fundamentals of computer networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

define what a computer network is


A

a collection of computers connected together for the purpose of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advantages of computer networks

A
  • easier to share files: users can access same files and work on them at the same time
  • can share the same hardware (e.g. printers) on multiple devices
  • can install and update all computers at once
  • can communicate across a network easily and cheaply
    user accounts are stored centrally: users can log in from any device on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disadvantages of computer networks

A

expensive to set up: need lots of extra hardware
vulnerable to hacking: malware can be easily spread
dependent on multiple servers: if those servers go down it can be disruptive
difficult to manage: larger networks need a specialist to maintain them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe Personal Area Network (PAN)

A

a network that covers a small range of a few metres, and connects personal devices using Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe Local Area Network (LAN)

A

a network that is geographically confined to one building or site usually managed by a single person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe Wide Area Network (WAN)

A

a network that covers a wide geographical area and connects LANs that is managed by telecommunications companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

advantages of wireless networks

A

convenient: devices automatically connect to the network and can move around while connected
cheaper and better for environment: no wires are needed
easier to add more users: no extra wires needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

disadvantages of wireless networks

A

less secure: access points are visible to all devices
reduced signal strength: distance from WAP, interference from other wireless networks, physical obstructions affect signal
lower bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

name network hardwares

A

Network Interface Card (NIC): inside device that allows it to connect to networks
Switch: used to connect devices on a LAN
Router: transmits data between different networks and to connect to the internet
MAC address: unique identifier assigned by manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

choice of cables depends on…

A

cost
bandwidth (amount of data sent across a network in a given time)
distance of data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe fibre optic cables

A

transmit data as light
high performance
expensive
transmit over large distances at high bandwidth without loss of signal quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

describe ethernet cables

A

contain pair of copper wires twisted together to reduce internal interference
cheaper
average bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe coaxial wires

A

a single copper wire surrounded by a plastic layer and metallic mesh for insulation and shielding from outside interference
very cheap
low bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe star topology 


A

all computers have their own cable connecting them to the switch, which routes information to the correct computer, and usually controlled by a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of star topology

A

costly to install: lots of extra hardware
if server or switch fails then the whole network goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advantages of star topology

A

if one cable fails, the other workstations are not affected
maintains performance: even if many devices are connected
good security: data can only be received by the intended node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

advantages of bus topology

A

inexpensive and easy to install: less cabling
no reliance on a central node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

describe bus topology

A

all computers connected to a single backbone cable
(only one computer can successfully transmit at one time. if a network is too busy there can be collisions and computers have to retransmit. as no. of collisions increase, the network slows down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

disadvantages of bus topology

A

if main cable fails the whole network goes down
as amount of traffic increases, the performance slows down
low security: every node can see all transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

define the Ethernet

A

a family of related protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

explain the purpose and use of Wi-Fi

A

deals with the transmission of data on wireless LANs

22
Q

Explain the purpose and use of the Ethernet

A

deals with how data is sent and received and how hardware and data collisions are managed for wired connections

23
Q

explain the purpose and use of TCP (transmission control protocol)

A

splits data into numbered packets and reassembled them at destination
communicates with receiving devices: if any packets that are missing/faulty can be resent

24
Q

explain the purpose and use of UDP (user datagram protocol)

A

splits data into packets without numbers: they are read by the receiving device in order and doesn’t check if everything has been received

25
Q

explain the purpose and use of IP (internet protocol)

A

routes and addresses data packets to device location via routers and manages network traffic

26
Q

explain the purpose and use of HTTP (hypertext transfer protocol)


A

used for accessing and receiving web pages as HTML files on the internet

27
Q

explain the purpose and use of HTTPS (hypertext transfer protocol secure)


A

used for accessing and receiving web pages as HTML files on the internet, BUT encrypts the information

28
Q

explain the purpose and use of FTP (file transfer protocol)


A

used to transfer files between computers and the internet

29
Q

mail servers pass on and store emails until collected.

A

-

30
Q

explain the purpose and use of SMTP (simple mail transfer protocol)

A

a protocol used for sending and receiving emails between servers

31
Q

explain the purpose and use of IMAP (internet messaging access protocol)

A

a protocol that stores and receives emails from a mail server and enables the receiver to store them locally on their device

32
Q

why do we need/what is the importance of network security?

A

to keep unauthorised people from accessing data
to ensure authorised people can access data
protect against damage
protect against cyber attacks

33
Q

describe authentication

A

the process of verifying the identity of a user to prevent unauthorised people from accessing data on a network

34
Q

what are the factors of authentication?

A

something you are: username
something you know: password
something you have: biometrics

35
Q

describe encryption


A

the process disguising a message so it can only be understood by the recipient

36
Q

define encryption

A

the process of converting plaintext into ciphertext

37
Q

define decryption

A

the process of converting ciphertext into plaintext

38
Q

describe a firewall


A

a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules

39
Q

describe MAC address filtering

A

allows devices to access or be blocked from accessing a network based on their MAC address embedded within the device’s network adapter

40
Q

examples of authentication

A

fingerprint or facial recognision
entering a PIN

41
Q

example of encryption

A

the Caesar cipher

42
Q

examples of MAC address filtering

A

being whitelisted
being blacklisted

43
Q

describe the main function of the application layer of the TCP/IP model

A

where the network applications (e.g. web browsers or email programs) operate

44
Q

describe the main function of the transport layer of the TCP/IP model


A

sets up the communication between two devices and establishes settings (e.g. size of packet)
splits data into packets and adds packet information

45
Q

describe the main function of the internet layer of the TCP/IP model

A

address and packages data for transmission and routes the packets across the network
adds IP address and destinations IP address

46
Q

describe the main function of the link layer of the TCP/IP model

A

passes data over the physical network
contains the NIC (network interface card) and OS device drivers
adds MAC addresses of both sender and recipient

47
Q

name protocols used in the application layer

A

HTTP, HTTPS, FTP, IMAP, SMTP

48
Q

name protocols used in the transport layer


A

TCP, UTP

49
Q

name protocols used in the internet layer

A

IP

50
Q

name protocols used in link layer

A

Wi-Fi, Ethernet