Topic 3

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards

Protocol

A set of predetermined rules on how information is sent and received.

2
New cards

Virtual Private Network (VPN)

A paid (but sometimes free) service that allows the user to create an encrypted link between the user and a remote server. Once connected, the user can anonymously access the information, data, or the internet using the remote server instead of his own machine.

3
New cards

Computer network

Allows different computers to communicate with one another.

4
New cards

Local Area Network (LAN)

A computer network that spans a relatively small area (a single room, house, building, etc.)

5
New cards

Wide Area Network (WAN)

A system of LANs that spans a relatively large geographical area.

6
New cards

Wireless Local Area Network (WLAN)

A wireless distribution method for a local area network that use high-frequency radio waves and often include an access point to the Internet.

7
New cards

Access Point

A hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN.

8
New cards

Node

A single computer or device on a computer network.

9
New cards

Peer to Peer (P2P)

Computer systems that communicate to each other through a network without passing through a central server.

10
New cards

Internet

A WAN that spans the entire world.

11
New cards

Extranet

An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.

12
New cards

Intranet

A private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet.

13
New cards

Storage Area Network (SAN)

A high-speed network of storage devices that also connects those storage devices with servers.

14
New cards

Direct attached storage (DAS)

Digital storage that is attached directly to a computer or a server. In other words, this isn't part of a storage network. The most familiar example of this is the internal hard drive in a laptop/desktop.

15
New cards

Personal Area Network (PAN)

The interconnection of devices within the range of an individual person, typically within a range of 10 meters. For example, a person traveling with a laptop and a portable printer could interconnect them.

16
New cards

Wireless Personal Area Network (WPAN)

A personal area network that is wireless. Most common example is Bluetooth.

17
New cards

Physical, Data Link, Network, Transport, Session, Presentation, and Application

These are the 7 layers of the Open Systems Interconnection (OSI) Model.

18
New cards

Tunneling

The transmission of data intended for use only within a private, usually corporate, network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network. VPNs use this.

19
New cards

VPN Gateway

A type of networking device that connects two or more devices or networks together in a VPN infrastructure.

20
New cards

Data packet

Large digital files are divided up into these smaller messages to be sent individually.

21
New cards

Packet switching

Data packets for a single message are all sent at different times to different locations. When all the data packets arrive at their destination, they are reassembled into their original larger message.

22
New cards

Deadlock

A situation where two or more competing actions are waiting on each other to finish. As a result, neither of them ever finish.

23
New cards

Network congestion

An increase in data transmissions results in a proportionately smaller increase, or even a reduction, in throughput.

24
New cards

Throughput

The amount of data that passes through the network per unit of time (such as the number of packets per second).

25
New cards

Denial of Service (DoS)

The attacker (usually some computer science nerd with no life) sends excessive messages that causes so much network congestion that the network crashes.

26
New cards

Distributed Denial of Service (DDoS)

Multiple computers all attack a single target to create a large DoS attack. If the attacker has no friends, he/she can still do this by taking control over other computer(s).

27
New cards

Error checking

The process of detecting errors during the transmission of data or storage of data.

28
New cards

Broadband

A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.

29
New cards

Wi-Fi

A piece of technology that your grandmother can never get right. Allows devices to connect to the internet.

30
New cards

Firewall

Determines what information can go inside and outside a computer network. Without this, anything would be able to pass through.

31
New cards

Media Access Control Address (MAC Address)

A unique identifier hardwired or hard-coded onto your computer's network interface card.

32
New cards

Trusted MAC Address Filtering

Only allowing computers with specific MAC Addresses to connect to a private network.

33
New cards

Bandwidth

The speed of how long it takes for data to be moved from one place to another on a network.

34
New cards

Ring topology

LAN topology that connects all nodes in a closed loop on which messages travel in one direction. The nodes of this topology pass along messages until they reach their destination.

35
New cards

Star topology

LAN topology that centers on one central node that allows communication. All the other nodes are connected to this central node. This topology puts a huge burden on the central node.

36
New cards

Bus topology

LAN topology that connects nodes to a single communication line that carries messages in both directions. Each node checks any messages that are sent on the network and ignore messages that are not addressed to them.

37
New cards

Metropolitan Area Network (MAN)

Similar to a WAN, but unlike a WAN, this network is more narrowly focused on a single campus, city, or other population.

38
New cards

Internet Service Provider (ISP)

An organization providing access to the internet. Ex. Comcast, Verizon, etc.

