Unit 5 - Networking Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what is a router

A

a router allows us to forward data packets across the network using the same protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a server

A

a server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a switch

A

it receives data packets, inspects the packet for who the intended recipient is and then sends it onto the correct client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a hub

A

it receives a data packet and then sends it to the all the clients in the network, who then have to determine if it’s for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a wap

A

wireless access point - a device that creates a wireless LAN and usually connects to a router for internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a NIC

A

network interface card - adds an additional communication port on a device to allow it be connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a bridge

A

connects two networks that use the same protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a gateway

A

routes data packets across two dissimilar networks (different protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a modem

A

modulated demodulator - converts a digital signal to an analogue one so it can send data down a telephone line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define WAN

A

wide area network - over a geographically dispersed area and uses third-party infrastructure, such as an internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define world wide web

A

a collection of resources that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define internet

A

a collection of inter-connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define an FTP client

A

when you can send something across the internet without using the WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the structure of the internet

A
  • backbone - a set of dedicated connections that connect several large networks at various points on the globe
  • each of these points are then connected to other regional networks
  • an ISP provides individual access to end-users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is an internet address and what is it made out of

A
  • each device on a network needs to be uniquely identifies so that data can be sent to the correct destination
    combines:
  • MAC address - assigned to a device through the NIC
  • IP address - identifies the router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

format of IPv4

A

4 octets = xxx.xxx.xxx.xxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

format of IPv6

A

6 octets = xxx.xxx.xxx.xxx.xxx.xxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a url

A

uniform resource locator - full address of an internet resource. it specifies the means of accessing a resource across a network and its location
combines:
- protocol
- domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a DNS

A

domain name system - dedicated computers with an index of domain names and their corresponding IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how does a DNS work/ what is its structure

A

when a computer queries a DNS server of a domain name, the server returns an IP address that the computer can use to send a message. when the IP address of a given domain is not known it is referred to a related domain server that they may know
structure:
- 13 root DNS servers
- segmented into geographical levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how to resolve an IP address

A

suppose that a client has no cached record of an IP address:
- if the DNS server does not have a record for that domain it:
1. either recursively handles the request so that it can eventually deliver an IP address
2. or refers to the DNS server authoritative and follows this, and subsequent referrals, to successively lower-level DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a proxy server

A

acts on your behalf, protects the details of your client server from the outside world when doing tasks such as sending requests on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is an SAN

A

storage area network - secondary storage devices connected in a raid formation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a PAN

A

personal area network - within a few meters, generally connected via Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is a metro network

A

network in a metropolitan area, ring around the city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is a trunk network

A

connects countries and cities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is a LAN

A

local area network - over a geographically concentrated area and uses first party infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is a network topology

A

the arrangement of various computing devices which make up a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

structure of a bus topology

A

an arrangement where nodes are connected in a daisy chain by a single central communication channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

operation of a bus topology

A
  • all nodes connected via a single backbone
  • each end of the backbone is connected to either a terminator or a computer which stops signals ‘bouncing back’
  • each node is passive
  • data is sent in one direction at a time only
  • only one computer can transmit successfully at one time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

advantages of a bus topology

A
  • inexpensive to set up
  • devices can be easily added
  • good for small networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

disadvantages of a bus topology

A
  • main cable is a point of failure
  • limited cable length
  • performance degrades with heavy use, leading to data collisions
  • poor security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is a star topology

A

an arragement where a central node, switch or hub provides a common connection point for all other nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

operation of a star topology

A

the central switch keeps a record on the unique MAC address of each device on the network and can identify which particular computer on the network it should send the data to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is a physical topology

A

a network defines how the devices are physically connected, uses hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is a logical topology

A

how the devices communicate across the physical topologies, uses software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

define circuit switching

A

a direct end-to-end connection between two devices which means that only those two devices with that connection can communicate data any given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what is a data packet and how are they used

