9. Fundamentals of Communication and Networking Flashcards

1
Q

Compare Serial and Parallel Communication.

A

In a Serial Communication, data is transmitted sequentially bit by bit over a single wire.

In a Parallel Communication groups of bits are sent simultaneously over multiple wires.

Parallel Communication has a limited upper range because the transmitted data is vulnerable to skew (bits arriving out of synch) and crosstalk which can corrupt the data. Whilst the simpler technology of Serial Communication and lack of interference can lead to higher transfer rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compare Synchronous and Asynchronous Transmission.

A

Synchronous Transmission is where the sender and receiver have a shared timing signal which determines when bits are sent/received. This requires a dedicated connection and is difficult to achieve over long distance.

Asynchronous Transmission is where a start bit indicates when the receiver should start listening for transmitted data. Once the start bit is received, bits will be received at a constant rate until the stop bit is received. The start and stop bits are opposite of one another (0/1 or 1/0).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Bit Rate and Baud Rate, how are they related?

A

Bit Rate is the rate of transfer of data, measured in bits per second.

Baud Rate is the rate of change of the signal transfered over a communication channel.

If the communication channel can transfer more than two signal levels, then potentially more than one bit can be transferred per signal change. For example, if four signal levels can be transferred then 2 bits can be transferred per signal change.

Bit Rate = Baud Rate x #Bits per Signal Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Bandwidth.

A

Bandwidth is the capacity to transfer data over a communication channel. This is an upper limit on the Bit Rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Latency.

A

Latency is the time taken from transmitting data, to it being received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Protocol?

A

A Protocol is a set of rules which define how communication happens between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Network?

A

A Network consists of Hardware which allows computers and other devices to communicate with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a LAN and a WAN?

A

A LAN is a Local Area Network, a Network over a small geographical area.

A WAN is a Wide Area Network, a Network over a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristics of a Bus Topology Network?

A

A Bus Topology Network consists of a shared backbone cable over which all connected devices communicate. Transmissions are broadcast on the cable and can be seen by all devices, which is bad for data security. Only a single communication can happen on the cable at any one time, which means Bus Topology Networks decline in performance as more devices are added. If the cable fails the Network stops functioning, a single point of failure. Because only a single device can broadcast at any one time, the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Protocol is used to manage the use of the shared cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of a Star Topology Network?

A

A Star Topology Network consists of a central Switch which is connected by cables to each of the devices in the Network. The Switch directs packets of data to the correct device. Each device has its own dedicated cable, and so no collisions can occur and only devices involved in a communication see the packets. Cable failure means that only a single device is removed from the Network. Data can be sent simultaneously between multiple devices. If the switch fails the Network will also fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe how Client Server Network Applications work?

A

A Server consists of Software on a device that provides access to a resource. The resource may be files on a disk drive, a database, a printer amongst many other possibilities. In essence a Server provides a service to other computers called Clients. If a computer only runs Server Software then it is a Dedicated Server.

A Client will make a request to a Server which will process the request and create a response.

In Client-Server Network Applications, if the Server fails then the service it provides will stop functioning. Having all the data and Software related to a service on a single computer helps the management of that service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe how Peer-to-Peer Network Applications work?

A

In Peer-to-Peer Network Applications all the computers involved have an equal level of importance to the maintenance of the service. They may be acting in the role of a Server, a Client, or both at the same time. Resources are spread across all devices in the network. If any one computer is removed from the Network it shouldn’t affect the provision of the service to the other devices.

An example of Peer-to-Peer Networking is Bittorrent where files are distributed across multiple computers. Whilst a computer is downloading a file, it is also uploading the parts of the file it has already downloaded to other computers in the Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is WiFi? What Hardware does a WiFi Network require?

A

WiFi (Wireless Fidelity) is a technology for wireless Network communication.

Each device on a WiFi Network will require a Wireless Network Adapter. The Network also requires a Wireless Access Point (WAP) to coordinate the traffic in the Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an SSID?

A

An SSID is a Service Set IDentifier which is the name of a Wireless Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is Network Security maintained in WiFi Networks?

