Fundamentals of Communication and Networking Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Describe serial data transmission

A

Bits are sent one after another along a single wire from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe parallel data transmission

A

Multiple bits are sent simultaneously over parallel wires from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the issue with using parallel transmission over long distances?

A

Each individual wire has slightly different properties, so bits may travel at slightly different speeds, causing skew (data arriving at slightly different times).

Serial transmission is reliable over much longer distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where is parallel transmission used?

A

Over short distances, typically within integrated circuits and within random access memory (RAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As the strength of the signal increases, what issue becomes worse over parallel transmission?

A

Crosstalk
This is interference between different lines which can result in data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why does serial transmission tend to be cheaper than parallel transmission?

A

There is much less complexity in the connections and the physical size of the cables is smaller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does serial transmission result in higher net data transfer rates?

A

It suffers from little interference at high frequencies, allowing the signal frequency to be much higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe synchronous transmission.

A

Data is transferred at regular intervals, controlled by a clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe asynchronous transmission.

A

Each byte is sent separately, as soon as they are ready.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of communication makes use of synchronous transmission?

A

Parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a receiving computer differentiate between data sent with asynchronous transmission?

A

Each “character” is sent with a parity bit, and a start and stop bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define latency

A

A time delay before some component in a computer system responds to an instruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a protocol?

A

A set of rules relating to communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define bitrate

A

The number of bits per second that can be transmitted between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define baud rate

A

The rate at which signals along a wire can change state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is bandwidth in relation to communication?

A

The range of signal frequencies a communications channel may transmit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does bandwidth have a direct relationship with?

A

Bit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a network topology?

A

The way a network and its connected devices are connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

State an advantage of using a bus topology.

A

It is cheap to install as it does not require any additional hardware beyond the main cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State two disadvantages of using a bus topology.

A

If the main cable fails, no network data can be transmitted.
Performance degrades heavily with increased traffic.
Security is poor as all the computers on the network can see what is being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages of using a star topology?

A

Each computer has its own cable to the server, so there are no collisions and performance remains consistent, even with high traffic.

If a single cable fails, only the computer is affected. This makes it easier to isolate faults.

Easy to add new computers to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the disadvantages of using a star topology?

A

Can be costly to install as lots of cabling is needed.
If the switch stops working, the entire network is unable to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the difference between physical and logical topology.

A

The physical topology is how the devices are physically connected.
The logical topology is placed onto the physical topology, it is how the data is transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a client-server network?

A

A centralised server receives and responds to requests for services and data from multiple clients. Here, the clients are server are differentiated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a peer-to-peer network?

A

A decentralised communications model where participants, called peers, interact directly with each other without the need for a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why can wireless signals can be intercepted more easily than wired signals?

A

You don’t have to be physically connected to the network, you can simply be in range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How are wireless networks differentiated?

A

Through the use of a service set identifier (SSID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why might an SSID be hidden from broadcast? How can the network still be joined?

A

It is an added security measure.
In order to join the network, the exact SSID must be known and entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of WIFI?

A

It allows a large number of users to move around freely (wireless network).
It is easy to set up, less expensive, and convenient to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are some of the challenges faced by Wireless Local Area Networks (WLANs)?

A

Speeds are slower compared to wired networks.
Signals can easily be obstructed.
Less secure then wired networks.
Relies on signal strength coming from WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the role of a network interface card (NIC)?

A

It is a hardware device used to connect a device to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How does a NIC convert data to be sent into appropriate signals that can be carried across a medium?

A

In wired networks, the signal is a voltage through a wire, or pulses of light through a fibre.
In wireless networks, it is a modulated radio wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What unique identifier does each NIC have?

A

A Media Access Control (MAC) address. This is allocated by the manufacturer and cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does a hub do?

A

Repeats messages to all connected devices. This is inefficient because the data reaches places other than its intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a switch do?

A

Only sends a message to its intended destination device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How does a switch work?

A

It builds up a table with MAC addresses of every connected device.
When a signal is received, the data is analysed to determine the destination MAC address.
The data is then sent to the port connected to the device with the destination MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is required to allow communication between two separate networks?

A

A router

38
Q

How are routers used in your home network?

A

It is incorporated into the hub provided by your ISP (Internet service provider). It connects your home network to that of the ISP.