A
  • data is broken into chunks (units) called data packets and assembled again at the receiving end (increases network efficiency & reliability)
  • they are assigned a TTL (time to live), if a receipt for a data packet isn’t received by the sender before the TTL runs out, the data packet is sent again
  • the delay between sending and receiving data packets is called latency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what is packet switching

A

packets are often sent across networks that have multiple connections with multiple routes through a destination – these networks are also often shared. each packet takes the fastest available route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is routing packets and how does it work

A

routers forward data packets from one network to another:
- each router stores data about the available routes to the destination node
- looks up the destination IP address in its routing table to find the best router to forward the packet to
- each transfer between routers is known as a hop
- routers continue to forward the packet until it reaches its destination node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

how are packets made

A

TRAILER – end of packet flag, error checking components, checksum or cyclical redundancy checks (CRCs)
payload – data
HEADER – sender’s IP address, recipient’s IP address, protocol, packet number x of y, TTL or hop limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

describe the reason for small packet size

A

to ensure that individual packets do not take excessive time to transfer preventing other packets from moving.

  • however, they should, not be too small as the additional data added makes data transfer inefficient as unnecessary headers and trailer would be required each time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

define protocol

A

a set of rules, or formal description, of the format of digital transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

steps to error check a barcode/packet

A
  • write out the barcode and ignore the last number(check digit)
  • from the right hand side add up the total of every alternate digit
  • multiply that total by three
  • from the right hand side add up the alternate numbers that have not been used
  • add both of the totals together
  • work out how much should be added on to reach the nearest ten – this should be the check digit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what does a protocol cover

A
  • size of packets
  • contents & format of header
  • error detection & correction procedure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

why are gateways needed

A

required where data is travelling from one network to another that uses different protocols
- networks using different transmission media
- header data is removed and re-applied using the correct format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

what is the TCP/IP protocol stack

A

a set of rules used in turn, to format a message so it can be sent over a network. each layer wraps the packets with its own header data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is the order of layers for a packet being sent in the tcp/ip protocol stack

A

application
transport
internet
link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what is the order of layers for a packet being received in the tcp/ip protocol stack

A

link
internet
transport
application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

what happens in the application layer when sending a packet

A
  • uses high-level protocols that set up an agreed standard between the communicating end-point
    e.g. = SMTP, FTP, HTTP
  • does not determine how the data is transmitted, rather specifies the rules of what should be sent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

what does the transport layer do when sending a packet

A
  • uses TCP (transmission control protocol) to establish an end-to-end connection with the recipient user
  • splits data into packets & numbers them sequentially
  • adds port number to be used based on HTTP protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what does the internet layer do when sending a packet

A
  • uses the IP (internet protocol) to address packets with the source and destination addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

what does the link layer do when sending a packet

A
  • operates across a physical connection
  • adds the MAC address of the physical NIC that packets should be sent to based in the IP address
  • MAC addresses change with each hop
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

what does the link layer do when receiving data

A

removes MAC and passes to the internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

what does the internet layer do when receiving data

A

removes IP and passes to transport layer

55
Q

what does the transport layer do when receiving data

A

removes the port number from each packet, reassembles the packets in the correct order and passes to the application layer

56
Q

what does the application layer do when receiving data

A

presents the image data for the user in a browser

57
Q

what is a MAC address

A

media access control - uniquely identifies a physical device with a NIC
- this may be the destination computer or router in transit
- packets move up and down the lower layers of the stack as they hop across routers, changing their source and destination MAC addresses as they go

58
Q

what is a port number and what is it used for

A
  • a port is used to alert a specific application to deal with data sent to a computer
  • used by protocols to specify what data is being sent
59
Q

what is FTP and what is it used for

A

file transfer protocol - uses the client-server model with separate data and control channels. access can be provided anonymously where any user can access the FTP site

60
Q

what is SMTP and what is it used for

A

simple mail transfer protocol - used to send emails and forward them between mail servers to find their destination

61
Q

what is POP3 and what is it used for

A

downloads the email stored on a remote server to a local client (removed after download)

62
Q

what is IMAP and what is it used for

A

Manages emails on a server so multiple clients can access the same email account in synchronicity

63
Q

what is a firewall

A

either software or hardware that controls access to and from a network. numbered doors called ports are opened so that only certain traffic is allowed to pass through.

