4.9 Fundamentals Of Communication And Networking Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define Symbol

A

The symbol is a particular pattern of bits represented by signal, for example, 1011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Baud Rate

A

Refers to the number of signal changes in the medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Bit Rate

A

Number of bits transmitted over the medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Calculation for Bit Rate

A

(Baud Rate) x (N. of Bits per signal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Bandwidth

A

Relates to the range of frequencies of a communication medium is able to transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Latency

A

Is the difference in time between the initialisation of the action, and it’s affect being noticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Protocol

A

Our set of rules relating to communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serial data transmission

A

Data is sent one bit at a time over one communication line, for example, metal wire, optical, fibre or wireless channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Parallel data transmission

A

Uses numerous parallel communication lines in order to send multiple bits simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Skew

A

A problem which occurs on parallel transmission lines, the longer the line, the more likely it occurs. This may be due to slight differences in the electrical properties and therefore making bits arrive at the receiver separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Crosstalk

A

Occurs in parallel data transmission, when communication lines are tight, packed data can leak into another transmission line and cause corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Synchronous Transmission

A

The clock is shared between the sender and the receiver, which is used to time when signals are sent

Signals are sent at regular intervals in the same order that it was sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asynchronous Transmission

A

Computers must have start and stop bits to indicate the duration of the transmission

The start bit is always opposite to the stop bit

The sender and receiver must also synchronise the clock for the duration of the transmission and use the same baud rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Topology

A

Refers to the arrangement with which computer systems or network devices are connected to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical network topology

A

The actual architecture of a network, where the interconnection of components is taken place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Star topology

A

Each client is connected directly to a central hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantages of star topology

A

1) packets are sent to the intended recipient

2) easy to add and remove clients

3) one cable fault does not affect the whole network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disadvantages of star topology

A

1) If the central hub fails the communication within the network stops and fails

2) expensive to install as it requires many cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Bus Topology

A

Connects clients to a single backbone cable without the need for a central hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantages of physical bus topology

A

1) no central hob is required, therefore reducing the failure rate

2) in expensive to set up

21
Q

Disadvantages of physical bus topology

A

1) every client will receive any transmitted file, even if it’s not intended for them

2) risk of collision is likely to occur

3) network fails if the backbone fails

22
Q

Client Server Networking

A

Central Servers are hosted to provide services to the clients, often more powerful machines than clients

23
Q

Peer-to-Peer Networking

A

Services are provided by the clients themselves and every client has equal status.

For the network to be fully operational, all clients providing services must be running simultaneously

24
Q

Wireless Networking

A

Allows devices to communicate within a network without being physically connected to it

25
Q

Wireless networks requires 2 components

A

(WAP) Wireless Access Point & Wireless Network Adapter

26
Q

Role of Wireless Access Point

A

A physical device that creates a wireless local area network and allows multiple devices to connect to a wired network.

27
Q

Role of Wireless Network Adapter

A

A physical device that allows a computer system to connect to a
wireless network.

28
Q

Define Wifi

A

Also referred to as Wireless Local Area Network (WLAN).
it’s a wireless networking technology which provides internet access and network connectivity

29
Q

Ways to Secure a Wireless Network (Hint: there are 3)

A

Encryption - can be done through WPA or WPA2 (Wifi Protected Access) which requires the client to enter a password

Disabling SSID (Service Set Identifier) - Stops wireless devices within range from displaying the network’s availability only allowing those that know the SSID to access the network

Mac Address Filter - Allows for devices with a specific mac address to access the network.

30
Q

Define Internet

A

defined as a Network of interconnected computer network which uses an end to end communication protocol

31
Q

Define Packets

A

packets are containers in which data is transmitted over networks

[Also contains sender and recipient information intended for the recipient]

32
Q

Define Packet Switched Networks

A

When data is sent as packets and frequently split into multiple packets each sent to the recipient before being reassembled with other packets by its recipient

33
Q

What Are The 5 Components Of Packets

A

Sender’s Address - identifies where packers were sent from

Receiver’s Address - identifies the packet’s intended recipient’s location

Packet’s Content - contains the data held by packets

Time To Live (TTL) - Holds the number of hops of the data being transferred before the packets are dropped

Sequence Number - Contains the number of Packets in a message and the position and order in relation to others allowing packets to be assembled correctly

34
Q

What is a Router

A

A device which directs packets being transmitted over a network

35
Q

What is a Gateway

A

A device that allows data flow to occur from one network to another

36
Q

What is a URL (Uniform Resource Locators)

A

A reference of a resource on the internet that is able to locate and retrieve it

37
Q

What are the spaced out Components of a Domain shown below?

[https://] [www.] [bbc.co.uk] [/news] [/technology] [/index] [.html]

A

[https://] - the protocol used

[www/] - subdomain

[bbc.co.uk] - domain

[/news] - directory

[/technology] - subdirectory

[/index] - file name

[.html] - file extention

38
Q

What is a Domain

A

Name that locates the IP of a Client Server Network

39
Q

What is a Fully Qualified Domain [FQD]

A

A domain name specifying the location of a domain to the root of the internet

40
Q

What is an IP address

A

[Internet Protocol] - an address that is assigned to every computer on the internet which identifies its host

41
Q

DNS System

A

A DNS is used to translate the Domain Name into a corresponding IP address by connecting to a server with a table of domain names and redirects the user to the corresponding IP address

42
Q

Internet Registries

A

Organisations responsible for the allocation of domain names and IP addresses

43
Q

Firewall

A

A Security checkpoint that monitors inbound and outbound network traffic and prevents any unauthorised access from an unauthorised device and packets to be received

44
Q

Asymmetric Encryption

A

An Encryption Technique Used Where the public key is available publicly but the decryption occurs with a private key which is available only to the recipient

45
Q

Symmetric Encryption

A

An encryption technique involving 2 identical keys [not available publicly] which is used for decryption

46
Q

Digital Certificate

A

An electronic document used to prove ownership of a public key , hence authenticating identity

47
Q

Digital Signature

A

A mathematical scheme for producing a unique signature that verifies the authenticity of encrypted digital messages

48
Q

What are the 3 types of Malware and define them

A

Trojan - a malware that hides within other files and misleads the user into thinking it’s legit

Virus - a program that attaches itself to a computer and replicates itself and inserts code into files

Worm - A malware capable of spreading and infecting a computer without being attacked to a file

49
Q

How can Malware be prevented?

A

Install Antivirus Software

prevention of opening unknown files

update software which fixes exploits and vulnerabilities