Computer Science Topic 3 - Networks

studied byStudied by 11 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 70

flashcard set

Earn XP

71 Terms

1

LAN

(Local Area Network) A network inside one organization or one building traditionally made of wires and hubs connecting servers and clients. Typically in a business, connecting employees' PCs to the company's servers.

New cards
2

WAN

(Wide Area Network) A series of LAN or VLAN or WLAN that are connected. An example would be the internet.

New cards
3

VLAN

(Virtual Local Area Network) LANs that are connected make up the VLAN. Different buildings or departments within one building could all have their own network but then also have access to the networks in other departments. The VLAN connects them and lets this happen.

New cards
4

WLAN

(Wireless Local Area Network) Less secure, but more convenient, than the LAN. Wireless routers allow people physically close to the building to access the network, even if they're not part of the organization. This is the security threat. But WLAN does not require users to connect with cables, and they can use local wi-fi instead (however, this is slower than the ethernet cables).

New cards
5

SAN

(storage area network) A network containing large amounts of storage (HDD). Usually virtualized so users don't need to worry about the actual machines containing the storage devices - commonly "data centers". An example is the cloud.

New cards
6

VPN

(Virtual Private Network) Clients who are not in a LAN can connect to it. It can improve security of a LAN while still letting the clients have access to some information. They commonly obtain an IP address from a LAN by connecting to it, faking the client's location.

New cards
7

PAN

(Personal Area Network) Used to connect devices belonging to one user, or maybe a family. Typically running through a wireless router in a home.

New cards
8

P2P

(peer-to-peer) Each computer is a node in a network and the nodes share information with each other. This is more reliable because there is no central server, all computers on the network would have to be unavailable for the network to stop working. Resources are also made more available and allows for easy backup files.

New cards
9

Ethernet

A standard for LAN connections. This includes a communication protocol, as well as a standard type of connection card and standard cables.

New cards
10

OSI

(Open System Interconnection) By establishing STANDARD layers with specific responsibilities, it's possible to implement communication (networking) with interchangeable modules. The layers are:

  • Application: does various services for the applications used by the end-users.

  • Presentation: provides the data formatted information, data compressed information, and data encryption information to the application.

  • Session: manages the sessions between the two users.

  • Transport: encodes, packets, transmits, and decodes the information.

  • Network: Routes packers through an intermediary device.

  • Data link: error handling of physical transmission.

  • Physical: transmit bits of media between devices and defines the voltage levels and media specs.

New cards
11

Technologies Required for VPN

  • Two fundamental VPN technologies are encryption and tunneling. Tunneling is when you establish and maintain a logical network connection. On the network the information is encapsulated then de-encapsulated on the receiving side after being transmitted.

  • Basically they need: A LAN connected to the internet, a computer outside the LAN also on the internet, and a VPN client and server running on a lone machine and the original LAN.

New cards
12

Evaluation of use of VPNs

Provides mobility and security. People can work from home but still be secure. Overall good.

New cards
13

Protocol

A common, agreed-upon, computer language that all computers need to be able to understand, to allow for communication between systems.

New cards
14

Data Packet

Small groups of data that contain encoded data with information about the destination and sender. They can travel through networks wirelessly or through cables.

New cards
15

HTTP

(HyperText Transfer Protocol) Sends and receives webpages.

New cards
16

FTP

(File Transfer Protocol) Downloads, uploads, and transfers files

New cards
17

SMTP

(Simple Mail Transfer Protocol) Used by email servers to send emails from one to another

New cards
18

Data Integrity

The overall completeness, accuracy, and consistency of data.

New cards
19

Why are protocols needed?

Without them no information can be transmitted because computers won't know how to interpret the signals.

New cards
20

Flow control

what ensures that the rate at which a sender is sending is in proportion to the receiver's receiving capabilities. Needed so that a computer never overwhelms the other, and ensures it can keep up.

