5 - Fundamentals of Computer Networks Flashcards

Yes

1
Q

Network

A

An interconnection of computers and other pieces of hardware to facilitate communication and the sharing of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network adv and dis

A

Adv:

  • Resources such as printers, internet connections and files can be shared, saving both money and effort
  • Communication can take place via email or instant messaging
  • Backing up data to a different computer is far more straightforward

Dis:

  • Management of a network is a specialist skill, which can be quite expensive
  • Security procedures are needed to prevent unauthorised access to a potentially large number of computers
  • Network hardware, including cables and switches, can be expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAN

A

Personal Area Network

This describes devices owned by a single user, connected via Bluetooth, such as a phone, tablet and headset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAN

A

Local Area Network
This is a network covering a single building or perhaps a campus. Usually, a single organisation owns all hardware that belongs to a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAN

A

Wide Area Network
This would be spread over a large geographical area, with shared ownership of some hardware (a telecommunications company might own much of the cabling). The Internet is the largest example of a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wired Vs Wireless

A

Wired:

  • More secure, as physical connection is needed, so a hacker would need to be in the building
  • Less prone to interference

Wireless:

  • Much easier to add a device
  • No requirement to stay in the same place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connection Media: Wireless

A

Radio Waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Connection Media: Wired

A

Optical fibre
Can be used for very fast connections, or if lots of computers are going to share a single connection

Copper cabling
Cheaper and slower, although it is quick enough for most activities that a single computer would perform online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Topology

A

The pattern in which the hardware on a network is positioned, including connections. Common topologies include star and bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Topology: Star

A

Every device is connected to a switch at the centre of the network. All communication travels via this switch

Adv:

  • Very few data collisions, since each device has a dedicated line to the switch
  • Strong, centralised security

Dis:

  • Lost of cabling needed
  • If the switch has no spare ports, adding another device can be difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Topology: Bus

A

A central cable called the backbone, running between two terminators, connects all devices

Adv:

  • Uses relatively little cable, making it quite inexpensive
  • Additional devices can be easily added

Dis:

  • Collisions can occur, as multiple transmissions will attempt to use the shared backbone
  • If a large number of devices are connected, network transmission can be slow (due to collisions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol

A

A set of rules that governs how a computer communicates on a network. Computers have many protocols, each necessary for a different purpose (email, accessing web pages, moving files, etc.). Without protocols, communication between computers would be impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocol: Ethernet

A

A family of protocols rather than a single protocol

This is a set of rules that governs how data is formatted for transmission across a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protocol: Wi-Fi

A

Letters aren’t short for anything, but are a brand name

These rules control how data is transmitted on WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protocol: TCP/IP

A

Transfer Control Protocol and Internet Protocol
These are 2 protocols that often work together
Their collective roles is to break up data into packets, each of which is a chunk of data that knows where it has been sent from and where it is to be delivered to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protocol: UDP

A

User datagram protocol
Transmits data packets very quickly, but without checking to see whether each packet has arrived, so is not always reliable

17
Q

Protocol: HTTP

A

Hyper text transfer protocol
This is the set of rules governing how hypertext (language of the WWW) is moved around the Internet, from device to device

18
Q

Protocol: HTTPS

A

HTTP Secure
This encrypts data that is sent across the internet. Encrypted data cannot be read if intercepted, so is favoured when sending passwords or credit card numbers

19
Q

Protocol: FTP

A

File transfer protocol
This is how files are moved from 1 computer to another across the internet. This protocol is heavily relied upon in building websites, moving files from the dev’s comp to a server, from where they can be accessed publicly

20
Q

Protocol: SMTP

A

Simple mail transfer protocol

While POP3 might be used to retrieve emails, SMTP is used to send them from one server to another

21
Q

Protocol: IMAP

A

Internet message access protocol

This email protocol is used to allow multiple devices (laptops, tablets, phones, etc.) to access the same email account

22
Q

Internet protocol address

A

A unique number used to identify every device connected to the internet. No 2 IP addresses are the same. If your computer requests a web page, your computer’s IP address specifies where that web page should ultimately be delivered

23
Q

Authentication

A

Measures to make sure that a person trying to access data is who they say they are. This can take place by way of:

  • Usernames and passwords
  • Memorable info, such as mother’s maiden name
  • Checking that they are using a recognised IP address
24
Q

Encryption

A

Scrambling data using a key to ensure that is makes no sense to anyone who intercepts it. When it is received, the recipient also has a key which can be used to decrypt the data, returning it to its readable form

25
Q

Firewalls

A

These can be either hardware, software or both. A firewall can be told to block certain traffic (such as all emails or any traffic from a suspect IP address) or to only allow certain traffic (such as from a single, trusted device), blocking everything else

26
Q

MAC address filtering

A

Each computer has a MAC (Media Access Control) address which, unlike an IP address, cannot be changed. Based on this unique identifier, specific devices can be either permitted onto, or blocked from, a network

27
Q

TCP/IP model

A

A series of protocols. When they work together, they transmit data from one computer, through any number of pieces of network hardware, to another computer. The TCP/IP model is a concept, not a physical thing

The model has 4 layers, each containing a n.o of protocols. When data is sent, protocols at 1 layer break down and repackage the data into smaller unity, before passing the data to the layer below. When data is received, those units are reassembled as they move up the model

28
Q

Application Layer

A

Where network apps, including browsers and email apps, operate

Protocols: HTTP, HTTPS, FTP, SMTP, IMAP

29
Q

Transport Layer

A

Establishes comms between the sender and the recipient, agreeing on how comms will take place

Protocols: TCP, UDP

30
Q

Network Layer

A

Packages data for transmission by breaking it into units called packets, which are sent across the network

Protocols: IP

31
Q

Network Interface Layer

A

The physical components of the computer, such as the NIC, operate at this level

Protocols: Ethernet, Wi-Fi