A

A Protocol, such as WPA (WiFi Protected Access) or WPA II, require that devices connecting to a Wireless Access Point have the correct password and ensure that traffic is encrypted.

In normal operation the WAP will broadcast it’s SSID (Service Set Identifier), which is the name of the Network, to make it discoverable. If the SSID broadcast is disabled, then only devices which already know about the Network will be able to connect.

A Whitelist is a list of the MAC addresses which are allowed to connect to the Network, this can be used to restrict access to the Network to pre-approved devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe CSMA/CA with RTS/CTS and how it solves the Hidden Node Problem.

A

CSMA/CA is Carrier Sense Multiple Access with Collision Avoidance. It is a Protocol for devices sending data over WiFi Networks. The device will listen to see if someone is already sending data, if they are the device will wait for a period of time and try again. If no-one is sending data, then the device will transmit its data.

The Hidden Node Problem is when two devices are far enough from each other that they cannot directly sense whether the other is transmitting. This can lead to collisions, and a slowing of the Network.

RTS (Request to Send)/CTS (Clear to Send) is used to solve this issue. The CSMA/CA Protocol is followed, but instead of immediately transmitting data an RTS is sent to the WiFi Access Point (WAP). The WAP is at the centre of the Network and can see all devices. If the Network is idle the WAP will send a CTS which will cause the sender to transmit its data. If the sender doesn’t receive a CTS it will wait and start the whole process again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Internet?

A

The Internet is the physical infrastructure which connects Networks together across the globe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Packet Switching?

A

Packet Switching is a method for sending data over Networks where messages are split into small Data Packets which are individually Routed across the Network to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What might you find in a Data Packet?

A

A Data Packet will consist of a Header, Payload, and sometimes a Trailer. The Payload is the data itself.

The Header will contain:
Sender’s IP Address
Recipient’s IP Address
Protocol
Packet Number
Time To Live

The Trailer may contain a Checksum or other Error Detection information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Router, and what does it do?

A

A Router is a piece of Network Hardware which connects two Networks which use the same communication Protocols. A Router forwards a Data Packet into the connected Network identifying the quickest route for it to get to its destination (Routing). Data Packets will be Routed from Router to Router across the Internet (or inside a LAN/WAN) to get to their destination as quickly as possible. Routers takes into account Network Load (traffic) when identifying how to Route a Data Packet to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Gateway?

A

A Gateway is similar to a Router, but joins Networks which use different Protocols.

22
Q

What is a URL?

A

A URL (Uniform Resource Locator) is an address for a Resource (e.g. Web Page, Image File etc.) on the Internet. An example of a URL is below:

https://www.google.com/search?q=hello+world

23
Q

What is a Domain Name?

A

A Domain Name is a human readable address which can be used instead of an IP Address. For example www.google.com is the Fully Qualified Domain Name for Google. The Top Level Domain is ‘com’, the website name is ‘google’, and the host is ‘www’.

24
Q

What is an Internet Registry?

A

An Internet Registry is an organisation which maintains the database of registered Domain Names. An individual may purchase a Domain Name from an Internet Registrar in order to use if for their website.

25
Q

What is the Domain Name System?

A

The Domain Name System consists of Domain Name Servers which maintain the mapping between Domain Names and IP Addresses used for Routing.

26
Q

What does a Firewall do to improve Security?

A

A Firewall is either Hardware or Software which controls Network access to a device or Network. It performs the following functions:

Packet Filtering - the Firewall will prevent certain packets from passing through. This filtering will be applied using rules such as closing Ports or blacklisting certain IP Addresses.

Stateful Inspection - the Firewall examines the contents of Data Packets to identify whether they should pass through.

27
Q

What is a Proxy Server?

A

A Proxy Server is a device which hides the IP Address of its Clients from the devices they are communicating with. It does this by forwarding the Data Packets with its own IP Address as sender, and relaying Responses back to the Client.

28
Q

How does Public Key Encryption work?

A

Public Key Encryption is an Asymmetric Encryption Technique commonly used on the Internet. Each device will have a Public Key which is freely available to all devices on the Network, and a Private Key which is kept secret. Both the Public Key and the Private Key are needed to encrypt and then decrypt the message. For example, if the Public Key is used to encrypt a message, then the Private Key must be used to decrypt it (and vice versa).

