B3 - Transmission Flashcards

1
Q

What is TCP/IP

A

Transmission Control Protocol and Internet Protocol are used together as the basic communication language of the internet

Data sent over the internet is broken up into โ€˜packetsโ€™ to enable it to be sent more efficiently. Each packet is sent individually and then reassembled at destination

  • TCP is used to create packets and reassemble at the end
  • IP is used to route packets to the intended computer using IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

12 steps of TCP/IP communication

A
  1. Transmission Control Protocol
  2. Internet Protocol
  3. Application โ€“> Transport โ€“> Internet โ€“> Network
  4. Web browser
  5. HTTP and SMTP
  6. HTTP: Websites, SMTP: Checking emails
  7. TCP and UDP
  8. UDP
  9. Through the use of ports
  10. It gives instructions on how to reconstruct the data packet into the correct order
  11. IP address
  12. Packet switching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 Web Protocols

A

โšซ HTTP - the HyperText Transfer Protocol is used to allow web servers and browsers to transfer files over the internet. it is how we access WWW

โšซ HTTPS - the secure version of the standers HTTP. it uses public key cryptography to encrypt communications between a web browser and server

โšซ FTP - The File Transfer Protocol is used to transfer files over the network. It is the technology used to upload files to a server as well as to download large files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does HTTPS keep data secure during transmissions

A

โšซ It incorporates/uses Transport Layer Security protocol (TLS), (allow SSL) (1) which provides extra layers of protection/encryption (1)

โšซ When a browser connects to a site, it checks that the siteโ€™s (TSL/SSL) certificate is valid (1) if the site fails the check the browser displays a warning / alerting the user that the site is not secure (1)

โšซ When a browser connects to a site it asks for a public key (1) it uses the public key to produce a session/new key for the connection (1)

โšซ The browser/client negotiates keys with the server (1) creating a shared (symmetric) key for the connection (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 Email Protocols

A

โšซ POP3 - the Post Office Protocol 3 is used to retrieve emails from the mail server. It allows us to download messages to our client software for office reading

โšซ IMAP (Internet Message Access Protocol) - used for receiving emails/ incoming emails (1) stores emails on server (1) allowing access from multiple devices/synchronises email across devices (1)

โšซ SMTP (Simple Mail Transfer Protocol) โ€“ manages outgoing emails / used for sending emails (1) from server to server (1) until it reaches its recipients (mail) server (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Voice and Video Call Protocols

A

โšซ RTP - the Real-Time Transport protocol is designed to transfer audio and video over IP-based networks

โšซ H.323 - this was one of the first successful VOIP protocols and is recommended by the ITU it defines the rules for communication audio and video packet switched networks

โšซ SIP - the Session Initiation protocol is used to create, control and end VOIP connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is Codecs

A
  • A Codecs is a program used to compress and decompress video and audio files this reduces the space they take up on a adisk and allows fast transfer over a network, such as the internet for VOIP calls and online streaming.
  • this leads to a loss of quality in the video or audio
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use of Codecs when VoIP

A

Uses algorithms (1)

The codec digitises an analogue signal/ encodes (1)

This is compressed (1)

Splits into internet packets (1)

These are transmitted/transferred (1)

When received they are uncompressed (1)

Decodes (1)

User and receiver need to have the same codec (1)

Determines quality (1)

Encrypting for security (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Implications of Codecs, using video in digital format

A

โšซ Codec is a file/piece of software (1)

โšซ Codec is needed to view the video (1)

โšซ Video files are very large (1)

โšซ Codec reduce the size/compress the video file (1)

โšซ Will improve viewing when using a slow connection/ bandwidth (1)

โšซ Affects the quality of the video (1)

โšซ (Lossy) codec save larger amounts of space compared to (lossless) (1)

โšซ Software compatibility (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Protocols

A

โšซ Networks must have protocols (or rules) in place for security. These are needed in order to maintain the integrity and security of the data being transferred โ€“ it usually does this by encrypting the data using cryptography.

โšซ ๐’๐’๐‹ (Secure Sockets Layers) and ๐“๐‹๐’ (Transport Layer Security)
are used to ensure that transactions over networks are kept safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is Lossy Compression

A
  • Lossy Compression reduces the size of a file but it does this by losing some of the information;
  • When compressed files are decompressed they do not give back the original data, because data was lost during compression;
  • Because Lossy Compression cannot be decompressed to yield the exact original data, it is not a good method of compression for critical data, such as textual data, we would use Lossless Compression for this;
  • Lossy Compression is most useful for digitally sampled analogue data, such as sound, video, graphics or images;
  • Some examples of Lossy Compression algorithms are JPEG, MPEG, and MP3.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is bandwidth and Latency

A

๐๐š๐ง๐๐ฐ๐ข๐๐ญ๐ก

  • Amount of data transferred/transmitted (1)
  • (From one point to another) in a period of time (1)
  • Measured in mega/bits per second (1)

๐‹๐š๐ญ๐ž๐ง๐œ๐ฒ

  • Time delay / lag experienced (1)
  • Before a component responds to an instruction (1)
  • Measured in milliseconds (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Implications of Bandwidth and Latency

A
  • Browsing the internet doesnโ€™t need an instant response so latency isnโ€™t a big factor. Bandwidth is an important factor as it affects how long files takes to download

