Topic 3 - Networks Flashcards

1
Q

Client

A

Computer system or software that requests a service from a server connected to the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Server

A

A computer system or software that provides a service to other computer systems on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer network

A

Formed when 2 or more computers are linked together. Every computer on the network can send and receive data between themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 types of ways to connect computer systems on a network

A

Hub - Connection point for all devices on a single network

If data is sent on this, it gets sent to all devices connected to the ports of the hub which is inefficient

Switch - Similar to a hub, but can identify which device is connected to which port making it more efficient since data can be sent only to the computer that needs it

Router - Can connect multiple networks and acts as an intermediary between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet

A

This is a globally connected network that uses the TCP/IP protocol to transmit data. It hosts the webpages that make up the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISP

A

Internet Service Providers run and provide networks that provide internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IXP

A

Internet Exchanges. These connect all ISP and internet networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet

A

Unit of information that is suitable for travel through a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet switching and benefit

A

A file is grouped into packets of data. This file being transmitted through packet switching may be divided into multiple packets. Each packet can take different routes to the same destination based on network availability and guided by routers. Once all at the destination, they are reassembled together.

Packet switching is more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a packet composed of?

A

Header:
Contains source and destination addresses, packet number, number of packets and protocol information

Payload:
Data itself

Trailer:
Error checking information (e.g. checksum)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Router

A

This is used to manage traffic across networks. It controls the flow of data packets by checking its addresses and ensuring they are on the correct path to their destination. It also makes sure all transmission occurs securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LAN

A

Local Area Network. Covers a single building/less than 1km radius coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wide Area Network and 1 example.

A

Several LANs connected together using multiple routers and covers a radius of more than 1km. An example of this is the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VLAN and benefits

A

Virtual Local Area Network. This is when a physical LAN is split up into virtual networks using switches in a logical manner. This would make sense for example departments in a business.

They increase the overall security and performance of the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAN

A

Storage Area Network. This is a network of storage devices. Not accessible by LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WLAN

A

Wireless Local Area Network. This is essentially a LAN but devices are connected wirelessly by high-frequency data waves called Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2 pros and 2 cons of WLAN

A

Pros:
- No cables (reduced costs)
- Can move devices around

Cons:
- Security
- Obstructions like walls may slow down speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PAN

A

Personal Area Network. This connect devices in a user’s immediate area. This includes things life Wi-Fi hotspots and Bluetooth devices.

19
Q

Intranet

A

This is sort of like a private version of the internet. Intranet web pages are only accessible from computers on a particular network.

20
Q

Extranet

A

When an intranet system is accessible through an online portal.

21
Q

VPN process

A
  • From your VPN client, you send all your URL requests to a VPN server
  • The VPN server makes a request to that internet resource on your behalf and then returns the response to you via the VPN client
22
Q

2 special tech used in VPN

A
  • Connection with VPN server is secure thanks to encryption
  • The process of creating and maintaining an encrypted connection between the server and client is called tunneling
23
Q

What encryption tech is used in VPN?

A

SSL or TSL

24
Q

2 pros of VPN

A

Encryption:
Data is not able to be understood by attackers

Tunneling:
Data can be secured using protocols

25
Q

P2P

A

Peer to Peer networks. Allows two or more computer to share resources with each other without having a central point. Each computer acts as both a client and server.

26
Q

Protocol

A

A set of rules for data transmission

27
Q

TCP/IP

A

Rules for transmitting data on the internet

28
Q

HTTPS

A

Rules for securely transmitting data between a web browser and a webpage’s server.

29
Q

SFTP

A

Rules for securely transferring files from client to server

30
Q

2 examples of roles of protocols

A

Maintain data integrity
Prevent deadlock (when 2 packets collide and block each other)

31
Q

OSI Model at least 3 layers and an outline of each

A

Physical - Layer 1:
Physical structure and medium used to transfer data. For example Fiber Optic network cables and hardware like hubs

Data Link - Layer 2:
Ensures that data sent over the physical layer is reliable and error free techniques like using framing and MAC addressing.

Network - Layer 3:
Manages data deliver to ensure that packets reach their destination.

32
Q

OSI

A

Open System Interconnection

33
Q

2 examples of types of wired transmission media

A

Ethernet, Fiber Optic

34
Q

2 examples of wireless transmission media

A

Radio Waves, Wireless/Wi-Fi

35
Q

Compare 3 points about WiFi and Ethernet

A

Wifi has slower data transfer speed than Ethernet

WiFi may suffer from signal interference due to environmental factors whilst Ethernet does not.

WiFi is easier to install and deploy while Ethernet’s cable infrastructure can be expensive and time-consuming to install

36
Q

3 things that affect transmission speed

A
  • Traffic
  • Environmental issues (like interference)
  • Quality of how the network’s infrastructure has been set up
37
Q

Lossy compression

A
  • Removes data to reduce file size
  • It is used when some data can be lost
38
Q

Lossless compression

A
  • Uses an algorithm that reorganizes and groups the data to reduce file size (e.g. image)
  • Used when no data can be lost (e.g. source code)
39
Q

1FA

A

1 FFA uses only knowledge factor (e.g. password) for authentication

40
Q

2FA

A

Uses knowledge factor (e.g password) and possession factor (smartphone) for authentication

41
Q

3FA

A

Uses knowledge factor, possession factor and inherence factor (e.g. face recognition) for authentication

42
Q

MAC address

A

A unique code that is used to identify devices on a network. It is comprised of a 12 digit hexadecimal code with the first 6 digits identifying the manufacturer info and the last 6 digits the unique serial number of the device.

43
Q

Firewall

A

Improves network security by controlling and filtering incoming and outgoing traffic of a network according to predetermined rules (blacklist and whitelist) using MAC addresses.