terms Flashcards
is the transfer of information from one point to another; consist of message, sender, medium, receiver
Data communications
information that has been processed and organized, it can be alphabetical, numeric, or symbolic information
Data
single transmission line; one bit is transmitted at one time; long distance communications; (serial-by-bit transmission)
Serial Data Transmission
transfer data on a parallel link, a separate line is used as a clock signal; data transmission speed is high
Parallel Data Transmission
involves only two locations or stations.
Two-point configuration
involves three or more stations or terminals.
Multipoint configuration
is when signals travel in one direction only.
Simplex
is when signals travel in both directions, but one at a time
Half duplex
is a two-way communications and signals travel in both directions simultaneously.
Full duplex
corrupted data during transmission.
Error
only one bit is going to be changed.
Bit error
is a change in two or more bits.
Multiple Bit error
change in more than 1 consecutive bits.
Burst error
the process of monitoring the received data and determining when a transmission error occurred.
Error detection
also known as parity check; it can detect single bit error.
VRC (VERTICAL REDUNDANCY CHECK)
also called as the two-dimensional parity; the parity bit is appended to every data block whereas in LRC, a block data bit is organized in rows and columns.
LRC (LONGITUDINAL REDUNDANCY CHECK)
it can detect all errors involving an odd number of bits; it can detect errors involving an even number of bits.
CHECKSUM
perform binary division operation.
CRC (CYCLIC REDUNDANCY CHECK)
detects and corrects transmission errors at the receive end without calling for retransmission; bits are added to message prior to transmission.
Forward Error Correction (FEC)
dependent on the number of bits in the data character.
HAMMING CODE
metallic circuit formed by two conductors insulated from each other; it uses one line for transmission of electric waves in both directions.
Two - Wire Circuit
two-way circuit using two paths so arranged that communication currents are transmitted in one direction only on one path, and in the opposite direction on the other path.
Four - Wire Circuit
Computer, Network Printers, VoIP Phones, Telepresence endpoint, Security Cameras, Mobile handled phones
END NODE DEVICES
switches, wireless access point, routers, security devices (Firewall), bridges, hubs, repeaters, cell tower
INTERMEDIARY NODES
ethernet, fiber optic cable, coaxial cable, USB cable
Wired Media
infrared, radio, microwaves, satellite
Wireless Media
email, storage services, file sharing, instant messaging, online game, voice over IP, video telephony, world wide web
Services
physical layout of nodes on a network
Physical topology
consists of a single cable-called a backbone-connecting all nodes on a network without intervening connectivity devices
Bus topology
each node is connected to the two nearest nodes so the entire network forms a circle; one method for passing data on ring networks is token passing
Ring topology
every node on the network is connected through a central device called hub or switch.
Star topology
each computer connects to every other; high level of redundancy.
Mesh Topology
is a combination of Bus and Star topology.
Tree topology
it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data.
Network security
protect the data that has been transmitted.
Confidentiality
ensuring that information cannot be modified without detection
Integrity
ensuring information can be accessed when needed
Availability
potential for violation of security; action or event that could breach security and cause harm.
Threat
an assault on system security that derives from an intelligent threat.
Attack
action that compromises the security
Security attack
detect, prevent, or recover from a security attack.
Security mechanism