Fundamentals of communication and networking Flashcards

1
Q

Asynchronous transmission

A

The transmission of data intermittently between devices without the use of an external clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parallel transmission

A

The transmission of data through multiple channels allowing for several bits to be transmitted at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Serial transmission

A

The transmission of data through a single channel of a single bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Start bit

A

The bit used to indicate the beginning of a unit of data in asynchronous transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stop bit

A

The bit used to indicate the end of a unit of data in asynchronous transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Synchronous transmission

A

The transmission of data as a continuous between devices whose time signals are synchronised via a common clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bandwidth

A

The range of frequencies at which data can be transmitted through a channel, measured in Hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baud rate

A

The number of symbol changes, waveform changes, or signalling events across a channel per unit time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit rate

A

The number of bits transmitted per unit time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Latency

A

The time delay between the transmitter sending the data and the recipient receiving the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocol

A

A common set of rules followed during data transmission over a network to minimise inconsistencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logical bus topology

A

A network arrangement where every host computer is connected to a single main data cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical star topology

A

A network arrangement where every host computer has a dedicated connection to a central hub computer or switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Client-server network

A

A type of network organisation where networked computers (clients) connect to one or more powerful central computers (servers) that handles service requests and has resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Peer-to-peer network

A

A type of network organisation where networked computers are connected to each other with equal status and share resources and workloads without any central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Carrier sense multiple access with collision avoidance (CSMA/CA)

A

A wireless protocol where computers attempt to avoid interference or collision in the channel by transmitting data only after the channel is sensed to be idle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Media access control address (MAC)

A

A hardware identification number assigned to network interface cards used to uniquely identify a device on a network for communication purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Request to send / clear to send (RTS/CTS)

A

A protocol to prevent data collision during transmission on a wireless network, involving the transmitter sending a RTS to the receiver, and the receiver sending a CTS back to confirm it is idle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Service set identifier (SSID)

A

A local 32 character identifier for a group of wireless network devices, used to identify the network as a whole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wi-Fi

A

A wireless local area network that is based on international standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wi-Fi protected access (WPA/WPA2)

A

A security certification program that secures wireless networks by encrypting transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wireless network adapter

A

A physical device that allows a computer system to connect to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Wireless access point

A

A physical device that creates a wireless local area network that allows multiple devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Domain name

A

The name that locates a domain on the internet. It is included as part of a URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Domain name server (DNS) system

A

A hierarchical and decentralised naming system for computer systems connected to the Internet. It contains the IP addresses of all domain names on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fully qualified domain name (FQDN)

A

A domain name specifying the exact location of a domain in the Domain Name Server System hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Gateway

A

A device that allows data to flow from one network to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet

A

A global network of computer systems communicating using TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Internet registries

A

Organisations responsible for the allocation and distribution of domain names and IP addresses.

30
Q

IP address

A

A numerical address assigned to any device communicating via Internet Protocol on a network that identifies its host and addresses its location.

31
Q

Packet

A

A block of data.

32
Q

Packet switching

A

A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination.

33
Q

Routers

A

A device used to direct packets being transmitted between networks.

34
Q

Uniform resource locator (URL)

A

A reference to a resource on the Internet that is able to locate and retrieve it.

35
Q

Firewalls

A

A security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent external users from gaining unauthorised access between two networks.

36
Q

Asymmetric encryption

A

An encryption technique where a public key available to everyone is used to encrypt the data, and the data is decrypted by the paired private key known only by the recipient.

37
Q

Symmetric encryption

A

An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties.

38
Q

Digital certificate

A

An electronic document providing ownership of a public key and hence authenticating your identity.

39
Q

Digital signature

A

A mathematical scheme for producing a unique signature, that verifies the authenticity of encrypted digital messages.

40
Q

Trojan

A

A malware that hides within another file and misleads the user of its true intent.

41
Q

Virus

A

A program that attaches itself to another computer file to infect a computer system by replicating itself and inserting its code into other files.

42
Q

Worm

A

A standalone virus capable of spreading and infecting a computer without being attached to a file.

43
Q

Ports

A

A communication endpoint that addresses a service on a network. It is used to represent services or applications.

44
Q

Sockets

A

A software that serves as an endpoint for sending and receiving data across a network.

45
Q

Transmission Control Protocol / Internet Protocol (TCP/IP) stack

A

A suite of networking protocols that allow networked computers to communicate, consisting of 4 connected layers. Incoming and outgoing data packets are passed through these layers.

46
Q

Email server

A

A computer system on a network designated to handle emails being sent and received by other computers on the network.

47
Q

File transfer protocol (FTP)

A

A protocol used for downloading or uploading files from a computer system.

48
Q

Hyper text transfer protocol (HTTP)

A

A protocol used to fetch, render and transmit webpages.

49
Q

Hyper text transfer protocol secure (HTTPS)

A

An encrypted version of HTTP.

50
Q

Post office protocol version 3 (POP3)

A

An application-layer internet standard protocol used to receive emails from a server.

51
Q

Secure shell (SSH)

A

A cryptographic network protocol for secure remote access to computers.

52
Q

Simple Mail Transfer Protocol (SMTP)

A

An internet standard communication protocol for sending emails.

53
Q

Web browser

A

An application software used to view webpages a computer system had requested from a web server.

54
Q

Web server

A

A computer system on a network designated to handle web requests through HTTP(S).

55
Q

Host identifier

A

A series of bits that form part of the IP address that uniquely identify the computer on the network it is in.

56
Q

Network identifier

A

A series of bits that form part of the IP address and identify the network the computer connected to the internet is on.

57
Q

Subnets

A

A smaller network that forms a subset of a whole network.

58
Q

Non-routable IP address

A

A private IP address used for a device on a private network hidden behind a router or firewall.

59
Q

Routable IP address

A

A public IP address that is registered under the DNS.

60
Q

Dynamic Host Configuration Protocol (DHCP)

A

A protocol for allocating unique dynamic IP addresses for computers on a local network when the local network attempts to connect to the internet.

61
Q

Network address translation (NAT)

A

The process of mapping a private IP address to a public IP address by modifying address information in the packet header when the packet is sent through the router.

62
Q

Port forwarding

A

The process of routing data through additional ports to allow a server in a non-routable network to provide services to the internet.

63
Q

Client server model

A

A model where the client sends a request message to the server, and the server responds to the request by replying with a response message to the client.

64
Q

CRUD applications

A

A web application with create, retrieve, update, and delete functionality.

65
Q

Extension markup language (XML)

A

A markup language for encoding documents to be sent over a network in a human-readable and machine-readable format.

66
Q

JavaScript object notation (JSON)

A

A human-readable file format used for transmitting information in attribute-value pairs and arrays.

67
Q

REST

A

A representational state transfer methodology used to map a network’s functionality to database operations.

68
Q

Web socket Protocol

A

A protocol specification which defines an API (Application programming interface) establishing a full-duplex ‘socket’ connection between a web browser and a server over TCP. This creates a persistent connection between client and server.

69
Q

Thick client computing

A

A network where the clients have sufficient processing power and storage to handle its requests, while the server acts as external storage.

70
Q

Thin client computing

A

A network where a powerful, central server computer, contains the majority of the processing power and storage capacity to handle client requests.