Wired and Wireless Networks Flashcards

(72 cards)

1
Q

What does IP stand for

A

Internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain name

A

A domain name is the name of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does DNS stand for

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Searching for a website

A
  • The request is sent to a DNS server
  • The DNS server has a database of domain names and the corresponding IP addresses
  • If the local DNS server doesn’t have the domain name, then the request is forwarded to a bigger server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of the DNS

A
  • Humans don’t have to remember long sequences of numbers
  • If an IP address changes, the DNS server can update the server, and the domain name can remain the same
  • Having many distributed servers means everyone has access to all addresses from their local DNS server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC address

A

An address given to each NIC; it takes up 48 bits, although is written as 12 hex digits to make it easier for humans to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does WAN stand for

A

Wide-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a wide-area network

A

A collection of LANs joined together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does LAN stand for

A

Local-area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a local-area network

A

A collection of computers joined together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Circuit switching

A

A dedicated connection is set up between two computers/landlines(fine for telephone calls, but not for the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet switching

A

Packets are sent to their destination along different routes, and reassembled in the correct order at the end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Contents of a packet header

A

IP address of where its going, IP address of where it came from, sequence number of the packet, number of packets in the whole communication, error checking data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantages of using a network

A
  • Folders and files can be easily accessed by authorised users
  • peripheral devices such as printers and scanners can be shared
  • internet connection can be shared, and any user can use email
  • user profiles and security can be managed centrally
  • software can be distributed across the network
  • all files can be centrally backed up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disadvantages of using a network

A
  • Managing a large network is complicated

- Viruses can rapidly spread to every computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Different network topologies

A

Star, Bus, Ring, Mesh(full/partial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Star network

A

All computers are connected via a switch, hub or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Advantages of a star network

A
  • If one cable fails, other workstations are not affected

- Performance is consistent, even when the network is heavily used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disadvantages of a star network

A
  • Lots of cabling(expensive)

- If the server or central switch fails, then the whole network goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantages of a wireless mesh network

A
  • Few cables
  • More nodes make the network faster
  • New nodes are automatically incorporated into the network without needing a network administrator
  • The network can easily find alternative routes for messages
  • Local networks run faster because packets don’t have to travel to a central switch or server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hardware required to create a network

A

Router, switch and NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Router

A

Designed to route data packets across wide-area networks such as the internet. Each router acts as a node, and packets are passed from router to router to their destination. If a packet is destined for a computer in a LAN, it will typically be routed to a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Switch

A

A component of a LAN that knows the MAC address of individual computers locally connected to it. It forwards inbound packets to the intended recipient, using its MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

NIC

A

A Network interface Card is required to connect a device to a network. It is a physical component which can operate either wireless or wired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Ethernet
A series of networking rules widely used in LANs, it prevents two devices from transmitting at the same time, if two devices transmit at the same time, they both wait a random period before reattempting
26
Virtual networks
Virtual networks are subsets of computers which create a larger physical networks
27
What does wi-fi stand for
Wireless fidelity
28
What is wireless fidelity
A series of protocols that allow for wireless networking
29
What does WAP stand for
Wireless access point
30
Wireless Access Point
Receives data from a network via a physical connection, then converts the data into radio waves, which are then transmitted
31
Risks of wireless networking
- Intruders may be able to bypass any firewall between the network and the broadband connection - Bandwidth stealing - If information is not encrypted, an intruder may be able to gain confidential information
32
Methods of wireless security
- Disabling broadcasting of the Service Set Identifier (SSID) can hide the network - Restricting access to only certain MAC addresses - Using WPA (wi-fi protected access) encryption can prevent signals and data being read by outsiders
33
Wifi frequencies
2.4 GHz and 5 GHz
34
Advantages of using 2.4 GHz frequency
Greater range and coverage
35
Disadvantages of using 2.4 GHz frequency
More interference from other devices, and less non-overlapping channels
36
Advantages of using 5 GHz frequency
More (23) non-overlapping channels and higher data transmission rates
37
Disadvantages of using 5 GHz frequency
Fewer devices can use the frequency, and it is less able to penetrate through walls
38
Plaintext
The original message before encryption
39
Ciphertext
The encrypted message
40
Encryption
The process of converting plaintext into ciphertext
41
Key
A series of numbers used to encrypt or decrypt
42
Encryption algorithm
The method for encrypting the plaintext
43
Client-server networks
The server is a powerful computer which provides services or resources requested by a client computer
44
Peer-to-peer networks
Computers are connected together, and configured to share information between each other. All of the computers have equal status and the same role in the network
45
Internet host
A company that is able to store your files and make them available to you or others from other internet-connected computers
46
Web host
A company which makes a website accessible on the world wide web via a DNS
47
Factors affecting network performance
Bandwidth and latency
48
Bandwidth
The rate at which data is transferred(Mbps)
49
Latency
The time delay between the moment of transmission and arrival of a single packet
50
Protocol
A set of rules which define how devices communicate
51
Protocols specify:
- Format of data packets - Addressing system - Transmission speed - Error-checking procedures being used
52
What does TCP stand for
Transmission Control Protocol
53
TCP
A standard that defines how messages are broken up into packets and reassembled at the destination. It also detects errors and resends lost packets.
54
IP
Identifies the location of a device on the internet, and routes individual packets from source to destination via routers
55
HTTP
Used for accessing and receiving web pages in the form of HTML files. The protocol requests the web server to transmit the requested web page to the user's browser for viewing
56
HTTPS
Encrypts the information
57
FTP
Standard network protocol for transferring computer files between a client and a server on a network. Based on a client-server model and uses separate control and data connections between the client and the server.
58
What does POP stand for
Post Office Protocol
59
POP
Receives and holds emails for an individual. When the email is accessed, the mail will be downloaded, and the original on the server will be deleted
60
What does IMAP stand for
Internet Messaging Access Protocol
61
IMAP
An email protocol that stores email messages on a server but allows users to view and manipulate the messages as though they were stored locally on their own computers
62
What does SMTP stand for
Simple Mail Transfer Protocol
63
SMTP
A protocol for sending e-mail messages between servers
64
Number of layers
7
65
Layer 7
Application layer - provides services for applications to use (HTTP, FTP, SMTP, DNS)
66
Layer 6
Presentation layer - formats and encrypts data for sending across the network (SSL, MIME)
67
Layer 5
Session Layer - manages connections between applications, sockets (SQL, RTP, TP)
68
Layer 4
Transport layer - checks data is accurate and asks for re-transmission, ports (TCP, UDP)
69
Layer 3
Network layer - packets, sequencing and routing (IP)
70
Layer 2
Data link layer - deals with frames containing the MAC addresses with data inside, used in switches and bridges (ethernet, PPP, Wi-fi)
71
Layer 1
Physical layer - physical cables, signals and hubs (Ethernet, RJ45)
72
Ethernet systems...
divide data into frames (similar to internet packets), each frame contains source and destination MAC addresses, and error checking data