Data Transmission Flashcards

1
Q

4-Layer OSI Model

A

a four-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Layer (4)

A

combination of the application layer, presentation layer and session layer, uses protocol such as FTP, HTTP, SMTP, TELNET, PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transport Layer (4)

A

same as the transport layer in 7-Layer Model, the layer where data is split into packets uses protocols such as TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Layer

A

same as the network layer in 7-Layer Model, uses protocols such as IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Link Layer

A

combination of the data-link layer and the physical layer, uses protocols such as ISDN and Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

7-Layer OSI Model

A

a seven-layer model that provides a common basis for the coordination of standards development for the purpose of systems interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Layer (7)

A

handles initial requests to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presentation Layer

A

handles how information is to be presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session Layer

A

handles requests to transmit data synchronisation of data and traffic conform information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transport Layer (7)

A

standardises data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Layer

A

handles routing/addressing between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data-Link Layer

A

handles error checking and correction and formats data for physical transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Layer

A

the physical binary data with no error correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APIPA

A

Automatic Private Internet Protocol Address

a Windows feature that enables a client to automatically assign an IP address to itself when there’s no DHCP server available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric Encryption/Public Key Encryption

A

uses a different key to encrypt and decrypt a message. This solves the problem of key sharing in symmetric encryption schemes. The key generation algorithm of an asymmetric generation scheme generates two keys and the keys are generated in such a way that knowing the public key does not make it easier to decrypt information, making it more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asynchronous Serial Data Transmission

A

transmission system in which the sender and receiver have separate clocks which are not kept synchronised. Instead, the clocks are synchronised temporarily at the start of a transmission. The arrival of data cannot be predicted by the receiver; s a start bit is used to signal the arrival of data and to synchronise the transmitter and receiver temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Baseband System

A

a system that uses a single data channel system in which the whole bandwidth of the transmission medium is dedicated to one data channel at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Baud Rate

A

the number of signalling events across a transmission medium per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bit Rate

A

the number of bits per second that can be transmitted along a digital network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Block Ciphers

A

these are used in modern symmetric encryption. The message is broken into blocks containing multiple bits that are encrypted. If the block length is longer than the message, it is padded out with random content to make it longer. This can help obscure the length of the message, and additional information can be hidden in the blocks, such as error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bridge

A

used to connect two LANs or two LAN segments together, though both must use the same communications protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Broadband

A

a multiple data channel system in which the bandwidth of the transmission medium carries several data streams at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Brouter

A

combination of bridge and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cabling

