Networks part 2 Flashcards

1
Q

Largest WAN

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT IS THE INTERNET

A

The internet is a collection of interconnected networks spanning the world

The concept of the Internet as a network of computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between internet and world wide web

A

The internet is NOT the same as the “World Wide Web” which is just a service on the internet

The internet itself is just the hardware, the cables, the wireless connections and the routers that make the internet what it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Domain Name service role in the conversion of a URL to an IP address

A
  1. URL request by browser made from user e.g. www. bbc.co.uk
  2. The browser sends the domain name to a domain name server
  3. The DNS maps the domain name to an IP address and returns it to the browser
  4. GET request for the webpage / resource is sent to the web server using the IP address
  5. Requested webpage/resource is returned to the clients web browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are web addresses used instead of IP addresses

A

When you request a page on a server, you would need to refer to its IP address.

This is not very convenient for humans as we are not very good at remembering sequences of numbers – we prefer to use words

Web addresses which are easier for humans to remember are converted to IP addresses for routers by a Domain Name Service (DNS) revolver server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is domain name service made up of

A

A Domain Name Service (DNS) is made up of multiple Domain
Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do servers do

A

Servers provide services

(e.g. Web server -> Web pages, File server -> file storage/retrieval)
E.g.

Clients request/use services from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of the cloud

A

Severs can be used to store data and programs remotely that can be accessed and used over The Internet

This is known as ‘The Cloud’ or ‘Working in the Cloud’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of The Cloud (storage) (rather than storing data and programs on your PC):

A

Access information any time

Access information anywhere

Access information from any device

A large storage capacity

Automatic backup of data

Easy online collaboration

No need to buy expensive hardware or store data or run complex applications

No need to pay IT staff to manage the hardware

They provide access to anything, anywhere, automatic backup and collaboration of document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages to the cloud

A

Need connection to the Internet to access files or applications
Dependent on host for security and back ups
The hosting company could be targeted by online hackers - data stored in the cloud can be vulnerable to hackers

Subscription fees for using cloud storage and software may be expensive

Download and upload speeds can be affected by the internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is hosting

A

Hosting is when a business uses its servers to store files of another organisation
_____________________________
Websites are stored on servers dedicated for this purpose
This is known as hosting

Hosted solutions provide 24/7 access, multiple users and greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of network topologies

A

Star network topology
Full/partial mesh network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a network topology

A

A given arrangement of all the elements you need for networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a star network topology

A

Type of network topology where:

Includes a central switch

All devices connect into the central switch

The switch is intelligent and makes sure traffic only goes where it is intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of star network topologies

A

If a single cable breaks only that computer (connected to the switch) is affected. (if one link fails, all the other devices will continue to operate)

There will be less network traffic and fewer collisions

Adding or removing devices is easy and can be done without affecting the entire network

Data can be directed to the intended node directly without having to pass along the complete network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantages of star network topology

A

Network operation depends on the functioning of the central component (file server or switch0 - if this fails, then so will the entire network

It requires a lot of cables as each computer is connected individually to the central component and so will be expensive

17
Q

What is the mesh topology

A

Each of the network nodes, servers, client computers and printers are interconnected with one another

Every node not oly sends its own signals but also relays data from other nodes

Every node is connected to ever othe rnode

18
Q

Advantages of mesh topology

A

Data can be transmitted from different devices simultaneously

Even if one of the components fails there is always an alternative route for the data

It can handle high volumes of data traffic

Adding more devices will not hamper the transmission of the data as all nodes help to transmit the data

19
Q

Disadvantages of network topology

A

The overall cost is expensive compared with other topologies since there is a lot more cabling and switch hardware required

Very difficult to manage as it requires continuous supervision

Disadvantage is that there is a lot more cabling and switch hardware are required which will add to the cost (be expensive and impractical) for large networks

20
Q

Example of a wired connection

A

Ethernet

21
Q

Advantages of Wired networkds

A

Very high bandwidth up to 100 Gbps
Security is good. A user has to physically plug their computer into the network using a cable
There should be no interference with the signal on a network cable

22
Q

Disadvantages of of wired network

A

Setting up is more difficult. Cables have to be run all over the site

Not very mobile. A user has to plug the computer into a wall socket and cannot use it in a room without one. Contact ids lost as soon as it is unplugged if the user wants to move to another room

23
Q

Advantages of wireless networks

A

Installation is easy. All that is needed are wireless access points and NICs for any computers such as desktop computers, that do not have them build in

Cost. Cheap. Just cost of wireless access point

Very mobile. Users can access the network from anywhere on the site. Can move from room to room and remain connected

24
Q

Disadvantages of wireless networks

A

Far lower bandwidth. The latest version of Wi-Fi can offer speeds from 433Mbps to 2 or 3 Gbps. Compared to speeds of up to 100 Gbps for wireless networks

Security is poor. Anyone within range can see the network and connect to it to use it. The access point must be secured with a security password. Some form of encryption must be set up

Interference: The signal can be affected by walls and electronic equipment such as microwave ovens. It is also affected by distance from the access point and the number of connected devices.

25
Q

What is etherenet

A

Ethernet is a standard for networking technologies

Used for communicating on a wired local area network

Provides reliable, error free, fast communication between two points

Includes a number of associated protocols (rules for governing communications)

26
Q

disadvantage of ethernet/wired connections

A

A user’s location is limited by the need for a physical cable connection.

A set up relying on Ethernet relies on lots of cables, connections, ports and physical hardware which will affect (the overall) cost (of the network)

27
Q

Features of bluetooth

A

Bluetooth is another, more modern standard for wireless networking:

It is ideal for connecting personal devices e.g. Bluetooth enabled headphones to connect to a mobile

It has a very short range, around 10 metres

It has a very low power consumption compared to Wi-Fi

Bluetooth –
range - 10 metres

Bandwidth – Low

Power consumption - Low

28
Q

Features of wifi

A

Wi-Fi is a common standard for wireless networks:

Users can move around freely

Easier to set up, and less expensive (than wired networks)

Convenient to use

Can handle large numbers of users

Transfer of information to social media is much easier

Speeds are slower than wired networks

Relies of signal strength to the wireless access point (WAP)

Signal can be obstructed

Less secure than wired networks

Wi-Fi

Range – 100 metres

Bandwidth – High

Power consumption – High

29
Q

Describe encryption on wireless networks

A

Wireless networks broadcast data, so it must be encrypted to be secure

This is done by scrambling the data into cipher text using a “master key” created from the SSID (Service Set Identifier) of the network and the password

Data is decrypted by the receiver using the same master key, this key is not transmitted

It is important that the master key is not transmitted at all, because any device listening in would then be able to decrypt the data as well.

Protocols used for wireless encryption include WEP, WPA, WPA2

Both the transmitter and the receiver agree which protocol is being used, and this is normally set when you set up your wireless network.

A handshaking protocol is used to ensure that the receiver has a valid master key before transmission to the device begins

Network protocols are a set of rules outlining how connected devices communicate across a network to exchange information easily and safely.

30
Q

Describe encryption on wired networks

A

In a similar method to that shown for wireless, basic encryption involves the sender using an encryption key to turn a plain text message into cypher text before sending it out onto the network.

At the receiving device, a decryption key is used to turn this cypher text back into the original.

This form of encryption is known as symmetric encryption