Networks Flashcards

(50 cards)

1
Q

What is a computer network?

A

A computer network is 2 or more computers connected for the purpose of sharing recources, either physically or wirelessly. To exchange infomation and data and share network recources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a server?

A

a program or device used for a specific service which is more powerfil than other clients. E.g. internet server / file server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a client?

A

A less powerful device which is connected to the server and uses the services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a communication medium?

A

How your message is sent to the reciever.
Guided = cables
Unguided = wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a network adapter?

A

A network adapter is an internal hardware component that is used for communicating over a network with another computer. Wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a wireless access point / router?

A

A networking device that forwards data packets between computer networks. Allows internet connection to be shared towards users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are network recources?

A

Peripheral devices such as a printer that can be used by all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a user?

A

Someone that uses a client to access recources on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are protocols?

A

A set of rules that govens the communications between computers on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is TCP?

A

Breaks down data into packets so that data gets there quicker and puts data back in order once it has arrived.
Detects errors and resends lost packets.
Transmission Control Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IP?

A

Internet Protocol
Identifies the location of a device on the Internet
Routes individual packets from source to destination via routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are mail protocols?

SMTP, POP3

A

SMTP: Simple Mail Transfer Protocols
Used to send mail
POP3: Post Office Protocol 3
Used to recieve mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is HTTP?

A

Hypertext transfer protocol
Used to transmit HTML pages.
HTTPS is a sercure webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is FTP?

A

File transfer protocol

Used to copy and send files over a network from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages of a computer network?

A

Advantages:
• Sharing resources such as software and other devices such as printers saves money.
• Site (software) licences are likely to be cheaper than buying several standalone licences.
• Files can easily be shared between users.
• Network users can communicate by email and instant messenger.
• Security is good - users cannot see other users’ files unlike on stand-alone machines.
• Data is easy to backup as all the data is stored on the file server.
• Network Management is more affective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the disadvantages of a computer network?

A

Disadvantages:
• Purchasing the network cabling and file servers can be expensive.
• Managing a large network is complicated, requires training and a network manager usually needs to be employed.
• Relies on a server, if the file server breaks down the files on the file server become inaccessible. Email might still work if it is on a separate server. The computers can still be used but are isolated.
• Viruses can spread to other computers throughout a computer network very quickly.
• There is a danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, e.g. a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is WAN?

A

WAN
Wide Area Network
Interconnects computers across a large geographical area i.e. company building located in different towns or cities
Uses the services of telecommunications companies i.e. BT, Virgin Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is LAN?

A

LAN
Local Area Network
Interconnects computers across a small geographical area i.e. a building or campus
Uses physical cables or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is PAN?

A

PAN
Personal Area Network
Interconnects devices centred around an individual person’s workspace – typically within 10m
Uses wireless technology such as Bluetooth
MiFi - wireless devices that enable multiple users to share a single mobile broadband connection while they are on the go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is standalone?

A

A computer with no connection to a network or the outside world. No internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is network topology?

A

Defines the way in which all network devices are interconnected to create a LAN

22
Q

What are the three main topologies?

23
Q

Which topology is most common?

24
Q

What is bus topology?

A

Computers are connected to a single bakbone cable. The computers all share this cable to transmit to each other but only one computer can transmit at any one time. This is fine most of the time if the network is not too busy but if there is a lot of traffic then transmissions interfere with each other and computers have to retransmit.

