Networking Unit Study Guide Flashcards
A group of computers that are connected and communicated with one another
Computer Network
Part of a message that is transmitted over a network
Packet
A network that connects devices that are relatively close to each other, usually in the same building
LAN (Local Area Networking)
A network that connects devices over a large area, like a city or country
WAN (Wide Area Network)
Physcial arrangement of devices in a network
Topology
A computer or other electronic device connected to a network
Node
A network topology where each node is connected to a central device or hub
Star Topology
A topology where each node is daisy-chained along the same backbone, similar to Christmas Lights
Bus Topology
A network topology where each ode is daisy chained together where the end of the network comes back around to the first node, forming a complete circle
Ring Topology
An agreeed upon format for transmitting data between two devices
Protocol
A device that let messages flow between networks
Network Router
A common connection point between devices in a network
Hub
A card that connects a computer to a network
Network Interface Card
A network that connects devices using radio signals
Wireless Network
Advantages and Disadvantages of ____:
1) Works efficiently for small Networks
2) Easier to connect and remove devices without affecting other devices
1) No great for large networks
2) Identifying problem become difficult if the whole things does down
Bus Topology
Advantages and Disadvantages of ____:
1) Easily manageable
2) Can add more stars to extend the network
1) High Cost
2) Very dependent on central device; hard to manage
Star Topology
Advantages and Disadvantages of ____:
1) No limitation for number of devices and easy to achieve with less effort
2) Very adaptable
1) When the data transfers from one device to another, it passes through every workstation, which causes a lag in the time while the data reaches its destination
2) Bad protection/security other devices can access information of others
Ring Topology
Advantages and Disadvantages of ____:
1) Nearly impossible to take down
2) Easy to add new devices
3) Scalability is simple
1) Complex Structure
2) Difficult to set up initially
3) Costly compared to others
4) Risk of redundant connections
Mesh Topology
A system or a program that requests the activity of one or more other systems or programs, called servers, to accomplish specific tasks
A Client
A computer program or device that provides services or resources requested by other programs or devices, known as clients
A Server
What are the different types of specialized servers?
-Web Servers
-File Servers
-Database Servers
-Game Servers
-Mail Servers
-DNS Servers
-VPN Servers
-Streaming Servers
-Backup Servers
-Cloud Servers
Used to host websotes and serve web pages to clients over the internet
Web Servers
Used to store and manage files and data for a network of users
File Servers
Used to store, manage, and retrieve large amounts of data for applications
Database Servers
Used to host multiplayer games and manage game sessions
Game Servers
Used to send and receive email messages
Mail Servers
Used to translate domain names into IP addresses
DNA Servers
Used to establish secure connections between remote users and a company’s network
VPN Servers
Used to stream video and audio content over the internet
Streaming Servers
Used to create and store backups of important data
Backup Servers
Remotes servers hosted in a cloud computing environment, and can be used for a variety of pruposes such as web hosting, data storage and processing, and software development
Cloud Servers
Advantages of Networks:
1) Resource Sharing
2) Communication
3) Data Storage and Backup
4) Remote Access
5) Scalability
6) Software and Hardware Support
Networks allow users to share resources such as printed, scanners, and storage devices, which can save on costs and improve efficiency
Resource Sharing
Networks enable users to communicate and collaborate in real-time, regardless of location
Communication
Networks allow for centralized storage of data, whcih can be backed up regularly to protect against data loss
Data Storage and Backup
Networks allow users to access resources and information from remotes locations, which can increase productivity and flexibility
Remote Access
Networks can be easily expanded to acommodate more users and resources as needed
Scalability
Networks make it easier to provide software and hardware support, as well as troubleshoot problems, as the administrator can access all the systems in the network
Software and Hardware Support
_____ connects at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network
Router
What does VPN stand for?
Virtual Private Network
Why should you use a VPN?
A VPN protects your identify even if you are using public or shared Wi-Fi, and your data will be kept private from any prying internet eyes.
Examples of a node:
1) A personal computer connected to a network
2) A printer connected to a network
3) A router connected to a network
4) A server connected to a network
A ______ is a deice taht converts digital data into analog signals to transmit over telephone or cable lines and back into digital data when it reaches the destination, It enables a computer or network to connect to the internet or other networks via telephone or cable line.
Modem
An _____ is a company that provides internet access to customers via different technologies like DSL, cable, fiber, and satellite, and offers additional services such as email and website hosting. They are regulated by regulatory bodies like the FCC in the United States.
ISP (Internet Service Provider)
Three examples of an ISP providers;
1) Comcast
2) AT&T
3) Verizon
______ is a core internet protocol that guarantees the delivery of data between applications by breaking it down into packets, sending them to them destination and reassembling them in the correct order. It also provides error checking and correction and establishes a virtual connection between two devices before data is exchanged, making it more reliable and secure than connectionless protocols such as UDP. Many common internet applications like HTTP, FTP, and Telnet use TCP to ensure the integrity of data transmission.
TCP (Transmission Control Protocol)
What is the relationship of TCP and packets?
A personal area network (PAN) connects electronic devices within a user’s immediate area. TCP is responsible for dividing the data into smaller united called packets, which contains the orginial data and additional information such as source and destination addesses and sequences number, before sending it over the network. It them reassembles the packets in the correct order at the destination to reconstruct the originial data. It also performs error checking, retransmits lost or corrupted packets and establishes a connection between the devices to ensure data integrity.
Original Data –> TCP –> Packets –> Network –> Packets –> TCP –> Original Data
A part of a computer system or network which is designed to block unauthorized access while permitting outward communication. A ______ is a secuirty device in the form of commputer hardware or software. it can help protect by acting as an intermediary between your internal network and outside traffic.
Firewall
How does encryption works?
Encryption takes plain text, like a text message or email, and scrambles it into an unreadable format – called “cipher text”. This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.
Concerns of wireless security:
Denial pf service attacks - where the intruder floods the network with messahes affecting the availability of the network resources
Spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user
Connects electronic devices within a user’s immediate area. One of the most common real-world examples of a _____ is the connection between a Bluetooth earpiece and a smartphone. _____s can also connect laptops, tablets, printers, keyboards, and other computized devices.
PAN (Personal Area Network)
Which of the following statements are true about the Internet?
A) The Internet connects devices and networks all over the world
B) The Internet helps poeple collaborate to solve problems
C) The Internet helps people communicate
D) There are no negative consequences of the Internet, it is purely positive
A, B, and C
How is the bandwidth of a network measured?
Bitrate
What is the bitrate of a system?
The amount of data that can be sent in a fixed amount of time.
What is the latency of a system?
The amount of data that can be sent in a fixed amount of time.
What is the latency of a system?
The time that data takes to transfer across the network
What is the Internet Protocol (IP)?
A protocal that defines the structure of an Internet address and assigns an unique address to every device on the Internet.
What is the function of the Domian Name System (DNS)?
To translate domian name into IP Addresses
According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com?
about.example.com
What types of files does Google Dpcs allow you to create and edit?
Spreadsheet, Forms, Presentations, Documents, everything but games
Supposed you share a Google Doc with three specific purpose. What will they need in order to open the file?
Google Account
An alphanumeric label assigned to computers and other deices that connect to a network using internet protocol called a
IP Address
An agrred set of rules for transmitting data between two devices
Protocol
Which transfer rate is the fastest?
Terabytes
According to Carl Jung many of us do not actually work towards out potential because of
Stimuli
In Jungian psychology, the repressed part of the personality is called
The Shadow