cs networks Flashcards

1
Q

what is a network

A

name given to ​two or more​ computers connected together with the ability to ​transmit data​ between each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 main types of networks

A

local area networks​ (LAN)
wide area networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a LAN

A

any network that covers a ​small geographical area​ or a ​single site​ (School)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

note about hardware in LAN

A

tends to be owned and controlled by the organisation using it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how are LAN connected

A
  • UTP cable
  • Fibre optic
    -WI-FI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name of the largest public network

A

the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is WAN

A

the name given to a network which covers a large geographical area
example: Large corporations with offices in multiple locations will often have a WAN allowing them to communicate between different sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how are WANs formed

A

when multiple LANs are physically located in different areas and are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how are WANs connected

A

telephone lines
fibre optic lines
satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 types of network topology

A

physical
logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a network topology

A

A network’s topology is the arrangement, or pattern, in which all nodes on a network are connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a node

A

name given to device connected to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

advantages of neworks 4

A
  • users can share files
  • users can access files from any computer on the network
  • communicate with other people (email)
  • users can share connections to 0ther network (e.g Internet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantage of networks 4

A
  • increased security risks to data
  • malware and viruses spread very easily between Computer
  • if server fails, the computer connected to it may. not work
  • computers run slower if there is a lot of data travelling on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are standards

A

a set of hardware and software specifications that allow manufacturers to create Products and services that are compatible with each other (e.g HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does physical topology mean ?

A

the ​physical layout​ of the wires and components which form the network.(how nodes are physically connected)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what does logical topology mean

A

the layout which shows how ​data flows​. (how device communicate across the physical topology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

examples of topologies

A

bus topologies (physical)
star topology (physical)
physical mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is a bus topology

A

one cable that connects every device on the network, which is called the backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantages of bus topology

A

● Relatively inexpensive to set up
● Doesn’t require any ​additional
hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Disadvantage of bus topology

A

● If ​backbone cable fails​, the entire network gets disconnected
● As traffic increases, ​performance decreases
● All computers can ​see the data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is a star topology

A

each device on the network is connected to a central communication device, such as a Hub or a Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

note of bus topology

A

At each end of the main cable there is a small device called a terminator, which absorbs the signals when they reach the end, to prevent interference
data is sent in one direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Advantages of star topology

A

● Performance is ​consistent​ even with heavy network traffic
● If one cable fails,​ only that single terminal is affected
● Transmits data faster​, giving better performance than bus topology
● Easy to add new stations.
● No data ​collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Disadvantage

A

● Expensive​ due to switch and cabling
● If the central ​switch fails​, the rest of
the ​network fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is a switch

A

a type of central. node that sends each communication to the specific computer it is intended for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what are protocols

A

A protocol is a ​set of rules​ defining how two computers ​communicate​ with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

why are protocols important

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what may protocols be used for

A
  • communication over LAN/WAN
    web page transfer
    file transfer
    email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

name the 9 most common protocols

A

TCP
IP
UDP
HTTP
HTTPS
FTP
POP
IMAP
SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

give the full name for the protocols listed above

A

TCP : Transmission Control Protocol
IP: Internet Protocol
UDP: User Datagram Protocol
HTTP:Hypertext Transfer Protocol
HTTPS: Hypertext Transfer Protocol secure
FTP: File transfer protocol
POP: Post office protocol
IMAP: Internet Message Access protocol
SMTP: simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

list where the 9 protocols are found its (area of purpose)

A

TCP: Communication over LAN/WAN
IP:Communication over LAN/WAN
UDP:Communication over LAN/WAN
HTTP: Web page requests
HTTPS:Web page requests
FTP: File transfers
POP: Email
IMAP: Email
SMTP: Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the importance of protocols and standards

A
  • protocol defines a set of rules for data communication (to avoid interference)
    they must be standards accross all devices in all networks in order for communication to work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is TCP/IP STACK

A

work together in the routing of packets through networks (the foundation of communication over the internet)
TCP provides error -free transmission between two routers
IP routes packets across a wide are network (Wn)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what does UDP do

A

an alternative to TCP but has no error checking
sends short messages using datagrams, where speed is more important than accuracy
it uses a simple connectionless transmission model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is HTTP

A

a way for a client and server to send and receive requests and deliver HTML web pages (used for web rendering)
- it is the fundamental protocol of the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the difference between HTTPS and HTTP

