Data Transmission and Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Methods of transmission

A
  • Copper cables using electrical pulses
  • Radio frequency (wireless)
  • optical fibre (light)
  • infrared
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use of fibre optic cables

A

Carry almost 100% of worldwide internet and phone traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bandwidth

A

Amount of data that can be carried at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Serial Transmission

Method:

Advantages:

A

Bits are sent one signal at a time

Advantages over parallel:

  • smaller and simpler connectors
  • crosstalk creates interference between parallel lines and can result in corrupted bytes which would need to be retransmitted
  • serial links are much more reliable over greater distances than parallel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parallel Transmission

A
  • Signals (bits) are sent simultaneously over a number of parallel wires
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crosstalk

A

Crosstalk occurs when a signal from one line gets transferred to another line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Skew

A

Each wire in a parallel cable has slightly different properties so the signals travel down the wires at slightly different speeds. This means the transmission must be over very short distances to avoid this problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simplex Transmission

A

Data travels in one direction only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Half duplex transmission

A

Data can travel in both directions along a single cable, but not simultaneously (not in both directions at the same time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Full) Duplex transmission

A

Data can travel in both directions simultaneously using two cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bit rate and Baud rate

A

The speed of data is measured in bits per second
The baud rate is the rate at which the signal changes
Baseband means one signal (bit) is sent at a time down a serial connection

In standard baseband, bit rate = baud rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why serial transmission can be faster than parallel

A

With higher bandwidths, more than one bit can be coded in a signal, increasing the bit rate

  • Bit rate of channel = baud rate x number of bits per
    signal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transmission errors

A

When data is transmitted, it doesn’t always arrive in the same format that it was sent

  • Electric interference
  • Power surges
  • Synchronisation
  • Wear and tear on the cable or connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Error checking

A

Computers need methods to check for data transmission errors caused by interference

These methods include the use of:

  • Parity bits, blocks
  • Check digits
  • Check sums
  • Automatic Repeat reQuests (ARQ)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Parity bits

A

Computers use either odd or even parity

When sending a byte of data one bit is used as a parity bit

This is bit is set to a 1 or a 0 to make the total number of 1s and 0s in the byte (including the parity bit) odd or even depending on the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using Parity for error detection

A

When data is transmitted, the parity bit is set at the transmitting end and parity is checked at the receiving end

If the wrong number of bits are ‘on’, an error has occurred

The receiving computer notifies the transmitting end and the data is resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Check digits

A

A check digit is an additional digit at the end of a string of other numbers designated to check for mistakes in input or transmission

Printed books and other products have a unique barcode with an ISBN (International Standard book number) EAN (European Article Number)

The first 12 digits of the barcode are the unique item number, the 13th is the check digit

This can be calculated using the Modulo 10 system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Check sums

A

A check sum works similar to a check digit

The checksum of all bytes in a data transmission is calculated using an algorithm

The check sum is sent with the data

The receiving computer recalculates the checksum based on the data it received and compares it with the checksum received or a known, expected value

If it does not match, the data may have been altered or corrupted during transmission and the data is resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Automatic Repeat reQuests

A

Computers using ARQs will automatically return an acknowledgement that the data was correct

The simplest stop and wait ARQ will resend the data if an acknowledgement is not received within a specific period of time period, it will assume that there was a flaw in the data or transmission error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the internet

A

A collection of interconnected networks, not the world wide web as that is a part of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISP

what do they supply

what they allow you to do

storage in an ISP

A

ISPs are companies supplying connectivity to the internet, email services, web hosting and VOIPs.

You connect to the Internet service provider that you are contracted with, when you connect to the ISP you become a part of their network. This ISP may connect to a larger network and become a part of that.

Every ISP has its own data storage facility.

22
Q

Browser softwares

Examples
How to access

A

Internet explorer, google chrome and firefox are all browser softwares. One way to access a particular page is by typing its address into an address bar.

23
Q

Cloud based services

Mini def
Examples

A

Servers host software or services that you can access.

