4.9 Communication and networking Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the Internet?

A

The worldwide collection of networks that use the Internet Protocol Suite (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a router?

A

A device that receives packets on a network and forwards them to correct destinations based on an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a gateway?

A
  • A device that receives packets on a network and forwards them to correct destinations based on an IP address
  • A gateway is able to deal with packets travelling between networks using different protocols, by stripping off all of the header data and adding a new header in the format needed for the destination network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a domain name server?

A

A server that contains databases of IP addresses and their corresponding FQDNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IP address?

A

An IP address uniquely identifies a device on a network, and defines where it is located geographically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the link between a Domain Name and an IP address?

A

A domain name is a string that corresponds to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a packet and what are the main components of a packet?

A
  • A packet is what data being transported across a network is split into.
  • A packet is made up of the header and the payload.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an NIC?

A
  • A hardware component that connects to the motherboard and is hardwired with a unique MAC address
  • It allows a computer to connect to a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the steps in packet switching?

A
  1. Data is split into packets.
  2. Header is added to packet
  3. Packets are sent along the network, not necessarily along the same route
  4. Once packets arrived, they are re-ordered using their sequence number
  5. Acknowledgements sent from recipient to sender for each packet
  6. Transmission of a packet happens again if no acknowledgement is received
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TCP/IP stand for?

A

Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four layers of the TCP/IP protocol stack?

A
  1. Application Layer
  2. Transport Layer
  3. Network Layer
  4. Link layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the application layer do?

A
  • It uses an appropriate protocol relating to whatever application is being used to transmit data
  • It also interacts with the user via appropriate application software or the users system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the transport layer responsible for?

A
  • establishing the โ€œend-to-endโ€ connection
  • splitting the data into packets once the connection is made
  • sends and receives acknowledgments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does transport layer add to each packet?

A
  1. The sequence number
  2. The total number of packets
  3. The port number the packet should use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol does network layer use?

A

IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocol does transport layer use?

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does network layer add to each packet?

A
  1. Source IP address
  2. Destination IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a MAC address?

A

A unique 12-digit hexadecimal address hardcoded on each NIC for use as an address in network communications to uniquely identify any device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the link layer do?

A
  • Adds the MAC addresses of the source and destination device
  • The MAC addresses are changed at each hop on the route
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a socket?

A

A socket is the IP address (provided by the IP protocol) combined with the port (provided by the TCP protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a port?

A

The port determines what application on the device needs the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does SSH work?

A

SSH uses for port 22. It uses public key encryption to authenticate the user and prevent unauthorised access.

  1. ๐Ÿ‘‹ The client initiates the TCP connection by contacting the server
  2. ๐Ÿ”‘ The server sends a public key to the client
  3. ๐Ÿค The server and client agree communication rules and open a secure channel
  4. ๐Ÿ The user can now login to the remote server host operating system and can issue application layer commands such as GET for HTTP, and SMTP and POP3 commands for sending and retrieving emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does SMTP work?

A

SMTP sends the email from the client device to the linked mail server or forwards the email to the recipientโ€™s mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does POP3 work?

A
  1. Retrieves email from a mail server
  2. Removes it from the server
  3. Transfers it to your device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does HTTPS work?

A

HTTPS uses encryption to secure the data being transferred, and authenticates the web server through certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How does HTTP work?

A

The web client sends a request message to a web server and the web server sends back a response message containing the data needed to display the webpage (or other web resource).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does FTP work?

A
  • FTP commands can be issued from a command line interface, but more commonly a user interacts with an FTP client, which sits on top of the actual FTP protocol.
  • Once logged in, the user can access directories on the FTP server and can download and upload files.
  • FTP sites which are publicly available are known as anonymous FTP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does SSH stand for and what is its purpose?

A
  • Secure Shell
  • Used to provide an encrypted connection for remote access to another computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does SMTP stand for and what is its purpose?

A
  • Simple Mail Transfer Protocol
  • Used to send emails from client device to the linked mail server or to forward the email to the recipientโ€™s mail server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does POP3 stand for and what is its purpose?

