Digital technology networks Flashcards
Define the “internet”
Is a huge network of computers, servers and other devices that are connected to each other and can communicate with each other using communication protocols.
What is the infrastructure of the internet
- Servers
- Fibre optic cables
- Network routers
- Data centres
- Wireless Towers
What are the functionality provided by DNS
- Loading Balancing
- Redirection
- Authentication
- Service directory
What are the software components of computer networks
- Operating Systems
- Network security software
- Virtual private network
- Backup and recovery
What are the hardware components of computer networks
- Routers
- Switches
- Hubs
- Bridges
- Access points
- Modems
*Network interface card
What are the infrastructure components of a computer network
- Cables
- Network servers
- Wireless access points
- Cooling systems
- Data centres
- Power back-up servers
Define Packet switching
Packet switching is the method used to transmit data over a network using the internet protocol.
It works by dividing large amounts of data into smaller manageable units called packets.
Define Servers, Data centres and Network routers
Servers: powerful computers that store and manage data, websites, and applications.
Data centres: secure facilities that house and manage large numbers of servers
Network routers: devices that direct data traffic between computers and across networks
Define Fibre optic cables and Wireless towers
Fibre optic cables: high-speed data transmission lines that connect data centres, routers, and other parts of the network
Wireless towers: structures that allow data to be transmitted wirelessly using technologies such as Wi-Fi and cellular networks.
What are the environmental concerns
- Land use
- Resource Depletion - The production of electronics and other components often requires the extraction of finite natural resources
- Electronic waste, from production and general use
- Energy consumption, The use of the internet consumes alot of electricity
What does the internet standards ensure
interoperability, functionality, and security of the Internet
What does the World wide web consortium (W3C) do for the internet
The W3C is focused on the development of standards for the World Wide Web, including HTML, CSS, and JavaScript.
It aims to ensure the Web is accessible to everyone, regardless of their abilities.
What does the Internet Engineering Task Force (IETF) do for the internet
Develops and maintains technical standards for the Internet as a whole, including the Internet Protocol (IP),the Transmission Control Protocol (TCP), and the Domain Name System (DNS).
It also deals with security, mobility, and other issues related to the Internet’s technical infrastructure
What is the content of a TCP segment
Includes - Source port number, Destination port number, Sequence number, Acknowledgment number, Window Size, Checksum, Urgent pointer, Options/padding, Data
What is included in an IP packet
Includes - Data, source address, destination address, , total number of packets, packet number
Define Routing
The process of determining the path an IP packet should take to reach its destination.
Define Routing Tables
routing tables, which are lists of known network destinations and the best next hop for each destination.
Define Hubs
A hub is a networking device that allows multiple devices to be connected to a single network
What are the risks of routing
Security: Routing protocols and routing tables can be vulnerable to attack and exploitation by malicious actors.
Network congestion: Routing algorithms may not always make optimal decisions, leading to network congestion and reduced performance
Scalability: As networks grow larger and more complex, routing can become a scalability challenge.
What is the formula for transmission Speed
Transmission speed = File size / Time taken to transfer a file
What is the formula for calculating file transfer time
Time taken to transfer a file = File size / Transmission speed
What are the factors that can affect transmission speed
Network Bandwidth
Congestion
Latency
File size
File type
How does technology support mobile phone communication
- Mobile phone masts
- Cells
- Handoffs
- SS7
- IPv6
- SIP
Define Switched hubs
Also known as switches are advanced versions of traditional hubs and provide dedicated connections between devices allowing for faster data transmission and reduced network congestion
Define cloud computing
Cloud computing involves the delivery of a range of computing services over the Internet, while cloud storage refers specifically to the storage of data on remote servers.
Define repeaters
Repeaters are networking devices used to extend the range of a network.
Define Wireless access points
are networking devices that enable devices to connect to a wireless network and access network resources, such as the Internet.
Define media converters
Media converters are networking devices used to convert signals from one type of physical device to another.
Define DNS
DNS is used to translate human-readable domain names, such as “www.example.com”, into IP addresses that machines can understand.