New cards
21

Deadlock

two nodes or processors are trying to access the same node at the same time, stopping both of them from proceeding. The protocol then requeues them so that traffic can properly flow.

New cards
22

Congestion control

congestion is when a node or link carries so much data that it deteriorates network service quality which causes delays, can lead to data packet loss, and can block new connections. Congestion control stops that.

New cards
23

Error checking

Techniques used to detect noise or other impairments that are introduced to data while it is transmitted. Error checking uses checksums.

New cards
24

Explain why the speed of data transmission across a network can vary

  • Connection speed averages: can differ. For dedicated LAN connections it can be anywhere from 10-150Mbps, it depends on cable or wireless (wifi). For broadband WAN connections it can be anywhere from 1-100Mbps. This includes 4G.

  • Traffic: the more network traffic the slower the data will transfer, and traffic can vary from time to time. **THIS ONE IS KEY

  • Time of day: as more people get on to download traffic increases.

  • Distance: the farther you are the longer it will take.

  • Infrastructure: if the infrastructure is up to date, organized, and well kept it will function better.

  • Two minor causes can be environment issues (temperature, etc) and type of data being transmitted.

New cards
25

Explain why compression of data is often necessary when transmitting across a network.

  • The smaller data is, the more can be sent during the same amount of time, allowing the computers to be more efficient.

  • It makes less data transmission.

  • It will take up less space when it finally gets to its destination.

  • Compressing also helps data to backup, transfer files over the web, and helps to encrypt, in a faster and easier way.

New cards
26

Copper wiring

(metal) Security: okay if encrypted. Speed: 100Mbps-1Gbps Cost: less than one euro per meter. Reliability: susceptible to electromagnetic interference.

New cards
27

Fiber-optic

(glass) Security: very secure. Speed: 5-100Gbps. Cost: 2-8 euros per meter. Reliability: fragile.

good distance

New cards
28

Radio waves (WLAN/wifi)

Security: very insecure unless encrypted. Speed: 5-100Mbps Cost: technically free Reliability: susceptible to interference.

New cards
29

Wired transmission

  • Copper

  • Fiber-optic cable

New cards
30

Wireless transmission

  • Radio wave

  • Microwave

  • Infrared

New cards
31

Outline advantages that make Optical Fiber better than Copper Cables for outdoor use.

  • Optical fiber provides a much farther bandwidth than the copper cables.

  • Optical fiber can carry more information than copper cable.

  • Copper cable is also less secure, and can be affected by electromagnetic interference.

  • This means if you use optical fiber you can use it over a bigger space outdoors with less effort, and that it will carry more of the information you need, making it the better choice.

New cards
32

Explain how data is transmitted by packet switching (connectionless socket operation).

  • Uses User Datagram Protocol (UDP). The datagram is a self-contained unit with all the information that is needed to deliver information. Like a letter with a stamp and address on the outside, and the information on the inside.

  • Breaks the data down into the packets then sends it through the network by using devices to transfer it. The devices then route it to the desired destination, where that device reassembles it.

  • A socket doing this does not have to connect to the destination socket, it can just send the datagram. UDP then tries as hard as it can to deliver. It is faster and more efficient than connection-oriented sockets, but it is not guaranteed.

New cards
33

Importance of checksums

  • It helps to validate the data being received and check if there was an error in transmission.

  • With the data, the sender also uses an algorithm to calculate the checksum of the data and sends it. When the receiver gets the data, they can calculate the checksum of that using the same algorithm. If they match, the transmission is error free.

  • The checksum is the binary code added together.

  • In a system that can lose information fairly easily the checksum is vital towards knowing whether or not the data you receive is accurate.

New cards
34

Advantages of wireless networks

  • Uses unlicensed radio spectrums, so it doesn't cost anything.

  • They can be set up without cables, so not cable cost, time to lay cables, or space needed for the cables.

  • Wifi supports roaming between different routers. They can switch from router to router depending on the best connection.

  • It has global standards.

  • Setup costs are minimal. Many different types of networks are available and affordable.