64
Q

how are firewalls used

A

PACKET FILTERING:
- packets of data are inspected by the firewall to check which port they are attempting to access. different network protocols use different port numbers. if this traffic is allowed through, the port must be opened for the duration of connection, otherwise the firewall will automatically reject it.

65
Q

what is a proxy server used for

A

makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient.

66
Q

what are some functions of a proxy server

A
  • enables anonymous surfing
  • can be used to filter undesirable online content
  • logs user data with their requests
  • provides a cache of previously visited sites to speed across
67
Q

what is the main difference between a VPN and a proxy server

A

VPN - encrypts messages (proxy does not)

68
Q

what is encryption

A

the act of encoding a plaintext message so that it cannot be deciphered unless you have a numerical key to decrypt.

69
Q

why is encryption used

A
  • if the message is intercepted it cannot be understand
  • if the key can be intercepted, the encryption is rendered useless.
70
Q

why does code quality increase network security

A

improving code quality, together with monitoring attempts to gain unauthorised access and protection can significantly reduce threats from malware.
Include:
- guarding against buffer overflow attacks
- guarding against SQL injection attack
- use of strong passwords for login credentials
- two-factor authentication
- use of access rights

71
Q

why does monitoring increase network security

A

can protect against the threat of hacking, which can introduce malware. these can be used to protect against the threat of malware and hacking, in particular, packet sniffing and user access logs.

72
Q

why does prevention increase network security

A
  • up-to-date patches to the operating system and application programs reduce vulnerabilities in the system
  • up-to-date anti-malware (“anti-virus”) software can prevent the spread of infection
73
Q

define malware

A

annoys users or damages their data

74
Q

what is a virus

A

a virus infects (embeds itself in) other programs or data files, a virus needs a user (a host) to help it spread.

75
Q

what is a worm and what does it do

A

a standalone program that does not require a user to run it in order for it to spread (self-replicates). worms exploit vulnerabilities in the destination system and spreads automatically.
- generally, slow the system down.

76
Q

what is a trojan and what does it do

A

malicious software programs that masquerade as innocuous or useful applications.
- they cannot self –replicate
- often they serve to open up back doors in your computer to the Internet so that the processing power, Internet bandwidth and data can be exploited remotely.

77
Q

what is phishing and how is it used

A

SOCIAL ENGINEERING
- phishing is using email to manipulate a victim into visiting a fake website and giving away personal information.

78
Q

what is a buffer overflow and how does it work

A

when a program accidentally writes data to a location too small to handle it. as a result the overflowed data may end up in a neighbouring instruction space. malware can deliberately cause and manipulate overflow data which may then be read as a malicious instruction.

79
Q

what is an sql injection and how does it work

A

ONLY IN WEB FORMS
- a malicious user can enter SQL commands via online database forms to change the processing.

80
Q

define html

A

hypertext markup language - language/script web pages are written in. describes the content and structure of a web page
- used with css

81
Q

what is the difference between html and css

A

html - defines page content and structure
CSS - defines page style and appearance

82
Q

what are the sections of a webpage

A
  • head = page metadata
  • body = page content
83
Q

what does the <title> tag define</title>

A

tab heading

84
Q

what does the <p> tag define

A
  • define new blocks of content
  • new line for new content within them
85
Q

how to define a list in html

A

<ol> = numberd list
<ul> = bullet points
<li> = new line in list
</li></ul></ol>

86
Q

what does an <a> tag define</a>

A

anchor tag - defining a hyperlink with location parameter

87
Q

what does an <img></img> tag define

A

self closing image tag

88
Q

what does the <div> tag define

A

division of the page into seperate areas, which can be styled differently using CSS

