A2 (A2.1) Flashcards

Networks (43 cards)

1
Q

Computer network – definition

A

A collection of connected devices that communicate to exchange data and share resources such as files, printers, or internet connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAN (Personal Area Network)

A

Smallest network type used for personal devices (e.g., Bluetooth, phone tethering). Covers a few meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN (Local Area Network)

A

Connects devices within a limited area such as a building or school. High speed, low latency, privately managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WLAN (Wireless LAN)

A

A LAN that uses wireless communication (Wi‑Fi) instead of cables. Typically uses access points for connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAN (Metropolitan Area Network)

A

Covers a city or campus area; connects multiple LANs. Example: city‑wide fiber network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAN (Wide Area Network)

A

Covers large geographic areas and connects multiple LANs or MANs via routers and leased lines. Example: the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router – function

A

Connects multiple networks together, forwards packets based on IP addresses, and operates at OSI Layer 3 (Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Switch – function

A

Connects devices in the same LAN, forwards frames based on MAC addresses, and operates at OSI Layer 2 (Data Link).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hub – function

A

Simple device that broadcasts all incoming data to every port. Operates at OSI Layer 1 (Physical); inefficient due to collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access point – function

A

Provides wireless connectivity for client devices and bridges them to the wired LAN. Operates at Layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Server – function

A

A computer that provides resources or services (e.g., web, file, email) to clients over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Client – function

A

A device or program that requests services or resources from a server (e.g., web browser requesting a web page).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP (Transmission Control Protocol)

A

Ensures reliable, ordered, error‑checked delivery of data between devices. Connection‑oriented and used by HTTP, FTP, email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP (Internet Protocol)

A

Defines addressing and routing of packets between networks using IP addresses. Operates at OSI Layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP (Hypertext Transfer Protocol)

A

Protocol for transferring web pages. Operates at the application layer and uses TCP port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTPS (HTTP Secure)

A

HTTP encrypted with SSL/TLS for confidentiality, integrity, and authentication. Uses TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FTP (File Transfer Protocol)

A

Transfers files between client and server. Uses TCP ports 20/21. Reliable but not encrypted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS (Domain Name System)

A

Translates domain names (e.g., example.com) into IP addresses. Uses UDP/TCP port 53.

19
Q

SMTP (Simple Mail Transfer Protocol)

A

Sends emails from client to server or between mail servers. Uses TCP port 25.

20
Q

POP3 (Post Office Protocol v3)

A

Retrieves emails from a server and downloads them to a client. Uses TCP port 110.

21
Q

IMAP (Internet Message Access Protocol)

A

Retrieves and synchronizes emails between client and server. Keeps copies on the server. Uses TCP port 143.

22
Q

OSI layers

A
  1. Physical 2. Data link
  2. Network 4. Transport
  3. Session 6. Presentation
  4. Application
23
Q

OSI Model – overview

A

A conceptual model dividing network communication into seven layers. Each layer provides services to the layer above.

24
Q

Layer 1 – Physical

A

Transmits raw bits over a medium (cables, radio). Defines voltages, connectors, timing. Devices: hubs, cables.

25
Layer 2 – Data Link
Responsible for node‑to‑node data transfer, error detection, and framing. Devices: switches, NICs.
26
Layer 3 – Network
Handles logical addressing and routing between networks. Device: routers.
27
Layer 4 – Transport
Ensures reliable delivery and flow control. Protocols: TCP, UDP.
28
Layer 5 – Session
Manages sessions between applications (establish, maintain, terminate communication).
29
Layer 6 – Presentation
Formats and encrypts/decrypts data (syntax and compression). Example: SSL/TLS.
30
Layer 7 – Application
Interfaces directly with user applications. Examples: HTTP, FTP, DNS, SMTP.
31
IPv4 – key traits
32‑bit addressing (~4.3 billion addresses). Example: 192.168.0.1. Limited address space.
32
IPv6 – key traits
128‑bit addressing (vast space). Example: 2001:0db8::1. Includes improved security and auto‑configuration.
33
IPv4 vs IPv6 – comparison
IPv4: 32‑bit, dotted decimal, manual config or DHCP. IPv6: 128‑bit, hexadecimal, auto‑config, supports IPsec natively.
34
Bus topology
All devices share a single communication line. Simple but collisions and single cable failure can stop the network.
35
Star topology
All devices connect to a central device (switch/hub). Easy to manage but central device is single point of failure.
36
Ring topology
Devices connected in a closed loop. Data travels one direction. Failure of one node can affect the network unless dual ring used.
37
Mesh topology
Each device connected to many others. Very reliable but costly and complex to set up.
38
Hybrid topology
Combination of different topologies (e.g., star + bus). Flexible but more complex and expensive.
39
Encryption – purpose
Converts data into unreadable form to ensure confidentiality and integrity during transmission or storage.
40
Firewall – function
Filters network traffic according to security rules to block unauthorized access and protect internal networks.
41
Strong passwords – importance
Protect user accounts and systems from brute‑force or guessing attacks. Should combine length, complexity, and uniqueness.
42
Backups – role in network security
Copies of important data stored separately to recover information after data loss, failure, or attack.
43
Antivirus – function
Software that detects, prevents, and removes malicious software (viruses, trojans, worms). Should be updated regularly.