1.3.3 Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

characteristic of a network

A

A network is the name given to two or more computers connected together with the ability to transmit data between each other. There are two main types of networks: local area networks and wide area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LAN

A

Local area network (or LAN) is the name given to a network which is spread over a small geographical area or a single site, for example: a school.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN

A

A wide area network (or WAN) is the name given to a network which is spread over a large geographical area. Large corporations with offices in multiple locations will often have a WAN allowing them to communicate between different sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protocols

A

A protocol is a set of rules defining how two computers communicate with each other.
Protocols are standard so that all devices have a designated method of communicating with each other, regardless of manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

НТТР

A

(Hypertext Transfer Protocol) - Used for web page rendering, an encrypted version, HTTPS (Secure), is becoming more common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP/IP

A

(Transmission Control Protocol / Internet Protocol) - This is a networking protocol used in the routing of packets through networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POP3

A

(Post Office Protocol) and IMAP (Internet Message Access Protocol) - Mailing protocols, used for email access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP

A

(File Transfer Protocol) - Used for the transmission of files over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Internet Structure

A

The Internet is a network of networks which allows computers on opposite sides of the globe to communicate with each other. Continents are connected to each other using large international backbone cables.
Many of these pass underwater, linking continents to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The TCP/IP Stack and protocol layering

A

TCP/IP stands for Transmission Control Protocol / Internet Protocol. A stack of networking protocols that work together passing packets during communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application Layer

A

• The application layer is based at the top of the stack. It specifies what protocol needs to be used in order to relate the application that’s being sent.

• For example, if the application is a browser then it would select a protocol such as HTTP, POP3, FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transport Layer

A

• The transport layer uses TCP to establish an end-to-end connection between the source and recipient computer.

• The transport layer splits data up into packets and labels these packets with their packet number, the total number of packets the original data was split up into and the port number being used for communication

• If any packets get lost, the transport layer requests retransmissions of these lost packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Layer

A

• The network layer adds the source and destination IP addresses. (The combination of the IP address and the port number is called a socket address.)

• Routers operate on the network layer and the router is what uses the IP addresses to forward the packets.

• The sockets are then used to specify which device the packets must be sent to and the application being used on that device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Link Layer

A

• The link layer is the connection between the network devices, it adds the MAC address identifying the Network Interface Cards of the source and destination computers.

• For devices on the same network, the destination MAC address is the address of the recipient computer, otherwise, it will be the MAC address of the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The TCP/IP Stack and protocol layering

Stack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On the next page is a diagram showing exactly what happens in the process of sending a file.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

LANs and WANs

A

As specified earlier, a LAN is a local area network and a WAN is a wide area network. A LAN is a network spread over a small geographical area while a WAN is typically spread over a large geographical area.

Usually, a WAN will require extra telecommunication hardware. Infrastructure used in WANs is owned by third-parties. The largest WAN is the Internet, and is made up of a series of smaller networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS

A

-The domain name system (DNS) is the system used to name and organise internet resources. It is a hierarchy, in which each smaller domain is separated from the larger domain by a full stop. For example, ‘leeds.gov.uk’. TLD stands for Top Level Domain, and 2LD stands for 2nd Level Domain.

-Domain names are much easier to remember than IP addresses, which is why they are used to link to servers across the world. The role of the domain name system server (DNS server) is to translate these domain names into IP addresses when we wish to access a books

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Packets

A

Packets are segments of data.

20
Q

Header-data packets

A

• Sender and recipient IP addresses

The sender and the recipient’s IP addresses act like a postcode, allowing the packet to be delivered to the correct destination and enabling the recipient device to trace where the packet came from.

• Protocol being used
The protocol allows the recipient computer to understand how to interpret the packet.

• Order of the packets
Upon arriving at the recipient device, packets are reconstructed in the appropriate order as specified in the header.

• Time To Live / Hop Limit
The Time To Live (TTL), tells the packet when to expire so that it does not travel forever.

21
Q

• Payload
Data packets

A

Raw data to be transmitted

22
Q

• Trailer
Data packets

A

• Checksum, or cyclic redundancy check

The trailer contains a code used to detect whether any errors have occurred during transmission.

23
Q

Packet Switching

A

There are two techniques using which networks exchange data: circuit switching and packet switching.

Packet switching is a method of communication in which data is communicated using packets across a network. In this method of communication, packets are sent across the most efficient route, which can vary for each packet.

24
Q

Packet switching adavantages

A

-Multiple methods to ensure data arrives intact eg. checksums and cyclic redundancy checks

-Multiple routes can be used between devices, so if one path breaks, another can be used

-Packets can be transferred over very large networks to allow communication globally.

