Data Transmission Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

4-Layer OSI Model

A

a four-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Layer (4)

A

combination of the application layer, presentation layer and session layer, uses protocol such as FTP, HTTP, SMTP, TELNET, PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transport Layer (4)

A

same as the transport layer in 7-Layer Model, the layer where data is split into packets uses protocols such as TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Layer

A

same as the network layer in 7-Layer Model, uses protocols such as IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Link Layer

A

combination of the data-link layer and the physical layer, uses protocols such as ISDN and Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

7-Layer OSI Model

A

a seven-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Layer (7)

A

handles initial requests to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presentation Layer

A

handles how information is to be presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session Layer

A

handles requests to transmit data synchronisation of data and traffic conform information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transport Layer (7)

A

standardises data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Layer

A

handles routing/addressing between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data-Link Layer

A

handles error checking and correction and formats data for physical transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Layer

A

the physical binary data with no error correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APIPA

A

Automatic Private Internet Protocol Address

a Windows feature that enables a client to automatically assign an IP address to itself when there’s no DHCP server available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric Encryption/Public Key Encryption

A

uses a different key to encrypt and decrypt a message. This solves the problem of key sharing in symmetric encryption schemes. The key generation algorithm of an asymmetric generation scheme generates two keys and the keys are generated in such a way that knowing the public key does not make it easier to decrypt information, making it more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Baud Rate

A

the number of signalling events across a transmission medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bit Rate

A

the number of bits per second that can be transmitted along a digital network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Block Ciphers

A

these are used in modern symmetric encryption. The message is broken into blocks containing multiple bits that are encrypted. If the block length is longer than the message, it is padded out with random content to make it longer. This can help obscure the length of the message, and additional information can be hidden in the blocks, such as error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bridge

A

used to connect two LANs or two LAN segments together, though both must use the same communications protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Brouter

A

combination of bridge and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cabling

A

required to connect all devices on a network together if the network is not wireless, varies greatly depending on network configuration, provides much faster connection that wireless connection, due to less interference and greater bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Coaxial Cables

A

consists of a solid conductor, three coats of insulation, and a grounding conductor to conduct electricity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fibre Optic Cables

A

cables which transmit signals along glass fibres using laser light signals, allowing data to be transferred much faster than in copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Twisted Pair Cables

A

constitutes a combination of insulated copper wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Circuit Switching

A

data is sent across a network with all parts of the message taking the same route meaning packets arrive in the order they were transmitted by this is less secure as it is relatively easy to intercept all of the packets in a single message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Client-Sever Networking

A

where clients make a request for a service or resource from the server. The server responds with the required resource or a security challenge. If it fails, the service cannot be provided by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Crosstalk

A

occurs when electromagnetic interference between wires that are in proximity such as parallel links results in transmitting corrupted data that will need to be re-sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Default Gateway

A

the gateway that the network looks for as default as a gateway out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Delivery Model

A

the sending host sends a beacon to the destination address to see if it is reachable, waits for a reply then sends the actual message. A timer is used to make sure that the message is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Diffie-Hellman Key Exchange

A

involves the sender and receiver both creating a secret key (a and b). They also create a public key (g). Both raise g to the power of the keys (g^a and g^b). The numbers a, b and g must be chosen so that g^a and g^b are easy to calculate but computationally hard to reverse, meaning g^a and g^b can be broadcast. The secret keys in a Diffie-Hellman key exchange are prime numbers that are 2048 bits long. To encrypt and decrypt messages the public key must be raised to the power of the private key (g^ba).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DNS

A

Domain Name System

matches up a user-friendly domain name with an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DNS Servers

A

have a directory serve which translates domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Dotted Decimal Notation

A

a presentation format for numerical data expressed as a string of decimal numbers each separated by a full stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Duplex

A

two-way communication; nodes can both send and receive and can do so simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Dynamic IP Address

A

a temporary address for devices connected to a network that continually changes over time and are allocated by your router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

End-to-End Principle

A

where two equivalent hosts are used in communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Enler’s totient functiton

A

Ф=(p-1)(q-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Forwarding Table

A

contains addresses to output links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Frame

A

a group of data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Half-Duplex

A

two-way communication but only one way at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Handshaking

A

the process used to control the flow of data between devices, happens at the start of communication, confirms the speed of transmission and the protocols that will be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Hopping

A

going from router to router, changing addresses at each hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Host Names

A

a human-readable label made of up to 255 characters that is assigned to a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Hub

