Section 4: Computer Networks Flashcards
What are Networks?
A service that allows people to share information and resources through linked computer systems
How do Networks work?
Network software and its configurations manage the operations of the network interfaces
What is PAN?
- PAN (Personal Area network)
- Used between devices i.e. Bluetooth
What is LAN?
- LAN (Local Area network)
- Provides network access to a small office or building (Wi-Fi)
What is WAN?
- WAN (Wide Area Network)
- Provides network access to a wide range of across the country or even across the world (Internet)
What is Public Domain?
Services provided to everyone for free w/out licensing
What is open network?
Freely circulated and are often more popular than proprietary designs
What is TCP/IP Protocol?
Governs communication of devices over the internet
What is a Bus topology?
Machines are connected to a single communication line
What is a Star topology?
Has a single machine serving as a central point to which all others are connected
What is a Ring topology?
Connect directly to each other as a peer
What is a Mesh topology?
Connects every device in a network to every other device
What are protocols
Govern communication in networks, ensuring coordinated message transmission and compatibility among different vendors’ products
Why do vendors use protocols?
Allow communication between their various products
What is a Client/Server Model (Give an example)?
Clients make a request and servers fulfill those requests (Multiple clients send print jobs to a single printer)
What is a Peer to Peer Model (Give an example)?
Devices both request and provide services to one another (gaming and Instant messaging)
What is Cluster Computing
Independent computers working together to simulate the work of a supercomputer.
What is Grid Computing?
Loosely couple systems collaborating to complete large tasks, using specialized software to distribute workloads
What is Cloud Computing?
Provides scalable, shared computing resources, allowing users to rent virtual machines and collaborate w/out managing underlying hardware
What is transmission media
A component that carries data from one network device to another
What is a Coaxial Cable?
Have an outer plastic that is used in computer networks and to deliver cable TV services
What is a Fiber-Optic Cable
Uses reflection of light through a core made up of glass or plastic
How do Repeaters work?
Extend the range of network signals by amplifying them
How do Bridges work?
Connect different types of networks and manage messages
How do Switches work?
Reduce network traffic by managing message delivery
3 Tiers of ISPs
Tier 1: High-speed international WANs that are operated by large communication companies
Tier 2: More common and regional in scope
Tier 3: Independent internets. Operated by a single organization that supplies internet access to homes and businesses
What does ICAAN stand for?
Internet Corporation for Assigned Names and Numbers
What is IPv4?
32-bit address pattern to uniquely identify all of the internet components (Used to identify devices)
12 digits in groups of 3.
What is IPv6?
Uses 128-bit addresses in addition to legacy IPv4
What is a Top Level Domain?
Top-Level Domains are used to identify what the hyperlinks are and who they belong to
(.com / .edu / .org)
What is DNS?
Domain name System - Hierarchical and decentralized system that translates human-readable domain names into numerical IP addresses
(computers use to identify one another on a network)
What is a domain name?
Easy to read names that are used to navigate the internet (www.google.com)
How is the DNS organized?
Root DNS server sends a request to the TLD Servers
What is DNS Resolution?
Process of translating a domain name into an IP address
What protocol supports Email?
SMTP - Simple Mail Transfer Protocol
What is VoIP?
Voice over Internet Protocol
What is a Softphone?
Allow two or more computers to share a call w/out any additional hardware
What is an Analog Telephone?
Allow users to connect their physical phones to a port that digitizes and then transmits real-time audio data
What is on Demand Streaming?
End user expects to view or listen to media at an arbitrary time of their choosing.
What is broadcasting?
A server communicates w/ multiple devices at specific times determined by the providers
What is large-scale streaming services?
They use Content Delivery Networks (CDN) to stream copies of content to nearby end users
What is a CDN?
Groups of servers distributed strategically over the internet
What is a URL?
Uniform Resource Locator - Includes protocol, domain, and all subdomains, as well as the resource path ID and name of the document
Unique address given to each hypertext document on the World Wide Web
What is the common structure of a URL?
http://subdomain.domain.top-level-domain/directory-path/document_name.html
What is XML?
Extensible Markup Language
Provides a standardized style for designing national systems for representing data as text files. XML emphasizes semantics
What does HTML stand for?
HyperText Markup Language
Special symbols called tags describe how the doc should appear on a display screen. HTML focuses on appearance
What is the difference between malware and a software bug?
Malware is intentional disruptions or bugs within software whereas a software bug is unintentional
What is a Virus?
Infects a computer by inserting itself into programs that already reside in the machine
What is a Worm?
Autonomous program that forwards copies of itself to other machines in a network and could result in a detriment of individual machine’s or the operations of the network
What is Spyware?
Collects information about the computer’s activities and reporting back to the spyware’s instigator
What is Phishing?
Used to obtain private information by simply asking for it
Name other types of attacks.
DoS Attack - Denial of Service (Overloads computer w/ messages and results in suffocating the network resources)
Packet Sniffing - Referred to as a “Man-in-the-middle” attack MTM where the attacker intercepts the data as it is traveling to or from the victim’s device
Brutal Force Attack - The attacker uses all possible combos of characters to learn a user’s password
Dictionary attack - Using an application and a large dictionary text file w/ just words
What are different Protection and Risk Management systems?
Firewall - Block outgoing messages w/ certain addresses or block incoming messages from untrustworthy sources
Proxy Server - Acts as an intermediary between a client and a server to shield the client
Network Auditing Software - Monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurrences