Intro to IT Section 4: Computer Networks Starter Set

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

What is a network?

A collection of two or more connected devices that can communicate with one another

2
New cards

What is networking?

Sharing information and resources through linked computer systems. Networking enables users to exchange messages and share resources

3
New cards

What are the 3 network types in the geographic sense?

PAN, LAN, WAN

4
New cards

PAN

Personal area network; used for short-range communications. Ranges a couple of feet (like mouse to a PC or headphones to smartphone)

5
New cards

LAN

Local area network; consists of a collection of computers in a single building

6
New cards

WAN

Links systems over a greater distance, even on opposite sides of the world. The Internet is the greatest example of a WAN

7
New cards

What are the 2 network types in the internal workings sense?

Open network and closed network

8
New cards

Open Network

Designs that are in the public domain

Freely circulated and are more popular than closed network

EX) the internet

9
New cards

Closed Network

Designs owned or controlled by third parties

Designs are restricted by license fees and contracts

10
New cards

TCP/IP protocol

An open collection of standards that governs communication over the internet

11
New cards

What are the 4 common network types based on topology?

Bus, star, ring, and mesh

12
New cards

Bus network

the machines are connected to a common communication line called a bus

<p>the machines are connected to a common communication line called a bus</p>
13
New cards

Star network

A singular machine serves as a central point to which all others are connected.

used today in wireless networks where communication is carried out via radio broadcast to a central machine called the access point (AP)

<p>A singular machine serves as a central point to which all others are connected.</p><p>used today in wireless networks where communication is carried out via radio broadcast to a central machine called the access point (AP)</p>
14
New cards

Ring network

All devices are directly connected to each other as a peer

<p>All devices are directly connected to each other as a peer</p>
15
New cards

Mesh network

Every device is connected to every other device. This type enables redundancy while also introducing more network traffic

<p>Every device is connected to every other device. This type enables redundancy while also introducing more network traffic</p>
16
New cards

What is interprocess communication?

It allows the activities or processes on different computers within a network to coordinate actions and complete tasks.

17
New cards

Client/Server Model

The basic roles are either a client making requests or a server satisfying client request

EX) Computers requesting a printer to print

18
New cards

Peer-to-Peer (P2P) Model

Processers both request and provide service to each other.

EX) Instant messaging and interactive games played by users on multiple machines

19
New cards

What do distributed systems do?

They execute software as processes on more than one computer. It includes cluster computer, grid computing, and cloud computing

20
New cards

Cluster computing

Uses many independent computers to provide computation or services comparable to those of a larger machine.

High availability in case a computer becomes unavailable, can balance loads by shifting requests among cluster members

21
New cards

Grid computing

Typically includes specialized software to make it easier to distribute the workload and data among the machines in the grid.

22
New cards

Cloud computing

Provides large pools of shared computers that can be allocated to clients as needed. It provides reasonable guarantees for reliability and scalability while raising concerns about security and privacy.

23
New cards

What is the transmission medium?

A component that carries data from one network device to another. There are two types of transmission media: wired and wireless.

24
New cards

Wired transmission mediums

Twisted pair cables, coaxial cable, and optical fiber cables are common network media used in wired networks

25
New cards

Wireless transmission mediums

wireless networks use radio waves, microwaves, and infrared waves.

26
New cards

What's the most commonely used type of transmission media?

Twisted pair cables.

27
New cards

What are the 2 common types of twisted pair cables?

Unshielded twisted pair (UTP) and shielded twisted pair (STP)

28
New cards

STP vs UTP

Shielded Twisted-Pair

-Better protection from EMI

-More expensive than UTP

Unshielded Twisted-Pair

-Most common for ethernet cable

*Distance limitation = 100 meters; after 28 ft needs repeater

29
New cards

Coaxial cables (coax)

have an outer plastic that is used in computer networks and to deliver cable TV services. Used for both baseband and broadband data communication services. The bandwidth of coaxial cables is about 80 times the bandwidth of twisted wires.

Cable modems and televisions typically use coaxial cables.

30
New cards

Baseband vs broadband

Baseband is a signal at a very narrow frequency range on which data or information is superimposed and then transmitted. Examples include Ethernet LANs and serial cables.

