1.3.3 Flashcards

1
Q

network

A

connecting at least one computing device to another, either via cable or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advantages of networks

A

Users can share files
Users can share peripherals and connections to other networks such as the internet
Users can access files from any computer on the network
Servers can control security, software updates and backup of data
Communication with other people – e.g., email and social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disadvantages of networks

A

Increased security risks to data
Malware and viruses spread very easily between computers
If a server fails, the computers connected to it may not work
Computers may run slower if there is a lot of data travelling on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

standards

A

a set of hardware and software specifications that allow manufacturers to create products and services that are compatible with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocols

A

if 2 devices share the same protocol, they can exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

common protocols

A

TCP - Communication over LAN/WAN
IP - Communication over LAN/WAN
UDP - Communication over LAN/WAN
HTTP - Web page requests
HTTPS - Web page requests
FTP - File tansfers
POP - Email
IMAP - Email
SMTP - Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

importance of protocols and standards

A

most devices wouldn’t be able to interact or communicate with one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP/IP stack vs UDP

A

Transmission Control Protocol - provides error-free transmission between two routers

Internet Protocol - routes packets across a WAN

TCP + IP make the stack that is foundation for communication over the internet

User Datagram Protocol - uses a simple, connectionless transmission model
used to send short messages using datagrams, where speed is more important than accuracy
an alternative to TCP but has no error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP(S)

A

Hypertext Transfer Protocol - a way for a client and server to send and receive requests and deliver HTML web pages
the fundamental protocol of the WWW

Hypertext Transfer Protocol Secure - HTTP, except it adds in encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTP

A

File Transmission Protocol - used for sending files between computers, normally on a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POP/IMAP/SMTP

A

Post Office Protocol - retrieves emails from a mail server and transfers them to your device, removing them from the server in the process

Internet Message Access Protocol - keeps emails on the mail server, maintaining synchronicity between devices

Simple Mail Transfer Protocol - transfers outgoing emails between servers and from email clients to servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the internet

A

the most well-known WAN
a collection of interconnected networks, routers, cables, satellites and other hardware spanning the world

Remember, the internet is not the same as the World Wide Web, which is just a service on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WWW

A

a service on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS

A

Domain Name System - turns domain names into IP addresses, which browsers use to load internet pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocol layering

A

to divide the complex task of networking into smaller, simpler tasks that work in tandem with each other
hardware and/or software for each layer has a defined responsibility, and each one provides a service to the layer above it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advantages of layering

A

Reducing a complex problem into smaller sub-problems
Devices can be manufactured to operate at a particular layer
Products from different vendors will work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

4 main TCP/IP protocol layers

A

Application
Transport
Network
Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

application layer

A

Network applications such as web browsers or email programs operate at this layer
uses an appropriate protocol relating to whatever application is being used to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

tansport layer

A

Sets up communication between two hosts – they agree settings such as language and packet size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

internet/network layer

A

Addresses and packages data for transmission
Routes packets across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

link layer

A

Network hardware and connection port standards
Operating system device drivers also sit here
Facilitates the transmission of binary via any media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

LANS

A

Local Area Network - a network that covers a small geographical area, typically located on a single site

All the hardware for a LAN tends to be owned and controlled by the organisation using it

LANs are typically connected using: UTP cable, Fibre optic, Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WANS

A

Wide Area Network - a network that covers a large geographical area

When multiple LANs physically located in different areas are connected, they form a WAN

The infrastructure that connects LANs to form a WAN is leased from telecommunication companies who own and manage it

WANs are typically connected by: Telephone lines, Fibre optic cables, Satellite links

24
Q

circuit switching

A

provides the basis for traditional telephone networks
creates a temporary and dedicated link of fixed bandwidth between the source and destination that only lasts until the transmission is complete
guarantees the quality of the transmission through dedicated bandwidth, making circuit switching excellent for data that needs a constant link end-to-end such as real-time video
however a lot of the potential bandwidth can be wasted

25
Q

packet switching

A

breaks streams of data into smaller blocks, each sent independently of one another
at each node, packets are sent via whichever route the node decides is the least congested – this maximises bandwidth but doesn’t guarantee the quality of the transmission
packets can take different routes to their destination and may arrive out of order
more affordable and efficient than circuit switching as all bandwidth can be used at once
requires less complex infrastructure and can easily respond if parts of the network fail

26
Q

network threats

A

viruses
worms
hackers
denial of service
data interception
phishing
spyware

27
Q

network security

A

The aim of network security is to:
Only allow authorised users access to what they need
Prevent unauthorised access
Minimise the potential damage caused by unauthorised access

28
Q

virus

A

pieces of code capable of copying themselves and spreading throughout a system
typically designed to corrupt a file system or destroy data

29
Q

spyware

A

a form of malware that covertly obtains information about a user’s computer activities by transmitting data from their device

30
Q

denial of service attack

A

when an attacker floods a server with useless traffic, causing the server to become overloaded
(past attacks exploited limitations of the TCP/IP stack)
attacks often target web servers of high-profile organisations such as banks, large-scale e-commerce businesses and the government
attacks do not typically result in the theft or loss of data or other assets, they can cost a great deal of time and money to handle

