1.3 Computer networks, connections and protocols Flashcards

Sub topic = Wired and wireless networks, protocols and layers

1
Q

Wired connection

A

A wired network uses cables to connect devices, such as laptop or desktop computers, to the Internet or another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless connection

A

The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wi-Fi

A

It is a communication technology that makes use of radio waves in order to connect to a local area network. It is also widely used to connect to the internet from a laptop or smart phone whilst out and about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

Bluetooth is a type of radio communication and networking protocol combined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption

A

Encryption means to scramble a message in such a way that only the people who are meant to read it can do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP address

A

The IP address is the unique address given to a computer. It allows one computer to communicate with another one by sending data packets containing the destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC address

A

Short for Media Access Control address. This is the unique identifier assigned to a network card or Wi-Fi adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standards

A

A standard is a set of rules and definitions that characterize some aspect of a product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol

A

A “ protocol’ is the agreed method of communication to be used within the network. For example the network protocol for the internet is TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP

A

It stands for Transmission Control Protocol. TCP is responsible for checking that data has been delivered correctly from your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

A

HTTP stands for Hyper Text Transfer Protocol. HTTP is the set of rules that are used for transmitting files, (text, graphics, sound, video etc) over the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTPS

A

HTTPS stands for Hypertext Transfer Protocol Secure. It is the protocol where encrypted HTTP data is transferred over a secure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP

A

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

POP

A

Post Office Protocol (POP) means that all of your email is downloaded from your Internet Service Provider to your own personal computer and (usually) deleted from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP

A

Internet Message Access Protocol (IMAP) means that all of your email is saved on your Internet Service Provider’s servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP

A

Simple Mail Transfer Protocol: a protocol for transferring email messages over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protocol layering

A

In networking, layering means to break up the sending of messages into separate components and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

factors that affect network performance

A

bandwidth - high bandwidth, faster data transfer speed
NUMBER OF DEVICES CONNECTED - network load, bandwidth used up.
Latency - time delay
Errors in Transmission - due to distortion or noise
INTERFERENCE - cordless phones, electromagnetic signal = dropped connections.
Thick walls = weak wifi connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

when a user types a URL:

A

THE URL US SENT TO A LOCAL DNS SERVER WHERE UT IS TRANSLATED TO AN IP ADDRESS
IF THE IP ADDRESS IS FOUND IT IS PASSED BACK TO THE BROWSER.
IF NOT, IT IS PASSED UP THE CHAIN TO THE NEXT DNS SERVER. AND DISPLAYS “error www.bbc.co.uk could not be found.”

20
Q

advantages of a DNS server

A

humans do not have to remember it type in numerical addresses

if the IP address changes at some point the DNS server can update the databases and the users can continue using the same domain names

Having many distributed dinner service means everyone has access to all addresses from their local DNS server

21
Q

What is circuit switching?

A

when you make a telephone call a dedicated connection is set up between you and the person you are calling this is called circuit switching

22
Q

benefits of networking computers

A

Sharing resources and peripherals. Centralised management user profiles and security can be all managed essentially all files can be backed up centrally

23
Q

What is a network interface card

A

And NIC is required to connect any network enabled but device this is a physical component which can either operate wirelessly or have a Wi-Fi connection using a standard ethernet cable.

24
Q

Routers and switches

A

A router is designed to route data packets across a wide area network it is used for connecting networks each router in a network at the node and park packets are passed from router router to the destination if a packet is destined for a computer in a line it will be typically are rooted to a switch

A switch is a component of a lan, learns the Mac addresses of each individual device
its function is to forward the inbound packets only to the intended recipent

25
Q

Wireless access points

A

wireless transmitter wireless access point WAP receive the data from a network via its physical connection. The transmitter then converts this data into radio waves which are then transmitted.

26
Q

Risks of wireless networking

A

Criminal activity wireless networks are often connect in-house private networks this may allow an intruder to completely bypassed any hardware firewall protective devices into the private network in the broadband connection.