A

distributes all data received to all other devices it is connected to, sometimes used in a star network which can cause security problems as well as causing frequent data collisions which slows down the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

International Router

A

connects international networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Internet

A

consists of a network of interconnected computer networks using a globally unique address space based on the IP and the TCP to support public access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Internet Registrars

A

responsible for registering internet registries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Internet Registries

A

online retailers where domains can be bought

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

LAN

A

Local Area Network

used for small, localised networks, such as in homes or schools

50
Q

Local Router

A

connects LANs

51
Q

Layered Protocol

A

where several transmission protocols are layered and each layer controls a different feature of transmission, eg the OSI model

52
Q

Mapping

A

distributed across the DNS servers, one cannot hold all

53
Q

MAC Address

A

Media Access Control Address

the computer’s physical address, a unique number written onto the NIC by the manufacturer composed of 6 pairs of hexadecimal characters separated by hyphens

54
Q

MAN

A

Metropolitan Area Network

connects devices within a metropolitan area such as a single large city; this is larger than a LAN but smaller than a WAN

55
Q

Modem

A

a device that changes signals from one type of device to a form compatible with another

56
Q

Multiplexing

A

a method by which multiple analog and digital signals are combined into one signal over a shared medium in order to share a physical transmission medium

57
Q

National Router

A

connects national networks

58
Q

NIC

A

Network Interface Card

a piece of hardware that is required to connect a device to a LAN. It allows the device to communicate either by wires or wirelessly with the rest of the network. It prepares and sends the data to other devices on the network

59
Q

Network Protocol

A

a set of rules governing the exchange or transmission of data between devices, including rules on how to start or end a transmission, format of data to be exchanged, how to detect or correct errors or any compression to be used

60
Q

DHCP

A

Dynamic Host Configuation Protocol

a client/server protocol that messages a pool of IP addresses and the client configuration process

61
Q

DNS

A
62
Q

FTP

A

File Transfer Protocol

the second-oldest protocol after IP, used for file transfer

63
Q

FTPS

A

File Transfer Protocol Secure

used to transfer files securely by encrypting data

64
Q

HTTP

A

Hyper Text Transfer Protocol

allows data transfer across the internet, allows HTML, CSS and JavaScript to be transferred from servers to browsers

65
Q

HTTPS

A

Hyper Text Transfer Protocol Secure

allows secure data transfer across the internet by using encrypted data, allows HTML, CSS and JavaScript to be transferred from servers to browsers

66
Q

ICMP

A
67
Q

IMAP4

A

Internet Message Access Protocol 4

similar functionality to POP3 but can be used on multiple devices because mail is stored on the server and mail is not deleted from the server when it is downloaded

68
Q

IOMP

A
69
Q

IP

A

Internet Protocol

works together with TCP to transfer data over a network, handles routing. Sending data involves adding a destination and source address to each packet. Receiving data involves checking packet destination addresses, accepting packets destined for this address and ignoring packets with other destinations

70
Q

NTP

A
71
Q

OSI

A
72
Q

PING

A
73
Q

POP3

A

Post Office Protocol 3

provides basic client/server features, enables e-mail download from the server, but mail was deleted from the server on download and could only be used with a single device

74
Q

RIP

A
75
Q

SMB

A

Server Message Block

a communication protocol mainly used by Microsoft Windows equipped computers normally used to share files, printers, serial ports, and miscellaneous communications between nodes on a network

76
Q

SMTP

A

Simple Mail Transfer Protocol

protocol for internet e-mail, transfers e-mails between computers

77
Q

SNMP

A
78
Q

SSH

A

Secure Shell

a protocol that provides secure file transfer and manipulation capabilities

79
Q

SSL

A
80
Q

TCP

A

Transmission Control Protocol

works together with IP to transfer data over a network, is in charge of reliable delivery of information by dividing data into packets. Sending data involves splitting the data into packets, adding a packet sequence number and adding a checksum or error correction data. Receiving data involves checking packets for errors and fixing them if needed, identifying missing packets, reassembling packets in the correct order and sending complete data to relevant applications

81
Q

Telnet

A
82
Q

UDP

A
83
Q

NAT Table

A

Network Address Translation Table

allows devices on a private network to access a public network, such as the internet

84
Q

One Way Functions

A

functions that are very simple to perform one way but computationally hard to reverse

85
Q

Open Architecture Networking

A

designers of networks are free to design them however they want as they can all be connected to and communicate over the internet and each network is connected through a router

