1.3.3 Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Are the internet and the world wide web the same thing?

Explain

A

No

The internet is the service that allows computers to connect to each other, the world wide web is a collection of web pages stored on computers that are connected via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a URL?

A

The full address of an internet resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a URL specify?

A

The location of the resource on the internet
The resource name
The file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the job of internet registries?

A

They hold records of all of the possible domain names that are in use and available for purchase.

They assign an IP address to a domain name and track which addresses are assigned to which names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give some examples of TLDs?

A

.uk
.fr
.de

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of some 2LDs.

A

.co
.sch
.gov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a fully qualified domain name contain?

A
  • Host server name
  • Website name
  • Domain suffix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a fully qualified domain name and a website domain name?

A

A website domain name does not include the host server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the makeup of a fully qualified domain name.

A

[HOST].[WEBSITE NAME].[2LD].[TLD]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does IP address stand for?

A

Internet protocol address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an IP address

A

A unique address that is assigned to a network device

Indicates where data has originated from and where it is to be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a wide area network?

A

A network of inter-connected networks spread over a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do wide area networks depend on?

A

Third party carriers to provide connections

e.g. cable under Atlantic ocean connecting Europe and USA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a local area network?

A

A number of computers connected to each other in a close geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can users on a local area network do?

A

Use connected peripherals, such as printers

Access other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a bus topology.

A

All computers and peripherals are connected to a single cable.

There are terminators at either end of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the main advantage of a bus topology?

A

It is very cheap to install as only a single cable is required with no additional hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some disadvantages of a bus topology?

A
  • If the main cable fails, none of the computers can communicate
  • If there is heavy traffic on the network, performance will degrade
  • All computers on the network can see all of the data flowing - low security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe a star topology.

A

Each device on the network is connected via a central node which acts as a router to only send the correct information to the relevant computer,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some advantages of a star topology?

A
  • If a cable fails, only the computer that is connected via that cable cannot communicate
  • Performance does not degrade with heavy use
  • No “collisions” of data
  • Secure as messages are only sent to the computers which they are supposed to
  • Easy to add more devices to the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some disadvantages of a star topology?

A
  • They are expensive to install as they require lots of wire and a centralised router
  • If the router goes down, none of the computers can communicate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a physical topology?

A

Its actual design layout - how the system is wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a logical topology?

A

The shape of the path that data takes as it travels through the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Physical and logical topologies are _____ of each other.

A

Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Give an example of how a network may use a different logical and physical topology.

A

It may be wired as a physical star topology but data may flow using a logical bus topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a mesh topology?

A

All of the computers on the network are connected to every other computer on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How many nodes require a connection to the internet in a mesh network?

A

Only one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How do the computers in a mesh network connect to each other?

A

Wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some advantages of a mesh network?

A
  • Reduced need for cabling - wireless
  • The more nodes that are installed, the more possible routes and therefore the more redundant the network becomes
  • No central point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does “self healing” mean when talking about mesh networks?

A

If a node goes down, the traffic is rerouted using the other nodes so the system is not affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is circuit switching?

A

When a direct link between two devices is made for the duration of the communication and the information is sent down this path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a disadvantage of circuit switching?

A

Because the link made stays active for the entire time, no other connections can use this link while it is in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is an advantage of circuit switching?

A

Data arrives in the order that it is sent, meaning less processing has to happen to understand the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is packet switching?

A

When data is split up into smaller units called packets and sent separately across a network on the fastest route available at the time. The packets are combined at the end to form the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What information does the payload of a packet contain?

A
  • Actual data
  • Checksum
  • End of packet marker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What two main parts can a packet be split into?

A

Header and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What information does the header of a packet contain?

A
  • Source address
  • Destination address
  • Packet sequence number
  • Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why is the source address included in the packet header?

A

So that the receiver can verify that the packet is coming from the correct sender and request extra packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Why is the destination address included in the packer header?

A

So that the packet is sent to the correct receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Why is the packet sequence number included in the packet header?

A

So that the packets can be reassembled in the correct order and that any missing packets can be identified and requested to be resent.

(would look like 4/18 for example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Why is the protocol included in the packet header?

A

So that when the packets are received, they are processed in the correct way.

For example a packet with the SMTP protocol will be processed as an email, not a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the job of the checksum in a packet?

A

It is a hash value based on the data in the packets.

When packets are received, if the calculated hash value does not match the data in the packet it will be assumed to be corrupted and a new copy will be requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does the end of packet marked do in a packet?

A

Denotes the end of the packet so that the computer does not read more data as the same packet.