25
Q

Packet switching Disadvantages

A

-Time is spent deconstructing and reconstructing the data packets

-Must wait for all packets to arrive before data can be received.

26
Q

Circuit switching

A

Circuit switching is a method of communication where a direct link is created between two devices.

This direct link is maintained for the duration of the entire conversation between devices. Circuit switching requires the two devices to transfer and receive data at the same rate.

27
Q

Circuit watching advantages

A

-Data arrives in a logical order which results in a quicker reconstruction of the data.

-Enables two users to hold a call without delay in speech.

28
Q

Circuit switching Disadvantages

A

-Bandwidth is wasted during periods of time in which no data is being sent.

-Devices must transfer and receive data at the same rate

-Using switches means electrical interference may be produced which can corrupt or destroy data.

-Ties up sections of the network which cannot be used by others data until
transmission has been completed

29
Q

Network Security and Threats

Firewalls

A

A firewall is a device designed to prevent unauthorised access to a network. A firewall consists of two network interface cards (NICs) between the user and the Internet.

The firewall passes the packets between these two NICs and compares them against a set of rules set by the firewall software. The preconfigured rules are called packet filters.

30
Q

Firewall packet filtering

A

-Packet filtering / static filtering limits network access in accordance with administrator rules and policies. It works by examining the source IP, destination IP and the protocols being used as well as the ports being requested.

-When access is denied by a firewall, two things can occur. The packet can either be dropped or rejected. A rejected packet sends an alert to the sender to notify them of the error whereas a dropped packet will not.

31
Q

Firewall packet filtering

A

-Packet filtering / static filtering limits network access in accordance with administrator rules and policies. It works by examining the source IP, destination IP and the protocols being used as well as the ports being requested.

-When access is denied by a firewall, two things can occur. The packet can either be dropped or rejected. A rejected packet sends an alert to the sender to notify them of the error whereas a dropped packet will not.

32
Q

Proxies

A

A proxy server acts as an intermediary, collecting and sending data on behalf of the user.
There are several benefits of using proxies:
-The privacy of the user is protected and they remain anonymous

-The proxy server can cache frequently used website data making it faster to load

-Can be used by administrators to prevent access to sensitive or irrelevant information at work or at school

33
Q

Encryption

A

Encryption is a way of keeping data secure when transmitting it over the Internet. Encryption makes data unreadable if it is intercepted. Data is encrypted and decrypted using a set of keys.

34
Q

Network Hardware

A

Maintaining a network requires various pieces of hardware, some of which are built into devices, such as a network interface card (NIC) while others, like switches, are not.

35
Q

Network interface cards (NIC)

A

-A network interface card is the card required to connect a device to a network.

-This is usually built into the device and assigns a unique media access control (MAC) address to each device. The MAC address is a 48-bit value coded into the device and is usually written as a twelve digit hexadecimal number.

36
Q

Switch

A

A switch is a device used to direct the flow of data across a network. Switches are most commonly used in networks using a star topology.

37
Q

Wireless Access Point (WAP)

A

This is a device which allows a device to connect to a network. It is more commonly combined with a router to enable internet access. These are used in mesh networks.

38
Q

Routers

A

A router is used to connect two or more networks together. Routers allow private, home networks to connect to the Internet.

39
Q

Gateway

A

A gateway is used when protocols are not the same between networks. It translates the protocols so that networks can communicate with each other.

Gateways work by removing the header from packets before adding the data to packets using the new protocol.

40
Q

Client-server

A

Client-server networks consist of terminals known as clients connected to a server.

The server is a powerful, central computer.

The server holds all of the important information and resources and has greater processing power than the terminals.

Clients can request to use the server.

41
Q

Advantages of Client-server

A

• More secure as data is stored in one location

• Central backups are carried out so there is no need for individual backups

• Data and resources can be shared between clients

42
Q

Disadvantages of Client-server

A

-Relatively expensive to set up

-Functionaliy of temer depends
on the server; if this fails, performance falls

-Trained staff are required to maintain the server

43
Q

Peer-to-Peer

A

-A network in which computers are connected to each other so that they can share files

-Each device effectively acts as both a server and client, as it can both provide and request resources.

-Peer-to-peer networks are used in piracy, since it’s almost impossible to trace the origin of files.

44
Q

Advantages of Peer-to-peer

A

-Cheaper to set up

-Allows users to share resources

-Easy to maintain

-Not dependent on a central server

-Specialist staff are not required

45
Q

Disadvantages of Peer-to-peer

A

-impossible to trace the origin of files

-backups must be performed separately

-poorer security

-may be difficult to locate resources