Basics Flashcards

1
Q

what is a computer network?

A

a computer network is a system of interconnected computers and other devices that can communicate with each other and share resources.
a computer network can be wired or wireless

these devices include : computers,servers,routers,switches etc..

computer network also allow for implementation of VoIp and cloudcomputing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are servers,routers and switches?

A

a server helps other computers and devices by sharing information,storing files or running programs that other devices can use.it provide services like webhosting,database management etc..

a router is like a traffic manager who helps data packets to find the best route to reach their destination. a router is like a GPS that helps you to find the best route

a switch is a networking device that connects multiple devices on a local network and enable them to communicate with each other.it serves as a mailman who deliver the datapackets to the right computer by looking at its address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are different types of computer networks

A

Local area network(LAN)
a Lan connects computers and devices in a limited geographical area such as a home, office or school

Wide area network(WAN)
a Wan connects computers and devices across a large geographical area such as a city,country or even continents

Metropolitan area network(MAN)
a Man is a network that connects computers and devices in a geographic area that covers a city or town

Wireless local area network(WLAN)
a Wlan is a type of Lan that uses wireless technology such as wifi

Personal area network(PAN)
a Pan is a network that connects devices in a person’s immediate vicinity like smartphone,laptop,tablet etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is VoIP?

A

VoIp stands for voice over internet protocol
Volp is a way to talk to your friends or family using internet.it’s like using the phone but instead of using a phone line you use internet to make the call.
here voice is coded and converted back at the end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is cloud computing?

A

cloud computing is like having a big virtual backpack where you can store your stuff and access it from any where in the world.
cloud computing allows you to lets you store your files, photos, and other information on the internet instead of on your computer or phone. This information is stored in big data centers,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Topology in computer networks?what are different types of topology?

A

in computer networking topology refers to the physical or logical layout of devices and cables in the network.
it describes how devices are connected to each other and how data flows between them

Bus topology
Star topology
Ring topology
Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

explain different types of topologies?

A

Bus Topology: In this topology, devices are connected in a linear fashion to a central cable called the bus. Data travels along the bus and all devices on the network can see it.

Star Topology: In this topology, devices are connected to a central device such as a switch or a hub. All devices on the network communicate through this central device.

Ring Topology: In this topology, devices are connected in a circular fashion where each device is connected to the two adjacent devices. Data travels in a circular pattern around the network.

Mesh Topology: In this topology, devices are connected to multiple other devices in a complex network of connections. This provides redundancy and multiple paths for data to travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

list out advantages and disadvantages of different topologies?

A

Bus Topology: Simple to set up and inexpensive, but data collisions can occur and it can be difficult to troubleshoot.

Star Topology: Easy to troubleshoot and allows for centralized control, but can be expensive and a single point of failure can take down the entire network.

Ring Topology: Data travels quickly around the network and there are no collisions, but a single device failure can bring down the entire network.

Mesh Topology: Provides redundancy and multiple paths for data to travel, but can be expensive to set up and difficult to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

list out some common network devices?

A

Some common network devices include:

Switches: Used to connect devices in a network and direct data to the correct destination.

Routers: Used to connect different networks together and direct data between them.

Hubs: Used to connect devices in a network but are not as intelligent as switches.

Firewalls: Used to protect a network from unauthorized access and attacks.

Modems: Used to connect a network to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a modem?

A

Your modem takes the signals from your computer and turns them into a special code that can travel over the phone or cable line. The ISP receives this code and sends the information you requested back to your modem, which then turns it back into something your computer can understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are network protocols?

A

its a set of rules and standards that is used to communicate between devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are different types of network protocol explain?

A

Transmission control protocol/Internet Protocol (TCP/IP)
User Datagram Protocol (UDP)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)

Transmission Control Protocol/Internet Protocol (TCP/IP):

When you send a message or a picture to someone over the internet, it gets broken up into tiny pieces called “packets”. TCP (Transmission Control Protocol) makes sure that all the packets get sent and received correctly, and in the right order.

Once the packets arrive at the other computer, IP (Internet Protocol) helps to figure out where they came from and where they need to go. It’s like a postal system that makes sure the message gets delivered to the right person.