44
Q

How could the shortest route that a packet could take be calculated?

A

Using a path finding algorithm, such as Dijkstra’s shortest path.

45
Q

What happens if a data packet does not make it to its destination?

A

It can be requested again

46
Q

Why is packet switching so reliable?

A

Because if one or more routes in the network are down, there are many other routes that packets can take instead.

47
Q

What is a router?

A

A networking device that connects two LANs, two WANs or a LAN to an ISP.

It reads the destination IP address of packets that come through it and forwards them to the recipient via the fastest path available and through many other routers.

48
Q

What do packets pass through as they are sent from one direction to another?

A

Many routers that send the packets to more routers until it reaches its destination.

49
Q

What is a “hop”?

A

The act of traversing between one router and another through a network.

50
Q

What is a routing table?

A

A store of the locations of other network devices, used to calculate the shortest route for a packet to take to its destination.

51
Q

Why can the routing algorithm used to decide the shortest path become a bottleneck in heavy traffic

A

Because the algorithms are often very complicated and therefore take time to process.

52
Q

What is a network interface card?

A

Hardware inside a computer that sends and receives electrical signals, allowing the computer to connect to the internet.

53
Q

What is a MAC address?

A

A unique, 48 bit identifier that is coded to the network interface card by its manufacturer to uniquely identify the device.

54
Q

How is a MAC address written?

A

In 12 hex digits.

e.g. 00-09-5D-E3-F7-62

55
Q

What is a gateway?

A

A network device that takes only the raw data from a packet and adds new header data in the form of a new protocol before sending the packet on its way, like a router.

56
Q

What is a switch?

A

A network device that connects other devices which are on the network.

They send packets that have been received to the correct destination computer only.

57
Q

What is a hub?

A

A network device that connects other devices which are on the network.

They broadcast the received data to all computers on the network and only the correct destination will accept the signal.

58
Q

What is a wireless access point?

A

A device that outputs a WiFi signal so that devices can connect to it.

59
Q

Give a pro and con of using copper cabling?

A

It is cheap to implement.

It is slower than fibre optics

60
Q

Give a pro and con of using fibre optics?

A

Greater data capacity + faster

Expensive

61
Q

Give a pro and con of using wireless networking?

A

Very flexible as user is not required to be physically connected

New security threats

62
Q

What is a protocol?

A

A set of rules which define common methods of data communication.

63
Q

Why do protocols have to be standard across all devices?

A

So that when data is received, it is processed in the correct way and is not misinterpreted.

64
Q

What is the TCP / IP stack?

A

A stack of networking protocols that work together to transmit and process data across the internet.

65
Q

What are the 4 layers of the TCP / IP stack?

A
  • Application
  • Transport
  • Internet
  • Link
66
Q

What is the job of the application layer in the TCP / IP stack?

A

Packages data using the required protocol for the application using the data and then sends them to the transport layer.

For example if the application was a browser, it may select HTTPS as a protocol and package the data in this way.

67
Q

What is the job of the transport layer in the TCP / IP stack when sending data?

A

Makes a connection with the recipient computer, splits the data into packets and labels them with the packet number, the total number of packets and the port through which the packet should route.

68
Q

Why is the port added to the packets in the transport layer?

A

So that the packets are sent to the correct application on the destination computer.

e.g. port 80 is commonly used by the HTTP protocol

69
Q

What does the transport layer do when receiving data?

A

Requests re-transmission of lost packets.

Acknowledges the receipt of packets.

70
Q

What is the job of the network layer in the TCP / IP stack when sending data?

A

Adds the source and destination IP addresses which together with the port, form a socket.

Sends routes data from origin to destination.

71
Q

What is the network layer often sometimes referred to as?

A

The internet layer

72
Q

What layer of the TCP / IP stack to routers operate on?

A

The network / internet layer

73
Q

What is a socket?

A

The complete address of where the data needs to go.

To which device and to which port on that device.

74
Q

What is the job of the link layer in the TCP / IP model?

A

The physical connection between network nodes.

MAC addresses are added at this layer so that the data can be sent to the correct piece of hardware.

75
Q

How does data move between the layers of the TCP / IP model as it is “hops” between routers?

A

It moves between the bottom two layers.

Data is initially given a destination IP and the MAC address of the first router to send to. When it arrives, it is given a new MAC address of the new router to send to. This continues until the destination router is reached.

76
Q

How do all of the layers of the TCP / IP stack work together to send and recieve data?

