cs topic 3: networks

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 114

flashcard set

Earn XP

115 Terms

1
1G/2G
first/second generation of mobile networking and telecommunications technology. used analogue transmission
New cards
2
3G/4G
third/fourth generation. digital and faster than 1G/2G
New cards
3
ADSL modem
necessary for connecting to the internet
New cards
4
advantages of firewalls
- software firewall monitors traffic between device and network and prevents unauthorised access
New cards
5
- router hardware firewall prevents unauthorised persons getting access to the network

New cards
6
advantages of MAC addresses
- extra security
New cards
7
advantages of packet switching
full use of bandwidth, resilient to communications hardware failure, devices of different speeds can communicate easily
New cards
8
advantages of public key encryption
- two sides don't need to share secret key beforehand to continue
New cards
9
advantages of symmetric-key encryption
- faster than public key
New cards
10
- uses less computer resources

New cards
11
advantages of user ID
- easy to use
New cards
12
- prevents unauthorised access

New cards
13
- with web interface password, person cannot access web-based utility page of router

New cards
14
advantages of VPN
- info can be accessed in remote places
New cards
15
- no need for long-distance leased lines (lower cost)

New cards
16
- enhanced security through encryption, can hide your IP address

New cards
17
advantages of wired networks
faster data transmission speeds, more reliable and doesn't depend on distance from router
New cards
18
advantages of wireless networks
no wires, freedom to move around
New cards
19
asymmetric key encryption
one key is used to encrypt data, another to decrypt
New cards
20
bandwidth
amount of data that can be transmitted over a certain period of time
New cards
21
bottleneck
created where there are slower segments in a network due to different factors below
New cards
22
circuit switching
dedicated channel established between both parties and data is sent in one go
New cards
23
client
desktop computer or terminal used to access a computer-based system
New cards
24
client-server
network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information
New cards
25
congestion management
prevents requests on network resources exceeding capacity
New cards
26
data compression
data is often compressed to take up less bandwidth and reduce transmission time
New cards
27
data integrity
ensures data is not changed or corrupted during transmission
New cards
28
data packet
formatted unit of data carried on a packet-switched network containing a header and a payload
New cards
29
data transmission directions
simplex, half-duplex and full-duplex
New cards
30
deadlock prevention
prevents situation where two or more competing programs or actions are sharing a resource and preventng each other from using it
New cards
31
denial of service attack
attack designed to overload a server
New cards
32
disadvantages of firewalls
- may slow down device
New cards
33
- issues about censorship with software firewall, depending on organisation

New cards
34
- router hardware firewall can't stop person within range of your Wi-FI getting onto network

New cards
35
disadvantages of MAC addresses
- danger of allowed list of MAC addresses being discovered
New cards
36
- difficult to manage the list as it grows

New cards
37
disadvantages of public key encryption
- messages take longer to encrypt and decrypt
New cards
38
- aunthenitcity of public key needs to be verified

New cards
39
disadvantages of symmetric key encryption
- keys must be shared before used
New cards
40
- danger of key becoming known by unauthorised individuals, another one must be usd

New cards
41
disadvantages of user id
- entering password may be time-consuming
New cards
42
- weak password is easy to crack

New cards
43
disadvantages of VPN
- needs a professional with detailed understanding of security issues and configuration to ensure sufficient security and protection
New cards
44
- reliability of VPN is not directly under the organisation's control