89
Q

what does css stand for

A

cascading syle sheet

90
Q

how can css be inserted into a HTML doc

A
  1. internal or embedded css between tags <style> in the head section</style>
  2. external style sheet with <link></link> tags
91
Q

what does a css identifier do

A
  • defined with #
  • unique to every webpage
  • you can hang styles
92
Q

what does a css class do

A
  • use . as prefix
  • can be used multiple times on a webpage
  • hang styles
93
Q

what are web forms

A
  • enable websites to collect user input data and selections
  • can be validated using javascript
  • use HTML <form> tags
94
Q

example of how a web form could be written

A

<form action=”…” method=”post” enctype=”text/plain”
Name: <input></input><br></br><br></br>
Message: <textarea>
</textarea><br></br><br></br>
<input type = “submit” value = “submit”
</form>

95
Q

what is javascript

A
  • programming language similar to python & VB
  • adds interactivity to websites
  • interpreted = needs to be translated into object code for whichever computer there browser is running on
96
Q

why is javascript used for validation of inputs

A
  • local computer can validate erroneous data before submission to a database
  • a busy server is relieved from having to process everything itself
97
Q

name some features of javascript

A
  • drawing and animations
  • manipulation of HTML elements such as text and images
  • navigation tools such as tabs and accordions
  • web form validation before transmission
98
Q

what code structures does javascript use

A
  • variables
  • functions
  • conditionals
  • loops
  • arrays
99
Q

advantages of an external js script file rather than direct embedding

A
  • code cleaner and easier to read
  • can be linked to multiple html files
  • changes to a single external file can affect multiple html files
100
Q

code to create a variable in javascript

A

var x = document.getElementById(“Box”)

101
Q

code for functions in javascript

A
<script>
function myFunction()     { 
   var x = … ; 
   x.style.fontSize = ...; 
   x.style.color = …; 
}
</script>
102
Q

calling functions in javascript

A

button action:
onclick = “myFunction()”

103
Q

code to ouput something in javascript

A
<script>
document.write("…")
</script>
104
Q

code for arrays in javascript

A

var arrayName = [“a”, “b”, “c”]

105
Q

what is a search engine

A

systems that locate resources on the world wide web

106
Q

what is search engine indexing

A
  • search engines keep a record of the resources located on the World Wide Web
  • known as an index
  • the process of creating an index includes using a piece of software called a web crawler or spiders
107
Q

what is a web crawler

A
  • internet bots that continuously crawl the web to discover and record publicly available web pages.
  • web crawlers look at web pages and follow the hyperlinks located on those pages
  • the web crawler then continues to follow the hyperlinks on the proceeding pages
  • it does for billions of web pages. the web crawler keeps a record known as the index.
108
Q

examples of information web crawlers sort their index by

A
  • the URL of the resource
  • the content of the resource
  • the last time the resource was updated
  • the quality of the resource
109
Q

what are meta tags

A

describe the content of the page. web developers can place meta tags inside HTML pages to make the page more likely to be found. hidden from users but discoverable by web crawlers.

110
Q

what happens when we search the web

A
  1. web crawler searches the web, locating resources
  2. resource data copied to the index
  3. index is searched for relevant content
  4. search results returned
111
Q

what is google’s page rank algorithm

A
  • algorithm takes into account inbound links to a website to determine how useful page is

PR(A) = (1-d) + d (PR(Ti)/C(Ti) + … + PR(Tn)/C(Tn))

112
Q

what does PR(A) stand for in the pagerank algorithm

A

the PageRank of page A – defined by the PageRank of page A is defined by the PageRanks of those pages linked to age

113
Q

what does PR(Ti) stand for in the pagerank algorithm

A

the PageRank of pages Ti which link to page A (start by assuming it is 1)

114
Q

what does d stand for in the pagerank algorithm

A

d is the damping factor (start by assuming that it is 0.85) - the probability of a random web browser reaching a page. OR (1-d) = the probability of r random web browser NOT reaching a page

