9: Fundamentals of Communication & Networking Flashcards
Serial Transmission Method
Data bits are sent one at a time over a single wire
Parallel Transmission Method
Several bits are sent simultaneously over multiple wires
Serial over Parallel Transmission (4)
- Cheaper due to needing fewer wires
- Does not suffer from crosstalk as there is only one transmission line
- Does not suffer from data skewing as only one bit is transmitted at a time
- Can be used over longer distances due to needing fewer wires, there being only one transmission line and only one bit transmitted at a time
Synchronous Transmission (3)
- Streams of bits are transferred over a communication channel at a constant rate
- The transmitter and receiver are synchronised to a common clock signal
- There is no need for start and stop bits so more information is sent per unit time
Asynchronous Transmission (3)
- There’s no common clock signal so start and stop bits are used to control communication
- The start bit synchronises the clock in the receiver to the transmitter clock
- The stop bit provides time for the receiver to process the received data and allows the next start bit to be recognised
Baud Rate
Number of signal changes per second
Bit Rate
Number of bits transmitted over a channel per unit time
Bandwidth
The range of frequencies that can be transmitted across a network connection
Latency
Delay from the time the signal is sent to when it is received
Protocol
A set of rules that allow two devices to communicate
Differentiation between Baud Rate & Bit Rate (2)
- Bit rate can be higher than baud rate if more than one bit is encoded in each signal change
- Bit rate = Baud rate x Bits per signal change
Bit Rate is ____ to Bandwidth
Directly proportional
Physical Star Topology (4)
- Every device is directly connected to a central node
- Every device sends data via the central node
- The switch sends packets of data to the intended recipient only
- The hub sends every packet of data to every device
Logical Bus Topology (4)
- A node broadcasts data to the entire network
- All nodes on the network receive the data
- A node examines the received data to check if it is the intended recipient
- Only one node can successfully transmit data at a time as nodes use a shared transmission medium
Peer-to-Peer Networking (4)
- Each computer has equal status
- Resources stored on any computer
- No centralised management of security
- The same resource can be shared from multiple computers
Client-Server Networking (5)
- One or more computer(s) nominated as server(s), other computers are clients
- Clients access resources from server(s)
- Centralised management of security
- Resources cannot be accessed if server(s) turned off
- Hardware and software on server(s) can be optimised for providing services
WiFi (2)
- A wireless local area network that is based on international standards
- Used to enable devices to connect to a network wirelessly
Components Required for Wireless Networking (2)
- Wireless network adapter
- Wireless access point
Wireless Network Adapter
Adds wireless connectivity to a device, allowing it to connect to a wireless network
Wireless Access Point
Creates the wireless network by sending and receiving data signals with devices over a radio wave communication channel
How Wireless Networks are Secured (3)
- Strong encryption of transmitted data using WPA (WiFi Protected Access) / WPA2
- SSID (Service Set Identifier) broadcast disabled
- MAC (Media Access Control) address white list
WPA / WPA2
WiFi Protected Access are protocols, that encrypt all data, which is transmitted on the network
SSID Broadcast Disabled
Broadcasting of SSIDs can be disabled so only clients, who know the SSID, can find the network. However, it is still possible to discover an SSID maliciously
MAC Address Whitelist (3)
- MAC addresses of authorised devices are added to a whitelist on the wireless access point
- When a device tries to connect to the network, the wireless access point checks the MAC address of the device
- If the MAC address is on the whitelist, the device is allowed to connect
CSMA / CA (3)
- Carrier Sense Multiple Access with Collision Avoidance is a protocol for preventing data collision on a wireless network
- A transmitting device listens to the communication channel. If it is idle, it sends the data. Otherwise, it waits a random amount of time and retries
- The hidden node problem is where multiple devices are out of each other’s broadcast range but have the wireless access point in their broadcast ranges. If node A is transmitting, node B would not be able to detect it. Thus, they could be transmitting simultaneously but unable to see that the channel isn’t idle so their data signals would collide at the wireless access point and be unable to be received
CSMA / CA with RTS / CTS (9)
- Carrier Sense Multiple Access over Collision Avoidance with Request To Send / Clear To Send is a protocol, which alleviates the hidden node problem
- Transmitting device checks for traffic
- If a signal is present, then the transmitter continues to wait
- If the channel is detected as idle, the transmitter would send an RTS
- WAP responds to one RTS signal with a CTS signal