Online storage:
Dropbox
OneDrive
Google Drive

24
Q

Connecting to the internet

A

PC > Router > Modem > ISP > Internet

router provides access to local area network
modem connects to your internet service provider (ISP)
- modem no longer used in modern technology
ISP connects you to the internet

25
Q

Modem

A

stands for modulator/demodulator
converts digital signal from computer and converts to analogue signal for phone lines
a second modem at the receiving end converts the signal back to digital

26
Q

Router

A

A router is a hardware device that allows you to connect several devices to a single internet connection (home setting)
Many routers have a WAP (Wireless access point) allowing you to create a wireless access point

27
Q

TCP/IP protocol

A

TCP (transmission control protocol)

  • breaks up messages sent over the internet into packets
  • reassembles packets at the other end
  • detects errors
  • resends lost messages

IP protocol
- routes the individual packets between sender and recipient

28
Q

HTTP and HTTPS Protocol

A

HTTP (hyper text transfer protocol) used for accessing and receiving web pages in the form of HTML files on the internet
The protocol requests the web server to upload the requested web page to the users browser for viewing

HTTPS (secure protocol) encrypts the information so that it can not be hacked

29
Q

Packet switching

files and packets micro def

packet header

A

Each file is broken up into packets
Each packet is given a header containing:
- IP address its going too (Internet protocol)
- IP address it came from
- Sequence number of the packet
- Number of packets in the whole communication

30
Q

IP Addressing

A

Every device connected to the internet has an IP address
eg. 81. 101. 137. 12
Packets are labelled with the senders and the destinations IP address
Packets are sent across the internet along separate routes and reassembled at the end

31
Q

Public vs Private IP addresses

A

A PC network has a public and private IP address
Public IP belongs to the router on your LAN
Private IP is accessible only through the LAN

ISPs are allocated blocks of IP addresses
Once a message arrives at the router of your LAN it will use the private IP address to identify which device requested information

32
Q

MAC Addressing

in full and assigned by who

how many addresses and for what

what it looks like

similarity of and combinations

role

A

A media access control address is assigned to each Network interface card by the manufacturer.

Computers may have 2, one for ethernet and one for wireless or for a phone wireless and bluetooth

Hex value eg.
3B:14:E6:39:0A:2C

Every network device in the world has a unique MAC address
There are 2^48 possible MAC addresses

Role of a MAC address:
When you request a web page each router along the way uses the MAC address of the next router to send the data packet to the next leg of its journey.

33
Q

URL

A

Uniform resource locator is a web page and all are unique

WWW.

Domains names (TDLs)
.uk , .nz etc
34
Q

DNS

A

Domain Name system
DNs technology allows you to type a URL into your web browser and it translates the web address into an IP address.

There are 13 DNS “root” servers worldwide that keep complete database of all names and IP addresses
Lower level DNS servers are owned by ISPs and hold parts of the database
When a DNS server receives a request not in its database it will pass it on until reaches one with the matching name and IP address

35
Q

Cookies

A

A cookie is a small data file that a web server puts onto your computer when you visit a website

Cookies save any data entered such as registration details, passwords and relevant adverts for you as well as web preferences.

36
Q

Role of a browser

how browser gets webpage/website on your computer

A
  1. User types web address (URL) into browser
  2. Browser forwards request to web server to access page
  3. Web server acknowledges request and sends HTML source code for the web page to the computer
  4. Source code is rendered (translated) into viewable web page
37
Q

Malicious software

what it does

what it can/typically does

types x6

A

Malware is any software written with malicious intent.