86
Q

Packet

A

structures are defined by the protocol, if you have a big unit to download or send, it has to be broken down into small packets. Each packet is then labelled with both the destination and source address, so it can be routed through the internet

87
Q

Packet Switching

A

data is sent across a network with individual parts of the message each taking their own route to the destination meaning packets arrive in a random order and have to be reassembled to recreate the original message making it more secure as it is relatively easy to intercept all packets in a single message, used to send data through a network consisting of many different nodes

88
Q

PAN

A

Personal Area Network

connects devices to the user, such as a wireless keyboard, mouse or computer

89
Q

Parallel Transmission

A

each bit in the byte is transmitted along a separate path simultaneously

90
Q

Paul Baran and Donald Davies

A

invented the idea of a distributed fishnet-style network in the 60s

91
Q

Peer to Peer Networking

A

all computers are of equal status and no computer acts as a server. All peers must work together to fulfil the required task and file sharing is common

92
Q

Port

A

the address for a specific application or process within the computer to which data is sent. Port 80 is used by HTTP and port 53 is used by DNS

93
Q

Private IP Address

A

IP addresses that are reserved for internal use behind a router or other device, and cannot be used to access the internet directly

94
Q

Private Key

A

used for decrypting data

95
Q

Public IP Address

A

IP addresses that allows content to find its way to your device that your router receives from your Internet Service Provider

96
Q

Public Key

A

used for encrypting data

97
Q

Regional Router

A

connects networks within a specific region

98
Q

Router

A

used to connect parts of networks together by looking at the address of data packets to send them down the best route to their destination

99
Q

Routing Algorithm

A

calculate paths and performing packet switching

100
Q

Routing Table

A

used in routers to program different routes for different types of data or to use different routes at different times of the day

101
Q

RSA Encryption

A

Rivert, Shamir and Adleman Encryption

asymmetric encryption system named after its creators. Published in 1977, it uses prime number to prevent eavesdropping on the private key whilst still broadcasting the public key

102
Q

Robert Khan and Vint Cerf

A

the first to conceive the idea of connecting packet-switched networks between North America and Europe

103
Q

Sequence Number

A
  • included in the header of the packet to rearrange packets
104
Q

Serial Tranmission

A

each bit in the byte is transmitted along a separate path simultaneously

105
Q

Skew

A

occurs when bits that are transmitted across parallel links travel at different speeds. In synchronous data transmission, this can result in data falling out of sync with the clock signal and therefore not being read correctly

106
Q

Socket

A

the full destination address to which data is sent, includes the IP address and port number

107
Q

Static IP Address

A

IP address that are manually configured and never change

108
Q

Stream Ciphers

A

used in modern encryption and is applied to each bit of the message individually; the message is broken up into individual bits sand each is altered by the algorithm. This is useful when you don’t know how big your message is and is useful when you have a continuous stream of data

109
Q

Suite of Protocols

A

where networking protocols work together, for example, IP and TCP

110
Q

Symmetric Encryption

A

where the same key is used to encrypt and decrypt the data. This is quick to set up and easy to execute, but is less secure and less modern, and is used in payment applications and banking

111
Q

Synchronous Communication

A

where the sender and receiver are synchronised using a common clock signal

112
Q

TCP/IP Protocol Stack

A

a set of networking protocols represented in four layers, data packets move between layers during network communication and each layer has its own role

113
Q

Application Layer (TCP/IP)

A

layer closest to the user, collects data from and delivers data to other applications, for example: e-mail, web browser, print server, network drive, social media

114
Q

Transport Layer (TCP/IP)

A

creates end-to-end encryption, splits data into packets, adds headers to packets, ensures all packets are sent and received to ensure all data is there, in the correct order and that the destination address exists

115
Q

Internet Layer (TCP/IP)

A

adds source and destination IP address to packets, routers inspect IP addresses on packets and transmit and route packets via the shortest possible path

116
Q

Link Layer (TCP/IP)

A

physical connections on the network, adds MAC address to packets and used to identify unique NICs

117
Q

Tim Burners-Lee

A

invented the world wide web and hypertext markup language

118
Q

Timeout Limit

A

the amount of time packet transfer is expected to take

119
Q

Transmission Modes

A

describe the characteristics of sending data over a link between two nodes

120
Q

WAN

A

Wide Area Network

connects devices but extends a large geographical distance such as leased telecommunications networks

121
Q

WAP

A

Wireless Access Point

allows a network to be connected using radio waves, obviating the need for cabling

122
Q

WHOIS

A

details of registrants and IP addresses