Together, TCP and IP work to make sure your messages, pictures, and other data get sent and received correctly over the internet.

User Datagram Protocol (UDP):

UDP is used for communication that requires speed over reliability, such as video or audio streaming. It does not guarantee delivery, but can send data more quickly than TCP/IP.

File Transfer Protocol (FTP):

FTP is used for transferring files between devices in a network. It allows users to upload and download files from a remote server or network.

Simple Mail Transfer Protocol (SMTP):

SMTP is used for sending email messages between servers. It directs messages to the correct email server and handles error messages if the message cannot be delivered.

Some common network protocols include

Hypertext Transfer Protocol (HTTP):

HTTP is used for communication between web servers and web clients, such as browsers. It defines how data is transmitted and the format in which it is sent.

Domain Name System (DNS):

DNS is used to translate human-readable domain names, such as www.example.com, into IP addresses that computers can understand.

Internet Message Access Protocol (IMAP):

IMAP is used for accessing email messages stored on a remote server. It allows users to read and manage their email without downloading it to their local computer.

Post Office Protocol (POP):

POP is used for downloading email messages from a remote server to a local computer. It allows users to read and manage their email offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is IP addressing? what are different IP address classes?

A

An IP address is a unique identifier (32 bit) assigned to every device on a network that uses the Internet Protocol (IP) for communication. It consists of a series of numbers separated by dots, such as 192.168.1.1.

IP addresses are divided into two parts: the network portion and the host portion. The network portion identifies the specific network to which the device belongs, while the host portion identifies the specific device on that network.

there are five different IP address classes labeled from A-E,
class A,B,C are commonly used.
the classes are divided based on the number of bits used to identify the network and the host portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is subnetting?

A

Subnetting is the process of dividing a large network into smaller sub-networks, or subnets. This can help to improve network efficiency and security, as well as manage network traffic.

When subnetting, a portion of the host portion of the IP address is used to identify the subnet. This is done by borrowing bits from the host portion and using them for the subnet portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is network security?

A

Network security refers to the practice of protecting computer networks from unauthorized access, misuse, modification, or disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are different types of network security threats?

A

Malware: Malware refers to malicious software such as viruses, worms, and Trojan horses that can infect computers and networks.

Phishing: Phishing is a type of social engineering attack where cybercriminals use fake emails or websites to trick users into providing sensitive information.

DDoS attacks: Distributed Denial of Service (DDoS) attacks are designed to overload a network with traffic, making it unavailable to users.

Man-in-the-middle attacks: A man-in-the-middle attack involves intercepting communications between two parties, allowing the attacker to eavesdrop on or manipulate the data being transmitted.

Password attacks: Password attacks involve attempting to guess or steal user passwords to gain unauthorized access to a network or computer system.

17
Q

what are common network security measures?

A

Firewall: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predefined security rules.

A firewall is like the guard at the entrance of your treehouse. It checks everyone who wants to enter and makes sure they are your trusted friends. If someone who is not your friend tries to enter, the firewall stops them from getting in.

Intrusion Detection and Prevention Systems (IDPS): IDPS is a software or hardware-based system that monitors network traffic for signs of malicious activity and takes action to prevent attacks.
The IDPS looks for any suspicious activity happening in the network, such as an unusual amount of data being sent or received, or someone trying to access a part of the network they shouldn’t. If the IDPS finds something suspicious, it alerts the network administrator so they can take action to prevent the attack.

Access Control: Access control mechanisms, such as passwords, biometrics, and two-factor authentication, are used to ensure that only authorized users can access network resources.

Encryption: Encryption is the process of converting data into a secret code to prevent unauthorized access to sensitive information.

Security Auditing: Regular security audits help identify vulnerabilities and weaknesses in network security, allowing organizations to take appropriate measures to address them.

18
Q

what are network services and application ? what are different types of network services and application?

A

network services and application are tools that help computer network to communicate,share resources, and other functionalities

types of network services and application:

Communication Services: These services enable users to communicate with each other over a network. Examples include email, instant messaging, voice over IP (VoIP), and video conferencing.

