Computer Network Connections/Protocols Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a network

A

A group or system of interconnected people or things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a protocol

A

An agreement or a set of rules for a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer

A

An electronic device for storing and processing data in binary form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two types of networks that we use

A

LAN
WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a WAN network

A

Wide Area Network. A network when computers have communication using resources, provided by a third party carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a WAN need to perform

A

They would acquire cables, telephone lines, satellites and radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the largest WAN in the world

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of WAN

A

They cover large geographical areas
Increased privacy
Allows users to share resources and application software
Assists global markets and businesses
IT infrastructure is centralized
Benefits the global market and business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the disadvantages of WAN

A

Spans more congestion
More slower
Poor connectivity
Poor maintenance
Problem with resolving
Instalment fees
Huge demands for security options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a LAN

A

Local Area Network. A network that covers a small geographical location on a small site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages of LAN

A

Spans less congestion
More faster than WAN
Works together from different computers via instant messaging
Can access files from any computer
Works collaboratively on the same file
Can share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the disadvantages of LAN

A

High setup costs
Local area networking added difficulty to security operation
Control on the customer’s part is lost
Security system should be executed if its essential to protect private data
Weak data protection
High maintenance degree
Maximum damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is congestion

A

Clog or block of something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two types of mesh LAN networks

A

Star Topology
Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a network topology

A

The physical and logical arrangement of nodes and connections in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a mesh/partial mesh network topology

A

A network setup where each device is interconnected with one another and can rely data easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the benefits of a mesh network topology

A

Good resilience, np point in failure
Efficient expansion
Efficient modification
No network disruption
If one computer switches off, the system is unaffected, keeps working like normal
No central switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the drawbacks of a mesh network topology

A

Difficult administration
Difficult maintenance
High installation costs
If one node is added, more nodes will have to keep getting added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Whats the difference between a regular mesh network and a partial mesh network

A

Partial Mesh Networks have less nodes
They tend to be in conjunction with star mesh networks for bigger communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a node

A

A device that can send, receive, read data that is connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a star mesh network topology

A

A network where all computers, devices and nodes are all connected to a central switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the benefits of a star mesh network topology

A

If one device is turned off, the network is unaffected, keeps continuing like normal
Fast data transfer to hub as each wire isn’t shared with other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the drawbacks of a star mesh network topology

A

If the central switch fails, the whole network is turned off
Additional hardware is required such as a central switch and network cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a wireless mesh network

A

A communication network made up of radio nodes organized in a mesh topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a data packet

A

A unit of data that travels along a network path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

More information about a data packet

A

Each data packet contains the same number of bytes

Packets may flow through Internet via different routes

Each packet is marked with the packet number so that the packets can be put back together by the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Why does packet switching excel circuit switching

A

Circuit switching involves a dedicated connection setup between two people (you and the caller)

But packet switching solves the problem of there not being enough lines for billions of people sending data across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Suppose we want to send a 3MB file to someone via the internet. Explain how we can use packet switching to do this.

A
  1. Each file is broken up into equal sized data packets of 512 bytes. Each data packet has 512 bytes. Via packets, we can send them via Internet through different routes
  2. The request is placed in packets
  3. Each packet gets an address and number each
  4. Packets are sent around network
  5. Packets are sent around host server
  6. The server does a check to see if all the packets are there
  7. If not
    A timeout is sent
  8. If they have arrived
    Packets are placed in order
  9. Request is processed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a router

A

A networking device that forwards data packets between computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the benefits of packet switching

A
  1. More use than circuit switching
  2. Data packets are easily able to locate the destination without a channel
  3. Because packet switching allows packets to be resent, amount of lost data packets is reduced
  4. Each data packet has a fair same amount of bytes
  5. Packets are always delivered in the correct order
  6. Calls are done within a steady bandwidth, dedicated channels and a consistent data rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the drawbacks of packet switching

A
  1. Only efficient for voice communication
  2. Resources are used in the right way
  3. Dedicated channels for circuit switching are unable for other uses
  4. The more use, the more expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Does packet switching require a dedicated channel?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a DNS server

A

Domain Network System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the function of a DNS server

A

Turns the web address into an IP address. It holds parts of a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How many DNS root servers are there

A

13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a database

A

A structured set of data held in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What happens if a DNS server doesn’t receive a database request

A

It passes the request to another server until it has the correct name and IP address. The process will keep repeating until done so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is an IP address

A

Internet Protocol Address

A unique address that identifies a device on the internet or a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Does our IP address change?

