Fundamentals of Communication and Networking Flashcards

1
Q

Baud rate

A

A communication system’s Baud rate is the number of signal changes in the medium per second.

1 Baud (or 1Bd) is equal to 1 symbol change per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit rate

A

A communication medium’s bit rate refers to the number of bits that are transmitted over the medium per second.

This is often measured in bits per second (bps).

Bit rate = Baud rate × № of bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Bit Rate Formula?

A

Bit rate = Baud rate × № of bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the relationship between bandwidth and baud rate?

A

Directly proportional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bandwidth

A

Bandwidth (Hz) relates to the range of frequencies that a communication medium is capable of transmitting.

There is a direct relationship between bandwidth and bit rate. Higher bandwidth results in a higher bit rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Latency

A

Latency in a communication medium, is the difference in time between an action being initiated and its effect being noticed.

For example, if you press the “R” key on your keyboard and the letter R appears on screen 26ms later, the latency in the link between your keyboard and the application you are using is 26ms.

Latency usually increases with distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocol

A

A protocol is a set of rules relating to communication between devices. International organisations decide upon and publish protocols which allow devices made by different manufacturers in opposite ends of the world to communicate seamlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serial data transmission

A

In serial data transmission, data is sent one bit at a time over one communication line (this is usually a metal wire but could also be an optical fibre or a wireless channel).

Serial data transmission is frequently used for transmitting data over medium to long distances (computationally speaking), such as from wired peripherals like mice and keyboards to your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Parallel data transmission

A

Parallel data transmission uses numerous parallel communication lines to send multiple bits between components in a computer simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Serial vs Parallel Transmission:

A

Due to skew, parallel wires are very unreliable over longer distances (> 2M)

Parallel Transmission tends to be more expensive; this is because it uses more connection lines.

Parallel transmission suffers from “Crosstalk”, Serial does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Crosstalk?

A

Occurs in Parallel transmission

It’s where there’s interference between the different lines which can result in data corruption

The stronger the signal, the worse the problem. This is why Serial can transmit more data; it can handle higher signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Parallel Transmission, what’s the relationship between number of lines and data transfer?

A

The more lines that a parallel communication medium uses, the more data can be transferred simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Skew?

A

Each of the communication lines that forms part of a parallel communication medium will have different electrical properties, meaning that the time taken for one bit to be transferred will differ slightly from line to line.

This means that bits sent together may not be received together, a problem referred to as skew.

Skew is worst over long distances and, in extreme cases, can lead to bits from different pulses overlapping, causing corruption of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Synchronous transmission

A

Data is transferred at regular intervals

Synchronised by a clock pulse

Often used in parallel transmission

Useful for real-time data: VoIP and chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asynchronous transmission

A

Each byte is sent separately.

Sent as soon as the data is ready, doesn’t have to wait for a clock pulse.

Each item is set with a parity bit, start bit and stop bit.

Instead of using a shared clock; it uses start and stop bits to indicate the duration of a transmission.

The sender and receiver must use the same Baud rate and only need to synchronise their clocks for the duration of the transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Start bit

A

Used in Asynchronous Transmission

Wakes up the receiver

Synchronises the receiver and the transmitter’s clocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stop bit

A

Allows the next start bit to be recognised

Provides time for receiver to process/transfer the received data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network topology

A

Topology refers to the structure of a network.

There are two types of topologies to consider: physical and logical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical network topology

A

Physical network topology refers to the actual architecture of a network.

Networks using one physical topology will interconnect components differently to those networks that use another physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Physical star network topology

A

In a physical star network, each client has its own direct connection to the central hub/switch.

The hub/switch receives packets for all the clients connected to it and is responsible for delivering them to the correct recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical bus topology

A

A physical bus connects clients to a single cable called a backbone.

A device called a terminator is placed at either end of the backbone.

There is no need for a central hub like in physical star networks and a server can be connected to the backbone just like a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Advantages of Bus Topology

A

Cheap to install

Does not require any hardware beyond the main cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Disadvantages of Bus Topology

A

If main cable fails, no network data can be transmitted

Performance degrades heavily with increased traffic

Security is poor, as all computers on network can see all transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is a Terminator placed at the ends of the backbone?

