Fundamentals of Computer Networks Flashcards
What are computer networks?
Computer networking refers to interconnected computing devices that can exchange data and share resources with each other.
What are the advantages and disadvantages of computer networks?
Advantages
Able to maintain multiple devices
Disadvantages
Describe the main types of computer network including:
Personal Area Network (PAN)
Local Area Network (LAN)
Wide Area Network (WAN).
PAN – only Bluetooth needs to be considered.
LAN – these usually cover relatively small geographical areas.
LAN – these are often owned and controlled/managed by a single person or organization.
WAN – the Internet is the biggest example of a WAN.
WAN – these usually cover a wide geographic area.
WAN – these are often under collective or distributed ownership.
What types of cables do wired networks use?
wired networks can use different types of cable such as fiber and copper and when each would be appropriate.
Define the term network protocol
A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.
What is the function/use of the TCP protocol?
The Transmission Control Protocol :
Detects errors
Resends lost errors
Reassembles the packets at the other end
Breaks up the messages into small chunks
What is the difference between HTTP and HTTPS?
HTTPS provides an encrypted version of HTTP as it is more secure and prevents hacking and eavesdropping
What is the difference between POP and IMAP?
POP downloads the email from a server to a single computer, then deletes the email from the server. On the other hand, IMAP stores the message on a server and synchronizes the message across multiple devices.
What is the importance of network security?
Network security is important for home networks as well as in the business world. Most homes with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured. A solid network security system helps reduce the risk of data loss, theft and sabotage.
Explain the following methods of network security:
Authentication
Encryption
Firewall
MAC address filtering.
Authentication- Checking that the computer and the user are allowed to access content. Most commonly done with username and password.
Encryption- The encoding of data so that it can no longer be understood.
Firewall- Separate a trusted network from an untrusted network (normally the internet).
MAC address filtering- A unique hex number assigned to all Network Interface Cards. A wireless router can be configured to block access to specified devices identified by their MAC addresses.
All of these methods can work together to provide a greater level of security.
Describe the 4 layer TCP/IP model:
application layer
transport layer
internet layer
link layer
Application layer: this is where the network applications, such as web browsers or email programs, operate.
Transport layer: this layer sets up the communication between the two hosts and they agree settings such as ‘language’ and size of packets.
Internet layer: addresses and packages data for transmission. Routes the packets across the network.
Link layer: this is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here.