Network Flashcards 2

You may prefer our related Brainscape-certified flashcards:
1
Q

Define Network

A

A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a range of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Local Area Network (LAN)

A

A network inside one organization or one building traditionally made of wires and hubs connecting servers and clients. Typically in a business, connecting employee’s PCs to the company’s servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Wide Area Network (WAN)

A

A network that spans many computers in widely separate locations, e.g. separate cities for example, linking bank offices and ATMs. WANS usually include connections that are public, e.g. not owned by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAN vs WAN Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of a WAN Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Virtual Local Area Network (VLAN)

A

It seems to be a LAN, and is all controlled by one organization. Commonly PART of a LAN, isolated with no connection to other parts of the actual physical LAN. Makes sense for security purposes, isolating sensitive resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of a VLAN Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Storage Area Network (SAN)?

A

A network containing large amounts of storage (HDD). Usually
virtualized so users don’t need to worry about the actual machines containing
the storage devices ­ commonly “data centers”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Wireless Local Area Network (WLAN)?

A

Also called WIFI ­ a WIRELESS LAN, using mostly radio connections to “access point” hubs, with wires connecting the hubs to the servers. Rarely provides direct wireless connections between clients and servers, as cables (wires) are much faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN vs WLAN Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the internet?

A

• The internet is a globally connected network system that uses the
TCP/IP protocols to transmit data via various types of media.
• The internet is a network of global exchanges – including private,
public, business, academic and government networks – connected
by wired, wireless and fibre-optic technologies.
• The terms internet and World Wide Web are often used
interchangeably, but they are not exactly the same thing; the
internet refers to the global communication system, including
hardware and infrastructure, while the web is one of the services
communicated over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Extranet?

A

• An extranet is a controlled private network allowing
customers, partners, vendors, suppliers and other
businesses to gain information, typically about a specific
company or educational institution, and do so without
granting access to the organization’s entire network.

• An extranet is often a private part of a website.

• It is restricted to select users through user IDs, passwords
and other authentication mechanisms on a login page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intranet vs Extranet Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Virtual Private Network (VPN)?

A

Virtual Private Network ­ provides secure, private connections between clients and servers, running across public connections like phone line ­ typically running across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Personal Area Network (PAN)?

A

Personal Area Network ­ used to connect devices belonging to one user, or maybe a family. Typically running through wireless router in a home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PAN Examples

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Peer-to-peer (P2P) network

A

P2P ­ Peer to Peer ­ communicates between “equal” clients, without using servers. Commonly used in the Internet to exchange files directly between client PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are internet standards important?

A

• Without standards, manufacturers of networking products
have no common ground on which to build their systems.
• Interconnecting products from various vendors would be
difficult, if not impossible.
• Without agreed standards, communication would be
difficult (if not impossible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI Model

A

All People Seem To Need Data Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Simplified TCP/IP Model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The 2 fundamental VPN technologies and what they do

A

• Encryption is the process of encoding data so that only a
computer with the right decoder will be able to read and use
it.
• Tunnelling involves establishing and maintaining a logical
network connection (that may contain intermediate hops).
On this connection, packets constructed in a specific VPN
protocol format are encapsulated within some other base or
carrier protocol, then transmitted between VPN client and
server, and finally de-encapsulated on the receiving side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VPN Tunneling Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Benifits of telecommuting

A

VPNs Enable telecommuiting here are some of the benifits.

  1. Increased Productivity
  2. Improved moral and less stress
  3. Less environmental impact (transportation etc.)
  4. Less need for bueiness real estate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an internet protocol

A

Set of rules for data communication over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is data

A

Anything in a form suitable for use with a computer… such as binary. Typically data is meaningless.

26
Q

What is a packet

A

A small unit of data used in network communication

27
Q

Data packet diagram

A
28
Q

Functions of internet protocols

A
  • Ensure data integrity
  • Manage flow control
  • Prevent deadlock
  • Manage congestion
  • Perform error checking
29
Q

What is data integrity?

A

• Data integrity, in the context of networking, refers to the
overall completeness, accuracy and consistency of data.
• Data integrity must be imposed when sending data through
a network.

30
Q

What is flow control?

A

• Flow control is the mechanism that ensures the rate at which
a sender is transmitting is in proportion with the receiver’s receiving capabilities.
• Flow control is utilized especially in cases where the sending
device can send data much faster than the receiver can
digest.

31
Q

What is deadlock?

A

• A deadlock is a situation where two nodes or processes are
trying to access the same node at exactly the same moment,
causing neither to be able to proceed.
• It is then up to the relevant protocol to stop both, and requeue them so that they can happen sequentially, letting
traffic flow.

32
Q

What is conjestion control?

A
  • Congestion refers to a network state where a node or link carries so much data that it may deteriorate network service quality, resulting in queuing delay, frame or data packet loss and the blocking of new connections.
  • In modern networks, avoiding congestive collapse involves the application of network congestion avoidance techniques along with congestion control.
33
Q

What is error checking?

