Fundamentals of Communications & Networks Flashcards
How to calculate the Bit Rate?
Baud rate X No of bits per signal
What is a Network?
two or more communication devices connected together
What is the purpose of a Network?
for the purpose of exchanging (transmitting/receiving) data
How can one govern communication in a Network?
you require protocols that define how to handle data at various stages of data exchange
What is a Physical Topology?
The physical architecture of cabling between devices on a network
What is a Logical Topology?
How the data packets flow around a network
What is a Star Topology?
Each client has its own connection to the central device. The central device receives packets for all of the clients connected to it and is responsible for delivering them to the correct recipient.
What is a Hub Device?
A simple and cheap networking device that works under the physical layer of the OSI model and connects a bunch of computers in a LAN.
NOT intelligent as it is unable to identify unique machines.
It broadcasts to all devices hence wasting bandwidth (Data Collision)
What is a Switch?
A multicast networking device that works under the Datalink layer of the OSI model and connects a bunch of devices in a network.
Used to send private messages and does not waste bandwidth.
Switches can identify which device is connected to which port by using a MAC address giving it the ability to deliver the message to a particular machine
What is a MAC Address?
A MAC Address is a unique value that identifies the machine
Advantages of the Star Topology?
- (When using a switch) packets are sent directly to recipient, other clients on the network cannot see packets that are not intended for them.
- Easy to add and remove clients from the network.
- Each cable has just one device communicating over it, eliminating possibility of collisions.
- Failure of one cable does not effect the entire network.
Disadvantages of the Star Topology?
- If the central hub/switch fails, all communication over the network is stopped.
- Expensive to install due to all the cables needed (or switch)
What is Bus Topology?
A physical bus connects clients to a single cable called the backbone.
A terminator is placed at either end of the backbone.
A server can be connected to the backbone just like a client.
Advantages of the Bus Topology?
- No central device which reduces the chance of a network failure and decreases the cost of installation.
- Inexpensive to install as a minimum length of cable is required.
Disadvantages of the Bus Topology?
- Packets are sent through the shared backbone therefore, every client on the server can see packets not meant for them.
- used for communication by multiple clients increasing the risk of collision
- if the backbone fails, the entire network becomes unusable.
What is a Host?
A device on a network that provides services.
What is a Server?
A computer that provides shared resources to network users.
What is a Client?
A computer that uses the services provided by a server.
Describe what happens between a Server and a Client:
The server will open a socket, this means it is now in ‘listen’ mode. Then the client can send a request to the server and it will be received. Finally, the server will send a response.
What is Client-Server Networking?
some computers (the clients), request services provided by other computers, the servers.
What is Peer-to-Peer Networking?
A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers, i.e. they are peers.
Advantages of Peer-to-Peer Networking?
- Cost effective as there is no need for a powerful server to provide services.
- easier to set up and maintain.
(than client-server)
Disadvantages of Peer-to-Peer Networking?
All the clients that provide services must be running in order for the network to be fully operational.
What is Wireless Networking?
Any type of local area network (LAN) in which the nodes (computers or computing devices, often portable devices) are not connected by wires but use radio waves to transmit data between them.
Require Wireless Access Points.
How is Wireless Transmission and Wi-Fi protected?
encrypting transmitted data using WPA or WPA2 (Wi-Fi Protected Access) which requires that a new wireless client enters a password in order to connect to a network.
How to prevent people attempting to join your network?
Use WPA (Wi-Fi-protected access) - To encrypt transmission, so that if intercepted transmissions cannot be read by someone who does not have the key.
Encrypt transmissions - so that if intercepted cannot be understood/read by someone who does not have a key.
Disable broadcast of SSID (
Use a MAC address white list
What is the Internet?
A global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol.
How is the Internet structured?
The structure of the internet is such that there is a network of interconnected computer networks and computers using IP addresses based on IP and TCP.
What is a router?
A device that receives packets or from one host (computer) or router and uses the destination IP address that they contain to pass them correctly formatted, to another host (computer) or router.
What is a packet?
A packet is a container in which data is transmitted over networks
What is a Gateway?
A device used to connect networks using different protocols so that information can be successfully passed from one system to another.
What do routers do?
send packets to their recipients via the fastest possible route. this route might include the lowest amount of hops or the route that is least congested at the time.
How do routers work?
They hold tables with information relating to the fastest routes to certain devices which they update frequently as to enable maximum performance.
What do Gateways do?
- Gateways strip away most of the packet’s details, leaving just the packets contents.
- The gateways then give the packets new sender and receiver addresses which comply to the new protocol
Why are Gateways used?
- Used to make packets comply with new protocols by stripping them down to just their contents and applying new sender/receiver addresses
(Where two networks use two different protocols, packets must be modified to conform to both protocols.