3.5 Networks Flashcards

1
Q

What is required for a computer network?

A

Two or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the network formed?

A

Either wirelessly or through cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a network?

A

To Exchange information and data between other devices and to share recources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a network?

A

A computer network is created when two or more computers are connected through a connection either physically or wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the internet?

A

It is a connection of networks, no one person or organisation owns the internet - this is know as collective or distributed ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the world wide web?

A

A service which is offered on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Networks: Benefits

A

Data sharing, collaboration
Security
Communication
Remote access
Roaming (same computer no matter where you log in)
Centralised management
Files are saved to a network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Networks: Risks

Or disadvantages

A

Data breaches
Viruses
Malware
Expensive
Network speed could slow down
Hacking
Reliant on hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PAN

A

Personal Area Network - connects electronic devices within a user’s immediate area, it only ranges a few meters (an example would be Bluetooth)
A PAN is anywhere in the world as long as you are there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local Area Network - a computer network within a limited area
A LAN operates across a small geographical area such as a school, hotel using their own cabling using their own cabling or wireless
A LAN is owned and controlled/managed by a single person or organisation
A WLAN includes a router that allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WAN

A

Wide Area Network - the technology that connects your computers, data centres, cloud applications, and clouds storage together.
Operate over a wide geographical location in which the computers communicate using resources supplied by a ‘third party carrier’ such as BT
The largest WAN is the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standalone

A

A computer that is not connected to any other computer via a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Data Packet?

A
  • A small unit of information transmitted over a network, such as the internet, from one device to another
  • Each communication is split into smaller pieces called packets
  • Each packet will contain the same number of bytes
    In addition to holding the payload, each packet is marked with the packet number so that the packets can be put together by the receiver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP address

A
  • Internet Protocol - the unique identifying number assigned to every device connected to the internet
  • Like every front door in the world, every computer in the world has an IP
  • IP addresses are four 8-bit numbers (0-255) separated by dots - 32 bits in total
  • It is set in software and can therefore be changed
  • It is hierarchical* - this means that it includes network, subnet, and host components - similar to a house address
  • IP addresses are used by routers to determine the best path to the destination

*contains lots of different bits of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circuit switching

A

When you make a telephone call, a dedicated connection is set up between you and the person you are calling for the duration of the call

  • This is called ‘circuit switching’
    It works fine for phone calls, but there could never be enough lines for all the billions of people sending data across the internet

Packet switching solves this problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packet switching

A

Each packet is 512 bytes
Each packet is given a header containing:
- The IP address it is going to
- The IP address it is coming from
- The sequence number on the packet
- The number of packets in the whole communication
Error checking data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Router

A

Routers are a piece of hardware capable of routing packets from one place to another based on the IP address.
They make up the ‘backbone’ of the internet
Your home router, routes packets to the different devices on your home network
Internet routers route packets around the world like a mail sorting office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Interface Card (NIC)

A

It may be wireless with an antenna or wired with a network cable socket
It is built into networked device
Most modern computers and phones incorporate the NIC into the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAC address

A

Media Access Control (MAC) is assigned to each Network Interface card by the manufacturer
Your computer may have more than one MAC address if it has both ethernet and WiFi connection
A smartphone will have two different MAC addresses, one for WiFi, one for Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Switch

A
  • Switches connect each node (computer) in a network
  • They know the MAC address of all connected computers and devices
  • When a packet of data arrives, they can send it directly to the correct computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hub

A
  • Hubs also connect each node in a network but do not look at the MAC address.
  • They send the data to all connected computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Star Topology?

A

Computers and other devices (known as nodes) all connect to the central switch/hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Bus Topology?

A

Computers and other devices (known as nodes) are all connected to a central backbone cable
Terminators are at each end of the cable to absorb signals and prevent them reflecting back down the cable
Packets are broadcast to all devices on the network

