9 - Fundamentals of Communication and Networking Flashcards

(235 cards)

1
Q

What is serial transmission?

A

Sending and receiving data one bit at a time in sequence down a single wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is parallel transmission?

A

Sending and receiving multiple bits of data simultaneously using multiple wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of things that use serial transmission?

A

Ethernet
USB
Peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages of serial transmission?

A

Cheap
Reliable for long distances, as no synchronisation issues.
Less interferance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of parallel transmission?

A

Faster data transfer
Better for large amounts of data
Better for short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the disadvantages of serial transmission?

A

Slower for short distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of parallel transmission?

A

Expensive
Signal degrades over long distances
Synchronisation is harder the more wires there are.
Interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is synchronous data transmission?

A

When the pulse of the sending and receiving devices clocks are synchronised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is asynchronous data transmission?

A

When the two devices clock’s signals aren’t synchronised and only synchronise for the duration of the transmission by sending start and stop bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are advantages of synchronous data transmission?

A

Faster transmission rates
Less overhead
Good for large data transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are disadvantages of synchronous data transmission?

A

Complex
Expensive
If not perfectly synchronized results in data loss.
Requires a continuous connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are advantages of asynchronous data transmission?

A

Simple
Cheap
Good for small data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are disadvantages of asynchronous data transmission?

A

Slower
Greater overhead
More prone to timing issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a start bit in asynchronous transmission do?

A

Causes the receivers clock to synchronise to the same rate as the senders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a stop bit in asynchronous transmission do?

A

Indicates the data has arrived and allows the receiving computer to identify when the next start bit arrives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is bandwidth?

A

The range of frequencies that can be transmitted across a network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is bandwidth related to?

A

The range of frequencies available on the carrier wave that carries the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do you increase bandwidth?

A

Increase the range of frequencies, as more data can be transferred in a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is bandwidth measured in?

A

Hertz (Hz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is bit rate?

A

The number of bits transferred in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is bit rate measured in?

A

Bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the link between bit rate and bandwidth?

A

They are directly proportional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is baud rate?

A

The number of signal changes in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does one baud mean?