A

A terminator in bus topology absorbs signals to prevent them from bouncing back and forth, allowing other components to send signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Logical network topology

A

In contrast to a network’s physical topology, a network’s logical topology refers to the flow of data packets within a network.

A logical bus network delivers packets to all clients on the network whereas a logical star network delivers packets only to their recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Mixing topologies

A

If a network is set up as a physical star, it can still behave as a logical bus.

Even if the physical connections between clients and the central hub follow that of the physical star topology, running a bus protocol on the hub allows it to distribute packets to all the connected clients to act like a bus network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Client-server networking

A

In a client-server network, one or more central servers provide services to the clients on the network. Servers are connected to the network in the same way as clients but are often more powerful machines than the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Peer-to-peer networking

A

Peer-to-peer networks don’t have a shared server.

Instead, services are provided by the clients themselves and every client has equal status.

For example, one computer on the network might manage print queues, another manage storage and a third manage emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Routers and gateways

A

A router is a device that directs data packets between networks. It uses routing tables and protocols to determine the most efficient path for forwarding the packets.

A gateway, on the other hand, is a network node that serves as an access point to another network. It is often used to connect networks that use different protocols. It can also translate between different protocols, allowing them to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Uniform resource locators

A

A uniform resource locator (or URL) is an address assigned to files on the Internet. Different protocols can be used in URLs to access different types of files in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Domain names

A

A domain name identifies an organisation or individual on the Internet. They use alphanumeric characters which make them easy for humans to remember. E.g. “google.com”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IP Addresses

A

An internet protocol address (IP address) is a “Unique address which is given to a single network device.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Fully Qualified Domain Name?

A

Host (www.) + domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Domain Name Server (DNS)

A

An internationally agreed structure which classifies the area an internet resource resides.

DNS stands for Domain Name System. It’s like an internet phone book that translates website names into their corresponding IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Packet Filtering?

A

Packet filtering is a process where data packets are examined based on predefined rules as they pass through a network.

The rules can be based on criteria like IP addresses, port numbers, or protocol type.

If a packet matches a rule that allows it, it’s forwarded to its destination.

If it matches a rule that blocks it, it’s discarded.

This helps enforce network security by controlling data flow and protecting against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Encryption?

A

The process of encoding a message so that it can be read only by the sender and the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Packet switching process

A

Network Interface Card (NIC) gets a message to send out data

NIC breaks message into equal packets and numbers them.

Each packet gets a checksum calculated and added to it for error checking.

Packets go to the local Internet Service Provider [ISP] and are checked for errors.

Packets are sent to the router. They may take different paths based on bandwidth and congestion.
Each packet is checked for errors again.

Packets reach the destination computer’s ISP.

Packets reach the destination computer. TCP puts the packets in the correct order.

Protocol bits are removed from the packets, and the data is sent to the application that needs it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Symmetric Encryption

A

Symmetric encryption is a method of encryption where the same key is used for both the encryption and decryption of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Asymmetric Encryption

A

Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption. The public key can be freely distributed, while the private key is kept secret.

Sender and receiver both share there public keys with each other. When sending data the data is encrypted with receivers public key and the receiver decrypt it with their own private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Digital certificates & digital signatures

A

Both methods used to ensure data you send and receive on the internet is authentic.

A mathematical function and a public/private key method is used to make a unique signature to be attached to a message before it is sent.

A digital certificate is a method of making sure an encrypted message is from a trusted source (will have certificate from a certification company).

41
Q

Method for using Digital Signature and certificates

A

A hash function is applied to plain text message to produce a “message digest” (also known as a hash total or checksum). Any change in the plaintext will change the digest.

Private key is used to encrypt the digest. This then becomes the digital signature.

We can tell that it’s authentic since it can only have come from the User with that private key.

The digital signature is now attached to the plaintext and the whole thing is then encrypted with receivers public key and sent.

The encrypted message is then decrypted with the receiving user’s private key.

Digital Signature is extracted and decrypted with senders public key to get message digest.

Plaintext is extracted and hash function is applied to it to get a regenerated message digest.

Compare the regenerated digest with decrypted digest to determine if plaintext message had originated from the sender and that it hasn’t been modified in transit.

42
Q

Malicious Software (Malware):

A

A broad term to describe any software written with the intention of damaging a computer system.