24
Q

Advantages of a Star Topology

A
  • Better performance – as traffic increases the network performance will not be effected.
  • If one cable fails the other computers are not affected
  • No collisions – if switch is used
  • Better security (if switched is used) as data is not broadcast to all machines
25
Disadvantages of a Star Topology
- Expensive - requires additional hardware such as the central switch and network cables - Reliance on central device - if the central switch fails the whole network goes down
26
Advantages of a Bus Topology
- Cheaper to install as less cable is required - Easy to add more devices as they only need to connect to a central cable
27
Disadvantages of a Bus Topology
- The single cable is shared by many devices so there will be many ‘collisions’ of data if data is sent at the same time - If the cable is damaged, the whole network fails - Potential security risk as packets are broadcast to all devices on the network
28
What is the process of authentication?
Authentication is the process of verifying a user or device before allowing access to a system of recourses
29
What is encryption?
Encryption is encoding data so that it can no longer be easily understood - The process of converting plaintext into ciphertext
30
What is plaintext?
The original message to be encrypted
31
What is ciphertext?
The encrypted message
32
What is a key in encryption?
A sequence of numbers used to encrypt or decrypt, often data using a mathematical formula
33
What is the encryption algorithm?
The formula for encrypting plaintext Two inputs: plaintext and a secret key
34
What is a public key?
A single key is used to encrypt and decrypt a message and must be given to the recipient of your message to decrypt the data
35
What is private key encryption?
Two keys are used - one (public key) to encrypt and the other (private key) to decrypt the data This is more secure as it means that you never have to send or reveal your decryption key
36
What is a Caesar Cipher?
Each letter is replaced by a letter n positions further on in the alphabet n is the key used to decrypt the message
37
What are the most common methods of WiFi security?
WEP (Wired Equivalent Privacy) WPA (WiFi Protected Access)
38
What is a firewall?
- Checks packets entering and leaving the network to see where they are coming from and going to and what they contain - Packets that don’t match filtering rules are dropped - This is known as a packet filter - Firewalls can be run on dedicated hardware or as software
39
What is MAC address filtering?
-A Media Access Control (MAC) is a unique hex number assigned to all Network Interface Cards -A wireless router can be configured to block access to specified devices identified by their MAC addresses - This is known as MAC address filtering and can block a specific device or only allow approved devices
40
What is a network protocol?
A set of rules that allow devices to communicate / transfer data
41
HTTP
Hypertext Transfer Protocol - used for accessing and receiving web pages via the Internet - These are written in HTML (Hypertext mark-up language) - The protocol requests a web page from the web server The server then sends its response which contains the web page
42
HTTPS
secure HTTP - encrypts the information so that it cannot be understood by an eavesdropper - These days, most websites use HTTPS as they deal with personal data - Some specific types of site that use HTTPS are: ○ Banks – to prevent theft ○ Online shops – for bank and log in details ○Social networks – for log in details and personal data
43
FTP - What does it transfer?
File Transfer Protocol - used for sending or retrieving files to or from a FTP server - A graphical interface will allow files to be dragged from your computer to the server
44
SMTP - What is this protocol used for today?
Simple Mail Transfer Protocol - used for sending emails - Email software, such as Outlook, sends the email to the SMTP server used by the company or individual - The mail server then relays the message through various other servers known as mail relays - Finally, the email arrives at the destination mail server
45
POP - What is this protocol used for?
Post-Office Protocol - Used to fetch message data and attachments from your remote mail server - will download every new message to your local device and will no longer be available on the server. - This is similar to the protocol of sending a letter through a post office
46
IMAP - What is this protocol used for?
IMAP (Internet Message Access Protocol) - Used to fetch message data and attachments from your remote mail server - will leave the messages on a server. - They can be accessed by multiple devices and they are only removed if the user deletes them
47
TCP/IP Stack
A layered model that controls the different aspects of communication.
48
Application Layer
Applications such as email clients and web browsers create data to send in this layer
49
Transport Layer
The Transport layer creates the connection between two computers, or ‘hosts’ The two computers agree the communication settings and the size of the packets they will send and receive Data is then divided up into packets and given a packet number Packets are reassembled by the recipient’s Transport layer Lost packets are resent (If TCP is used) This layer uses the TCP (Transmission Control Protocol) or the UDP (User Datagram Protocol)
50
Internet Layer
Responsible for routing packets Routers operate on this layer Source and destination addresses are written on to the packets ready for transmission
51
Link Layer
This is where the physical network hardware is located. This includes: - Network Interface Cards (NICs) - Cables and Wi-Fi - The operating system’s device drivers - The MAC address is also found at this layer The Ethernet and WiFi suite of protocols operate at the link layer but are ONLY used inside the LAN HTTP, HTTPS, FTP, SMTP, POP, IMAP
52
Sending | Using TCP/IP Stack
Application - Computer application produces data for sending Transport - Splits data into packets and numbers them Internet - Attaches the source and destination IP address and passes the packets to the link layer to be sent Link - MAC address is added and packets sent along cables
53
What does a router do in the TCP/IP Stack?
Data packets are passed from one router to another on route to their destination Each router will ‘unpackage’ the packet to expose the IP address at the Internet layer The router can then make an informed decisions about which port it should send the packet from It repackages the data and sends it on its way. The process is repeated by each router until it reaches its destination
54
Receiving
Link - The link layer removes the MAC address and passes packets up to the Internet layer Internet - The Internet layer removes the IP addresses and passes packets up to the Transport layer Transport - The Transport layer reassembles the packets in order and passes the data to the Application layer Application - The Application layer uses the correct protocol to correctly display the data, web page or email for the user
55
What is the advantages of network layers?
Layers are self-contained – developers can concentrate on one aspect of the network The functionality of one layer can be changed without affecting the functionality of other layers Ensures interoperability between providers and systems - This means that manufacturer’s routers operating on the Internet layer, will operate with another manufacturer’s Network Interface Cards (NICs) operating on the Link layer
56
What is a network layer?
A division of network functionality Each layer has its own specific functions to perform Operates independently of any other layer