A

That there is one electronic state change per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is an electronic state change?
A change in the frequency of carrier wave. Change in voltage Shift in waveform.
26
How can more than one bit be sent per state change?
By varying voltage levels to represent multiple bits, symbols worth multiple bits are transmitted.
27
What is latency?
The time delay when any component within a computer system is responding to an instruction.
28
What are the 3 causes of latency?
Propagation Transmission Processing
29
What is propagation latency caused by?
The time taken for a logic gate to transmit data.
30
What is transmission latency caused by?
The time taken for data to pass through a cable.
31
What is processing latency caused by?
The time taken for data to travel around a network.
32
What does PING do?
When data is sent to another device on the network it calculates how long it takes to come back.
33
What is a network?
Devices connected together in order to share and manage data and resources.
34
What is a Network Interface Card (NIC)?
A hardware device that enables devices to connect to a network.
35
What is a Peer-to-Peer network?
A network methodology where all devices in a network share resources between themselves.
36
What are the advantages of a Peer-to-Peer networks?
Cheap Easy to set up Works well for small offices/homes No central point of failure
37
What are the disadvantages of a Peer-to-Peer networks?
Less security No centralized management
38
What is a Client-Server network?
A network methodology where one computer has the main processing power and storage and the other devices act as clients requesting services from the server.
39
What are the advantages of a Client-Server network?
Centralized updates Clients failing doesn't affect the network Easy to add new clients Security
40
What are the disadvantages of a Client-Server network?
Expensive set up Requires specialist maintenance Network traffic If server fails whole network fails
41
What is a network topology?
The conceptual layout of a network.
42
How does a bus topology work?
It uses one main cable as a backbone to transmit data. Data is sent to every device and only accepted by the intended receiver. Contains terminators which prevent signal deflection down the wire.
43
What are the advantages of the bus topology?
Easy to set up and install Works if a client switches off Cheaper Easy to add new devices
44
What are the disadvantages of the bus topology?
Main cable failing means whole network fails Slows down if more devices are added Less secure Less reliable
45
How does a star topology work?
All devices are connected to a central hub or switch which sends data to the intended recipient, by controlling the flow of data or by sending data to all devices.
46
What are the advantages of the star topology?
More reliable No collisions Easy to add new clients More clients doesn't affect speed More secure
47
What are the disadvantages of the star topology?
Expensive Difficult to install If switch/ hub fails network fails Can get congested
48
What is a physical topology?
The way in which devices are physically connected, how the hardware is set up.
49
What is a logical topology?
How data is transmitted around a network.
50
How would a physical star topology configured as a logical bus topology be set up?
Hardware set up as a star topology with all devices connected to a central node. The central node being a hub which sends data to all the clients and the receiver accepts. (Bus logical topology)
51
How do wireless networks work?
Instead of using physical cables to connect devices data is transmitted using radio waves.
52
What does a Wireless Access Point do?
Enables devices to wirelessly connect to a wired network by providing a Wi-Fi signal and acting as a bridge.
53
What is a Media Access Control Address (MAC address)?
A unique code that identifies a particular device on a LAN. Hexadecimal number
54
What is a LAN?
A network that connects devices within a limited area, allowing them to share resources.
55
What is a WAN?
A network that covers a large geographic area, connecting multiple LANs, allowing communication and sharing resources.
56
What is a WLAN?
Wireless Local Area Network A LAN that uses radio waves.
57
Where are WLAN's used?
In a home or small office.
58
What is WWAN?
Wireless Wide Area Network WAN that uses radio waves.
59
How does a WLAN work?
A wireless router connects to the internet using physical cabling while providing wireless access to devices, allowing them to connect to the internet.
60
How do WWAN's work?
Uses mobile phone networks which use satellites and transmitters and receivers to transmit signals over long distances.
61
What is Wi-Fi?
A method for connecting devices wirelessly to a network and to the internet. WWAN
62
How does Wi-Fi work?
Uses a generic international standard ensuring all devices are compliant and can connect and transmit data around a network.
63
What is a protocol?
A set of rules allowing devices to communicate with each other.
64
What does CSMA/CA do?
Enables networked devices to transmit data at high speeds without interference. By checking if the transmission channel is being used before sending any data.
65
How is data transmitted around networks?
It is sent around in frames which are re-assembled when received.
66
How does CSMA/CA work?
Checks if the transmission channel is being used. If the channel is idle data is sent If the channel isn't the device waits a random amount of time before trying again to prevent collisions.
67
What does RTS/CTS stand for?
Request To Send/ Clear To Send
68
How does the RTS/CTS protocol work?
Sends a RTS message to the receiving node and only sends data frames once the CTS message is sent back by the receiving device.
69
What is SSID?
A 32-character unique code that identifies a wireless network (WLAN) Seen on the header of every frame.
70
What does the SSID do?
