Communication Protocols Flashcards

1
Q

what is a transmission protocol/internet protocol?

A

its a set of protocols defining how information is split into packets and how packets are sent and received at the correct destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is TCP layer?

A

it supports the transfer of files between computer systems and controls security issues. it handles different character sets e.g. end of line conversation. it also splits data into packets and allocates an address to each packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is IP layer?

A

is responsible for transferring packets of data from node to node by forwarding each packet using its address. its responsible for verifying the correct delivery of data and detecting errors or lost data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is ethernet?

A

it is a network protocol that controls how data is transmitted over a LAN. it defines not only the networking protocol, but the hardware, as well as how data is handled

ethernet implements physical and transport layers of OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does stand for and what is it CSMA/CD?

A

Carrier Sense Multiple Access with Collusion

its a set of rules determining how network devices respond to a collusion which occurs when two devices attempt to use data channel simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how are ethernet and CSMA/CD connected together?

A

ethernet networks use CSMA/CD to physically monitor the traffic on the line between different computers on the network. if no transmissions is taking place at the time- the computer can start transmitting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what happens when two computers attempt to transmit simultaneously?

A

this can cause collusion, which detected by all participating stations, after a random interval the computers that collided attempt to transmit again.

if another collusion occurs the time intervals from which the random waiting time is selected are increased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is token passing?

A

uses a token, a special series of bits to give a device permission to transmit over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what happens when a device has a token

A

only when a device which has the token can put data into the network

when its transmission is complete the device passes the token along to the next device in the topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the protocols have to do with token passing?

A

protocols determining how long a device may keep the token, how long it can transmit for and how to generate a new token if no token is currently in circulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is WiFi?

A

wireless fidelity

is a communications protocol, through which devices can communicate with each other without using any cabling

wifi enables two or more devices to connect for data sharing. wifi card can connect wirelessly to a wireless router over a limited distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how does a wireless transmitter work?

A

the device receives information from the internet via the broadband connection. the transmitter converts information into radio waves and emits it, effectively creating a small, local area around itself , which the radio signals provided are fitted with the appropriate wireless adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what happens when you send an email?

A

the process works in reverse, the device send information via a radio signal and communicates it back via the broadband connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does a computer or phone have to have when connecting to wifi?

A

the relevant technology incorporated within it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a device that can connect to wifi from your device?

A

dongle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is bluetooth?

A

its a short range technology aimed at simplifying communications among enabled devices

it also aims to simplify synchronization between devices

17
Q

how do two bluetooth devices pair?

A

the device uses radio waves to connect to other devices.

bluetooth device contains a tiny chip with a bluetooth radio and software to enable it to connect with other devices

18
Q

what is VoIP?

A

Voice over Internet Protocol

its a method of using the internet to make voice telephone calls. it converts analogue voice signals into digital data packets and supports real-time, two way transmission of conversations using Internet Protocol (IP)

19
Q

what is digested speech?

A

its data and can be sent over the internet as with any other data, with widespread installation of broadband connections- data to be transferred fast enough to allow two way conversations

20
Q

what is a RFID?

A

it involves the use of radio waves to read and capture information stored on a tag attached to an object

21
Q

how far can a tag be read from?

A

it can be read from several feet away and doesn’t need to be within direct line-of-sight of the reader to be tracked

22
Q

what does a RFID tag contain?

A

a data programmed into small computer chip and this tag is activated by radio waves emitted from an RFID reader

the tag sends data stored in its memory back to the reader

23
Q

what sort of systems would RFID be used in?

A

used in active systems- whereby the chip has its own power supply

24
Q

advantages of RFID

A

there is no line of sight requirement and RFID tags can be read from a greater distance

the information stored in a barcode is fixed and cannot be changed whereas RFID tags can be dynamically updated

human intervention is required in order to scan a barcode whereas data from an RFID tag can be read without the need for someone to properly align the tag with the equipment that reads the data

barcodes are usually visible on the outside but RFID tags can be placed inside either packaging or the product itself

more data can be stored in an RFID tag have both read/write capability whereas barcodes are read only and cannot be reused