43
Q

Virus

A

Attaches itself to a host program (usually an executable file)

The host file must be opened for the virus to spread.

Most common type become “resident in memory once they’re run”; opened program goes to RAM.

From here, they infect other files by copying themselves.

Often spread through lack of knowledge/awareness; e.g. Dodgy links.

44
Q

Worms

A

Like a virus but can spread without the need for human interaction.

Self-replicating

45
Q

Trojan

A

Programs masquerade as useful, genuine programs.

Often used to create backdoors to your system.

Doesn’t infect other files, doesn’t self-replicate.

Relies on a lack of understanding of what’s being downloaded.

46
Q

How can we protect ourselves from malware?

A

Regular Updates

Installing new OS patches

Updating antivirus

Educate people about…Phishing scams, Firewall protection, Spam filtering

47
Q

TCP / IP

A

TCP / IP stands for transmission control protocol / internet protocol.

The protocol is used in all parts of the Internet to enable different devices to communicate.

48
Q

TCP / IP Stack

A

The protocol is formed from four distinct layers that form the TCP / IP stack. These layers are application, transport, network, and link. Each layer is responsible for a separate part of communication over the Internet.

49
Q

Application Layer

A

This layer interacts with software applications. Examples include HTTP for web browsing, SMTP for email, and FTP for file transfer.

This layer adds the Header - the protocol being performed to the packet.

50
Q

Transport Layer

A

This layer is responsible for end-to-end communication. The TCP parts.

Once connection is made, splits data into packets

Adds relevant information to packets: Packet Sequence Number (to ensure they’re reassembled in correct order), Total Number of Packets, Port Number for Packet

51
Q

Network Layer

A

This layer is responsible for sending packets. The main protocol used here is IP, which is used in almost all internet-based communication.

Adds to packets: Source IP Address, Destination IP Address

Routers operate at this layer; they use the IP Address to know the packet destination

52
Q

Link Layer

A

Adds Source MAC Address

Adds Destination Mac Address

ETHERNET PROTOCOL

53
Q

What is a socket?

A

IP Address + Port {127.56.87.2:80)

Socket tells us:
What device the packet is going to (IP address)
What application on that device needs the packet (port)

54
Q

HTTP (Hypertext Transfer Protocol)

A

Definition: HTTP is a protocol for fetching resources such as HTML documents. It is the foundation of any data exchange on the Web, and it is a client-server protocol, which means requests are initiated by the recipient, usually the Web browser

Ports: HTTP uses port 80/8080

55
Q

HTTPS (Hypertext Transfer Protocol Secure)

A

Definition: HTTPS is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication.

Ports: HTTPS uses port 443 by default q

56
Q

SMTP (Simple Mail Transfer Protocol)

A

Definition: SMTP is a protocol for sending emails over the internet. It is used by email clients to send messages to the mail server of the recipient.

Ports: SMTP uses port 25 for unencrypted communication and port 587 for secure communication. And 465.

57
Q

POP3 (Post Office Protocol version 3)

A

Definition: POP3 is a protocol used by email clients to retrieve emails from a mail server. Retrieves emails from a mail server. Removes it from server and transfers to device.

Ports: POP3 uses port 110 for unencrypted communication and port 995 for secure communication.

58
Q

FTP (File Transfer Protocol)

A

Definition: FTP is a network communication protocol that enables the delivery of digital files from a server to the client, authenticated by a plaintext (unencrypted) sign-in process

Ports: FTP uses two ports, 20 and 21. Port 20 is used for data transfer, and port 21 is used for control commands

59
Q

SSH (Secure Shell)

A

Definition: SSH is a cryptographic network protocol allows you to remotely access a networked device. It is encrypted.

Ports: SSH uses port 22 for its communication

60
Q

CRUD Operations

A

CRUD stands for Create, Retrieve, Update, and Delete.

These are the four fundamental operations for any database or content management system.

CRUD operations are essential for managing data in web applications.

They allow developers to create, read, update, and delete data records, which are the building blocks of any application.

61
Q

REST

A

It is a set of principles used to design web-based systems; it’s a set of guidelines for building scalable and efficient API services.

REST is designed to be stateless, meaning that each request is treated as an independent transaction.

This allows for scalability, as the server does not need to keep track of any state information between requests.