39
Q

What is the purpose of a modem?

A

It is used to change the signal so that it can be sent through a cable that uses different technology.

40
Q

What are the main components of a network access device, i.e. home hub?

A

A WAP (Wireless access point), a router, a modem and a switch. The switch will usually have between two and four ports, labelled ‘LAN’ or ‘Ethernet’.

41
Q

How can network access devices be used to control access to a network?

A

Using the MAC addresses of the devices that are trying to connect to the network. A list of approved MAC addresses is kept, and if it isn’t listed the connection will be denied.

42
Q

What is the role of a gateway? How does it work?

A

Allow the transmission of data between networks that use different protocols.

It strips off all of the header data from the incoming packet leaving just the raw data, and then adds a new header in the format required for the destination network before sending it on its way.

43
Q

What is (CSMA/CA)?

A

Carrier Sense Multiple Access with Collision Avoidance.
It is a protocol used in wireless networking that makes sure that network collisions (when two devices attempt to communicate at the same time) are avoided.

44
Q

What are WIFI signals transmitted on?

A

Channels, these have a frequency range of around 22 MHz.

45
Q

State the layers of the TCP/IP stack. Start from the first layer an outgoing data packet would would pass down.

A

Application
Transport
Network
Physical

46
Q

What is the role of the application layer?
(TCP/IP)

A

It uses an appropriate protocol relating to whatever application is being used to transmit data.

For example, a web browser might use HTTP.

47
Q

What is the role of the transport layer?
(TCP/IP)

A

It is responsible for establishing an end-to-end connection.

Once the connection is made, it splits the data into packets ready to be transmitted.

48
Q

Which layer of the TCP/IP stack uses the TCP?

A

Transport

49
Q

When data to be transmitted is split into packets, what is added to each packet?

A

The total number of packets, the number of the packet (its sequence), and the port number the packet should use.

This allows the receiving computer to reassemble the packets in the correct sequence.

50
Q

What is meant by a socket?

A

The destination IP address + the port.

It tells us where the packet is going along with which application requires the packet.

51
Q

Which layer of the TCP/IP stack uses the IP?

A

Network

52
Q

What is added to each packet at the network layer?

A

The source and destination IP addresses.

53
Q

What layer of the TCP/IP stack do routers operate at?

A

Network layer, they use the IP address to know the destination of a packet.

54
Q

What does the physical layer represent?
(TCP/IP)

A

The physical connection between various network nodes.

55
Q

What is the role of the physical layer?
(TCP/IP)

A

It adds the source and destination MAC addresses.

56
Q

What does MAC address stand for?
How is it implemented?
How is it used?

A

It is the Media Access Control address of each device.

It is unique 12-digit hexadecimal code, hardcoded during the manufacturing stage to every single network interface card.

It changes at each hop on the route, so each router will add its own MAC address and the MAC address of the next router until it reaches its destination device.

57
Q

What is the purpose of a port?

A

It allows the TCP/IP protocol to determine which application should deal with a packet once it arrives.

58
Q

Describe FTP, stating its role and where it operates.

A

File Transfer Protocol,
It is an efficient way of transferring data across a network.

It is a high level protocol, operating at the application layer.

59
Q

State what SSH is, and describe its role.

A

Secure Shell,
It is typically used to provide secure remote access to computers. It allows a network to be managed away from the office, giving great levels of control to offsite admins.

60
Q

Describe how SSH works.

A

Client initiates a connection by contacting server.
Server sends a public key to client.
Server and client agree communication rules and open a secure channel.
User is able to login to the remote server host operating system.

61
Q

How can SSH be used to tunnel through a company firewall?

A

The SSH client can establish a TCP connection on a remote port and send commands to that port using the appropriate protocol. This means other requests can be made (e.g. HTTP “GET” request) even if the normal firewall restrictions would block this.

62
Q

What is the role of mail servers?

A

They act like a virtual online post office for all incoming and outgoing mail.

63
Q

What are three main protocols an email server uses?

A

Post Office Protocol V3 (POP3)
Internet Message Access Protocol (IMAP)
Simple Mail Transfer Protocol (SMTP)

64
Q

What does POP3 do?

A

Retrieves emails from a mail server by removing it from the server and transferring it to a device.

65
Q

What does IMAP do?