Identifies the correct WLAN being used so devices connect to the right network.
71
What is required for a SSID to work?
For the NIC to have the same code so the device can connect.
72
What are disadvantages of wireless networks?
Less secure as radio signals are easy to intercept. More interference Limited range
73
What are advantages of wireless networks?
Easy installation Flexable
74
What is WPA (WiFi Protected Access)?
A protocol for encrypting data and ensuring security on Wi-Fi networks.
75
How can security be improved on wireless networks?
Change and hide the SSID Ensure all devices are WPA compliant Create a whitelist of trustworthy MAC addresses.
76
What is the internet?
A global network of networks.
77
What is the World Wide Web (WWW)?
A global system of web pages, accessed through the Internet.
78
What is the Uniform Resource Locator (URL)?
A method for identifying the location of resources on the Internet.
79
What components make up the URL?
Protocol Host/ server Domain Path Document name
80
What is an example of the protocol in the URL?
https
81
What is an example of the host/server in the URL?
www
82
What is an example of the domain in the URL?
bbc.co.uk
83
What is an example of the path in the URL?
bbc/website
84
What is the domain name?
The location of the resource on the Internet. (unique)
85
What .co indicate?
A company
86
What .com indicate?
The organisation is commercial.
87
What .gov indicate?
The organisation is part of the government.
88
What .uk indicate?
The website is registered in the UK.
89
What is the fully qualified domain name?
The host/server and the domain.
90
What is an example of the fully qualified domain name?
www.bbc.co.uk
91
What is the Internet Protocol (IP) address?
A unique number that identifies devices on a network.
92
What is a Domain Name Server (DNS)?
A server that contains domain names and their associated IP addresses.
93
What does the DNS do?
Translates the human readable domain names into its corresponding IP address.
94
What is a non-routable IP address?
An IP address that is hidden and reserved for internal networks and unique within the LAN.
95
What happens when connecting to the Internet?
The device will be connected to a router or proxy server and the IP address of the router or server will be public and unique.
96
What is a port?
A communication endpoint used to identify a particular process or application on a network.
97
What is a port address?
A 16-bit number attached to the IP address which is used to identify processes for networking.
98
What are the well-known port numbers? (7)
21 - FTP 22 - SSH 25 - SMTP 80 - HTTP 110 - POP3 143 - IMAP 443 - HTTPS
99
What must be included when a client sends a request to a well-known port?
A source port, so the server knows which port to send the request back to.
100
What is the Secure Shell Protocol (SSH)?
A set of rules used for remote access to computers.
101
What are the advantages of routing through a SSH port?
Extra security, as the SSH port encrypts all data transmitted through it.
102
What is the Network Address Translation(NAT)?
The system used to match private IP addresses with public ones.
103
What are the advantages of NAT?
A unique IP address is not needed for every device on a network, only for the physically connected router or server, so only the public IP address needs to be registered with the DNS system. Increased security, as the private IP address is not broadcasted.
104
What is the DNS system?
A system of connected DNSs that provides the IP address of every website on the Internet.
105
What is a translation table?
A table of the mappings between private IP addresses and port numbers and the corresponding public IP address and port number, kept by the router.
106
What is the process of the NAT?
1 - Computer on an internal network sends a packet to the server to request data, including its internal IP address and port number. 2 - The router replaces the internal addresses with its external IP address and port number. (The port number is unique to this communication for a certain time frame) 3- The router stores the mapping information in the translation table. 4- The data the server sends is received by the router which looks up the port number in the translation table to identify which computer on the internal network sent the request. 5 - The router's IP and port number are replaced with the original ones. 6- The packet it sent to the computer.
107
What happens if the translation table doesn't have a match to a port number in a received packet?
The packet is dropped, as it may be a hacking attempt.
108
What is packet forwarding?
A method of routing data through additional ports.
109
What is a use of packet forwarding?
To let external users access a device in a private network by configuring the router to pass requests from its public IP and port to the internal devices IP and port.
110
What is a socket?
An endpoint of a communication flow across a computer network.
111
What is the socket made up of?
A combination of an IP address and port number.
112
What are sockets used for?
To enable a network connection to be established to or from a computer. Defines where the server sends the data back to.
113
What is subnet masking?
A method of dividing a network into multiple smaller networks. The IP address is split into a network and host identifier.
114
Why does subnet masking make a network more efficient?
Data sent will only travel around the parts of a network that it needs to.
115
What does a computer check on a network with subnet masking?
When it sends data to another computer it checks if they are on the same subnet, if they are data is sent directly, but if not the data is sent to a router or gateway.
116
What is a gateway?
A node on a network that acts as a connection point to another network with different protocols.
117
What is a subnet mask?
