4.9 communication and networking Flashcards

1
Q

protocol

A

**a set of rules **defining how devices will communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does the protocol need to define

A
  • standards for physical connections and cabling
  • bit rate or baud rate
  • data format
  • transmission a/synchronous
  • error checking procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

serial data transmission

A

data is sent one bit at a time over one communication line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

serial data cables include?

A

the usb (universal serial bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

parallel cables are?

A

a ribbon of several smaller cables used primarily for connecting internal components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

parallel data transmission

A

several bits are sent simultaneously along separate lines, only reliable over short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

serial vs parallel connectors

A
  • serial connectors (USB) much smaller + cheaper than parallel connectors
  • a PC has several USB ports for connecting peripherals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

advantages of serial transmission over parallel transmission

A

requires less wires: lower cost, less difficult to manage when setting up the system
no risk of crosstalk/skew over long distances, as only one bit is transmitted at a time — less chance of errors, no limiting factor on transmission speed, no limiting factor on cable length (for skew)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

skew

A
  • bits transmitted across parallel links travel at diff speeds
  • in synchronous data transmission, results in data falling out of sync with clock signal, data not read correctly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when is skew worst

A
  • over long distances
  • higher transmission speeds
  • in extreme cases can lead to bits from different pulses overlapping, causing data corruption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

crosstalk

A
  • when comm lines tightly packed, signals from one line can ‘leak’ into another, causing data corruption
  • worse with higher transmission speeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

synchronous transmission

A
  • clock signal times when signals are sent
  • signals, sent at regular intervals, received in same order that they were sent
  • suitable for transmitting info in real-time systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

asynchronous transmission

A
  • no clock signal
  • start and stop bits used to indicate duration of byte transmission
  • each byte sent separately the moment it is available, doesn’t wait for clock signal
  • also has a parity bit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

purpose of start bit in asynchronous data transfer

A

start the receiver clock;
synchronise the clock in the transmitter to the receiver clock;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

purpose of stop bit in asynchronous data transfer

A

allows next bit to be recognised;
provides time for receiver to process the received data;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

benefits/issues with asynchronous transmission

A
  • relatively slow owing to the increased num of bits being sent
  • cheap and effective form of serial transmission well suited to low-speed connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

bit rate equation

A

baud rate x no. of bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

difference between physical and logical topology

A

physical: the architecture of the connections (between devices on the network);
logical: how the packets flow around a network;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

physical bus topology

A
  • connects clients to a single cable called a backbone
  • terminator placed at either end of the backbone
  • no need for a central hub, server connected to back bone like a client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

operation of logical bus network topology

A

a node broadcasts data (to the entire network);
all nodes on the network receive the data;
a node examines the received data to check if it is the intended recipient;
only one node can transmit data at a time;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

advantages of physical bus topology

A
  • no central hub, reducing chance of network failure + decreasing cost of installation
  • inexpensive to install as min length of cable is required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

disadvantages of physical bus topology

A
  • packets sent through shared backbone, every client on network can see packets not intended for them
  • backbone used for communication by multiple clients, risk of collisions
  • backbone failure = entire network failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

advantages of physical star network topology

A
  • packets sent directly to recipient, over a cable connected only to the recipient. other clients can’t see
  • easy to add/remove clients
  • each cable has just one device comming over it, eliminating collisions
  • failure of one cable does not affect entire network performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

disadvantages of physical star network topology

A
  • central hub failure = all comms over the network are stopped
  • expensive to install due to amount of cables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

how can a physical star topology behave logically as a bus network?

A

use a bus transmission protocol;
use appopriate physical switching (hub transmits data to all devices);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

client-server network

A

one or more central servers provide services to the clients on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

features of a client-server network

A

resources are stored on the server;
centralised security management, including levels of access;
complex and expensive setup and maintenance;
servers accessible at all times;
centralised backups + security + software distribution + data storage;
expandability, able to deal with network growth;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

features of a peer-to-peer network

A

resources stored on each individual device;
any device can access/share resources from any other (files can be distributed across the network;
each device can act as both client and server;
security management may be more difficult;
devices communicated directly with each other, no central server;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

peer-to-peer on a WAN

A
  • p2p configuration can also be used for file-sharing websites
  • with thousands of people downloading, data passed between computer rather than from server
  • p2p networks often used for torrenting, as they’re hard to close down
30
Q

wi-fi

A

wireless networking tech providing high-speed internet and network connections

31
Q

connecting to a wireless network needs

A
  • ISP (internet service provider)
  • WAP, modem and router
  • device with a NIC / network interface card
32
Q

wireless components

A
  • wireless NIC
  • stations (consisting of device w/ wireless NIC)
  • WAP requires connection to a router, router requires a connection to a modem
33
Q

advantages of a wireless adapter for a printer

A

easy to share printer between many devices;
can connect directly from devices with WiFi;
printer can be managed remotely;

