S5 Networks Flashcards

1
Q

What is a computer network?

A

A group of interconnected computers that can share data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of using a computer network?

A

-Resource Sharing, such as printers and files.
-Rapid sharing and updating of data.
-Reduces the need for duplicate hardware and software, cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the disadvantages of using a computer network?

A

-Security Risks: Increased vulnerability to hacking and data breaches.
- Maintenance Costs: Ongoing costs for network maintenance and updates.
- Dependency: Reliance on the network can lead to disruptions if the network fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a PAN network

A

A small network connecting personal devices like phones, tablets, and laptops. Bluetooth is commonly used for wireless PANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a LAN network

A

Connects computers and devices within a small geographical area, such as a school or office. It is usually managed by a single organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a WAN network

A

Connects multiple LANs over a large geographical area, such as cities, countries, or continents. It often has collective or distubuted ownership. The Internet is the largest example of a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between wired and wireless networks?

A

Wired networks use physical cables (e.g., Ethernet) for faster, more reliable connections, while wireless networks use radio waves, offering more flexibility and ease of access (you can move) but potentially lower speeds and higher security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of wireless networks compared to wired networks?

A

Flexibility to move devices, easy installation without cabling, and accessible for multiple devices, ideal for public areas or homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the disadvantages of wireless networks compared to wired networks?

A

Greater security risks (hacking and unauthorised access), signal interference from other devices or obstructions, and typically slower, less reliable connections than wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a network topology?

A

A network topology is the arrangement of different elements (nodes, links, etc.) in a computer network. Common topologies include star, bus, and ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the star topology.

A

All nodes are connected to a central hub.
If one connection fails, it doesn’t affect the rest of the network.
Easy to manage and troubleshoot but requires more cabling and a central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Draw a star topoligy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the pros and cons of star topology?

A

Pros: Easy to install and manage. Failure of one node doesn’t affect the rest of the network. Performs well with many devices.
Cons: If the central hub fails, the entire network is impacted. Requires more cabling, which can be costly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the bus topology.

A

All devices share a single central cable (the bus or backbone). Data travels along the bus to its destination. It’s simple to set up but can be slow and challenging to troubleshoot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Draw a bus topology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the pros and cons of bus topology?

A

Pros: Easy to install and extend. Uses less cabling compared to star topology.
Cons: Failure of the central bus affects the entire network. Difficult to troubleshoot. Performance decreases with heavy traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a network protocol?

A

A network protocol is a set of rules and conventions for communication between network devices. Examples include Ethernet, Wi-Fi, TCP/IP, HTTP, and FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of network security?

A

Network security aims to protect data and resources from unauthorized access, misuse, or theft. Methods include authentication, encryption, firewalls, and MAC address filtering.

19
Q

Why do we need network security?

A
  • Protect sensitive information from unauthorized access.
  • Ensure data integrity by preventing unauthorized modifications.
  • Maintain network service availability by preventing disruptions.
  • Safeguard personal and financial information, reducing risks like identity theft.
20
Q

What are the methods of network security?

A
  • Authentication
  • Encryption
  • Firewalls
  • MAC Address Filtering
21
Q

What is authentification and how does it ensure security?

A

Verifies the identity of users before allowing access to the network. Methods include passwords, biometrics, and two-factor authentication.

22
Q

What is encryption and how does it ensure security?

A

Converts data into a code to prevent unauthorized access.

23
Q

What is a firewall and how does it ensure security?

A

a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

24
Q

What is MAC address filtering and how does it ensure security?

A

allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.

25
Q

What is the difference between TCP and UDP?

A

TCP (Transmission Control Protocol) is connection-oriented and ensures reliable data transmission with error-checking and retransmission of lost packets. UDP (User Datagram Protocol) is connectionless and does not guarantee delivery, making it faster but less reliable.

26
Q

What is HTTP and HTTPS?

A

HTTP (Hypertext Transfer Protocol) is used for transmitting web pages on the internet. HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP that includes encryption for secure communication.

27
Q

What is Ethernet and its purpose?

A

Ethernet is a widely used network technology for wired networks. It connects devices in a LAN using cables and provides reliable, high-speed data transfer.

(family of protocols)

28
Q

What is Wi-Fi and its purpose?

A

Wi-Fi is a technology that allows devices to connect to a network wirelessly using radio waves. It’s commonly used in homes, offices, and public places to provide internet access without physical cables.

29
Q

What is TCP and its purpose?

A

TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol used for transmitting data over a network. It ensures data is delivered accurately and in order, by establishing a connection and checking for errors.

30
Q

What is UDP and its purpose?

A

UDP (User Datagram Protocol) is a connectionless protocol used for transmitting data where speed is critical, such as in video streaming or online gaming. It does not guarantee delivery, making it faster but less reliable than TCP.

31
Q

What is IP and its purpose?

A

IP (Internet Protocol) is responsible for addressing and routing data packets between devices on a network. It ensures that data sent from one device reaches the correct destination.

32
Q

What is FTP and its purpose?

A

FTP (File Transfer Protocol) is used to transfer files between a client and a server over a network. It’s commonly used for uploading and downloading files to and from websites and servers.

33
Q

What is SMTP and its purpose?

A

SMTP (Simple Mail Transfer Protocol) is used for sending emails between servers. It’s the protocol responsible for the transmission of outgoing email messages.

34
Q

What is IMAP and its purpose?

A

IMAP (Internet Message Access Protocol) is used for accessing and managing emails on a server. It allows users to view and organize their emails without downloading them, keeping messages stored on the server.

35
Q

What layer operates where network applications function, such as web browsers and email programs?

A

Application Layer

This layer encodes data for communication using protocols like HTTP, HTTPS, FTP, IMAP, or SMTP.

36
Q

What is the function of the Transport Layer?

A

Sets up communication between hosts, splits data into packets, and adds packet information

Protocols like TCP and UDP operate at this layer.

37
Q

What does the Internet Layer do?

A

Addresses and packages data for transmission, attaching sender and recipient’s IP addresses

It routes the packets across the network using IP.

38
Q

What hardware is included in the Link Layer?

A

Network Interface Card (NIC)

This layer adds MAC addresses of the sender and recipient.

39
Q

How are packets transmitted through the layers?

A

Passed down through these layers before transmission and back up through these layers when received

Each layer performs its specific function independently.

40
Q

Fill in the blank: The _______ Layer encodes data for communication using protocols like HTTP and FTP.

A

Application

41
Q

True or False: The Transport Layer is responsible for routing packets across the network.

A

False

The Internet Layer is responsible for routing packets.

42
Q

What protocols are associated with the Transport Layer?

A

TCP, UDP

These protocols facilitate communication setup and packet management.

43
Q

What is the main role of the Link Layer in packet transmission?

A

Allows packets to reach the correct device on a local network

It does this by adding MAC addresses.

44
Q

Fill in the blank: The _______ Layer is where packets are addressed and packaged for transmission.

A

Internet