09 Fundamentals of Communication & Networks Flashcards
hell summoning topic
Define serial transmission.
Serial transmission is where one bit is sent after the other down a single data line.
Define parallel transmission.
Parallel data transmission is where multiple bits are sent simultaneously down several data lines.
What are the benefits of serial over parallel transmission.
Cheaper = there is only one wire in single data transmission but parallel requires multiple wires so it is more expensive than serial
More reliable = Parallel experiences:
- Cross-talk: electromagnetic interference between several adjacent wires can cause bits to get corrupted (more pronounced at higher frequencies)
- Data skew: due to the slightly different properties of each wire in parallel DT, the bits travel at different speeds and arrive at different times (more pronounced at larger distances) so parallel is limited to 2 m
Define asynchronous transmission.
Data is transmitted when it is available, rather than at specific intervals or according to a clock signal. This means that there can be periods of time when the transmission channel is idle.
Define synchronous transmission.
In synchronous data transmission, streams of bits are transferred over a communication channel at a constant rate.
The transmitter and the receiver are synchronised using a common clock signal.
Compare synchronous and asynchronous transmission.
Asynchronous
- Requires a start bit and stop bit
- Less efficient
- Used for more sporadic data like mouse clicks
Synchronous
- No start and stop bit required
- Commonly used with parallel transmission
- e.g. transmission of data across a data bus according synchronised with the clock signals
What are the purposes of start and stop bits in asynchronous data transmission?
Synchronise the receiver’s clock signals to the transmitter clock
OR start the receiver’s clock ticking
Define bit rate.
The rate for the number of bits transmitted across a communications channel per second.
Define baud rate.
The rate for the number of times the signal changes per second.
A symbol corresponds to a set of bits that are transmitted with every signal change.
So baud rate represents the symbol rate of a channel
Define bandwidth.
The range of signal frequencies that can be transmitted across a transmission medium.
Define latency.
The delay from the time that a signal is sent, to the time that it is received.
Define protocol.
A protocol is a set of rules that govern the communication between devices
Define broadband.
A multiple data channel system in which the bandwidth of the transmission medium carries several data streams at the same time.
Define hand-shaking protocol.
The sending and receiving devices exchange signals to establish that they are each ready to initiate data transfer.
When is there a difference in bit rate and baud rate?
Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.
What is the relationship between bit rate and bandwidth?
Bit rate is directly proportional to bandwidth.
Describe in detail the principles of a physical star topology.
- The central device is a switch which all devices on the network are connected to directly
- A switch uses a table that maps each device to the port it is connected to.
- In this way, the switch is able to direct messages to the correct recipient (receiving device).
- Switch is the central point of failure
- Failure in connections or workstations is isolated
What is a logical bus topology?
- All nodes on the network are connected via a single backbone cable (on each end there are terminators)
- Messages are transmitted to all nodes in the network, the receivers examine the packet’s destination address and ignore it if they are not the intended recipient
- Prone to collisions as all signals travel across a single cable
- Poor security as data is transmitted to all nodes
- A break in the backbone will bring whole network to a stop
Differentiate between physical and logical topologies.
A physical topology is the arrangement of wiring between devices in a network.
A logical topology is how data packets flow in a network/the architecture of communication mechanisms in a network.
Explain peer-to-peer networking with situations it is used in.
- A network that has no dedicated servers.
- All computers are of equal status (same access rights) and can both share resources themselves and use resources from other computers
- Peers directly communicate with each other
- Small companies benefit as having independent computers means you don’t need an expensive server or hardware to manage and maintain
Explain client-server networking with situations it is used in.
- A system in which some computers (the clients), request services provided by other computers, the servers.
- Servers are computers that provides shared resources to network users.
- Typically used in large companies where people need to access data and resources frequently
- A server can cope with multiple people accessing it
- Security and access rights are centralised
- Backup and restoration is centralised and can be managed by a specialised networks manager
What is WiFi and its purpose?
- WiFi is a high-bandwidth wireless method of communication that can be used alongside or in place of wired Ethernet networks
- One of the most common wireless technologies which allows computers to connect to a network without physical connections.
Describe a wireless network adapter as a crucial component for wireless networking.
It is a physical device which is required to connect to a wireless network.