34
Q

MAC addressing

A
  • every networked device contains a NIC
  • each NIC attributed unique MAC address hard-coded in the manufacture
  • a switch holds all MAC addresses for each device connected to it, uses these to direct packets of data to correct device
35
Q

how can disabling SSID broadcasting increase the security of a wireless network

A

the SSID of the network will not be visible when trying to connect to a network;
therefore only users who know the SSID of the network can try to connect;

36
Q

what is csma/ca

A

protocol used in wireless networks to avoid data collisions (by each station transmitting only when channel is idle)

37
Q

hidden nodes

A
  • sending device can only check if channel is idle if within its broadcast range
  • a device can be out of range of the other device, but still on the network connecting them (i.e., within range of WAP)
  • therefore they could both be sending data to WAP at same time, but would be unaware of the other device, meaning WAP unable to receive any data due to data collisions
38
Q

bit rate

definition

A

the frequency at which bits can be transmitted per second

39
Q

latency

definition

A

time delay between signal being transmitted and arriving

40
Q

how can the use of a MAC address white list increase the security of a wireless network

A

a MAC address is unique to evert NIC;
a white list only allows those MAC addresses that have been authorised to connect to the network;

41
Q

operation of a physical star topology

A

every device is connected to a central switch/hub;
every device sends data via the central switch/hub;
the switch sends packets of data to the intended recipient only // the hub sends every packet of data to every device;

can be either hub or switch in answer - learn both

42
Q

baud rate

definition

A

the number of signal changes in a second

43
Q

bandwidth

definition

A

the range of frequencies that can be transmitted across a network connection

44
Q

how do WPA/WPA2 protect a network

A

WPA/WPA2 encrypted data reduces chance of unauthorised devices reading transmitted data;
if transmissions are intercepted, they cannot be understood by someone who does not have the key;

45
Q

CSMA/CA and RTS/CTS

method - transmitting and receiving data

A

transmitting device checks for traffic;
if another transmission in progress, then transmitter continues to wait;
if channel detected as idle, transmitter sends RTS;
two devices could start transmitting simultaneously if they both detect there is no signal;
receiver responds with CTS signal;
if CTS not received, transmitter waits until end of transmission before resending RTS;
if CTS received, transmitter begins transmitting data;
receiver sends ACK ** after all data received**;
if no ACK received then data is resent;

46
Q

majority voting during transmission

A

transmitter would send each bit an odd number of times;
receiver checks the bits received, and if they are not all the same, it assumes the one it received most copies of is the correct value;

47
Q

advantages of majority voting over parity bits in data transmission

A

parity bits can only detect errors, not correct them;
majority voting can detect multiple errors;
majority voting is more efficient at detecting errors;
majority voting can detect an even number of errors;

48
Q

how is it possible for the bit rate of a communications channel to be higher than its baud rate?

A

if more than one bit is encoded in each signal change

49
Q

how will the receiver perform even parity error detection on a received byte

data transmitted in bytes : 7 data bits + 1 parity bit

A

if number of 1s in the byte is even, the data is received correctly;
if the number of 1s received is odd, the data has been corrupted;

50
Q

what is a check digit and how is it generated

A

consists of a digit calculated;
from the other digits in the input sequence;

51
Q

how would a parity bit be generated, using even parity?

A

number of 1s is counted;
if the total is even, parity bit is set to 0, otherwise it is set to 1;

the bits are XOR’d with each other;
the result is the parity bit

seemingly two different methods - only need to learn one i think

52
Q

purpose of the DHCP system

A

to automate the configuration of hosts connecting to a (TCP/IP) network

53
Q

advantages of the DHCP system

A

reduces the time required to configure hosts;
enables reuse of IP addresses;
avoids errors, such as duplicating IP addresses or programming incorrect subnet mask;

examples in second point are important for getting the mark

54
Q

what happens when device communicates with DHCP server

A

host sends request to discover a DHCP server;
DHCP server offers configuration to host;
host accepts offer of configuration from DHCP server;
DHCP server confirms that configuration has been allocated to host;

55
Q

how will an External Router be configured so that a web server can be accessed by computers outside the netowrk?

web server has non-routable IP address, cannot be accessed directly from outside the network. therefore, access to web server facilitated by External Router, which supports Network Address Translation (NAT) and port forwarding

A

traffic arriving on the HTTPS port;
must be forwarded (by the External Router) to the IP address of the web server;

56
Q

how will the transport layer of the TCP/IP stack determine which application layer software of the server should deal with a received request?

