Computer Networks Flashcards
What is the term for sharing information and resources through linked computers?
Networking
What is the term for the thing and it’s configuration that manages the operations of the network interfaces?
Network software
What is commonly classified based on the physical distance between components (geographic scope)?
Network types
Name the three major categories of network types
Personal area network (PAN)
Local Area network (LAN)
Wide area network (WAN)
What type of network is used for short-range communications, within a few feet, such as wireless headphones to a phone?
PAN
What type of network consists of a collection of computers in a single building or complex?
LAN
What type of network system kinks systems over a greater distance including machines on the other side of the world?
WAN
WHat type of network design is freely circulated?
Open networks
The internet is an example of what kind of network design?
Open
What is the open collection of standards called that governs communication over the internet?
TCP/IP protocol
What type of network design is controlled by third parties and may include license fees?
Proprietary network
Name the four types of network topology?
Bus, star, ring, Mesh
What type of network topology connects machines to a common connection line?
Bus
What is the most common type of network topology?
Bus
What type of network topology has a single machine as the central point to which all other machines connect?
Star
What type of network topology connects machines directly to each other as peers?
Ring
What type of network topology connects every device device in a network to every other device enabling redundancy while introducing more traffic?
Mesh
The bus topology became popular in the 90s when it was implemented under a set of standards known as what?
Ethernet
What type of topology is used in wireless communication where communication is carried out via radio broadcast to a central machine called the access point?
Star
Networks rely on what to govern communication?
Protocols
Using what allows vendors to build products for network applications that are compatible with products from other vendors?
Protocols
What method of process communication allows the activities or processes on different computers within a network to coordinate actions and complete tasks?
Interprocess communication
The popular convention for interprocess communication is what where a request is made with something else satisfying the request? For example multiple computers printing on the same printer
Client/server model
In what interprocess model allows for processors to both request and provide service to each other? Instant messaging and interactive games are examples.
Peer-to-Peer (P2P)
Which protocol operates without any centralized server and allows for numerous software clients to be used for access?
Gnutella protocol
What is the term for a system that executes software on more than one computer?
Distributed system
Name three types of distributed systems
Cluster computing, grid computing, cloud computing
What type of distributed system uses many independent computers to provide computation or services comparable to those of a larger machine?
Cluster computing
What type of distributed system is more loosely couples than clusters but still work together to complete large tasks?
Grid computing
What type of distributed system provides large pools of shared computers that can be allocated as needed.
Cloud computing
What is the term for a component that carries data from one network to another?
Transmission media
What are the two types of transmission media?
Wired and wireless
Both wired and wireless networks require what to transmit data?
Network media
Twisted pair cables, coaxial cables and optical fiber cables are common network media used in what?
Wired networks
Radio waves, microwaves, and infrared waves are used in what?
Wireless networks
What is the most widely used type of transmissions media?
Twisted pair cables
Name the two types of twisted pair cables
Unshielded twisted pair (UTP)
Shielded twisted pair (STP)
What type of cable consists of two separately insulated copper wires wound around each other?
Shielded twisted pair (STP)
What is typically measured in megabits per second (Mbps) and gigabits per second (Gbps)?
Network bandwidth
One megabit is how many kilobits?
1000
What is the max bandwidth for CAT1?
1Mbps
What is the max bandwidth for CAT2?
4 Mbps
What is the max bandwidth for CAT3?
10 Mbps
What is the max bandwidth for CAT4?
16 Mbps
What is the max bandwidth for CAT5?
100 Mbps
What is the max bandwidth for CAT5e?
1 Gbps
What is the max bandwidth for CAT6?
10Gbps
What is the max bandwidth for CAT7?
10 Gbps
What is the term for the cable that is used in computer networks and to deliver cable TV services?
Coaxial Cables
What has the bandwidth of 80times that of twisted wires?
Coaxial cables
What is a signal with narrow frequency range on which data is superimposed and then transmitted?
Baseband
What is considered higher quality transmission tech that can send data long distances at high speeds?
Broadband
What uses the concept of reflection of light through a core made up of glass or plastic?l and can transmit large volumes of data at 20,000 times the bandwidth of twisted pair wires
Fiber-optic cable
What uses electromagnetic waves of different frequencies such as infrared or radio waves to transmit data within a network with the use of Wi-Fi, Bluetooth or even near-field communication?
Wireless transmission
LANs can be combined to create what?
WANs
What extends the range of cabling types so connections can be made increasing the strength of the network signal?
Repeaters
What can be used to connect different types of network and provide management of the message?
Bridges
What is used on a LAN to reduce network traffic by management of network messages?
Switches
What device makes the internet possible by managing traffic through known devices until the message reaches the correct address?
Router
What began as a research project in the early 60s funded by DARPA (Defense Advanced Research Projects Agency)?
The internet
DARPA helped to develop a method for linking what, allowing them to function as a single system unaffected by disasters degrading the performance of local components?
Multiple computer networks
Individual networks comprising the internet are constructed and maintained by what?
ISPs
ISPs are classified in what depending on the role they play in the overall internet structure?
Tiers
What is at the top of the ISP hierarchy that consists of high-speed, high-capacity, international WANs that are typically operated by large communication companies?
Tier 1
What ISPs are common and regional in scope that collectively provide the internet’s communication infrastructure?
Tier 2
What ISPs are typically independent internet sometimes called intranet operated by a single organization that supplies access to homes and businesses?
Tier 3
What are devices used to connect to the access ISPs?
End systems or hosts
Internet networking systems use what to assign a unique identifier to each computer in the network?
Addressing system
What are the unique identifiers in the internet?
Internet protocol (IP) addresses
IP version 4 used a what address pattern?
32-bit
Today (IPv6) we use a what in addition to legacy IPv4 addresses?
128-bit address
This nonprofit organization coordinates the internet’s operations, awards blocks of consecutively numbered IP address to ISPs
ICANN (Internet Corporation for Assigned Names and Numbers)
ISPs assign a unique what to each machine in their region of authority?
IP address
IPv4 addresses are typically written in what?
Dotted decimal notation
IPv6 addresses are written in what?
Hexadecimal
What is the suffix for a web address meaning commercial?
.com
Government agencies use what at the end of the web addresses?
.gov
Nonprofit organizations use what at the end of their websites?
.org
Television stations use what at the end of their web addresses?
.tv
What is the suffix at the end of web addresses called?
Top level domain (TLD)
TLDs include two letter what to identify the location’s of organizations?
Country codes
Every internet domain must be registered with what organization?
ICANN
What is the term for rules, procedures and formats that govern the communication of multiple devices over a network?
Network protocols
As web servers and browsers became more sophisticated, traditional networks became handled by webpages using what?
Hypertext Transfer Protocol (HTTP)
Email communication is supported by basic network protocols known as what?
Simple Mail Transfer Protocol (SMTP)
SMTP uses what to identify the recipient of the email and send messages over the internet?
Domain Name System (DNS) lookup
Email is retrieved off the mail server using protocols like what?
POP3 (Post Office Protocol version 3)
IMAP (Internet Message Access Protocol)
What is used for voice communication over the Internet?
Voice Over Internet Protocol (VoIP)
What is the term for transporting audio and video data across the internet in near real time?
Streaming
What do large scale streaming services use that are groups of servers distributed strategically over the internet that send copies of content to nearby users?
Content delivery networks (CDNs)
What is the network technology called that enables an end user to connect to the closest server automatically?
Anycast
In the late 1980s , who realized the potential of combining Internet technology with hypertext, leading to the World Wide Web
Time Berners-Lee
What is the term for linked documents?
Hypertext
What two things allow users to access hypertext pages?
Browsers and web servers
What resides in the user’s machine that obtains the requested materials and presents then in an organized way
Browser
What resides in the computer containing hypertext documents that transfers data?
Web server
What is the term for the unique address given to each hypertext document on the WWW?
Uniform Resource Locator(URL)
What 5 things does a URL include?
Protocol
Domain
Subdomains
Resource path ID
Name of the document
What is the term used for a way to encode a document on the www?
Hypertext Markup Language(HTML)
What are the special symbols used to describe how the document should appear on a display screen, what multimedia should accompany the document, etc?
Tags
What generalized language provides a standardized style for designing notational systems representing data as text files?
Extensible Markup Language (XML)
Blank emphasizes semantics, while blank focuses on the appearance
XML
HTML
What network security risk is any software intentionally designed to cause damage?
Malicious Software (malware)
Software that causes unintentional harm due to some deficiency is know as what?
Software bug
What infects a computer by inserting itself into programs that already reside in the machine
Virus
What is the term for the autonomous program that forwards copies of itself to other machines in a network?
Worm
What resides in a computer, collecting information about the computer’s activities and reporting back to the instigator?
Spyware
What technique is used to obtain private information by simply asking for it through email posing as a legitimate business?
Phishing
What type of attack involves the process of overloading a computer with messages?
Denial-of-service (DOS)
What type of attack intercepts data as it is traveling from the victim’s device?
Packet sniffing (man-in-the-middle)
What type of attack uses all possible combinations of characters to learn a user’s passcode?
Brute force attack
What is the term for the attack where the attacker users an application with a large text file with just words to identity a password?
Dictionary
What type of attack involves trying to identify the hash value of a password and converting it back.
Rainbow
What security protection block outgoing messages with certain destinations or block incoming messages from untrustworthy sources?
Firewall
What is the term for the device that acts as an intermediary between a client and a server to protect the client from adverse actions of the server?
Proxy server
What type of software defeats and removes viruses from the network?
Antivirus software
What encodes information to keep it confidential even if the data is stolen?
Encryption