Each device on a subnet has the same subnet mask, which is a number that distinguishes the network address(1's) and the host address(0's) within an IP address.
118
How can you calculate the network ID on a subnet?
IP address AND subnet mask
119
Why was IPv6 created?
IP addresses used to be 32-bits, but there wasn't enough permutations for every device on the internet.
120
What is IPv6?
IP addresses that use 128 bits represented as 8 groups of 4 hex numbers, separated by colons.
121
What are static IP addresses?
IP addresses that are assigned and then never changed.
122
What are dynamic IP addresses?
IP addresses that are allocated every time a device connects to a network.
123
What is DHCP?
A protocol for allocating locally unique IP addresses to devices as they connect to the Internet.
124
How does DHCP work?
Looks for an available IP address from a pool of addresses and allocates it. When a user logs off, the address is freed for another user and put back in the pool.
125
What is ICANN?
The organisation that oversees the allocation of domain names and IP addresses.
126
What are the Regional Internet Registries?
Internet registries for a defined region of the world. Internet registries - allocate IP addresses to ISPs and organisations, to ensure every IP address is unique and properly routed on the internet.
127
What is a router?
A device that directs data packets to the appropriate node on a network.
128
What a packet?
A block of data being transmitted.
129
What does routing do?
Finds the optimum route between the sender and receiver.
130
What is a routing table?
A table that stores information on the possible routes each packet could take between nodes on its path.
131
What is packet switching?
A method for transmitting packets of data via the quickest route on a network.
132
What is every packet made up of?
Header Body Footer
133
What is contained within the header of a packet?
MAC address of the sender and receiver IP address of the sender and receiver The protocol being used Packet number
134
What is contained within the body of a packet?
The actual data
135
What is contained within the footer of a packet?
A checksum
136
What is the packet number?
Two identifying numbers; how many packets there are and the place of the individual packet in the sequence.
137
What is a checksum?
The sum of all the values of data in a packet and when the packet is received the values are added up and compared to the checksum. If it is not the same the packet is resent.
138
Why are packets transferred via different routes?
It is quicker, as there is less congestion More secure.
139
What is a firewall?
Hardware or software or both that protects against unauthorised access to a network.
140
What is the most secure firewall?
A firewall made of both hardware and software.
141
How do hackers access a LAN?
Using the LAN's connection to the Internet to access the information on the LAN.
142
What is packet filtering?
When data packets are receive through the Internet NIC they are examined before being passed around via the LAN NIC. The firewall software examines the packets to ensure they don't contain any unauthorised data and check the header to confirm it comes from a recognised source.
143
What is stateful inspection?
Where the firewall examines the contents of each data packet Checks if the packet comes from a known communication source Checks if it forms part of an existing series of packets.
144
What is a proxy server?
A server that acts on behalf of another computer.
145
Why are proxy servers used?
By routing through a proxy server there is no direct connection between the computer on the LAN and the Internet, therefore increasing security.
146
Why would an organisation use a proxy server?
To ensure all requests come from legitimate sources and to filter users so they only have access to certain websites.
147
What is an encryption key?
A string of numbers or characters used to encrypt and decrypt data.
148
What is symmetric encryption?
The sender and receiver use the same key to encrypt and decrypt data, where the sender sends the key to the receiver.
149
What are the problems with symmetric encryption?
If the key is intercepted all communications are vulnerable to unauthorised access.
150
What is asymmetric encryption?
Where both the sender and receiver have their own pair of public and private keys, which are used to encrypt and decrypt data.
151
How are the keys set up in asymmetric encyrption?
The sender and receiver will have a private key known only to them which is mathematically linked to the corresponding public key, which anyone can access.
152
Explain the process of asymmetric encryption.
The sender will encrypt the message using the receiver's public key. As the public key and private keys are related the message can only be decrypted using the receiver's private key.
153
Why is asymmetric encryption good?
It is virtually impossible to calculate what the private key is from looking at the public key, as there are billions of permutations.
154
What is a digital certificate/ signature?
A method of ensuring an encrypted message is from a trusted source.
155
Where are digital certificates used?
Used by businesses Used as a secure way of sharing public keys in asymmetric encryption.
156
What is the Certificate Authority?
An organisation that provides digital certificates and signatures.
157
How do digital signatures work?
The message sent has a publicly known hashing algorithm applied to it. The hash is encrypted using the senders private key. The hash is sent as the digital signature, along with the message. The receiver uses the sender's public key to decrypt the hash. The hash is compared to that in the original message using the public hashing algorithm. If they are the same the message is authenticated.
158
What is a trojan?
Malware hidden within another file on your computer.
159
Why are trojans good?
It does not replicate itself in the same way as other malware, so it can remain undetected for a long time, allowing the hacker to remotely access the computer without the user knowing.
