cs topic 3: networks

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

1G/2G

1 / 114

flashcard set

Earn XP

115 Terms

1

1G/2G

first/second generation of mobile networking and telecommunications technology. used analogue transmission

New cards
2

3G/4G

third/fourth generation. digital and faster than 1G/2G

New cards
3

ADSL modem

necessary for connecting to the internet

New cards
4

advantages of firewalls

  • software firewall monitors traffic between device and network and prevents unauthorised access

New cards
5
  • router hardware firewall prevents unauthorised persons getting access to the network

New cards
6

advantages of MAC addresses

  • extra security

New cards
7

advantages of packet switching

full use of bandwidth, resilient to communications hardware failure, devices of different speeds can communicate easily

New cards
8

advantages of public key encryption

  • two sides don't need to share secret key beforehand to continue

New cards
9

advantages of symmetric-key encryption

  • faster than public key

New cards
10
  • uses less computer resources

New cards
11

advantages of user ID

  • easy to use

New cards
12
  • prevents unauthorised access

New cards
13
  • with web interface password, person cannot access web-based utility page of router

New cards
14

advantages of VPN

  • info can be accessed in remote places

New cards
15
  • no need for long-distance leased lines (lower cost)

New cards
16
  • enhanced security through encryption, can hide your IP address

New cards
17

advantages of wired networks

faster data transmission speeds, more reliable and doesn't depend on distance from router

New cards
18

advantages of wireless networks

no wires, freedom to move around

New cards
19

asymmetric key encryption

one key is used to encrypt data, another to decrypt

New cards
20

bandwidth

amount of data that can be transmitted over a certain period of time

New cards
21

bottleneck

created where there are slower segments in a network due to different factors below

New cards
22

circuit switching

dedicated channel established between both parties and data is sent in one go

New cards
23

client

desktop computer or terminal used to access a computer-based system

New cards
24

client-server

network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information

New cards
25

congestion management

prevents requests on network resources exceeding capacity

New cards
26

data compression

data is often compressed to take up less bandwidth and reduce transmission time

New cards
27

data integrity

ensures data is not changed or corrupted during transmission

New cards
28

data packet

formatted unit of data carried on a packet-switched network containing a header and a payload

New cards
29

data transmission directions

simplex, half-duplex and full-duplex

New cards
30

deadlock prevention

prevents situation where two or more competing programs or actions are sharing a resource and preventng each other from using it

New cards
31

denial of service attack

attack designed to overload a server

New cards
32

disadvantages of firewalls

  • may slow down device

New cards
33
  • issues about censorship with software firewall, depending on organisation

New cards
34
  • router hardware firewall can't stop person within range of your Wi-FI getting onto network

New cards
35

disadvantages of MAC addresses

  • danger of allowed list of MAC addresses being discovered

New cards
36
  • difficult to manage the list as it grows

New cards
37

disadvantages of public key encryption

  • messages take longer to encrypt and decrypt

New cards
38
  • aunthenitcity of public key needs to be verified

New cards
39

disadvantages of symmetric key encryption

  • keys must be shared before used

New cards
40
  • danger of key becoming known by unauthorised individuals, another one must be usd

New cards
41

disadvantages of user id

  • entering password may be time-consuming

New cards
42
  • weak password is easy to crack

New cards
43

disadvantages of VPN

  • needs a professional with detailed understanding of security issues and configuration to ensure sufficient security and protection

New cards
44
  • reliability of VPN is not directly under the organisation's control

New cards
45
  • not all VPN products are compatible different vendors

New cards
46

disadvantages of wired networks

ties users to one location and can degrade if cables are old

New cards
47

disadvantages of wireless networks

transmission depends on number of people per access point, the strength of signal and interference from physical surroundings

New cards
48

dynamic host configuration protocol (DHCP)

allows server to automatically assign IP address to client device

New cards
49

encryption

altering a message into form not understandable to unauthorised person. only person with the correct key can decode the message and read it

New cards
50

extranet

intranet that has been opened up to provide limited access to a selection of users from outside the organisation

New cards
51

fibre optic

visible light bouncing off walls inside a cable

New cards
52

firewall

program that restricts data allowed into and out of a network

New cards
53

flow control

controlling flow/load of resources due to limited bandwidth. transport layer uses protcols to slow down flow rate

New cards
54

hashing

turns a sequence of bits into a fixed length hash

New cards
55

hub

connection point for all devices on a network, devices connected through ethernet cables. data from devices goes to the hub, then sent to all devices

