Chapter 2 communications Flashcards

memorise all definations (54 cards)

1
Q

What is a LAN

A

-Sharing of data between devices on a network
-Sharing of resources possible(software/hardware applications
-central management (security, backup)
-covers a small geographical area
-connections are physical(twisted cabel pair, coaxial cabels or wifi)
-privately owned infrastructure
-high data transfer rate
-easier to implement protection compared to a WAN
-low congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAN

A

-Sharing of data and resources between devices
-central management
-covers a large geographical area
-connections often virtual (PSTN, Satlink)
-often publicly owned infrastructure
-low data transfer rate
-high congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are networked devices and the benifits

A

Networked devices are devices, interconnected on a network for high data transmission rate, it aids in resource sharing(network connected outputdevices like printers), file sharing, and storage (network connected storga emediums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Client Server Model

A

-its basically a dedicated server that provides applications (user, security adminstration) for client computer to use.
-webpages/data saved on servers
-client sends request to server
-server processes the request
-client displays results to user
-users computer is client
-server can host shared files
-users can request files from any client computer
-files can be accessed simultaneously by users
-egs(receiving and sending emails, using a print or file server, companies or schools centrally storing files, DBMS, domaincontroller server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the features of a peer to peer network

A

-its basically a decentralised network where each connected computer stores data and operates independantly as peer as both a client and server
-all computers are of equal status
-each computer gives access to data/resources
-computers can communicate and share resources
-each computer resposible for its own security
-used in internet and ad hocs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the drawbacks of peer to peer network

A

-reduced security (no central management) so computers are at risk to viruses from other computers
-No central management of backup-If one computer loses its data its lost to all of them
-No central management of files, hence hard to maintain consistency
-computers have slow responce time due to being accessed by other computers.
-Files may not be available as all computers may not always be switched on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

peer to peer vs client server

A

-client server has centralised back up, peer to peer does not.
-peer to peer has less initial set up cost compared to client server.
-in client server centralised server prevents illegal usage.
-less traffic in peer to peer(simulataneous actions)
-improved security in client server due to centralised server.
-peer to peer still operates if a device goes down, but client server wont operate if server goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a thick client

A

-server performs minimal processing for client
-most resources are installed locally ,clients do most processes independantly
-works offline
-no lag due to network
-expensive
-malware threats possible due to dependence on local devices
-outlook, word, exel, playstation traditional pcs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a thin client

A

-server performs all processes required by task
-client only sends requet and displays result
-inexpensive, as no demanding hardware required
-improved security as cannot run unauthorised harmful software
-internet connections required
-may lag
-browsers, Apllle tv and strwmaing devices ,google docs, gmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus Topology (peer-to-peer)

A

-uses a single central cabel to which all devices are connected with terminators on end to prevent signal reflection.
-Data can only travel in one direction
Advantages
-easy to expand, little cabling
-failiure of one node does not affect the network
Disadvatages
-if main cabel fails, whole network goes down
-performance of network detoirates under heavy loading
-the network not secure since each packet passes every node
-if data send between 2 devices other devices may not transmit

How data is transmitted
Each node looks a the packet and determines whather the addrss is recipeient if not it is ignored, best used for small office envoirnments
-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Star Topology(client Server)

A

-consists of a central hub/switch and other -devices connected via dedicated connections only to server (bidirectional)
Advantages
-fewer collisions, due to high performance as each device only connected to swithc
-Easily scalable as devices connect directly to switch
-More resiliant as not reliant on a single cable
-More secure and easily upgradable
Disadvantages
-initial installation costs high
-if central switch fails entire network goes down

How Data is Transmitted
-data from sending device sent to router
-data has receiving device address
-routerdetermines recipients destination address using routing table
-router transmits data directly and only to recipient.
evolving networks
Hub sends data every device switch uses routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mesh Topology (peer to peer)

A

-Every node is directly interconnected
-multiple routes between devices
-computers act as relays forwarding packets to final destinations

-routing is when nodes are given a routing logic so data forwarded to device in shortest route possible directly(can be rerouted)
-flooding is sending data to all nodes contributing to traffic and loading

