or frequent use for security, legal purposes