Topic 3 Networks

studied byStudied by 2 people
0.0(0)
get a hint
hint

Computer Network

1 / 87

Tags and Description

88 Terms

1

Computer Network

A computer system or set of systems which uses communication equipment in order to connect computers and share their resources and data

New cards
2

Node

Device on a network

New cards
3

Server

A Computer program, software or host computer fulfills requests from client programs and serves as a central repository of data and programs which are shared by these clients

New cards
4

Client

Computer hardware or software device that accesses a service made available by a server, achieved by sending a request for service. (e.g. email software client requesting email server software to fetch new emails).

Unlike a server, the client does not share any of its resources but requests content

New cards
5

Hub

connection point for all devices on network, connected through ethernet cables. Data from one device goes direct to the Hub, which share this to all devices. The intended recipient accepts this data, all other devices ignore it.

Although transmission to every port ensures that data reaches its destination, the effect of this creates a lot of traffic on the network, which slows down transmission

New cards
6

Switch

Also the connection point for multiple devices on a single network’ however a switch can identify which device is connected to which port, so can send data to the target device directly. Because of this, networks connected using a switch have faster data transmission than those connected using a hub

New cards
7

Router

used to join multiple networks ands is used as an intermediary between these so data may be exchanged efficiently between devices (e.g. connecting a home network to the internet)

New cards
8

bus topology

computer network in which a “bus” connects all the devices together through a common cable

New cards
9

cable

copper wire and fiber. Cables allow for the connection of computers over a network

New cards
10

check digit

extra digit added to numerical data that is used to check data integrity after input, transmission, storage and processing

New cards
11

data integrity

the accuracy of data after input, transmission, storage or processing

New cards
12

check sum

error-detecting procedure that generates a sum from the digits of a number

New cards
13

data packet

portion of a message that is transmitted through a network. Contains data such as check digits and destination address

New cards
14

gateway

link that resides between computer networks and is responsible for converting data passing through into the appropriate format so it can be understood by the receiving network

New cards
15

handshaking

exchange of predetermined signal to signify that a connection has been established between two systems

New cards
16

integrated services digital network (isdn)

international communications standard that allows for the transmission of audio/video and other data over digital telephone lines

New cards
17

Local area network (LAN)

computer network where all the connected computer are within a limited geographical area. Connection between the computers may be through cables and/or microwave transmission

New cards
18

microwave transmission

electronic communication without the need for cables

New cards
19

modem (abbreviation of modulator/demodulator)

electronic equipment that converts computer digital signals into audio signals and back. the audio signals are transmitted over telephone lines, which allows for distant communication

New cards
20

network

computer system that are interconnected and can share resources and data

New cards
21

packet

group of bits. may include control signals, error control bits, coded information, as well as the destination for the data

New cards
22

packet switching

network communication method that creates and transmits small units of data, called packets, through a network, independently of the overall message

New cards
23

networking

making use of a network

New cards
24

parity bit

error-detecting procedure that appends a binary digit to a group of binary digits. The sum of all the digits, including the appended binary digit, establishes the accuracy of the data after input, transmission, storage or processing

New cards
25

protocol

international rules that ensure the transfer of data between systems. A protocol that is recognized as the standard for a specific type of transfer is called standard protocol. For example: TCP/IP is a standard protocol

New cards
26

TCP/IP (Transmission control protocol/internet protocol)

communications protocols used to connect hosts on the internet

New cards
27

Wide Area Network (WAN)

computer network where all the connected computers are in a larger geographic area than that served by a LAN or a MAN (metropolitan area network)

New cards
28

Virtual Local Area Network (VLAN)

Different sections of a LAN may not want to access all the available shared data, as such a LAN can be split into separate VLANS, the new network is known as a logical separate network.

Each logical separate network cannot access the other shared resources without being granted special access.