A
  • Post Office Protocol (v3)
  • Used to retrieve emails from an email server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does HTTPS stand for and what is its purpose?

A
  • Hypertext Transfer Protocol Secure
  • HTTPS is used for accessing a webpage from a web server securely. HTTPS encrypts data between the client and server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does HTTP stand for and what is its purpose?

A
  • Hypertext Transfer Protocol
  • HTTP is used for accessing a webpage from a web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does FTP stand for and what is its purpose?

A
  • File Transfer Protocol
  • Used to move files between two devices. (commonly used to transfer data and programs as opposed viewable content)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a URL?

A
  • A Uniform Resource Locator (URL) is the address of a webpage or other internet resource
  • It indicates the location of a resource as well as the protocol used to access it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

โ€˜www.w3schools.comโ€™ is an example of aโ€ฆ

A

Fully qualified domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

โ€˜wwwโ€™ is an example of aโ€ฆ

A

Host name or subdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

โ€˜w3schools.comโ€™ is an example of aโ€ฆ

A

Domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

โ€˜/cs/cs_operators.aspโ€™ is an example of aโ€ฆ

A

Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the purpose of a domain name?

A
  • A domain name identifies an organisation or individual on the internet.
  • They use alphanumeric characters which make them easier for humans to remember than IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the purpose of a domain name server?

A

To translate a fully qualified domain name into its corresponding IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the domain name system?

A
  • The domain name system is a distributed database of mappings from FQDNs to their corresponding IP addresses
  • DNS servers are organised into a hierarchy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What happens is a domain name server cannot resolve a lookup?

A

The query will be passed to another DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Who manages top level domains?

A
  • An (internet) registry
  • Each TLD may have restrictions as to who can use it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the main responsibility of an internet registry?

A

To maintain a definitive register of who owns a specific domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Give two examples of top level domains

A

.uk .org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is meant by baud rate?

A

The maximum number of signal changes in a medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is meant by bit rate?

A

The number of bits transmitted over a medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Bit rate equation

A

bit rate of channel = (baud rate) x (number of bits per signal change)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is Serial Data Transmission?

A

Bits are sent one after the other over a single wire from source to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Parallel Data transmission?

A
  • Multiple bits are sent simultaneously over multiple wires from source to destination
  • Each bit is sent down a different wire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

2 problems with Parallel Data transmission

A
  • Unreliable because of skew
  • Parallel wires also suffer from crosstalk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is skew?

A

As each wire has slightly different properties, there is a possibility bits could travel different speeds over each of the wires and arrive at different times, meaning the signals might overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is cross-talk?

A

Interference between different lines, which causes data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

3 advantages of serial over parallel transmission

A
  1. Serial transmission doesnโ€™t suffer from skew or cross-talk
  2. Serial is reliable over much longer distances
  3. Serial transmissions tends to be cheaper, as there is much less complexity and the physical size of cables is smaller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is bandwidth? What unit is it measured in?

A
  • A measure of the maximum capacity of a communication channel
  • It is directly proportional to bit rate
  • Measured in bits per second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is latency?

A

A time delay before some component in a computer system responds to an instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is synchronous transmission?

A
  • Data is transferred at regular intervals, synchronised by a clock signal
  • Receiver and transmitter clocks are synchronised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is asynchronous transmission?

A
  • Receiver and transmitter clocks only need to be synchronised for the duration of data transmission
  • Blocks of data are sent as soon as they are ready
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How are start and stop bits used in asynchronous transmission?

A
  • Start bit is sent to synchronise the clock in the receiver to the transmitter clock
  • Stop bit allows the receiver time to process the current block of data before another is sent
  • Stop bit is opposite to start bit to allows the next start bit to be recognised
60
Q

What does a firewall do?

A

Blocks or allows network traffic, based on predefined or dynamic rules and policies

61
Q

What is packet filtering?

A

When a firewall monitors outgoing and incoming packets and allowing them to pass or halt based on
- source and destination IP addresses
- protocols / ports

  • Each packet is analysed separately
62
Q

What is stateful inspection?