A
  • Error checking or detection refers to the techniques used to detect noise or other impairments introduced into data while it is transmitted from source to destination.
  • Error detection often makes use of parity bits, bits at the end of a packet that are calculated to be either a 1 or 0.
34
Q

Causes for variation in network speeds

A
  • Traffic
  • Distance
  • Infrastructure
  • Envtionmental issues
35
Q

What is compression?

A

Data compression involves encoding information to use fewer bits than the original data entity

36
Q

Reasons for compression

A
  • Backups/archiving
  • File transfer
  • Media file transfer
  • Encryption
37
Q

Lossless vs Lossy compression diagram

A
38
Q

Characteristics of UTP – Unshielded Twisted Pair (metal) transmission

A
39
Q

Characteristics of fibre-optic glass transmission

A
40
Q

Characteristics of Radio waves (WLAN, WiFi) transmission

A
41
Q

What is packet switching

A

Packet-switching describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.

42
Q

Packet switching diagram

A
43
Q

Advantages of wireless networks

A

• Uses unlicensed radio spectrum
– Doesn’t cost anything
• LANs can be set up without cabling
– Doesn’t take space or time to lay the cables. No extra cost on cables
• WiFi can support roaming between access points
– People can switch from router to router automatically depending in
which connection is best
• Global standards (eg. 802.11n)
• Setup costs are minimal
– Many types are available on the market and they are affordable

44
Q

Disadvantages of wireless networks?

A
  • Interference – as the 2.4GHz spectrum is often crowded with other devices
  • Limited Range
  • WEP – this encryption is not difficult to hack and WPA2 has solved this problem
  • Access Points – these can be used to steal data • Health Concerns
45
Q

Hardware components of a wireless network

A
  • Node: PC, Laptop, Tablet, Printer
  • Wireless network interface card
  • Radio waves (Bluetooth/WiFi)
  • Connection point: Wireless AP / Router
46
Q

Software components of a wireless network

A
  • Network Operating System (with drivers)
  • Protocol stack (TCP/IP)
  • Applications (Browser/File explorer)
47
Q

Types of wireless networks

A
  • WiFi
  • Wimax
  • 3G 4G etc.
  • Lte
48
Q

Characteristics of WiFI

A

• Also called Wireless LAN (WLAN)
• Used in laptops/mobile devices to connect wirelessly to
home network
• Most preferred network type to implement a home network
• Allows relatively slow to fast data transmissions (depending
on the version)
• Backwards compatible with most older Wi-Fi standards
(a/b/g/n)
• Small transmitting radius makes it suited for homes, usually
<20m

49
Q

Characteristics of WiMAX

A

• WiMAX = Worldwide Interoperability for Microwave Access
• Designed for large distance high speed internet access
• Relatively cheap method of providing internet over a large area - suited
for poorer countries
• Rivalled by Long Term Evolution (LTE) standard
• Can be used as a form of wireless variant of DSL phone transmission lines

50
Q

Characteristics of 3G

A

• The primary way mobile phones access the internet today
• Allows the tunnelling of phone lines (mobiles don’t have to
switch back to phone network when receiving a call
• Relatively fast

51
Q

Data security CIA

A
  1. Confidentiality
  2. Integrity
    • Maintaining accuracy of data
  3. Availability
    • DoS attacks
52
Q

3 Factors of Authentication

A
  1. Something you know
  2. Something you have
  3. Something you are
53
Q

What is a firewall

A
  • Hardware or Software (or hybrid of both).
  • Controls incoming and outgoing network traffic.
  • Analyse data packets based on pre-determined set of rules.
54
Q

What is a MAC address

A

• Media Access Control address.
• Hard-coded into devices by manufacturers
• Managed by the IEEE (institute of Electrical and
Electronics Engineers).
• Are used to identify specific pieces of hardware

55
Q

Types of encryptions

A
  • UserID (and passwords)
  • PSK (pre-shared key)
  • WEP (dead)
  • WPA / WPA2
56
Q

What is WEP

A

Wireless Equivalent Privacy Very simple algorithm… … that was very quickly broken!

  • Superseded by WPA in 2003
  • Deprecated in 2004.
57
Q

Characteristics of WPA and WPA2

A
58
Q

Advanatges of userID

A

• Advantages: – Access rights to the network can be set for each user – User groups can be created to manage user rights in batches

59
Q

Disadvantages of userID

A

• Disadvantages: – A userID can be stolen – system can be bypassed – Does not protect against intercepting messages in the network

60
Q

Advantages of encryption

A

– A strong encryption is very hard to break

– Computer are fast enough to encrypt data on-the-fly

61
Q

Disadvantages of encryption

A

– Often, users are lazy and take a password that is easy to guess

– The password needs to be transmitted over the network to receiver to allow them to read the message

– Some encryptions are designed to have backdoors built in