A

required to connect all devices on a network together if the network is not wireless, varies greatly depending on network configuration, provides much faster connection that wireless connection, due to less interference and greater bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Coaxial Cables
consists of a solid conductor, three coats of insulation, and a grounding conductor to conduct electricity
26
Fibre Optic Cables
cables which transmit signals along glass fibres using laser light signals, allowing data to be transferred much faster than in copper
27
Twisted Pair Cables
constitutes a combination of insulated copper wires
28
Circuit Switching
data is sent across a network with all parts of the message taking the same route meaning packets arrive in the order they were transmitted by this is less secure as it is relatively easy to intercept all of the packets in a single message
29
Client
a computer that uses the services provided by a server
30
Client-Sever Networking
where clients make a request for a service or resource from the server. The server responds with the required resource or a security challenge. If it fails, the service cannot be provided by the server
31
Crosstalk
occurs when electromagnetic interference between wires that are in proximity such as parallel links results in transmitting corrupted data that will need to be re-sent
32
Default Gateway
the gateway that the network looks for as default as a gateway out
33
Delivery Model
the sending host sends a beacon to the destination address to see if it is reachable, waits for a reply then sends the actual message. A timer is used to make sure that the message is received
34
Diffie-Hellman Key Exchange
involves the sender and receiver both creating a secret key (a and b). They also create a public key (g). Both raise g to the power of the keys (g^a and g^b). The numbers a, b and g must be chosen so that g^a and g^b are easy to calculate but computationally hard to reverse, meaning g^a and g^b can be broadcast. The secret keys in a Diffie-Hellman key exchange are prime numbers that are 2048 bits long. To encrypt and decrypt messages the public key must be raised to the power of the private key (g^ba).
35
DNS
Domain Name System matches up a user-friendly domain name with an IP address
36
DNS Servers
have a directory serve which translates domain names to IP addresses
37
Dotted Decimal Notation
a presentation format for numerical data expressed as a string of decimal numbers each separated by a full stop
38
Duplex
two-way communication; nodes can both send and receive and can do so simultaneously
39
Dynamic IP Address
a temporary address for devices connected to a network that continually changes over time and are allocated by your router
40
Dynamic Web Page Content
content that is generated when the web browser request is sent
41
End-to-End Principle
where two equivalent hosts are used in communication
42
Enler's totient functiton
Ф=(p-1)(q-1)
43
Forwarding Table
contains addresses to output links
44
Frame
a group of data packets
45
Gateway
a device used to connect networks using different protocols so that information can be successfully passed from one system to another
46
Half-Duplex
two-way communication but only one way at a time
47
Handshaking
the process used to control the flow of data between devices, happens at the start of communication, confirms the speed of transmission and the protocols that will be used
48
Hopping
going from router to router, changing addresses at each hop
49
Host Names
a human-readable label made of up to 255 characters that is assigned to a network device
50
Hub
distributes all data received to all other devices it is connected to, sometimes used in a star network which can cause security problems as well as causing frequent data collisions which slows down the network
51
International Router
connects international networks
52
Internet
consists of a network of interconnected computer networks using a globally unique address space based on the IP and the TCP to support public access
53
Internet Registrars
responsible for registering internet registries
54
Internet Registries
online retailers where domains can be bought
55
LAN
Local Area Network used for small, localised networks, such as in homes or schools
56
Local Router
connects LANs
57
Layered Protocol
where several transmission protocols are layered and each layer controls a different feature of transmission, eg the OSI model
58
Mapping
distributed across the DNS servers, one cannot hold all
59
MAC Address
Media Access Control Address the computer’s physical address, a unique number written onto the NIC by the manufacturer composed of 6 pairs of hexadecimal characters separated by hyphens
60
MAN
Metropolitan Area Network connects devices within a metropolitan area such as a single large city; this is larger than a LAN but smaller than a WAN
61
Modem
a device that changes signals from one type of device to a form compatible with another
62
Multiplexing
a method by which multiple analog and digital signals are combined into one signal over a shared medium in order to share a physical transmission medium
63
National Router
connects national networks
64
NIC
Network Interface Card a piece of hardware that is required to connect a device to a LAN. It allows the device to communicate either by wires or wirelessly with the rest of the network. It prepares and sends the data to other devices on the network
65
Network Protocol
a set of rules governing the exchange or transmission of data between devices, including rules on how to start or end a transmission, format of data to be exchanged, how to detect or correct errors or any compression to be used
66
DHCP
Dynamic Host Configuation Protocol a client/server protocol that messages a pool of IP addresses and the client configuration process
67
DNS
68
FTP
File Transfer Protocol the second-oldest protocol after IP, used for file transfer
69
FTPS
File Transfer Protocol Secure used to transfer files securely by encrypting data
70
HTTP
Hyper Text Transfer Protocol allows data transfer across the internet, allows HTML, CSS and JavaScript to be transferred from servers to browsers
71
HTTPS
Hyper Text Transfer Protocol Secure allows secure data transfer across the internet by using encrypted data, allows HTML, CSS and JavaScript to be transferred from servers to browsers
72
ICMP
73
IMAP4
Internet Message Access Protocol 4 similar functionality to POP3 but can be used on multiple devices because mail is stored on the server and mail is not deleted from the server when it is downloaded
74
IOMP
75
IP
Internet Protocol works together with TCP to transfer data over a network, handles routing. Sending data involves adding a destination and source address to each packet. Receiving data involves checking packet destination addresses, accepting packets destined for this address and ignoring packets with other destinations
76
NTP
77
OSI
78
PING
79
POP3
Post Office Protocol 3 provides basic client/server features, enables e-mail download from the server, but mail was deleted from the server on download and could only be used with a single device
80
RIP
81
SMB
Server Message Block a communication protocol mainly used by Microsoft Windows equipped computers normally used to share files, printers, serial ports, and miscellaneous communications between nodes on a network
82
SMTP