A
  • When the firewall monitors the incoming and outgoing traffic from all ongoing TCP connections by:
    โ€“ Analysing packet types
    โ€“ Inspecting the payload
    โ€“ Checking for suspicious activity (eg lots of outgoing data)
  • Connected packets are analysed together
63
Q

What is a proxy server?

A
  • A server that sits โ€‹between the network hosts and the firewall
  • Packets are sent outside the network by the proxy server (on behalf of the network hosts)
  • Provides anonymity, caching, and logging of user activities
64
Q

What is a worm?

A

A piece of malicious software that can self-replicate between computers, either within a network (such as the Internet) or by a user downloading and running and malicious files.

Unlike viruses, worms are complete programs - they do not require a host program to cause damage.

65
Q

What is a virus?

A
  • A virus is a small program of self-replicating software that is attached to other program or files
  • Viruses require a host file in which to reside
66
Q

What is a trojan?

A
  • A type of malware that is disguised as a legitimate benign file that users can be tricked into opening
  • They can delete and modify data and allow more malware in once they are opened
67
Q

3 ways to prevent malware

A
  1. Improving code quality
  2. Monitoring
  3. Protection (e.g. up to date antivirus programs)
68
Q

What is a network topolgy?

A

The way a network and its connected devices (computers, printers, servers etc.) are connected

69
Q

3 disadvantages of bus networks

A
  1. If main cable fails no network data can be transmitted
  2. Performance degrades heavily with increased traffic
  3. Security is poor as all computers on the network can see all transmissions
70
Q

2 disadvantages of star networks

A
  1. If central node goes down the whole network canโ€™t transmit / receive data
  2. Can be costly to set up and install as lots of cabling is needed
71
Q

How long is an IPv4 address and what is it split into?

A
  • 32 bits (e.g. 192.168. 10.150)
  • Network ID and Host ID
72
Q

What is a subnet mask used for?

A

Identifying the Network ID part of an IP address (bitwise AND operation applied to subnet mask and IP address)

73
Q

How long is an IPv6 address and why was it introduced?

A
  • 128 bits (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:73)
  • Introduced to ensure there would be enough addresses for all devices to have a unique one - as IPv4 addresses are running out
74
Q

What is the difference between routable and non-routable IP addresses?

A
  • Routable IP Addresses must be public addresses. They are unique on a global scale, and are allocated by a regional issuing authority.
  • Non-routable IP addresses are assigned internally to devices on a private network. Many devices may have the same private address.
75
Q

What is NAT?

A
  • A process in which a router translates one or more non-routable IP addresses into one or more routable IP addresses and vice versa in order to provide Internet access to the local hosts
  • A single routable IP address can be used for an entire private network
76
Q

What is port forwarding?

A
  • An application of network address translation (NAT) that redirects a communication request for the public IP address using a specific port to a pre-selected private host
  • The port number is unchanged (forwarded)
77
Q

What is the purpose of port forwarding?

A
  • Allows computers outside the LAN to connect to a specific computer (and port) within the LAN
  • Needed if you want to have a (web) server inside the LAN
78
Q

How to determine if two computers are on the same subnet

A

Bitwise AND operation of subnet mask with both computerโ€™s IP addresses. The result of the AND operations are the network IDs. These are then compared.

79
Q

How does routing work?

A
  • Routers are organised into a hierarchy
  • The path to take is selected by each router, determined by the Network ID of the destination IP address
  • Each router decrements the โ€œtime to liveโ€ of the packets
  • Source and destination MAC addresses changed at each hop
  • Network Address Translation will occur at routers at either end
80
Q

What is the purpose of DHCP?

A

To automate the allocation of IP addresses (configuration) to hosts on a network

81
Q

Why is DHCP used?

A
  • Reduces the need for expert knowledge when configuring a host
  • Reduces the time required to configure hosts
82
Q

How is an IP address configured using DHCP?

A
  1. Host sends request to discover a DHCP server
  2. DHCP server offers configuration to host
  3. Host accepts configuration by echoing the accepted configuration back to the server
  4. DHCP server confirms that configuration has been allocated to host
83
Q

Explain how a router can be been configured so that a Web Server on a LAN can be accessed by computers outside the LAN

A
  • Port forwarding
  • Router must forward all traffic arriving on the HTTP(S) port to the IP address of the Web Server
84
Q

What is a client port?

