Networks Flashcards

1.3.3

1
Q

What is a network?

A

Name given to two or more computers connected with the ability to transmit data between each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a LAN?

A

Local Area Network is a network that spreads over a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a WAN?

A

Wide Area Network is a network that spreads over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a protocol?

A

Set of rules defining how two computers should communicate with each other ensuring secure data transmission and making sure they interpret data the same way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is HTTP?

A

HyperText Transfer Protocol which is used for web page rendering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TCP/IP?

A

Transmission Control Protocol/ Internet Protocol used for routing packets through networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is POP3?

A

Post Office Protocol are mailing protocols used for email access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is FTP?

A

File Transfer Protocol used for the transmission of files over networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the internet?

A

A network of networks which allows computers on opposite sides of the globe to communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Application Layer do?

A

Interacts directly with software applications
Prepares data for transmission over the network by converting it into a format that can be sent and received over the network (known as encapsulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Transport Layer do?

A

-Uses TCP to establish an end to end connection between the source and recipient computer

-Splits data up into packets and labels packets with packet number, total number the original packet was split up into and port number for communication

-If any packet gets lost, transport layer request retransmission of lost packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Internet Layer do?

A

-Receives packets from the transport layer
-It adds a header to each packet, including the sender’s IP address and the receiver’s IP address
-Responsible for routing each packet across the network using the IP addresses in the headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Link Layer do?

A

-Receives packets from the Internet layer
-Adds the MAC address of the sender and receiver to the data before transmission
-Translates the digital packets into an electrical, optical, or wireless signal that can be sent over the network
-Once the signal reaches the receiving end then translates it back into digital packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For devices on the same network what is the destination MAC?

A

The MAC address of the first router that the packet will be sent to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does each packet contain ?

A

-Payload(data)
-A header(With metadata and destination IP addresses)
-A footer(to signify end of packet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the DNS?

A

Domain Name System is a directory of domain names and is used to translate human-readable domain names to numeric IP addresses that computers use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the benefits of DNS?

A

-Allows us to use easily remembered domain names instead if hard to remember IP addresses

-Handles mapping between domain names and IP addresses, relieving end users and system administrators from the task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens when you type a URL into a web browser?
(LONNNNGGGGG ASFFFF)

A

1️⃣User enters URL in a web browser
2️⃣ Computer checks cache for the IP address
3️⃣ Browser queries DNS resolver if IP is not cached
4️⃣ Resolver contacts DNS servers (Root → TLD → Authoritative)
5️⃣ Authoritative DNS server returns IP address
6️⃣ Browser sends request to web server at that IP
7️⃣ Web server responds with webpage data
8️⃣ Browser renders the webpage for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the advantages of LAN?

A

Centralised management
Security-Can secure devices with use of firewall, antivirus software
File Sharing-Allows users to share resources, files, and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the disadvantages of LAN?

A

If hardware fails network may not function properly
May be more prone to attacks
Accessing data and peripherals may be slow
Needs regular maintenance to ensure software up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why are protocols divided into layers?

A

-Modular design meaning breaking complex process of networking into more manageable layers

-Interoperability-meaning that protocols that operate at network layer can be altered independently of application layer protocols

-Ease of updates-Changes can be made to one layer without affecting another making updates and improvements easier to implement

-Specialisation-Each layer can be specialised to preform its functions without worrying about specifics of other layers. Allows for more effective and efficient design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What information do headers contain?

A

Source IP address: identifies the sender of the packet
Destination IP address: identifies recipient
Sequence number: helps in reordering packets into original message
Protocol: identifies transport protocol
Packet Length: Indicates size of packet
Checksum: a value used for error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is packet switching?

A

Network communication method that breaks down data into smaller packets and sends them separately along different routes and reassembles them at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are benefits of packet switching?

A

Efficient as packets can follow different paths using more of available bandwidth
More reliable as if a single packet fails only that packet needs to be sent not the whole stream
Lower cost due to shared network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are disadvantages of packet switching?

A

Not ideal for real-time services like video calling as it requires a steady stream with no data delays
Packets can arrive out of order so reassembly is required
Potential for congestion in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is circuit switching?