New cards
45
- not all VPN products are compatible different vendors

New cards
46
disadvantages of wired networks
ties users to one location and can degrade if cables are old
New cards
47
disadvantages of wireless networks
transmission depends on number of people per access point, the strength of signal and interference from physical surroundings
New cards
48
dynamic host configuration protocol (DHCP)
allows server to automatically assign IP address to client device
New cards
49
encryption
altering a message into form not understandable to unauthorised person. only person with the correct key can decode the message and read it
New cards
50
extranet
intranet that has been opened up to provide limited access to a selection of users from outside the organisation
New cards
51
fibre optic
visible light bouncing off walls inside a cable
New cards
52
firewall
program that restricts data allowed into and out of a network
New cards
53
flow control
controlling flow/load of resources due to limited bandwidth. transport layer uses protcols to slow down flow rate
New cards
54
hashing
turns a sequence of bits into a fixed length hash
New cards
55
hub
connection point for all devices on a network, devices connected through ethernet cables. data from devices goes to the hub, then sent to all devices
New cards
56
hypertext transfer protocol (HTTPS)
creates secure transmission of data from client to server
New cards
57
importance of standards in networks
we need common rules/standards when forming a network, otherwise some computer systems may not be able to connect due to incompatibilities, especially when trying to connect internationally
New cards
58
internet
network of networks connected using IP, powers a large range of media
New cards
59
internet protocol security
encrypt and authenticate traffic to ensure secure transfer over VPN tunnel
New cards
60
intranet
private internet, made up of web pages and viewed through a browser, but access is restricted to users within an organisation
New cards
61
local area network (LAN)
usually confined to one building, uses wired communications like ethernet
New cards
62
lossless compression
file gets compressed but no data is lost, the original file can be re-created from compressed version
New cards
63
lossy compression
the file gets compressed and some data is lost, the original file can never be re-created from compressed version
New cards
64
MAC addresses
every device in a network has a unique MAC address of 12 characters. network permits access only to specified, trusted devices based on their MAC address. MAC address of an untrusted is device blocked so it can't connect to network
New cards
65
man-in-the-middle attack
attack in which an undetected third party intercepts communications
New cards
66
metal conductor transmission media
fluctuating electrical voltages
New cards
67
network
set of computers or computer systems that are interconnected and share resources and data
New cards
68
NIC drivers
operates hardware of the card. translator between card and applications
New cards
69
node
device on a network
New cards
70
open systems interconnection (OSI) model
model that defines layers of network interaction, each layer deals with one aspect/abstraction of network communication
New cards
71
OSI application layer
supports processes for end-users and applications
New cards
72
OSI data link layer
responsible for coding and decoding data packets, ensuring communication between network and physical layer happens
New cards
73
OSI network layer
responsible for establishing the way in which data is communicated
New cards
74
OSI physical layer
responsible for ensuring physical assets are powered on able to receive and send data
New cards
75
OSI presentation layer
transforms data into a form the application layer can digest
New cards
76
OSI session layer
responsible for initiating and terminating connections between different applications
New cards
77
OSI transport layer
responsible for ensuring complete data transfer
New cards
78
packet switching
data broken into packets and sent over internet via different routes, packets are reassembled and sequences at their destination
New cards
79
peer-to-peer network
different to client-server, no centralised server. all nodes have equal priveleges and responsibility for processing and sending data
New cards
80
personal area network (PAN)
short-range network of personal devices, often using bluetooth short-range audio
New cards
81
phishing
creating mock-ups of a web page and providing a hyperlink that looks like it goes to the real site
New cards
82
protocol
internationally agreed set of rules to ensure transfer of data between devices
New cards
83
proxy
machine that brokers the communication between two other machines
New cards
84
router
device that connects network to another
New cards
85
secure socket layer (SSL)
encryption protocols used on the internet
New cards
86
server
a program that provides services requested by client programs
New cards
87
spoofing
faking your identity online
New cards
88
spyware
software that runs undetected on your system and records your activity
New cards
89
SSID
set of 32 characters to differentiate one WLAN from another
New cards
90
standards
agreements about hardware and software designed to facilitate the interoperability and compatibility between computer systems and devices
New cards
91
storage area network (SAN)
network not normally accessible from main LAN on which the hosts are predominantly high-capacity storage devices
New cards
92
switch
connection point but can identify which device is connected to which port, so can send data to target device
New cards
93
symmetric-key encryption
same key is used to encrypt and decrypt data
New cards
94
technologies needed for VPN
encryption protocols (eg SSL), tunnelling protocols (eg OpenVPN), VPN client software managing encryption
New cards
95
throughput
actual transfer rate of data
New cards
96
trojan horse
malicious program designed to look like a trusted program
New cards
97
user ID
use password to access device and/or password to access web interface used to set up wireless routers or access points
New cards
98
virtual local area network (VLAN)
subgroup of computers on a LAN that are treated like their own isolated LAN. members can move around without changing hardware
New cards
99
virtual private network (VPN)
allows clients from distant locations to connect, that otherwise wouldn't be able to connect with LAN or WAN
New cards
100
what are protocols concerned with in data transfer?
- ensuring the presence of an identified sender and receiver
New cards
robot