1.3.3 Networks Flashcards
1.3.3 A)
What is a network
two or more computers connected together with the ability to transmit data between each other
1.3.3 A)
types of networks
Local area network (LAN) and wide area network (WAN)
1.3.3 A)
What the char of WAN & LAN
when defining what either one of them don’t use the word network as its in the world:
for example use - A group of computer connected over a small geographical area
WAN - large geographical area, allow 4 comms between sites
- WAN uses 3rd party connections
- WAN less secure than LAN
LAN - small geographical area or a single site
-Lan uses connection owned by user
- more secure than Wan
1.3.3 A)
What are the two types of network topologys
Physical and logical topology
1.3.3 A)
Explain physical and logical topology
phy - physical layout of wires and components which form thge netywork (bus, star, mesh)
Logical - layout which shows how the data flow
1.3.3 A)
Explain physical bus topology, adv & disadv
- all devices connected to backbone cable. ends plugged into a terminator ( see notes 4 diagram)
A) inexpensive, no addition hardware
D) if backbone cable fails entire network disconnects, more traffic means less performance, all computers see the data transmissions, security risk as all devices receive the data
1.3.3 A)
Explain physical star, adv & disadv
- uses a central node (normally a switch), which directs data through mac address, unique to a device used to indenify each device on the network.
A) consistent preformance even w/ heavy traffic, if one cable fails rest uneffected faster transmission than bus as no data colisions
D) enpensive due to switch & cables if switch fails rest of network fails.
1.3.3 A)
Explain physical mesh star, adv & disadv
- every node is connected to every other node, commonly found in wirsless tech
A) no cable costs (if wireless), more nodes increases reliablity and speed. nodes automatically incorporated, no central switch inc speed
D) wirless devices normally cost more, if they are wireded they need more wires makes it more expensive and maintaining network is difficult
1.3.3 A)
What is protocols
Set of rules that allow data transmission between devices
Protocols are the rules governing communication between hardware devices.
1.3.3 A)
Explaining protocols
HTTP/TCP/IP/IMAP/POP3/FTP
-hypertext transfer protocol, webpages rendering, encrypted version is https (s = secure)
-tcp/ip (transmisson control networks / internet protcol) networking protocol routing packets thorugh network
-POP3/IMAP (post office protocol 3/ internet message access protcol) mailing used for emails
-FTP (file transfer protocol ) used to transfer files over network
_
1.3.3 B)
Define internet
a network of networks which allows global communicaion between computers
1.3.3 B)
What does tcp and ip stand for
transmission control protocol and internet protocol
1.3.3 B)
What is the tcp/ip stack
a stack of network protcols that work together passing packets during communicatioms
1.3.3 B)
What are the stages of protcol layering in tcp/ip stack
Application layer
Transport layer
Network layer
Link layer
1.3.3 B)
What are the stages of protcol layering in tcp/ip stack
Explain application layer
top of the stack that specifies what protocol needs to be used
1.3.3 B)
What are the stages of protcol layering in tcp/ip stack
Explain transport layer
- uses tcp to establish end-end connection, source and computer
- splits data into packets lables w/ numbers, total number of packets the og data splits into ports and port number used for comm
- if packet lost, request requests a retransmission of lost packets
1.3.3 B)
What are the stages of protcol layering in tcp/ip stack
Explain network layer
-adds sourve & destination ip address ( ip address + port number = socket address)
- routers operate on this layr, use ip address to forward packets
- sockets used to specify which device packets sent too and too the application being used.
1.3.3 B)
What are the stages of protcol layering in tcp/ip stack
Explain link layer
-connection between the network devices adds MAC address indentifying the network interface cards of sourve and reviceing computer
- on same network mac is address of recipent computer or router
1.3.3 B)
Why is the ip/tcp stack a stack ?
on the recipents computer these layers are looked from bottom to top. Once the destination has been reached mac address is removed by link layer. Ip address removed by network layer. transport layer removed port and reassembles the packets. finally app layer presents data to recipent in form it was requested in.
1.3.3 B)
The ip/tcp stack in order at the souce and at the recipents
Source :
file > app layer > transport layer > network layer > link layer
recipients :
link layer > network layer > transport layer > application layer > file
1.3.3 B)
Char of WAN
large geographical area, allow 4 comms between sites + normally needs extra tel communications hardward. Infustructure of wan owneed by third party
1.3.3 B)
Whats A DNS
Domin name system used to name and organise internet resourves. Its a hierarchy in which each smaller domina is seperatewd from the layer domin by a full stop. (leed.gov.uk)
1.3.3 B)
What does TLD and 2LD stand for in terms of dns
top level domain and 2nd level domain
1.3.3 B)
why is DNS used
Domina names easier to rememeber then ip address, role of dns is too translate these domains names into ip address
1.3.3 B)
What are data packets and what do they contain
are segments of data
containing - header, payload and trailer
1.3.3 B)
What are the properties of header in terms of data packets
- sender/recipitant ip address - allows packets too be deliveed enabling recpent device to trace where packet came from
- protcol being used - allows recipent computer to understand how it interprets the packet
- order of packets
- time to live/ hop limit - tells packet when to expire so doesnt travel forever
1.3.3 B)
What are the properties of payload in terms of data packets
-raw data to be transmitted
1.3.3 B)
What are the properties of trailer in terms of data packets
Checksum, or cyclic redundancy check - contains code to detect weather any error occured furing transmission
1.3.3 B)
What are the two methods which networks exchange data:
Packet switching and circuit switching
1.3.3 B)
What is packet switching
method of communication using packets across a network packets are spent across the most efficient route
Data is split into packets which have labels including address its being sent too and the order. Each packet is sent using the most coinvent route. This means they wont be sent in order. Once packets arrive can be re-ordered
At each node network destination is read and best route found
1.3.3 B)
adv/ dadv of packet switching
A) multiple methodsm multiple routes if one breaks, allows for global communication, cannot be intercepted all at one location, eff use of bandwidth, if there is an error that part is identifed and retransmitted.
