Networks and the effects of using them Flashcards

1
Q

What is a Network Interface Card (NIC)?

A

is needed to allow a device to connect to a network. It is integrated in the motherboard. They turn binary data into an electrical signal that allows access to a network. Examples- wireless, wired or USB. Contains the MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Media Access Control (MAC) address?

A

is a number which uniquely identifies a device when it is connected to a network. It is made up of 48 bits which are shown in 6 groups of hexadecimal digits with general format of NN-NN-NN (manufactures code)-DD-DD-DD (device serial number). Cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are data packets?

A

Data is moved around the network in the form of data packets. Whenever user sends data it is split up into a number of packets and each packet is transmitted separately. The packets of data will usually have a header e.g. The senders IP address which allows the router to determine the packet’s next path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Internet Protocol (IP) address?

A

An IP address, or Internet Protocol address, is a series of numbers that identifies any device on a network. Computers use IP addresses to communicate with each other both over the internet as well as on other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are hubs?

A

are a hardware device that can have a number of other devices connected to them. They are used to connect devices together to form a local area network (LAN), often in the same building. Hubs are not very secure because every device will receive the data package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are switches?

A

are intelligent versions of hubs. Each port on the switch connected to a device will have a matching MAC. Switches send data packets to specific devices only. Used to exchange data within their own LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a bridge?

A

are devices that connect one LAN to another LAN that uses the same protocol. Used to connect together different parts of a LAN so they can function a single LAN. They cannot communicate with other external networks e.g. The internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how a router works.

A
  • Data packets are sent from a computer to a switch/hub
  • The router checks the IP address and notes the data is not intended for the same network
  • The data packets are then forwarded onto the internet
  • The IP address matches that of the router; this ensures that each data packet is eventually forwarded to the router
  • The router recognises the IP address of each data packet refers to correct network and forwards them to the switch which then directs each data packet to the correct computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do we use routers?

A

To route data packets from one network to another network, based on IP addresses. It can do this because each rooter has its own IP address. Routers are used to join a LAN to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can a router act as a switch? When does it do this?

A

Modern routers combine the functions of a router and a switch- this means that they store MAC addresses and IP addresses to enable data packets to be sent to the correct network and then to the correct device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the differences between a bridge and a router?

A
  • Routers scan a device’s IP address but Bridges can scan a devices MAC address
  • The main objective of a router is to connect various networks (types) together but The main objective of a bridge is to connect LANS together
  • Both send out data using data packets
  • A router Connected networks will use DIFFERENT protocols but a bridge connects networks together that use the SAME protocols
  • A routing table is used to direct data packets to the correct device but bridges do not make use of routing tables
  • A router has more than two ports but a bridge has only two ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an internet?

A

A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. In a school environment everyone and anyone can use this network including staff, pupils and the headmaster as it is a public network. The public facing of a network- no username or password required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an intranet?

A

An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees. In a school environment an intranet is used to build a private, secure network that can only be accessed by the students, staff, headmaster and owners of the school. Or be used to help store and manage important documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an extranet?

A

An extranet is a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc. The main purpose of an extranet is to allow users to exchange data and applications, and share information. In a school environment an extranet may be sued for students and staff to access to shared information from home and connect with pupils and teachers at home. Or for the suppliers of the school

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the term LAN.

A

A local area network is when computers or devices are connected together over a small geographical area, such as within a home, a building or one site. A LAN can be created to share data or hardware such as a printer, or to share an internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the term WLAN.

A

They are similar to LAN’s, but there are no wires or cables. They provide wireless network communications over fairly short distances using radio or infrared signals instead of using cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the advantages of LANs?

A

They allow the sharing of resources such as hardware (e.g. Printers and scanners) and software (e.g. Word processors and photo editing software)

They permit easy communication between users of the LAN (e.g. By using simple text messaging between computers on a network)

They use a network administrator that ensures security and use of the LAN is constantly monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an access point (AS)?