File and Print Services: These services allow users to share files and printers over a network. Examples include file sharing protocols like FTP and SMB, and print server software that allows users to print documents to shared printers.

Network Management Services: These services are used to manage and monitor the network infrastructure, including network devices, servers, and applications. Examples include network monitoring tools, configuration management tools, and security management software.

Remote Access Services: These services enable users to access network resources from remote locations, using technologies such as Virtual Private Networks (VPNs) and Remote Desktop Services.

Web Services: These services provide access to web-based applications and services over a network. Examples include web servers, web-based email clients, and cloud-based storage services (google drive,drop box )

19
Q

what is VPN (virtual private network) ?

A

VPN lets you connect to a network in a private, secure way. This means that you can use the internet and access resources on the network without anyone else being able to see what you’re doing or spy on your activities.

20
Q

what is network trouble shooting ?

A

Network troubleshooting refers to the process of identifying, diagnosing, and resolving problems on a computer network.

There are several tools that network administrators can use to troubleshoot problems on a network, such as:

Ping: A command-line tool that tests the connectivity between two devices on the network.(ping is like marco-polo for computers)

Traceroute: A command-line tool that helps identify the path that packets take as they travel through the network.

Wireshark: A network protocol analyzer that captures and analyzes network traffic.

Netstat: A command-line tool that displays active connections and network statistics.

Nmap: A network scanner that scans for open ports and identifies network devices.
open port means that there is a program or service listening for data on that port and data can be sent and received from that port

21
Q

what are the most common issues faced by the network administrators?

A

slower network speeds-This can be caused by network congestion, outdated equipment, or improperly configured devices. Solutions may include upgrading equipment, optimizing network configurations

network connectivity issues-This can be caused by faulty cables, network switches, or network interface cards. Solutions may include replacing faulty equipment, updating drivers, or reconfiguring network devices.

security breaches-This can be caused by hackers or malware that exploit vulnerabilities in network security.

DNS issues-This can be caused by misconfigured DNS settings or server issues. Solutions may include updating DNS settings, flushing DNS cache, or troubleshooting DNS server issues.

22
Q

what is wireless networking give examples?

A

Wireless networking is a way to connect devices to a network without using wires or cables. Instead, wireless networking uses radio waves to transmit data between devices.

eg: wifi,bluetooth,cellular

security measures for wireless network include :
Encryption,Authentication,Firewalls

23
Q

what are different network management tools?

A

Network management is the process of managing and maintaining a computer network to ensure its smooth operation and optimal performance.

Network monitoring software - Network monitoring software is used to monitor network activity, identify issues, and provide alerts when problems occur.

Configuration management tools - Configuration management tools are used to manage and update network configurations to ensure that all devices on the network are properly configured and working together.

Performance management tools - Performance management tools are used to measure and optimize network performance, including bandwidth utilization, response times, and other metrics.

Security management tools - Security management tools are used to manage and enforce network security policies, monitor for security threats, and respond to security incidents.

24
Q

what are techniques to analyse network performance optimizaton ?

A

Network Performance and Optimization refers to the process of making a computer network run faster and more efficiently.

some common techniques for network performance and optimization include :

Bandwidth management - Bandwidth management involves monitoring and controlling the amount of data that is transmitted over the network to ensure that network resources are used efficiently. you could make the road wider so that more cars can travel on it at once. you can do this by upgrading hardware like routers and switches

Quality of Service (QoS) - QoS is a set of technologies and techniques that prioritize certain types of network traffic, such as video or voice traffic, to ensure that they receive the necessary resources and bandwidth.
you wouldn’t want a car to sit idling in traffic, you don’t want devices on the network to be wasting time waiting for data to be sent or received.

Load balancing - Load balancing is the process of distributing network traffic across multiple servers or devices to optimize network performance and prevent overloading on any one device.

another way to improve network performance is to reduce the amount of data that’s being sent across the network. Just like you wouldn’t want a bunch of extra cars on the road, you don’t want unnecessary data clogging up your network. There are different ways to reduce data, like using compression or data deduplication, which can help make the network faster.