A

both do the same Job https provides more security through encryption and authentication (the process of proving that some fact or some document is genuine)

an encrypted version if http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

when should HTTPS be used

A

must be used whenever a website deals with sensitive information such as passwords or bak account details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is FTP

A

a protocol used for sending files over network (computers),usually on WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what can be used on top of FTP

A

FTp clients which are software applications that sit on top of the actual FTP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what are the 3 protocols that are used in mail servers to deal with email

A

POP3
IMAP
SMTP
Mailing protocols, used for email access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does the SMTP do

A

transfers outgoing emails between servers.
SMTP primarily sends messages to a server for forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what does the POP3 do

A

POP3 is the most recent version of POP
retrieves emails form a ,ail server and transfers the, to your device, removing them from the server in the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what does the IMAP do

A

keeps emails on the mail server, allows you to access your email wherever you are, from any device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what is a standard

A

an agreed set if rules for manufacturers and developers to follow
USB (hardware)
HTML (software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

difference between internet and the WWW

A

The Internet is a ​network of networks​ which allows computers on opposite sides of the globe to communicate with each other using a back bone to connect
www is a service on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

describe the process of internet when used by a user(at home)

A

the place is usually connected by a wireless router
- the router is connected to an internet service provider (ISP) via a fibre optic cable or telephone connection
-Isp is connected to a domain name server and other routers that make up the backbone of the internet
(routers may be WAN/LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

how does network able to communicate via internet

A

TCP/IP Stacks A ​stack of networking
protocols​ that work together passing packets during communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

describe what happens in the application layer

A

top of the stack.
It specifies ​what
protocol​ needs to be used in order to ​relate the application that’s being sent​.

e.g email needed FTP, Web browsing needs HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

describe what happens at the transport layer

A

The transport layer uses TCP to establish an ​end-to-end connection
between the source and recipient computer.
I charge of spliting data into packets , the total number of packets the original data was split
up into and the port number being used for communication.

51
Q

what happens if data packets get lost

A

the transport layer ​requests retransmissions of these
lost packets.

52
Q

describe what happens in the internet layer or network layer

A

users the Ip to address packets with the source and destination ip adresses
the router is what uses the IP
addresses to forward the packets.
○ The sockets are then used to specify which device the packets must be sent
to and the application being used on that device.

53
Q

what is a socket address

A

the combination of the IP address and the port numbe

54
Q

what happens at the link layer

A

connection between the network devices​, it adds the MAC address​ identifying the ​Network Interface Cards​ of the source and destination computers.

55
Q

what happens to layer when thing is at its destination

A

it is passes back up
this time from link to the application ()present the image for the user in browser
1. the MAC address is removed by the link layer, then the IP addresses are removed by the Network Layer, then the transport layers remove the port number and reassemble the packets. Finally, the application layer presents the data to the recipient in the form it was requested in.

56
Q

2 type of internet adresses

A

Mac adresses
ip addresses

57
Q

what is a MAC address

A

a unique serial number assigned to each network interface controller (NIC) . This allows a network to uniquely identify any device each time the device connects to a network.

58
Q

notes about MAC adress

A

every physical device has a unique Mac address
switches learn and store the Mac ADRESSNFOR CONNECTED lan

59
Q

why aren’t router used to store MAC address

A

too many Mac address which would take too long to find a particular address ro decide which connection to route traffic down
so they routers cache some IP address

60
Q

how can we think of Mac and ip address

A

MAC address tells who you are
IP address tells me where you are

61
Q

why can MAC address work on the internet

A

there are too many devices which is why it is suitable for LAN devices

62
Q

what is a DNS

A

domain name system​ (DNS) is the system used to​ name ​and ​organise internet resources​.

63
Q

what is the most popular service that the internet offers

A

World Wide Web

64
Q

what is the World Wide Web

A

all the public websites or pages that users can access on their local computers and other devices through the internet.

65
Q

what is a domain name

A

a domain name is a name given to a website which corresponds to an IP address

66
Q

what is the role of the domain name server

A

to translate these domain names into IP addresses when we wish to access a website.

67
Q

how do DNS categorise domain name

A

in a hiercahy domain system
TLD : which could either be generic such as .com/.org or could be country TLD such as .uk/.es
2LD: which is a 2nd level domain
3LD : name of the site

68
Q

what is a URL

A

the address that is used in the web browser to request a resource (web page) from the world wide web.

the entire thing
http://www.bbc.co.uk/index.html.

69
Q

describe how is a user allowed to surf the internet

A
  1. user request URL via a browser
    2.browser sends the domain name to DNS
    3.the DNS maps the domain name to the IP address and returns it to the browser
  2. A GET request fors the web page or resource is sent to the web server using the IP address
  3. The requested web page or resource is returned to the user’s web browser
70
Q

describe in detail the process of DNS

A
  1. URL is received by a DNS resolver server
    2.The server queries a DNS root name server
    3.The root server responds with the address of the TLD e.g .com
    4.The resolver makes a request to the .com TLD server
    5.The TLD server then responds with IP address of the domain name server google.com
    6.recursive resolver sends a query to the domain name server
  2. the IP address of Google.com (8.8.8)
    is the returned to the resolver from the name server
    the DNS resolver responds to the web browser with the IP address
71
Q

what is an important understanding of the DNS summary of dns process

A

the DNS Is number of different and separate domain name servers. their overall goal is the same typing url and if exists it will return the IP address

72
Q

what is the purpose of WI’Fi

A

a wireless networking technology providing high speed internet and network connection

73
Q

how do devices connect to internet

A

WAP (wireless network access point )

74
Q

how do network communicate

A

via data packets

75
Q

what are data. packets

A

data broken into chunks that contain vital and various types of information and assembled again at the receiving end

76
Q

2 methods which networks use to exchange data

A

circuit switching and packet switching

77
Q

what is packet switching

A

Packet switching is a method of communication in which data is communicated using packets​ across a network. In this method of communication, packets are sent across the most efficient route, which can vary for each packet.

78
Q

advantages of packet switching

A
  • Multiple methods to ensure data arrives intact eg. ​checksums​ and ​cyclic redundancy checks
    -Multiple routes can be used between devices, so if one path breaks, another can be used.
    -Packets can be transferred over ​very large networks​ to allow communication globally.
79
Q

disadvantages of packet switching

A
  • Time is spent deconstructing and reconstructing the data packets
    -Must wait for all packets to arrive before data can be received.
80
Q

what is circuit switching

A

Circuit switching is a method of communication where a ​direct link​ is created between two devices.
his direct link is maintained for the duration of the ​entire conversation​ between devices. Circuit switching requires the two devices to transfer and receive data at the same rate​.

81
Q

Advantages of circuit switching

A

Data arrives in a logical order which results in a ​quicker reconstruction​ of the data.
Enables two users to hold a call ​without delay in speech

82
Q

disadvantages of circuit switching

A

-Bandwidth is wasted ​during periods of time in which no data is being sent.
- Devices must transfer and receive data at the same rate
- Using switches means electrical interference may be produced which can corrupt​ or ​destroy ​data.
- Ties up sections of the network which cannot be used by others data until transmission has been completed

83
Q

what is a bandwidth

A

is a measure of the data transfer rate or capacity of a given network.
the speed and quality of a network.

84
Q

compare circuit switching vs packet switching

A

circuit switching
- physical path between source and destination
- all plackets use the same path
- reserves bandwidth in advance
- can cause a lot of bandwidth wastage
- no store and forward transmission

packet switching
- no physical path
packets travel independently
does not receive bandwidth
no bandwidth wastage
supports store and forward transmission

85
Q

what is a client server

A

consists of two parts the client and server
The
server is a​ powerful, central computer​. The server holds all of the ​important information and resources​ and has ​greater processing power​ than the terminals, it waits for request from clients. The client accesses data, services and files from the server it initialises communication
Clients can request to use the server.

86
Q

what are the advantages of client server

A

More ​secure ​as data is stored in one location
● Central backups​ are carried out so there is no need for individual backups
● Data and resources can be ​shared between clients

87
Q

disadvantages of client- server

A

● Relatively expensive​ to set up/maintain
● Functionality of terminals depends
on the server; if this fails,
performance falls
● Trained staff are required to
maintain the server
requires IT specialists

88
Q

example of a client server

A

school

89
Q

what does a server do in client -server architecture

A

provide services such as
managing printing jobs
provide emails device
runs regular back up of data
manages access to the internet
controls access and security fir a shared file store

90
Q

when should client - server models be used

A

organisations with a large number of computers or situation where many computers needs access to the same information

91
Q

what is a peer to peer model

A

all computers have equal status they are connected to each other to share files. - no computer has control over the network. each device acts as both a server and client as it can both provide and request resources

92
Q

advantages of peer to peer network

A

● Cheaper to set up
● Allows users to share resources
● Easy to maintain
● Not dependent on a central server
● Specialist staff are not required

93
Q

Disadvantage of peer to peer

A

● Impossible to trace the origin of files
● Backups must be performed
separately
● Poorer security
● May be difficult to locate resources

94
Q

what are the need for network security/ its aim

A
  • only allow authorised users to access what they need
  • prevent unauthorised access(intrusion and hacking)
    minimise the potential damage caused by unauthorised access
95
Q

define hackers

A

a person who attempts to gain access goto a computer system with the intent of damaging data. somehow hamming the system

96
Q

types of hackers

A
  • black hat hackers
  • white hat hackers
  • grey hat hackers
97
Q

what is black hat hacker

A

they attempt to Gain access via nefarious mean, typically to steal company secrets / cause damage

98
Q

what is a white hack hackers

A

security experts (employed by a company )use expertise to try and find vulnerabilities and fix them

99
Q

what is a white hack hackers

A

security experts (employed by a company )use expertise to try and find vulnerabilities and fix them

100
Q

what are grey hat hackers

A

both black and white hat hackers
no employed by a company bu attempt to find flaws and vulnerability in company wide computer systems as a hobby

101
Q

define malware

A

term that covers any computer code written with the intent to frustrate or harm

102
Q

reasons why malware is created/ effects of malware

A
  • delete , corrupt and encrypting files
  • causing computers to crash, reboot files
  • reducing network speeds
  • logging keyboard inputs and sending them to hackers
103
Q

types of malware

A
  • virus
    worm
    trojan
    phishing
    spyware
104
Q

define viruses

A

pieces f code capable of copying themselves and spreading throughout a system

105
Q

why are viruses used

A

to have a detrimental effect like corrupting a file system or destroying data

106
Q

what is spyware

A

form of malware that covertly obtains information pbpput a users’s computers activities by transmitting data from their device

107
Q

uses of spyware

A

to harvest sensitive and personal data
visited web pages
download habits
passwords
cookies

108
Q

define works

A

standalone program that does not require a user to run it fr it to spread (exploit vulnerability)

109
Q

what are trojans

A

type of malware that disguises itself as legitimate code or software to trick user into executing it

110
Q

what can trojans do

A

performs malicious actions such as data theft, redirecting search requests, installing further malware, or opening a “backdoor” for remote control of your computer.

111
Q

what is phishing

A

using email to manipulate a victim into visiting a fake email and giving away personal information

112
Q

what is phishing (type of social engineering )

A

using email to manipulate a victim into visiting a fake email and giving away personal information

113
Q

how can networks prevent being threatened

A

use methods of network security

114
Q

what are the types of network security

A

firewalls
proxies
encryption
antivirus
secure passwords

115
Q

is pharming

A

similar to phishing but the server misdirects users to fraudulent websites without their knowledge (winning 4k)

116
Q

what are firewalls

A

device designed to ​prevent unauthorised access​ to a network

117
Q

how do firewalls work

A

consists of two network interface cards (NICs) between the user and the Internet. The firewall passes the packets between these two NICs and compares them against a set of rules set by the firewall software

118
Q

why are firewalls used

A

block certain ports
prevent : unauthorised internet traffic form outside LAN
Users in LAN from accessing parts of the internet prohibited by the company they work for

119
Q

why is securing password minimising network threats

A

makes it more difficult to guess (through algorithms)
however enforvong overly strict rules ca cause users to forget it

120
Q

ways of making password more secure

A

Up/Low case letters
- not the same as other passwords
must be changed every x days
cat be based on name
of a certain length

121
Q

types of network hardware

A

Network interface cards (NIC)
Switch
Wireless Access Point (WAP)
Routers
Gateway

122
Q

define Network interface cards (NIC)

A

A network interface card is the card required to ​connect a device to a network​. This is usually built into the device and assigns a unique media access control (MAC) address to each device. The MAC address is a ​48-bit value​ coded into the device and is usually written as a ​twelve digit hexadecimal ​number.

123
Q

what does an TCP do

A

used to break up the data into packets, it will keep track of the packets, and it will re-assemble the packets

124
Q

What does the IP do

A

IP is used to deliver each individual packet.