-Online gaming needs very low latency as players need a fast response for real-time updates of character movement

-video calls need low latency and high bandwidth as you need to transfer a lot of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Factors that affect Bandwidth & Latency

A

โšซ ๐€๐ฆ๐จ๐ฎ๐ง๐ญ ๐จ๐Ÿ ๐œ๐จ๐ง๐ญ๐ž๐ง๐ญ๐ข๐จ๐ง / ๐ง๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ ๐จ๐ญ๐ก๐ž๐ซ ๐ฎ๐ฌ๐ž๐ซ๐ฌ (๐Ÿ)

Bandwidth:

At peak times such as early morning when many users are logging on to check emails (1)

Latency:

Network devices may have to queue users/resend packets due to collisions/may not be able to respond to all the connection requests (1)

โšซ ๐€๐ฆ๐จ๐ฎ๐ง๐ญ ๐จ๐Ÿ ๐๐š๐ญ๐š ๐›๐ž๐ข๐ง๐  ๐ญ๐ซ๐š๐ง๐ฌ๐ฆ๐ข๐ญ๐ญ๐ž๐ ๐จ๐ง ๐ญ๐ก๐ž ๐ง๐ž๐ญ๐ฐ๐จ๐ซ๐ค (๐Ÿ)

Bandwidth:
More users simultaneously transmitting data will be โ€˜sharingโ€™ the connection (1)

Latency:
Network devices may have to resend packets due to collisions/ receiving devices may take longer to process extra requests (1)

โšซ ๐“๐ฒ๐ฉ๐ž ๐จ๐Ÿ ๐œ๐จ๐ง๐ง๐ž๐œ๐ญ๐ข๐จ๐ง ๐›๐ž๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ (๐Ÿ)

Bandwidth:
Eg, a wired connection (is generally faster) generally has a higher bandwidth than wireless connection (1)

Latency:
Some connection types require transmissions. e.g., Wi-Fi neds cable - wireless - cable. These changes take time. (1)

โšซ ๐ƒ๐ข๐ฌ๐ญ๐š๐ง๐œ๐ž ๐Ÿ๐ซ๐จ๐ฆ ๐ญ๐ก๐ž ๐ง๐ž๐š๐ซ๐ž๐ฌ๐ญ ๐ญ๐ž๐ฅ๐ž๐œ๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐ž๐ฑ๐œ๐ก๐š๐ง๐ ๐ž / ๐ง๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐ฅ๐ข๐ง๐ค (๐Ÿ)

Bandwidth:
Bandwidth reduces over distance / gets weaker (1)

Latency:
Signal takes longer to cover a greater distance and must travel at least as far as the nearest network (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security considerations:
What can we put in place to minimize security risks?

A

โšซ User authentication - usernames and passwords authenticate users who have permission to use a network and prevent unauthorized access by hackers

โšซ Firewalls - these monitor traffic to prevent unauthorized access and dangerous data packets being passed into the systems and causing harm

โšซ Encryption - information can be intercepted while being transmitted using encryption ensures intercepted data cannot be read. HTTPS is a commonly used method for secure data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How authentication can prevent unauthorized access

A

๐ฌ๐ญ๐ซ๐จ๐ง๐  ๐ฉ๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐๐ฌ:

  • Mixture of both uppercase and lowercase characters (1)
  • Mixture of letters, numbers and special characters/symbols (1)
  • Avoid using dictionary words (1)
  • Avoid using repeated characters / adjacent keyboard characters (1)
  • Never use personal/memorable information, such as name, petโ€™s name (1)
  • Never use your username as your password (1)
  • Never use obvious substitutions, such as โ€˜Passwordโ€™ (1)

๐Š๐ž๐ž๐ฉ ๐๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ž

  • Never write the password down (1)
  • Never reveal his password to anyone (1)
  • Never allow anyone (shoulder surfing) to watch him type the password in (1)
  • Never allow browsers (on shared/public PCs) to remember the password (1)
  • Encrypt passwords / password manager (1)

authenticate a password

  • Database of usernames and passwords created (1)
  • On entry password matched the username (1)
  • Access allowed if they are the same/match (1)
17
Q

How firewall can minimize risks

A

โšซ Uses software and/or hardware (1)

โšซ Monitors incoming/outgoing files/traffic/packets (1)

โšซ Checks the content by enforcing a set of rules/ database known viruses (1)

โšซ Identifies suspect traffic (1)

18
Q

How anti-virus software protection can minimize risk

A

โšซ (Anti-virus software) monitors activity/scans computer/files (1)
โšซ Compares (activity) against a database of definitions (1)
โšซ Analyses the code/behaviour of the suspicious program (1)
โšซ Give option to remove the threat (1)
โšซ Give option to quarantine the threat (1)
โšซ Log user actions to deal with similar future threats (1)

19
Q

How Encryption works

A

โšซ Private / public keys are generated/used (1)

โšซ Sending and receiving computers exchange (public) keys (1)

โšซ Uses an (encryption) algorithm (1)

โšซ To scramble/make unreadable (1)

โšซ Transmitted to receiving client with a decryption key (1)

โšซ Receiving client uses the (private) key to unscramble/decrypt the data (1)