Unit 3 - Networks and Protocols Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the internet?

A

A worldwide collection of interconnected computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAN?

A

A Wide Area Network covers a large geographical area that connects LANs.
Infrastructure between the LANs is hired from telecommunication companies who own and manage it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the biggest example of a WAN?

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a LAN?

A

A Local Area Network covers a small geographical area on a single site.
All the hardware for the LAN is owned by the organisation using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are LANs wired with?

A

LANs are wired with transmission medias such as:
. UTP ( Unprotected Twisted Pair) cable
. Fibre Optic cables.
. Wireless using routers and Wi-Fi access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are WANs connected?

A

WANs are connected with transmission medias such as:
. Telephone lines
. Fibre Optic cables
. Satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an IP adress?

A

An Internet Protocol address is a unique string of numbers separated by full stops and is used to identify each computer using IP to communicate via a network.
It also also used to identify where data packets need to be sent and where they have come from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 different versions of IP addressing?

A

IPv4 (4.3 billion addresses only) and IPv6 (a lot)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a circuit switching network?

A

. Circuit switching lets you send digital messages across a network by setting up a physical path between the sender and receiver.
. This is done using wires or fibre optic cable and is set up prior to transmission of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is packet switching?

A

Packet switching is breaking data into packets (Each data packet would contain the same number of bytes.), sending them across the Internet to another computer, and then reassembling the data and error-checking it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens if there are any lost or corrupt packets?

A

The recipient’s computer would acknowledge what had happened and packets would automatically be resent after a set time interval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a router?

A

A router sends data between networks along the path that is least busy at that moment. It is required to connect a LAN to a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DNS?

A

A Domain Name System or server takes a domain name from the user such as ‘www.bbc.co.uk’ and translates it to an IP address and then directs it into the requested website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a URL?

A

. A Uniform Resource locator is used to specify the means of accessing a resource across a network and its location.
. The protocol and the domain name of the resource together form the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do IP Addresses sometimes change?

A

An IP address can be static or dynamic
. When a device is assigned a static IP address, the address does not change every time it connects to a network.
. Most devices use dynamic IP addresses, which are assigned by the network when they connect and change over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NIC?

A

A Network interface card is hardware that connects a computer to a
network.
It can be wired or wireless

17
Q

What is a MAC address?

A

. A MAC (Media Access Control) address is a unique identifier given to devices which communicate over a local area network (LAN)
. MAC addresses are static, they can never change
. It is assigned to an NIC
. Made up of hexadecimal.

18
Q

How many bytes are there in a MAC address?

A

6 Bytes (48 bits)

19
Q

What is a router?

A

A router sends data between networks. It is needed to connect a local area network to a wide area network.
It uses the IP address on a device to route traffic to other routers.
Sends data packets on their way in the best direction.

20
Q

What is a switch?

A

A switch sends data between computers on a local area network. It uses the MAC address in the NIC on a device to route traffic.
Reduces network traffic and increases speed.

21
Q

What is a hub?

A

A hub is a small device that allows wired devices to connect to a network.

22
Q

What are the 4 types of network connection devices?

A

. Hub
. Switches
. Wireless Access Point
. Routers

23
Q

What are the advantages of networking?

A

. Sharing resources such as printers save money
. You can access your files from any computer in the network.
. Data is easy to back up as it is stored centrally on the server.

24
Q

What are the disadvantages of networking?

A

. Purchasing the network hardware is expensive.
. Managing a large network is difficult.
. Viruses may be able to infiltrate the network and infect every computer.

25
Q

What are the two different ways a LAN can be set up?

A

. Star
. Mesh

26
Q

What are the advantages of a star network?

A

. Fast data transfer as there are fewer data collisions.
. If one cable fails, the other workstations are not affected.

27
Q

What are the disadvantages of a star network?

A

. Requires additional hardware such as the central switch
. If the central device fails, the whole network goes down.

28
Q

What are the advantages of a mesh network?

A

. No single point of failure, it is a self healing network
. Expansion and modification can be done without disrupting the network.
. Data can be transmitted from different devices simultaneously

29
Q

What are the disadvantages of a mesh network?

A

. Can involve unnecessary connections
. Expensive to install cabling if doing wired connections
. Network maintenance and administration is difficult.

30
Q

What is an ethernet?

A

. A standard for networking local area networks using protocols
. Frames are used to transmit data.
. Uses twisted pair and fibre optic cables.
. A switch is used to connect computers.

31
Q

What is a virtual network?

A

A virtual network is a network that can securely connect geographically unrelated computers via the internet.
. Requires no direct physical connection but allows file sharing and communication.

32
Q

How is wireless transmission used?

A

Commonly uses radio waves to communicate
Susceptible to interference from objects and other nearby electronic or radio devices.

33
Q

What is a WAP?

A

A Wireless Access Point is hardware that allows a Wi-Fi-enabled device to connect to a network.

34
Q

What are the risks of wireless networking?

A

Criminal activity - Could bypass the firewall and plant viruses
Bandwidth stealing - Using the network to download anything. It causes the network to be slow.
Confidentiality - If not encrypted, an intruder can gain access to confidential information.

35
Q

What is Bluetooth?

A

A method of exchanging data wirelessly over short distances – much shorter than Wi-Fi. Examples of typical Bluetooth use could be, headphones, car mobiles etc.

36
Q

What is encryption?

A

Encoding readable data (plain text) into unreadable data (ciphertext). Only the intended recipient can decode the data using a special key. Protects sensitive communications against hacking.

37
Q

What is the key in encryption?

A

A sequence of numbers used to encrypt or decrypt, often data using a mathematical formula.

38
Q

What is private key (symmetric encryption)?

A

A single key used to encrypt and decrypt the message. It must be given to the recipient to decrypt it. The Caesar shift was the earliest form of this.

39
Q

What is public key (asymmetric encryption)?

A

Two keys are used. One to encrypt and one to decrypt. This one is much more secure as it means you dont have to send or reveal your key.