4.9 - Fundamentals of communication and networking Flashcards

1
Q

What are the 3 features of synchronous transmission?

A

Streams of bits are transferred over a communication channel at a constant rate

The transmitter and the receiver are synchronised using a common clock signal

No need for a start or stop bit - more information can be sent per unit of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 features of asynchronous transmission?

A

There is no clock signal, so additional data (start and stop bits) is used to control the communication

Data is transmitted when it is available, rather than at specific intervals - there can be periods of time when the transmission channel is idle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is serial and parallel transmission?

A

Serial - data bits are sent in a sequence, one after the other, over a single wire

Parallel - several bits are sent at the same time over their own dedicated wires or printed circuit tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 advantages of serial transmission?

A

Can operate efficiently at higher bit rates - not affected by skew, and there are fewer wires in close proximity, which minimises crosstalk

Specific solutions that are not affected by interference, such as fibre-optic cables, can be used for transmitting over longer distances

Also uses fewer wires- cheaper to implement

Interfaces have fewer pins, so they are cheaper and easier to produce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 disadvantages of parallel transmission?

A

Only reliable over short distances and with lower bit rates than serial- mainly used inside a computer and in some early peripherals

Can be affected by skew and crosstalk when higher bit rates and longer wires are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is skew and crosstalk?

A

Skew - happens when the bits that are transmitted across parallel links travel at different speeds

Crosstalk - occurs when electromagnetic interference between wires that are in proximity (such as parallel links) results in transmitting corrupted data that will need to be re-sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 2 advantages of a bus topology?

A

Easy to connect nodes to network

Less cabling needed - cheaper to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 disadvantages of a bus topology?

A

If two (or more) devices try to transmit at the same time, it will cause acollision - signals will interfere with each other

Every device attached to the bus can “read” every unencrypted message since signals are transmitted across the whole network - can be a security issue

A failure of the main bus cable will bring the whole network to a stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are physical and logical toplogies?

A

Physical - the physical layout of the network

Logical - the flow of data packets around a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 advantages of a star topology?

A

If one workstation fails, the rest of the network can continue to operate

New nodes can be added to the network simply by connecting them to the switch

Tends to have better performance - message is passed on to its intended node only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2 disadvantages of a star topology?

A

Switch or hub is acentral point of failure - if it fails, none of the connected devices will be able to communicate or access network resources

Requires plenty of cable if wired - can be expensive in large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a client and a server?

A

Client- a program that typically runs on a device used by an end-user such as a laptop or mobile phone

Server- a program on a computer that shares resources with, or provides services to, any authorised client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a client-server network function? (2 points)

A

A client sends arequestto the server

The serverprocessesthe request and then sends aresponseback to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 advantages of a client-server network?

A

Servers can be located in secure rooms - easier to monitor a server room than to monitor every device on the network

Most important files are stored on servers - easier to make sure all files are backed up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 disadvantages of a client-server network?

A

High setup cost - servers will need to be set up and configured

If a server fails, many users will be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a peer-to-peer network function? (4 points)

A

Every computer can be configured to share its resources - owner of each device gives permission to access some or all of the device’s resources

Peers can also share hardware such as printers or optical disc drives

Peers communicate directly with each other

Computers must be switched on to share resources

17
Q

What are the 2 advantages of a peer-to-peer network?

A

Low set-up costs - no additional devices needed

If one device fails, it has less impact - most users can carry on with their work

18
Q

What are the 2 disadvantages of a peer-to-peer network?

A

Workstations may be at multiple different locations, including at home - difficult to oversee

Individual users are likely responsible for backing up their own data

19
Q

What is WiFi and what is it used for?

A

A wireless local area network that is based on international standards

Used to enable devices to connect to a network wirelessly

20
Q

What are the 7 wireless networking components and what are their respective functions?

A

NIC (Network Interface Controller) - connects a device to a network

Hub - simply repeats messages to all connected devices

Switch - only sends a message to its intended destination device

Router - required to connect two separate networks when communication happens

Modem - modulates electrical signals so that they can be sent through a cable that uses a different technology

Network access device - makes it easier for home devices to connect to the Internet

Gateway - allows the transmission of data between dissimilar networks

21
Q

What are the 3 types of network encryption?