  • Public access to the internet is wide-spread.

New cards
35

Disadvantages of wireless networks

  • It can get interference as the 2.4GHz spectrum often has many other devices on it.

  • It has limited range.

  • WEP, an encryption that is not difficult to hack. Weaker security.

  • Access points can be used to steal data.

  • It is slower.

  • Higher error and disconnection rates.

  • High rates of addiction.

  • High rates of driving accidents.

  • Higher rates of cancer HYPOTHESIZED

  • More eye care problems HYPOTHESIZED

New cards
36

Hardware of Wireless Networks

  • Nodes: PC, laptops, tablets, printers, etc.

  • Wireless network interface cards (enables wifi communication between the device and the network).

  • Radio waves (bluetooth/wifi)

  • A connection point like a wireless AP or a router.

New cards
37

Software of Wireless Networks

  • A network operating system (with drivers).

  • A protocol stack (TCP or IP).

  • Applications, a browser or file explorer.

New cards
38

wifi characteristics

  • used in laptops or mobile devices to wirelessly connect to the network.

  • The preferred network type for home networks.

  • Relatively slow to fast data transmission, depending on the version.

  • Backwards compatible with most older wifi standards.

  • Small transmitting radius, one of the reasons it is suited for homes. Usually less than 20 meters.

New cards
39

WiMAX characteristics

  • For large distance high speed internet access.

  • Relatively cheap method for providing internet over a large area. Used for poorer countries.

  • Can be used as a wireless variant of DSL phone transmission lines.

  • Like 4G but 50% slower. It is not compatible with 3G but is with 4G.

New cards
40

3G (third generation) characteristics

  • The primary way for mobile phones to access the internet.

  • Allows to tunnel the phone lines (phones don't have to switch back to the phone network).

  • Relatively fast.

New cards
41

4G

  • Current generation.

  • Digital telecommunication standard reaches up to 100Mb/s.

  • Uses LTE which can reach up to 300Mb/s, is the most widely used wireless technology.

New cards
42

Authentication

  • One factor is something you know like a password.

  • Two factor is something you have, like a security card or ID.

  • Three factor is something you are, like a fingerprint.

New cards
43

Firewalls

  • They can be hardware, software, or a hybrid.

  • They control the incoming and outgoing network traffic.

  • They analyze data packets based off predetermined rules.

New cards
44

MAC Address (Media Access Control Address)

  • Hard-coded into devices by the manufacturers.

  • Managed by the IEEE (institute of electrical and electronics engineers).

  • Used to identify specific pieces of hardware.

New cards
45

Encryption - UserID

A username and password.

New cards
46

PSK

(pre shared key) Unique pre-shared keys. Kind of like the tokens in github being used to log into android studios.

New cards
47

WEP

Wireless equivalent privacy, a very simple algorithm. People broke it quickly and it has not been used since 2004. In 2003 WPA replaced it.

New cards
48

WPA/WPA2

(wifi protected access)

  • WPA, 2004-2006, intrusions can be made from outside the network.

  • WPA2, from 2006 to now. Intrusions can only come from someone who already has access to the network.

New cards
49

UserID - Advantages & Disadvantages

Advantages:

  • User groups can be created to help manage the user rights in batches.

  • Each user can set their own access rights.

Disadvantages:

  • Can be stolen.

  • System can be bypassed.

  • Cannot protect against intercepting messages in the network.

New cards
50

Encryptions - Advantages & Disadvantages

Advantages:

  • Hard to break when strong.

  • Computers are Fast enough to encrypt while doing a task.

Disadvantages:

  • Users often make passwords that are easy to guess.

  • Passwords have to be transmitted over the network so the receiver can read the message.

  • Some encryptions are built to have backdoors.

  • Can be complicated

New cards
51

Software Firewall - Advantages & Disadvantages

Advantages:

  • Monitors and controls the traffic between computers and networks to prevent unauthorized device access.

Disadvantages:

  • Can slow down the device.