A

These are sometimes known as Wireless Access Points (WAP)
A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN), serving as the interconnection point between the WLAN and a fixed wire network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the important points of wired networking?

A

Produces a more reliable and stable network

Data transfer rate tends to be faster

They tend to be cheaper than wireless networking

Cabled networks lose the ability for devices to be mobile

Having a lot of wires can lead to tip hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the important points of wireless networking?

A

It is easier to expand the networks and it is not necessary to connect the devices using cables

This gives devices increased mobility, as long as they are within range of the APs

No cabling, so there is a safety improvement and increased flexibility

Data is less secure than with wired systems

Data transmission rate is slower for cabled networks

It is possible for signals to be stopped by thick walls

Increased chance of interference from external resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define the term WAN

A

A wide area network is when computers or devices are connected together over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Can a WAN be made up of lots of LANs? How do they do this?

A

Yes The WAN network can be made up of multiple LAN and MAN networks. A WAN is a network that connects multiple LANs over a long distance to allow devices to communicate over a wide area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give 2 more examples of when a WAN might be used.

A

Communicate using voice and video and accessing data storage and remotely back up data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give an example of how banks might use a WAN?

A

Community banks and credit unions utilize their WAN’s to transmit data to and from their branches and carry out daily functions regardless of location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the largest WAN on the planet?

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How do WANs connect? 2 ways giving examples for each

A

Ethernet cable or cellular radio signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does a typical WAN consist of?

A

It consists of two or more interconnected local area networks which includes a server and a workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the transmission frequency used for Bluetooth and Wi-Fi?

A

Bluetooth: 2.4GHz
Wi-Fi: 2.4, 5.0 GHz. 2.4 has a longer distance (wavelength allows it to pass through barriers). 5.0 has much faster connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the data transfer rate for Bluetooth and Wi-Fi?

A

Bluetooth: 25 Mbits/second
Wi-Fi: 250 Mbits/per second

29
Q

What is the maximum number of devices that Bluetooth and Wi-Fi can connect to?

A

Bluetooth: Up to 7
Wi-Fi: Depends on the router used (can be one device or many)

30
Q

What is the type of data transmission of Bluetooth and Wi-Fi?

A

Bluetooth: Key matching encryption
Wi-Fi: WEP (wireless equivalent privacy) and WPA (Wi-Fi protected access) are the most common security systems

31
Q

What is the maximum effective range of Bluetooth and Wi-Fi?

A

Bluetooth: 30 meters
Wi-Fi: 100 meters (but can be obstructed by walls, etc. reducing effective range to only a few meters

32
Q

When do we use Bluetooth?

A
  • When transferring data between two or more personal devices which are very close together (less than 30 meters in distance). Common devices: speakers, headsets, keyboards and mouse
  • When the speed of data transmission is not critical
  • For low-bandwidth applications e.g. When sending music files from a mobile phone to a headset
  • Bluetooth network is called a PAN (personal area network)
33
Q

When do we use Wi-Fi?

A

It is used when we want to connect computers, tablets, phones and other devices to the internet and wirelessly connected to the network

34
Q

What is the similarities and differences of Wi-Fi and Bluetooth?

A

Similarities:
Wireless ways of transmitting data
They are bidirectional and can send receive data
Differences:
Wi-Fi has a longer range
Bluetooth uses less power
Bluetooth gas a shorter range
Bluetooth deals with a smaller number of connected devices

35
Q

What is access point?

A

A device that creates a wireless local area network , or WLAN in an office or large building

36
Q

What is Hot spot?

A

A type of wireless access point

37
Q

What is tethering?

A

is the practice of using a mobile device (such as a smartphone) as a modem to connect another device, such as a laptop or another mobile phone to the Internet.

38
Q

What is cloud computing?

A

A method of data storage where data is stored on remote servers

39
Q

What is data redundancy?

A

Where the same data is stored on more than one server in case of maintenance or repair, allowing clients to access data at any time.

40
Q

What is a public cloud?