A

A port automatically allocated to a client that is temporarily assigned and only exists for the duration of a connection.

85
Q

Why must a web server use well known port numbers?

A

Communication is initiated by clients, so clients must know which port number to connect to before communication with the server starts.

Also, particular port numbers are used to provide a particular service.

86
Q

What is a protocol?

A

A set of agreed rules relating to communication between computer devices

87
Q

3 differences between symmetric and asymmetric encryption

A

S: Uses same key for both encryption and decryption
A: Doesnโ€™t

S: Have to distribute the key without interception
A: Donโ€™t

S: Faster
A: Slower, but provides both confidentiality and authentication

88
Q

Asymmetric encryption: A sends to B

A
  1. A encrypts the message with Bโ€™s public key
  2. B decrypts with their own private key (the only key that can do this)
89
Q

Asymmetric encryption: A sends to B, and B can verify that A is the sender

A
  1. A encrypts the message with Bโ€™s public key and Aโ€™s private key
  2. B will decrypt with Bโ€™s private and Aโ€™s public key
90
Q

What is the purpose of digital signatures?

A

To confirm the identity of the sender, and to detect if a message or document has been tampered with

91
Q

Describe how A can use a digital signature when sending a document to B

A
  1. A hashes the document, creating a message digest
  2. A encrypts this message digest with their private key. This encrypted hash is known as the digital signature
  3. The digital signature is appended to the message
  4. (This may now be encrypted with Bโ€™s public key, sent to B, and decrypted by B using their own private key as normal)
  5. B decrypts the digital signature with Aโ€™s public key, to reveal the message digest. B also hashes recalculates the hash for the document. If the result of these procedures is the same, then the message has not been tampered with and the identity of the sender is authenticated.
92
Q

Anyone could create a digital signature and claim they are a trusted individual. How do we solve this?

A

Digital certificates are used to verify the senderโ€™s identity

93
Q

What is a digital certificate? (2*)

A
  • An electronic document that authenticates a message sender or a website
  • It contains the senderโ€™s public key as well as some information about them
94
Q

How can a digital certificate be created for A? What do they contain?

A

A trusted individual (certificate authority) signs a copy of Aโ€™s public key as well as some information about A.
Digital certificates will contain:
- ๐Ÿ”ข Serial number
- ๐Ÿท๏ธ Name (e.g. domain name for website digital certificates)
- ๐Ÿ“… Expiration date
- ๐Ÿ”‘ Copy of the certificate holderโ€™s public key

95
Q

How are digital certificates used by modern web browsers?

A
  • Modern web browsers check the digital certificate of each secure website as a standard security measure.
  • If the certificate is suspicious or out of date, the site is blocked.
96
Q

Why are key-exchange algorithms needed?

A

In order to distribute the key securely in symmetric encryption systems.

  • Asymmetric encryption algorithms are nearly always much more computationally expensive than symmetric ones
  • So in many cases it is common to exchange a shared key using a key-exchange algorithm, and then to transmit the data using that key and a symmetric key algorithm.
    (e.g. SSH and SSL/TLS)
97
Q

Difference between Physical vs Logical topology

A

Physical: The physical layout of the connections between computers on the network

Logical: How the packets flow around a network

98
Q

How is data transferred between client and server in the client-server model?

A
  1. The client sends a request to a server
  2. The server responds with the data that was requested

(Most computers are nominated as clients and one or more as servers)

99
Q

What does the websocket protocol do?

A

The Websocket protocol defines an API establishing a full-duplex โ€˜socketโ€™ connection between a web browser and a server over TCP

100
Q

What does full-duplex mean?

A

Data can be transmitted in both directions at the same time

101
Q

What is the purpose and advantage of using the websocket protocol?

