1.5 Network Topologies And Protocols Flashcards

1
Q

Authentication

A

Method for confirming users’ identities often by checking if their username exist and then there subsequent password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Process of turning data from a human readable format to a non human readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall

A

a software or hardware used in a network to prevent external users gaining unauthorised access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC address

A

a hardware address that uniquely identifies each node on the network,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet

A

A standard communication protocol used in most lans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethernet work

A

data is sent in frames -> node will wait for connection to be quiet before sending -> if 2 nodes try send data at the same time they will stop and wait a random amount of time before reattempting -> faulty frames are rejected and resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethernet frame

A

source and destination address, data and crc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP/IP

A

Protocol that connects computers to the internet and tells computers how to exchange information over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP

A

provides reliable ordered and error checked delivery of a stream of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP

A

rules used to pass packets from one host to another using the best route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

A

the protocol used for transmitting web pages over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTPS

A

encrypts http traffic with ssl or tls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMTP

A

protocol used to send electronic mail from server to serve pr on the internet -> message is removed from mail server once received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IMAP

A

protocol used by email clients in communicating with email servers. Leaves a copy of the message on the mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTP

A

a protocol that inclusively used for sending files from a host to a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP

A

a standard for retrieving email from an email server

17
Q

TCP/IP Layers

A

Application -> adds the protocol that is used
Transport -> splits data into packets and gives them order
Network -> attaches IP address of sender and recipient
Link -> attaches the MAC address of the sender and recipient

18
Q

Protocols

A

Set of communication standards that govern the transfer of data

19
Q

Packets

A

information broken down into single units of data containing the source data and destination

20
Q

Channels

A

there is 22Mhz division of a frequency band where signals can be sent

21
Q

2.4Ghz Advantages and Disadvantages

A

Slower than 5Ghz
Greater range and coverage than 5Ghz
More interference from overlapping devices on the three channels

22
Q

5Ghz advantages and disadvantages

A

Faster than 2.4Ghz
less crowded with 23 non lapping channels
Fewer devices can use 5Ghz
Less able to penetrate through walls

23
Q

Asymmetric encryption NEW

A

Two keys, a public key is known for everyone for encrypting and a private key for decrypting - also known as public key encryption

24
Q

Symmetric encryption

A

Same key used to encrypt and decrypt a message

25
Q

Star network

A

central switch with many computers connected to it -> cheaper, break means problem if switch

26
Q

Full mesh network

A

Where all computers / devises are interconnected - expensive and break does not a problem

27
Q

Partial mesh network

A

where some devices and computers are interconnected, e.g not all connected to the printer - less expensive, withstand high traffic