Topic 3: Networks Flashcards

1
Q

Briefly describe a Local Area Network (LAN).

A

LAN is a computer network that connects computer systems that are within a limited geographical area such as a room, a home, an office building or a school. Computer systems interconnected with a LAN usually have high data-transfer rates between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Briefly describe a Wireless Local Area Network (WLAN)

A

A WLAN links two or more computer systems within a limited geographical area, similar to LAN. The difference from a LAN is that WLAN devices are connected using some sort of wireless connection method. This allows users to have mobile devices and laptops connected to the network and be able to move around.

Can be less secure since potential intruders do not need a physical connection to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Briefly describe a Virtual Local Area Network (VLAN)

A

A network configuration that separates a physical LAN into logical separate network. Even though all devices are connected to the same physical network, each logical separate network can not see the computer system or other shared resources of other logical separate networks.

Can be used when a business wants to separate the networks of its various departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Briefly describe a Wide Area Network (WAN)

A

WAN is a computer network that connects computer systems that are within a large geographical area. The most obvious example of a WAN is the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Briefly describe a Storage Area Network (SAN)

A

A SAN is a network that is created so that large storage devices can be accessible from servers in a convenient and easy way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Briefly describe an extranet.

A

An extranet is a computer network that utilizes the Internet to allow controlled access by specific users to a specific LAN or WAN.

For example, a business may wish to securely share part of its network with suppliers, partners, or customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Briefly describe a virtual private network (VPN)

A

A computer network that connects two or more computer systems, but allows clients from remote locations to connect to the network through the internet as if they were physically present using a tunneling protocol to create a secure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Briefly describe a personal area network (PAN)

A

A network that interconnects devices that are centered around an individual person’s workspace. Typically includes a mobile computer, smartphone, tablet that are interconnected through wired USB connections or wirelessly (typically through Bluetooth).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Briefly describe a peer-to-peer (P2P) network.

A

A network that does not utilize a client-server model where clients request resources and servers provide them. Instead, a P2P network uses a distributed network architecture where all the computer systems (called nodes or peers) are decentralized and are both clients and servers at the same time. Example: torrent filesharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outline the importance of standards in the construction of networks.

A

Standards are common rules shared between devices. Different hardware is made by different manufacturers. If there was not a common standard, these devices would not be able to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain how communication over networks is broken down into different layers.

A

Network functionality is broken down into different layers. For example, the protocols that govern how data should be transmitted over a physical medium, and the protocols that govern how packets should be routed through a network.

The most-widely used networking standard is the Open Systems Interconnection model (OSI). It contains seven layers: Physical, Data link, network, transport, session, presentation, application. You do not need to understand the functioning of each layer, but you should be able to list two of the layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the advantages of breaking down network communication into different layers.

A

Easier to manage, makes protocol design easier.
Manufacturers can focus on technologies of a particular layer.
Products of different manufacturers can work together.
Technology advances within a layer are independent of technology advances in a different layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify the technologies required to provide a VPN.

A

Internet access, VPN software (client software, utilities and server software) enabling private communication over the Internet, VPN routers and firewalls (to permit VPN traffic to pass), VPN appliances/server (to handle incoming VPN traffic), encryption/tunneling protocols to enable secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the benfits of a VPN.

A

Companies can take advantage of the of the Internet to provide secure connections.
Employees can work as if they were directly connected to the company’s network.
Extends connections across numerous geographic sites.
Improves productivity of remote employees.
Improves security.
Reduces travel times and traveling costs for remote workers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how the use of a VPN has changed traditional working patterns.

A

Use of a VPN allows employees to work remotely from any geographic location. Enables employes to work from home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the term protocol.

A

International rules that ensure the transfer of data between systems. A protocol that is recognized as the standard for a specific type of transfer is called standard protocol. For example: TCP/IP is a standard protocol

17
Q

Define the term data packet.

A

Portion of a message that is transmitted through a network. Contains data such as check digits and destination address.

18
Q

Explain why protocols are necessary.

A

Protocols can provide the following:

Data integrity: assurance that information has not been changed or corrupted during transmission.

Flow control: controlling the data flow rate to prevent the limited memory and bandwidth of networks from becoming overloaded.

Congestion: congestion happens when the request on the network resources exceeds the offered capacity. Protocols can help network devices manage this.

Error checking: the ability to check whether an error has occurred.

19
Q

Explain why the speed of transmission can vary across a network.