  • Disrupt computers from their work
  • Corrupt files
  • Record key presses and gather information
  • Gain unauthorised access to a computer or files

Not all viruses cause harm, but the ones (most) that do:

  • limiting hard disk space and memory
  • destroying or damaging files and data
  • spamming your address book with contacts
  • consuming your internet bandwidth

Types of Malware:

Spyware,
gathers information, installs more spyware, sends information back to spyware author, sells to advertising companies or help with identity theft

Adware,
irritating pop ups, instals itself on a computer, rarely harms

Viruses,
small program that replicates by inserting itself in other computer programs
- attach them self to existing software programs and infect when you run that program
- self replicate

Worms,
a standalone file that does not need a host program to attach itself to

Trojans,
a non-self-replicating virus that masquerades as a harmless file that you might want to open

Ransomware,
malware used to lock your computer or access to your flies for which you are then asked to pay a fee to regain access

38
Q

Botnets

A

A virus can compromise a computer and use the host’s storage and processing power to perform jobs

This computer can then become a part of a Botnet network ( a group of computers secretly cooperating to send spam or cause disruption on a much larger scale)

Computers in a botnet can:

  • send email spam to other users
  • store and distribute illegal material
  • perpetrate a Denial of Service attack
39
Q

DOS attacks

A

Denial of service attack
Frequently aimed at company or web servers to overload them or make them crash by:
- flooding servers with millions of requests
- absorbing 100% of its processor time or memory
- using all available bandwidth

Attempts to make a network or website unavailable to legit users and the motive is often revenge, blackmail or terrorism

40
Q

Reducing the risk of any cyber security issues

A
  • personal vigilance
  • scan external devices and drives
  • anti-virus softwares
  • firewall software
41
Q

Anti-virus softwares

what they do

how they do

A
  • detects viruses
  • deletes or quarantines infected files
  • commonly finds all malware including adware, spyware,
    worms and Trojans

Works by:

  • holding a dictionary of snippets used in viruses
  • scans new files, downloads, external drives on your computer
  • looks for suspicious codes by comparison
  • keeps a dictionary of know viruses up to date
42
Q

Firewall

A
  • acts as a filter or barrier between your own trusted
    network and others
  • only allows certain data packets across that meets set
    filtering rules
43
Q

Hacking

A

Breaking security defined as unauthorised access to files or data

  • Exploiting weaknesses in websites or security systems
    to access data
  • Guessing default or common passwords
  • Tricking people into downloading malware to gain
    access to their computer
  • Logging in as someone else without their permission

In order too:

  • pure mischief or a challenge
  • steal money
  • steal or modify information
  • for political reasons, expose wrongdoing or revenge on opposing views
44
Q

Black and white hats

A

Black hat hackers are illegally hacking with criminal intent

White hat hackers ethical hackers employed by companies to deliberately find holes in their own security

Grey hat hackers look for wholes in other systems and ask for a payment from those systems

45
Q

Cracking

A

Not hacking

Illegally accessing program source code to change it or fool it to:

  • Bypass security or licensing control
  • prevent software from expiring
  • unlock features that otherwise would require a subscription
46
Q

Hyper Text Markup Language

A

International standard language that all pages can read and all pages are written in.

Webpages, webpage code

47
Q

HTML Code

A

In a text file containing the content of the website to be displayed by the browser

Uses to govern how to present sections of content

Stores locations of images that are to be displayed

Stores the location of other websites that are linked to using hyperlinks

48
Q

HTML vs CSS

A

HTML controls content and function of a web page

Cascading Style Sheets control its style and appearance

49
Q

Writing HTML code

A

open <> and close >

Websites are made of a head and body

<h1> , <h2>, <h3>, <h4> - different headings (main , sub)

<img></img>

<em> </em>:
emphasis

<a>
Click here for more info
</a>:
link placed in middle line, click to access</h4></h3></h2></h1>

50
Q

Adding CSS to a webpage

A

Define the style at the top between tags

h1 {colour:blue; text-align: centre}

Everything that falls inside the style tag, that html will adopt that style

Sector ==> h1 or other
Declaration ==> property and value
Property ==> colour or other
Value ==> blue or other

h1 {colour: blue;}

To add a CSS style:
Define a style for a particular tag eg. h1
or
Define a general style and attribute it to a new name eg. #page

Attribute style to a <div> block:
Image file on desktop

</div>