3.9 Fundamentals of Communication and Networking Flashcards

1
Q

Internet address

A

Each device on a network needs to be uniquely identified so that the data can be sent to the correct destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are URLs used for

A

URLs are used to specify the means of accessing a resource across a network and its location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how is a URL formed

A

the protocol and the domain name of the resoruce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

URL

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

define the Internet

A

a network of interconnected computer networks which uses an end-to-end communication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is an ISP?

A

a company that provides its customers with access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TTL

A

Time To Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what name is given to the process of a packet moving from one router to another

A

hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

primary components of a packet

A

sender’s address, receiver’s address, packet contents, TTL, sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

gateways

A

a device that is used between networks that uses different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

purpose of a sender’s address

A

identifies where the packet was sent from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

purpose of a receiver’s address

A

identifies the packet’s intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

purpose of packet contents

A

where the packet holds the data that is being transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

purpose of TTL

A

holds the number of hops a packet can go through before being dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

purpose of sequence number

A

contains the number of packets in a message and identifies a packet’s position in relation to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a domain name

A

it identifies an organisation or individual on the internet using alphanumerical characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FQDN

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a FQDN

A

a domain that specifies an exact resource and can be interpreted in only one way, will always include the server’s host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

three types of malware

A

worms, trojans, viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

worms

A

pieces of malware that can self-replicate between computers, either within a network or by users downloading and running a malicious file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

trojans

A

a type of malware that is disguised as a benign file, users can be tricked into opening this as an email attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

viruses

A

requires a host file to reside in, the files are typically executable, can lie dormant until the host file is opened, can spread between computers over a private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

precautions taken to prevent malware

A

antivirus software, employees can be trained about opening email attachments, good code quality to prevent malware exploiting bugs in code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

firewalls

A

sit in between a device and the internet, regulates the packets that pass through them, either software or hardware, work as a proxy server to perform packet filtering and stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

stateful inspection

A

examines the contents of a packet before deciding whether to allow it through a firewall, can be filtered as firewalls can keep records of current connections in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

packet

A

containers in which data is transmitted over networks, labelled with addresses for their sender and recipient, contains information intended for recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is a packet switched network

A

network in which data is sent in packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

packet switched networks process

A

one message is split into multiple packets, each of which is sent to recipient via the best possible route, packets are reassembled with other packets, packets pass through routers before reaching destination, each packet has a finite number of hops, with each hop TTL is reduced, when TTL expires the packet is dropped, recipient will notice a missing packet and request that the sender transmit the missing packet again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

how does a router know the fastest route

A

holds table with information relating to the fastest routes to certain devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

when must a packet be modified

A

where two networks use different protocols, packets must be modified by a gateway so as to conform to both protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

packet filtering

A

firewalls use this to accept and block packets based on their IP address or the protocol that they are using (determined by their port number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

baud rate definition

A

number of signal changes per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

bit rate definition

A

number of bits that are transmitted per second, bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

bit rate formula

A

bit rate = baud rate x number of bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

bandwidth definition

A

the range of frequencies that can be transmitted across a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

bandwidth and bit rate relationship

A

direct relationship, higher bandwidth = higher bit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

latency definition

A

the delay between a signal being transmitted and it arriving, increases with distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

protocol definition

A

a set of rules (relating to communications between devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

serial data transmission

A

data is sent one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

parallel data transmission

A

uses numerous parallel communication lines in order to send multiple bits simultaneously, more lines = more data sent at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

disadvantages of parallel

A

skew may occur as bits may not arrive at exactly the same time (worse over long distances), more expensive because of multiple lines, crosstalk can occur leading to data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

advantages of serial over parallel transmission

A

doesn’t suffer from skew or crosstalk so more reliable over long distances, cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

synchronous transmission

A

when data is transmitted, a clock signal is used to time when signals are sent, signals are sent at regular intervals and received in same order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

asynchronous transmission

A

uses start and stop bits to indicate duration of transmission, sender and receiver use same baud rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

physical topology defintion

A

the physical layout/architecture of the cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

logical topology definition

A

how data/packets flow around a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

physical star network topology

A

every device is connected to central hub, every device sends data via central hub, hub sends packets of data to intended recipient only, server can be added to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

physical star advantages

A

failure of one cable does not affect performance of rest of network, no collisions as each cable has just one device, packets sent directly to recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

physical star disadvantages

A

if central hub fails all communication is stopped, expensive to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

physical bus topology

A

devices all connected to backbone (a single cable) with terminators at each end

53
Q

physical bus advantages

A

inexpensive to install as less cables and no extra hardware

54
Q

physical bus disadvantages

A

packets sent through shared backbone so all clients see packets even if not intended for them, backbone is used by multiple clients so higher risk of collisions, if backbone fails entire network becomes unusable

55
Q

logical bus topology

A

packets distributed to all devices, data can not be simultaneously transmitted in both directions (no duplex transmission)

