Communication and Networking Fundamentals Flashcards
Serial and parallel transmission
Serial data transmission = Where bits are sent one by one down a single wire to their destination
Parallel data transmission = Where bits are sent simultaneously down multiple wires - an 8 bit character needs 8 wires
Parallel transmission can be affected by crosstalk and skew
- Crosstalk is where the electrical signals in each wire interfere with each other; this causes data corruption and is more likely over greater distances
- Skew is where the time for each signal to reach its destination is different since each wire will have slighty different electrical properties - this gets worse over longer distances
Serial vs parallel data transmission
Serial transmission:
- More reliable over greater distances since theres no chance of data skew
- No crosstalk issues
- Cheaper to make since less wires are used
Parallel transmission:
- More expensive since more cables are used
- Only reliable over very short distances
- Suffers from skew and crosstalk
Serial transmission is used over long distances (mouse to computer) while parallel transmission is used in communication between internal computer components
Synchronous data transmission
Synchronous data transmission is where data is sent as one long stream - a clock signal is used to time when signals are sent and is sent along with the data itself.
This clock signal comes from the sending computer
The signals, which are sent at regular intervals, will be received in the same order that they were sent.
This makes synchronous data transmission suitable for transmitting information in real-time systems
Asynchronous data transmission
Asynchronous data transmission is where the sending and receiving computer aren’t kept in sync all the time but are only synced at the time of transmission - a character is sent as soon as it is available rather than waiting for a clock signal
A start bit is used to alert the receiving computer and a stop bit is used to indicate that the transmission is over. They’re used to indicate the duration of a transmission
The stop bit is always the opposite of the start bit
The sender and receiver must use the same Baud rate and only need to synchronise their clocks during transmission
Transmission rate
Bit rate = The speed at which data is transferred and is measured in bits per second (Bps)
Baud rate = The maximum number of signals changes in the medium per second and is measured in Baud, where 1 Baud is 1 signal change per second
Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.
Bit rate = Baud rate × № of bits per signal
Bandwidth = The range of frequencies that a line can carry - it is directly proportional to bit rate and expressed in Hertz (Hz) (higher bandwidth = higher bit rate)
Latency = The time delay between an action and its effect - usually increases with distance
Protocol = A set of rules on how devices communicate with each other
Physical network topology
Network topology = The structure of a network
Physical topology refers to how devices in a network are physically connected to each other - two types include star and bus topologies
Star topology = Network topology where each device is directly connected to a central hub - the hub recieves packets from the devices and is responsible for delivering them to the correct recipient
Bus topology = Network structure where each device is connected to a single cable called a backbone - terminators are placed at each end of the backbone
Star vs bus topologies
Star topology pros:
- Packets are sent directly to their recipient, other clients can’t eavesdrop on packets that aren’t for them
- Failure of one cable doesn’t affect the rest of the network
- No collisions since each device has their own cable
- Adding and removing devices from the network is easy
Cons:
- Expensive since extra cables are needed as well as a central hub
- If the central hub fails, communication across the entire network is stopped
Bus topology pros:
- Cheaper to install since less cables are needed and there’s no central hub
- No central hub means network failure chances are reduced
Cons:
- Packets are sent through the shared backbone, which means every connected device can see packets that aren’t meant for them
- Risk of collisions since the backbone is used by multiple clients
- If the backbone fails, the entire network becomes unusable
Logical network topology
Logical topology refers to how data packets flow through a network - a logical bus network delivers packets to all clients in the network and a logical star network only delivers packets to their recipients
A network set up as a star network can still behave as a logical bus network if a bus protocol is ran on the central hub
Client-server networking
Host = device that provides services and resources to clients
In a client-server network, the host is a server; a powerful central computer
The clients request services from servers, who then respond with the requested service - this could be file storage, managing emails and print queues
Most schools, colleges and businesses use client-server networks to allow for central
management of clients on the network - this helps with security
Updating software and managing files is easy since they are all stored on the central server however servers are expensive to set up and take a lot of effort to maintain
Benefits and drawbacks of client-server networks
Benefits:
- Generally more secure than peer-to-peer networks
- One client computer crashing does not affect the other computers
- Files and resources are easier to share and control from server
- Improved levels of security as files are centralised
Drawbacks:
- Servers are expensive
- Network technicians / specialised knowledge needed to maintain a central server
- Server failure stops the network completely
Peer-to-peer networking
Peer to peer networks dont use a central server - instead, the computers act as both clients and servers - every computer has equal status and provides a different service
