Networking Flashcards
A collection of two or more computers connected together to share resources.
network
Usually require simple hardware and can rely on the operating system’s features to connect to other devices on the network, while larger networks typically require more sophisticated hardware and software
Smaller networks
Devices on a network, also called
nodes
A device that provides a central point for cables in a network, and transfers all data to all devices.
hub
is similar to a hub in that it provides a central point for cables in a network; however, it transfers data only to the intended recipient.
A switch
Switches are used more frequently today than hubs.
is a device that connects two or more networks and directs, or routes, the flow of information along the networks. Can also be used to connect computers to the Internet, so that multiple users can share a connection
A router
router is typically connected with a wire or cable to a device called
a modem
which provides the Internet connectivity.
is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.
A modem
The modem connects your network to the Internet through a telecommunications company that sells Internet access, known as
an Internet Service Provider (ISP)
Multiple users can share a single Internet connection, files on each computer, such as photos, can be shared, and multiple computers can share a single hardware resource such as a printer
Cababilities Home networks provide for home users
- Game consoles can connect to the Internet to facilitate online gaming, voice
- IP (VoIP) phone service provides voice communication without the need for traditional copper telephone lines
- Smart home devices such as thermostats, light switches, smart speakers, and personal assistants can connect to the Internet and apps on your smartphone
Cababilities Home networks provide for home users
Facilitate communication among employees, share hardware such as printers and scanners, share data, information, and software with one another, and centrally store and back up critical information
Advantages networks provide for small or large business
is a circuit board that connects a computer to a wired or wireless network. They often are internal to the devic
A network interface card (NIC)
can connect a computer to a wired network, while other NICs can connect a computer to a wireless network.
Some NICs
have a visible antenna that is used to better communicate with the wireless network
Some wireless network interface cards (NIC)
are two common types of digital modems
Cable and DSL
sends and receives digital data over a cable TV connection
A cable modem
uses existing standard copper telephone wiring to send and receive digital data
A DSL modem
you might also be able to connect multiple wired and wireless devices if
the cable modem also functions as a router
The method by which computers and devices are physically arranged on a network is referred to as the
network topology
defines the physical arrangement of devices on a network
Common network topologies include
bus network, ring network, star network, and mesh network
All devices attach to a central cable, called a bus, which carries the data. If the bus fails, the devices on the network will no longer be able to communicate.
Bus network
Data travels from one device to the next in a sequential fashion. If one device on the network fails, communication on the network could cease to function.
Ring network
Ring networks are no longer common.
Each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.
star network
Two or more star networks may be joined together using a bus to form
Tree topologies
Tree topologies often are used in
schools and businesses
All devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.
Mesh network
Two types of mesh topologies are a
full mesh topology and a partial mesh technology
each device may or may not be connected to all other devices on the network
partial mesh technology
each device on the network is connected to every other device on the network
full mesh technology
determines the logical design of all devices on a network
the network architecture
Two common network architectures are
client/server and peer-to-peer (P2P)
one or more computers act as a server and the other computers on the network request resources from the server
client/server network
is a computer on the network that controls access to hardware, software, and other resources
A server
is a computer or mobile device on the network that relies on the server for its resources
A client
often do not have equal permissions; that is, one may be able to access certain files or resources on the server, while others may not have access to those same resources
Clients on a client/server network
Client/server networks often are controlled by a
network administrator
is a network architecture that typically connects a small number of computers (often fewer than 10)
A peer-to-peer (P2P) network
A type of network where computers communicate directly with one another and can share each other’s resources.
A peer-to-peer (P2P) network
Does not need network administrator because it treats all computers are treated equally
a peer-to-peer network
is a type of P2P network where users share files with each other over the Internet
An Internet peer-to-peer (Internet P2P) network
The files in ………. transfer directly from one user’s computer to the other, without first being stored on a server. While it is legal, it is illegal to share files or other resources that are protected by copyright.
an Internet peer-to-peer network
is Internet-based delivery of computing services, including data storage and apps.
Cloud computing or “in the cloud.”