56
Q

logical star topology

A

only delivers packets only to recipient

57
Q

client-server networking

A

devices connected to central server, clients hold their own files whilst servers provide resources and services

58
Q

client-server advantages

A

better security as files stored in central location, centralised backups, data and resources can be shared

59
Q

client-server network disadvantages

A

expensive to install and manage, staff needed to maintain the servers

60
Q

peer-to-peer networking

A

services provided by clients themselves and they all have equal status as no central server

61
Q

peer-to-peer advantages

A

users can share resources, cost effective as no server and easier to maintain/set up

62
Q

peer-to-peer disadvantages

A

all devices must be running so that all functions are available, management of security is more difficult

63
Q

WiFi

A

local area wireless technology that enables you to connect a device to internet via a wireless network access point (WAP)

64
Q

WPA/WPA2

A

WiFi protected access, encrypts transmitted data, requires client to enter password to connect to network, reduces chance of unauthorised devices reading transmitted data

65
Q

disabling SSID broadcast

A

SSID will not be visible when trying to connect so only users who know it can connect

66
Q

MAC address whitelist

A

MAC address is unique to every NIC, whitelist only allows approved MAC addresses (devices) to join network

67
Q

CSMA/CA is used for

A

carrier sense multiple access with collision avoidance is a protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously

68
Q

CSMA/CA with RTS/CTS steps

A

transmitting device checks for traffic, if another transmission in progress transmitter waits, once channel is idle transmitter sends RTS, receiver responds with CTS, if CTS not received, transmitter waits random amount of time before resending RTS, when CTS received transmitter begins transmitting data, receiver sends ACK, if no ACK received then data is resent

69
Q

CSMA/CA disadvantages

A

cannot overcome hidden nodes, which is why RTS/CTS is used

70
Q

CSMA/CA steps

A

device that is ready to transmit listens to comms channel and waits until it is idle, then transmits the data

71
Q

proxy server definition

A

server that sits between a public network and a private network

72
Q

device in private network sending packet into public

A

the packet’s sender address is that of the firewall rather than the device’s private IP address for some anonymity

73
Q

symmetric encryption

A

both sender and receiver share the same private key, the key is used to both encrypt and decrypt

74
Q

key exchange problem

A
75
Q

asymmetric encryption

A

four different keys are used between two devices, each device has a pair of related keys, one is private and the other is public, when a message is encrypted with a public key, only the corresponding private key can decrypt it and vice versa, recipient is only one who can decrypt

76
Q

digital signature

A

used in asymmetric encryption to verify the sender of a message and that message has not been tampered with

77
Q

digital signature steps

A

digest of message is created (using hashing or checksum), value depends on contents of message, digest is encrypted with sender’s private key (which can be decrypted with sender’s public key), encrypted digest is appended to message, encrypted with recipient’s public key, recipient decrypts with public key to verify, recipient carries out hashing/checksum algorithm to check it matches and confirm that no tampering or corruption has occurred

78
Q

digital certificates

A

verifies ownership of a key pair in asymmetric encryption and can check that a fake key pair isn’t being used, serial number, owner’s name, expiry date, owner’s public key are included

79
Q

TCP/IP

A

protocol used in all parts of the Internet to enable different devices to communicate

80
Q

TCP/IP stack layers

A

application, transport, network, link

81
Q

role of the application layer

A

selects and uses correct protocol to transmit data, interacts with user through application software

82
Q

role of the transport layer

A

establishes a virtual path - an end to end connection between sender and receiver, layer splits transmission into packets, each packet labelled with packet and port numbers, requests retransmission of lost packets if needed

83
Q

role of the network layer

A

provides the correct IP addresses for each packet’s source and destination, routers work within the layer, using IP addresses to send to its location

84
Q

role of the link layer

A

controls physical connections between pieces of hardware in a network, adds MAC addresses to packets which it receives from network layer to locate the correct piece of hardware, MAC address changes with each hop

85
Q

once packet is received

A

TCP/IP stack is reversed, link removes MAC addresses, network removes IP addresses, transport uses port number to determine correct application to send packet to, application (layer) removes port number and reassembles packets in correct order

86
Q

thin-client network

A

majority of network’s processing power belongs to servers

87
Q

thin-client exam q

A
88
Q

thick-client network

A

clients are powerful enough to provide their own processing power and storage, removing need for server

89
Q

thin-client advantages

A

easy to set up/maintain, software and updates can be installed on server and automatically distributed to each client terminal, more secure since data is kept in one place

90
Q

thin-client disadvantages

A

reliant on server so if server goes down terminals lose functionality, requires very powerful and reliable server so expensive, server demand and bandwidth increased, maintaining network connections for portable devices consumes more battery power than local data processing

91
Q

thick-client advantages

A

robust and reliable, can operate without connection to server, generally better for running more powerful software applications, reduced likelihood of collisions

92
Q

thick-client disadvantages

A

more expensive computers required, installation of software required on each terminal separately, harder to maintain