They are cheap to set up and maintain since there isn’t a central server however security control is limited and every computer needs to be running for the network to work
They are used when there are les than 10 users who are all in the same area
Benefits and drawbacks of peer-to-peer networking
Benefits:
- Cheaper to set up, no central server needed
- Easier to set up since no specialist knowledge is needed
Drawbacks:
- If one computer fails, its files and resources cannot be accessed by the other computers in the network
Wireless networking
Wireless networking allows devices to communicate within a network without being physically connected to the network
Wireless networks require a wireless access point and a wireless access adapter
The WAP connects to the wireless network and the adapter is in the device that connects to the wireless network
WiFi
WiFi is used to provide wireless networks and refers to a wireless LAN that’s based on international standards - this allows a device made in one part of the world to connect to wireless networks around the world
Wireless network security
Wireless networks are secured by encrypting transmitted data using WPA or WPA2
WPA = Wireless Protected Access and requires that a new wireless client enters a password to connect to the network
Another security method is disabling SSID broadcast - SSID stands for Service Set Identifier and is the name that identifies a wireless network
Disabling SSID broadcast stops wireless devices within range of the network from displaying that the network is available and only allows the devices that know the network to connect
A MAC address filter can be used to only let certain devices connect to a wireless network - every wireless device has a Media Access Control address assigned by the manufacturer
A MAC address whitelist allows specific devices to connect to a network while a MAC address blacklists blocks specific devices from connecting to a network
The World Wide Web, the Internet and intranets
The World Wide Web is a system of interlinked hypertext documents that is accessed through the internet using the HTTP or HTTPS protocols to access web pages
The internet is a global network of interconnected computer networks using a globally unique address space
Intranets are private networks used only within organisations. They use internet protocols to share part of an organisation’s information with its members
CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously
Data is sent around networks in frames
The CSMA/CA protocol requires that:
- The sender device needs to check if the transmission channel is free
- If the channel is free the frame is transmitted; if the channel isn’t free the sender device will wait a random amount of time using a back-off mechanism before checking again - if the channel is now free, the frame is transmitted
- The reciever device transmits an acknowledgement when it recieves the frame
- If the sender doesn’t recieve an acknowledgement, it will wait a random amount of time before trying to transmit again
One problem with this protocol is that not all stations on a wireless network can be heard by the other stations - this means that a station attempting to broadcast data might not detect that another station is also trying to broadcast data, which can lead to a collision
To get around this issue, the RTS/CTS protocol is used
CSMA/CA with RTS/CTS
The RTS/CTS protocol adds an extra step to the CSMA/CA protocol
The sender device sends a Request to Send signal to the WAP
- The sender device checks if the channel is free
- if the channel is free the sender sends a ‘Request to Send’ signal to the WAP; if the WAP is busy the sender device will wait a random amount of time before checking again - if it is now free the ‘Request to Send’ signal can be retransmitted
- The WAP sends a ‘Clear to Send’ signal to the sender device; when the sender recieves this signal it sends the data frame to the WAP - if the CTS signal is not recieved the sender device will wait a random amount of time before retransmitting thr RTS signal
- The reciever device transmits an acknowledgement that the data frame has been recieved
- If the sender device doesn’t recieve an acknowledgement, it will wait a random amount of time before trying to retransmit again
The WAP will respond with one CTS signal to one computer at a time - only the computer that recieves the CTS signal will transmit its data frame
CSMA/CA avoids the problem with hidden stations since only the WAP can transmit the CTS signal and the WAP can see every connected station on the network
The internet
The internet is a network of interconnected computer networks that uses an end to end communication protocol - it is a wired network with underwater cables that connect different continents
An Internet Service Provider (ISP) is a company that provides its customers with access to the internet
Packet switching and routers
A packet is a container in which data is transferred over the network
A packet switched network is a network where data is sent in packets - one message is split into multiple packets and are reassembled by the reciever device
Packets have to pass through multiple routers before reaching their destination; every time a packet passes through a router is called a hop
Each packet can only pass through a finite number of hops - when the packets Time To Live reaches 0, the packet is dropped (deleted).
The recipient will notice a missing packet and request the sender to retransmit the missing packet
Packet components
A packet consists of:
- Sender’s address = Where the packet was sent from
- Reciever’s address = The packet’s intended recipient
- Packet contents = The data being transferred
- Time To Live (TTL) = How many hops the packet can go through before it is dropped
- Sequence number = The number of packets in a message and the packets position in relation to other packets; allows packets to be reassembled and for missing packets to be identified by the reciever