A

Communication method where a dedicated communication path is established between two devices for duration of conversation and all packets sent along same route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are advantages of circuit switching?

A

Ideal for real-time services as it has a steady data transmission rate
No delays as dedicated path is established
Data arrives in order as it follows same path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are disadvantages of circuit switching?

A

Less efficient as resources remain allocated during whole conversation even when no data is being sent
More costly due to dedicated line requirement
Less flexible and scalable, as adding new devices can be complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are hackers?

A

Individuals or groups of individuals who exploit system vulnerabilities to gain unauthorized access to data for personal gain, activism or cyber espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a virus?

A

Malicious software programs designed to spread from one computer to another and interfere with normal operations
A virus attaches itself to a legitimate program or file and them replicates itself to spread to other programs or files on the computer, causing damage by deleting data or damaging hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is malware?

A

Malicious software designed to harm or gain unautherised access to a systems network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a worm?

A

Similar to a virus but is a standalone program that can spread and replicate itself over computer networks. Can take up storage or bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a trojan horse?

A

A program that disguised itself as a legitimate program or file but when installed it can delete or damage hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is spyware?

A

Malware designed to secretly monitor a user’s activity on their computer or device without their knowledge.
It can gather sensitive information like passwords, browsing habits, and personal details, and send it to a third party

35
Q

What is adware?

A

Software that displays unwanted advertisements on computer screen without users consent. Some may contain spyware when clicked and link to viruses

36
Q

What is ransomware?

A

Malware that encrypts the users file and demands a ransom payment to decrypt them. Can cause data loss and financial damage

37
Q

What is a DoS attack?

A

Dos attack is when a computer floods a server with a lot of requests at the same time, which the computer cant respond to, causing it to crash
Aims to disrupt normal functioning of a system or network by denying user access

38
Q

What is a DDos attack?

A

Similar to DoS but instead multiple computers are used as bots to send requests to the server

39
Q

What is Phishing

A

Attempting to acquire sensitive information by masquerading as a trustworthy person in electronic communication
Involves sending an email that looks legitimate
Email contains link to fake website where user is encouraged to enter details to steal sensitive information for personal gain

40
Q

What is Pharming?

A

Cyber attack intended to redirect websites traffic to another bogus website
Involves malware being downloaded without users knowledge
Redirects user to a fake website where they’re encouraged to enter personal details

41
Q

What is social engineering?

A

Involves manipulating individuals to gain access to confidential information to benefit the attacker

42
Q

What is a firewall?

A

Network security systems that monitor and control incoming and outgoing network traffic

43
Q

How does a firewall work?

A

Firewall consists of two NIC’s between internal and external network passes packets between them and compares against set of rules by firewall software by packet filters

44
Q

What are packet filters?

A

Limits network access in accordance with administrator rules and policies
Works by examining source IP, destination IP and protocols being used as well as ports being requested to decide whether they are accepted

45
Q

What are proxies

A

An intermediary, collecting and sending data on behalf of the user

46
Q

What are the benefits of proxies?

A

Privacy of user is protected and they remain anonymous
Can cache data of frequently used website data making it faster to load
Can be used by administrators to prevent access to sensitive or irrelevant information at work or school

47
Q

What is a modem?

A

A device that modulates an analogue carrier signal to encode digital information and also demodulates a carrier signal to decode transmitted information

48
Q

What is a modem used for?

A

Enables a computer to transmit data over telephone or cable lines by converting digital signals into analogue or vice versa for receiving data

49
Q

What can a modem be used for?

A

DSL, cable, or dial-up internet connections

50
Q

What is a router?

A

Network device that routes data from a LAN to another network connection
Joins two networks together

51
Q

How does a router work?

A

Analyses data packets and determines the best path for a packet to reach its destination
If data packet is coming into the LAN, it will read the header of the packet to determine the intended destination IP address
Might have to travel through several routers to get to its destination
Each pass from a router is called a hop
it will then forward the packet to its destination

52
Q

What are cables?

A

Physical paths for data to travel between devices in a network

53
Q

What are fibre-optic cables?

A

Cables that use light to transmit data, offering much higher speed and larger capacity

54
Q

What is an NIC?