A
  • To provide a persistent bidirectional connection between client and server, allowing both parties to send data at any time
  • The connection is also fast and real-time, and overheads are small leading to reduced packets sizes
102
Q

4 examples of where websocket protocol is used

A
  • ๐Ÿ‘พ online gaming
  • ๐Ÿ’ฌ instant messaging
  • ๐Ÿ“น video streaming
  • โ˜๏ธremote cloud based document collaboration
103
Q

What is CRUD?
CRUD stands forโ€ฆ

A

The four fundamental operations for any database or content management system:
- Create
- Retrieve
- Update
- Delete

104
Q

What does REST stand for?

A

Representational State Transfer

105
Q

What is the relationship between REST, CRUD and SQL?

A

REST enables CRUD to be mapped to SQL database functions

106
Q

Create keywords: CRUD โ†’ HTTP request โ†’ SQL

A

Create โ†’ POST โ†’ INSERT

107
Q

Retrieve keywords: CRUD โ†’ HTTP request โ†’ SQL

A

Retrieve โ†’ GET โ†’ SELECT

108
Q

Update keywords: CRUD โ†’ HTTP request โ†’ SQL

A

Update โ†’ PUT โ†’ UPDATE

109
Q

Delete keywords: CRUD โ†’ HTTP request โ†’ SQL

A

Delete โ†’ DELETE โ†’ DELETE

110
Q

Explain how a REST API allows a client browser to access a database

A

The REST API allows JavaScript to talk to a database through HTTP.

  1. The client browser creates a HTTP request, calling the REST API
  2. The REST API is created and run on the server
  3. The server responds to the clientโ€™s requests using either JSON or XML
  4. The clientโ€™s browser processes the JSON or XML and displays the response to the user
111
Q

What is the advantage of using REST?

A
  • The client computer needs no knowledge at all of how the database server works
  • So clients and servers can be developed independently
112
Q

What are JSON and XML both examples of?

A

Standards for transferring data between a server and an application

113
Q

What does JSON stand for?

A

Java script object notation

114
Q

4 advantages of JSON over XML

A
  1. Easier for a human to read
  2. More compact (so quicker to transmit)
  3. Easier to create (as syntax is simpler)
  4. Easier for computers to parse and therefore quicker to parse
115
Q

What is thin-client computing?

A
  • When the processing / storage is carried out on the server
  • The server needs lots of RAM, many secondary storage devices, and more processors
  • The client needs a high bandwidth internet connection
116
Q

What is thick-client computing?

A
  • When the processing / storage is carried out on the client
  • The client needs greater RAM, secondary storage and processing capacity than more thin clients
  • Less reliance on an internet connection to do stuff
117
Q

3 examples where thick-client computing is preferred

A
  • ๐Ÿ‘พ gaming
  • ๐Ÿ“น (professional) video editing
  • ๐Ÿ”ฌ simulation/research
118
Q

3 advantages of thick-client computing

A
  1. Internet connection not needed to do useful stuff
  2. More flexible in what can be done (not limited by what cloud-based services exist)
  3. Users can more easily keep data private
119
Q

3 disadvantages of thick-client computing

A
  1. More expensive to buy and maintain
  2. Client is responsible for back-up of files
  3. Client is responsible for update of software
120
Q

3 advantages of thin-client computing

A
  1. Cheaper to purchase, due to the lower hardware specification
  2. Simpler updating of software, as this is done by the server
  3. Server is also responsible for backups
121
Q

3 disadvantages of thin-client computing

A
  1. Higher bandwidth internet connection is needed to be useful
  2. Limited to what cloud-based services exist and how they work
  3. Potential privacy concerns as entrusting a third-party to look after your files
122
Q

4 reasons why setting up and maintaining client-server networks is more expensive (than P2P)

A
  • ๐Ÿ”‹ The servers need to be more powerful machines
  • ๐Ÿ’พ The servers need more secondary storage space
  • โฑ๏ธ They need to be always on
  • ๐Ÿ“ˆ As more hosts connect to a P2P network, the resource supply increases. Whereas when more hosts connect to a single server, the more powerful and expensive the machines need to be
123
Q

6 differences between client-server and peer-to-peer networks

A

CS : The server has authority over the service
P2P : All computers have equal status - clients share resources and computing power

CS : Clients access resources from the server
P2P : Resources are stored on the computers, and any computer can access resources directly from any other - there is no dependence on a central server