A

Keeps email on a mail server, allowing synchronicity between devices.

66
Q

What does SMTP do?

A

Transfers outgoing emails from one server to another (i.e. from a email client to a server).

67
Q

What is the problem with POP3

A

By removing emails from the mail server on retrieval, it means a persons other devices will not be able to find the email on the mail server. This causes different emails to be stored on different devices.

68
Q

Explain how a URL request by the browser from a user is handled.

A

Browser extracts Fully Qualified Domain Name (FQDM) and sends it to a DNS server.

The DNS server maps the FQDN to an IP Address and returns it to the browser.

Browser issues a “GET” request to the web server for the web resource specified by the URL.

File is returned to the web browser.

Browser renders contents according to HTML rules.

If the file being rendered contains other URLs, then the browser issues additional requests to obtain these resources from the web server.

69
Q

What is a routable IP address?

A

Unique IP addresses connected directly to the public internet.
Routers store these in routing tables so they can send on packets.

70
Q

What is a non-routable IP address? Why is it referred to as non-routable?

A

Assigned internally to devices on a private network.

Non-routable because routers in the public internet will reject any data packets with source or destination IP addresses which are in the private ranges.

71
Q

What is the role of DHCP server?

A

Dynamic Host Configuration Protocol,
It is responsible for automatically assigning a dynamic IP address from a pool of available IP addresses to a computer which needs to operate on a public or private network.

72
Q

How does DHCP help with the issue of a shortage of IPv4 addresses?

A

Active computers request addresses, and then eventually release them again back into the pool.

73
Q

Describe the role of NAT.

A

Network Address Translation,
It is responsible for converting IP addresses as they pass over the boundary for private and public address spaces.

74
Q

Why does the NAT-enabled router assign a random port number and store it in a NAT translation table with its IP address.

A

This maps to a non-routable IP address inside the network. The NAT-enabled router pretends it is the source address, so the web server sends the information here. Then, the NAT-enabled router uses the socket attached to this information, and the NAT table, to determine where the information actually needs to be sent.

75
Q

Describe the client-server model.

A

A client sends a request to a server, and if the information is available, the server responds with the data that was requested.

76
Q

What is the websocket protocol?

A

A modern API used for communication, typically, but not limited to use with a web server.

77
Q

What is an API?

A

Application Programming Interface,
A set of protocols that define how two applications can interact with each other.

78
Q

Why is the websocket protocol used?

A

It provides a modern, persistent (always open), bi-directional, fast, real-time, and interactive communication stream.

79
Q

State an advantage of using the websocket protocol compared to traditional techniques.

A

Requires less hardware, saving:
Transmission time
Bandwidth
Cost
Space

80
Q

State two applications for the websocket protocol.

A

Online gaming
Instant messaging
Remote cloud based document collaboration (e.g. Google Colab)

(any real-time systems)

81
Q

What is REST? What does it enable?

A

Representational State Transfer,
It enables CRUD to be mapped to database (SQL) functions.

82
Q

How does REST allow any client or server to be developed independently without breaking each other?

A

The REST API effectively allows JavaScript to talk to a database server through HTTP. This means the client computer needs no knowledge of how the database server works, it doesn’t care how its requests are carried out.

83
Q

What is JSON?

A

JavaScript Object Notation,
It is (like XML) a standard for transferring data between a server and an application.

84
Q

State two advantages of JSON over XML.

A

It is quicker and easier for humans to read and understand.

The code is more compact, so it is quicker to transmit.

85
Q

What is thick-client computing?
What is the opposite of thick-client computing?

A

The majority of processing and storage is done on the client computer, with little done on the server-side.

Thin-client computing.

86
Q

State two advantages of thin-client computing.

A

Software updates can be done once on a server and automatically end up on every client.

Much more secure than thick-client computing as all the data is stored in a central place, the server.

87
Q

State two disadvantages of thin-client computing.

A

Reliant on the central server. If this goes down, most the functionality is lost.

There is a much higher demand on bandwidth.

88
Q

State two advantages of thick-client computing.

A

Can be operated without relying on a constant connection to a central server.

Preferred solution for running resource hungry software applications.

89
Q

State two disdvantages of thick-client computing.

A

Often more expensive as higher specification client computers are required.

Every client needs its own software installed, increasing time and effort on the part of the network administration team.

90
Q
A