- Files can be stored and accessed from any computer or mobile device with an Internet connection
- Files are stored on remote servers and will remain intact should anything happen to your computer or mobile device
- Files do not necessarily take up space on your computer or device because they are stored in the cloud
- You can easily share files with others and control who has access to each file
- You can configure your computer or mobile device to automatically back up certain files to the cloud
Cloud computing advantages
- The potential for unwanted individuals accessing your files if you do not carefully manage who can access them
- The inability to access your files if you lose your Internet connection
Cloud computing disadvantages
connects computers and devices in a limited area, such as a home, a school, or a small office complex
local area network (LAN)
is a network that connects devices in a large geographic region, such as a multinational company or national retail chain.
wide area network (WAN)
is a type of wide area network that is operated by a city or county
metropolitan area network (MAN)
connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone
personal area network (PAN)
Devices on a personal area network typically are connected
via Bluetooth
is a short-range wireless technology, often used to facilitate communication at a range of 30 feet/9 meters or less
Bluetooth
is a form of personal area network that consists of small, lightweight biosensors implanted in the body
body area network (BAN)
can monitor an individual’s health or activity, and report statistics and results to a medical professional
biosensors
- Sends signals and data through cables, which may have to travel through floors and walls to connect to other network devices.
- tend to be more secure and transmit data faster than wireless networks.
Wired network
- Sends signals through airwaves, and usually do not require cables.
- tend to be more convenient and easier to set up than wired networks, but can be less secure.
- make it possible to connect devices in locations where physical wiring is not possible or is difficult.
Wireless network
- A private network for use by authorized individuals.
- Organizations use it to communicate internally and can allow users to use a web browser to access data posted on webpages.
- are preferable when data being transferred should not necessarily reach the Internet.
Intranet
Allows outsiders (such as customers, vendors, and suppliers) to access an organization’s intranet. For example, it might be used if a supplier needs to check a customer’s inventory levels before deciding whether to ship additional product.
Extranet
- A private, secure path across a public network that allows authorized users secure access to a company or other network.
- can allow an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path.
Virtual private network (VPN)
Displays unwanted advertisements on your computer
Adware
Tracks and transmits personal information from your computer or device without your knowledge
Spyware
Damages data on your computer or device or changes system settings
Virus
Spreads throughout a computer and/or network without requiring user interaction
Worm
Disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened
Trojan
Locks you out of programs and data on your computer until you pay a ransom to regain access
Ransomware
Gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence
Rootkit
is a type of email scam that tries to trick you into revealing personal or financial information. it typically disguise themselves as email messages from legitimate sources, but may encourage you to click a link within the email or open an attached file.
If you are not expecting a file attachment, first **verify **with the email’s sender that they have sent you an attachment or an email with a link to click.
Phishing
is an attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential information.
never disclose personal information such as passwords or bank account information to unknown individuals electronically, on the phone, or in person.
Social engineering
is a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services.
If a server responsible for hosting websites is the recipient of a denial of service attack, it might be unable to display websites for visitors attempting to view them. These attacks can originate from one source, or they can originate from multiple sources
A denial of service (DoS) attack
is when an attacker uses multiple computers to attack a server or other network resource
A distributed denial of service (DDos) attack
attacking without the owner’s knowledge, because they are under the control of malware or another attacker
DDoS attack
A device infected with malware that an attacker uses to control the device remotely is called
zombie
If you have a network set up at your home or place of employment, you should make sure to send and receive personal information only if
the network is secure
is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. For example, you might connect to a network at an airport called “Free Airport WiFi” without realizing it is an
evil twin
can be impossible to identify
is the process of identifying a user to the network. The most common form of authentication is providing a user name and password.
Authentication
using biometric devices to scan physical characteristics is a form of
Authentication
should be changed frequently, and never written in places where they can easily be obtained and identified by others
Passwords
is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges.
A firewall
are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network
Hardware firewalls
are installed on your computer or device and block unauthorized communication to or from the network. They are often built into the computer’s operating system
Software firewalls, also called local firewalls
devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks.
On a home network, you might store family photos and videos so that they are accessible to all members of your family.