New cards
29

Peripheral Devices

Examples include printers, scanners, external hard drivers, which provide increased functionality

New cards
30

Storage Area Network (SAN)

Type of LAN created so that large storage devices can be accessible from servers in a convenient and easy way and is able to hand large data transfers

New cards
31

Personal Area Network (PAN)

Network covering individuals workspace, essentially a LAN which only supports one person, instead of a group of people

New cards
32

Peer to Peer Network (P2P)

Network with no centralized server. All nodes are client and server at the same time, consuming and supplying resources from and to other peers. This makes resources more widely available and supports file sharing for collaborative work.

New cards
33

Wireless Local Area Network (WLAN

connects nodes in a limited geographical area but achieves this without the use of cabling and wires.

Requires a wireless router or modem; access points; switch; wireless repeaters and so on

New cards
34

Advantages of WLAN

  • possibility of user collaboration and make access easier due to wireless transmission. Quick access with mobile devices; anywhere in the scope of the WLAN and therefore do not need to be present at a workstation.

  • allows users to bring their own device which has a more familiar interface, could lead to great efficiencies and fewer usability issues

  • Could lead to insecure devices, but could be resolved with clear company policy regarding use, Virtual Testing ‘Sandbox’ could protect against viruses, MAC address authentication and testing, other security features in order to address.

  • No extra equipment is needed for expansion after the initial set-up; which will save time and money

  • Reduces wiring therefore increases the safety for employees

  • user-mobility and economical access points

New cards
35

Disadvantages of WLAN

  • poorer security as devices from outside can access the network and intercept transmissions since transmission goes ‘through the air’

  • Could be resolved by strong encryption/protocols, e.g. WPA-2 or use of trusted MAC addresses, and regular changes of the router password

  • Open to misuse, An administrator cannot directly monitor a specific user or device

  • Data Transfer will decrease because the number of computers using the network increases and because the WLAN has a lower bandwidth than a wired LAN

  • intermittent connectivity due to physical barriers; this may result in lower transfer speed, weakening of signal and may reduce operations and efficiency'

  • Wireless signal could be weak in some places; leading to frustrated/ineffective users.

New cards
36

Internet

A global WAN connected through an Internet service provider (ISP) to exchange for a monthly feed. The internet is decentralized by design, any independent computer able to access the internet and share resources becomes a server of its own.

Ethical issues include: some information presented online may be deliberately incorrect and not subjected to validation and scrutiny; further issues such as plaigarism and intellectual property.

New cards
37

Extranet

Computer network that utilizes the internet. works like an external extension to a LAN. Part of a network that uses internet protocols to allow limited access by specific users to a LAN or WAN

New cards
38

Ethernet

Ethernet is more reliable as the strength of the signal is independent from the distance from the router (in comparison to Wireless Network transmission). There is also no issues with the network topology type and nature of the surroundings, so long as the user is connected. Connection does depend on the condition of the cables; any loose or broken cable connections will reduce or fail transmission.

New cards
39

Standards

provide a common internal language that enables compatibility for all computer systems throughout the globe

New cards
40

Advantage of layers

  1. easy to manage

  2. greater understanding of each layer

  3. common language for each layer

  4. makes protocol design easier

  5. a manufacturer can focus on technologies of a particular layer

  6. products of different manufacturers can work together

  7. Technology advances of a layer are independent of technology advancements of other layers

New cards
41

Open Systems Interconnection Model

the most-widely used networking standard. It is just a reference model

New cards
42

Virtual Private Network

makes a tunneled network connection through the internet or any other public network. Considered ideal for establishing a secure connection between private networks with remote users and remote sites.

New cards
43

Hardware and software requirements for VPNs

  1. Internet access

  2. VPN software

  3. VPN routers

  4. VPN appliances

  5. VPN concentrators. a single device to handle a large number of incoming VPN tunnels

  6. VPN servers

New cards
44

Secure VPN Technologies

  1. Internet protocol security protocol (IPSec) which functions in both transport and tunnel mode:

    1. Allows the secure transmission of data over public IP-based networks

    2. Uses standard encryption algorithm to provide confidentiality (AES)

    3. Provides authentication via digital certificates

    4. Secure Sockets Layer (SSL) 3.0 or transport layer security with encryption. SSL/TLS based VPNS are much simpler than IPSec based VPNs. The use of this technology does not require special client software because all web servers and web browsers support this method of providing a VPN.