What are the uses of DNS
Load Balancing: DNS can be used to distribute the load of incoming requests across multiple servers by returning the IP address of a server that is not heavily loaded
Redirection: DNS can be used to redirect incoming requests from one domain name to another, or from one IP address to another, allowing network administrators to redirect traffic as needed
Service Discovery: DNS can be used to advertise the availability of services on a network, allowing clients to discover and connect to these services automatically
How can DNS be used to prevent attacks
Authentication: Some DNS servers can be configured to use cryptographic signatures to authenticate the source of DNS information, helping to prevent cache poisoning attacks and other forms of DNS-based fraud
What are the vulnerabilities of DNS
Cache Poisoning
Spoofed Responses
DDos attack
Name Server Hijacking
Zone Transfer Attacks
Define Cache Poisoning
Cache poisoning is a type of attack where an attacker injects false information into the cache of a DNS resolver, causing it to return incorrect IP addresses for domain names
Define Spoofed Responses
An attacker can send spoofed DNS responses to a DNS resolver, either by forging the source address of the response or by exploiting a weakness in the DNS protocol
Define DDos attack
DDoS (Distributed Denial of Service) attacks, which flood the servers with a large number of requests, causing them to become overwhelmed and unavailable.
Define Name Server Hijacking
An attacker can compromise a DNS server and change the information stored on the server, allowing them to redirect traffic to malicious sites, steal sensitive information, or spread malware.
Define Zone Transfer Attacks
An attacker can request a copy of the entire zone file from a DNS server, which contains information about all of the domain names managed by that server.
Define Tracert
Is a network diagnostic tool used to track the path taken by data packets from a source computer to a destination computer.
It is useful for troubleshooting networks connectivity issues, such as slow and unreliable performance.
What is a Tracert used for
It is used to determine the network route, the number of hops between the source and destination and the time taken for data packets to travel from source to destination.
It is useful for troubleshooting networks connectivity issues, such as slow and unreliable performance.
Define Whois
Is a protocol and database system that stores info about registered domain names and associated organisations and individuals
Info includes the name, contact information of domain owner
what is Whois used for
Is used to retrieve information about the owner of a particular domain name and to verify the accuracy of the information listed in the data.
This can be used to resolve disputes over domain names, verifying the authenticity of a domain registration.
What are the main considerations of choosing a ISP
Speed
Availability
Reliability
Cost
Data caps
How to analyse user requirements for suitable network and
internet components
Gather User Requirements - surveys, focus groups, or interviews
Evaluate Network Requirements - Needed bandwidth, number of users
Determine Network Components: Based on the network requirements, select the appropriate network components
Validate and Test: Before finalising the specifications, validate the proposed network architecture and components through testing and simulation.
What are the main properties and characteristics of LAN
LANs typically cover a small geographic area, such as a single building or campus
LANs are typically limited to a few dozen to a few thousand devices.
LANs offer high data transfer speeds, typically in the range of 10 Mbps to 100 Gbps
LANs are generally less expensive to implement than other types of networks
LANs can be secured through the use of firewalls, access controls, and encryption
LANs can be configured in various topologies, including star, bus, ring
LANs use various communication protocols, such as Ethernet, TCP/IP, and WiFi.
What are the main properties and characteristics of WAN
WANs typically cover a large geographic area, such as a city, a country, or even the entire world
WANs can connect an unlimited number of devices
WANs typically offer lower data transfer speeds compared to LANs, several gigabits per second
WANs are generally more expensive to implement and maintain than LANs
WANs are vulnerable to various security threats and require the use of multiple security measures
WANs can be configured in various topologies, including point-to-point, star, mesh, and hybrid
WANs use various communication protocols, such as Frame Relay, ATM, MPLS, and VPN.
Define VLAN
Virtual LAN (VLAN) is a concept in computer networking that allows administrators to logically segment a physical network into smaller broadcast domains.
What are some characteristics of VLAN
Logical Segmentation: VLANs allow a physical network to be divided into smaller, logically separate broadcast domains.
- Increased Security: VLANs make it more difficult for unauthorised users to access sensitive data.
- Improved Scalability: VLANs help to improve network scalability by allowing administrators to add more devices to the network
- Reduced Broadcast Traffic: In a VLAN network, broadcast traffic is limited to the specific VLAN segment, improving overall performance
- Enhanced Network Management: VLANs allow administrators to easily manage network resources and devices
- Reduced Network Complexity: By reducing the size of broadcast domains
What is the equipment needed to setup VLAN
- Switch: A network switch is a central device that connects all the other devices in a network.
- Router: A router is used to route traffic between different VLANs.
- Network Interface Cards (NICs): Each device in a VLAN network must have a network interface card that supports VLAN tagging
- Cables: Cables are used to connect devices to the switch.
- Network Management Software: Network management software is used to manage and configure the VLAN network.
Define WLAN
A Wireless Local Area Network (WLAN) is a type of network that uses wireless communication technology to connect devices.
What are characteristics of WLAN
- Wireless Connectivity: wireless communication to connect devices, eliminating the need for physical cables.
- Mobility: WLANs allow devices to connect and disconnect from the network dynamically.
