Networks (in order) Flashcards

1
Q

what is synchronous transmission

A

In synchronous transmission, streams of bits are transferred over a communication channel at a constant rate. The transmitter and the receiver are synchronised using a common clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is asynchronous transmission

A

there is no clock signal, so additional data (start and stop bits) is used to control the communication. Data is transmitted when it is available, rather than at specific intervals. This means that there can be periods of time when the transmission channel is idle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explain the start and stop bits in asynchronous transmission

A

a bit is sent to signal the start of a transmission
and another bit is sent to signal the end if the transmission the end bit is the opposite to the start bit and is typically longer so the receiver has time to reset for the next communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

where is synchronous transmission often used

A

its often used in parallel transmission as it can send more bits per unit of time (due to no start and stop bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

where is synchronous transition often used

A

its often used in parallel transmission as it can send more bits per unit of time (due to no start and stop bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is serial transmission

A

its where data bits are sent in a sequence, one after the other, over a single wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is parallel transmission

A

is where several bits are sent at the same time over their own dedicated wires or printed circuit tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

whats a negative of parallel transmission

A

its only reliable over short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why is parallel transmission only good over short distances

A

skew, crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whats at the middle of a star network

A

a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are topologies

A

The different arrangements of computer connections and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a server

A

server is a program on a computer that shares resources with, or provides services to, any authorised client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the 2 network models

A

client to server and peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does a client to server model work

A

1) The client submits a request through a network-enabled device.
2) The network server receives and processes the request.
3) The server delivers a response to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how does a peer to peer network work

A

each computer acts as both a server and a client—supplying and receiving files—with bandwidth and processing distributed among all members of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

pros of peer to peer

A

it doesn’t cost much to set up after you have the clients
less points of failure as if one client goes down the rest of the servers normally fine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cons of a peer to peer network

A

physical security- its less secure as there may be many locations where the sever can be accessed so harder to monitor

back ups - individual users are likely to be responsible for backing up their own data.

18
Q

pros of a client server model

A

easy to back up as most important files are in one location
physical security is better as a server can be monitored easily

19
Q

cons of a client sever model

A

expensive to set up
if the sever goes down many users can be affected as opposed to just the one in a peer to peer

20
Q

how are wireless packets often encrypted

A

using one of these WEP, WPA, or WPA2.

21
Q

what does WEP stand for

A

WEP (Wired Equivalent Privacy)

22
Q

what does WEP do

A

It uses a symmetric encryption algorithm, meaning the same key is used to encrypt and decrypt data. It does have some weaknesses: WEP keys are often too short and used for too long, making them easier to decipher and more accessible

23
Q

what does WPA stand for

A

WPA (WiFi Protected Access)

24
Q

what does WPA do

A

introduced key management, which generates a new encryption key for each data packet. Larger keys also make the encrypted messages more challenging to decrypt

25
Q

what does WAP2 do

A

WPA2: an improvement on WPA that provides an even stronger encryption algorithm. Each message is encrypted several times, depending on the key size.

26
Q

what does SSID stand for

A

service set identifier (SSID)

27
Q

what does the SSID do

A

it allows a client to distinguish one network from another
The SSID often broadcast for all to see (however this can be a security risk so you can stop it from doing that it can still be found though)

28
Q

what is a WAP

A

wireless access point

29
Q

what are the 2 Frequency bands in a wireless network

A

2.4GHz
5.0GHz

30
Q

what does CSMA/CA stand for

A

carrier-sense multiple access with collision avoidance

31
Q

what does CSMA/CA do

A

CSMA/CA is a protocol used in wireless networking. It makes sure that network collisions (when two devices attempt to communicate at the same time) are avoided.

32
Q

how does carrier-sense in CSMA/CA work

A

The first step is to listen to the channel to check for the presence of any other signals. It is at this point that a decision is made whether to send the message or to try again at a later time.

33
Q

how does Collision avoidance in CSMA/CA work

A

Upon the detection of an existing transmission on a channel, the node that wanted to send will wait for a period of time before trying again.

34
Q

whats a node

A

an end device, which is either sending or receiving data across the network

35
Q

how does the transmission bit work in CSMA/CA

A

Once the channel is free, the data is sent. Then, the sender needs to receive an acknowledgement message from the receiver to verify that the data was received successfully. Otherwise, the sender will attempt to resend the message.

36
Q

whats the hidden node problem

A

this is where a devices is trying to check if a channel is clear however it can only do in its own range, so there could be a node that’s communicating but is outside of the devices range, making it a hidden node.

37
Q

what does RTS/CTS stand for

A

RTS- request to send
CTS- clear to send

38
Q

what instructions does RTS/CTS follow

A

check if channel is idle:
if False:
wait random time
else:
send request to send
wait for CTS
if received:
send Msg

39
Q

what does ISP stand for

A

internet service provider

40
Q

not a question but have 4.9.3.2 Internet security left on this and need to do 4.9.4 The Transmission Control Protocol/Internet Protocol (TCP/IP) protocol but gona do that in a diffrent thing as its such a big sub topic

A