Advantages
-If one line goes down alternate routes are available
-Improved security as not dependant on one main line
-fewer collisions as more routes avilable
-new nodes can be added without interfering with others(expandable)
-Easy to identify faults

Disadvantages
-Large cabling
-Expensive
-setup and maintanance difficult and complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hybrid Topology

A

-mix of 2 or more topologies

Advantages
-they can handel large volumes of traffic
-easy to identify where network fault has occured
-very well suited for creation of larger networks
-expandable

disvantage is very complex to install ,configure and maintain, and high cost, and difficult troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Computing

Cloud sofwares can can perform tasks on local device with no internet
cloud provider hosts software with maintaincece etc for a monthly fee, connected using device wb browser and sneding request and connect to required software application

A

-method of data storage where data is stored and accessed in offsite remote servers

Advantages
-can be free
-saves storage on existing device
-data will be backed up
-data redundancy
-accesable from any device
-better securtiy
-scalable and easily shared
-offers almost unlimited storage capacity

Disadvantages
-only accesible with internet
-long time to dounload/upload data
-can be expensive in long term
-reliant on third party for security and back up
-cant access files if server goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public cloud

A

-Services offered by a third party over the internet, avialbale to anyone with appropiate software/equipment .

Adva
-cost effective
-scalable
-accessible

disadv
-loss of control as data stored on external infrastructure
-less secure
-may not meet idustiny regulations and reccuring cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private cloud

A

-Services offered by a private internal network, only avialble to select users
-dedicated system only accessible from organisation

adv
-secure, customisable, better perfomance
disadv
-requires expertise, expensive, less scalability(hardware needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hydrid Cloud

A

-combination or private and public clouds, some data is priv and some in public.

adv:felxible, cost efficent, bussiness continuity

diadv: complex to manage, dependent on compliance, security challanges(management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud Software

A

-softwares accessed via browsers such as google docs
-cloud provider hosts and manages software applications
-maintainance upgrade etc fo monthly fee
-jut contact cloud connect internet open browser itll load
-its fully tested and dont reside on user device
-if connection lost data may be stored and local device and up/doload when connection restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wired Networks

A

-High bandwith good for streaming larger files
-more reliable and stable connection and less vulnurable to interference
-more secure confidential data can be transfered securly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wireless Networks

A

adv
-freedom of movement
-easily expandible
-less cabling
-allows access in remote locations

disv
-higher latency
-affected by wheather
-slower transmission speed
-direct line of sight needed
-less secure (ez to interpret radio nd microwaves)
-stopped by thick walls’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bluetooth

A

-uses electromagnetic radiation as carrier of data transmission
-receives and sends radiowaves in a band of 79 freq (channels_(2.45 GHz)
-automatically detects other bluetooth devices
-no interference as each communicatingpair uses different channel
-if channel occupied uses another(spread spectrum frequency hopping) and switches channel every seconds for security
-creats secure WPAN based on key encryption

adv and useful wehn
-transferring between devices less then 30 m apart
-speed of transmission not critical
-low bandwidth apllication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wi-fi

A

-uses electromagnetic radiation as carrier of data transmission
-operating full scale networks due to faster transfer rates, better range and security than bluetooth.
-a device connected to wifi can access internet wirelessly at any WAP

23
Q

Waves
radio waves carries data wirelessly in the form of electromagnetic waves

A

bandwidth
infrared>micro>radio

penetration
radio>micro>infrared

attenuation
radio>micro>infra

infras stopped anywhere and effected amplitude so indoor use good

24
Q

Satellites

A

-communication device on Earths orbit
-receives and transmits data

-curvature on earth hinders communication usuing electromagnetic waves so satellites used.