New cards
45

Technologies for Trusted layer 2 VPNs

  1. Asynchronous Transfer Mode (ATM) Circuits

  2. Frame relay circuits

  3. Transport of layer 2 frames over MultiProtocol Label Switching (MPLS)

New cards
46

Technologies for Trusted Layer 3 VPNs

MultiProtocol Label Switching (MPLS) with constrained distribution of routing information through border gateway protocol

New cards
47

Hybrid VPN Technologies

A combination of both secure and trusted technologies or a combination of two VPN technologies

New cards
48

Site-to-Site VPN

Connects entire networks and facilitates secure data interchange between different sites

New cards
49

Remote-access VPN

Connects individual hosts to private networks and facilitates teleworkers who need to access their company’s network securely using the Internet. Every host has VPN client software installed.

New cards
50

Advantages of a VPN

  • Information can be accessed in remote places

  • lower cost; no need for long-distance leased lines

  • Enhanced Security; data intercepted is undecipherable and security properties of each tunnel are agreed by the administrators of the endpoints of the tunnel

  • Nobody outside the VPN should be able to affect the security properties of the VPN

  • Multiple exit nodes; makes it hard to distinguish where the data was generated and thus more secure

  • can change working patterns; allowing employees to work from home and reduce traveling time, beneficial for workplace efficiency and reduces environmental costs.

New cards
51

Disadvantages of a VPN

  • need professional with detailed understanding of security issues and configuration to ensure sufficient security and protection

  • reliability of VPN is not directly under the organizations control but under the ISP

  • Not all VPN products are compatible across different vendors

New cards
52

VPN vs. Extranet

In a VPN, access and transmission are always encrypted, users have access to everything, authenticate the sender before establishing a tunnel

New cards
53

network communication method

original file is divided into packets before transmission, each of these packets may follow a different path to the destination address

New cards
54

Protocols

Set of tules for transmission; to faviliatate a process being carried out correctly. Rules that ensure data is transferred correctly between systems. Recognized as the standard for a certain type of transfer is called a ‘standard protocol’.

New cards
55

Data Integrity

Ensures data is not changed or corrupted during transmission

New cards
56

Flow Control

Network infrastructures have limited memory and bandwidth, the transport layer is responsible for using protocols to manage situation where an overload of resources occurs

New cards
57

Deadlock prevention

prevents situation where two or more network competing actions are each waiting for the other to finish and thus neither ever does

New cards
58

Congestion managements

prevents requests on network resources from exceeding capacity

New cards
59

error checking

ensures the validity of data

New cards
60

Error correction

the ability to repair the error

New cards
61

Examples of Internet Protocols

  • Hypertext Transfer Protocol (HTTPS)

    • creates a secure transmission of data from client to server

  • Secure Socket Layer (SSL) and Transport Layer Security (TLS)

    • Encryption protocols used on the internet. Allows for things like secure payment

  • Internet Protocol Security (IPSec)

    • Encrypt and authenticate traffic to ensure secure transfer over VPN tunnel

  • Dynamic Host Configuration Protocol (DHCP)

    • Allows the server to automatically assign IP address to client device

New cards
62

Bandwidth

Theoretical speed of data in a medium and depends on the signaling technique used and the physical properties of the medium

New cards
63

Throughput

the actual transfer rate

New cards
64

Goodput

measures the transfer rate of usable data

New cards
65

Factors affect speed of data transmssion

  1. Bandwidth of the network

  2. Data Transfer rate of storage devices

  3. Interferences

  4. Malicious software

  5. Number of connected devices

  6. Number of users’ and users demand at any particular time

  7. Packet lost and retransmission

  8. Read speed of storage devices

New cards
66

Data Compression

Reduces the size of files to be transmitted over a network; which will take up less bandwidth and reduce overall transmission time. The recipient will have a program that can decompress the contents of the file.

