Chap 5-Networks Flashcards
Bridge vs Gateway
Bridge connects 2 networks with same protocol.
Gateway connects networks with different protocols.
Router’s function?
Routing: Sending to destination
SPF(Shortest path first)
Control Traffic: (Like firewall)
Other built-in function:
Booster, Modem, WAP, Firewall
Booster?
Amplify any signal in a network(Even wireless or wired connection,Cable, Telecom)
Wireless Access Point ?
Provide/Extend wireless connection to a network.
Function of VPN
1.Change/Hide IP address
2.provide private LAN from a remote location
3.Provides an encrypted connection to LAN using the infrastructure of a public network
4.Allow access to geo-blocked content
5.Prevent others from tracking users’ internet activity
Filter function?
Prevent access to blocked URLs/sites/keywords (Stop seeing unwanted/inappropriate web content)
How distance sensor is used by embedded system in Autonomous (Smart car)
- If an object is close, applies the brakes/Changes direction(By actuator).
Or sounds an alarm/Displays a warning (Audio/Visual output)
What is DHCP?
Dynamic Host Configuration Protocol that is used to assigned Dynamic IP to devices by ISP
Pros and Cons of Wired Connection?
Pros
•Higher Bandwidth
•More stable (No signal lost in air)
•More secure(Can’t Intercept: shielded)
•
Cons
•Cannot move around
•Cost of Cables
•Health hazard(Trailing wires)
•Waste time finding/connecting cables
Potential results of MAC spoofing?
•Cause conflict in data transmission
•Evade Network Bans/MAC filtering
•Protected Privacy (Can’t track)
•Masquerading as another device(to gain unauthorized access,intercept)
How does a router work? Step by step?
-Stores the IP in routing table
-Reads packet header
-Compare recipient’s IP with IP of devices connected to it
-Forward the packet to its destination
-Using most efficient route
Securing data on networks?
•Logins and Password
•PIN/Pattern/Password
•Biometric Scanner(Facial/Fingerprint/Iris/Voice recognition)
•Encryption(WEP,WPA)
•Anti malware
•File access right
•Transcation logs(Identify unusual activity and which computers have been accessed)
•Backups
•VPN
•Firewalls(Mostly for organization, individual doesn’t use that much)
Why must the use of keywords consider when using search engine?
-Keyword entered is compared against the content of webpages in web server and return most relevant results
What affects the search rank/results?
•Cookies which helps showing personalized contents.
•The search algorithm of different search engine.
•The search algorithm at that time.
•Search terms
•Search tool/Search types
Why show different results when enters same search terms?
•Different algorithms of different search engine.
•Personalized contents provided based on transactional data.