-communication between antennae and atellite done by micro or radiowaves

-diff frequency bands used to evade intterfferences and allow different networks to spread across earth

-microwaves easily affected by wheather and need clear line of sight
-microwaves cannot bent so need satallites to tackle curvature of earth, used in satalite communications tv mobile phone signals or wireless networks and can carry loads of data

25
Copper Cables
-data transmitted through electrical signals -lower transmission rate -chance of interference or interception -requires repeaters over long distances -more sturdy -Less expensive -easier to terminate Twisted pair -commonly used in LANs -lowest data transfer rate and highest interference but cheap -unshiled used by residential, shielded used commercially (shielded has metal foil reducing interference) Coaxial cables -used cables in MANs and cable television companies -cost higher than twisted cables, less interference, higher transmission rate -has greatest signal attnuation but has best anti jamming capabilities
26
Fibre-Optic cables
-data transmitted using light -has greter bandwidth and faster transmission speed -smaller risk of interference -can be used over long distances (less signal boosting) -more difficult to hack into -more prone to damage -more expensive to install -difficult to terminate -small signal attenuation
27
Hubs and Switch
-hubs have number of devices connected to them to form a LAN (star network) and sends data to everycomputer, so not very secure and wastes a lot of bandwidth (wired and wireless) -Switch allows efficient communication between devices, connects them to one another to form a LAN and receives transmissions and forwards to destination but checks data packet destination address and sends it to that computer only making it secure and efficient in data distribution. -Each device has a MAC address (media access control) on a network and datat packets sent to switch will identify mac of source of data and destination computer (switches wired and wireless)
28
Repeater
-restores digital signal so it can be transferred over greater distances (both analogue and digital so no suffer attentuation -works wired and wireless so wifis have no dead spots. -sometimes hubs have repeaters called repeating hubs but have only one collisoon domain so many unresolbed collisions and jamming signals may help but reduces network performance, and are unable to manage delivery paths and security. -
29
Bridge
-connects 2 LANs with same protocol -allows communication/data transmission between 2 networks with same protocol -routers used so no large traffic
30
Routers
-receives packets from devices/external networks -stores IP and Mac addreses of all the devices attached to it -maintains routing table -routes/forwards packets to destination -finds destination of a packet using ip address -assigns private IP addresses to devices on LAN -finds most efficient pathway to destination -can act as firewall and gateway and can do protocol conversions -Allows route in diff networks (LAN to WAN) -restricts broadcasts ro lan -uses ip to send to appropiate network and if mac not found routes to another switch on same network -dynamic routing
31
Gateway (not syllabus stuff)
-a network point that acts as entrance to another network . connects LANs with different protocols -converts packet protocols -acts as routers server and firewalls -communication beyond networks unable to be performed by switch or routers -no dynamic routing
32
Modems(not required by syllabus)
-converts digital data to analogue data and reverse -allows connection to external network, works as one with router
33
NIC (Network Interface Card)
-needed to allow a device to connect to a network, usually part of hardware and contains MAC address generated at manufacturing stage. -works on layers 1 and 2 of OSI model
34
WNIC
-allows connections to wireless networks as antennas -receives analougue waves and converts them to digital -takes digital input and converts to analogue waves-sends radiowaves/microwaves through antennas -encrypts and decrypts data -provides MAC address to identify a device on a network -can be plug in usb or integrated in circuit Infrastructure mode: requires all data to be transferred via WAPs and hub/switch, all wireless device connect o WAP and must use same security and authentication techniques. (home school or business networks) ad-hoc mode: no need for WAPs possible for devices to interface directly. (temporary networks)
35
WAP (wireless Access Point)
-Hardware that provides radiocommunication from central device to nodes on a network -allows connection of devices using radiowaves -allows wireless enabled devices to connect to wired network
36
Server
manages access to centralised resource usually between devices in a LAN
37
ethernet
-A protocol -used for data transmission over a wired network --uses CSMA/CD -data transmitted in frame, each frame has source and destination address, and error checking data -when using ethernet it is possible for IP conflicts to occur due to use of dynamic IPs, it may be resolved using static IPs or retstarting router. (same Ips assigned by router in a LAN) -supports broadcast transmission