115
Q

what does C(Ti) stand for in the pagerank algorithm

A

C(Ti) is the number of outbound links on page Ti

116
Q

factors taken in by search results ranking algorithms

A
  • domain name – relevance to search item
  • frequency of search term
  • age
  • frequency of page updates
  • magnitude – of content updates
  • keywords – in <h1> tags
117
Q

what does a higher page rank value mean

A

the more relevant the page, in theory, and therefore the higher the page will appear on search results

118
Q

what is the stucture of a client-server network

A

consits of two parts: client & server
1. client – accesses data, services and files from the server
- initiates communication to the server
2. server – waits for requests from clients

119
Q

features of a client-server network

A
  • a central server is used to manage security
  • some files are held on the central server
  • some processing tasks are performed by the server
  • clients issue requests to the server for services such as email, file storage, backup and priniting
  • suitable for many different types of organisations, small and large
  • can require specialist IT staff to administer the network
120
Q

features of a peer-to-peer network

A
  • they are suitable for a small company or home network with a few computers
  • no central server controls files or security
  • all computers can see files on all other computers
  • all computers can communicate with each other without going through a server
  • if a computer is switched off, data cannot be retrieved from it
121
Q

adv & dis of of client-server network

A

ADV:
- access levels centrally controlled
- backup is centralised and usually automated
- no access to other users’ files
- data and other resources can be shared

DIS:
- can be expensive to set up and manage
- IT staff needed

122
Q

adv & dis of peer-to-peer network

A

ADV:
- files and programs stored on individual computers
- suitable for home networks
- cheap to set up and maintain
- each computer on the network can act as client or server

DIS:
- piracy as files are decentralised

123
Q

what is client side processing

A
  • data is processed before it is sent to a server by the client
  • usually happens in the form of scripts and these are usually executed by the client browser
  • web page does not communicate with the server
  • javascript = client-side
124
Q

advantages of client-side processing

A
  • allows for more interactivity by immediate response
  • quick execution as no communication with the server is required
  • removes potentially unnecessary processing from the server
  • data cannot be intercepted on the way to the server
125
Q

disadvantages of client side processing

A
  • not all browsers support all scripts
  • dependent on the performance of the clients’ machine
  • different browsers process scripts in different ways - lack of certainty of end-product
126
Q

what is server side processing

A
  • process data on behalf of multiple clients
  • SQL and PHP
  • Python and ASP
127
Q

features and examples of client-side processing

A
  1. initial data validation
  2. procides web interactivity
  3. manipulates user interface elements
  4. applies styles - CSS
  5. reduces load on the server
  6. reduces the amount of web traffic
128
Q

features and examples of server side processing

A
  1. provides further validation
  2. used to query a database
  3. updates server databases
  4. performs complex calculations
  5. encodes data to readable HTML
  6. keeps organisational data secure
129
Q

what is an API

A

application programming interface - a set of tools that can be used for building software applications.
- requests are processed by the client and responded to by the relevant server.

130
Q

what does the ‘thickness’ of a client mean

A

the level of processing and storage that it does compared with the server it is connected to
- thinner = more processing and storage done by server

131
Q

adv of thin client

A
  1. easy to set up, maintain and add terminals to a network with little installation required locally
  2. software and updates can be installed on the server and automatically distributed to each client terminal
  3. more secure since data is all kept centrally in one place
132
Q

disadvantages of thin client

A
  1. reliant on the server, if the server goes down, the terminals lose functionality
  2. requires a very powerful and reliable server which is expensive
  3. server demand and bandwidth increase
  4. maintaining network connections for portable devices consumes more battery power than local data processing
133
Q

advantages of thick client

A
  • robust and reliable, providing greater up-time
  • can operate without a continuous connection to the server
  • generally better for running more powerful software applications
134
Q

disadvantages of thick client

A
  • more expensive, higher specification client computers required
  • installation of software required on each terminal separately and network administration time is increased
  • integrity issues with distributed data