A
  • Packaged by application layer (1)
  • Split into packets, numbered + port added based on application (2)
  • IP addresses added to form socket (3)
  • MAC address of next hardware added + sent to this device (4)
  • Next router calculated from IP address (3)
  • MAC address changed + sent to this device (4)
    (Process continues until destination network reached) (3/4)
  • Data arrives on correct hardware in correct port for desired application (4)
  • MAC address stripped (4)
  • IP addresses removed (3)
  • Port stripped (2)
  • Packets reassembled in correct order (2)
  • Data passed to correct application to be presented to user (1)
77
Q

What does FTP stand for?

A

File Transfer Protocol

78
Q

What is FTP?

A

A very efficient method of transferring data across a network.

Well suited to transferring large files for example a software update or a photographer uploading lots of photos.

79
Q

What does POP stand for?

A

Post Office Protocol

80
Q

What is POP?

A

When emails are retrieved from the email server, they are transferred to local storage on your device and deleted from the server.

81
Q

What is a disadvantage of POP?

A

You can only have an email on a single device, they do not synchronise across multiple devices.

82
Q

What does IMAP stand for?

A

Internet Message Access Protocol

83
Q

What is IMAP?

A

When emails are retrieved from the email server, they are stored locally on the device but NOT deleted from the server.

84
Q

What is an advantage of IMAP?

A

Emails can be synchronised across multiple devices.

85
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

86
Q

What is SMTP?

A

A protocol used to transfer outgoing emails from one mail server to another or from an email client to the server when sending mail.

87
Q

What is a firewall?

A

A hardware or software checkpoint that data must pass through in order to get into a network.

Data is checked against preconfigured rules and either accepted or rejected from the network

88
Q

Give an example of how network interface cards may be used to create a firewall?

A

Incoming data is recieved by one NIC with another NIC connected to the internal network.

Any data that attempts to pass between these cards is analysed against packet filters.

89
Q

What is packet filtering?

A

When packets are tested against rules to see if they will be allowed access to the network.

90
Q

What are some common rules of packet filtering?

A
  • If the source IP address is on a whitelist / blacklist
  • If the port is to a port that has been blocked, such as a remote access port
  • If the checksum does not match the hashed value of the packet data
91
Q

What is the difference between dropping and rejecting a packet?

A

When a packet is dropped, it is quietly removed whereas a rejected packet causes a rejection notice to be sent back to the sender.

92
Q

What is a proxy server?

A

A server which intercepts all of the packets entering and leaving a network, appearing as the source and destination of these packets.

This hides the actual network address of the real recipients / senders from the rest of the internet.

93
Q

How can a proxy server make use of caching to speed up website access times?

A

It can maintain a cache of commonly visited website pages and allow the user to access them without having to retrieve them through the internet.

94
Q

How many users may a proxy server serve?

A

Hundreds or thousands

95
Q

How could a proxy server be used in a school?

A

Data that would be undesirable or potentially unsafe can be filtered out as it passes through the proxy in accordance with the school’s policy.

User data may be logged with their requests.

96
Q

What is the similarity between a worm and a virus?

A

Both are malicious software that have the ability to self replicate by spreading copies of themselves.

97
Q

What is the difference between a worm and a virus?

A

A virus requires host files to be opened in order to spread themselves whereas a worm can self replicate without any user interaction.

98
Q

What do viruses do when they run in a computer?

A

They reside in the memory and can infect any other file that is copied into memory. Here they can cause loss or damage to data files as well as major inconvenience, such as crashes.

99
Q

What do worms do when they run in a computer?

A

They self replicate and can send themselves to other users for example by email.

They can use up bandwidth, system memory or network resources, causing systems to slow and servers to stop responding.

100
Q

Where could viruses commonly be hidden?

A

Inside program files, such as macros in a word document.

101
Q

Where could worms commonly be hidden?

A

Within a data file with the user being tricked into opening the file, such as an email attachment.

102
Q

What is a trojan?

A

Malicious code, hidden inside another file such as a game download.

Trojans do not often appear to have had any affect but open back doors in your system that the creator of the Trojan can then exploit.

103
Q

What can a backdoor into your system allow other users to do?

A
  • Access your personal information

- Use your computer power to send spam emails

104
Q

What is the difference between a Trojan and viruses and worms?

A

Trojans cannot self replicate.

105
Q

What are some common system vulnerabilities?

A
  • Passwords (Can be guessed, found out or manipulated out of people)
  • No virus protection
  • Disabled firewall
  • “Cracks” in software where data is passed between functions
106
Q

How can computers be protected against threats?

A
  • Encryption
  • Multiple credentials + more secure credentials such as biometrics
  • Firewalls
  • Proxies
  • Good quality code which does not overflow the buffer in memory