62
Q

How does REST enable CRUD to be mapped to database functions (SQL) for SELECT, INSERT, DELETE, UPDATE?

A

GET = SELECT

PUT = UPDATE

POST = INSERT

DELETE = DELETE

63
Q

CRUD and REST

A

REST enables these four fundamental operations to be mapped to database SQL functions.

The REST API allows JavaScript to talk to a database through HTTP. This means that the client computer needs no knowledge of how the database server works.

It can say it wants to get information from the web server.

The fact that the information is stored in a database and that it needs a special SQL command is irrelevant.

REST takes care of the mapping from the HTTP web request to the SQL command and vice-versa.

64
Q

HTTP Request Methods

A

If you want to create something, HTTP has a method called post.

If you want to retrieve something like a web page, HTTP has a method called get. Also, we have put and delete.

At a database level, SQL has functions that also match insert, select, update, and delete.

The beauty of the REST API is you can issue standard HTTP requests and it’s the REST API that maps those onto the appropriate SQL function.

65
Q

Client and Server Independence

A

The upside of this API is that any client or database server can be developed independently, and they can be sure they won’t break the other one.

This makes the system more robust and reliable.

66
Q

What are JSON and XML?

A

JSON and XML are standards for transferring data between a server and an application, typically a web page.

67
Q

Advantages of JSON

A

Easier for humans to read/write/understand

More compact ()

Supports arrays

Easier to create

Easier for computers to parse and therefore quicker to parse

The syntax and overall structure of JSON is much simpler.

JSON code is passed easily by JavaScript commands because the structure is understood directly in some languages

68
Q

Comparison with XML

A

JSON is converted into either JSON or XML response by the REST API.

The REST API converts the database information into either JSON or XML response.

The difference between JSON and XML is that JSON pulls back the same information in a neater, more compact way than the same XML equivalent.

69
Q

What is the format of IPv6 addresses?

A

Eight blocks separated by colons, each containing four hexadecimal characters (a-z and 0-9).

70
Q

How many unique permutations does IPv6 allow compared to IPv4?

A

IPv6 allows for far more unique permutations compared to IPv4.

71
Q

There are two types of IP address in common use: versions four and six (IPv4 and IPv6)
Compare them.

A

IPv4 is older and has a limit of 4.3 billion unique addresses, while IPv6 is newer and can support a virtually unlimited number of unique addresses.

72
Q

What is the difference between routable and non-routable IP addresses?

A

Routable IP addresses are globally unique, whereas millions of devices can have the same non-routable IP address, provided they are not on the same network.

73
Q

Why is Dynamic IP Address assignment used in home and small business networks?

A

The number of available private IP addresses within a private network is limited.

74
Q

What is Dynamic Host Configuration Protocol (DHCP)?

A

DHCP is used to assign IP addresses to devices as they join a network. It uses a pool of available IP addresses to allocate IP addresses to new devices for the duration of their session.

75
Q

What is Network Address Translation (NAT)?

A

NAT gets around the problem of non-routable IP addresses (it does this by translating the private IP addresses to public ones and vice versa allowing devices on a private network to access the internet) by making a record of the packet before replacing the private IP address of the computer with its own routable IP address.

76
Q

What is Port Forwarding?

A

Port forwarding is used when a client needs to communicate with a server that is connected to a private network. The client sends packets to the public IP address of the router belonging to the server’s private network.
This is often used for gaming or remote desktop services where a device outside the network needs to connect directly to a device inside the network.

77
Q

What is a well-known port?

A

A reserved port number that has a specific purpose

78
Q

What is the Client Server Model?

A

In a network that uses the client server model, clients send request messages to servers, which reply to the clients with response messages. This is the bias of most internet communication, including web browsing and email

79
Q

Compare thin-client and thick-client networks

A

Thin-client networks require less hardware resources because most of the processing power is located at the server end, while thick-client networks require more hardware resources because each client has its own processing power.

Thin-client network clients cheaper because clients have less hardware

80
Q

What is an API?

A

An API (application programming interface) is a set of protocols relating to how different applications communicate with each other.
APIs allow different software systems to interact and share data, even if they were not specifically designed to work together

81
Q

What is the WebSocket Protocol?

