Topic 3 - Networks - Part 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Protocol

A

Set of rules for data communication over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data packet

A

Portion of a message that is transmitted through a network. Contains data such as check digits and destination address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data integrity

A

overall completeness, accuracy and consistency of data;
means that the information has not been changed / corrupted deliberately or accidentally during transmission, from source to destination. Checksum mechanisms provide data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Source integrity

A

It means that the identity of the sender has been validated. Digital signatures prove source integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Flow Control

A

mechanism that ensures the rate at which
a sender is transmitting is in proportion with the receiver’s receiving capabilities. Flow control is utilized especially in cases where the sending device can send data much faster than the receiver can digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Congestion management

A

Congestion happens when the request on the network resources exceeds the offered capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deadlock

A

Deadlock is a situation in which two or more network competing actions are each waiting for the other to finish, and thus neither ever does. The persistence timer is used to resolve the situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Error checking and Error correction

A

A process to determine the error and The ability to repair the error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Factors that affect speed of data transmission

A
  1. Bandwidth of the network
  2. Data transfer rate of storage devices
  3. Interferences
  4. Malicious software
  5. Number of connected devices
  6. Number of users’ and users demand at any particular time (traffic)
  7. Packet loss and retransmission
  8. Read speed of storage devices
  9. Slowest segment
  10. Speed, technology and capacity of the network server
  11. Time required for user authentication and various security checks that take place
  12. Type of files send
  13. Type of transmission medium
  14. User’s PC CPU speed
  15. User’s PC RAM/disk caching
  16. User’s PC various subsystem performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data compression

A

Data compression involves encoding
information to use fewer bits than the
original data entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 types of data compression

A

Lossy data compression: With this compression method, some loss of information is acceptable and there is no way to get the original file back. Examples: JPEG, MPEG2.
Lossless data compression: this compression method reduces the number of bits by first identifying and then eliminating any statistical redundancy. There is no loss of information during lossless compression. Examples: compression- decompression
software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compression algorithms Graphics, sound, music and video formats use to decrease the
size of the original file have become ubiquitous on the Internet

A

The Graphics Interchange Format (GIF) is a graphic file format that is used extensively
on the Web and uses a form of lossless compression algorithm (if we are dealing with
a graphic file that has fewer than 256 colors).

Mp3 is an audio coding format that uses a form of lossy data compression. Almost all
music now comes in mp3 format and this format dominates the Internet.
MPEG-2 combines lossy audio data compression and Iossy video data compression methods and is used in the transmission of video over the Internet (e.g. movies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Datagram Packet Switching

A

with this method, each packet contains the receiver address. The path that datagrams take between the same source and destination can be different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Circuit Packet Switching

A

with this method, a route from source to destination is set up before any transmission takes place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

Encryption is absolutely necessary to protect data from unauthorized access during Internet use or any other untrusted network. There are two computer encryption categories: Symmetric-key encryption, single key encryption or secret key encryption. The same key is used for encryption and decryption; Public-key encryption or asymmetric key encryption. This uses a public key for
encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly