Internet Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is serial transmission

A

In serial transmission, data bits are sent in a sequence, one after the other, over a single wire. It can operate either in synchronous mode or asynchronous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Classifications of serial transmission

A

Simplex method, Half-duplex methos , Duplex method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is simplex method?

A

Simplex method allows communication in one direction only. This only requires one channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is half-duplex method?

A

Half-duplex method allows communication is both directions, but not at the same time. This means there is a single channel and the direction is switched after the completion of transmission in the other direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is duplex method?

A

Duplex method allows communication in both directions at the same time by having two channels permanently available. This is a necessity in interactive systems (where two-way communications are continuously required).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is parallel transmission?

A

With parallel transmission more than one series of data bits can be transmitted at the same time by using several cables in place of the single cable found in serial communication systems. Parallel transmission is considered to be synchronous since there is a central clock that controls the timing of data sent on different wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is crosstalk?

A

This occurs when electromagnetic interference between wires that are in proximity such as parallel links results in transmitting corrupted data that will need to be re-sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is skew?

A

Skew happens when the bits that are transmitted across parallel links travel at different speeds. In synchronous data transmission, this can result in data falling out of sync with the clock signal and therefore not being read correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of serial over parallel transmission

A
  • Parallel transmission can only work efficiently over shorter distance and with lower bit rates than serial transmission. This is mainly due to the issues of skew and crosstalk, which become more prominent when using high bit rates and longer wires
  • Serial communication medium, which use just one line, are cheaper to install than parallel mediums which use more than one line
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is synchronous data transmission?

A

In synchronous transmission, streams of bits are transferred over a communication channel at a constant rate. The transmitter and the receiver are synchronised using a common clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asynchronous data transmission?

A

In asynchronous transmission, there is no clock signal, so additional data (start and stop bits) is used to control the communication. Data is transmitted when it is available, rather than at specific intervals. This means that there can be periods of time when the transmission channel is idle. The sender and receiver must use the same baud rate and need only synchronise their clocks for the duration of data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of start and stop bits in asynchronous data transmission

A

In asynchronous transmission, the beginning and end of a transmission are communicated using start and stop signals: a start bit is sent at the beginning of the transmission so that the receiver can prepare for the incoming data, and a stop bit marks the end of the transmission. The stop bit needs to be opposite to the start bit so that the receiver can recognise the next set of bits. Also, the stop signal is typically longer than one bit so that the receiver has time to get ready for the arrival of the next set of data. Making sure that the receiver has time to ‘reset’ before the transmitter sends the next sequence of data is what ensures that the sender and receiver are in sync.

In synchronous transmission, there is no need for a start or stop bit, so more information can be sent per unit of time than in asynchronous transmission. Synchronous transmission is commonly used with parallel transmission. For example, inside a computer, the clock signal is used to synchronise the signals of the control bus and of the data transmitted over the address and data buses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define symbol

A

A symbol is a particular pattern of bits represented by a signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define baud rate

A

The baud rate is the number of times that the signal changes per second. A symbol corresponds to a set of bits that are transmitted with every signal change. Therefore, baud rate represents the symbol rate of a channel, i.e. how many symbols are transmitted per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define bit rate

A

A communication medium’s bit rate refers to the number of bits that are transmitted over the medium per second. This is often measured in bits per second. Therefore, a communication system’s bit rate is equal to its baud rate multiplied by the number of bits per signal in the communication medium. Bit rate = baud rate * number of bits per signal. A communication medium’s bit rate will be higher than its baud rate if there is more than one bit sent per signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define bandwidth

A

Bandwidth expressed in Hertz relates to the range of frequencies that a communication medium is capable of transmitting. There is a direct relationship between bandwidth and bit rate. Higher bandwidth results in a higher bit rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define latency

A

Latency in a communication medium, often measured in milliseconds, is the difference in a time between an action being initiated and its effect being noticed. Latency usually increases with distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define protocol

A

A protocol is a set of rules relating to communication between devices. International organisation decide upon and publish protocols which allow devices made by different manufacturers in opposite ends of the world to communicate seamlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differentiate between baud rate and bit rate

A

Baud rate measures the number of symbol changes per second, whereas bit rate measures the number of bits transmitted per seconds. While baud rate is relevant in contexts where symbols represent multiple bits, bit rate directly measures the amount of data transmitted regardless of encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the relationship between bit rate and bandwidth?

A

The relationship between bit rate and bandwidth is directly proportional as increasing the bandwidth of the channel increases the maximum achievable bit rate. A wider bandwidth allows for more data to be transmitted simultaneously, leading to higher bit rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the types of topologies?

A

Topology refers to the structure of a network. The two types are physical and logical.

Physical: This refers to the actual architecture of a network

Logical: This refers to the flow of data packets within a network. A logical bus network delivers packets to all clients on the network whereas a logical start network delivers packets only to their recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a physical star topology?

A

In a physical star network, each client (that is, a device connected to the hub) has its own direct connection to the central hub. The hub receives packets for all the clients connected to it and is responsible for delivering them to the correct recipient. A server can be added to the network in the same way that clients are connected to the central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Advantages of star topology

A

Packets are sent directly to their recipient, over a cable that is connected only to the recipient. Other clients on the network cannot see packets that aren’t intended for them.

It is easy to add and remove clients to and from the network

Each cable has just one device communicating over it, eliminating the possibility of collisions

The failure of one cable does not affect the performance of the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disadvantages of star topology

A

Should the central hub fail, all communication over the network is stopped.

Expensive to install thanks to the amount of cable required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a logical bus network topology?

A

A physical bus connects clients to a single cable called a backbone. A device called a terminator is placed at either end of the backbone. There is no need for a central hub like in a physical start networks and a server can be connected to the backbone just like a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Advantages of bus topology

A

There is no central hub, reducing the chances of a network failure and decreasing the cost of installation

Inexpensive to install as a minimum length of cable is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disadvantages of bus topology

A

Packets are sent through the shared backbone, allowing every client on the network to see packets that aren’t intended for them.

The backbone is used for communication by multiple clients, introducing the risk of collisions.

Should the backbone fail, the entire network becomes unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is peer-to-peer networking

A

Peer-to-peer networks are those where there is no central server and every computer has the same eights. There is no central management. Peer-to-peer is useful when most of the time computers do not need to interchange information with each other. Programs are installed on every computer; however, careful management is required to ensure all software and data is up to data and protected. Sometimes a peer-to-peer network will have shared directories to store information on one machine; however on most peer-to-peer networks the data is stored locally on each machine and so therefore each machine requires regular backups to prevent data loss. Small networks often are peer-to-peer as the cost of maintenance does not warrant the expense of a client-server base; however as the number of machines increases in an organisation the benefits of client-server networks will justify the extra expense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is client-server networking

A

This is where central computers are responsible for managing resources, security and other services. These services are provided to computers which connect to these servers. The server is the only computer that holds all the information and functionality needed for an organisation; this is advantageous where a lot of interaction is required between computers. Also, the organisation is able to control the access to the information better, provide better management, and deploy resources more efficiently across a network rather than having to visit each computer individually. Server-based networks are used in companies where people need to access resources all the time. A server can cope with many people connecting and gaining a resource without a drop in performance. Security is centralised and users can authenticate themselves by using a single password to access the resources they are allowed to. This allows a user to be able to access their information on any computer in the network rather than relying on an individual machine. There is also no need to worry about backing up data, since it is all done by the server itself. A lot of people can be added to the network without a drop in performance. Increasingly, home servers are also beginning to appear as the need to share data and resources around homes with multiple computers grows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Wi-Fi and the purpose

A

Wi-Fi is a high bandwidth wireless method of communication which can be used in place of, wired Ethernet networks. Wired Ethernet networks are, however, still capable of far higher transfer rates and are more reliable that Wi-Fi networks. Wi-Fi networks are accessed through hotspots which are the areas within which a device can connect to a local area network, and are used to allow a device to connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the components required for wireless networking?

A

Wi-Fi hotspots are the broadcast area of what is known as the wireless access point; the access point is often connected to a router which in turn is connected to the network itself. Without the wireless access point the device would need to be connected to the router directly using cable. In addition, either a wireless network adapter (a dongle that is attached externally to a computer via USB), or a wireless network interface controller, which is an internal hardware component attached directly to the motherboard (in desktop computers, this usually via one of the PCI slots). Both of these act as an interpreter- to send and receive data between devices in a format that is easily transmitted. The type of network adapter needed will vary depending on the protocols it needs to support, the communication medium and the topology of the network to be connected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How are wireless networks are secured?

A

WPA, SSID, MAC address whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is WPA?

A

s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance with and without Request to Send/Clear to Send?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the Service Set Identifier?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the structure of the Internet?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the role of packet switching and routers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the main components of a packet?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define router

A
41
Q

Define gateway

A
42
Q

How is routing is achieved across the Internet?

A
43
Q

Describe the term uniform resource locator in the context of internetworking

A
44
Q

Explain fully qualified domain name

A
45
Q

What is an IP address?

A
46
Q

How are domain names organised?

A
47
Q

What is the purpose and function of the domain service and its reliance on the Domain Name Server?

A
48
Q

Explain the service provided by Internet registers and why there are needed

A
49
Q

How does a firewall work and what are its classifications?

A
50
Q

What is packet filtering?

A
51
Q

What is proxy server?

A
52
Q

What is stateful inspection?

A
53
Q

What is symmetric encryption?

A
54
Q

What is asymmetric encryption?

A
55
Q

What is a digital certificate?

A
56
Q

What are digital signatures?

A
57
Q

What are worms?

A
58
Q

What are trojans?

A
59
Q

What are viruses?

A
60
Q

How can improved coude quality monitoring and protection can be used to address worms, trojans and viruses?

A
61
Q

What is the TCP/IP stack?

A
62
Q

Role of application layer

A
63
Q

Role of transport layer

A
64
Q

Role of network layer

A
65
Q

Role of link layer

A
66
Q

Role of sockets in the TCP/IP stack

A
67
Q

What are Media Access Control addresses?

A
68
Q

What are well-know ports and client ports?

A
69
Q

Differences between well-known and client ports

A
70
Q

What is FTP?

A
71
Q

What is HTTP?

A
72
Q

What is HTTPS?

A
73
Q

What is POP3?

A
74
Q

What is SMTP?

A
75
Q

What is SSH?

A
76
Q

What is FTP client software and FTP server, with regard to transferring files using anonymous and non-anonymous access?

A
77
Q

How is SSH used for remote management?

A
78
Q

How is a SSH client is used to make a TCP connection to remote port for the purpose of sending commands to this port using application level protocols such as GET?

A
79
Q

How is SSH used to log in securely to a remote computer and execute commands?

A
80
Q

What is the role of an email server in retrieving and sending email?

A
81
Q

Explain the role of a web server in serving up web pages in text form.

A
82
Q

What is the role of a web browser in retrieving web pages and web page resources?

A
83
Q

How is an IP address split?

A
84
Q

What is the process of subnet masking?

A
85
Q

What is IP v4 ?

A
86
Q

What is IP v6 and why was it introduced?

A
87
Q

What are the differences between routable and non-routable IP addresses?

A
88
Q

What is the purpose and function of the DHCP system?

A
89
Q

What is the basic concept of NAT and why it is used?

A
90
Q

What is the concept of port forwarding and why is it used?

A
91
Q

What is the client server model?

A
92
Q

What is the web socket protocol?

A
93
Q

What are the Web CRUD Applications?

A
94
Q

What is REST?

A
95
Q

Compare JSON with XML

A
96
Q

What is thin-client computing?

A
97
Q

What is thick client computing?

A
98
Q

Advantages of thin-client vs thick-client

A
99
Q

Disadvantages of thin-client vs thick-client

A