Digital technology networks Flashcards

1
Q

Define the “internet”

A

Is a huge network of computers, servers and other devices that are connected to each other and can communicate with each other using communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the infrastructure of the internet

A
  • Servers
  • Fibre optic cables
  • Network routers
  • Data centres
  • Wireless Towers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the functionality provided by DNS

A
  • Loading Balancing
  • Redirection
  • Authentication
  • Service directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the software components of computer networks

A
  • Operating Systems
  • Network security software
  • Virtual private network
  • Backup and recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the hardware components of computer networks

A
  • Routers
  • Switches
  • Hubs
  • Bridges
  • Access points
  • Modems
    *Network interface card
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the infrastructure components of a computer network

A
  • Cables
  • Network servers
  • Wireless access points
  • Cooling systems
  • Data centres
  • Power back-up servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Packet switching

A

Packet switching is the method used to transmit data over a network using the internet protocol.

It works by dividing large amounts of data into smaller manageable units called packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Servers, Data centres and Network routers

A

Servers: powerful computers that store and manage data, websites, and applications. ​

​Data centres: secure facilities that house and manage large numbers of servers ​

Network routers: devices that direct data traffic between computers and across networks ​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Fibre optic cables and Wireless towers

A

Fibre optic cables: high-speed data transmission lines that connect data centres, routers, and other parts of the network ​

​Wireless towers: structures that allow data to be transmitted wirelessly using technologies such as Wi-Fi and cellular networks. ​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the environmental concerns

A
  • Land use
  • Resource Depletion - The production of electronics and other components often requires the extraction of finite natural resources
  • Electronic waste, from production and general use
  • Energy consumption, The use of the internet consumes alot of electricity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the internet standards ensure

A

interoperability, functionality, and security of the Internet​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the World wide web consortium (W3C) do for the internet

A

The W3C is focused on the development of standards for the World Wide Web, including HTML, CSS, and JavaScript.

It aims to ensure the Web is accessible to everyone, regardless of their abilities.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Internet Engineering Task Force (IETF) do for the internet

A

Develops and maintains technical standards for the Internet as a whole, including the Internet Protocol (IP),the Transmission Control Protocol (TCP), and the Domain Name System (DNS).

It also deals with security, mobility, and other issues related to the Internet’s technical infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the content of a TCP segment

A

Includes - Source port number, Destination port number, Sequence number, Acknowledgment number, Window Size, Checksum, Urgent pointer, Options/padding, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is included in an IP packet

A

Includes - Data, source address, destination address, , total number of packets, packet number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Routing

A

The process of determining the path an IP packet should take to reach its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Routing Tables

A

routing tables, which are lists of known network destinations and the best next hop for each destination.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Hubs

A

A hub is a networking device that allows multiple devices to be connected to a single network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the risks of routing

A

Security: Routing protocols and routing tables can be vulnerable to attack and exploitation by malicious actors. ​

Network congestion: Routing algorithms may not always make optimal decisions, leading to network congestion and reduced performance​

Scalability: As networks grow larger and more complex, routing can become a scalability challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the formula for transmission Speed

A

Transmission speed = File size / Time taken to transfer a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the formula for calculating file transfer time

A

Time taken to transfer a file = File size / Transmission speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the factors that can affect transmission speed

A

Network Bandwidth
Congestion
Latency
File size
File type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does technology support mobile phone communication

A
  • Mobile phone masts
  • Cells
  • Handoffs
  • SS7
  • IPv6
  • SIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define Switched hubs

A

Also known as switches are advanced versions of traditional hubs and provide dedicated connections between devices allowing for faster data transmission and reduced network congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define cloud computing

A

Cloud computing involves the delivery of a range of computing services over the Internet, while cloud storage refers specifically to the storage of data on remote servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define repeaters

A

Repeaters are networking devices used to extend the range of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define Wireless access points

A

are networking devices that enable devices to connect to a wireless network and access network resources, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define media converters

A

Media converters are networking devices used to convert signals from one type of physical device to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define DNS

A

DNS is used to translate human-readable domain names, such as “www.example.com”, into IP addresses that machines can understand.​

30
Q

What are the uses of DNS

A

Load Balancing: DNS can be used to distribute the load of incoming requests across multiple servers by returning the IP address of a server that is not heavily loaded ​

Redirection: DNS can be used to redirect incoming requests from one domain name to another, or from one IP address to another, allowing network administrators to redirect traffic as needed

Service Discovery: DNS can be used to advertise the availability of services on a network, allowing clients to discover and connect to these services automatically​

31
Q

How can DNS be used to prevent attacks

A

Authentication: Some DNS servers can be configured to use cryptographic signatures to authenticate the source of DNS information, helping to prevent cache poisoning attacks and other forms of DNS-based fraud ​

32
Q

What are the vulnerabilities of DNS

A

Cache Poisoning
Spoofed Responses
DDos attack
Name Server Hijacking
Zone Transfer Attacks

33
Q

Define Cache Poisoning

A

Cache poisoning is a type of attack where an attacker injects false information into the cache of a DNS resolver, causing it to return incorrect IP addresses for domain names​

34
Q

Define Spoofed Responses

A

An attacker can send spoofed DNS responses to a DNS resolver, either by forging the source address of the response or by exploiting a weakness in the DNS protocol​

35
Q

Define DDos attack

A

DDoS (Distributed Denial of Service) attacks, which flood the servers with a large number of requests, causing them to become overwhelmed and unavailable.​

36
Q

Define Name Server Hijacking

A

An attacker can compromise a DNS server and change the information stored on the server, allowing them to redirect traffic to malicious sites, steal sensitive information, or spread malware.

