4.9.2 Networking Notes Flashcards

1
Q

How does a client server network work?

A

• In a client-server network, one or more central servers provide services to the clients on
the network.
• Servers are connected to the network in the same way as clients, but are
often more powerful machines than the clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are servers different to clients/

A

Servers are often more powerful machines than the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a client server network work?

A

• The clients on the network request services from the servers, which then respond to the
client with the requested service.
• Services provided by servers in a client-server network could include file storage as well as management of emails, user accounts and print
queues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some services provided by servers in a client server network?

A

Services provided by servers in a client-server network
could include file storage as well as management of emails, user accounts and print
queues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a disadvantage of peer to peer networking?

A

• All of the clients which provide services must be running in order for the network to be fully operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an advantage of peer peer to networking?

A

• Peer-to-peer networking is more cost effective than client-server
networking as there is no need for a powerful server to provide services
• Peer-to-peer networks are easier to set up and maintain than their client-server
counterparts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where are peer to peer networks used?

A

• Large file sharing networks and multimedia providers use peer to peer networking to provide high performance services without the requirement for a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are peer to peer networks more cost effective?

A

There is no need for a powerful server to provide services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does wireless networking allow for?

A

Clients to communicate within a network without being physically connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do wireless networks require?

A

Wireless networks require a wireless access
point, which connects to a wired network just like
any other client would, and a wireless network adapter in the device that connects to the wireless
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is WiFi used for?

A

Used to provide wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is WiFI?

A

WiFi is widely used to provide wireless networks
and refers to a wireless local area network that is
based on international standards.

This allows a
device made in one part of the world to connect seamlessly to wireless networks all over
the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does WiFI allow for?

A

This allows a
device made in one part of the world to connect seamlessly to wireless networks all over
the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does WPA stand for?

A

WiFi protected access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of WPA?

A

Requires that a new wireless client enters a password in order to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are wireless networks secured?

A

Secured by encrypting transmitted data using WPA or WPA2.

17
Q

What is SSID?

A

Service Set Identifier.

Name which identifies a wireless network

18
Q

What are the various methods of securing a wireless network?

A
  • Encrypting transmitted data using WPA or WPA2
  • Disabling SSID broadcast
  • Setup a MAC address filter.
19
Q

What is MAC address filter?

A
  • Mac addresses are assigned to every wireless device by their manufacturer and are unique to that device.
  • MAC address whitelists can be created to allow only specific devices to connect to a network.
  • Mac address blacklists can be used to block specific devices from connecting to a network.
20
Q

What does MAC stand for?

A

Media Access Control

21
Q

What is CSMA/CA?

A

Carrier sense multiple access with collision avoidance.

• A protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously.

22
Q

What is a protocol?

A

Set of rules relating to communication between devices.

23
Q

What is the purpose of CSMA/CA?

A

Protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously.

24
Q

How does CSMA/CA work?

A
  • When a device is ready to transmit, it listens to its communication channel to check whether it is idle.
  • If so then the data is transmitted.
  • if the channel is busy, the device waits for a random period of time before checking the channel again.
  • An exponential backoff algorithm can be used to increase the time period for which the device waits with each check of the channel.
25
Q

What is the purpose of the exponential backoff algorithm?

A

Used to increase the time period for which the device waits with each check of the channel

26
Q

What occurs if the communication channel is idle?

A

Data is transmitted

27
Q

What occurs if the communication channel is busy?.

A

Device waits for a random period of time before checking the channel again.

28
Q

What is CSMA/CA effective at?

A

Eliminating collisions in small networks

29
Q

What is an issue with CSMA/CA?

A

it cannot overcome hidden nodes

30
Q

What is the hidden node problem?

A

A problem that arises when the device checking for an idle channel cannot see some parts of the network on which communication may be occurring.

31
Q

How do you get around the problem of hidden nodes?

A

A protocol called request to send/clear to send ( RTS/CTS ) is used.

32
Q

How does RTS/CTS work?

A
  • Protocol adds an additional step into the CSMA process.
  • Once the transmitting device has checked whether the channel is idle, it sends a ‘request to send’ message to the server.
  • If the server is idle, it will respond with a clear to send message at which point the transmitting device can begin communication with the server.
  • If no clear to send message is received, the server is busy communicating with a hidden node and the transmitting device must wait before starting the CSMA process again
33
Q

What occurs with RTS/CTS if the server is idle?

A

It will respond with a clear to send message at which point the transmitting device can begin communication with the server.

34
Q

What occurs with RTS/CTS if no clear to send message is received?

A

The server is busy communicating with a hidden node and the transmitting device must wait before starting the CSMA process again.