A

Yes it does. If you are in one part of the country, you are assigned a temporary IP address for that part of the country. If we take our device on holiday however, we are given a different IP address as we are in a different part. If we return back to our original place however, our IP address will change back to our original address before holiday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is an NIC (network interface card)

A

A circuit board that functions to enable network communications for devices such as computers and network servers. NIC cards work by transmitting signals at the physical layer and deliver data packets at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a MAC address

A

Media Access Control address

A unique identifier assigned to a network interface controller for use as a network address within communications in a network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the link between MAC addresses and NIC cards

A

A MAC address is assigned to each network interface card by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the link between MAC addresses and other connections

A

There may be more than one MAC addresses if there is an Internet or Ethernet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What happens when we request a web page

A

Each router along the way uses the MAC address of the next router. It also is able to send the data packet on the next part of the journey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the differences between an IP address and a MAC address

A
  1. MAC addresses NEVER change. IP addresses change when changing location.
  2. IP addresses are 4 bytes
    MAC addresses are 6 bytes
  3. IP addresses are expressed in Denary
    MAC addresses are expressed in Hexadecimal

IP addresses are configured by software. MAC addresses are configured by hardware

IP addresses are only used for routing across a WAN/internet
MAC addresses are only used within a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a switch

A

A physical component that governs the signal flow. It is the source of connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a hub

A

A small device that allows wired devices to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a WAP

A

Wireless Access Point

A hardware device or configured node on a LAN (Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are benefits of WAP

A
  1. Low costs than conventional infrastructure
  2. Easier management and maintenance
  3. More reliability
  4. Can be scaled up as needs grow
  5. Broad transmission range
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are drawbacks of WAP

A
  1. Slower than dedicated cable networks
  2. Limited amount of radio channels, can’t support hundreds of simultaneous connections
  3. Poor stability
  4. Limited range of operation
  5. Less secure due to depending on a secret password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the job of a router and a switch

A

A router routes data packets towards correct destination

A switch connects each node in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are similarities of a router and a switch

A
  1. Use of device connection
  2. Data retrieval from devices
  3. Correct data determination from destination
  4. Data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are some differences of a router and a switch

A
  1. Switches use MAC addresses
  2. Routers use IP addresses
  3. Switches connect nodes and computers
  4. Routers connect networks and Internet
  5. Routers store address of attached devices
  6. Switches record the address attached
  7. Switches look for correct addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is an Ethernet connection

A

A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How does an Ethernet connection work

A

Delivers stable, speedy, secure, wired connections to the internet and between device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is transmission media

A

The way that communication is sent through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What equipment is used for an Ethernet connection

A

Twisted copper cables
Fibre optic cables
Coaxial cables
Original copper cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are some types of LAN hardware

A

Server
Bridge
Hub
Booster
Repeater
Wireless Extender

59
Q

What is a bridge

A

A network device that connects multiple subnetworks to create a network

60
Q

What is a repeater

A

A networking device that amplifies and generates the incoming signal

61
Q

What is amplifying

A

To increase something

62
Q

What is a wireless extender

A

A device that extends your main router’s internet signal to another location

63
Q

What is another word for a wireless extender

A

Booster

64
Q

What is a VPN

A

Virtual Private Network

A non physical, private network that runs on a public network. It combines physical networks into a logical network

65
Q

What can users access when using a VPN

A

Virtual Network data

66
Q

What are some risks of a VPN

A
  1. Employees can login the private network from any location.
  2. They can also access the server from any location.
67
Q

What are some benefits of a VPN

A
  1. Secured connection
  2. Software separates the Virtual Network from the wider, public network
68
Q

What are examples of WIFI devices

A

Laptops
Desktops
Tablets
Smartphones
Smart speakers and lights

69
Q

What is Bluetooth

A

A wireless method of device communication over a short distance

It has radio waves of 2.4 GHz

Devices are around 1000cm distanced. They MUST be paired

70
Q

What are examples of Bluetooth devices

A

Wireless headphones
Phone connections to car entertainment systems
Keyboards

71
Q

How do we pair a Bluetooth device

A
  1. Create a persistent link between both devices
  2. A device will ask for a passkey in order for pairing
  3. Passkeys can only be entered once and will remember paired devices
72
Q

Why is a passkey useful

A

Extra layer of security

73
Q

What are radio waves commonly used for

A

Communication

74
Q

What is encryption

A

The encoding of a data, so it is no longer readable. We then need to use a key to decrypt the data

75
Q

What is plaintext

A

The original message to be encrypted

76
Q

What is ciphertext

A

The encrypted message

77
Q

What is a key

A

A sequence of numbers used to encrypt or decrypt, often data using a mathematical formula

78
Q

What is decryption

A

Unlocking the encrypted message via a key, so it is readable

79
Q

What is encryption algorithm

A

Formula for encrypting plaintext

80
Q

What are two inputs

A

Plaintext
Secret key

81
Q

What are the two types of encryption

A

Symmetric Encryption
Asymmetric Encryption

82
Q

What is symmetric encryption

A

Uses a single key to encrypt or decrypt a message.