A

WEP - uses a symmetric encryption algorithm (same key is used to encrypt and decrypt data) to secure a network

WPA - generates new encryption key for each data packeted

WPA2 - encrypts each message several times depending on key size

22
Q

What does a router do and what are the 4 types?

A

Forwards data packets between computer networks

Types:
Edge routers -link one network to another

Subscriber routers- routers provided to homes and small businesses

Enterprise routers- routers that connect large businesses and ISP networks to the internet

Core routers- routers that are part of the Internet backbone

23
Q

What does a regular firewall do? (2 points)

A

Monitors both incoming and outgoing network traffic

Will attempt to prevent malicious traffic entering the network

24
Q

What is static filtering?

A

The process of a firewall checking the headers of the packets arriving from the untrusted network against a set of rules orpacket filtersdefined by the network administrator

25
Q

What is stateful inspection? (3 points)

A

Continuously monitoring incoming and outgoing traffic after a connection is established

Analysing packet types, looking inside the payload of the packet rather than just the header, and checking for suspicious activity

Requires the firewall to maintain a connection table (or state table), which keeps track of all of the conversations going on between the trusted and untrusted networks

26
Q

What does a proxy server do? (3 points)

A

Sits between the client device and the firewall

Provides anonymity to the clients, keeping their true IP addresses hidden

Can also keep acacheof websites and serve them from the cache wherever possible - speeds up user access and reduces network traffic

27
Q

What are the 7 steps of a digital signature being used?

A
  1. Sender runs hash function against plaintext message to produce a digest/hash total
  2. Sender encrypts digest with their private key
  3. Sender attaches the ‘signature’ to their message
  4. Sender encrypts the whole thing with receiver’s public key
  5. Receiver uses their private key to decrypt it so they can read the message.
  6. Receiver then uses sender’s public key to decrypt the digest
  7. Receiver runs hash function on the plaintext and checks whether the digests match.
28
Q

What are the 4 layers in the TCP/IP protocol stack and their respective functions?

A

Application - selects appropriate protocol for the communication and interacts with the user via appropriate application software

Transport - establishes end-to-end communication and splits application data into segments (TCP) or datagrams (UDP)

Internet - prepares packets for the Internet by supplying IP addresses for appropriate source and destination

Link - receives packets and adds MAC addresses

29
Q

What are the 2 other functions of the Transport layer?

A

Assigns sequence numbers and source and destination port numbers to the segment header

Keeps a record of the incoming sequence numbers at the receiving end

30
Q

Define ‘socket’.

A

A combination of an IP address and a port number; a TCP endpoint

31
Q

What are the 4 steps of DHCP (Dynamic Host Configuration Protocol)?

A
  1. Discovery - device broadcasts out a discover message for a DHCP server when it starts up
  2. Offer - when a DHCP server receives a request, it reserves an IP address for the client and sends an offer message to the client including the address, subnet mask, lease duration and address of server
  3. Request - in response to the DHCP offer, the client broadcasts a request message with the details of the server from which it has accepted the offer
  4. Acknowledgement - a packet is sent to the client that includes any other configuration information that the client requested
32
Q

What is thin and thick client computing?

A

Thin-client - a device that has limited main memory, limited secondary storage, and only basic processing capability

Thick-client - a device that does most of its own processing and storage

33
Q

What are the 4 advantages of thin-client computing?

A

Cheaper to buy

Software is always kept up-to-date by the provider - often available at no cost

Arguably more secure - data not held locally

Responsibility for backup is with the company storing the data

34
Q

What are the 2 disadvantages of thin-client computing?

A

Needs to be connected to the Internet

Requirement for a decent amount of bandwidth as more data is transferred between client and server

35
Q

What are the 3 advantages of thick-client computing?

A

More robust and reliable - greater “up time” and availability of services

Preferred solution when running heavy-duty/resource-hungry software applications

Can be operated without reliance on constant connection to a central server

36
Q

What are the 3 disadvantages of thick-client computing?

A

Often more expensive - higher-spec client computers required

Every client needs its own software installed - increases time and effort on part of network administrators

More prone to integrity issues - due to non-centralised and distrusted nature