Fundamentals of Communications & Networking Flashcards

1
Q

How do you calculate bit rate?

A

Baud rate x Number of bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is baud rate?

A

The number of signal changes in the medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is bit rate?

A

Number of bits transmitted over the medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is bandwidth?

A

The range of frequencies a communication range is capable of transmitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the relationship between bandwidth and bit rate?

A

Direct relationship (directly proportional - straight line through the origin graphically)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is latency?

A

The difference between an action being initiated and its effect being noticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a protocol?

A

A set of rules relating to communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is serial data transmission?

A

Data being sent one bit at a time over one communication line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is serial data transmission used for?

A

Transmitting data medium/long distances (peripherals to computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is parallel data transmission?

A

Numerous parallel communication lines send multiple bits between components simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a skew?

A

(Parallel) Each medium of a communication line has different electrical properties - bits sent together may not be received together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is crosstalk?

A

(Parallel) Signals from one line can leak into another - data corruption is caused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Serial advantages?

A

No skew, no crosstalk, cheaper to install, more reliable (long distances)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Synchronous transmission?

A

When the clock signal is shared between sender & receiver and times when signals are sent. Signals are sent in regular intervals and in the same order they’re sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is asynchronous transmission?

A

No shared clock signals, you instead use start and stop bits to indicate the duration of a transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the requirements for asynchronous transmissions?

A

Same baud rate and synchronising their clocks (for the duration of data transmission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a start bit do?

A

Starts the receiver clock ticking and synchronises the receiver clock to the transmitter clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the stop bit do?

A

Provides time for the receiver to process the received data and allows next start bit to be recognised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical star network advantages?

A
  • Easy to add and remove clients from the network
  • Eliminates the possibility of collisions
  • Failure of 1 cable doesn’t effect network performance
  • Packets sent directly to recipient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Physical star network disadvantages?

A
  • Expensive to install due to cabling
  • If hub fails, all network communication is stopped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical bus topology advantages

A
  • No central hub which reduces chances of network failure
  • Cheaper to install as less wiring
  • Cheaper installation costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical bus topology disadvantages

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Client-Server Networking - what is it?

A

One/more servers provide services to clients
Serverd are more powerful machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do clients get resources and services in a client server network?
What services can be provided?

A

Request services from the servers which then respond to the client with the requested service.
Emails, user accounts, print queues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Advantages and disadvantages of client-server networking?

A

Advantages:
Centralised security via server
Management of clients via server
Disadvantages:
Requires expertise to set up and manage
Cost of server
Cost of expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Peer-to-peer networking - what is it?

A

No shared server
Each client has equal status on the network, services are requested from client to client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Advantages and disadvantages of peer to peer network?

A

Advantages:
Cheaper to install
Less expertise
Disadvantages:
If one client goes down, whole network stops working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Digital signatures in asymmetric encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is thick-client computing?

A

A network with clients powerful enough to not need a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Advantages & disadvantages of thick client?

A

Advantages:
- Less risk of collisions
- No expertise needed to set up
- Less expensive set up
Disadvantages:
- Harder to maintain
- No central security/software managements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is thin-client computing?

A

The majority of the networks processing power belongs to the server(s), provides services to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Advantages & disadvantages of thin client computing?

A

Advantages:
- Easy to add new client (inexpensive)
- Greater centralised network control
Disadvantages:
- Expensive set-up and maintenance
- Needs expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are routers?

A

Used to send packets to the recipient via the fastest route (less hops/least congested).

34
Q

What are gateways?

A

Used when there are different protocols in play - strips away packet details other than contents & gives new sender & receiver address which complies with new protocol.

35
Q

Contents of a packet?

A
  • Senders address
  • Receivers address
  • Packet contents
  • TTL
  • Sequence number
36
Q

What is packet switching?

A

When data is sent in packets, each is sent to the recipient via the best possible route and reassembled when it reaches the recipient.

37
Q

What is a uniform resource locator?

A

An address assigned to files on the internet.

38
Q

What is a domain name?

A

Used to identify an organisation or individual on the internet - easy to remember.

39
Q

What is a fully qualified domain name?

A

A domain that specifies an exact resource - can only be interpreted 1 way. Always uses server hosts name.

40
Q

What is an IP address?

A

Assigned to every computer on the internet - hard to remember so we use domain names.

41
Q

What is the DNS system?

A

Stores a table of FQDN and the corresponding IP addresses, a distributed database of mappings.

42
Q

How are DNS servers organised?

A

Into a hierarchy

43
Q

How do DNS servers support load distribution?