25
What are the advantages of bus topology?
Easy and inexpensive to install - less cabling than in a star topology network Easy to add new computers
26
What are the disadvantages of bus topology?
If the main cable fails then the whole network goes down Cable failures are hard to isolate because it affects all of the components attached Performance slows down as the amount of traffic increases
27
What is ring topology?
Ring Network: Computers are connected to adjacent computers in a ring. Computers take it in turns to transmit, controlled by passing a token around the ring. Computers can only transmit when they have the token.
28
What are the advantages of ring topology?
Advantages: Not dependent on a central computer like the star network Token passing protocol is simple and therefore reliable Consistent performance even when there is a lot Of traffic
29
What are the disadvantages of ring topology?
Disadvantages: A Single node or link failure and the network is disrupted
30
What is star topology?
Star Network: All of the computers have their own cable that connects them to a central computer. The central computer controls the network. This is usually a server, where shared resources are stored.
31
What are the advantages of star topology?
Advantages: If one cable fails only one station is affected rather than the whole network Consistent performance even when network is heavily used Easy to add new computers More secure — messages from a computer go directly to the centre
32
What are the disadvantages of star topology?
Disadvantages: Can be costly to install because there is a lot of cabling Dependence on central computer, if it fails whole network goes down
33
Network diagrams should include?
``` At least three PCs One shared device i.e Printer Servers i.e. Email, File, Internet Router connecting to the Internet Any topology specific devices labelled Devices need a NIC ```
34
What are the network security aims?
Two basic goals: Stop unauthorised people accessing resources Ensure authorised people can access all the resources they need
35
What is authentication?
When the user is required to prove they are an authorised user. Normally done with a username and password. They are checked in the central database
36
What is encryption?
Protects data as it makes it difficult for others to read or alter it Typically used for online shopping to keep payment details safe Terminology: Plaintext – original message Ciphertext – encrypted message Encryption – process of converting from plaintext to ciphertext Decryption – the process of converting from ciphertext to plaintext Key – a sequence of numbers used to encrypt/decrypt Algorithm – the method used for encrypting
37
What is a firewall?
Designed to prevent unwanted traffic from gaining access to a LAN Unauthorised users are blocked by the firewall Certain ports can be closed to prevent specific types of packets from entering
38
What is MAC address filtering?
``` Generally used on a wireless network A list of allowed MAC addresses can be set up under the MAC address filtering option Weakness: Only identifies permitted device Doesn’t identify the individual user ```
39
What is the best security method?
In order to provide a high level of security a combination of the methods discussed would need to implemented
40
What are the layers in a TCP/IP prototcol stack
Application Transport Network Link It consists of a number of different protocols across the four layers, that collectively allow data packets to be sent and received.
41
Advantages of using a layered approach?
A complex problem can be broken into smaller manageable pieces (decomposition) changes in one layer do not impact on other layers It provides a universal standard for hardware and software manufacturers to follow Each layer carries out distinct functions and therefore avoids repetition of tasks
42
What is the application layer?
Is where applications such as web browsers and email clients operate Data being sent is encoded so that it will be understood by the recipient An appropriate header is added, according to the protocol being used, before passing the data to the transport layer
43
What are the application layer protocols?
FTP HTTP HTTPS This provides a level of encryption to keep personal information secure, such as payment details SMTP POP IMAP
44
What is IMAP?
Internet Message Access Protocol Similar to POP but messages do not have to be downloaded as they can be read and stored on the server. This is better for users with multiple devices as they can be accessed from all devices.
45
What is the transport layer?
Sets up the communication between the hosts and agrees settings such as language and packet size Divides data received from Application layer into packets of the correct size and adds packet information such as packet number and total number of packets Checks that packets arrive safely (TCP) and sends acknowledgements when receiving data
46
What are the transport layer protocols?
TCP UDP Alternative to TCP but has no error checking or correction Maintains an open connection between sender and receiver for the duration of the communication Often used for online gaming and live broadcasting where speed is desirable and error correction is not necessary
47
What is the network layer?
Addresses and packages data for transmission | Attaches source and destination IP address which are used to route the packet across the Internet
48
What are the network layer prototcols?
IP
49
What is the link layer?
Concerned with transmitting the data through the local network using the protocols of the specific network i.e. Ethernet The MAC addresses of the sender and recipient are attached to the data allowing the packet to be directed to a specific device on a local network This is where network hardware is located, such as the NIC, and the operating system device drivers
50
What are the link layer protocols?
Ethernet Refers to a suite of networking protocols used in LANs Describes how devices should format data ready for transmission between computers on the same network Nodes wait until the connection is quiet before attempting to transmit Two nodes attempting to transmit simultaneously will stop and wait a random period before reattempting