CHAPTER 3 - NETWORKS Flashcards

1
Q

Bus topology

A

computer network in which a “bus” connects all the devices together through a common cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data packet

A

portion of a message that is transmitted through a network; contains check digits and destination address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hub

A

Network connection point for all devices using Ethernet cables; data arriving at a hub is copied and send to all the devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local Area Network (LAN)

A

computer network where all connected computers are within a limited geographical area (e.g. home, school, etc); connection between the computers may be through cables or microwave transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet switching

A

network communication method that creates and transmits small units of data, called packets, through a network, independently of the overall message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol

A

international rules that ensure the transfer of data between systems; e.g. TCP/IP standard protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/IP (Transmission control protocol/Internet protocol)

A

communications protocols used to connect hosts on the Internet; models & represents all functionalities required for a successful communication between users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wide Area Network (WAN)

A

computer network where all connected computers are in a larger geographical area than that served by a LAN or a MAN (metropolitan area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Switch

A

connection point for multiple devices on a single network; identifies which network device is connected to which port and transmit data to the exact port and network device for which it is intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Router

A

used to join multiple networks and serve as an intermediary between these networks so that data can be exchanged efficiently between network devices of those networks; used to connect home network to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Similarities and differences between LAN and WLAN

A

Similarities:
- both act on local level
- both allow communication

Differences:
- use a different transmission medium
- WLAN offer greater flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless Local Area Network (WLAN)

A

links 2 or more computer systems within a limited geographical area, similar to LAN; connects using wireless connection method so users can move around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual Local Area Network (VLAN)

A

virtualized connection that connects multiple devices and network nodes from different LANs into one logical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Similarities and differences between LAN and WAN

A

Similarities:
- both allow communication
- both allow sharing of resources

Differences:
- LAN is usually faster
- WAN is more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Similarities and differences between LAN and VLAN

A

Similarities:
- act on a local level
- both allow communication

Differences:
- VLAN is safer and offers greater flexibility
- VLAN delivers better performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Storage Area Network (SAN)

A

network that connects the servers to the storage devices so that they have enough storage space to complete their tasks; connects servers using a switch and Ethernet cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intranet

A

a collection of private computer networks within a company, a school or an organization that utilizes standard network protocols to facilitate communication between individuals/work groups and to improve data sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Extranet

A

a computer network that utilizes the Internet to allow controlled access by specific users to a specific LAN or WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Internet

A

a global WAN connecting millions of computer systems together and provides an extensive number of services to users such as the World Wide Web (WWW), containing websites and webpages, file transfer etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virtual Private Network (VPN)

A

a tunnelled computer network that connects 2 or more computer systems, like LAN and WLAN, but allows clients from remote locations to connect to the network and appear to be inside the LAN as if they were physically present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ways to access the Internet

A
  • Broadband access via DSL or cable modem
  • Wi-Fi access via Wi-Fi router
  • Dial-up access via modem
22
Q

Internet of Things (IOT)

A

network of individual “things” that are able to connect to the Internet, communicate and exchange data

23
Q

Differences between VPN and Extranet

A

Similarities:
- both use the Internet
- both are considered inexpensive solutions

Differences:
- VPN provides more security
- VPN provides a secure connection to employees of the company while extranet limits access to the company network to selected outsiders

24
Q

Personal Area Network (PAN)

A

a network that interconnects devices that are centered around an individual person’s workspace; a LAN that supports only one person and covers a maximum of 10 meters

25
Q

Peer-To-Peer (P2P) network

A

a network that does not utilize the client/server model where clients request resources and servers provide them; it utilizes a distributed network architecture where all the computer systems in the network are decentralized and are both clients and servers at the same time

26
Q

Similarities and differences between client-server model and P2P

A

Similarities:
- both serve a lot of devices and users
- both act on different scales (local/wide)

Differences:
- client server model offers a centralized control of services whereas a P2P model offers a control that is decentralized
- client server model offers better security

27
Q

Advantages of Layers

A
  • easy to manage
  • makes protocol design easier
28
Q

OSI (reference model)