A

This is a storage environment where the customer/client and cloud storage provider are different companies

41
Q

What is a private cloud?

A

This is storage provided by a dedicated environment behind a company firewall; customer /client and cloud storage provider are integrated and operate as a single entity

42
Q

What is a hybrid cloud?

A

This is a combination of the 2 above; some data resides in the private cloud and less sensitive data can be accessed from a public cloud storage provider.

43
Q

What are the advantages of cloud storage?

A

Customer/client files stored in a cloud can be accessed any time from any device from anywhere in the world.

There is no need for a customer/client to carry an external storage device with them or use the same computer

The cloud provides the user with remote back up data in the event of data loss recovery on their computer

If a customer/client has a failure of their hard disk or backup device, cloud storage will allow recovery of their data

The cloud system offers almost unlimited storage capacity

44
Q

What are the disadvantages of cloud storage?

A

Security aspects of storing data in the cloud- Some companies might sell your data

If the customer/client has a slow or unstable internet connection, they could have many problems accessing or downloading their data/files

Costs can be high if a large storage capacity or high download /upload data transfer is required

The potential failure of the cloud storage company is always possible- this poses a risk of loss of all backup data

Often more expensive in the long term- the monthly costs will add up

45
Q

Give 3 examples of when passwords are needed.

A

logging into accounts, websites, networks, databases, carry out online banking

46
Q

List 4 ways of protecting passwords

A

Use a password manager, avid common passwords, keep the passwords unique, do change them often, authentication e.g. Face recognition

47
Q

What is a password manager? Why could this be helpful?

A

A password manager is an app on your phone, tablet or computer that stores your passwords, so you don’t need to remember them. Once you’ve logged into the password manager using a ‘master’ password, it will generate and remember your passwords for all your online accounts. It is useful as you do not need to remember many passwords but just one.

48
Q

What is zero login and biometrics?

A
  • A new technology that allows users to login into computer systems without the need to type in a password.
  • Zero login essentially relies on devices being smart and secure enough to instantly recognise a user by a number of features based on: biometrics and behaviour patterns
  • Biometrics are biological measurements or physical characteristics that can be used to identify ourselves e.g. Fingerprint, face recognition, retina scans
  • Behavioural patterns include how you walk, your typing speed, your normal location etc.
49
Q

What are magnetic stripe cards?

A
  • The cards have a magnetic stripe on the reverse side. Each particle can cat as a north or south pole which correspond to the two binary values.
  • The stripe is read by swiping it through a card reader. Data such as name, ID, number, gender, and date of birth are contained on the magnetic stripes when used a s a security device to enter into a building. Access will only be allowed if the data matches the data in the database
  • Advantages: They are easy to use, it is not an expensive technology, they can be remotely deactivated, the cards can be multi purpose
  • Disadvantages: less secure than for example biometric methods, the cards wear out with a lot of use, magnetic readers often fail to read on the first attempt
50
Q

What are physical tokens?

A
  • A physical token is a form of authentication in the form of a physical, solid object.
  • The user’s interaction with a login system is used tor prove that the user has possession of the token
    There are two types of physical token:
  • A disconnected physical token: this is the type described above, where a separate devices used, requiring the user to key in data manually using a keypad
  • A connected physical token: this is the type of token that transmits the generated one-time password directly to a computer through a USB connection; the user does not need to manually enter the data
50
Q

What are smart cards?

A

A smart card is a physical card that has an embedded integrated chip that acts as a security token. Smart cards are typically the same size as a driver’s license or credit card and can be made out of metal or plastic.

51
Q

What is an electronic token?

