Networks Flashcards

1
Q

What is a network

A

When several computers are connected together, to share files / software / an internet connection, peripherals and processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is it called when a computer is not connected to a network

A

Stand Alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a wide area network

A

the internet is an inter-connected network of networks. it is an example of a wide area network
-covers a large geographical area
-the infrastructure is owned by the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Local Area Network (LAN)

A

-A network that covers a small geographical area
-Typical the infrastructure is owned by the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the backbone

A

A backbone or core network is a part of a computer network which interconnects networks, providing a path for the exchange of information between different LANs or subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a IP (internet protocol) address

A

All devices connected to a network have an IP address
-Uses IPv4 which could hold 4.3billion addresses
-this was ok when the internet first started
-IPv6 is looking to solve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when you type a url into a browser

A

The request is sent a DNS (Domain Name System) Server to look-up the IP address of the server that is hosting the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an internet registry ?

A

allows individuals to register domain names (website addresses) and adds them to the DNS index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Switch

A

A device that connects computers together on a LAN. A switch onl forwards traffic to the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a hub

A

A device that connects computers together on a LAN. A hub forwards traffic to all connected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a gateway?

A

When two types of networks join, e.g. LAN to WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a WAP?

A

Wireless access point so that WIFI devices can connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a router

A

-Acts as WAP, a hub and a gateway in a house
-a node on a WAN that forwards network traffic along the most appropriate route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a bridge

A

Join two LANs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a NIC

A

Network interface card- traditionally a NIC was separate card to connect an ethernet cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is circuit switching

A

involves creating a complete dedicated physical connection between two endpoints

once used for the telephone networks but is not practical for the billions of devices that connect to the internet today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is package switching

A

When data is split into equal sized “packets” and transferred over a network. Each packet can take it’s own independent route

if one packet arrives corrupt, that single packet can be re-sent rather than the whole file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is latency

A

the amount of time it takes for a packet to reach its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is badwidth

A

the amount data that can be transferred within a set time period. E.g. per second

20
Q

What is a router

A

A router forwards packets from one network to another. Routers look at the destination IP address of a packet and forward on the most appropriate link. Each transfer is called a hop

21
Q

What is a packet made up of

A

each packet is kept small

Header - sender’s IP / Recipient’s IP, protocol, packet number and hop count

Payload - data

Trailer - error checking. A check sum is a value that is sent with the payload. when some maths is done, if the answer is the same the sent checksum then we assume that the data is not corrupt

22
Q

What are protocells

A

Are a series of rules that computers follow when communicating

23
Q

What is HTTP

A

Hyper Text Transfer Protocol - is for transmitting and receiving small files e.g. HTML, CSS, JS, JPGS

24
Q

What is FTP

A

File Transfer Protocol - is more appropriate for transferring large files

25
Q

what is HTTPS

A

Encrypted version of http

26
Q

What is SMTP

A

Simple Mail Transfer Protocol for sending Emails

27
Q

What is TCP and UDP

A

Requires packets to be ordered, received no errors and are confirmed by recipients. UDP packets are just received, any corrupt packets are just delt with and there is no conformation

28
Q

What is TCP/IP Stack

A

There are 4 layers to the TCP / IP stack which is used to transfer packets over a network

29
Q

What is the application layer

A

The software that wants to transmit data to another computer uses the application layer to select an appropriate protocol

30
Q

What is the transport layer

A

Uses TCP to split data into packets and numbers them. Adds the port number to the header according to the protocol.
When a device receives a packet, this is when it is re-ordered, checked for errors and acknowledged

31
Q

what is the internet layer

A

The IP address of the sender and recipient are added to the header of each packet.

32
Q

What is the link layer

A

The IP address of the sender and recipient are added to the header of each packet

33
Q

what are the 4 layers of the tcp stack

A

application layer, transport layer, internet layer & link layer

34
Q

What is a firewall

A

A firewall can be hardware or software

It prevents unauthorised network from incoming and outgoing through the firewall

A computer has a number of ports, lots of different kinds of network traffic arrives at certain ports. E.g. port 80 is HTTP traffic

the firewall listens to these ports and inspects traffic

35
Q

What is packet filtering

A

A firewall technique is where the IP address of each packet is inspected to check if its “allowed”

if the packet is allowed, the port is opened for the duration of the transfer and closed again after.

36
Q

What are proxy servers and VPN’s

A

A proxy server is a computer in another location that forwards on web requests on your behalf. Responses (Files / streaming Video) are sent to proxy, who forward it on to you - This hides your true location and make your computer anonmous on a network

A VPN also encrypts data

37
Q

What are the features of a proxy server

A

-Anonymise location
-Filter content (handy in a school / collage)
-Log all web requests with your user ID
-Keep a cache of frequently visited websites

38
Q

What should the proxy server do if website update occurs

A

If an update occurs to a website, the proxy server should check the Data/time of cached vs homepage so that a stale website isn’t sent to the requesting computer

39
Q

What is malware

A

A general term for software written by someone with malicious intent, such as to corrupt data / collect personal information covertly

40
Q

What is a virus

A

Malicious software that corrupts files on your computer. Requires a human to help spread

41
Q

What is spyware

A

When software sends a key log and files to attacker

42
Q

What is a Trojan

A

malware disguised as legitimate software. Users open unwittingly thinking they’re installing reputable software

43
Q

What is a worm

A

Same as a virus, but can spread over a network

44
Q

What is Phishing

A

Attackers send emails impersonating companies trying to et victims to click a link to website clone and enter personal data

45
Q

What is buffer overflow

A

Buffer overflow occurs when a program accidently writes data to a location too small to handle it

  • As a result, the overflowed data (written to location #3 below) may end up in a neighbouring instruction space
  • Malware can deliberately cause and manipulate overflow data which may then be read as malicious ‘instruction’
46
Q

What is SQL injection

A

A malicious user can enter SQL commands via online database forms to change the processing