CS : Server failure disrupts all computers on the network
P2P No single point of failure

CS : Configuration is more complex, and setting up and maintaining the network is more expensive
P2P : Cheaper to set up and maintain

CS : Supports centralised backups
P2P : Backups need to be made locally

CS : Improved security management, as security management can be centralised
P2P : Management of security must be managed individually on each computer

124
Q

3 examples of where a client-server network might be used

A
  • Personal web server for hosting a simple website with a limited number of users
  • Cloud-based gaming platforms
  • College
125
Q

3 examples of where peer-to-peer networks are/could be used

A
  • Home network with a small number of trusted devices
  • Decentralised cryptocurrencies (e.g. Bitcoin)
  • BitTorrent protocol
126
Q

What is the purpose of wireless networks / WiFi?

A

To allow devices to communicate within a network without being physically connected to it

127
Q

What is WiFi?

A

A type of wireless local area network (WLAN) that is based on international standards

128
Q

2 components needed for wireless networking

A
  • Wireless network interface card
  • Wireless Access Point
129
Q

3 ways to secure a wireless network

A
  • Encryption of data using WPA or WPA2
  • Disabling the SSID broadcast
  • MAC address allow lists
130
Q

What does WPA stand for?

A

Wifi Protected access

131
Q

What is the main difference between WPA and WPA2?

A

WPA2 is more secure

132
Q

What is an SSID?

A
  • A Service Set Identifier (SSID) is a locally unique identifier for a wireless network
  • They use alphanumeric characters that are specified during the setup of the wireless network
  • This SSID is used by all devices which want to connect to that network
133
Q

How can disabling the SSID broadcast improve security on a wireless network?

A

The SSID broadcast can be disabled in order to make it hidden, only allowing those who know the SSID to try to connect

134
Q

How can a MAC address allow list be used to improve security on a wireless network?

A
  • MAC address allow lists can be created to only allow specific devices to connect to a network
  • Each MAC address is unique to each NIC
  • The WAP checks the MAC addresses of devices trying to connect against a list of allowed devices
  • Only devices with an allowed MAC address are able to connect
135
Q

What does CSMA/CA stand for?

A

Carrier Sense Multiple Access with Collision Avoidance

136
Q

What do RTS / CTS stand for?

A

Request to Send / Clear to send

137
Q

How does CSMA/CA work (without RTS/CTS)?

A
  1. ๐Ÿ‘‚ When a device is ready to transmit, it listens to its communication channel to check if it is idle
  2. โณ๏ธ๐ŸŽฒ If there is a data signal present, it means another transmission is in progress, so the device waits for a random period of time
  3. ๐Ÿ“ฎ When no data signal is present, the device sends its data
  4. โœ… Once the destination device (e.g. WAP) receives the data, it will respond back with an acknowledgment
  5. โณ๏ธ๐ŸŽฒ If this acknowledgement is not received, the sending device waits for a random time period and the process begins again
138
Q

What extra steps are required in CSMA/CA in order for RTS/CTS to be used?

A
  1. Before a device sends a message, a Request to Send is sent
  2. The WAP responds with a Clear to Send signal to only one device at a time, and only that device transmits its data
  3. If a CTS is not received the device must wait a random amount of time and try again
139
Q

Which of packet filtering and stateful inspection are more advanced?

A

Stateful inspection

140
Q

3 things that are better about IPv6

A
  • There arenโ€™t enough unique addresses in IPv4 - there are many more IPv6 addresses as they are much longer
  • IPv6 eliminates the need for NAT
  • Automatic host configuration is possible without DHCP
141
Q

Which host ID is reserved as a network identifier?

A

Host ID = all zeros

142
Q

State the name of the problem that RTS/CTS overcomes

A

The Hidden Node problem

143
Q

Describe the Hidden Node problem in the context of computers A and B both trying to transmit data to a WAP

A

If A is transmitting data to the WAP, and B is outside the transmission range of A, then B might start transmitting its own data, causing a collision

144
Q

Which is better, JSON or XML?

A

JSON

145
Q

What is the key exchange problem?

A

How do we pass the key from sender to receiver without it being intercepted?