Simple Mail Transfer Protocol protocol for internet e-mail, transfers e-mails between computers
83
SNMP
84
SSH
Secure Shell a protocol that provides secure file transfer and manipulation capabilities
85
SSL
86
TCP
Transmission Control Protocol works together with IP to transfer data over a network, is in charge of reliable delivery of information by dividing data into packets. Sending data involves splitting the data into packets, adding a packet sequence number and adding a checksum or error correction data. Receiving data involves checking packets for errors and fixing them if needed, identifying missing packets, reassembling packets in the correct order and sending complete data to relevant applications
87
Telnet
88
UDP
User Datagram Protocol involved in the transport layer of the OSI model, where data is split into packets
89
NAT Table
Network Address Translation Table allows devices on a private network to access a public network, such as the internet
90
Offline Processing
any processing that happens whilst not connected to a network
91
One Way Functions
functions that are very simple to perform one way but computationally hard to reverse
92
Online Processing
any processing that happens whilst connected to a network
93
Open Architecture Networking
designers of networks are free to design them however they want as they can all be connected to and communicate over the internet and each network is connected through a router
94
Packet
structures are defined by the protocol, if you have a big unit to download or send, it has to be broken down into small packets. Each packet is then labelled with both the destination and source address, so it can be routed through the internet
95
Packet Switching
data is sent across a network with individual parts of the message each taking their own route to the destination meaning packets arrive in a random order and have to be reassembled to recreate the original message making it more secure as it is relatively easy to intercept all packets in a single message, used to send data through a network consisting of many different nodes
96
PAN
Personal Area Network connects devices to the user, such as a wireless keyboard, mouse or computer
97
Parallel Transmission
each bit in the byte is transmitted along a separate path simultaneously
98
Paul Baran and Donald Davies
invented the idea of a distributed fishnet-style network in the 60s
99
Peer to Peer Networking
all computers are of equal status and no computer acts as a server. All peers must work together to fulfil the required task and file sharing is common
100
Port
the address for a specific application or process within the computer to which data is sent. Port 80 is used by HTTP and port 53 is used by DNS
101
Private IP Address
IP addresses that are reserved for internal use behind a router or other device, and cannot be used to access the internet directly
102
Private Key
used for decrypting data
103
Public IP Address
IP addresses that allows content to find its way to your device that your router receives from your Internet Service Provider
104
Public Key
used for encrypting data
105
Regional Router
connects networks within a specific region
106
Router
used to connect parts of networks together by looking at the address of data packets to send them down the best route to their destination
107
Routing Algorithm
calculate paths and performing packet switching
108
Routing Table
used in routers to program different routes for different types of data or to use different routes at different times of the day
109
RSA Encryption
Rivert, Shamir and Adleman Encryption asymmetric encryption system named after its creators. Published in 1977, it uses prime number to prevent eavesdropping on the private key whilst still broadcasting the public key
110
Robert Khan and Vint Cerf
the first to conceive the idea of connecting packet-switched networks between North America and Europe
111
Sequence Number
- included in the header of the packet to rearrange packets
112
Serial Tranmission
each bit in the byte is transmitted along a separate path simultaneously
113
Skew
occurs when bits that are transmitted across parallel links travel at different speeds. In synchronous data transmission, this can result in data falling out of sync with the clock signal and therefore not being read correctly
114
Socket
the full destination address to which data is sent, includes the IP address and port number
115
Stand-Alone Computers
computer not networked, requiring its own printer and other peripherals plus its own installation of application software
116
Static IP Address
IP address that are manually configured and never change
117
Stream Ciphers
used in modern encryption and is applied to each bit of the message individually; the message is broken up into individual bits sand each is altered by the algorithm. This is useful when you don’t know how big your message is and is useful when you have a continuous stream of data
118
Suite of Protocols
where networking protocols work together, for example, IP and TCP
119
Symmetric Encryption
where the same key is used to encrypt and decrypt the data. This is quick to set up and easy to execute, but is less secure and less modern, and is used in payment applications and banking
120
Synchronous Communication
where the sender and receiver are synchronised using a common clock signal
121
TCP/IP Protocol Stack
a set of networking protocols represented in four layers, data packets move between layers during network communication and each layer has its own role
122
Application Layer (TCP/IP)
layer closest to the user, collects data from and delivers data to other applications, for example: e-mail, web browser, print server, network drive, social media
123
Transport Layer (TCP/IP)
creates end-to-end encryption, splits data into packets, adds headers to packets, ensures all packets are sent and received to ensure all data is there, in the correct order and that the destination address exists
124
Internet Layer (TCP/IP)
adds source and destination IP address to packets, routers inspect IP addresses on packets and transmit and route packets via the shortest possible path
125
Link Layer (TCP/IP)
physical connections on the network, adds MAC address to packets and used to identify unique NICs
126
Thin-Client Network
network where all processing takes place in a central server; the clients are dumb terminals with little or no processing tower or local hard disk storage
127
Tim Burners-Lee
invented the world wide web and hypertext markup language
128
Timeout Limit
the amount of time packet transfer is expected to take
129
Transmission Modes
describe the characteristics of sending data over a link between two nodes
130
Web Server Extension
program written in native code, ie an executable or a script that is interpreted by an interpreter running on the web server that extends the functionality of the web server and allows it to generate content at the time of the HTTP request
131
Web Services
self-contained, modular applications that can be described, published, located and invoked over a network, generally the web
132
WAN
Wide Area Network connects devices but extends a large geographical distance such as leased telecommunications networks
133
WAP
Wireless Access Point allows a network to be connected using radio waves, obviating the need for cabling
134
WHOIS
details of registrants and IP addresses