New cards
67

Wired Communication Media

  • Copper Cable

  • Coaxial Cable

  • Unshielded Twisted Pair Cable (UTP)

  • Shielded Twisted Pair Cable

New cards
68

Wireless Communication

  • Microwave Radio

  • Satellites

  • Infared

  • RFID

  • Bluetooth

  • Free Space Optics

New cards
69

Data Packet

Unit of information in a form suitable to travel between computers

New cards
70

Datagram

the basic transfer unit and sometimes is used instead of the term data packet

New cards
71

Datagram Packet Switching

Each packet contains the receiver address, The path that datagrams take between the same source and destination can be different

New cards
72

Virtual Circuit Packet Switching

A route from source to destination is set up before any transmission takes place

New cards
73

Single or ‘Secret’ key

Used for encryption and decryption; each device uses this to Encrypt a packet before it is sent over an untrusted network

New cards
74

Encryption

Altering a message into undecipherable form to those unauthorized. Only a recipient with the correct key can decode the message and read it.

New cards
75

Advantage of Single Key Encryption

  • Faster than using a public key

  • uses less computer resources

New cards
76

Reasons Against Symmetric-Key Encryption

  • Keys must be shared before they are used

  • Risk or Key becoming known by unauthorized

New cards
77

Asymmetric Key Encryption

Public Key Encryption and a private key for decryption are both mathematically linked. SSL and TSL protocols use this form of encryption

New cards
78

Reasons for Public Key Encryption

Both sender and recipient don’t need to share key beforehand to communicate

New cards
79

Reasons Against Public Key Encryption

  • Messages take longer to Encrypt and decrypt.

  • Authenticity of public key needs to be verified

New cards
80

Free Access

Wireless data transmission extends beyond walls and window screens.

New cards
81

Media Access Control Address (MAC)

  • THe MAC address identifies a specific device through its unique 12 characters which is check against a list of approved addresses if not on this whitelist then Access is denied

  • This prevents unauthorized access very difficult, unless the NIC has been cloned, but generally provides an additional layer of security since data send to a specific MAC address can only be accessed on the specified Device

New cards
82

Advantages and Disadvantages of MAC

  • Extra security

Against

  • Danger of allowed list of MAC addresses being discovered

  • Difficult to manage the list as it grows

New cards
83

User ID

uses password to access networking device and/or another password to access the web interface used to set up a wireless router or access point

New cards
84

Reasons for and Against User ID

For

  • Easy to use

  • Prevents unauthorized access

Against

  • Entering password each time may be time consuming and inconvenient

  • Weak passwords are easy to crack and gain access

New cards
85

Firewall

Either as; software installed on each device, or router hardware firewall that protects from hackers accessing devices through wireless connection

Filters incoming traffic and can block some messages coming through as well as control/limit users own access to the internet. Extent of firewall use depends on an organization’s policy

New cards
86

Reasons For Firewall

  • Software firewall monitors traffic between device and network and prevents unauthorized access

  • Router hardware firewall prevents unauthorized persons getting access to the network

New cards
87

Reasons against firewall

  • May slow down the device

  • Issues about censorship with software firewall, depending on the organization

New cards
88

Methods to Increase Network Secuirty

  • Giving each user appropriate login details and strong passwords

  • Different access rights for students, teachers, admins, etc.

  • Encryption of all passwords and files

  • use of the latest WiFi protocol Security

  • Require MAC address and authentication

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 87 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 743 people
Updated ... ago
4.0 Stars(4)

Explore top flashcards

flashcards Flashcard100 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard59 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard51 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard37 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard90 terms
studied byStudied by 430 people
Updated ... ago
4.7 Stars(3)