93
Q

XML

A

written in <>, database servers deliver responses to this query (or JSON), more flexible than JSON in terms of structure and data types

94
Q

JSON

A

written using {}, ; and “”, database servers deliver responses to this query (or XML)

95
Q

advantages of JSON over XML

A

easier for human to read due to its data oriented format, more compact, easier to create due to simple syntax, easier for computers to parse using standard JavaScript function

96
Q

CRUD in SQL

A

Create - INSERT,
Retrieve - SELECT,
Update - UPDATE,
Delete - DELETE

97
Q

steps for client connecting to database (REST)

A

client-server request made by client to web browser, web browser responds with requested web page, text file contains JavaScript which loads an API which uses REST to enable database server to be queried by client, client sends HTTP requests to database server, server responds using either JSON or XML, client’s browser processes this and displays it to user

98
Q

HTTP requests from CRUD and SQL

A

Create - INSERT - POST
Retrieve - SELECT - GET
Update - UPDATE - PUT
Delete - DELETE - DELETE

99
Q

client-server model

A

clients send request messages to servers, which reply to clients with response messages which may contain the requested info, confirmation of completed action, or why the action hasnt been completed

100
Q

API (application programming interface)

A

set of protocols relating to how different applications communicate with each other, sets out format of requests and responses between client and server

101
Q

Websocket protocol

A

an example of an API operating in application layer (of TCP/IP stack), provides constant stream of information between two devices, full-duplex so data transmission bi-directional at the same time, allows for fast transmission due to reduction of packet header size so used for gaming and messaging

102
Q

port forwarding

A

when a client needs to communicate with a server that is connected to a private network, client sends packets to public IP address of router belonging to server’s private network, packets contain port number of application, private network’s router forwards packets to server using NAT

103
Q

DHCP (Dynamic host configuration protocol)

A

DHCP is used to assign IP addresses to devices as they join a network, so that an IP address is not wasted by assigning it to a device that might not join again, uses a pool of available IP addresses to allocate IP addresses for the duration of the session, then returned to pool

104
Q

NAT (network address translation)

A

gets around problem of trying to communicate with non-routable (private) IP address, device on private network sends packets through router, makes record of packet before replacing the private IP address with its own routable IP address, when a response is received, sent to router’s public IP which forwards response to private IP by using record

105
Q

routable IP

A

public, globally unique

106
Q

non-routable IP

A

private, devices can have same one

107
Q

IPv4

A

four parts separated by dots, each part is assigned one byte

108
Q

IPv6

A

formed of eight blocks separated by colons, each block contains 4 hexadecimal characters, allows for more unique permutations

109
Q

IP address structure

A

split into two: network identifier and host identifier

110
Q

working out which subnet a device belongs to (e.g IP = 192.168.3.24, subnet = 255.255.255.0)

A

translate IP into binary, translate subnet mask, AND the two operations, translate back into denary

111
Q

FTP port

A

20/21 - sending files between devices, anonymously or non-anonymously

112
Q

SSH port

A

22 - remote management of computers, requires username/password and encrypts during transmissions

113
Q

HTTP port

A

80 - web server in text form

114
Q

HTTPS port

A

443 - same as HTTP but encrypts information, keeping it secure and free from tampering

115
Q

POP3 port

A

110 & 995 - retrieving emails from email server, checks and downloads new messages

116
Q

SMTP port (simple mail transfer protocol)

A

25, 587, 465 - used for sending emails

117
Q

socket address

A

when an IP address is combined with a port number, IP address, followed by colon and port number

118
Q

how is it possible for bit rate to be higher than baud rate

A

if each signal level represents more than one bit

119
Q

why might browsing the Internet be slower at a public hotspot than at home on a wireless network

A

at a public hot spot speed could be limited for each device, more clients connecting to one access point, might have less bandwidth, may be more collisions

120
Q

why do peripherals usually use a serial communication method instead of parallel

A

to avoid problems of cross-talk, cheaper to manufacture, might need greater distance

121
Q

explain why the LAN has been segmented

A

to reduce congestion by cutting number of collisions, improvs security by localising packet transmission to one segment

122
Q

what hardware component is needed for each device that is going to be connected to a wireless network

A

network interface card (NIC)

123
Q

explain role of SSID in wireless networking

A

identifier for wireless network, clients must use same SSID as one put in access point to join so clients are prevented from accessing network until they are using same SSID as access point

124
Q

why would preventing students from using wireless network improve the performance of school network

A

network has limited bandwidth so fewer devices means reduced likelihood of colliding or transmissions interference

125
Q

why is FQDN preferred to IP address

A

easier to remember as a human

126
Q

explain what NAT is and why it is used

A

modifying IP addresses as they pass through a router, used as private IP addresses used on LAN are not routable so cannot be used for routing on Internet, to improve security of LAN

127
Q

explain why programs written in JavaScript language are interpreted rather than compiled

A

Internet users have range of devices with different processors, compiled program will only execute on processor of specific type

128
Q

two differences between routable and non-routable IP addresses

A