Fundamentals of communication and networking Flashcards
Since the year 2000, hard drive data communication has changed from favouring PATA (Parallel ATA) protocol to SATA (Serial ATA) protocol.
Explain what is meant by the term ‘protocol’. (1 mark)
A set of rules OR standards (to allow for data transmission)
Since the year 2000, hard drive data communication has changed from favouring PATA (Parallel ATA) protocol to SATA (Serial ATA) protocol.
Describe the difference in operation between parallel and serial data transmission. (2 marks)
In parallel transmission data is sent simultaneously (through a number of wires/lines). (1)
In serial transmission data is sent consecutively/one after another (through a single line). (1)
Since the year 2000, hard drive data communication has changed from favouring PATA (Parallel ATA) protocol to SATA (Serial ATA) protocol.
State disadvantages for using parallel data transmission for peripheral devices (4 marks)
- Interference OR crosstalk from the other wires (1)
- Data sent simultaneously might arrive at different times OR data skew (1)
- Parallel data cables more expensive to manufacture (1)
- The longer distance needed for peripheral devices makes interference OR crosstalk more likely (1)
A computer network lists different values for the baud rate and bit rate of its transmission speeds.
State one other measure of network speed
Bandwidth OR latency
A computer network lists different values for the baud rate and bit rate of its transmission speeds.
Explain the impact of bandwidth on the bit rate (2 marks)
A wider bandwidth means that each signal can contain more than 1 bit OR can be used to represent more than two possible values (1) meaning that the bit rate can be higher than the baud rate (1)
A peer-to-peer network would remove the need for a server. Explain why this would not be an effective solution for the firm of solicitors (2 marks)
Data would not be centralised OR separate copies would be held on each workstation so a workstation may not hold the current/correct version of a file (1)
Changes made on one workstation may not be reflected on the other workstations (1)
(Allow other suitable terms for workstation, e.g. computer, device.)
A cafe currently has a small wired network consisting of two PCs for office work, a modem and a printer. The owner of the cafe is considering the option of adding wireless functionality to the network.
State the name of one piece of hardware that would be reuired to add wireless functionality to the network.
Wireless access point
OR
wireless router
OR
wireless network adapter
(Refuse ‘wireless modem’.)
A cafe currently has a small wired network consisting of two PCs for office work, a modem and a printer. The owner of the cafe is considering the option of adding wireless functionality to the network.
Describe benefits to the cafe of adding wireless functionality
- More customers may visit because of access to public WiFi.
- Computers OR staff can be moved more freely (1) allowing for more flexible working practices (allow any sensible example).
- Café can charge customers for WiFi increasing profits.
Explain why a wireless network may introduce a new security risk to the network (3 marks)
- Wireless signals are not restricted to the physical building.
- Data can be received without physical access to the network.
- Anyone with a wireless network adapter can receive the transmission/data/signal.
Describe methods of securing a wireless network (6 marks)
Mark in pairs:
- Hide the network’s SSID (1) so that only people who know about the network are able to access it. (1)
- Encrypt the network OR use WPA/WPA2 encryption. (1) Refuse ‘password’ so that unauthorised users cannot understand the signal/data OR data is meaningless to anyone without the key. (1)
- Use MAC address filtering OR a MAC address whitelist (1) so that only authorised devices are able to access the data. (1)
When a wireless device is ready to send a message, state four steps that the wireless device might carry out as part of CSMA/CA (4 marks)
- Listen for a current transmission.
- Pause (and try again) if a transmission is detected.
- Send the message if one is not detected.
- If another transmission is detected at the same time the message was sent (1), wait a random amount of time. (1)
Explain one benefit and one drawback of using RTS/CTS (4 marks)
Benefits:
In the case of collision, RTS is a small message to resend (1) instead of having to resend the whole message (1) especially on a busy network. (1)
Drawbacks:
Increased latency OR more data needs to be transmitted overall OR delay while performing the RTS/CTS protocol (1) especially on a quiet network (where collisions are less likely). (1)
A student is using file transfer to send data across the internet.
Packet switching is used to transfer the data. Describe what is meant by ‘packet switching’ (4-7 marks)
- Data is split into packets.
