Networks Flashcards
Define “protocols”
Rules that allow the transmission and exchange of data between devices
Additional functionality provided by network OS?
- Passing usernames and passwords to a server when a user logs in
- Separating user accounts and ensuring users cannot access each other’s files
- Providing access to network storage and shared resources
What is the IP address?
A unique address that networked devices use to send data to each other
How are IP addresses assigned?
By a network administrator or dynamically allocated by a server running Dynamic Host Configuration Protocol (DHCP)
What is a DHCP server?
A networked computer that automatically assigns an address to other computers when they join the network
Explain MAC address
Media Access Control is a universally unique identifier assigned to the NIC by the NIC manufacturer and is used in devices connected to LAN.
It is made up of six pairs of characters
Uses of MAC addresses:
- Restricting or allowing access to a network
- Identifying a device on a network
- Tracking a device (by checking which wireless access points have been accessed by specific MAC addresses)
- Assigning fixed IP addresses
Types of cables:
- Cat5e cables
- Cat6 cables
- Fibre optic cables
Cat5e cables connect devices through their ____
NICs (contains LEDs)
NICs allow the exchange of data from computers to networked computers
The function of wireless access points?
Allows devices with Wi-Fi connectivity to connect to a wired network
The function of switches?
Connects devices on a network
Makes sure data sent from any device gets to the correct devices on a network
The function of gateways?
Gateways connect two different types of network
The function of routers?
- Store the addresses of all devices that are connected to it
- Reads the packet header
- Takes the recipient’s address
- Compares it against the addresses stored
- Forwards network traffic to its destination using the quickest route
How can wireless access points be used as boosters?
By setting them to repeater mode
What does a server do?
A server is a computer that shares its resources with connected computers (clients)
Types of servers:
- Authentication servers
- Print servers (manage multiple printers and deal with print requests)
- File servers (shared and private storage)
- Application servers
- Web servers
What do web servers do?
They process requests for data made via HTTP
Define HTTP
A set of standards that control how computer documents that are written in HTML connect to each other
What do ISPs do?
ISPs provide connections to the telecommunications infrastructure that form the framework for the internet
ISPs provide access via mobile phone network or landline telephone network
Define telecommunications infrastructure
A network of hardware facilities that are used to transfer data
Define URL
Uniform Resource Locator: a website address
What are peer-to-peer networks?
Computers share their resources with other computers in a network but do not access a server
What are client-server networks?
Networks that use servers and clients
Benefits of LAN:
- Access to shared peripherals
- Access to shared storage and data
- Flexible access
- Media streaming
- Communication
- Shared access to the internet
Benefits of client-server networks:
- Control of user access rights
- Centralised administration
- Centralised backup
- Access to shared software
- Access to shared storage
- File access right
- Roaming profiles
Where is a firewall used?
A firewall is used at the gateway of a network
What does a firewall do?
It controls the network traffic
It prevents unauthorized users from accessing network devices and resources
Types of encryption:
- Caesar cipher
- Symmetric key encryption
- Public key encryption
- Wireless Encryption Protocol
- Wi-Fi Protected Access
VPN stands for
Virtual Private Network
What does a VPN do?
It provides access to a private LAN from a remote location. The connection is made using the infrastructure of a public network like the internet
Uses of VPN:
- Accessing employer’s network when working from home
- Accessing computers in a different geographical location
- Making secure payments
- Preventing surveillance of and access to web activity
Purpose of transaction logs?
Used to identify which computers and network devices have been accessed.
Allows administrators to identify any unusual activity that might be a threat to data security