4.9 - Communication and Networking Flashcards

1
Q

Serial Data Transmission

A

Data is sent via an interface, one bit at a time.
+ Very high rates of data transfer
+ Reliable over long distances
+ Higher net rate of data transfer
+ Smaller and less complex
+ Cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parallel Data Transmission

A

Multiple bits sent simultaneously over multiple wires. Used in RAM and other ICs.
- Each wire has slightly different properties, causing skew.
- Reliable over short distances.
- Interference between wires (crosstalk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bit Rate

A

Rate of data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baud Rate

A

Rate of signal change on a transmission medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Equation for bit rate

A

Bit Rate = Baud rate * bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bandwidth

A

Range of frequencies that can be carried by a transmission medium. Directly proportional to bit rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Latency

A

Delay between transmission of first bit and last bit recieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Synchronous Data Transmission

A

Data is transferred at regular intervals, per clock pulse. Allows for a constant and reliable data stream, often used in parallel transmissions (e.g. inside computer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asynchronous Data Transmission

A

Data transferred byte-by-byte. Each character is proceeded by a start bit and preceeded by a stop bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol

A

Rule for communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LAN

A

Local Area Network.
A collection of devices within a single building or site connected together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bus Topology

A

A single main cable that all devices are connected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Star Topology

A

Central node that all devices are connected to by their own link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logical Topology

A

The path the data travels in, rather than the physical layout of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC Address

A

Unique 48-bit address to identify a device. Written in HEX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Benefits of a Bus Topology

A

Cheaper than star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Drawbacks of a Bus Topology

A

Will fail if the main cable fails.
Performance will decrease under heavy load.
Not ideal security, as every computer has access to every transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Benefits of a Star Topology

A

Easy to locate faults.
Performs consistently.
No data collisions.
More secure as transmissions are only sent to the central device.
Easy to install new devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Drawbacks of a Star Topology

A

More expensive due to quantity of cabling required.
Will fail if the central device fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Client-Server Network

A

Every client is connected to a powerful central server and can hold their own files (although these are also stored on the central servers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Peer-to-peer Network

A

Computers are connected to each other over a LAN or a WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Benefits of a Client-Server Network

A

Good security as access rights controlled by central server.
Centralised control over backups, updates, printers, etc.
Easy to share resources across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Drawbacks of a Client-Server Network

A

Expensive installation.
Professional IT staff required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Benefits of a Peer-to-Peer Network

A

Cheap to set up.
Users can share resources.
Easy to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Drawbacks of a Peer-to-Peer Network

A

Widely used for piracy.
No centralised control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

WiFi

A

LAN technology that allows wireless connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Requirements for WiFi

A

Router
Wireless Access Point
Wireless Network Adaptor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Wireless Access Point

A

Allows WiFi-enabled devices to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Wireless Network Adaptor

A

Small component of a device that allows it to connect to WiFi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WPA2

A

WiFi Proteced Access 2.
Encrypts transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SSID

A

Service Set Identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CSMA/CA

A

Carrier Sense Multiple Access with Collision Avoidance.
Protocol for data transmission on a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Frame

A

Consists of data being sent and other info such as the header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

RTS/CTS

A

Request to Send / Clear to Send.
Used to check if a reciever is ready to recieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

URL

A

Uniform Resource Locator.
Address of a resource on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Contents of a URL

A

Protocol, host, domain name, folder, file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

TLD

A

Top-level domain (e.g. .com, .uk, .org)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

DNS

A

Domain Name Service.
Stores each IP address so it knows where to find each resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

FQDN

A

Fully-qualified domain name.
Includes host server name, domain name, TLDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Internet registries

A

5 global companies that have databases that hold records of all domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Data Packet

A

Small chunk of data to be transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Contents of a data packet

A

Header, payload and sometimes trailer.

44
Q

Data Packet Header

A

Contains info such as sender/destination socket addresses, protocol, TTL.

45
Q

TTL

A

Time to live.
Time until packet is destroyed.

46
Q

Router

A

Connects multiple networks together.

47
Q

Gateway

A

Translates between protocols.

48
Q

Firewall

A

Hardware/software method of preventing unauthorised access to a network.

49
Q

Aspects of a firewall

A

Packet filters.
Stateful inspection.
Proxy servers.

50
Q

Packet Filter

A

Examins socket address to decide whether to allow/deny the packet access to the network.

51
Q

Stateful Inspection

A

Examins packet payload to decide whether to allow/deny the packet.

52
Q

Proxy Servers

A

Intercept data packets in order to disguise their origin/destination.

53
Q

Encryption

A

Scrambling of data into ciphertext using a key.

54
Q

Ciphertext

A

Scrambled data that is uninterpretable without a key.

55
Q

Symetric Encryption

A

Using the same key to encrypt and decrypt.

