Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Standalone computer

A

A computer that is not connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network

A

An arrangement(or group or setup) of two or more computers that are connected together for the purpose of sharing resources and/or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet of Things (IoT)

A

A network of physical objects that use sensors, actuators, embedded systems and wireless technology such as WiFi, Bluetooth and Zigbee, to collect and exchange data, with minimal or no human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VoIP

A

Voice of Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAN

A

Local Area Network

Example:
- School network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAN

A

Wide Area Network

Example:
- Bank network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WLAN

A

Wireless Local Area Network

Example:
- Hand held scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Latency

A

The time it takes for a message to transfer (ms). Also known as ping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet

A
  • An interconnected network or network of networks.
  • Most networks are part of the internet.
  • Consists of multiple cables or links that connect countries together, and can be though of as the backbone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet switching

A
  • Breaking down a large amount of data into small packets, each packet is independent of one another.
  • Each packet is tagged (has a header) with the recipient and source IP, checksum and a sequence number for the packets to be put back in order at the destination and checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network topology

A

A Network Topology is the arrangement with which computer systems or network devices are connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bus topology

A

In a bus topology, all nodes in the network are connected directly to a central cable that runs up and down the network.

Advantages:
- Cheap since little cabling needed
- It still works if a node fails
- Easy to add extra devices

Disadvantages:
- If the central cable is damaged the network stops working
- More devices, slower since more collisions
- All nodes can access all traffic can be security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ring topology

A

In a ring topology network, each node is connected to two other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Star topology

A

In a star topology, all nodes indirectly connect to each other through one or more switches. The switch acts as a central point through which all communications are passed.

Advantages:
- Still works if a node fails
- Damaged cable doesn’t stop the network from working
- Data traffic only sent to intended recipient, secure
- Easy to add extra nodes

Disadvantages:
- If central node fails, network stops working
- Network capacity depends on central node’s capacity
- Many cables, expensive and difficult to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mesh topology

A

In a mesh topology, there is no central connection point. Instead, each node is connected to at least one other node.

Advantages:
- Very fault tolerant, if a connection fails, message is re-routed
- Nodes can be added/removed without having take network offline
- Very scalable
- Very high performance, each node is connected to many other nodes

Disadvantages:
- Many cables, difficult and expensive to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Router

A

Manages communication on the network. Can have a built-in wireless access point (WAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP

A
  • Transmission Control Protocol
  • Responsible for delivering data to a given address (packet switching)
  • Transport layer
20
Q

Modem

A

Modulator/Demodulator

21
Q

HTTP

A
  • Hyper Text Transfer Protocol
  • Application layer
22
Q

SMTP

A
  • Simple Mail Transfer Protocol
  • Application layer
23
Q

IP

A
  • Internet protocol
  • Responsible for obtaining the address to which data is sent.
  • Internet layer
24
Q

TCP/IP

A
  • Layered protocol stack (Application layer, Transport layer, Internet layer, Link layer)
  • Collection of protocols
  • It sets how data should be formatted and transmitted across networks
24
Q

Web server

A

Holds and shares web pages

25
Q

File server

A

Holds and maintains user files

26
Q

Mail server

A

Handles emails between users

27
Q

Methods to protect networks

A
  • Access control: Ensures that only authorised users can access the network and its resources
  • Authentication (User management) : Ensures that users can only access data relevant to them
  • File permissions: Prevents misuse: deleting/copying data, installing software
  • Physical security: Prevents damage to hardware
  • Firewall: Acts as a barrier between an organisation’s internal network and the internet. Inspects incoming and outgoing data traffic and decides what data to allow through
28
Q

Importance of network security

A
  • Business success: data on the network is vital for running an organisation, it might fail if comprimised
  • Privacy: data on the network might be sensitive
  • Financial: the data might be financially valuable
29
Q

Vulnerabilities of the cloud

A

Cloud data centres attract many attacks due to the vast amount of information stored, sensitive data is best stored locally.

30
Q

Ethical hacking

A

Looks for weaknesses in software and systems by trying to penetrate into them so that they can be addressed.

31
Q

Penetration testing

A

Used to test a computer system or network in order to find vulnerabilities

32
Q

Social engineering

A

Exploiting human behavior. The attacker will ‘engineer’ a situation where the target individuals give away confidential information

33
Q

Unpatched software

A

Someone can exploit a vulnerability in an unpatched (unfixed) software that still has that vulnerability

34
Q

Anti-malware software

A

Prevents infection by malware by searching for it and destroying it

35
Q

Encryption

A

Scambles data for anyone who doesn’t have the key to unscramble it.

36
Q

Asymmetric encryption

A
  • Uses two different keys
  • Every user has two keys (public and private)
  • A message encrypted with a public key can only be decrypted with its private key
37
Q

Symmetric encryption

A
  • Uses one key
  • Encrypts and decrypts data using the same key
  • Both ends of the transmission must know the exact shared key
38
Q

Symmetric encryption

A
  • Uses one key
  • Encrypts and decrypts data using the same key
  • Both ends of the transmission must know the exact shared key
39
Q

Link layer

A
  • Ethernet
  • Wi-Fi
40
Q

Internet layer

A

IP

41
Q

Transport layer

A

TCP

42
Q

Application layer

A
  • FTP
  • HTTP
  • HTTPS
  • SMTP
  • POP
  • IMAP
43
Q

POP

A
  • Post Office Protocol
  • Used by a client to retrieve emails from a mail server, message deleted on download, it will be stored on the device it was read/downloaded from
44
Q

IMAP

A
  • Internet Message Access Protocol
  • Similar to POP but messages can be read and stored on the message server. The message left on the server on read. Hence accesible from any device
45
Q

Package switching verification

A
  • Checksum for package computed before leaving the computer
  • Checksum added to the header
  • At recipient, checksum is re-computed
  • If don’t match, re-send request is sent back