160
What is a hacker?
An individual or group that gains or attempts to gain unauthorised access to individual computers or the networks of individuals.
161
What are the reasons for hackers? (5)
Hacktivist - uses technology to announce religious, ideological or political messages. Ethical - targets large organisations to expose vulnerabilities in their network. Financial gain Achievement Terrorism
162
What are viruses?
The generic term used for self-replicating malware where the program attaches itself to a file to infect a computer.
163
How do viruses work?
They will be attached to a file and when its installed the virus activates and will replicate itself, causing extensive damage to individual computers and networks.
164
What are worms?
Malware that replicates itself and spreads itself around a computer system, that doesn't need to be attached to a file to infect a computer.
165
How do worms work?
They spread and exploit any vulnerabilities in the system and are quickly passed around a network and any other connected networks.
166
How can users protect against malware? (7)
Use up-to-date antivirus software Use a firewall Keep the OS up-to-date. Have a whitelist of trusted sites Ensure sites are secure (HTTPS/ digital certificates/ signatures.) Use passwords Encrypt data files
167
How can programmers protect against malware? (5)
Use a programming language with built in features Encrypt all data stored within a program Control access to the code Thoroughly test code for errors and weaknesses Keep code up-to-date
168
How can system administrators protect against malware? (6)
Ensure requests come from recognised sources Use network firewalls Use packet filtering/ stateful inspection Use encryption Keep digital certificate/ signatures up to date Update anti-virus software
169
What is a protocol?
A set of rules that governs communication between devices on a network.
170
What is TCP/IP?
A set of protocols for all network transmissions.
171
What are the four layers of TCP/IP?
Application Transport Network Link
172
What does the Application layer do?
Provides services and protocols to allow communication between applications on different hosts. Encrypts and decrypts data Handles DNS
173
What protocols are involved in the Application layer?
FTP HTTP/S POP3 SMTP SSH IMAP
174
What do the protocols in the Application layer do?
Set an agreed standard between communicating end-points.
175
What does the Transport Layer do?
Uses the TCP protocol to establish an end-to-end connection with the recipient computer Splits data into packets and reassembles them at the destination. Retransmit any missing packets. Adds port numbers of the sender and receiver.
176
What does the Transport Layer do at the senders end?
Splits data into packets and numbers them sequentially Adds port numbers to pass packets to the correct application in the Application layer.
177
What does the Transport Layer do at the receivers end?
Ensures all packets have arrived and request any missing packets be resent Ensures there are no errors in the packet
178
What protocol does the Transport layer use?
TCP UDP
179
What protocol does the Network layer use?
IP
180
What does the Network layer do?
Defines the IP address of the sender and receiver. Handles the routing of packets, by determining the best path for data to travel and forwarding packets to endpoints. Router uses the routing table to instruct the next hop.
181
What does the Link layer do?
Provides synchronisation of devices so the receiving device can manage the flow of data being received. Ensures data is transferred based on the topologies physical or logical setup. Adds the MAC address of the physical NIC that packets should be sent to and of the sender’s device. Handles the CSMA/CA and CTS/RTS protocols. Manages the Ethernet and WiFi protocols.
182
What are the layers closer to the user handled by?
The operating system or application software
183
What are the lower layers handled by?
A combination of software and hardware, including physical and wireless connections between devices.
184
What is Hypertext Transfer Protocol (HTTP)?
A set of rules that governs how multimedia files (webpages) are transmitted around the Internet.
185
What does HTTP do?
Ensures files are transferred and received in a common format.
186
What is HTTPS?
An extension of the HTTPS protocol with added security.
187
How does HTTPS work?
It used the Secure Socket Layer (SSL) or the Transport Layer Security (TLS) which encrypts data.
188
What is File Transfer Protocol (FTP)?
A set of rules relating to the transfer of files around the Internet.
189
When is FTP used?
When a webpage is uploaded to a web hosting server When software is downloaded from websites To transfer programs and data files.
190
What is the Secure Shell Protocol (SSH)?
A set of rules that enables a user to connect to a remote computer and execute programs/ access resources on that computer.
191
How does SSH work?
Creates a secure network of nodes through which access for a encrypted connection is made available, improving security.
192
How are SSH commands executed?
Using a specific syntax input on a command line interface.
193
What is a command line interface?
A text-based user interface that allows users to interact with a computer system by typing commands into a terminal.
194
What is Simple Mail Transfer Protocol (SMTP)?
A set of rules used for sending and receiving emails over a network.
195
How does SMTP work?
The email client connects to the SMTP server using the TCP protocol. The client then sends the email to the SMTP server. SMTP server uses DNS to identify the IP address of the recipient and a connection is established between the sender and receiver.
196
What does SMTP do if an email cannot be sent?
It uses a queuing system to hold onto the email and then attempts to send it multiple times, if it still fails a message is sent to the sender.
