Data Transmission Flashcards
4-Layer OSI Model
a four-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection
Application Layer (4)
combination of the application layer, presentation layer and session layer, uses protocol such as FTP, HTTP, SMTP, TELNET, PING
Transport Layer (4)
same as the transport layer in 7-Layer Model, the layer where data is split into packets uses protocols such as TCP, UDP
Internet Layer
same as the network layer in 7-Layer Model, uses protocols such as IP
Link Layer
combination of the data-link layer and the physical layer, uses protocols such as ISDN and Wi-Fi
7-Layer OSI Model
a seven-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection
Application Layer (7)
handles initial requests to transmit data
Presentation Layer
handles how information is to be presented
Session Layer
handles requests to transmit data synchronisation of data and traffic conform information
Transport Layer (7)
standardises data being transmitted
Network Layer
handles routing/addressing between systems
Data-Link Layer
handles error checking and correction and formats data for physical transmission
Physical Layer
the physical binary data with no error correction
APIPA
Automatic Private Internet Protocol Address
a Windows feature that enables a client to automatically assign an IP address to itself when there’s no DHCP server available
Asymmetric Encryption/Public Key Encryption
uses a different key to encrypt and decrypt a message. This solves the problem of key sharing in symmetric encryption schemes. The key generation algorithm of an asymmetric generation scheme generates two keys and the keys are generated in such a way that knowing the public key does not make it easier to decrypt information, making it more secure
Baud Rate
the number of signalling events across a transmission medium per second
Bit Rate
the number of bits per second that can be transmitted along a digital network
Block Ciphers
these are used in modern symmetric encryption. The message is broken into blocks containing multiple bits that are encrypted. If the block length is longer than the message, it is padded out with random content to make it longer. This can help obscure the length of the message, and additional information can be hidden in the blocks, such as error checking
Bridge
used to connect two LANs or two LAN segments together, though both must use the same communications protocol
Brouter
combination of bridge and router
Cabling
required to connect all devices on a network together if the network is not wireless, varies greatly depending on network configuration, provides much faster connection that wireless connection, due to less interference and greater bandwidth
Coaxial Cables
consists of a solid conductor, three coats of insulation, and a grounding conductor to conduct electricity
Fibre Optic Cables
cables which transmit signals along glass fibres using laser light signals, allowing data to be transferred much faster than in copper
Twisted Pair Cables
constitutes a combination of insulated copper wires
Circuit Switching
data is sent across a network with all parts of the message taking the same route meaning packets arrive in the order they were transmitted by this is less secure as it is relatively easy to intercept all of the packets in a single message
Client-Sever Networking
where clients make a request for a service or resource from the server. The server responds with the required resource or a security challenge. If it fails, the service cannot be provided by the server
Crosstalk
occurs when electromagnetic interference between wires that are in proximity such as parallel links results in transmitting corrupted data that will need to be re-sent
Default Gateway
the gateway that the network looks for as default as a gateway out
Delivery Model
the sending host sends a beacon to the destination address to see if it is reachable, waits for a reply then sends the actual message. A timer is used to make sure that the message is received
Diffie-Hellman Key Exchange
involves the sender and receiver both creating a secret key (a and b). They also create a public key (g). Both raise g to the power of the keys (g^a and g^b). The numbers a, b and g must be chosen so that g^a and g^b are easy to calculate but computationally hard to reverse, meaning g^a and g^b can be broadcast. The secret keys in a Diffie-Hellman key exchange are prime numbers that are 2048 bits long. To encrypt and decrypt messages the public key must be raised to the power of the private key (g^ba).
DNS
Domain Name System
matches up a user-friendly domain name with an IP address
DNS Servers
have a directory serve which translates domain names to IP addresses
Dotted Decimal Notation
a presentation format for numerical data expressed as a string of decimal numbers each separated by a full stop
Duplex
two-way communication; nodes can both send and receive and can do so simultaneously
Dynamic IP Address
a temporary address for devices connected to a network that continually changes over time and are allocated by your router
End-to-End Principle
where two equivalent hosts are used in communication
Enler’s totient functiton
Ф=(p-1)(q-1)
Forwarding Table
contains addresses to output links
Frame
a group of data packets
Half-Duplex
two-way communication but only one way at a time
Handshaking
the process used to control the flow of data between devices, happens at the start of communication, confirms the speed of transmission and the protocols that will be used
Hopping
going from router to router, changing addresses at each hop
Host Names
a human-readable label made of up to 255 characters that is assigned to a network device
Hub
distributes all data received to all other devices it is connected to, sometimes used in a star network which can cause security problems as well as causing frequent data collisions which slows down the network
International Router
connects international networks
Internet
consists of a network of interconnected computer networks using a globally unique address space based on the IP and the TCP to support public access
Internet Registrars
responsible for registering internet registries
Internet Registries
online retailers where domains can be bought