39
New cards

Phone modem

A device that converts computer data into an analog audio signal for transfer over a telephone line and back again when the message is received.

40
New cards

Open system

A system that is based on a common model of network architecture and an accompanying suite of protocols.

41
New cards

Repeater

If communication lines span a long distance (ex. over the ocean), these devices are installed periodically along the line to strengthen and propagate the signals across the lines.

42
New cards

Transmission Control Protocol (TCP)

The network protocol that breaks messages into packets, reassembles them at the destination, and takes care of errors.

43
New cards

Internet Protocol (IP)

The network protocol that deals with the routing of packets through interconnected networks to the final destination.

44
New cards

Transmission Control Protocol and Internet Protocol (TCP/IP)

A suite of protocols and utilities that support network communication. Breaks down packets, routes them, and rebuilds packets.

45
New cards

Access Control

The ability to determine who can send and receive messages. Usually used by firewalls.

46
New cards

Wireless Network Information Card (NIC)

This is needed for a single computer to connect to a wireless router. Most, if not all, computers are built with this hardware.

47
New cards

Cloud computing

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

48
New cards

NBC

Not Backward Compatibile

49
New cards

extranet

Intranet that is partially accessible to outside users. Provides various levels of accessibility to outsiders

50
New cards

OSI Seven layer model

Please Do Not Throw Sausage Pizza Away.

51
New cards

Physical (OSI layer 1)

conveys bit stream (electrical impulse, light, or radio signal) through the network.

52
New cards

Data Link (Layer 2)

data packs are encoded and decoded into bits. Furnishes transmission protocol knowledge and management and handles errors in layer 1

53
New cards

Network (Layer 3)

Provides switching and routing technologies, creating logical paths, known as virtual circuits.

54
New cards

Transport(Layer 4)

Transparent transfer of data between systems.

55
New cards

Session(Layer 5)

Establishes, manages, and terminates connections between applications.

56
New cards

Presentation(Layer 6)

Provides independence from differences in data representation by translating from application to network format or vice versa. Turns data into form application can accept.

57
New cards

Application (Layer 7)

Supports application and end-user processes.

58
New cards

Requirements needed to create VPN

Server, client, tunnel, protocols, encryption, tunneled data, and transit internetwork.

59
New cards

Data integrity

overall completeness, accuracy, and consistency of data and is achieved by error checking and correction protocols.

60
New cards

Flow control

control packet flow so sender doesn't transmit more packets than a receiver can process

61
New cards

deadlock

two computer programs prevent each other from using the resource because they both are using it.

62
New cards

Congestion

source sends more packets than receiver can handle

63
New cards

error checking

based on accuracy, speed, and efficiency

64
New cards

packet switching

breaking data files into small packets in order to send them across a network.

65
New cards

Network

when two or more computers are connected with one another for the purposes of communicating data

66
New cards

Data Encryption

the act of changing electronic information into an unreadable state through the use of algorithms or ciphers so that it is readable by the communicating parties. A strong encryption is very hard to break Computer are fast enough to encrypt data on-the-fly. Often, users are lazy and take a password that is easy to guess

67
New cards

The password needs to be transmitted over the network to receiver to allow them to read the message

68
New cards

Some encryptions are designed to have backdoors built in

69
New cards

User ID

A userid and password are used to identify the specific communicating user.

70
New cards

Access rights to the network can be set for each user User groups can be created to manage user rights in batches. A userID can be stolen

71
New cards

system can be bypassed

72
New cards

Does not protect against intercepting messages in the network

73
New cards

Permissions

As well as passwords to enable users to login, each user also has a set of permissions associated with their logon name or group. Some users, administrators or super-users, can look in any data file, change user passwords and delete any file on the system. Ordinary users can only access their own files and use specified resources such as printers and CD burners

74
New cards

Data packet

is when pieces of information on the file are broken down into chunks of data in order to be transmitted over a network.

75
New cards

Explain why the speed of data transmission across a network can vary

Trafficking -

76
New cards

Many users may want to transmit data through the network at the same time

77
New cards
78
New cards
79
New cards

Interference - to the network from the outside can corrupt many data packages, causing them to have been retransmitted

80
New cards

Router

accepts packets on at least two network interfaces, and forwards packets from one interface to another.

81
New cards

Switch

is used in hybrid networks to connect the different segments and pass packets of data between them.

82
New cards

Gateway

device that is used to connect users of a LAN to another network, which uses different protocols.