Bandwidth stealing – by using the Internet connection download music games and other software outside into this can slow the network down and reduce employee productivity

27
Q

Bluetooth

A

Bluetooth is a radiowave technology design for communicating over short sentence of up to 100 m but typically no more than up to about 10 m

28
Q

encryption

A

Encryption is used to protect data in case it is in hacked or illegally accessed.

29
Q

encryption terminology

A

plain text – the original message to be encrypted

ciphertext – the encrypted message

encryption – the process of converting plaintext into ciphertext

Key – sequence sequence of letters numbers and other characters used to encrypt or decrypt.

encryption algorithm – the method for encrypting the plaintext

30
Q

Symmetric encryption

A

symmetric encryption uses secret key which can be a combination of different letters numbers and other characters

31
Q

Asymmetric encryption

A

ok

32
Q

in a clients server network:

A

A central back in store is available to all computers.
Security is controlled by the central computer.
Back up is done centrally on the server.
All users are reliant on the central for server.
Can support hundreds or even thousands of users and grow with an organisation

33
Q

Peer-to-peer network:

A

storage facilities are distributed across all computers.
Security is not centrally controlled . Backup must be done separately for each computer.
No central server.
Easy to set up but most suited to homes in small businesses.

34
Q

Advantages for the cloud:

A

You can access the data from anywhere in the world with us and Internet connection.
You can share the data with other people in different locations.
Back up is no longer such an issue as it is the responsibility of the provide to keep day to say. Cloud based server is enable access the software on demand typically on a subscription basis instead of having the software installed in the local machine you can access the software from any Internet connected computer.

35
Q

disadvantages for the cloud:

A

you are dependent on having an Internet connection order to access your data.
Some users are concerned about security in the cloud and what is the date I could be accessed by a hacker

36
Q

Whats a standard

A

standards allow hardware and software to interact across different manufacturers or producers

37
Q

What is a network standard

A

Network standard specifies the way that computers act as a network the speed is used on different types of networks and the types of physical cable and wireless technology used

38
Q

Protocols

A

if one computer transmits a stream of binary to another computer the receiving end needs to know what protocol is being used

39
Q

What does the protocols specify

A

The format of data packets, the addressing system, the transmission speed, error-checking procedure is being used

40
Q

TCP/IP

A

transmission control protocol/Internet protocol which consists of two separate particles distribute as a standard that defines how messages are broken up into packets and reassembled at the destination. The IP practical identifies the location of a device on the network and reach the individual packets from source to destination by routers

41
Q

http:///httPs

A

hypertext transfer protocol is used for accessing and receiving webpages in the form of HTML files on the Internet.

HTTPS Hypertext transfer protocol secure encrypt the information so that it cannot be understood if it is hacked. banks always use the https protocol

42
Q

FTP

A

File transfer protocol this is a standard network when used when transferring computer files between a client and server on a computer network is based on the clients server model

43
Q

POP

A

post office protocol this is a Widespread method of receiving my email. Much like the physical version of a post office PIP receives and hold emails for individual until they pick it up. Saint POP creates local copies of emails and delete the original from the server that emails are tired that specific device and can be viewed off-line

44
Q

IMAP

A

Internet messaging access protocol the Internet message access political is an email possible that stores email messages on a server but allows users to view and manipulate the message as if they were stored locally on their own computers

45
Q

POP advantages

A

Works best with only one computer to check your email. Your emails I downloaded and stored on the computer and you use. Sent email is locally stone on your network and not on an email server

46
Q

IMAP advantages

A

You can use multiple computers and devices take your emails. Your emails are still on the server and your devices synchronise with the sabbath. Sent email stay on the server so you can access it from any device

47
Q

SMTP

A

Simple mail transfer vertical Isabella for sending email messages between servers most email systems that send me all over the Internet use SMTP to send messages from one side to another