Fundamentals of Communication and Networking Flashcards

1
Q

Bandwidth

A

The range of frequencies that a communication medium is capable of transmitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Latency

A

The difference in time of an action being initiated and its effect being noticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol

A

A set of rules for communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Serial Data Transmission

A

Data is transmitted through a communication line one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parallel Data Transmission

A

Uses multiple parallel communication lines to send multiple bits simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Skew

A

When bits that are sent together may not be received together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crosstalk

A

When signals leak from one line into another which causes data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Synchronous Transmission

A

When data is sent between devices who have their clock speed’s synchronised so data is received in the same order they were sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asynchronous Transmission

A

Uses start and stop bits on either side of the transmission in order time the clock signals of the communicating devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Topology

A

The structure of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Star Topology

A

Network structure where there is a central switch where all client are directly connected to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bus Topology

A

Network structure where there is a single cable (backbone) which every client is connected to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Client-server Networking

A

Type of network where clients are connected to one or more central servers which allow the clients to access all resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Peer-to-peer Networking

A

Type of network where all clients together act as a server to perform and share resources but certain ones are lost when clients are switched off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Service Set Identifier (SSID)

A

Name that identifies a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Media Access Control (MAC)

A

Unique addresses are assigned to every wireless device by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

Protocol used in wireless networks to avoid data collisions when multiple devices are communicating by listening to communication channel and sending data if it’s idle, if not, it waits a random period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Request to Send/Clear to Send (RTS/CTS)

A

This is added on to CSMA/CA to avoid hidden nodes by checking whether the network is idle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Internet

A

Network of interconnected computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Internet Service Provider (ISP)

A

Company which provides their customers access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Packet

A

Container in which data is sent over networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Packet Switching

A

Data transmission where data is broken into packets which are sent across the internet via optimum routes and are then reassembled at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Primary Components of a Packet

A

Sender’s address
Recipient’s address
Time To Live (TTL) - Number of hops a packet can do before being dropped
Packet contents
Sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Router

A

Network device that forwards data packets between computer networks

25
Q

Gateway

A

A computer which that sits between different networks or applications

26
Q

Uniform Resource Locator (URL)

A

An address which is assigned to files on the internet

27
Q

Parts of the URL (7)

A

Protocol
Subdomain (www)
Domain - Name of the organisation
Directory of file being requested (e.g. /news)
Subdirector of file being requested (e.g. /technology)
Name of file being requested (e.g. /index)
File’s extention (e.g. html)

28
Q

Domain Name

A

Identifies an organisation or individual on the internet

29
Q

Domain Name System (DNS)

A

Turns domain names into IP addresses which allows browsers to get to the websites

30
Q

Firewall

A

Sits between the internet and the device and regulates the packets that pass through, can perform packet filtering and stateful inspection

31
Q

Packet Filtering

A

Can accept and block certain packets based on source IP address or protocol they are using

32
Q

Stateful Inspection

A

Examines the contents of the packets before allowing it through the firewall

33
Q

Proxy Server

A

Sits between a public and private network, regulating all the packets that pass through

34
Q

Symmetric Encryption

A

Both the sender and receiver have the same private key to encrypt and decrypt data send between the two parties

35
Q

Asymmetric Encryption

A

Four keys are used in encryption/decryption as there is a public key in which the data is encrypted but only the private key can decrypt it and vice versa

36
Q

Digital Signatures

A

These are used for asymmetric encryption to verify the sender of the data and whether the data has been tampered with

37
Q

Digital Certificate

A

Verifies the ownership of a key pair (public and private key) during asymmetric encryption

38
Q

Worms

A

Type of malicious software which can automatically self-replicate and infect other devices on the network

39
Q

Trojans

A

Type of malicious software that is disguised as a safe/legit file but contains malware when opened or downloaded

40
Q

Viruses

A

Type of malicious software that attaches itself to programs or files so it can replicate and spread through the computer

41
Q

TCP/IP model

A

Defines how devices should transmit data between then and enables communication over a large distance

42
Q

Application Layer

A

Layer of the TCP/IP model which determines which protocol to use for communication and provides the interfaces needed by the user

43
Q

Transport Layer

A

Layer of the TCP/IP model which splits up the data into packets, containing their sequence number and what they consist of and ensures error-free, end-to-end delivery of data

44
Q

Network Layer

A

Layer of the TCP/IP model which handles the routing and sender of the packets across networks

45
Q

Link Layer

A

Layer of the TCP/IP model which facilitates the transmission of the packets across a network (physical layer) to reach the destination MAC address

46
Q

Structure of IPv4 address

A

Network identifier - What network it is on (3 bytes)

Host identifier - What PC in that network (1 byte)

47
Q

Subnet Mask

A

Sequence of binary digits, 1s are repeated until the network identifier has been shown. Mask is ANDed with IP address

48
Q

IPv4 address

49
Q

IPv6

50
Q

Routable IP address

A

Uniquely assigned to devices which are directly connected to public/global internet

51
Q

Who are Routable IP addresses assigned by?

A

Global organisations like IANA

52
Q

Non-Routable IP Addresses

A

(PRIVATE) - Assigned to devices on a private network

53
Q

Network Address Translation (NAT)

A

Converts IP addresses as they get transferred between public and private address spaces (Router)

54
Q

Port Number for HTTP

A

80 and 8080

55
Q

Port Number for FTP

56
Q

Port Number for POP3

57
Q

Port

A

Allows the TCP/IP protocol to decide which application should deal with the packet when it arrives

58
Q

Dynamic Host Configuration Protocol (DHCP)

A

A DHCP server is a device which is responsible for automatically assigning a dynamic IP address from a pool of available addresses to computers which operate on a private or public network