- If CTS is not received, the transmitter would wait a random amount of time before resending the RTS
- When CTS is received, the transmitter begins transmitting data
- Receiver sends acknowledgement (ACK) if all data is received
- If no ACK is received then data is resent
SSID
Service Set Identifier is a locally unique ID for a network. A wireless client must use the same SSID as the one put in the access point to join
Structure of the Internet
A group of WANs across the globe connected by various mediums
URL
A uniform resource locator is a full address of a file on the Internet
Domain Name
Identifies the organisation on the Internet, where a resource resides
FQDN
A fully qualified domain name is the domain name preceded by its server
IP Address
Identifies every device that sends and receives data on a network and the internet
Domain Name Organisation
They contain the organisation name, type of organisation and then the country the organisation is registered to
Packet Switching
Where data packets with the same end points go through different routes based on what is fastest at the time
Router (4)
- A networking device that forwards data packets between computer networks
- Routers are used in homes, small and large businesses and ISP networks
- Core routers are part of the Internet backbone and can forward a packet to many interfaces so it arrives quickly at its destination
- Each router has a routing table, which is a set of rules used to to determine the best router-to-router hop a packet should take
Gateway (3)
- Used when packets are passed between networks with different protocols
- Convert a packet to a different protocol
- The header data is modified to the format of the new protocol
Firewall
Sits between a trusted and untrusted (such as the Internet) network and performs packet filtering or stateful inspection to block unwanted incoming or outgoing traffic
Packet Filtering
Inspects packet headers and uses a set of rules based on IP addresses, ports and protocols to block unwanted traffic
Stateful Inspection
Keeps track of open conversations in a connection table to ensure incoming and outgoing packets are expected and checks packet payloads for suspicious activity
Proxy Server (5)
- Sits between clients and the firewall
- Provides anonymity to clients by masking their IP addresses
- Adds web-filtering
- Caches websites to speed up performance
- Can monitor client’s network history
Symmetric Encryption
Uses the same key for encryption and decryption meaning the key must be exchanged with the data
Asymmetric Encryption (2)
- Uses a public key to encrypt data and private key to decrypt data
- The public key is exchanged with the senders whereas the private key is kept hidden by the receiver
Digital Signature (3)
- A hash of the data transmitted with the packet
- Ensures that it was not altered by a third-party
- Authenticates the sender
Digital Certificate
An electronic document, issued by an official certificate authority, to authenticate a sender
Virus (2)
- A self-replicating malware, which infects other files
- Its initiation requires a host program to be run
Worm (2)
- A self-replicating malware, which is used to spread to other computers and waste their resources
- Operates independently of a host program
Trojan (2)
- A non-self-replicating malware, which appears to be a legitimate software to trick the user into running it
- They steal information or inflict damage to the computer
Vulnerabilities (3)
- Social engineering on humans to make them download malware
- Bugs in unpatched software can be exploited by malware
- If code quality is poor, malware could exploit the weaknesses
Defence against Malware (3)
- Improved code quality means that malware cannot exploit common weaknesses in programs and not infect a computer
- Monitoring by other programmers or ethical hackers reviewing code to make it more secure
- Protection by using anti-malware software to detect and destroy malware on a computer
Application Layer
Uses protocols designed to work with certain types of applications (such as web browsers and email clients)
Transport Layer (3)
- Breaks / rebuilds application data into / from segments
- Allocates sequence numbers and adds source and destination port numbers to segments
- Acknowledges delivery and retransmits lost segments
Network Layer
Adds source and destination IP addresses to packets
Link Layer
Transports data frames across each individual medium (such as 3G and fibre-optic cable), which makes up the path between the client and server
Socket (2)
- A combination of IP address and port number
- Identifies a certain session on a server
Role of MAC Addresses in TCP/IP Protocol
The link layer uses a source and destination MAC address to transmit a data frame, making a packet hop
Client Port
Each request from the application layer is allocated a client port number so that the data can be returned to the correct process
Well-Known Port
Servers use pre-set well-known port numbers to transmit data
Difference between Client & Well-Known Port
Client port numbers are randomly allocated from a bank of numbers on the client device whereas well-known port numbers do not change so do not need to be looked up by clients
FTP
