Networks Flashcards

1
Q

How are files separated so they can be sent across the Internet?

A

Files are separated into smaller units called packets. Each packet contains a portion of
the data, along with information that helps reassemble the packets into the original file
once they reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the device which directs packets across the Internet?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does your router have a connection to the router of the computer you are
communicating with?

A

No – packets travel through a series of routers forwarding the packet to the next router
closer to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the physical address of your computer called?

A

MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the address used to get the packets to the correct router called?

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software as a Service (SaaS)

A

subscription software delivered through the internet, usually via a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why use a Thin client

A
  1. Simpler installation/updating of software (as only done on server).
  2. Cheaper to purchase due to a lower hardware specification.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why use a Thick client

A

Applications performance will not differ depending on network strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Thin Client

A

computer where applications/programs are executed on an application server. (processes done by server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thick client

A

a computer that performs the majority of processing tasks
locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

client server

A

one computer is nominated as a central server, the rest are seen as clients. (centralized management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

peer to peer network

A

all computers have equal status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

servers and clients

A

server: A server provides services required by a client
clients: requesting device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

benefits vs negatives: client server

A
  • single point of access and failure(data stored centrally)

+easier to back up and perform updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

negatives: peer to peer network

A
  • offers less security (multiple points of weakness)
  • potential data loss (self management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

benefits:
peer to peer network

A

+ each node can request and provide to each other
+ potentially more cheaper to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Packet Switching

A

Routers switching packet destinations via the routing table to make an efficient hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

benefits: serial

A

+ cheaper and still fast
+ doesn’t suffer crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Benefits: parallel

A

+ faster since simultaneous
+ reduced latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

synchronous

A

transfer at regular intervals, receiver and transmitter (continuously) synchronized by system clock pulses.

21
Q

Asynchronous

A

Start and stop bits to synchronize receiver and transmitter devices temporarily

22
Q

Latency

A

Time delay caused during data transmission

23
Q

Baud rate

A

Rate at which signal changes (pulses/second)

24
Q

Bit rate

A

Rate of data transmission (bits per second)

25
Q

Bandwidth

A

range of signal frequencies that can be transmitted (simultaneously) through a transmission medium (Hz)

26
Q

POP3 (Post office protocol v3)

A

stores sent and received messages on local hard drives

27
Q

IMAP (internet access protocol)

A

IMAP: stores hard copies on servers

28
Q

SMTP

A

Emails stored on smtp servers to be routed(if domain name is different it is sent to IMAP or POP3 servers)

29
Q

SSH

A

SSH: Used for the management, access and control, remotely.
requires username/password combo and encrypts information during transmission.

30
Q

DNS servers

A

translates each (URL) request into an IP address (DNL resolution)
(now built into devices)

31
Q

Network devices and their operations (3)

A

Hub sends to all
Switch directs to specific devices
Router can send between networks

32
Q

repeaters

A

Repeaters boost signal: needed over long distance 🗣️

33
Q

SSID

A

Display identifier for people to differentiate between networks

34
Q

Wireless Network Adapter

A

Adds wireless connectivity to (laptop) device

35
Q

Wireless access point

A

allows Wi-Fi devices to connect to wired network point

36
Q

symmetric encryption

A

1 key for encryption and decryption

37
Q

asymmetric encryption

A

2 keys (private and public). only the receiver can decrypt the data encrypted with his key

38
Q

Hashing

A

irreversible mathematical process that
produces a value from the input.

39
Q

purpose of digital signatures?

A

confirms authentication of sender
confirms preservation of the message

40
Q

Go through:
Data collision avoidance

A

-Node sends “request to send ” to receivers wireless access point (blocked if the receiver is busy receiving other data)
(Node waits a random amount of time before trying again
- when free WAP sends the “clear to send”
- node sends its data and all other requests are blocked
-WAP sends acknowledgement when all data has been received

41
Q

Port forwarding

A

external computers to connect to network nodes directly (greenlit by the router)

42
Q

issues with port forwarding

A

internal node is immediately accessible; no longer shielded from unauthorized access

43
Q

subnet mask

A

used to ‘mask out’ the host bits of an IP address and reveal the network to which the device belongs.

44
Q

how do carry out masking

A

with a bitwise logical AND operation on the IP address and the subnet mask

45
Q

Identifiers of a mask

A
  • signed 32 bit number
  • 1s is the network part (determines number of subnets)
  • 0s is the host part (determines number of devices on a subnet)
46
Q

CheckSum Error check

A

apply (checksum algorithm) to block of data
returns “checksum” value
value added to block of data/ packets and is used as a comparison

47
Q

check digits

A

checks that human has input correctly 🤖

47
Q

Parity Checking

A

Even parity is where each byte consists of an even number of 1s
Odd parity is where each byte consists of an odd number of 1s

If as odd number of bits are manipulated an error is detected

47
Q

majority voting

A

parity checking but you send each bit 3x (to avoid mistakes)