37
Q

Define Zone Transfer Attacks

A

An attacker can request a copy of the entire zone file from a DNS server, which contains information about all of the domain names managed by that server.​

38
Q

Define Tracert

A

Is a network diagnostic tool used to track the path taken by data packets from a source computer to a destination computer.​

It is useful for troubleshooting networks connectivity issues, such as slow and unreliable performance.

39
Q

What is a Tracert used for

A

It is used to determine the network route, the number of hops between the source and destination and the time taken for data packets to travel from source to destination.

It is useful for troubleshooting networks connectivity issues, such as slow and unreliable performance.

40
Q

Define Whois

A

Is a protocol and database system that stores info about registered domain names and associated organisations and individuals​

Info includes the name, contact information of domain owner​

41
Q

what is Whois used for

A

Is used to retrieve information about the owner of a particular domain name and to verify the accuracy of the information listed in the data.​

This can be used to resolve disputes over domain names, verifying the authenticity of a domain registration.​

42
Q

What are the main considerations of choosing a ISP

A

Speed
Availability
Reliability
Cost
Data caps

43
Q

How to analyse user requirements for suitable network and
internet components

A

Gather User Requirements - surveys, focus groups, or interviews

Evaluate Network Requirements - Needed bandwidth, number of users

Determine Network Components: Based on the network requirements, select the appropriate network components

Validate and Test: Before finalising the specifications, validate the proposed network architecture and components through testing and simulation.

44
Q

What are the main properties and characteristics of LAN

A

LANs typically cover a small geographic area, such as a single building or campus

LANs are typically limited to a few dozen to a few thousand devices.

LANs offer high data transfer speeds, typically in the range of 10 Mbps to 100 Gbps

LANs are generally less expensive to implement than other types of networks

LANs can be secured through the use of firewalls, access controls, and encryption

LANs can be configured in various topologies, including star, bus, ring

LANs use various communication protocols, such as Ethernet, TCP/IP, and WiFi.

45
Q

What are the main properties and characteristics of WAN

A

WANs typically cover a large geographic area, such as a city, a country, or even the entire world

WANs can connect an unlimited number of devices

WANs typically offer lower data transfer speeds compared to LANs, several gigabits per second

WANs are generally more expensive to implement and maintain than LANs

WANs are vulnerable to various security threats and require the use of multiple security measures

WANs can be configured in various topologies, including point-to-point, star, mesh, and hybrid

WANs use various communication protocols, such as Frame Relay, ATM, MPLS, and VPN.

46
Q

Define VLAN

A

Virtual LAN (VLAN) is a concept in computer networking that allows administrators to logically segment a physical network into smaller broadcast domains.

47
Q

What are some characteristics of VLAN

A

Logical Segmentation: VLANs allow a physical network to be divided into smaller, logically separate broadcast domains.

  • Increased Security: VLANs make it more difficult for unauthorised users to access sensitive data.
  • Improved Scalability: VLANs help to improve network scalability by allowing administrators to add more devices to the network
  • Reduced Broadcast Traffic: In a VLAN network, broadcast traffic is limited to the specific VLAN segment, improving overall performance
  • Enhanced Network Management: VLANs allow administrators to easily manage network resources and devices
  • Reduced Network Complexity: By reducing the size of broadcast domains
48
Q

What is the equipment needed to setup VLAN

A
  • Switch: A network switch is a central device that connects all the other devices in a network.
  • Router: A router is used to route traffic between different VLANs.
  • Network Interface Cards (NICs): Each device in a VLAN network must have a network interface card that supports VLAN tagging
  • Cables: Cables are used to connect devices to the switch.
  • Network Management Software: Network management software is used to manage and configure the VLAN network.
49
Q

Define WLAN

A

A Wireless Local Area Network (WLAN) is a type of network that uses wireless communication technology to connect devices.