A

A hardware component that enables a device to connect to a network
Provides dedicated, full-time connection to a network converting the computers data into a network friendly format

55
Q

What is a WAP?

A

Device that allows wireless devices to connect to a wired network using Wi-Fi.
It acts as an interface between the wireless network and the wired network (e.g., Ethernet).
It broadcasts a wireless signal that devices can connect to

56
Q

What is a Hub?

A

A network device used to connect multiple devices in a network
They pass anything received to all devices on network
But are cheap

57
Q

Why are hubs bad?

A

It will broadcast data to every device on the network, causing unnecessary traffic
Poor security

58
Q

What is a switch?

A

Network device that connects devices on a network and uses packet switching to receive, process and forward to the destination device
Only sends to the device its intended do

59
Q

How does a switch work?

A

Switch only sends the data to the intended device by a lookup table
When a switch receives the data packet it examines the destination MAC address and looks up that address in its lookup table
Once its found the matching MAC address it will then send to corresponding port

60
Q

What is a client server network?

A

Powerful and reliable computer that control the network and serve the clients with services such as files, emails etc and services to be consumed by clients

61
Q

What are advantages of client-server?

A

Better security since files stored in central location
Backups are done automatically
Data can be shared

62
Q

What are disadvantages of client-server?

A

If server goes down all services could be unavailable
Can be expensive to set up and maintain

63
Q

What is a Peer-to-Peer Network?

A

All computers in the network share responsibility and there is no central server
All machines have equal status
All responsible of their own security and backup
Data spread across the network

64
Q

What are benefits of Peer-to-Peer?

A

Easy to set up and less expensive than client
No dependency on a central server
Data can be shared directly between systems no need for central server

65
Q

What are disadvantages of Peer-to-Peer?

A

Lack of control can lead to vulnerability and issues
Not suitable for large network as it can have performance issues

66
Q

What does the term standard mean?

A

The set of guidelines that govern how a task should be performed in data transfering

67
Q

Why do we need standards?

A

Enables different device regardless of model to work together
Ensures data can be correctly interpreted by receiving device regardless of how it was sent

68
Q

What is API?

A

A set of rules and protocols that allows different software applications to communicate.

69
Q

Functions of APIs?

A

Sets out formats of requests and responses between server and client and enables one application to make use of the services of another

70
Q

What is a Thin Client?

A

A lightweight device that relies on a server for processing, storage, and applications.

71
Q

Pros of Thin Client?

A

Easy to maintain(most data and apps are on the server).
Lower cost due to minimal hardware requirements.

72
Q

Cons of Thin Client?

A

Requires constant network connection to function.
Server failure affects all thin clients.

73
Q

What is a Thick Client?

A

A device that performs processing locally and stores applications/data.

74
Q

Pros of Thick Client

A

Can work offline without a network connection.
Better performance for local tasks (e.g., running apps).

75
Q

Cons of Thick Client?

A

Higher cost due to more powerful hardware.
More maintenance needed for each individual client

76
Q

What is Server-Side Processing?

A

Processing that occurs on the server in response to requests from the client.

77
Q

Tasks Handled by Server-Side Processing?

A

Database queries (retrieving/storing data).
Data validation (checking input).

78
Q

Pros of Server-Side Processing?

A

More powerful, can handle complex tasks.
Data securely stored on the server.

79
Q

What is Client-Side Processing?

A

Processing that occurs on the client’s device (e.g., computer or smartphone).

80
Q

Tasks Handled by Client-Side Processing?

A

User interface interactions (e.g., buttons, forms).
Dynamic updates on the page (e.g., form validation).
Immediate feedback to the user (e.g., checking email format).

81
Q

Pros of Client-Side Processing?

A

Faster response time (doesn’t rely on server for every task).
Reduces server load (less processing on the server).

82
Q

When to Use Server-Side vs. Client-Side Processing?

A

Server-side: Complex tasks, secure data processing.

Client-side: Simple, interactive tasks, UI feedback

83
Q

Cons of client side

A

Potential security risk as clients can see code
Reliant on JavaScript so if it doesn’t work page is inaccessible

84
Q

Cons of server side

A

Slower response time
Increase server load
Heavily dependent on server