A

Returning 1 IP address from a list.

44
Q

What are internet registries?

A

An organisation responsible for the allocation of IP addresses, only 5

45
Q

What is a part of the internet registries work?

A

Protect the pool of unallocated IP addresses. When an IP address is requested, it looks for an unused one rather than a new one.

46
Q

What are worms?

A

Pieces of malicious software that self-replicate between computers.

47
Q

What are trojans?

A

Disguised as a benign file - spread as email attachments usually.

48
Q

What are viruses?

A

Executable files that lie dormant until ran, spread over anything - priv network, the internet or flash drives.

49
Q

How do we prevent malware?

A
  • Good code quality
  • Up to date software
  • Have an anti-virus (which is utility software), scan the files and remove suspicious.
  • Train employees about the risks of suspicious mail attachments.
50
Q

What is WiFi?

A

Provides wireless networks, based on international standards.

51
Q

How are wireless networks encrypted?

A

WPA or WPA2 - means a new client enters a password when logging into a new network.

52
Q

How do you secure wireless network with SSID?

A

Disable the SSID broadcast so that only those who know it can connect, those in range who don’t know it can’t see it.

53
Q

How do you secure wireless network using MAC address filter?

A

Whitelist - only allow specific devices to connect to a network.
Blacklist - block specific devices from connecting to a network.

54
Q

Steps of CSMA/CA?

A
  • Computer with data to send listens if channel is idle
  • If not idle then wait
  • When no data, sends a request to send
  • receiver responds to RTS with clear to send
  • RTS/CTS blocks any other transmissions
  • sender transmits
  • receiver acknowledges after all data is sent
  • if no acknowledgment then resend after a random waiting period
55
Q

IP address split into 2 parts..

A

Network identifier- Smaller networks have diff, each device on network has same
Host identifier- Different for each individual device

56
Q

More bits on network identifier?

A

More different subnets.

57
Q

More bits on host identifier?

A

More devices can be connected simultaneously.

58
Q

IPv4?

A
  • Has 32 bits
  • Dotted quad numbers, 4 parts
  • Each of the 4 parts has one byte
  • 256^4 different IPv4 addresses
  • Short supply
59
Q

Why have we got IPv6?

A

Short supply of IPv4, num of devices that need this increasing so rapidly.

60
Q

IPv6?

A
  • 8 blocks
  • Each has 4 hex characters
  • 10^37 permutations
  • Has 128 bits
61
Q

Public IP addresses (routable)

A

Globally unique.
Most home addresses have 1.
Global authorities assign.

62
Q

Private IP addresses (non-routable)

A

Millions of devices can have the same (has to be 1 per network though)
Packets are sent to this IP address.

63
Q

DHCP?

A

Assigns IP addresses to devices (from a pool of available), once a device leaves the network the IP address is back in the pool.

64
Q

NAT?

A
  • Sends packets through the router (makes record of packet)
  • Replaces private IP address of the computer with routers routable IP address
  • (RESPONSE) sent to routers public ip address, forwarded to correct private IP address (using the record)
65
Q

What is port forwarding?

A

Used when client needs to communicate with a server
- Client sends packet to public IP address of router
- Packets sent by client contain port num of application running on server that client wants
- private network router forwards packets to server using NAT

66
Q

What is the client-server model?

A

Client sends request messages to server, server responds with response messages containing requested information.

67
Q

What is an API?

A

A set of protocols relating to how different applications communicate with each other. Defines how interaction between the applications should be carried out.

68
Q

JSON vs XML?

A

JSON is more compact, easier to read, easier to create and faster for computers to process.
XML is more flexible than JSON.

69
Q

Port number for FTP?

70
Q

Port number for SSH?

71
Q

Port number for HTTP?

72
Q

Port number for HTTPS?

73
Q

Port number for POP3?

74
Q

Port number for SMTP?

A

25, 587 & 465

75
Q

What happens at the receiving end of TCP/IP stack?

A

Reverses!!
- Link layer: Removes MAC addresses
- Network layer: removes IP addresses
- Transport layer: uses port num to send to application, uses sequence num to see if it’s in right place
- Application layer: recieves packets & displays info

76
Q

How do firewalls work?

A

Regulates the packets passing through a device & the internet
- can be software or hardware & be proxy server

77
Q

Packet filtering?

A

Used by firewalls to accept/reject packets based on source IP address/protocol used

78
Q

Stateful inspection?

A

Examines packets contents before deciding if it can enter the firewall.

79
Q

Proxy server?

A

Sits between public & private network - manages packets moving between them

80
Q

TCP/IP in order with protocols?