If device A is sending a message to device B, then it encrypts the message with device B’s Public Key, then transmits the encrypted message, and finally device B can decrypt it with its own Private Key.

Because the Private Key never needs to be shared, this solves the Key Exchange Problem.

29
Q

How does a Digital Signature Work?

A

A Digital Signature assures the receiver of a message that it came from the sender without interception. It requires the following steps:

1) A Checksum for the message is calculated and encrypted with the sender’s Private Key.
2) The encrypted Checksum along with the message content are together encrypted with the recipient’s Public Key.
3) The encrypted message is sent to the recipient.
4) The encrypted message is decrypted by the recipient with their Private Key. The recipient now has the decrypted message and the encrypted Checksum.
5) The recipient decrypts the Checksum with the sender’s Public Key.
6) The recipient recalculates the Checksum of the received data and compares it to the transmitted Checksum - if they are the same the recipient knows the message came from the sender and is unchanged.

30
Q

What is a Digital Certificate?

A

A Digital Certificate is issued by a Certifying Authority to verify the trustworthiness of a Website. This allows a Website to use the encrypted version of the Web Protocol HTTPS. A Digital Certificate must be regularly renewed, if it is out of date visitors to the Website will be notified.

31
Q

What is the difference between a Virus, a Worm and a Trojan?

A

All of these are Malware (Malicious Software).

A Virus is a self replicating file which hides itself inside of host files. Once the host file is executed the Virus will execute its code.

A Worm is a self replicating file which do not need to be directly executed in order to execute. They may take advantage of Network vulnerabilities to transmit themself to other devices.

A Trojan is Malware which pretends to be another kind of file in order to trick the user into executing the code.

32
Q

What order are the layers in the TCP/IP Stack?

A

Application
Transport
Network
Link

33
Q

What is a MAC address?

A

A MAC address is a unique identifier for a Network device which is assigned by the manufacturer and cannot change.

34
Q

What is a Port Number?

A

A Port Number is a number appended to an IP Address which identifies the Application that the Data Packet is intended for. For example:

43.56.23.1:8080

identifies Port Number 8080 which is a Web Server (HTTP).

35
Q

What Protocols might you find at the Application Layer of the TCP/IP Stack? What happens at this layer?

A

The Application Layer is concerned with the purpose of the communication. Below are some Application Layer Protocols and what they are used for:

HTTP(S) - The Web Protocol for communicating with Web Servers
FTP(S) - File Transfer Protocol for communicating with a File Server.
POP - Post Office Protocol used to download Email from an Email Server.
SMTP - Simple Mail Transfer Protocol used to send Email between Email Servers.
IMAP - Internet Messaging Access Protocol used for managing Email on an Email Server

36
Q

What Protocols might you find at the Transport Layer of the TCP/IP Stack? What happens at this layer?

A

The Transport Layer is concerned with end-to-end transmission of data from sender to recipient. The message is split into Data Packets and the Port Number is added.

TCP - Transmission Control Protocol, slower more reliable connection which allows for resending missing Data Packets.
UDP - User Datagram Protocol, quicker less reliable connection with possible Data Packet loss.

37
Q

What Protocol might you find at the Network Layer of the TCP/IP Stack. What happens at this layer?

A

The Network Layer is concerned with routing Data Packets across Networks from sender to recipient. At this layer the Internet Protocol (IP) is used and IP Addresses are used for Routing.

38
Q

What happends at the Link Layer of the TCP/IP Stack?

A

At the Link Layer Data Packets are transmitted between devices on the same Network section. MAC Addresses are used to identify the sender and recipient.

39
Q

How many bits are there in an IPV4 address?

A

An IPV4 address looks like this:

53.76.23.1

each of the individual numbers is in the range 0-255, which requires 8bits. So the whole IPV4 address is 32bits in size. There are 2^32 possible addresses using IPV4.

40
Q

How many bits are there in an IPV6 address?