- Flexibility: WLANs can be set up quickly and easily
- Limited Range: WLANs have a limited range, typically a few hundred feet
- Interference: WLANs are susceptible to interference from other wireless devices
- Security: WLANs can be vulnerable to security threats
- Network Management: WLANs require proper network management to ensure reliable and secure operation.
- Standardisation: WLANs are standardised through the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard
What is the equipment needed to setup WLAN
- Wireless Access Point (AP)
- Wireless Network Adapter
- Router: A router is used to route traffic
- Cables
- Network Management Software
Define VPN
A Virtual Private Network (VPN) is a type of network that allows users to securely access resources over a public network, such as the Internet
What are the characteristics of VPN
- Encryption: VPNs use encryption to protect the data being transmitted over the public network
- Remote Access: VPNs allow users to securely access network resources from remote locations
- Tunnelling: VPNs use tunnelling protocols, to create a virtual tunnel between the client device and the network, providing an extra layer of protection
- Authentication: VPNs use authentication methods, such as passwords, certificates, or biometric authentication
- Compatibility: VPNs are compatible with a wide range of devices
What is the equipment needed to setup VPN
- VPN Server: A VPN server is the central device that provides VPN connectivity to clients.
- Client Devices: Each device that needs to connect to the VPN network must have a VPN client installed.
- Router: A router is used to route traffic between the VPN network and the public network.
- Cables: Cables are used to connect the router to the internal network.
- Network Management Software: Network management software is used to manage and configure the VPN network.
What are the issues with VPNs
Security concerns, what if the actual VPN server gets hacked
Dependence on Third-Party Hardware
Complexity: VPNs can be complex to set up and maintain
Decreased Visibility: VPNs can hide the origin of network traffic, making it difficult to detect malicious activity
What are the advantages of VPNs
Increased security
Cost saving
Increased productivity
What are the benefits of computer networks in terms of Efficient use of software and hardware resources
Centralised Resource Sharing: Computer networks allow multiple users to access and
use shared resources
Centralised Software Management: Computer networks can be used to centrally manage and distribute software
Load Balancing: Computer networks can be used to distribute the processing load across multiple computers, improving overall system performance
Improved Collaboration: Computer networks allow multiple users to collaborate on projects and share information
What are the benefits of computer networks in terms of data access and sharing
Computer networks allow users to access and share data from any location
Computer networks can be secured using encryption and other security measures, protecting sensitive data
Computer networks allow multiple users to access and share data
What are the benefits of computer networks in terms of collaborative working
Improved Communication: Computer networks allow multiple users to communicate and collaborate in real time, regardless of their location
Shared Workspaces: Computer networks allow multiple users to access and work on shared files and documents
Improved Decision-Making: Computer networks allow for Improved Decision-Making
What are the different types of servers
File server
Printer server
proxy server
mail server
Define proxy server
An Internet proxy server is a server that acts as an intermediary between a client and a server, forwarding requests and responses between them
Define mail server
A mail server is a computer system that provides email services to users.
It has some key features such as Storage, delivery, virus protection, backup and recovery
Define printer server
The printer server enables multiple users on a network to access and use the same printer
Define Twisted wire pair
Twisted pair wire is a type of cable that consists of two insulated copper wires that are twisted together to form a single cable.
UTP cables have no metal shield around the twisted wires, making them lighter and more flexible than STP cables
STP cables have a metal shield around the twisted wires to protect against electromagnetic interference (EMI)
Define fibre optic cable
A fibre optic cable is a type of cable that is used to transmit data using light. It consists of a core made of glass or plastic fibres, surrounded by cladding and a protective coating.
What is the difference between cloud computing and cloud storage
Cloud computing refers to the delivery of computing services over the internet, such as servers, storage, databases, software, analytics, and more.
Cloud storage, on the other hand, refers to the storage of data on remote servers that are accessed over the internet.
Evaluate cloud services
Advantages
Scalability
Flexibility
Cost-effective
Easy to use
Disadvantages
Need internet connection
Security concerns
Ongoing-costs
Define Iaas
IaaS stands for “Infrastructure as a Service.” It is a cloud computing model in which a third-party service provider offers virtualised computing resources over the internet
Define Paas
PaaS stands for “Platform as a Service.” It is a cloud computing model in which a third-party service provider offers a platform that enables developers to build, deploy, and manage their own software applications over the internet.
Define mobile phone masts
Mobile phone masts, also known as cell towers, work by transmitting and receiving radio waves between a mobile device and the mobile network.
Define mobile phone cells
Mobile cells, also known as “cellular networks,” work by dividing a geographic area into smaller geographic areas, called cells
Define handoffs
Mobile handoffs, also known as “handovers,” are the process of transferring a mobile device’s communication from one cell to another as the device moves from one geographic area (cell) to another