A
  • Electronic tokens are software installed on a user’s device, such as a smartphone.
  • Suppose a user wishes to log on to a website using their tablet computer. This website requires electronic tokens to be use to authenticate the user. The user has already installed the electronic token on their smartphone. When the website requests the user to authenticate who they are, the user opens the app on their smartphone. The app generates a one-time password (OTP) which is valid for less than one minute. Once the OTP and the other form of authentication are verified by the website, the user will be allowed access.
52
Q

List 4 common features of Anti Virus Software

A
  • They check software or files before they are run r loaded on a computer
  • Anti-virus software compares a possible virus against a database of known viruses
  • They carry out heuristic checking: this is the checking of software for types of behaviour that could indicate a possible virus
  • Any possible files or programs which are infected are put into quarantine which allows the virus to be automatically deleted or allows the user to make the decision about deletion
53
Q

Why should you run anti-virus software?

A

To allow all software an devices to be scanned for viruses. Whenever the data or software is downloaded or being transferred to another device, it is essential that a virus check is carried out on that other device too

54
Q

Why should anti virus software be kept up to date?

A

Because new viruses are constantly being discovered and will update a database

55
Q

Ideally, how often should I run a full scan & why?

A

Full system checks need to be carried out once a week, for example, because some viruses lie dormant and would only be picked up by this full system scan

56
Q

What are the 3 types of electronic conferencing?

A

Video conferencing, audio conferencing and web conferencing

57
Q

What hardware would I need to video conference?

A

Webcams, large monitors/tv screens, microphones and speakers

57
Q

Define Video Conferencing

A

a communication method that uses both sound and video.

58
Q

List 6 things I should check before a conference?

A
  • It is essential to agree a time and date for the conference to take place
  • The delegates in each conference room must log into the video-conference system
  • The video-conference setup needs to be checked before the meeting goes live
  • Webcams need to be placed in the correct position so that all the delegates in the room are within visual contact
  • Microphones need to be placed centrally so that all of the delegates can speak
  • It is important for one person to be the main contact in each conference room to make sure each delegate is able to be heard
59
Q

Why is CODEC needed?

A

CODEC stand for COder-DECoder or COmpression-DECompression. The first is used to encode or decode the digital data stream to allow data to be transmitted and played back.

59
Q

Why is a web cam and microphone software drivers needed?

A

It is vital that the correct software is used to ensure that the webcam and microphone transmit their images and sound to other delegates.

60
Q

What are the advantages of video conferencing?

A

As people are in their own building, it is much easier to access important documents or bring experts at key parts of the conference

It is possible to hold conferencing at short notice

Not travelling physically to meetings reduces costs

It may be better to use video conferencing than have delegates travel to potentially unsafe places around the world

It is better for the environment- less travel means less pollution

It connects people in an organisation who might be otherwise left out e.g. People not based at headquarters

61
Q

What are the disadvantages of video conferencing?

A

There is a potential time lag in responses/delays when talking

Images can jerk usually to poor connection or poor bandwidth

It can be very expensive to set up in the first place

There can be problems if the delegates live in countries with different time zones

Training people to use the system correctly can be both costly and time consuming
The whole system relies on a good network connection- if it breaks down than the whole system can break down

61
Q

Why is echo cancellation software needed?

A

This allows talking to take place in real time and permits the synchronisation of communication.

62
Q

What is audio or telephone conferencing?

A

Refers to meetings held between people using audio (sound) equipment

63
Q

What are the steps involved to setting up and joining a audio conference?

A
  • The organiser of the phone conference is given a two PINs by the phone company. One off them is the personal pin given to the organiser and the other is the participant pin
  • The organiser contacts all of the participants and informs them of the PIN and the date and time of the audio conference
  • When the conference is about to start, the organiser dials in the conference phone number and, once they are connected, keys in their personal pin
  • The participants then call the same conference number to join in and once they get through they each input the PIN, given to them by the organiser
64
Q

What is VoIP?

A

Voice over Internet Protocol which allows an organiser to create a group of people to take part in the conference call

65
Q

What is web conferencing more commonly called?

A

Webinar or webcasts

65
Q

What equipment is needed?

A

A computer and a high-speed, stable internet connection.

66
Q

When do people tend to use web conferences?

A

Business meetings to discuss new ideas, presentations, online education or training