first/second generation of mobile networking and telecommunications technology. used analogue transmission
2
New cards
3G/4G
third/fourth generation. digital and faster than 1G/2G
3
New cards
ADSL modem
necessary for connecting to the internet
4
New cards
advantages of firewalls
- software firewall monitors traffic between device and network and prevents unauthorised access
5
New cards
- router hardware firewall prevents unauthorised persons getting access to the network
6
New cards
advantages of MAC addresses
- extra security
7
New cards
advantages of packet switching
full use of bandwidth, resilient to communications hardware failure, devices of different speeds can communicate easily
8
New cards
advantages of public key encryption
- two sides don't need to share secret key beforehand to continue
9
New cards
advantages of symmetric-key encryption
- faster than public key
10
New cards
- uses less computer resources
11
New cards
advantages of user ID
- easy to use
12
New cards
- prevents unauthorised access
13
New cards
- with web interface password, person cannot access web-based utility page of router
14
New cards
advantages of VPN
- info can be accessed in remote places
15
New cards
- no need for long-distance leased lines (lower cost)
16
New cards
- enhanced security through encryption, can hide your IP address
17
New cards
advantages of wired networks
faster data transmission speeds, more reliable and doesn't depend on distance from router
18
New cards
advantages of wireless networks
no wires, freedom to move around
19
New cards
asymmetric key encryption
one key is used to encrypt data, another to decrypt
20
New cards
bandwidth
amount of data that can be transmitted over a certain period of time
21
New cards
bottleneck
created where there are slower segments in a network due to different factors below
22
New cards
circuit switching
dedicated channel established between both parties and data is sent in one go
23
New cards
client
desktop computer or terminal used to access a computer-based system
24
New cards
client-server
network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information
25
New cards
congestion management
prevents requests on network resources exceeding capacity
26
New cards
data compression
data is often compressed to take up less bandwidth and reduce transmission time
27
New cards
data integrity
ensures data is not changed or corrupted during transmission
28
New cards
data packet
formatted unit of data carried on a packet-switched network containing a header and a payload
29
New cards
data transmission directions
simplex, half-duplex and full-duplex
30
New cards
deadlock prevention
prevents situation where two or more competing programs or actions are sharing a resource and preventng each other from using it
31
New cards
denial of service attack
attack designed to overload a server
32
New cards
disadvantages of firewalls
- may slow down device
33
New cards
- issues about censorship with software firewall, depending on organisation
34
New cards
- router hardware firewall can't stop person within range of your Wi-FI getting onto network
35
New cards
disadvantages of MAC addresses
- danger of allowed list of MAC addresses being discovered
36
New cards
- difficult to manage the list as it grows
37
New cards
disadvantages of public key encryption
- messages take longer to encrypt and decrypt
38
New cards
- aunthenitcity of public key needs to be verified
39
New cards
disadvantages of symmetric key encryption
- keys must be shared before used
40
New cards
- danger of key becoming known by unauthorised individuals, another one must be usd
41
New cards
disadvantages of user id
- entering password may be time-consuming
42
New cards
- weak password is easy to crack
43
New cards
disadvantages of VPN
- needs a professional with detailed understanding of security issues and configuration to ensure sufficient security and protection
44
New cards
- reliability of VPN is not directly under the organisation's control
45
New cards
- not all VPN products are compatible different vendors
46
New cards
disadvantages of wired networks
ties users to one location and can degrade if cables are old
47
New cards
disadvantages of wireless networks
transmission depends on number of people per access point, the strength of signal and interference from physical surroundings
48
New cards
dynamic host configuration protocol (DHCP)
allows server to automatically assign IP address to client device
49
New cards
encryption
altering a message into form not understandable to unauthorised person. only person with the correct key can decode the message and read it
50
New cards
extranet
intranet that has been opened up to provide limited access to a selection of users from outside the organisation
51
New cards
fibre optic
visible light bouncing off walls inside a cable
52
New cards
firewall
program that restricts data allowed into and out of a network
53
New cards
flow control
controlling flow/load of resources due to limited bandwidth. transport layer uses protcols to slow down flow rate
54
New cards
hashing
turns a sequence of bits into a fixed length hash
55
New cards
hub
connection point for all devices on a network, devices connected through ethernet cables. data from devices goes to the hub, then sent to all devices
56
New cards
hypertext transfer protocol (HTTPS)
creates secure transmission of data from client to server
57
New cards
importance of standards in networks
we need common rules/standards when forming a network, otherwise some computer systems may not be able to connect due to incompatibilities, especially when trying to connect internationally
58
New cards
internet
network of networks connected using IP, powers a large range of media
59
New cards
internet protocol security
encrypt and authenticate traffic to ensure secure transfer over VPN tunnel
60
New cards
intranet
private internet, made up of web pages and viewed through a browser, but access is restricted to users within an organisation
61
New cards
local area network (LAN)
usually confined to one building, uses wired communications like ethernet
62
New cards
lossless compression
file gets compressed but no data is lost, the original file can be re-created from compressed version
63
New cards
lossy compression
the file gets compressed and some data is lost, the original file can never be re-created from compressed version
64
New cards
MAC addresses
every device in a network has a unique MAC address of 12 characters. network permits access only to specified, trusted devices based on their MAC address. MAC address of an untrusted is device blocked so it can't connect to network
65
New cards
man-in-the-middle attack
attack in which an undetected third party intercepts communications
66
New cards
metal conductor transmission media
fluctuating electrical voltages
67
New cards
network
set of computers or computer systems that are interconnected and share resources and data
68
New cards
NIC drivers
operates hardware of the card. translator between card and applications
69
New cards
node
device on a network
70
New cards
open systems interconnection (OSI) model
model that defines layers of network interaction, each layer deals with one aspect/abstraction of network communication
71
New cards
OSI application layer
supports processes for end-users and applications
72
New cards
OSI data link layer
responsible for coding and decoding data packets, ensuring communication between network and physical layer happens
73
New cards
OSI network layer
responsible for establishing the way in which data is communicated
74
New cards
OSI physical layer
responsible for ensuring physical assets are powered on able to receive and send data
75
New cards
OSI presentation layer
transforms data into a form the application layer can digest
76
New cards
OSI session layer
responsible for initiating and terminating connections between different applications
77
New cards
OSI transport layer
responsible for ensuring complete data transfer
78
New cards
packet switching
data broken into packets and sent over internet via different routes, packets are reassembled and sequences at their destination
79
New cards
peer-to-peer network
different to client-server, no centralised server. all nodes have equal priveleges and responsibility for processing and sending data
80
New cards
personal area network (PAN)
short-range network of personal devices, often using bluetooth short-range audio
81
New cards
phishing
creating mock-ups of a web page and providing a hyperlink that looks like it goes to the real site
82
New cards
protocol
internationally agreed set of rules to ensure transfer of data between devices
83
New cards
proxy
machine that brokers the communication between two other machines
84
New cards
router
device that connects network to another
85
New cards
secure socket layer (SSL)
encryption protocols used on the internet
86
New cards
server
a program that provides services requested by client programs
87
New cards
spoofing
faking your identity online
88
New cards
spyware
software that runs undetected on your system and records your activity
89
New cards
SSID
set of 32 characters to differentiate one WLAN from another
90
New cards
standards
agreements about hardware and software designed to facilitate the interoperability and compatibility between computer systems and devices
91
New cards
storage area network (SAN)
network not normally accessible from main LAN on which the hosts are predominantly high-capacity storage devices
92
New cards
switch
connection point but can identify which device is connected to which port, so can send data to target device