A

An IPV6 address looks like this:

FE80:CD00:0000:0CDE:1257:0000:211E:729C

it consists of 8 groups of 4 digit Hexadecimal numbers. Each of these groups is 16bits in size, so the whole IPV6 address is 128bits in size. There are 2^128 possible addresses using IPV6.

41
Q

What is the difference between Classful Addressing, Classless Addressing, and Subnet Masking?

A

Each of these are related to splitting an IP Address into a Network ID which identifies the section of the Network and a Host ID which identifies a device. Network IDs are useful in restricting Data Packets to only the parts of a Network where they are needed.

A Classful Address is where a set number of bits in the IP Address are reserved for the Network ID/Host ID. Class A has only 8 bits for its Network ID, Class B has 16 bits and Class C has 24 bits. So Class A has the fewest potential Network IDs and the most Host IDs on each Network.

Classless Addressing explicitly specifies the number of bits used for the Network ID. For example the IP Address 192.168.0.3/24 specifies there are 24 bits in the Network ID and the remaining bits are the Host ID.

A Subnet Mask is combined using a bitwise AND with the IP Address to identify the Network ID. For example the Subnet Mask 255.255.255.0 specifies that the first 24 bits in an IP Address will be the Network ID.

42
Q

Why do we need Public and Private IP Addresses?

A

In IPV4 there are only 2^32 possible IP Addresses, and there are many more devices in the world. Some IP Addresses must be shared between devices, these are non-Routable Private IP Addresses because they do not identify a unique device on the Internet. Private IP Addresses will be used in LANs for the devices inside the Network. If a Data Packet must leave the Network then the Router substitutes its Public Routable IP Address in the process of Network Address Translation so that a response can be sent.

43
Q

What is the purpose of DHCP?

A

DHCP is Dynamic Host Configuration Protocol. This is the Protocol involved in allocating IP Addresses to devices when the joing a Network. Every time a device joins a Network it will be allocated a new IP Address for that location. The IP Address for a device will be tied to its MAC Address.

44
Q

What is Network Address Translation?

A

Network Address Translation (NAT) is used by Routers to allow devices with non-Routable (Private) IP Addresses to communicate on external Networks such as the Internet. The Router will substitute its own Public IP Address into the Data Packet as it passes through into the external Network.The response will be sent to the Router which will then forward it to the original sender in the Internal Network. An advantage of NAT is that the structure of the internal Network is hidden from the devices external to that Network.

45
Q

What is Port Forwarding?

A

Port Forwarding is when Data Packets which identify a particular Port Number (Application) are forwarded to the appropriate device on the internal Network that a Router is connected to. For example if the internal Network contains a Web Server, then all packets on port 8080 will be forwarded to that device.

46
Q

What is the purpose of DHCP?

A

DHCP is Dynamic Host Configuration Protocol. This is the Protocol involved in allocating IP Addresses to devices when the joing a Network. Every time a device joins a Network it will be allocated a new IP Address for that location. The IP Address for a device will be tied to its MAC Address.

47
Q

What is CRUD and how does it relate HTTP to SQL?

A

CRUD stands for Create, Retrieve, Update, Delete and is a way of mapping HTTP Requests onto SQL Statements for implementing Web APIs. The HTTP Request Methods are mapped as follows:

(C)reate maps POST to INSERT for adding new Records into a Database
(R)etrieve maps GET to SELECT for querying a Database
(U)pdate maps PUT to UPDATE for changing Records in a Database.
(D)elete maps DELETE to DELETE for removing Records from a Database

A CRUD Web API will allow manipulation of a Database on a Web Server using only HTTP Requests.

48
Q

What is REST?

A

REST (Representational State Transfer) or a RESTful API is a software architectural style for Client Server Applications where the Server hosts a Database of information. In a RESTful API the Client need not know anything about the structure of the Database to interact with the Server.

49
Q

What are JSON and XML?

A

JSON is JavaScript Object Notation
XML is eXtensible Markup Language

These are both text formats for transferring rich data between a Client and Server.

50
Q

What distinguishes a Thin Client from a Thick Client?

A

A Thin Client does little or no processing, which is all done on the Server. A Thick Client participates by processing data locally.