Broadband is considered high-capacity transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds. Examples include coaxial cable, fiber optic cable, and radio waves.

31
New cards

Fiber optic cable

uses the concept of reflection of light through a core made up of glass or plastic

Their bandwidth can provide up to 26,000 times the bandwidth of the twisted pair wires, at the time of this writing.

32
New cards

Wireless Transmission

Electromagnetic waves of different frequencies can be used to transmit data within a network with the use of Wi-Fi, Bluetooth, or even near field communication

SOMETIMES more convenient and practical than installing cables

33
New cards

Wi-Fi Adapters vs Bluetooth

Wi-Fi adapters enable devices to connect to each other or to the internet.

Bluetooth supports distances shorter than 30 feet, while Wi-Fi devices can be accessed up to 300 feet away.

34
New cards

What are the 4 common devices used to connect networks?

Repeaters, Bridges, Switches, and Routers

35
New cards

Repeaters

They extend the range of cabling types so connections can be made by increasing the strength of the network signal.

36
New cards

Bridges

They are used to connect to different types of network and provide management of the message. It analyzes the network message and will only bridge the network if a message is addressed to a device on the other side.

37
New cards

Switches

They are used to reduce network traffic by management of network messages.

38
New cards

Routers

They are the device that make the internet possible. It connects to your LAN and acts as a gateway to the internet.

They manage network traffic by having a routing table of known devices. If a destination address is unknown to the Router, it will forward the message to another router. This analyze and forward process continues until the message reaches the correct address.

39
New cards

What does ISP stand for and what do they do?

Internet Service Provider; these construct and maintain the individual networks comprising the internet

40
New cards

Tier 1 ISP

The least common type of ISP and serves as the backbone of the internet

high speed, high-capacity, international WANs that are usually operated by large communication companies

41
New cards

Tier 2 ISP

More common and regional in scope. Tier 1 and Tier 2 ISPs are essentially networks of routers that collectively provide the internet's communication infrastructure.

42
New cards

Tier 3 ISP (AKA, access ISPs)

typically are independent internets (AKA, intranets) operated by a single organization that supplies internet access to homes and businesses.

43
New cards

What are end systems/ hosts

These are the devices used to connect to the access ISPs

EX) common internet devices like PCs, laptops, and smartphones, but also devices like cameras, automobiles, and home appliances.

44
New cards

What's the point of internet addressing systems?

To assign a unique identifier to each computer in the network.

45
New cards

What kind of bit address do we use now?

128-bit addresses (IPv6) in addition to 32-bit (IPv4)

46
New cards

IPv4 addresses

traditionally written in dotted decimal notation, with the bytes of the address separated by periods

EX) 192.207.177.103

47
New cards

IPv6 addresses:

Written in hexadecimal EX) 2001:DB8:12:34::1111

48
New cards

Computer Domains are:

a section of the internt operated by a single authority, such as a university or business.

EX) the domain name of WGU is "wgu.edu"

49
New cards

What's a TLD and give some examples?

a top-level domain

"edu" denotes an education institution

"com" is for commercial institutions

"gov" is for governmetn agencies

"org" is for nonprofit organizations

"tv" is for television stations

TLD's include two-letter country codes like "au" for Australia and "kr" for Korea

50
New cards

DNS

Domain Name System

a hierarchical and decentralized system that translates human-readable domain names into numerical IP which computers use to identify one another on a network.

51
New cards

Domain Names

the familiar, easy-to-read names that are used to navigate the internet, such as "www.google.com." These names are easier for humans to remember than IP addresses.

52
New cards

Hierachy

The DNS is organized hierarchically with the root DNS servers at the top, which direct requests to the appropriate TLD servers.

53
New cards

DNS resolution

This is the process of translating a domain name into an IP address.

54
New cards

What are network protocols?

Rules, procedures, and formats that govern the communication of multiple devices over a network. This ensures timely, secure, and managed network communication

55
New cards

What is HTTP?

Hypertext transfer protocol; As web servers and browsers became more sophisticated, traditional networks became handled by web pages using this

56
New cards

What is email transmission supported by?

basic network protocols like Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), or Internet Message Access Protocol (IMAP)

57
New cards

What is VoIP?