- Each packet is given an (IP) address.
- Each packet is placed onto the internet via a gateway OR router.
- Each packet is sent independently.
- Routers forward the packets until they arrive at their destination.
- Each router decides on the path for that packet.
- Packets are reassembled once received.
A student is using file transfer to send data across the internet.
State items of data that are included in a packet (3-7 marks)
- Sender’s IP address
- Receiver’s IP address
- Packet number
- Error checking data OR parity bit(s) OR checksum bit(s)
- Length
- Priority
- Payload OR original data.
Explain the difference between a gateway and a router (2 marks)
A gateway is used to allow data to be placed onto/accepted from the internet. (1)
A router is used to forward data across the internet. (1)
State an advantage of using a domain name instead of an IP address to identify the server
Easier to remember OR recognise OR provides information to the user (e.g. name of the organisation).
Explain how DNS is used to allow the student to make use of the server’s domain name (5 marks)
- When the user enters a domain name, a DNS lookup occurs.
- A request is made to the DNS server to find the IP address for a given domain name.
- DNS server/Domain Name Server holds a table of domain names and corresponding IP addresses.
- The DNS server responds with the corresponding IP address.
- The (file transfer) software uses the IP address to establish a connection.
State one situation where a DNS request will not be required when the student enters a domain name
The DNS result is stored in the user’s cache (because it was used recently) OR stored on the user’s computer (in the hosts file).
Data can be encrypted using symmetric or asymmetric data encryption.
State the difference between the two principles
Symmetric encryption uses the same key to encrypt and decrypt the data OR asymmetric encryption uses different keys to encrypt and decrypt the data
Explain how private-public key encryption can be used to ensure that data can only be decrypted by the receiver ( 3-5 marks)
- A public key is made available to everyone.
- The data is encrypted using the public key.
- Because the encryption is asymmetric, no other users can decrypt the message.
- The authorised receiver of the data holds the private key.
- The message can only be decrypted using the private key.
Private-public key encryption can also be used to authenticate a message using a digital signature. Describe the principles of operation of a digital signature. ( 5 marks)
Any five from: (5) (max. three from either sender/receiver)
Sender
- The message is hashed (to generate a shorter message digest).
- The hash OR a message is encrypted using the sender’s private key.
- The encrypted code is added to the original message.
- The message is transmitted OR received.
Receiver
- The public key is publicly available.
- The encrypted code is decrypted using the public key.
- The message is hashed.
- The decrypted code is compared to the hash.
Explain the purpose of a digital certifcate (3 marks)
To prove that a user’s public key is authentic (1) by encrypting the public key using the certificate authority’s private key (1) and decrypting it using the certificate authority’s public key. (1)
Describe the principles of operation for virus malware (3 marks)
- Code/program that attaches itself to a file (1)
- Self-replicating OR copies itself when the file is run (1)
- Completes some malicious action OR by example. (1)
Describe the principles of operation of a worm malware (3 marks)
- Code that exploits a weakness in the network (as opposed to attaching itself to a file) (1)
- Software is standalone (1)
- Replicates automatically OR without having to be run by the user (1)
Describe the principles of operation of trojan malware (3 marks)
- A program that tricks the user into running it OR a program that pretends to do one thing but actually does something else (1)
- Does not self-replicate (1)
- Must be loaded/executed by the user in order to function (1)
State the name and the purpose of each of the layers of the TCP/IP stack (8 marks)
- Application: (1) protocol-specific data OR data required by an application OR payload (1)
- Transport: (1) used to split the data into packets OR packet number OR port number (1)
- Network OR internet: (1) used to address each packet OR sender’s IP address OR receiver’s IP address (1)
- Link: (1) used to put the packet onto the transmission medium OR sender’s MAC address OR receiver’s MAC address (1)
Data is transmitted acrsoss a network using the TCP/IP protocol.
Identify which two layers are required in order to open a socket.
Transport and network
OR
Transport and internet
Data is transmitted acrsoss a network using the TCP/IP protocol.
State the name of the layer that is used to store the MAC address of the recipient.
Link