(9) Coms & Network Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is serial transmission?

A

Serial - Single bits are sent along a single wire one after the other at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages and disadvantages of serial transmission?

A

+Reliable over long distance
+Reduced cost as less wires are required
+Reduced chance of skew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is parallel transmission?

A

Parallel - Single bits are sent along several wires simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages and disadvantages of parallel transmission?

A

+Ideal for short distances
+

  • Close wires can cause a corruption
  • Prone to skew (Timing issues)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is synchronous data transmission with an example?

A

When data is transferred at a regular intervals synchronised by a clock pulse

E.g Chats and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is asynchronous data transmission with an example?

A

When data is sent separately and as soon as they are ready

E.g keyboard and mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Synchronous V Asynchronous

A
  • Asynchronous is slower due to the extra bits and gaps
  • Asynchronous can transmit when ready as it doesn’t need to wait on a clock pulse
  • Synchronous may have to wait for a clock pulse before it can be sent
  • Synchronous requires a synchronised clock between devices which can be difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of start and stop bits in asynchronous transmissions?

A

They are a bit used to indicate the start and the end of a set of data in asynchronous data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is baud rate?

A

The number of times a signal in a communication changes state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is bit rate?

A

The number of bits transferred between devices per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is bandwidth?

A

A measure of maximum capacity of a given transmission channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is latency?

A

The time delay between when a transmission data is first sent to when its delivered at its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a protocol?

A

A set of rules that govern communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the relationship between bit rate and bandwidth?

A

The relationship between bandwidth and bit rate is directly proportional: the greater the amount of data that can be transmitted over a channel, the more bits can be transmitted per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a bus topology?

A

All computers are connected to a single wire with terminals at each end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a star topology?

A

When computers are centred around a node (switch) each connected with their own cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the advantages and disadvantages of a bus topology?

A

+Inexpensive as it requires less cables

  • Reliant on main cable
  • Performance degrades with increased traffic
  • Low security as all computers on the networks can see data transmissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the advantages and disadvantages of a star topology?

A

+If one cable fails it only affects that one computer
+Performance stays consistent as more computers are added

  • Cost as more cables
  • If the switch breaks down the whole network goes down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is peer to peer networking and when they might be used?

A

No central server. All clients have equal responsibility so each computer can act as both a client or a server

E.g small businesses, home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is client server networking and when they might be used?

A

When a device (client) requests access to resources and services from a central server

Eg schools - students as clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages and disadvantages of peer to peer networking?

A

+If a node goes down only the data on that node is lost
+Easily share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the advantages and disadvantages of a client-server networking?

A

+Increased security
+Backups can be done for all clients
+Data can be shared

  • Expensive to install and manage
  • Professional IT staff are required to maintain the servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of Wi-Fi?

A

Allows you to transfer data between devices without cables components being required for a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What components are required for wireless networking?

A

Each device must have a wireless network interface card (NIC) to be able to connect to a wireless access point (WAP). The WAP allows devices to connect to a wired network (internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between thin and thick clients?

A

Thin clients - Majority of the processing and storage is done on the server
Thick clients - Majority of the processing and storage is done on the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the advantages and disadvantages of thin clients?

A

+Software updates can be done once on a server and automatically end up on every client
+Easy to set up and maintain e.g. adding a new terminal to the network
+Much more secure as all data is stored in one place

  • Very reliant on the central server
  • Can be expensive as it requires a powerful and reliable central server
  • High demand on bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the advantages and disadvantages of thick clients?

A

+Reliable
+Can operate without a continuous connection to the server
+Preferred when running heavy duty software

  • Expensive as each client may need a higher specification (better computer)
  • Time consuming when installing new software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the transmission control protocol/ internet protocol (TCP/ IP) and the 4 layers?

A

It’s 4 layers required to allow data to be transmitted across the internet

Application, Transport, Network, Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the application layer in the TCP/ IP?

A

Selects the appropriate protocol for communication

E.g FTP, HTTP/S, POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the transport layer in the TCP/ IP?

A

Creates an end to end connection and splits the data into packets and numbers them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the network layer in the TCP/ IP?

A

Adds the source and destination IP address and routers use the IPs to route the packets to the destination

32
Q

What is the link layer in the TCP/ IP?

A

The physical connection between the nodes and adds the source and destination MAC addresses

33
Q

What are MAC addresses and where is it used in the TCP/IP?

A

A unique code that’s physically hardcoded on every NIC during manufacturing.

Used in the link layer of the TCP/IP

34
Q

What is a firewall?

A

Hardware or software for protecting against unauthorised access to a network

35
Q

What is a proxy server?

A

Inspects all packets coming in and out of a network while hiding the network addresses of the source from the recipient

36
Q

What is packet filtering?

A

Examining the contents of packets on a network and rejecting them if they don’t meet certain requirements

37
Q

What is stateful inspection?

A

Examining the contents of packets on a network and rejecting them if they don’t form part of a recognised communication

38
Q

What is a worm?

