Networks Flashcards

(53 cards)

1
Q

What is a bus topology

A

A type if topology where a long cable, called the backbone, connects all the computers together

It has terminators at the end that stop the charges from bouncing back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a star topology

A

Start topology is a type of topoly where there is a central switch or hub and all other devices are connected to that switch using its own cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is data transmitted in bus topology

A

The data is sent from one computer along the backbone cable and the data packets are then sent to every single computer/device

The devices then read the MAC address of the recipient and the device with that MAC address opens the files

The devices where the MAC address does not match just discard the data and don’t open it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is data transmitted in the star topology

A

The data is sent from the sending device down its cable to the switch/hub

The switch/hub reads the mac adress of the recipient and then sends the data along the cable to the device that matches the mac adress of where is was addressed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is star topoly so expressive

A

High cabling costs as each device needs its own cables to connect it to the switch/hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of start topologies

A

If one cable fails only one workstation is affected rather than the whole network

Consistent performance as few collisions as each workstation has its own cable to the server

More secure as messages from the computer go directly to the centre and then only o the recipient

Easy to add more devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disadvantages of star topology

A

Installation usually requires an expert to set it up

Dependence on the central computer as if it fails the whole network goes down

Very high cabling costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of bus topology

A

Easy to install

Uses less cables than a start topology meaning its cheaper

Can easlily add new computers/work stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages of bus topology

A

Performance slows down as the amount of traffic increases

Low security as every workstation can see them data on the network

Can be costly to install dye to having to move existing thing as for cable

If main cable fails then the whole network goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local area network
Covers a small geographic area located on a single site
Can be wired or wireless
Usually high-speed because the network is confined to a small area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PAN

A

Personal area network
Connect devices over a very short range
Normally centred around a single user
Example is Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

Wide area network
WAN connects LANs that are in different geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benefits of networks

A

Sharing files is easier as network users can access the same files and work on them at the same tune

Can share multiple hardwares such as printers between multiple devices

Can communicate across a network cheaply and easily

User accounts can be stored centrally so users can log in from any device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of networks

A

They can be expensive to sera up as they often need extra hardware

Can be vulnerable to hacking and malware can easily be spread between networked computers

Some networks are dependant on servers, and if a server goes down it can be very disruptive for people tryin to use the network

Large networks are difficult to manage and need specialised management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a NIC

A

Network interface card

A piece of hardware un a device that allows it to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switch

A

Switches are devices that connect devices on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Routers

A

read the IP address of each packet at the Internet layer to decide the best path for it to travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Whag is bandwidth

A

The amount of data that can be sent across a network in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe Fibre optics

A

They are cables that transmit data as light

High performance and very expensive

Don’t suffer interference and can transmit over very large distances

They have a very high bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Descibe CAT 5E and CAT 6 cables

A

Ethernet cables

Contain pairs of copper wires which are twisted toghere to reduce internal interference

They are cheaper than fibre optic cable and have an alright bandwidth

They are commonly used in homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Descibe coaxial cables

A

Made up of a single copper wires surrounded by plastic layer for insulation and metallic mesh to prevent shielding from outside interference

They are very cheap, but have a low bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WLANs

A

Local wireless networks

Eg Wi-Fi

23
Q

How to set up WLAN

A

You need a WAP device

24
Q

What does a WAP do

A

A switch that allows devices to connect to the network wirelessly

25
Hotspots v WAP
Hotspots are locations where you can connect to a WAP
26
Benefits kf wireless networks
- are convenient as you can get your device to connect automatically to the network and you can also move around while connected - they are cheaper and better for the environment as you don’t need a lot of wires - it’s very easy to add more users, you don’t need to add extra wires
27
Disadvantages of wireless networks
- genrally less secure than wired networks as access points are usually visible to all devices, not just trusted ones which can cause hackers to gain access - distance from the WAP, interference from other wireless networks and physical blocks like walls can all reduce signal length (there’s a limit on how far a wireless metwork can reach) - they havw a lower bandwidth and are generally less reliable
28
What is a network protocol
A set of rules for how devices communicate and how data is transmitted
29
What are packets
Data sent between networks that has been split equally
30
What is a layer
A group of protocols that have similar functions
31
Why are the 4 layers (in order)
Application layer Transport layer Internet layer Link layer
32
What does the application layer do
Where network applications such as web browsers or email applications operate
33
Transport layer protocol
Sets up communication between sender and recipient (establishes a connection). Splits data into packets so large messages can be sent over the network. Checks all packets are delivered (reliable delivery). Requests retransmission if any packet is lost or corrupted. Reassembles the packets into the original message for the application layer. This is the TCP protocol we learnt about
34
What does the internet layer do
Adding IP addresses to data packets directing them between devices handling traffic
35
Link layer used for
Passing data over the physical network Responsible for how the data is sent as electrical signal over cables, wireless and other hardware Interpreting signals using device drivers
36
Eg of application layer protocol
HTTP(S) FTP IMAP SMTP
37
eg of transport layer
TCP UDP
38
Eg Of internet layer
IP
39
eg of link layer
Wi-Fi Ethernet
40
What are the advantages of using layers?
It breaks down network communication into manageable pieces, This helps developers concentrate on only one area of the network without having to worry about the others There is a self contained meaning they can be changed without the other layers being affected Having several rules for each layer of forces companies to make compatible universal hardware and software so different brands will work with each other and always work in the same way
41
What is HTTP?
It stands for hyper text transfer protocol It’s used by browsers to access websites and communicate with web servers
42
What is HTTPS?
HTTP secure A more secure version of HTTP as it encrypted all the information that is sent and received between your device and the web server
43
What is FTP?
File transfer protocol It’s used to edits and move files between devices on a network Operates on application layer
44
What is IMAP
Internet message access protocol Used to retrieve emails from the server
45
What is SMTP?
Simple meal transfer protocol Used to send emails and to transfer emails between servers
46
Which layer do the five main protocols work on?
The application layer
47
What does transport layer do
Setting up communication between sender and recipient. Breaking down large messages into smaller units (packets) so they can be sent across the network. Ensuring all packets are delivered to the recipient. Reassembling the packets into the original message for the application layer.
48
What is IP
IP stands for Internet Protocol. It is responsible for addressing and routing packets across a network. Ensures packets reach the correct device on the network. Works with TCP to deliver data reliably.
49
Main 5 protocols on application layer
HTTP/HTTPS IMAP SMTP FTP
50
MAC address filtering
MAC address filtering is a network security method that controls which devices can connect to a network by using their unique physical (MAC) address. It involves creating a safelist (or whitelist) of allowed MAC addresses or a blocklist of disallowed ones, with the safelist being the more secure method
51
Firewall
The firewall inspects and controls incoming network traffic to determine which traffic should be rejected or accepted depending on a set of rules set by a government, an organization, or an individual.
52
How can MAC address filtering be triscked
MAC address spoofing
53
Encryption
Scrambling messages or data sung s specific cypher or key to make fhe data unreadable Symmetric encryption = same key used to encrypt and decrypt Asymmetric encryption = public key to encrypt and secret key to decrypt