On a larger, more complex network, you might store important company files that require accessibility by multiple employees
Network attached storage (NAS)
When you store files on a network, you might have the ability to specify users who can view the files, as well as users who can view and make changes to the files. True or false
True
Not only should you secure data stored on a network, but you also should turn on network encryption so that information
cannot be intercepted by others
is the process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password.
Encryption
Encrypted wireless networks often use a
wireless network key
a series of numbers and/or letters sometimes also referred to as a network security key, to encrypt data sent between devices
wireless network key
If you connect to a wireless network that does not require a wireless network key, that often means the network is
unsecure
One common type of encryption on home routers is
WPA2 (Wi-Fi Protected Access version 2)
You can specify the type of encryption, as well as the desired wireless network key, through the
wireless router’s configuration utility
is that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site. When it is enforced, ISPs must provide the same level of service to all websites, regardless of their content or purpose. It supports the concept that the Internet should be neutral and all traffic should be treated equally
net neutrality
is a common term used to describe the capacity of a communication channel. When a communication medium or connection supports transferring a large amount of data at one time, it is said to be a
bandwidth / high-bandwidth connection
support capacity for transferring content such as videos, music, and other large files, and can support online gaming.
High-bandwidth connections (also called broadband connections)
support only slower transfer speeds as they have less capacity. These connections are suitable for performing functions such as sending and receiving email, transferring small files, and viewing basic websites.
Low-bandwidth connections (also called narrowband connections)
Supporters of net neutrality like the fact that access to websites and other Internet services cannot be restricted based on factors such as
content or bandwidth requirements
hose who oppose net neutrality argue that the ability for users to access certain types of high-bandwidth content such as music and movies might result in slower Internet speeds for others who are also connecting to the Internet using the same ISPs. True or false
True
Without net neutrality, Internet Service Providers could charge more money for those wanting access to content requiring more resources (such as streaming music and movies) and charge less money to those who require access to less resource-intensive services. True of false
True
specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used. For computers and devices to successfully communicate on a network, they must support the same
Network standards
controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data. Also, it continues to evolve, with new standards supporting faster data transfer rates.
The Ethernet standard
Most wired networks
Ethernet
Devices requiring network connectivity and power to be supplied by the network
Power over Ethernet (PoE)
Networks using telephone lines to connect computers and devices
Phoneline/HomePNA and Powerline
Home and small business networks
Wi-Fi
Voice and data transmission on cellular networks
LTE
A standardized procedure used by computers to exchange information
protocol
a set of protocols that is used by all computers and devices on the Internet. …… defines how data is routed through a network, and …….. specifies that all computers and devices connected to a network have a unique IP address.
TCP/IP (Transmission Control Protocol/Internet Protocol)
was the standard Internet protocol in use for many years, but the vastly growing number of computers and devices connected to the Internet demanded support for more IP addresses. It supports nearly 4.3 billion unique IP addresses
IPv4
a type of IP address
protocol supports more than 340 undecillion addresses
IPv6
a type of IP address
Devices communicating with each other over a short range (usually less than 30 feet/9 meters)
Bluetooth
Radio signals transmitted through antennas, often found in tollbooth transponders or embedded chips in animals
RFID (radio frequency identification)
Used in credit cards, smartphones, and tickets to facilitate close-range communication
NFC (near field communication)
Remote controls or other data transmission within close proximity
IrDA
a cellular networks that can provide Internet services in most locations where cellular service is offered
3G (third generation)
networks provide higher speed data transmission, making them more appealing to those requiring access to high-bandwidth content.
4G and 5G
ISPs use hardware such as
cables, satellites, and fiber-optic lines
Because of the risks associated with constant Internet connectivity, you should……..when you are not using them for extended periods of time
turn off computers and devices on your network
Wireless networks that are available in public places such as hotels, restaurants, and coffee shops are known as
Wi-Fi hotspots
enables you to connect a phone, computer or other device to the Internet through the cellular network.
A mobile hotspot
a unique hardware address identified for your computer or device
It control feature specifies it of computers and devices that can (or cannot) connect to your network
MAC address