A

Malware that can replicate itself and spreads around a computer

-

39
Q

What is a trojan?

A

Malware that is hidden within another file on your computer

40
Q

What is a virus?

A

Malware where the program attaches itself to another file in order to invest a computer

41
Q

What are the vulnerabilities that malware take advantage of?

A
  • Human error
  • System bugs
  • People turning off their firewalls or failing to update their virus protection
42
Q

What is subnet masking?

A

A method of dividing a network into multiple smaller networks

43
Q

What are well-known ports and what are they used for?

A

They are common ports that are used to launch various applications related to their protocols

44
Q

What are client ports and what are they used for?

A

A port that is temporarily assigned for the duration of a connection

Establishes the connection between the client and server application*****

45
Q

What is the use of the FTP protocol and its number?

A

File Transfer Protocol

20 - A protocol for handling file uploads and downloads

46
Q

What is the use of the HTTP protocol and its number?

A

Hypertext Transfer Protocol

80 - A protocol used for exchanging web-pages

47
Q

What is the use of the HTTPS protocol and its number? What is the acronym?

A

Hypertext Transfer Protocol Secure

443 - A protocol used for exchanging secure web-pages

48
Q

What is the use of the POP3 protocol and its number?

A

Post office Protocol

110 - A protocol for receiving emails

49
Q

What is the use of the SMTP protocol and its number?

A

Simple Mail Transfer Protocol

25 - A protocol for sending emails

50
Q

What is the use of the SSH protocol and its number? What is acronym?

A

Secure Shell

22 - A protocol that provides secure remote access to a server

51
Q

How is SSH used for remote management?

A
  • Client indicates the connection to the server
  • Server sends public key
  • Client and server agree communication rules
  • User can now login remotely
52
Q

What is the FTP Client?

A

A software application that works with the FTP protocol to allow users to easily interact with it instead of learning the appropriate commands to use

53
Q

What does anonymous and non-anonymous access mean in regards to FTP servers?

A

Anonymous - FTP site/ server doesn’t require a login information

Non-anonymous - FTP site/ server does require a login information

54
Q

What are the two types of IP addresses?

A

v4 and v6

55
Q

What is IPv6 and why was it introduced?

A

The internet was was massively growing so IPv4 (32 bits) was no longer enough, soIPv6 (128 bits) was introduced to allow for a greater range of custom IP addresses

56
Q

What is the difference between routable (public) and non-routable (private) IP addresses?

A

Routable

  • Can be connected directly to the internet
  • It is globally unique

Non-routable IP

  • Can be accessed directly from the internet
  • Many devices may have the same address
  • More secure as its not directly connected to the internet
57
Q

What is the purpose and function of the DHCP system?

A

A set a rules for allocating locally unique IP addresses to devices as they connect to a network

58
Q

What is NAT and why is it used?

A

Used to match up the private IP addresses with the public ones

59
Q

What layer in the TCP/ IP stack does the router operate?

A

Network

60
Q

What is a router and where and why is it used?**

A

A device that connects two or more devices together and forwards data packets between networks

Used for:
Internet access

Where:
Homes
Offices

61
Q

What is the role of packet switching?

A

A method of sending data across a network to reach a destination

62
Q

What is a gateway and where and why is it used?

A

A node that sits between different networks and converts data from one protocol to another

Used to:
Connect two different company networks together
Provide a house user access to the internet

63
Q

What are the main components of a data packet and what does each part contain?

A

Header - Source and destination IP and Mac address, Packet and sequence number

Payload - The actual data itself

Trailer - A checksum to ensure that the data has been received correctly

64
Q

What is a uniform resource locator (URL)?

A

A method of identifying the location of resources on the internet

65
Q

What are the 5 components of a URL?

A

Https://stephanbarnes.com/alevel/computing/flashcards

Host, FQDN, Domain Name, Location, Resource

66
Q

What is a fully qualified domain name (FQDN)?

A

The complete domain name that identifies a specific host on the internet. It includes the host server name along with the domain name

Eg www.stephanbarnes.com

67
Q

What is an IP address?

A

A unique address that is assigned to a network device

68
Q

What is a domain name?

A

Identifies the location of the the resource on the internet.

Identifies organisations or groups on the internet

69
Q

How are domain names organised?

A

They are organised in a hierarchy

70
Q

What is a node?

A

Any system or device connected to a network

71
Q

What is the formula for bitrate?

A

Baud Rate * Number of Bits per Baud

72
Q

What is the purpose of a Domain Name System (DNS)?

A

To link a fully qualifies domain name (FQDN) to an IP address

73
Q

What is the service provided by internet registers and why are they needed?

A
74
Q

Describe the structure of the internet

A
75
Q

What is the purpose and function of the domain service and its relevance on the domain name server (DNS) system?

A
76
Q

How is routing achieved across the internet?

A
77
Q

Describe one situation when a DNS query will not be sent to a remote DNS server.

A

The local computer already has a copy of the IP address in a host file.