A

the transport layer will use the port number, by adding the port number to the request;

57
Q

functions of the network layer of the TCP/IP stack

A

adds source IP / destination IP addresses to datagrams;
determines where to send data to using destination IP address;
creates checksum for datagram;
splitting data into datagrams // reassembling data from datagrams;

58
Q

why could JSON be better than XML?

A

more compact;
facilitates faster transmission;
uses less memory;
structure understood directly in some languages;
support for arrays;
easier for humans to write and understand;

59
Q

how can multiple devices connected to the internet have the same IP address and still communicate with each other?

A

the computers have private/non-routable IP addresses;
NAT will be performed (so that computers can communicate on the Internet);

second point has a longer, more complex explanation: as data passes onto Internet, private IP address replaced with public IP address of router;

60
Q

different ways a firewall can protect a LAN

A

block/allow (traffic on) specific ports;
block/allow (traffic from) specific IP addresses;
block/allow certain types of packet;
firewall maintains information about current connections and only allows packets relevant to these connections through;
act as a proxy server;
identify unusual behaviour from a host;
rules are written to specift conditions under which to block/allow;

61
Q

how can a checksum be used to determine if a received packet has been changed during transmission?

A

checksum produced when packet transmitted;
checksum calculated from packet contents;
MOD operation used to limit magnitude of checksum;
checksum transmitted with packet;
receiving device recalculates checksum;
received and calculated checksums compared;
if checksums match, packet contents are accurate;

62
Q

how is a packet routed across the Internet?

A

heirarchical organisation of routers, eg passed up to national router, transferred internationally and then passed back down a heirarchy;
path to take selected by each router;
route may change as a result of congestion;
possible repackaging of packet to use different protocol;
route determined using the IP address;
router decrementing “time to live” of packet;
source and destination MAC addresses changed at each router;
NAT will occur at router(s);

63
Q

how can a subnet mask be used to determine whether or not a device can send a packet to another device across LAN or the Internet?

A

AND operation of subnet mask with device A’s IP address;
AND operation of subnet mask with device B’s IP address;
result of each AND operation is the subnet ID;
subnet IDs compared;
as they are different, then packet must be sent via Internet;
if they were the same, packet can be sent directly to device B;

(if they were the same, device B is on the same subnet)

64
Q

relationship between bit rate and baud rate for a system that can transmit 4 different signals

(each different signal represents 2 bits of data)

A

bit rate is double the baud rate

65
Q

relationship between bit rate and the bandwidth of the transmission medium

A

they are proportional // the greater the bandwidth, the higher the bit rate;

66
Q

why has IPv6 been introduced to replace IPv4?

A

not enough unique addresses in IPv4;
eliminate need for NAT;
more efficient routing is possible;
improved facilities for multicasting;
automatic configuration possible without DHCP;
allows bigger packet sizes;
devices can move between locations and keep same IP address;
improved support for prioritising traffic by type;

67
Q

advantages of a thin-client system over a thick-client system

A

clients are cheaper to purchase;
less configuration of clients is necessary;
simpler installation of software;
more secure as fewer settings can be changed;
workstations consume less power;
workstations need less maintenance;

68
Q

what is thin client computing?

A

applications are executed on an application server

69
Q

purpose of a DNS system

A

translates Fully Qualified Doman Names into IP addresses

70
Q

how does a DNS system work

A

DNS stores a databse of FQDNs and corresponding IP addresses;
individual mappings are only known by some DNS servers;
DNS servers organised into a heirarchy;
if one DNS server cannot resolve a lookup, the query will be passed to another DNS server;

71
Q

hardware requirements for a thin-client system

(all opposite for thick-client system!)

A

higher bandwidth network connection required;
client: slower processor needed;
client: reduced RAM needed;
client: no secondary storage required in workstations;
server: multiple processors needed;
server: a lot of RAM needed;
server: many secondary storage drives needed;