38
CSMA/CD (protocol) carrier sence multiple acces eith collision detection
-used to detect and prevent collisions -device listesnt to communication channel(scans volatge) -data is sent only when channel is free -as there are are multiple nodes on network data from two nodes may transmit simultaneously causing collision -if collision occurs node sends signal to stop transmission -waits random time before attempting to send data again -each time collision occurs random time is increased
39
Bit Streaming
-What is Bit Streaming? Bit streaming is the continuous transmission of data bits (0s and 1s) over a communication channel, typically for multimedia content like audio or video. -Data is compressed before transmision -video transmitted continously as a series of bits -on download server sends data to buffer on client computer (buffering ensures smooth playback) (larger buffer bette rbit rate co trol) -recipients receive bitstream from buffer -the media player ensures data is between high and low watermarks. PROS -no need to wait for download b4 viewing -no need to store large files on device -played on demand -no specialist hardware -affords piracy protection CONS -no stream if broadband connection lost -will pause if insufficient buffer capacity or slow broadband -streaming uses a lot of bandwidth -copyright issues -security risks with downloading files from internet
40
Real Time
-used when a live stream of event is currently taking place -event is capctured life with video camera connected to computer -mdeia sent to users buffer via bit stream as it is being recorded -cannot be paused or rewound
41
On Demand
-Video already recorded -existing media is encoded to bit streaming format and uploaded to server -can be watched with user conviinice as can be paused or rewounded
42
WWW (World WIdw Web)
-uses http/https (writen using html)protocol to transmit data -collection of webpages -accessed with web browser -has url for webpage locations -the ww uses intertnet to access information from servers on other computers
43
Internet
-Uses TCP or IP protocols -interconnectednetwork of networks
44
PSTN (public switched telephone networks)
-consists of many different types of communications line -allows full duplex data transmission -communication passes through different switching centers -line remains active even during power outage -dedicated line used during two points in duration of phone calls -have own power source -nowfibre optics lines used digital packets of voice during video calls are converted from analogue using VoIP (Voice over Internet Protocol) -VoIP uses packet switching , no dedicated line -VoIP also has file transmission -VoIP used during internet phone calls with fibre optics and compresses packets -more efficitent then pstn as link only exists when data transmitted
45
Cellular networks and satellites
--mobile phones act as ISP, using satellites which can give high coverage and do not suffer signal attentuation
46
IPv4
-4 groups each represented by 8 bits(32 bit) -either hexadecimal or denary(with numbers 0-255) -Seperated by Full Stops -223.0.199.211
47
IPv6
-8 groups each represented by 16 bits(128 bit) -hexadecimal numbers between 0 to FFFF -Groups only contains 0 can be replaced with :: -seperated usuing colons -used when the number or IP addresses exceeds number available using IPV4 -A8FB:7ABB:FFF0:0FFF:3D21:2085:66FB:F0FA
48
Subnetting Benifits
-Improves security data stays in its subnet , not all devices can access all areas of network so no device receives unintended data. -allows extention of network, greater range of IP addresses -reduces amount of network traffic ,improving speed as data stays in subnet avoiding flooding -easier maintainance only one subnet needs to be taken down rest can continue, so easier to isolate faults
49
IP addresses in Subnetwork
-make up of network ID and Host ID -Each device on subnetwork has same network ID -Each device on subnetwork has different host ID -Host ID uniqely identifies devices within same network
50
Public IP address
-Is visible to any device on the Internet -assigned to allow direct access to the internet -allocated by ISP -unique throughout internet
51
Private IP address
-only visible to devices within the LAN -used for internal LAN communications only -allocated by router -only unique within LAN
52
Types of IPs
Dynamic -new one is reallocated each time a device rejoins a network -address assigned by network OS Static -does not change each time device connects to ineternet -Address assigned by server/ISP
53
URL, WWW, and DNS use
-a url is entered into a webbrowser and parsed to obtain domain name -domain name sent to dns -DNS has domain names and corressponding IP address data base -DNS searches its data base for give domain name -if found ip address is returned to webbrowser which displays the resource -if not found request is forwarded to a higher level dns, and ip address returned is added to the data base of the lower level dns
54