197
What is Post Office Protocol (POP3)?
A protocol for receiving emails.
198
How does POP3 work?
Establishes a connection with the email server using TCP. The user is authenticated (username and password) The client requests and downloads all emails off the server onto their computer. The emails are then deleted off the server.
199
What is an email server?
A high specification machine with a large storage capacity, that stores a database of all the network users and their email addresses and all outgoing and incoming emails.
200
What is a web server?
A server that hosts a website and handles traffic from users to the site.
201
What web server do home users use?
One is usually provided by their ISP.
202
Why do web servers use the HTTP protocol?
To ensure all data is correctly handled and formatted so it appears correctly when viewed, regardless of the user's hardware or software.
203
What is a web browser?
An application that allows users to view web pages and other resources, it ensures websites appear how they were designed.
204
How does a web browser work?
It retrieves resources via the URL, formats them so they display correctly on screen and allows for navigation, bookmarking and searching.
205
How are webpages loaded?
A request is sent to the DNS which translates the URL to an IP address. This IP address is used to access the web page host. The host serves the web page to the browser on the the client's computer.
206
Why are web pages temporarily stored in the cache after they are loaded?
It reduces the dependency on bandwidth, as when the user revisits the page it can be retrieved from the local cache rather than requesting the DNS and host servers again.
207
What is the client-server model?
Where clients request services from the server and the server provides the requests. The clients have a physical connection to the server.
208
What is a file server?
A server that contains any type of computer file (programs or data).
209
What is a print server?
A server where all client print requests are sent, they are then prioritised, buffered and printed.
210
What is an application server?
The server executes all the procedures needed to run applications.
211
What is an Application Program Interface(API)?
A set of subroutines that provides an interface between one program and another.
212
How does an WebSocket protocol work?
The client sends a handshaking request to the server to establish a connection, in response the server creates a full duplex connection.
213
What is a WebSocket protocol?
A set of rules that creates a persistent connection between two computers on a network, to enable real-time collaboration and simultaneous data exchange.
214
Where is the WebSocket protocol routed through?
Through port 80, the dedicated HTTPS port.
215
What is a message?
A packet of data being transmitted using the WebSocket protocol, that contains minimal header information to allow fast transfer of data.
216
What are the four main processes required for databases?
CRUD Create Retrieve Update Delete
217
What is the one-to-one relationship between CRUD and SQL commands?
Create --> INSERT Retrieve --> SELECT Update --> UPDATE Delete --> DELETE
218
What is the Representational State Transfer (REST)?
A design methodology for implementing a networked database.
219
How does REST work?
It uses HTTP to carry out the four CRUD operations, where the HTTP uses request messages to define how data is handled.
220
What are the mappings of CRUD to HTTP request methods?
Create --> POST Retrieve --> GET Update --> PUT Delete --> DELETE
221
Describe how web applications work.
1 - Client sends a request from the browser of the local machine. 2-URL identifies the resource on the server and contains the database query. 3-API run from the server and accessed by the browser to coordinate processes between the client and server applications. 4- HTML files used to ensure data is displayed in the correct format. 5- Requests and data are transferred using HTTP 6-JSON or XML is used to return the result.
222
What is JSON?
A standard format for transmitting data that can be implemented using most programming languages.
223
What is XML?
A method of defining data formats for data that will be transmitted around a network.
224
What are the advantages of JSON?
Easy to read and quicker for computers to interpret, as based on defining objects and values Less code Easier to create as simple syntax
225
What are the disadvantages of JSON?
Limited range of data types.
226
What are the advantages of XML?
More flexible, as complete freedom over datatypes.
227
What are the disadvantages of XML?
Less easy to read More code Slower as data need to be extracted from tags More knowledge of syntax required.
228
What are thin clients?
A computer that depends on a more powerful server to fulfil most its requirements and processing.
229
How do thin clients work?
The server runs the software while the client acts as a terminal.
230
What are thick clients?
A fully specified computer that doesn't need a server for processing most of the time.
231
How do thick clients work?
Resources are allocated between the client and server, giving the client more processing power, local storage and access to software to run from the machine.
232
What are the advantages of thin clients?
Cheap Easy to set up Changes only have to be implemented on the server Security
233
What are the disadvantages of thin clients?
Dependent on the server Will slow down with heavy use High bandwidth Very expensive server
234
What are the advantages of thick clients?
Reduced pressure on the server Clients have more control Lower bandwidth
235
What are the disadvantages of thick clients?
Reduced security, as clients can access the Internet Hardware and software needs to be updated on each client. Data is likely to be lost by client No data integrity, if multiple clients access the same data.