It is use to convert data into a form so that it can be transmitted across the network and in a wireless network the data needs to be converted into radio waves.
(In wired it would be voltages through a wire or pulses of light through fibre)
Describe a wireless access point as a crucial component for wireless networking.
- This is the bridge between wired and wireless network
- They broadcast a wireless signal which other devices can connect to, all the devices share the bandwidth of the access point.
- The Access Point is normally connected to a single wired network port.
- In the home this could be packaged with a router and a network switch, but can also be a stand alone device.
Outline three ways wireless networks are secured.
1. Wireless Security Protocols
- WEP (Wired Equivalent Privacy) - symmetric encryption algorithm, key is often too short and used for too long making it easy to decipher
- WPA (WiFi Protected Access) - larger keys, a new key is generated for each data packet
- WPA v2 - stronger encryption algorithm, message encrypted several times depending on key size
2. Disable SSID broadcasting
- An SSID is a string of alphanumeric characters that is specified during the setup of wireless devices to differentiate between wireless networks
- Its broadcast can be hidden so user must know the exact SSID and enter it to access the network
3. MAC address whitelist
- A Media Access Control (MAC) address is a string of characters that identifies a device on a network
- The router can have a whitelist of MAC addresses to allow on the network and will block any other devices
Describe the wireless protocol CSMA/CA steps and purpose.
CSMA/CA is a protocol used in wireless networking. It makes sure that network collisions are avoided.
- The first step is to listen to the channel to check for the presence of any other signals.
2.Upon the detection of an existing transmission on a channel, the node that wanted to send will wait for a random period of time before trying again. - Once the channel is free, the data is sent.
- Then, the sender needs to receive an acknowledgement message from the receiver to verify that the data was received successfully.
- Otherwise, the sender will attempt to resend the message.
Outline RTS/CTS as part of CSMA/CA wireless protocol.
- Once the channel is determined to be idle, a signal is sent called Request to Send (RTS).
- The answering device then sends a Clear to Send (CTS) reply.
- This way it knows which device asked to send first and can ensure that only that device will send its message, by not responding to further RTS signals until the original sender has finished.
What is the purpose of the SSID?
An SSID is a string of alphanumeric characters that is specified during the setup of wireless devices to differentiate between wireless networks
Define the internet
Internet is a global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol.
Describe the structure of the internet.
- The hardware of the internet is made up of servers which hold internet web pages, cables which connect these servers together and routers/gateways to connect computers to the internet
- The main part of the internet is the backbone which consists of a set of dedicated connections that connect several large networks at various points on the globe
- These connections branch into regional networks typically controlled by ISPs
- ISPs provide access to individual end-users
What is the role of packet switching?
- Data transmitted is broken into small chunks (packets).
- Each packet is sent separately over a network on which other similar communications are happening simultaneously. The data is reconstructed on arrival.
- This allows for faster, more reliable and more efficient data transfer
What are the components of a packet?
- Header = sender IP, recipient IP, Protocol, Packet number, TTL
- Payload = data
- Trailer = end of packet flag, checksum
Define routers, their purpose and where they are used.
A networking device that receives packets or from one host or router and uses the destination IP address that they contain to pass them correctly formatted, to another host or router.
Define gateways and where they are used.
A device used to connect networks using different protocols so that information can be successfully passed from one system to another.
Header is removed and reapplied with the correct format
Explain how routing is achieved across the internet.
- The data is broken up into packets
- Router examines the header to identify the destination address
- It consults its routing table to determine the next hop (router-to-router link) for the packet
- The routing table is constantly updated with information about the optimal route for packets to take.
What is the difference between WWW and the internet?
World Wide Web = A system of hypertext documents accessed via the internet using a HTTP protocol
Internet = A global network of interconnected networks using globally unique address space and uses end-to-end communications protocols
Define URL.
- Uniform Resource Locator
- Used to specify the means of accessing a resource and its location across a network
- protocol + domain name = URL
- This was invented so that users could use a memorable name to refer to a network and a host on that network.
Fully explain FQDN and domain names.
Fully Qualified Domain Name
It is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System made up of host name and domain name.
www/ftp/mail = host name
bbc = domain name
com = top-level domain
Define IP address.
Internet Protocol Address
identifies a network or device on the internet.