A

Example factors that can affect the speed in the network:
1. Bandwidth of the network
2. Number of connected devices
3. Number of users and user demand at a particular time (traffic)
4. Packet loss and retransmission
5. Type of transmission media
6. Speed, technology and capacity of the network server

20
Q

Define the term data compression.

A

The reduction of file size by encoding data using fewer bits.

21
Q

Explain why compression of data is often necessary when transmitting data across a network.

A

Networks have limited bandwidth to transmit data. Compressing data reduces the amount of bits needed to represent the data meaning the time taken for it send over a network is reduced.

22
Q

Outline the characteristics of different transmission media including speed; reliability; cost; security.

A

Metal conductor: cheap, middling bandwidth, reliable, very secure.

Fiber optic: very expensive, very high bandwidth, very reliable, extremely secure

Wireless: relatively cheap, high bandwidth (but lower than wired cables), low reliability (can be affected by factors like weather conditions, distance, topography), less secure.

23
Q

Explain how data is transmitted by packet switching.

A

Data is organized in specially formatted units (data packets);
Each data packet contains: data, address of the sender, address of the receiver, size of packet, sequence number, control codes, etc.; which are routed from source to destination using network switches and routers;
network switches and routers determine how best to transfer the packet between a number of intermediate devices (routers and switches) on the path to its destination (rather than flowing directly over a single wire on the path to its destination);
data packets are reassembled at destination;

24
Q

Outline advantages and disadvantages of a wireless network.

A

Advantages: don’t have to install cables which can often be expensive, is easy to set up a temporary link, costs less to set up a wirless network, easier to plan a wireless network, a lot of public access points exist, flexibility/convenience, is the only way to connect some devices (smartphones).

Disadvantages: gives relatively low speeds, gives high error rates, is affected by weather, offers weakest protection, security, privacy, less reliable, some old devices don’t have wireless capability

25
Q

Describe the hardware and software components of a wirless network

A

Hardware:
Modem: converts data between a digital format and analog format for transmission.
Wirless router: allows data transfer between a device and a network
A computing device that can connect to the network (PC, laptop, smartphone)
Wirless antennas: utilized by access points and routers to increase the communication area of the wireless network
Wirless repeaters: connects to a router or access point; receives an existing signal from a wireless router or acess point and rebroadcasts it.

Software:
DHCP (Dynamic Host Configuration Protocol): allows a server to automatically assign an IP address to a client device that connects to the network.
Software firewall: network security system that determines which data comes in and goes out of a network/PC
NIC drivers: A network interface card driver is a a device driver for the NIC card which translates between the applications/OS and the wirless network card.
Wirless Application Protocol: a specifies a set of protocols for assessing information over a mobile wirless network.
Web browser: an application used to find, retrieve, and display information on the World Wide Web

26
Q

Describe and explain the characteristics of WiMAX (Worldwide Interopability for Microwave Access) networks.

A

A 4G wirless network intended to provide 30 to 40 mbps data rates. Serves long range networking, provides mobile broadband connectivity spanning kilometers. Allows connectivity in even remote locations.

27
Q

Describe and explain the characteristics of 3G mobile networks

A

Widely used in wirless telephony, GPS and location based services, mobile internet access, video calls, mobile TV. Can provide a data rate of 200kbit/s. Long range.

28
Q

Describe and explain the characteristics of WiFi mobile networks.

A

A short range wirless network, offers high-bandwidth, designed for data transfer.

29
Q

Distinguish between symmetric key encryption and public-key encryption.

A

Symmetric encryption: the same key is used for encryption and decryption, so this key can not be shared over an untrusted channel.

Public-key encryption: uses a separate public key for encryption and a private key for decryption. Used on the Internet. Transport Layer Security (TLS) and Secure Socket Layer (SSL) are encryption protocols used for web communication that are based on public key encryption.

30
Q

Outline different methods of network security.

A

Encryption;
Scrambles the contents of the network transmissions so that if they are intercepted they can’t be understood (without the decryption key);

User ID (and password);
Only allows authorized users to access the network;

Media Access Control (MAC) addresses;
Unique identification codes embedded in networkable equipment so that only authorized equipment may access the network;

Firewall;
Checks traffic coming into the network and leaving the network, and can block suspicious data;

31
Q

Evaluate the advantages and disadvantages of each method of wireless security.

A

WEP Wirless Security: works with legacy systems, but is outdated and unsecure.

WPA/WPA2 Wireless Security: strong encryption

MAC filtering: provides extra security, but the list of allowed MAC addresses can be discovered by sniffing wireless transmissions

Hardware firewall: prevents unauthorized persons from getting access to your network from the Internet, but can’t stop someone from getting in range of your WiFi network.