Computer Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet is what type of network

A

WAN

Largest interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP address

A

Internet Protocol address is the unique number - changes slightly as device moves location as location is needed to recieve signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet switching

A

File is broken up into data packets and each packet has a header saying IP address to go and from and the number of packets in the whole communication and error checking data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Hardware

A

Routers
Switches
Network Interface Cards (NICs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Routers and Switches

A

A router is in a WAN and send packets along routers to intended recipient
Switch in LAN sends packets locally using MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIC

A

Required to connect any network enabled device

Physical component that can operate wirelessly or use a standard Ethernet cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Each NIC has a media access control (MAC). Computer may have more than one - separate ones for wired and wireless.and maybe Bluetooth. How many digits in what data types?

A

12 digits in hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WiFi stands for and advantages

A

Wireless fidelity
Mobility
Sharing files doesn’t need without having to be connected to a port
Expense time and inconvenience of laying cables through walls.
Instant data transfer is quicker - uploading to Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages of wireless nextworka

A

File transfer speed are slow
Obstructed by walls furniture and ceilings
Less secure
Easier to hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risks of wireless networks

A

Criminal activity - hacking
Bandwidth stealing - intruders use connection for their purposes slowing network down
Confidentiality - if encryption doesn’t occur before transmission an intruder can easily access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LAN BENEFITS

A

Sharing resources - store files on file server so they can be accessed by authorised users from any computer on network, peripheral devices like printers and scanners can be shared,intenet connection can be shared
Centralised management - user profiles and security, software distributed across network rather than manual installation,files can be backed up centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LAN disadvantages

A

File server goes down, no one can access any files or do any work
Network falls could lead to data loss
Access may be slow because network traffic increases
Difficulty securing system from trackers
Viruses would affect every computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Topologies

A

Different layout of interconnected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Star description and advantages

A

All the computers are connected to a switch by their own cable
One cable fails but won’t disrupt other devices
Consistent performance even during heavy use
Good security as data is only received by node it is sent to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Star disadvantages

A

Expensive because of switch and cables

If switch fails entire network goes down

17
Q

Bus topology description and advs

A

All devices are attached to backbone main cable
Easy to install
Cheap
No reliance on central node

18
Q

Bus disadvantages

A

If the main cable fails the whole network goes down
Cable failures are hard to isolate because all computers are affected
Traffic increases so performance is slow
Low security as every node can see all the transmissions

19
Q

PAN

A

Personal are neat work like Bluetooth

20
Q

Ethernet

A

Protocols used in LANs - describes data transmission
Nodes will wait until connection is quiet before contacting each other
Two nodes attempting to transmit simultaneously will stop and each wait a random period before attempting

21
Q

Ethernet cables types advantages and disadvantages

A

Two types Ethernet - fibre optic and twisted pair copper
Copper - cheaper, rural areas use for telephones, speed is alright for most apps
Fibre optic - greater bandwidth, faster transmission, more durable, do not break as easily, only loses 3% of signal over 100m compared to 94% loss in copper

22
Q

Network security methods

A

Authentication
Encryption
Firewall
MAC address filtering

23
Q

Authentication

A

Username % strong password which contains numbers alphabets and symbols and is not shared with anyone - account locks after certain amount of failed attempts.
User Access Levels - some files are read only some can’t be accessed by lower clearances

24
Q

Encryption plus terminology

A

Protects data from being hacked or used illegally
Changes then original msg (plaintext) using code into ciphertext
An encryption algorithm is used and the other computer must have the key to access the data

25
Q

Caesar shift cipher

A

Shifts alphabet n times

26
Q

Firewall

A

Prevent unwanted internet traffic from gaining access to LAN
Unauthorised users are blocked by firewall whcih csn also block access to ports such as FTP. It blocks data from certain IP addresses or ports

27
Q

MAC address filtering

A

MAC addressses that are permitted can join networks - doesn’t screen individuals though

28
Q

WAP

A

Wireless Accesss Point enables WiFi compatible devices to access internet via a wireless LAN

29
Q

TCP/IP stands for and does

A

Transmission Control Protocol/Internet Protocol
TCP - defines the breaking down of data into packets and reassembly at destination. Detects errors and resends lost packages.
IP - identifies location of device on the Internet and routes individual packets from the source to the destination

30
Q

UDP stands for

A

User Datagram Protocol
Apps can send msgs (datagrams) to other hosts on an IP network
Alternative to TCP/IP but no error checking or correction
Maintains an open communication between recipient and sender during duration of communication hence is used in online gaming sessions.

31
Q

HTTP stands for and does

A

Hyper Text Transfer Protocol
Used for accessing and receiving web pages in the form of HTML. Requests web server to transfer requested web page to the users browsers for viewing

32
Q

HTTPS stands for and does

A

Hyper Text Transfer Protocol Secure

Does sameas HTTP but encrypts data so is secure

33
Q

FTP stands for and demos

A

File transfer Protocol
Trasnferijgn computer files from client to server
Uses separate control and data connections between the client and the server

34
Q

IMAP stands for and does

A

Internet Messagign Access Protocols
Email protocol that stored email msgs on a server but allows users to view and manipulate the msgs as though they are stored on own computers.

35
Q

SMTP stands for and does

A

Simple Mail Transfer Protocol sending emails between servers
Sends out email from client and for relating or forwarding mail msgs - necessary if sender and recipient have different email service providers

36
Q

TCP/IP LAYERS ORDER and function

A

Application - network apps like browser operates. Data is encoded so means formatting data and adding the correct header eg HTTP,HTTPS,FTP,IMAP,SMTP
Transport - sets up communication between two hosts and establishes settings like language and packet size. Data is split into packets and adds packet info like what packet number it is and total. Hides different architectures of network. TCP/UDP
Network/Internet Layer - addresses and packages data for transmission and routes the packets across the network. Attaches senders IP address
IP
Link - NIC is located and OS device drivers. MAC address of sender and recipient is attached allowing the direction of the packet to a specific device on LAN for example