The key must then be given to the recipient of your message for decryption

83
Q

What is asymmetric encryption

A

Uses two different keys to encrypt and decrypt a message

A public key is used to encrypt the data

A private key is used to decrypt the data

This is secure as you don’t have to send or reveal your decryption key

84
Q

What are two wireless encryption standards

A

WEP (Wired Equivalent Privacy)

WPA (Wi Fi Protection Access)

85
Q

Why is WEP now useless

A

Older
Can be cracked in seconds
So no longer be used to protect our home router

86
Q

What is strong encryption

A

Useful lifetime of the encrypted data is less than the time taken to break the code

87
Q

What is weak encryption

A

Code may be broken in time to use the information, but is no effort to try

88
Q

What is the current Wi Fi encryption people currently use

A

WPA2

89
Q

What is a file server

A

A server that holds files and databases for backup management

90
Q

What is a print server

A

A server that organises printing on different printers

91
Q

What is an email server

A

A server that receives emails, detect and block spam and detachable emails to users

92
Q

What is a web server

A

A server that hosts an external website

93
Q

What is a database server

A

A server holding data

94
Q

What is the function of the client

A

To send requests to the server. They then wait for a reply, then receive the reply

95
Q

What is the function of a server

A

Waits for client requests. They then receive a request with required processing data, then send the data request back

96
Q

What is a peer to peer network

A

A network with no central server

97
Q

What are benefits of peer to peer networks

A
  1. Easy setup
  2. Built in hardware
  3. No additional equipment
  4. Easy file reading on computer
  5. Good communication
  6. Suitable for small companies with fewer computers
  7. There is no central server that controls security and files
  8. Good direct communication
  9. Good file sharing
98
Q

What are drawbacks of a peer to peer network

A
  1. Viruses and malware are easily transferred, so there isn’t a central firewall
  2. Data recovery and backup isn’t done centrally so each computer has its own backup system
  3. No data retrieval when a computer is switched off
  4. Files aren’t centrally organised, but are stored on individual computers and can tend to be hard to locate
99
Q

How does P2P file sharing work

A

ADVANTAGE

Allows each user to share parts of a file, rather than all downloads coming from a central server. This reduces the bandwidth while file sharing

DISADVANTAGE

But due to illegal distribution of copyright material such as music and films, they are harder to close down.

100
Q

What is a client server

A

A network with a client computer and server

101
Q

What are advantages of a client server

A
  1. 1 file only is required for backup
  2. Files are accessible from any computer
  3. Email servers provide central places for emails that are assessed from different devices
  4. Print servers manage all files to be printed. This allows one printer to be shared by many computers
102
Q

What is a disadvantage of a client server

A
  1. Users are reliant on the client server
  2. High congestion when many clients access the server at the same time
  3. Limited resources that can affect performance and security of the network
  4. Need for specialist staff to manage and troubleshoot the network
  5. Server dependency causes problems if the server fails or gets overloaded with requests
  6. High setup costs and maintenance costs of the network operating system
103
Q

What is web hosting

A

An Internet service offered by companies that will host web pages and files for website

104
Q

What type of servers does web hosting use

A

Database servers

105
Q

What is a hosting service provider

A

When companies provide multiple general hosting like backup servers

106
Q

What are benefits of web hosting

A
  1. Good bandwidth
  2. Good equipment monitoring
  3. Backup web sites remotely
107
Q

What are drawbacks of web hosting

A
  1. Inability to customise the hosting service according to the site’s needs
  2. Reliance on provider for security, upgrades and maintenance
  3. Resource connection with other clients on the same server, which affect’s a sites performance and availability
  4. Resource limits imposed by the provider, such as bandwidth, storage and CPU
  5. Industry specific challenges such as compliances, regulation and data
108
Q

What is Cloud

A

A term used to refer to services that are delivered over the Internet.

It enables users connected to the Internet enabled computer, service access

109
Q

What are examples of cloud computing applications

A

Word processing
Database software
Online exams
Business applications
Smartphone apps

110
Q

What is SaaS

A

Software as a service

Cloud based servers that allow access to software on demand.

