1.3.3 Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the two types of networks and topology?

A
  • Local Area Networks are spread over a small geographical area or single site.
  • Wide Area Networks are spread over a large geographical area or multiple sites.
  • Physical topologies show the physical layout of wires and components.
  • Logical topologies show the layout of data flow.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the benefits and downsides of a bus topology?

A
  • Inexpensive, and does not require additional hardware.

- Single point of failure in the backbone, poor performance with high traffic, no privacy as all can see data flowing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits and downsides of a star topology?

A
  • Consistent performance, faster transmissions, easy to upgrade, no data collisions.
  • More expensive to cable, single point of failure in the switch.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits and downsides of a mesh topology?

A
  • No cable cost if wireless, reliable and fast, easy to add nodes, no central switch.
  • Very expensive, very especially if cabled. Difficult to maintain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are commonly used networking protocols?

A
  • HTTP for web page rendering, HTTPS is encrypted.
  • TCP/IP used for routing packets through networks.
  • POP3 and IMAP used to send emails and access them. (POP3 deletes mail from server on view).
  • FTP is used for file transmissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do the application and transport layers of the TCP/IP stack do?

A
  • Application layer is responsible for specifying the protocols in use, related to what is being sent.
  • Transport layer opens a connection with TCP, splits the data into labeled packets, and requests retransmissions of any that are lost.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do the network and link layers of the TCP/IP stack do?

A
  • Network layer adds source/destination IP addresses and a port number, as packets are sent through routers.
  • Link layer adds the MAC addresses to identify source and destination NICs for the packets to be sent to.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the Domain Name System work?

A
  • URLs are easier to remember than IP, so we use them in browsers.
  • Browsers send a request to a DNS server to find the IP matching the URL.
  • If it is not found, a server up the hierarchy is checked.
  • Once the IP is found, it is sent back to the browser so they can access the site.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a data packet consist of?

A
  • A header containing sender/recipient IPs, protocols, packet order and the time until packet expiry.
  • A payload containing the raw data.
  • A trailer containing a checksum or cyclic redundancy check.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does circuit switching work, and what are its advantages and disadvantages?

A
  • Maintains a direct, open link between two devices.
  • Data arrives in a logical order, and allows calls to occur without delays.
  • Bandwidth is wasted, electrical interference causes corruption, and both devices must transfer data at the same rate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does packet switching work, and what are its advantages and disadvantages?

A
  • Packets of data are sent between networks, along the most efficient route.
  • Checksums/CRCs ensure data intactness. Multiple routes can be used, and packets can be sent far for global communication.
  • Time is wasted constructing and deconstructing data, and all packets must arrive before data can be used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do firewalls and packet switching protect networks?

A
  • Firewalls can be physical or virtual. Physically, they consist of two NICs, scanning packets and comparing them against packet filters.
  • These predetermined rules then lead to the accepting, dropping, or rejecting of the packet. A sender will not know if a packet is dropped.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do proxies and encryption protect networks?

A
  • Proxy servers act as intermediaries, allowing anonymity and security, and can hold their own cache.
  • Encryption keeps data secure and makes intercepted communications unreadable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do trojans, worms and viruses harm computers?

A
  • Viruses are pieces of malware dependent on a host file to run to spread, capable of self-replication, infecting files it comes into contact with in memory.
  • Worms are a subclass of virus, that come without the need for host files, spreading themselves, slowing down computers and networks.
  • Trojans hide inside seemingly useful files, then release a payload once installed, creating backdoors or stealing information. They cannot replicate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What hardware is used in network communication?

A
  • NICs are required for devices to form connections, storing a unique 48-bit 12-digit hex code.
  • Switches direct the flow of data in a network.
  • Routers connect networks and direct traffic between them.
  • Gateways are used to translate protocols when they are different between networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the advantages and disadvantages of client-server networks?

A
  • More secure, make use of central backups, and allows sharing of data.
  • Relatively expensive, central point of failure and slowdown, requires trained specialist staff.
17
Q

What are the advantages and disadvantages of peer-to-peer networks?

A
  • Cheaper, easier sharing, easier maintenance, no central dependencies.
  • Impossible to trace file origins, manual separate backups, poor security, difficult to locate resources.