A

The websocket protocol is an example of an API which operates in the application layer of the TCP / IP stack. The protocol can be used to provide a constant stream of information between two devices, usually a client’s web browser and a server.

82
Q

Why is the WebSocket Protocol used?

A

It means there is a persistent connection between client and server

Allowing both parties to send data at any time

83
Q

What is the structure of IP addresses?

A

An IP address is split into two parts: a network identifier and a host identifier. { This division allows for efficient routing of data across the internet.}

Each of the computers in a network shares the same network identifier but has its own host identifier.

Networks can be divided into smaller networks, called subnets.

Each subnet has a different network identifier.

84
Q

What is a subnet mask?

A

The network identifier part of an IP address can be determined with a subnet mask.

For example, if a device has an IP address of 192.168.3.24 and a subnet mask of 255.255.255.0, the network identifier can be calculated by applying the subnet mask.

By performing a bitwise AND operation between the IP address and the subnet mask.

85
Q

What does the subnet mask 255.255.255.0 mean?

A

It means that the first three octets (groups of 8 bits) of the IP address identify the network, and the last octet identifies the host within that network.

86
Q

How does the number of bits assigned to the network identifier affect the number of subnets a network can have?

A

The more bits that are assigned to the network identifier of an IP address, the more different subnets a network can have.

87
Q

How does the number of bits assigned to the host identifier affect the number of devices that can be connected to each subnet simultaneously?

A

The more bits that are assigned to the host identifier, the more different devices can be connected to each subnet simultaneously.

88
Q

What is CSMA/CA ?

A

Carrier Sense Multiple Access/ Collision Avoidance

  • a protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously.
89
Q

What is the purpose of CSMA/CA?

A

Attempts to avoid collisions occurring on a data channel

90
Q

What’s the process of CSMA/CA with RTS/CTS?

A

Having determined that no other node is transmitting, the station wanting to transmit sends a Request to Send signal, and the WAP sends a Clear to Send signal back if and when the channel is idle.

Assemble the packet to send.

Check if the channel is idle.

If the channel is idle, send a Request To Send (RTS).

If the RTS is received and WAP has sent Clear To Send (CTS), transmit the data.

If it’s not CTS, wait and check if the channel is idle again.

If the channel is not idle, wait and check again.

91
Q

How does CSMA/CA with RTS/CTS overcome the hidden nodes problem?

A

node that can be heard by WAP but not by node trying to transmit.

92
Q

What’s the process of CSMA/CA without RTS/CTS?

A

Assemble the packet to send.

Check if the channel is idle.

If the channel is idle, transmit the data.

If the channel is not idle, wait and check again.

93
Q

Internet Registries, why are they needed?

A

Five global organisations, governed by the Internet Corporation for Assigned Names and Numbers (ICANN). They hold worldwide databases of all domain names.

94
Q

How Does DNS WORK?

A

URL request by browser from user; e.g. User types in “www.google.com/xyz”

Browser extracts the FQDN and sends it to a DNS server.

Local DNS Server maps the FQDN to an IP Address and returns it to the browser.

If the local DNS doesn’t have that FQDN in its table, it passes it to the regional DNS which has a much larger table.

In the unlikely event that the regional DNS doesn’t have the entry either, it passes it to an NSP (Network Service Provider). Where eventually the matching IP will be found, passed back and added to the Regional and Local DNS.

GET request for the web resource specified in the URL; asks server for the file held in that URL.

File returned to web browser

95
Q

What is a firewall?

A

Firewalls sit between a device and the Internet and regulate the packets that pass through it. Firewalls can be either software or hardware and work as a proxy server which can perform both packet filtering and stateful inspection.

96
Q

What is a Proxy Server?

A

A proxy server works as an intermediary between a client device and a website. The client sends a request to the proxy server instead of the website. The proxy server forwards the request to the website, receives the website’s response, and sends it back to the client. The client receives the response as if it came directly from the website.

97
Q

Why do we use proxy servers?

A

Anonymity

Security

98
Q

The Internet

A

The Internet is defined as a network of interconnected computer networks which uses an end-to-end communication protocol. The Internet is mostly a wired network, with cables that pass under oceans to connect different continents.

99
Q

Internet service providers

A

An internet service provider (or ISP) is a company that provides its customers with access to the Internet.