Voice over Internet Protocol; used for voice communication over the Internet

It operates by establishing a connection between two devices and then performing real-time, two-way transmission of audio data

58
New cards

What are softphones?

Softphones allow two or more computers to share a call without any additional hardware

59
New cards

What are analog telephone adaptors?

They allow users to connect their physical phones to a port that digitizes and then transmits real-time audio data.

60
New cards

What is streaming?

Transporting audio and video data across the Internet in near real-time

61
New cards

What is on-demand streaming?

Where the end user expects to view or listen to media at an arbitrary time of their choosing

62
New cards

What is broadcasting?

Where a server transmits content to several users simultaneously like traditional radio and TV stations.

63
New cards

What are CDNs?

Content delivery networks; groups of servers distributed strategically over the internet that stream copies of content to nearby end users

64
New cards

What is anycast?

A networking technology that enables an end user to connect to the closest server automatically.

65
New cards

What is the WWW?

World Wide Web It is composed of: (1) a hypertext document format for embedding hyperlinks to other documents (2) a protocol for transferring hypertext over the network (3) a server process that supplies hypertext pages upon request

also supports images, audio, and video.

66
New cards

What are browsers or web servers?

Software packages that allow users to access hypertext

67
New cards

What is a browser?

A program that resides on the user's machine to obtain the requested materials and present them in to the end user in an organized way

68
New cards

What is a web server?

This resides on the computer containing the hypertext documents

69
New cards

What is a URL?

Each hypertext document available through the World Wide Web is given a unique address called a uniform resource locator

70
New cards

What does the URL include?

It includes the protocol, domain, all subdomains, the resource path ID, and the name of the document.

71
New cards

What is HTML?

HyperText Markup Language is a way of encoding a document. Special symbols called tags describe how the document should appear on a display screen, what multimedia resources should accompany the document, and which elements within the document are linked to other documents.

72
New cards

What is XML?

Extensible Markup Language; A generalized language provides a standardized style for designing notational systems for representing data as text files.

73
New cards

XML vs HTML

XML emphasizes semantics, while HTML focuses on appearance.

74
New cards

What is malware (malicious software)?

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

EX) computer viruses, worms, spyware, and phishing, etc

75
New cards

What is a software bug?

Software that causes unintentional harm due to some deficiency

76
New cards

What is a virus?

a software program that infects a computer by inserting itself into programs that already reside in the machine. When the host program is executed, the virius is executed too

77
New cards

What is a worm?

an autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network.

78
New cards

What is spyware?

Spyware resides on a computer, collecting information about the computer's activities and reporting back to the spyware's instigator. Passwords or credit card numbers can be exposed via spyware.

79
New cards

What is phishing?

A technique used to obtain private information by simply asking for it. The perpetrator sends emails posing as a legitimate business asking for information.

80
New cards

What is a DoS attack?

A denial-of-service attack is the process of overloading a computer with messages and results in suffocating the network resources

81
New cards

What is packet sniffing (man-in-the middle)(MITM)?

Where the attacker intercepts the data as it is traveling to or from the victim's device, including authentication credentials. MITM is just one way an attacker can get unauthorized access to resources and systems

82
New cards

What is brute force attack?

This is where the attacker uses all possible combinations of characters to learn a user's password. There are multiple variations of the brute force attack, such as rainbow table attack and dictionary attack.

83
New cards

What is a dictionary attack?

Performed by the attacker by using an application and a large dictionary text file with just words.

When the attacker runs the application, it tries identifying the password by trying hundreds or thousands of words per minute from that dictionary file.

84
New cards

What is a rainbow table attack?

An attack that tries to identify the hash value of the password, then convert it back to plain text.

85
New cards

What is a firewall?

A "filter program"

Firewalls block outgoing messages with certain destination addresses or block incoming messages from untrustworthy sources

86
New cards

What is a proxy server?

A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server.

87
New cards

What is network auditing software?

Software that monitors network behaviors such as the origin and volume of traffic, looking for anomalies to proactively or reactively mitigate unwanted occurrences.

88
New cards

What is antivirus software?

Software that detects and removes known viruses from the network

89
New cards

What is the point of encryption?

Encryption encodes information to keep it confidential even if the data is stolen.