50
Q

What are characteristics of WLAN

A
  • Wireless Connectivity: wireless communication to connect devices, eliminating the need for physical cables.
  • Mobility: WLANs allow devices to connect and disconnect from the network dynamically.
  • Flexibility: WLANs can be set up quickly and easily
  • Limited Range: WLANs have a limited range, typically a few hundred feet
  • Interference: WLANs are susceptible to interference from other wireless devices
  • Security: WLANs can be vulnerable to security threats
  • Network Management: WLANs require proper network management to ensure reliable and secure operation.
  • Standardisation: WLANs are standardised through the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard
51
Q

What is the equipment needed to setup WLAN

A
  • Wireless Access Point (AP)
  • Wireless Network Adapter
  • Router: A router is used to route traffic
  • Cables
  • Network Management Software
52
Q

Define VPN

A

A Virtual Private Network (VPN) is a type of network that allows users to securely access resources over a public network, such as the Internet

53
Q

What are the characteristics of VPN

A
  • Encryption: VPNs use encryption to protect the data being transmitted over the public network
  • Remote Access: VPNs allow users to securely access network resources from remote locations
  • Tunnelling: VPNs use tunnelling protocols, to create a virtual tunnel between the client device and the network, providing an extra layer of protection
  • Authentication: VPNs use authentication methods, such as passwords, certificates, or biometric authentication
  • Compatibility: VPNs are compatible with a wide range of devices
54
Q

What is the equipment needed to setup VPN

A
  • VPN Server: A VPN server is the central device that provides VPN connectivity to clients.
  • Client Devices: Each device that needs to connect to the VPN network must have a VPN client installed.
  • Router: A router is used to route traffic between the VPN network and the public network.
  • Cables: Cables are used to connect the router to the internal network.
  • Network Management Software: Network management software is used to manage and configure the VPN network.
55
Q

What are the issues with VPNs

A

Security concerns, what if the actual VPN server gets hacked

Dependence on Third-Party Hardware

Complexity: VPNs can be complex to set up and maintain

Decreased Visibility: VPNs can hide the origin of network traffic, making it difficult to detect malicious activity

56
Q

What are the advantages of VPNs

A

Increased security

Cost saving

Increased productivity

57
Q

What are the benefits of computer networks in terms of Efficient use of software and hardware resources

A

Centralised Resource Sharing: Computer networks allow multiple users to access and
use shared resources

Centralised Software Management: Computer networks can be used to centrally manage and distribute software

Load Balancing: Computer networks can be used to distribute the processing load across multiple computers, improving overall system performance

Improved Collaboration: Computer networks allow multiple users to collaborate on projects and share information

58
Q

What are the benefits of computer networks in terms of data access and sharing

A

Computer networks allow users to access and share data from any location

Computer networks can be secured using encryption and other security measures, protecting sensitive data

Computer networks allow multiple users to access and share data

59
Q

What are the benefits of computer networks in terms of collaborative working

A

Improved Communication: Computer networks allow multiple users to communicate and collaborate in real time, regardless of their location

Shared Workspaces: Computer networks allow multiple users to access and work on shared files and documents

Improved Decision-Making: Computer networks allow for Improved Decision-Making

60
Q

What are the different types of servers

A

File server
Printer server
proxy server
mail server

61
Q

Define proxy server

A

An Internet proxy server is a server that acts as an intermediary between a client and a server, forwarding requests and responses between them

62
Q

Define mail server

A

A mail server is a computer system that provides email services to users.

It has some key features such as Storage, delivery, virus protection, backup and recovery

63
Q

Define printer server

A

The printer server enables multiple users on a network to access and use the same printer

64
Q

Define Twisted wire pair

A

Twisted pair wire is a type of cable that consists of two insulated copper wires that are twisted together to form a single cable.

UTP cables have no metal shield around the twisted wires, making them lighter and more flexible than STP cables

STP cables have a metal shield around the twisted wires to protect against electromagnetic interference (EMI)

65
Q

Define fibre optic cable

A

A fibre optic cable is a type of cable that is used to transmit data using light. It consists of a core made of glass or plastic fibres, surrounded by cladding and a protective coating.

66
Q

What is the difference between cloud computing and cloud storage

A

Cloud computing refers to the delivery of computing services over the internet, such as servers, storage, databases, software, analytics, and more.

Cloud storage, on the other hand, refers to the storage of data on remote servers that are accessed over the internet.

67
Q

Evaluate cloud services

A

Advantages
Scalability
Flexibility
Cost-effective
Easy to use

Disadvantages
Need internet connection
Security concerns
Ongoing-costs

68
Q

Define Iaas

A

IaaS stands for “Infrastructure as a Service.” It is a cloud computing model in which a third-party service provider offers virtualised computing resources over the internet

69
Q

Define Paas

A

PaaS stands for “Platform as a Service.” It is a cloud computing model in which a third-party service provider offers a platform that enables developers to build, deploy, and manage their own software applications over the internet.

70
Q

Define mobile phone masts

A

Mobile phone masts, also known as cell towers, work by transmitting and receiving radio waves between a mobile device and the mobile network.

71
Q

Define mobile phone cells

A

Mobile cells, also known as “cellular networks,” work by dividing a geographic area into smaller geographic areas, called cells

72
Q

Define handoffs

A

Mobile handoffs, also known as “handovers,” are the process of transferring a mobile device’s communication from one cell to another as the device moves from one geographic area (cell) to another