31
Q

anti malware

A

software to prevent/minimise the impact of malware

32
Q

proxies

A

a physical device placed between a network and a remote source
all traffic travels through the device on its way in and out of a network
looks at the page and its contents and choose whether to pass it back to the user or not

ensures there is no direct, physical connection between a single user and a remote source

33
Q

encryption

A

turning plain text into an unreadable form
encrypted using an algorithm and a unique key
you can only translate it with the appropriate key
(won’t stop you from being hacked, but it will make any stolen data very difficult to read)

34
Q

firewalls

A

a piece of software or hardware (sometimes both) configured to let only certain types of traffic through it by blocking certain ports and types of traffic
it can also inspect data travelling across it to see if it looks suspicious

35
Q

network hardware

A

Modem
Router
Cable
Network interface controller (NIC)
Wireless access point (WAP)
Hub
Switch

36
Q

modem

A

transforms digital info from your computer into analogue signals to be transmitted through wires an vice versa
most modems have 2 ports:
One that connects to the outside world.
An Ethernet port that connects to a computer or router

37
Q

router

A

mainly responsible for routing data:
Between devices on a small home network.
Between devices on a network and the internet.
modems connect to one port on the router, often labelled WAN. Your devices connect to the other ports or wirelessly using the Wi-Fi standard

38
Q

DoS vs DDoS

A

DDoS (distributed denial of service) attack occurs when multiple systems orchestrate a synchronised DoS attack against a single target

39
Q

cables - types

A

The 3 most popular are:
Twisted pair
Coaxial
Fibre optic

40
Q

SQL

A

a code injection technique used to attack data-driven applications
designed to exploit vulnerabilities in poorly coded database applications
code is entered into input text boxes and is then executed by the server

41
Q

cables - twisted pair

A

made of a pair of insulated copper wires
can be affected by noise from external magnetic fields, but most affordable
Only able to provide low bandwidth, generally used for telephone networks, data networks and cable shielding

42
Q

cables - coaxial

A

made of 4 cylindrical components – (in to out) solid conductor wire, insulation, grounding conductor, exterior insulation
can be affected by noise from external magnetic fields but to a lesser extent than twisted pair
moderate bandwidth, but more expensive than twisted pair but cheaper than fibre optic
used for feedlines that connect radio transmitters and receivers to antennas, as well as computer network connections, digital audio and cable television

43
Q

cables - fibre optic

A

made of very thin optical fibres bundled together into a single cable (glass or plastic)
the highest noise immunity, as the light rays are unaffected by electrical noise
high bandwidth capabilities, most expensive
used to support long-distance connections between cities and countries, as well as data centres and organisations transmitting large volume of data

44
Q

NIC

A

Network Interface Controller
connects a computer to a network
allows wired and wireless communications between computers on a LAN or connected to a large-scale network using the Internet Protocol
a physical layer and data link layer device, providing the necessary circuitry for physical layer processes and some data link layer processes to run on it

45
Q

hub

A

allows you to connect multiples devices to 1 network
operates on the physical layer and considered a passive device (clarifier)
con - the network can easily become flooded with unnecessary traffic
purely a hardware device
typically slower than switches in terms of data transfer

pd - broadcasts transmissions it receives to all connected devices

46
Q

switch

A

allows you to connect multiples devices to 1 network
operates on the data link layer and is an active device (clarifier)
A switch typically has software installed on it for administration and configuration purposes.
Switches are typically much faster than hubs in terms of data transfer.

ad - inspect transmission & route them to right device keeps traffic low

47
Q

WAP

A

Wireless Access Point
a device that creates a wireless local area network (WLAN)
connects to a wired router/switch/hub via an Ethernet cable and projects a Wi-Fi signal within a designated area

Wi-Fi range is limited and easily interrupted by various construction materials, so most businesses use multiple WAPs for full coverage.

48
Q

client-server - pros

A

Easier to manage file security.
Easier to back up shared data.
Easier to install software updates to all computers.

49
Q

client-server - cons

A

Can be expensive to set up and maintain.
Requires IT specialists to maintain.
The server is a single point of failure.
Users will lose network access if the server fails.

50
Q

client-server

A

Controls access and security for a shared file store.
Manages access to the internet.
Manages printing jobs.
Provides email services.
Runs regular backups of data.

51
Q

client-server

A

Controls access and security for a shared file store.
Manages access to the internet.
Manages printing jobs.
Provides email services.
Runs regular backups of data.

52
Q

peer-to-peer

A

A peer is a computer connected to the network.
A peer is equal to all other peers.
Peers serve their own files to each other.
Each peer is responsible for its own security and data backup.
Peers usually have their own printers.
Peers can send print jobs to another peer to process, but that peer must be switched on to communicate with the printer.

53
Q

peer-to-peer - pros

A

Very easy to maintain.
Specialist staff are not required.
No dependency on a single computer.
Cheaper to set up.
No expensive hardware.

54
Q

peer-to-peer - cons

A

The network is less secure.
Users will need to manage their own backups.
Can be difficult to maintain a well-ordered file store.

55
Q

ISP

A

internet service provider