A

Open Systems Interconnection model (OSI); networking standard established by the International Standards Organization and aims to facilitate communication across a variety of systems

29
Q

7 layers of OSI

A

Please Don’t Nurture The Spiky Plant Alpi
(Physical, Data Link, Network, Transport, Session, Presentation, Application)

30
Q

TCP/IP model

A

Never I Throw Art
(Network Access, Internet, Transport, Application)

31
Q

VPN Benefits

A
  • easier communication
  • improves productivity of remote employees
  • provides teleworker support
32
Q

State which layer does IP belongs

A

Network Layer

33
Q

Similarities and differences between TCP/IP and OSI

A

Similarities:
- used to describe network functionality
- include a number of different layers

Differences:
- OSI has more layers than TCP/IP
- OSI is a reference model while TCP/IP is a protocol model

34
Q

Technologies used for VPN

A

Hardware:
- Internet access
- VPN software
- VPN routers

35
Q

Site to Site VPN

A

type of VPN that connects entire networks and facilitates secure data interchange between different sites

36
Q

Remote access VPN

A

type of VPN that connects individual hosts to private networks and facilitates teleworkers who need access to their company’s network securely using the Internet

37
Q

Secure VPN

A

all traffic on the VPN must be encrypted, authenticated, and then sent along virtual tunnels; technologies: IPSec (Internet Protocol Security) and SSL 3.0 (Secure Sockets Layer)

38
Q

Trusted VPN

A

all traffic on VPN relies on security of providers network to protect the network; technologies: Asynchronous Transfer Mode (ATM) circuits and MultiProtocol Label Switching (MPLS)

39
Q

Discuss the importance of protocols in ensuring the successful preparation, transmission and delivery of data using packet switching

A

Internet protocols are responsible for controlling the transmission of data packets from one network/computer system to another within a network, ensuring that data integrity remains preserved during data transmission. Protocols also ensure that senders and receivers of data are authenticated and follow their digital certificates.

40
Q

Factors affect speed of data transmission

A
  • bandwidth of the network
  • data transfer rate of storage devices
  • malicious software
41
Q

Data compression

A

reduces the size of files to be transmitted over a network; the reduction of bits by encoding data using fewer bits than the original representation

41
Q

2 types of data compression

A

Lossy data compression:
- some loss of information is acceptable and there is no way to get the original file back; e.g. JPEG

Lossless data compression:
- this compression method reduces the number of bits by first identifying and then eliminating any statistical redundancy; e.g. compression decompression software

42
Q

Wired communication

A
  • copper cable
  • fiber optic cable
43
Q

Wireless communication

A
  • satellite
  • microwave radio
44
Q

Mention 2 types of packet switching

A
  • Datagram packet switching: each packet contains the receiver address; the path of datagrams take between the same source and destination can be different
  • Virtual circuit packet switching: a route from source to destination is set up before any transmission takes place
45
Q

Star network topology

A

A star network consists of one central node to which all other nodes are connected

46
Q

Advantages and disadvantages of wireless network

A

Advantages:
- installing a cable can often be difficult
- easier to set up and allows higher flexibility

Disadvantages:
- gives relatively low speed
- affected by weather

47
Q

Evaluate the use of trusted media access control (MAC) addresses as one method of network security

A

MAC addresses uniquely identify computers as it consists of a string of characters/digits that are contained in NIC. They can be used to enhance a network’s security as it permits access to only a set of allowed devices. However, lists of permitted MAC addresses are difficult to maintain, especially if the network has a lot of devices connected to it. In addition, there are cases where MAC addresses are falsified, meaning that the digits contained in the devices are not original and are designed to show a different set of figures.

48
Q

Data Encryption

A

Data encryption is a method used to protect data from unauthorized access during Internet use or any other untrusted network. The process of encryption uses complex mathematical algorithms and encryption keys to alter a message into a form that is not recognizable to an unauthorized person

49
Q

NIC

A

A NIC (Network Interface Card) is available in any computer/network device and is used to authenticate them into a wireless network. Every NIC has a unique MAC address given when it is manufactured and this can be used to uniquely identify a device and enhance wireless network protection