File Transfer Protocol transfers files between a client and a server
HTTP
Hypertext Transfer Protocol transfers multimedia files (web pages and linked resources from a web server) between a client and a server
HTTPS
Hypertext Transfer Protocol Secure uses public encryption when transferring data and provides a digital certificate
POP3
Post Office Protocol v3 retrieves emails by downloading them onto a client device and deleting them from the server
SMTP
Simple Mail Transfer Protocol sends emails by transferring them from a client device to the linked mail server and, if the recipient is on a different domain, forwarding the email to the recipient’s mail server
SSH
Secure Shell provides an encrypted connection for users to access a remote computer
FTP Client Software
Accesses directories on the server and requests files
FTP Server
Has access to the storage space to store files and sends them out
Anonymous Access
The server does not require client authentication to upload and download files
Non-Anonymous Access
The server requires client authentication to upload and download files
SSH Client
Makes a TCP connection to a remote port for the purpose of sending application-level commands
Email Server (2)
- When the user opens their email client, it connects to their email server and downloads any new emails
- When sending emails, the email is transferred to the linked email server and, if the recipient has a different domain, forwarded onto the correct email server
Web Server (3)
- Web servers store web pages in text form and listen for requests
- A client sends an HTTP request to the server
- The server sends the web page to the client
Web Browser
Requests web pages and linked resources from a server and renders these
Network Identifier Part
The first part of an IP address, which identifies the network a host is on
Host Identifier Part
The last part of an IP address, which identifies the particular host on a network
Subnet
A subdivision of a network treated as a separate network with a different network identifier
Subnet Mask
Contains 1s for the network id and 0s for the host id. A bitwise AND operation with the IP address identifies the network identifier part
IP Address Standards
v4 and v6
Introduction of IPv6
Has a longer address structure to allow more devices to simultaneously be connected to the Internet
Non-Routable IP Address
Used in a private network and is only unique in the local network
Routable IP Address
Used in the Internet and is globally unique
DHCP
Dynamic Host Configuration Protocol dynamically assigns private IP addresses to devices trying to join a network
NAT
Network Address Translation converts a private IP address on an outgoing packet to a public, routable IP address before sending it out to the Internet
Purpose of NAT
Private IP addresses are not globally unique so responses from the server could be returned to the wrong device (with the same public IP address)
Port Forwarding
A server is on a private network and the router is configured to forward all inbound traffic on a certain port to the server
Client Server Model
The client sends a message to a server and the server responds to the request by replying with a response message to the client
Websocket Protocol (4)
- The websocket specification defines an API establishing a full-duplex ‘socket’ connection between a web browser and a server over TCP
- This means that there is a persistent connection between a client and server, allowing both parties to send data at any time
- Data can be pushed from the server without having to be initiated by a client request, increasing performance
- It is used when response times are important such as a browser game
Principles of Web CRUD Applications & REST (5)
- Database connected to browser using REST (Representational State Transfer) which relies on HTTP
- REST allows JavaScript to talk to server through HTTP
- REST API created and run on server and browser JavaScript calls API
- JSON (JavaScript Object Notation) or XML can be used to transmit data between a server and web application
- JavaScript referenced by HTML file is run in browser
CRUD (4)
- C - Create
- R - Retrieve
- U - Update
- D - Delete
REST (1:4)
Enables CRUD to be mapped to database functions (SQL) as follows:
- GET → SELECT
- POST → INSERT
- DELETE → DELETE
- PUT → UPDATE
JSON Compared with XML (4)
- Easier from humans to read
- More compact
- Easier to create
- Easier for computers to parse and therefore quicker to parse
Thin-Client Computing
Processing is carried out on an application server
Thick-Client Computing
Most processing is done and resources are held on a high-performance client device and the server sends minimal data
DNS (7)
- Translates FQDNs into IP addresses
- DNS stores a database of FQDNs and corresponding IP addresses
- DNS is a distributed database of mappings
- Individual mappings are only known by some DNS servers
- DNS servers are organised into a hierarchy
- If one DNS server cannot resolve a lookup the query will be passed to another
- DNS servers support load distribution by returning one IP address from a list
Internet Registries
Ensure that a particular domain name is used by only one organisation so there is no ambiguity on which website a client want to access