Chap 5-Networks Flashcards
Bridge vs Gateway
Bridge connects 2 networks with same protocol.
Gateway connects networks with different protocols.
Router’s function?
Routing: Sending to destination
SPF(Shortest path first)
Control Traffic: (Like firewall)
Other built-in function:
Booster, Modem, WAP, Firewall
Booster?
Amplify any signal in a network(Even wireless or wired connection,Cable, Telecom)
Wireless Access Point ?
Provide/Extend wireless connection to a network.
Function of VPN
1.Change/Hide IP address
2.provide private LAN from a remote location
3.Provides an encrypted connection to LAN using the infrastructure of a public network
4.Allow access to geo-blocked content
5.Prevent others from tracking users’ internet activity
Filter function?
Prevent access to blocked URLs/sites/keywords (Stop seeing unwanted/inappropriate web content)
How distance sensor is used by embedded system in Autonomous (Smart car)
- If an object is close, applies the brakes/Changes direction(By actuator).
Or sounds an alarm/Displays a warning (Audio/Visual output)
What is DHCP?
Dynamic Host Configuration Protocol that is used to assigned Dynamic IP to devices by ISP
Pros and Cons of Wired Connection?
Pros
•Higher Bandwidth
•More stable (No signal lost in air)
•More secure(Can’t Intercept: shielded)
•
Cons
•Cannot move around
•Cost of Cables
•Health hazard(Trailing wires)
•Waste time finding/connecting cables
Potential results of MAC spoofing?
•Cause conflict in data transmission
•Evade Network Bans/MAC filtering
•Protected Privacy (Can’t track)
•Masquerading as another device(to gain unauthorized access,intercept)
How does a router work? Step by step?
-Stores the IP in routing table
-Reads packet header
-Compare recipient’s IP with IP of devices connected to it
-Forward the packet to its destination
-Using most efficient route
Securing data on networks?
•Logins and Password
•PIN/Pattern/Password
•Biometric Scanner(Facial/Fingerprint/Iris/Voice recognition)
•Encryption(WEP,WPA)
•Anti malware
•File access right
•Transcation logs(Identify unusual activity and which computers have been accessed)
•Backups
•VPN
•Firewalls(Mostly for organization, individual doesn’t use that much)
Why must the use of keywords consider when using search engine?
-Keyword entered is compared against the content of webpages in web server and return most relevant results
What affects the search rank/results?
•Cookies which helps showing personalized contents.
•The search algorithm of different search engine.
•The search algorithm at that time.
•Search terms
•Search tool/Search types
Why show different results when enters same search terms?
•Different algorithms of different search engine.
•Personalized contents provided based on transactional data.
How is MAC/IP use to prevent access to networks?
Every device and packet has own unique MAC/IP and is checked and filtered/blacklisted by firewall
Benefits of using LANs
•Access to shared peripherals
•Shared access to the internet
•Media streaming
•Access to shared storage/data
•Communication(Msg and file)
•Flexible Access(Easily Access from any connected device)
Benefits of using Client server network
•Centralised Administration
•Centralised Backup
•Control of user access rights
•Roaming Profile
•Shared software
•Shared storage and file access
Benefits of Peer to Peer
Types of Sever
•Print Server
•File Server
•Authentication server
•Application Server
•Web Server
What does Network OS allow?
•Passing usernames and passwords to server for checking when user log in
•Separating user accounts & ensuring users can’t access each other’s files
•Provide access to network storage and resources (networked printers)
What’s intranet?
A computer network used for exchanging or seeing information within a company
Types of internet connection?
•Mobile Broadband
•Satellites