1.3.3 - Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a protocol?

A

A set of rules to control and govern communication between devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a network

A

Two or more devices that are interconnected and can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a standard

A

A set of hardware and software specifications that allow manufacturers to create products and services that are compatible with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an IP Address?

A

A numerical address made of 4 numbers each between 0 and 255 that uniquely identifies a device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a MAC address

A

‘Media Access Control’ addresses
which are unique to a device that are used to identify each device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain how the Domain Name System (DNS) plays a role in websites being loaded.

A
  • DNS is used to resolve IP corresponding to URL
  • Request sent to DNS resolver.
  • Resolver checks its cache and if it doesn’t hold the URL, it passes it in to the TLD Name server which checks its cache and returns the answer or passes it on to the Authoritative Name Server.
  • The IP address is returned back up to the requesting client Or an error if no resolution can be found.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a LAN?

A

‘Local Area Network’- A group of devices connected over a small geographical area. The infrastructure is usually owned by the network owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a WAN?

A

‘Wide Area Network’ - Collection of connected computers/devices over a large geographical area often using 3rd party communications channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is more secure LAN or WAN

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the structure of a data packet

A
  • Header: Sender’s/transmitting IP address, Receiver’s/destination IP address, Protocol, Packet number and order, i.e. the place of the packet in the complete message.
  • Payload: The actual data file to be transmitted.
  • Trailer: End of packet marker, Error correcting code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain what is meant by packet switching

A
  • Data is split into chunks called packets which have labels including address being sent to and the order its arranged into.
  • Each packet is sent on the most convenient route meaning they may arrive in a different order to which they were sent.
  • Once packets arrive at receiver they are reordered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain what is meant by circuit switching

A
  • Physically connects devices together
  • Devices remain connected for the duration of data transmission.
  • Establishes a route before transmission between the two computers for the duration of the message.
  • Sends all packets on the same reserved route down the circuit in order.
  • Packets remain in correct order but must be reassembled at the destination.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls

A

A computer application used in a network to prevent external users gaining unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proxies.

A

A computer application that has accesses to data on a different computer system or network. It controls the access of unauthorised. users to data and allows the operation of the system to be isolated from control by external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

The process of making data in a computer system unintelligible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP Stack

A

Transmission Control Protocol / Internet Protocol:

The most common general-purpose standard protocol that allows any networked computers (including those on the internet) to communicate with each other no matter their equipment.

17
Q

Protocol Layering

A

The concept of a protocol not simply being a set of rules, but those rules being built up into very specific layers and those rule layers behind build on top of each other in a deliberate order creating a layered protocol stack. This results in the rules of a protocol being executed in a specific sequence as you move through the protocol stack.

18
Q

DNS

A

Domain Name System
- DNS is used to resolve IP corresponding to URL
- Request sent to DNS resolver.
Resolver checks its cache and if it doesn’t hold the URL, it passes it in to the TLD Name server which checks its cache and returns the answer or passes on to the Authoritative Name Server
- The IP address is returned back up to the requesting client or an error if no resolution can be found

19
Q

2 Types of Network Topology + Examples

A
  • Physical - The physical layout of wires and components that form a network. E.g. Bus, Star, Mesh
  • Logical - The layout which shows how data flows. E.g. LAN and WAN
20
Q

Physical Bus Topology (Hint - ABB Bus)

A

All the terminals (devices) are connected to a backbone cable, the ends of which are plugged into a terminator

21
Q

Advantages of Bus Topology

A
  • Relatively inexpensive to set up
  • Doesn’t require any additional
    hardware
22
Q

Disadvantages of Bus Topology

A
  • If backbone cable fails, the entire
    network gets disconnected
  • As traffic increases, performance
    decreases
  • All computers can see the data
    transmission
23
Q

Physical Star Topology

A
  • Star topologies use a central node, often a switch, to direct data through the network.
  • MAC addresses are used to identify each device on the network.
24
Q

Advantages of Star Topology

A
  • Performance is consistent even with
    heavy network traffic
  • If one cable fails, only that single
    terminal is affected
  • Transmits data faster, giving better
    performance than bus topology
  • Easy to add new stations.
  • No data collisions
25
Q

Disadvantages of Star Topology

A
  • Expensive due to switch and cabling
  • If the central switch fails, the rest of
    the network fails
26
Q

Physical Mesh Topology

A

Disadvantages of Star Topology

27
Q

Advantages of Mesh Topology

A
  • If using a wireless network, there is
    no cabling cost
  • As the number of nodes increase,
    the reliability and speed of network
    becomes better
  • Nodes are automatically
    incorporated
  • Nodes don’t go through a central
    switch, improving speed
28
Q

Disadvantages of Mesh Topology

A
  • If using a wireless network, devices
    with wireless capability (which
    increases cost) must be purchased
  • If using a wired network, a large
    quantity of cable is required
    compared to other network
    topologies like bus and star. This is
    expensive.
  • Maintaining the network is difficult
29
Q

Client Server

A

Terminals known as clients connected to a server. The server is a powerful, central computer. The server holds all of the important information and resources and has greater processing power than the terminals. Clients can request to use the server.

30
Q

Advantages of Client-Server

A
  • More secure as data is stored in one
    location
  • Central backups are carried out so
    there is no need for individual
    backups
  • Data and resources can be shared
    between clients
31
Q

Disadvantages of Client-Server

A
  • Relatively expensive to set up
  • Functionality of terminals depends on the server; if this fails, performance falls
  • Trained staff are required to maintain the server
32
Q

Peer to Peer Server

A
  • A network in which computers are connected to each other so that they can share files.
  • Each device effectively acts as both a server and client, as it can both provide and request
    resources.
  • Peer-to-peer networks are used in piracy, since it’s almost impossible to trace
    the origin of files.
33
Q

Advantages of Peer-to-peer

A
  • Cheaper to set up
  • Allows users to share resources
  • Easy to maintain
  • Not dependent on a central server
  • Specialist staff are not required
34
Q

Disadvantages of Peer-to-peer

A
  • Impossible to trace the origin of files
  • Backups must be performed
    separately
  • Poorer security
  • May be difficult to locate resources