111
Q

More facts on SaaS

A
  1. Requires a subscription basis
  2. Unlimited access anywhere
  3. Doesn’t require machine instillation
112
Q

What are examples of SaaS applications

A
  1. Online accounting packages
  2. CRMs (Customer Relation Management systems)
  3. Share trading applications
113
Q

What are some benefits of cloud computing software

A
  1. Free, unlimited access
  2. Data backup is not crucial
  3. Powerful computers do not require a huge hard drive
114
Q

What are some drawbacks of cloud computing software

A
  1. Personal data is stored on the company computer
  2. Without an Internet connection, there is unstable service
  3. Slow internet connections create poor quality of service
  4. Although cloud services backup data, it isn’t easy for people and organisations to notice the resilience
115
Q

What are the 3 factors affecting a network’s performance

A

Bandwidth
Latency
Error rate/collisions

116
Q

What is latency

A

The length of time that a packet of information takes to travel through a network

117
Q

What is bandwidth

A

The amount of data rate that can be carried through a connection at a time

118
Q

What is error rate/collisions

A

The rate of when two computers on a network transmit data signals at the same time

119
Q

What are examples of communication protocols

A

HTTP
HTTPS
IMAP
POP
SMTP
TCP/IP
FTP

120
Q

What is HTTP

A

Hyper Text Transfer Protocol

A protocol used for accessing and receiving web pages via the Internet

This is written in HTML
(Hyper Text Markup Language)

121
Q

More information on HTTP protocols

A

HTTP protocols require and requests for a webpage from the web server. The server then sends its response containing the webpage

122
Q

What is HTTPS

A

Hyper Text Transfer Protocol Secure

An extended and better version of HTTP. It is much better as it encrypts information and data so it cannot be accessed by the eavesdropper

123
Q

What are HTTP and HTTPS protocols commonly used for

A

Websites
Webpages
Dealing with personal data

124
Q

What is FTP

A

File Transfer Protocol

This protocol sends and retrieves files to or from an FTP server

125
Q

What are graphics

A

Visual images produced by computer processing.

126
Q

How does a graphical interface work

A

Allows files to be dragged from the computer to the server

127
Q

What are good examples of FTP

A

Banks
Online shops
Social networking sites

128
Q

What is an email

A

Messages distributed from an address, to another address, via a computer

129
Q

What is SMTP

A

Simple Mail Transfer Protocol

This protocol only sends mail. That is it. However it doesn’t let you access it.

130
Q

How is an email sent

A
  1. When emails are sent from computers, it is sent to mail servers via the SMTP protocol.
  2. This is then forwarded to every other SMTP server.
  3. When reaching the destination of the email server, it it stored

This works for sending email only, not accessing it.

131
Q

What is POP

A

Post Office Protocol

This protocol downloads every new message to our local device, due to no longer being available on the mail server.

After each message is downloaded, it is no longer present in the mail server.

132
Q

What is IMAP

A

Internet Message Access Protocol

This protocol leaves the message on a server. They can be accessed by many devices, and are only removed if you delete them

After each message is downloaded, it is present in the mail server, unless you modify it.

133
Q

What is a layer

A

A group of network protocols that carry out different roles and functions in the communication process.

Layers are a division of network functionality

134
Q

What is TCP

A

Transmission Control Protocol

This protocol breaks up messages sent over the Internet into small chunks known as packets. Packets are reassembled at the other end, and detect errors and resend lost messages

135
Q

How many layers in a protocol stack

A

4

136
Q

How do these layers function

A

Each layer is responsible for covering 25% each of the communication process.

Each four layers are divisions of network functionality, carrying out different roles and functions each

137
Q

What are the 4 layers

A

Link Layer
Internet Layer
Transport Layer
Application Layer

138
Q

How do we know the correct layer to use

A

The application applied to sending data will determine the correct protocol for communication

139
Q

What is the function of the Application Layer

A

When web applications create data to send in this layer.

SMTP, FTP, HTTP and HTTPS specialise in the area

140
Q

What is the function of the Internet Layer

A

This layer is responsible for packet routing. Routers operate on this layer. A source and destination address are written on the packets, ready for transmission

141
Q

What is the function of the Transport Layer

A

This layer creates communication between 2 computers (hosts).

Data is divided up into packets and assigned a packet number. Packets are reassembled by the recipient’s Transport layer.

This layer specialises in TCP

142
Q

What is the function of the Link Layer

A

This layer removes the MAC address and passes packets up to the Internet Layer

143
Q

What are benefits of layers

A
  1. Breaks communication into manageable chunks
  2. Allows developers to focus on one area of the network without worrying about others
  3. There are set rules for each layer
  4. Self contained
  5. Functionality of one separate layer can be changed without affecting the functionality of the other layers
  6. Different hardware or software operates on a particular layer, so it provides compatibility between providers and systems
  7. Shows how the manufacturer’s routers operating on the Internet Layer, operates with another manufacturer’s NIC (Network Interface Card) operating on the Link Layer
  8. Senders and receivers using different software and hardware can communicate with the same layer protocols
144
Q

What is failover

A

When redundant components, hardware or capacity is built into the network.