New cards
52

MAC Address - Advantages & Disadvantages

Advantages:

  • Extra security because it has a whitelist of allowed devices. Each device has a unique MAC address found on a Network Interface Card.

Disadvantages:

  • List can easily be found with appropriate software.

  • The list can be hard to manage.

New cards
53

WEP - Advantages & Disadvantages

Advantages:

  • Worked with the legacy systems.

Disadvantages:

  • Outdated, not secure.

New cards
54

WPA/WPA2 - Advantages & Disadvantages

Advantages:

  • The best/most recommended option.

New cards
55

Hardware Firewall - Advantages & Disadvantages

Advantages:

  • Prevents attackers from accessing the network over the internet.

Disadvantages:

  • Physical proximity will allow access to network.

New cards
56

Explain why other standards like ASCII, UNICODE, and HTML are still needed, even though they are not part of the OSI standard.

They help to provide many different ways for the computers to standardize their information. They help different types of computers standardize the information in ways that work best for them.

New cards
57

TCP

(Transmission control protocol) Makes sure data packets are received and sequenced right.

New cards
58

IP

(Internet Protocol) Makes sure data sent across a network goes to the right person.

New cards
59

Computer Network

A group of computer systems or other hardware devices that are linked through communication channels. This allows for communication and research-sharing.

New cards
60

Server

A software application that provides some kind of service to other computers connected to the same network.

New cards
61

Client

The software application or computer system that requests a service from a server on the same network.

New cards
62

Switch

Something that can identify which devices are connected to a port. If a device wants to send data to a specific port the switch transmits it to the device connected to said port.

New cards
63

Node

A redistribution point or an end communications point.

New cards
64

Internet

A network of networks connected using IP (internet protocol). It powers large ranges of communication media like World-Wide Web (documents connected by hyperlinks), emails, chats, etc. Hosts on the internet are connected through publicly accessible communications media like the phone system.

New cards
65

Intranet

Private internet. Made of web pages and viewed through a browser, access is restricted to users within an organization. Usually hosted on a machine in the building.

New cards
66

Extranet

A controlled private network that allows partners, vendors, suppliers, etc, to gain access without granting access to the organization's entire network. Often restricted through IDs and passwords.

New cards
67

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time.

New cards
68

Lossless Compression

It compresses the file and does not lose data, it recreates the original file. Usually used in places where the data would be missed such as documents.

New cards
69

Lossy compression

Some data can be lost and the original file can never be recreated. Lossy has higher compression rates. It makes an approximation of the original data. Usually used in videos, sound, or images, where the loss would not be noticed.

New cards
70

Necessary components to create a public wireless network

  • Router

  • modem

  • wireless receiver

  • NICs

  • wireless access point

  • computer

  • cabling

New cards
71

Router

A device that forwards data packets to the appropriate part of the network

New cards

Explore top notes

note Note
studied byStudied by 248 people
883 days ago
5.0(1)
note Note
studied byStudied by 7 people
101 days ago
5.0(1)
note Note
studied byStudied by 3 people
384 days ago
5.0(1)
note Note
studied byStudied by 27 people
316 days ago
5.0(1)
note Note
studied byStudied by 6 people
820 days ago
5.0(2)
note Note
studied byStudied by 35 people
834 days ago
5.0(1)
note Note
studied byStudied by 17 people
931 days ago
4.0(1)
note Note
studied byStudied by 5143 people
674 days ago
4.9(14)

Explore top flashcards

flashcards Flashcard (79)
studied byStudied by 2 people
361 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 18 people
719 days ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 194 people
94 days ago
5.0(1)
flashcards Flashcard (106)
studied byStudied by 1 person
671 days ago
5.0(1)
flashcards Flashcard (145)
studied byStudied by 8 people
732 days ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 5 people
853 days ago
5.0(1)
flashcards Flashcard (248)
studied byStudied by 9 people
776 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 7 people
21 hours ago
4.0(1)
robot