D) time spent re/decontructing packets, must wait for all packets to arrive
1.3.3 B)
What is cirtuit switching
method of communication where a direct link created between two devices, direct link is maintained for the duration of entire convo requres two devices to transfer and revice datas at same rate
1.3.3 B)
adv/dadv of circuit switching
A) data arrives in logical order = quick reconstruction, call w/o delay
D) Bandwidth waste when no data sent must be transfer / revieve @ = rate, switch may cause eletrical interferance and corrupt data, sections of network cantt be used used by other data till transmisson complete
1.3.3 C)
What is a firewall
device designed to prevent unauthorised accress to a network consisting of two NIC between user and internet
What’s a firewall
A software program or hardware device that restricts communication between a private network or device and an outside network
1.3.3 C)
How does a firewall work
passes the packets through these two NIC comparing these against set of rules set by the firewall software.
The preconfigured rules are called packet filters.
How does a firewall restrict communications
By using two NIC, data enters the first NIC and compares it too the rules of the network, traffic that matches rules passed out of the other NIC
1.3.3 C)
How does packet filters / static filtering work
limits network access in accordance with administrator rules
and policies. It works by examining the source IP, destination IP and the protocols being
used as well as the ports being requested
1.3.3 C)
What happenes when packet doesnt follow the rules
packets can either be droppped or rejected.
rejectet packets sends an error elelert to sender. dropped packets dont.
1.3.3 C)
What is encryption
a way to keep data secure when tranfering data makes data unreadable. en/dycrypting with a key (actual info on 1.3.1 A)
1.3.3 C)
What is a proxie
acts as a intermedian collecting / sending data on behave of user
1.3.3 C)
What are the benifits of using a proxie
-priveacy protected remain annonymus
-can cache frequently used things making websites load faster
- can reduce web traffic
- can be used by admins to prevent access to sensive or irreleveant info at skl or work
1.3.3 D)
Whats a NIC
Network interface card, is a card required to connect a device too a network. assigns a unquie media access control accress (MAC ) to each device, MAC address is 48 bit coded into a device written as 12 digit hexadeciaml
1.3.3 D)
Whats a switch
used to direct the flow of data across a network common in star topology
1.3.3 D)
Whats a WAP
wirseless access point, allows device to connect to a network combinded with a router to enable internet access common in mesh
1.3.3 D)
Whats a router
used to connect two + networks together allows for private home networks to connect too the internet
1.3.3 D)
Whats a gateway
used when protcol are not the same between networks. IT translates procol so networks can communicate with eachother work by removing the header frokm packets b4 adding the data to packets using new packets
1.3.3 E)
What are the two network architectures or models
Peer to peer & client sever
1.3.3 E)
What is client-sever architecture
a network consiting of terminals known as client connected to a sever. A sever is a powerful central computer, holds all important recoures clients can request to use sever.
1.3.3 E)
What is the adv / davs of client-sever architecture
A) more secure as stored in one place, central backups, data & resources shared between clients
D) relativly expensive, dependant on svr, trained staff needed for maintance
1.3.3 E)
What is peer to peer archirecture
a network in which computers are connected to eachother. share files each device works as a client and a server. Requesting & providing data & rescources. used in piracy as impossible to track origin of file.
All computers have equal level of authority
1.3.3 E)
What is the adv / davs of peer to peer architecture
A) cheaper, users can share resouces, ez to maintain, not dependant on central svr, no specialised staff needed
D) impossible to trace origin of file, seperate backups, poor security, may be difficult to locate resouces.
Define backbone
Dedicated high transmission rate network connection between geographical locations
Name the parts of the URL
http://www.mck.edu.au/subjects/IPT
http = protocol
www = resource is a webpage
mck = domain name
.edu top level domain
.au geographical domain
/ipt directory / file path / resource
Switch vs hub
Hub sends data to all devices and switch sends depending on MAC address preventing collions
Whats a switch
Switch connects computers together on a LAN it recieves and sends data depending on the MAC address
Whats a hub
Hubs send data too all connected devices
What is a bridge
provides a link between two LAN’s for example allowing for a student network to interact with an admin network.
What is a standard
Standards are agreaments to enture hardware and software can work together.
How does DNS work too translate an domain name into an IP
1) The user enters a web address or domain name into a browser
2)Browser sends message to network to find out which IP or network address the domain corresponds too
3) This is usually managed by the IPS
4) if the local ISP doesn’t have an answer it will then ask root name servers then top level domain server
5) A record of the domain is stored in cache so that next time it will be quicker
(Customers enter) domain name and this is sent to DNS servers.
• DNS servers map this domain to an IP address
• If the DNS server can’t resolve, it passes the request (recursively) to another DNS server.
• DNS Server sends the IP address to browser…
… so it can retrieve the website from server on which it is hosted.
Why is having logical layer and physical layert separated good
Physical layer can be changed without having to rewrite logical layer
What is a server
a device which provides a central point of control / access
Why is server side checking importing
Prevent malicious code (SQL injection)
prevent non valid data input
client side processing can be modified and not shown on client side