New cards
56

hypertext transfer protocol (HTTPS)

creates secure transmission of data from client to server

New cards
57

importance of standards in networks

we need common rules/standards when forming a network, otherwise some computer systems may not be able to connect due to incompatibilities, especially when trying to connect internationally

New cards
58

internet

network of networks connected using IP, powers a large range of media

New cards
59

internet protocol security

encrypt and authenticate traffic to ensure secure transfer over VPN tunnel

New cards
60

intranet

private internet, made up of web pages and viewed through a browser, but access is restricted to users within an organisation

New cards
61

local area network (LAN)

usually confined to one building, uses wired communications like ethernet

New cards
62

lossless compression

file gets compressed but no data is lost, the original file can be re-created from compressed version

New cards
63

lossy compression

the file gets compressed and some data is lost, the original file can never be re-created from compressed version

New cards
64

MAC addresses

every device in a network has a unique MAC address of 12 characters. network permits access only to specified, trusted devices based on their MAC address. MAC address of an untrusted is device blocked so it can't connect to network

New cards
65

man-in-the-middle attack

attack in which an undetected third party intercepts communications

New cards
66

metal conductor transmission media

fluctuating electrical voltages

New cards
67

network

set of computers or computer systems that are interconnected and share resources and data

New cards
68

NIC drivers

operates hardware of the card. translator between card and applications

New cards
69

node

device on a network

New cards
70

open systems interconnection (OSI) model

model that defines layers of network interaction, each layer deals with one aspect/abstraction of network communication

New cards
71

OSI application layer

supports processes for end-users and applications

New cards
72

OSI data link layer

responsible for coding and decoding data packets, ensuring communication between network and physical layer happens

New cards
73

OSI network layer

responsible for establishing the way in which data is communicated

New cards
74

OSI physical layer

responsible for ensuring physical assets are powered on able to receive and send data

New cards
75

OSI presentation layer

transforms data into a form the application layer can digest

New cards
76

OSI session layer

responsible for initiating and terminating connections between different applications

New cards
77

OSI transport layer

responsible for ensuring complete data transfer

New cards
78

packet switching

data broken into packets and sent over internet via different routes, packets are reassembled and sequences at their destination

New cards
79

peer-to-peer network

different to client-server, no centralised server. all nodes have equal priveleges and responsibility for processing and sending data

New cards
80

personal area network (PAN)

short-range network of personal devices, often using bluetooth short-range audio

New cards
81

phishing

creating mock-ups of a web page and providing a hyperlink that looks like it goes to the real site

New cards
82

protocol

internationally agreed set of rules to ensure transfer of data between devices

New cards
83

proxy

machine that brokers the communication between two other machines

New cards
84

router

device that connects network to another

New cards
85

secure socket layer (SSL)

encryption protocols used on the internet

New cards
86

server

a program that provides services requested by client programs

New cards
87

spoofing

faking your identity online

New cards
88

spyware

software that runs undetected on your system and records your activity

New cards
89

SSID

set of 32 characters to differentiate one WLAN from another

New cards
90

standards

agreements about hardware and software designed to facilitate the interoperability and compatibility between computer systems and devices

New cards
91

storage area network (SAN)

network not normally accessible from main LAN on which the hosts are predominantly high-capacity storage devices

New cards
92

switch

connection point but can identify which device is connected to which port, so can send data to target device

New cards
93

symmetric-key encryption

same key is used to encrypt and decrypt data

New cards
94

technologies needed for VPN

encryption protocols (eg SSL), tunnelling protocols (eg OpenVPN), VPN client software managing encryption

New cards
95

throughput

actual transfer rate of data

New cards
96

trojan horse

malicious program designed to look like a trusted program

New cards
97

user ID

use password to access device and/or password to access web interface used to set up wireless routers or access points

New cards
98

virtual local area network (VLAN)

subgroup of computers on a LAN that are treated like their own isolated LAN. members can move around without changing hardware

New cards
99

virtual private network (VPN)

allows clients from distant locations to connect, that otherwise wouldn't be able to connect with LAN or WAN

New cards
100

what are protocols concerned with in data transfer?

  • ensuring the presence of an identified sender and receiver

New cards

Explore top notes

note Note
studied byStudied by 352 people
... ago
5.0(1)
note Note
studied byStudied by 44 people
... ago
4.0(1)
note Note
studied byStudied by 34 people
... ago
4.5(2)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 141 people
... ago
4.3(7)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(3)

Explore top flashcards

flashcards Flashcard (102)
studied byStudied by 23 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 26 people
... ago
5.0(1)
flashcards Flashcard (230)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (82)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 97 people
... ago
5.0(1)
flashcards Flashcard (404)
studied byStudied by 4 people
... ago
5.0(3)
robot