56
Q

Asymetric (Public Key) Encryption

A

Using 2 separate, unrelated keys to encrypt and decrypt.

57
Q

If A encrypts data using B’s public key, who can decrypt and and with what?

A

B can decrypt using B’s private key.

58
Q

Public Key

A

Avaliable to all.

59
Q

Private Key

A

Avaliable to one user only.

60
Q

Digital Signature

A

Used to verify the authenticity of a transmission.

61
Q

Digital Certificate

A

Used to authenticate the sender of a transmission.

62
Q

How are digital signatures used to verify a message’s authenticity? (9 Steps)

A
  1. Digest produced from the message using a hash function.
  2. Digest encrypted using the sender’s private key. This is the digital signature.
  3. Signature added to the original message.
  4. Whole thing encoded by public key encryption (i.e. using reciever’s public key).
    On recieve…
  5. Decrypt with reciever’s private key.
  6. Separate message from signature.
  7. Decrypt signature with sender’s public key.
  8. Run the same hash function on the decrypted signature.
  9. Compare decrypted digest with newly generated digest.
63
Q

TCP

A

Transmission Control Protocol

64
Q

IP

A

Internet Protocol

65
Q

Application Layer

A

Selects the necessary protocol for data transmission.

66
Q

Transport Layer

A

Uses TCP to establish a connection with the recipient. Splits data into packets, each with a sequence number, total number of packets and port.

67
Q

Network Layer

A

Adds origin/destination IP to form the socket addresses. Routers operate on this level.

68
Q

Link Layer

A

Physical connection between different nodes on a network. Adds the MAC addresses from the origin/destination NICs.

69
Q

Why do the MAC addresses of packets change after each ‘hop’?

A

The packet passes through a new node, so MACs must change to reflect that.

70
Q

FTP

A

File Transfer Protocol

71
Q

HTTP(S)

A

Hypertext Transfer Protocol (Secure)

72
Q

SSH

A

Secure Shell

73
Q

POP3

A

Post Office Protocol v3

74
Q

IMAP

A

Internet Message Access Protocol (keeps emails on server).

75
Q

SMTP

A

Simple Mail Transfer Protocol.

76
Q

Port 20/21

A

Commonly used for FTP.

77
Q

Port 22

A

Commonly used for SSH.

78
Q

Port 23

A

Commonly used for Telnet.

79
Q

Port 25

A

Commonly used for SMTP.

80
Q

Port 80/8080

A

Commonly used for HTTP.

81
Q

Port 113

A

Commonly used for POP3.

82
Q

Port 143

A

Commonly used for IMAP.

83
Q

Port 443

A

Commonly used for HTTPS.

84
Q

IPv4

A

Dotted decimal address format that uses 32 bits (4 bytes).

85
Q

IPv6

A

128 bits, expressed in hexadecimal.

86
Q

2 parts of IPv4

A

Network ID
Host ID

87
Q

Classful IPs

A

Use different classes to determine the length of each part of the IPv4 address. Class A has 1 byte for network ID, class C has 3 bytes for network ID.

88
Q

Classless IPs

A

Number of bits in the subnet mask is specified (e.g. 122.324.654.211/24)

89
Q

Subnet Mask

A

Separates network/host IDs once bitwise ANDed with the IP.

90
Q

Subnet

A

Segment of large network with a unique identifier in the IP.

91
Q

Public IP

A

Routable.
Accessible from any computer in the world.

92
Q

Private IP

A

Non-routable.
Accessible on the LAN only. Requires NAT to access other resources/be accessed.

93
Q

DHCP

A

Dynamic Host Configuration Protocol.
Dynamically assigns IPv4s as and when they are requested.
Used on LANs and WANs.

94
Q

NAT

A

Translates and forwards data between routable and non-routable addresses.

95
Q

Port Forwarding

A

Allows external devices to communicate with those on a LAN.

96
Q

Client-server Model

A

A client requests data from a server and then recieves a reponse from the server.

97
Q

API

A

Application Programming Interface
Group of protocols that instruct applications how to interact with each other.

98
Q

REST

A

Representational State Transfer
Way of designing an API that uses HTTP requests for clients to interact with a database.

99
Q

JSON

A

JavaScript Object Notation
Compared to XML…
- easier to read
- more compact
- easier to create
- easier and quicker to parse

100
Q

XML

A

Extensible Markup Language
Compared to JSON…
- more flexible structure
- wider range of data types

101
Q

Websocket Protocol

A

Defines an API that allows for a full duplex connection between client and server (data can be sent at any time). Reduces packet header size.

102
Q

CRUD

A

Create, retrieve, update, delete.
Fundamental operations of a DBMS

103
Q

Thick-client

A

Handles all processing and storage on the client machine.

104
Q

Thin-client

A

Server does all processing, storage, etc.