Data Transmission and Security Flashcards

1
Q

Methods of transmission

A
  • Copper cables using electrical pulses
  • Radio frequency (wireless)
  • optical fibre (light)
  • infrared
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use of fibre optic cables

A

Carry almost 100% of worldwide internet and phone traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bandwidth

A

Amount of data that can be carried at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Serial Transmission

Method:

Advantages:

A

Bits are sent one signal at a time

Advantages over parallel:

  • smaller and simpler connectors
  • crosstalk creates interference between parallel lines and can result in corrupted bytes which would need to be retransmitted
  • serial links are much more reliable over greater distances than parallel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parallel Transmission

A
  • Signals (bits) are sent simultaneously over a number of parallel wires
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crosstalk

A

Crosstalk occurs when a signal from one line gets transferred to another line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Skew

A

Each wire in a parallel cable has slightly different properties so the signals travel down the wires at slightly different speeds. This means the transmission must be over very short distances to avoid this problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simplex Transmission

A

Data travels in one direction only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Half duplex transmission

A

Data can travel in both directions along a single cable, but not simultaneously (not in both directions at the same time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Full) Duplex transmission

A

Data can travel in both directions simultaneously using two cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bit rate and Baud rate

A

The speed of data is measured in bits per second
The baud rate is the rate at which the signal changes
Baseband means one signal (bit) is sent at a time down a serial connection

In standard baseband, bit rate = baud rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why serial transmission can be faster than parallel

A

With higher bandwidths, more than one bit can be coded in a signal, increasing the bit rate

  • Bit rate of channel = baud rate x number of bits per
    signal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transmission errors

A

When data is transmitted, it doesn’t always arrive in the same format that it was sent

  • Electric interference
  • Power surges
  • Synchronisation
  • Wear and tear on the cable or connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Error checking

A

Computers need methods to check for data transmission errors caused by interference

These methods include the use of:

  • Parity bits, blocks
  • Check digits
  • Check sums
  • Automatic Repeat reQuests (ARQ)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Parity bits

A

Computers use either odd or even parity

When sending a byte of data one bit is used as a parity bit

This is bit is set to a 1 or a 0 to make the total number of 1s and 0s in the byte (including the parity bit) odd or even depending on the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using Parity for error detection

A

When data is transmitted, the parity bit is set at the transmitting end and parity is checked at the receiving end

If the wrong number of bits are ‘on’, an error has occurred

The receiving computer notifies the transmitting end and the data is resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Check digits

A

A check digit is an additional digit at the end of a string of other numbers designated to check for mistakes in input or transmission

Printed books and other products have a unique barcode with an ISBN (International Standard book number) EAN (European Article Number)

The first 12 digits of the barcode are the unique item number, the 13th is the check digit

This can be calculated using the Modulo 10 system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Check sums

A

A check sum works similar to a check digit

The checksum of all bytes in a data transmission is calculated using an algorithm

The check sum is sent with the data

The receiving computer recalculates the checksum based on the data it received and compares it with the checksum received or a known, expected value

If it does not match, the data may have been altered or corrupted during transmission and the data is resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Automatic Repeat reQuests

A

Computers using ARQs will automatically return an acknowledgement that the data was correct

The simplest stop and wait ARQ will resend the data if an acknowledgement is not received within a specific period of time period, it will assume that there was a flaw in the data or transmission error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the internet

A

A collection of interconnected networks, not the world wide web as that is a part of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISP

what do they supply

what they allow you to do

storage in an ISP

A

ISPs are companies supplying connectivity to the internet, email services, web hosting and VOIPs.

You connect to the Internet service provider that you are contracted with, when you connect to the ISP you become a part of their network. This ISP may connect to a larger network and become a part of that.

Every ISP has its own data storage facility.

22
Q

Browser softwares

Examples
How to access

A

Internet explorer, google chrome and firefox are all browser softwares. One way to access a particular page is by typing its address into an address bar.

23
Q

Cloud based services

Mini def
Examples

A

Servers host software or services that you can access.

Online storage:
Dropbox
OneDrive
Google Drive

24
Q

Connecting to the internet

A

PC > Router > Modem > ISP > Internet

router provides access to local area network
modem connects to your internet service provider (ISP)
- modem no longer used in modern technology
ISP connects you to the internet

25
Modem
stands for modulator/demodulator converts digital signal from computer and converts to analogue signal for phone lines a second modem at the receiving end converts the signal back to digital
26
Router
A router is a hardware device that allows you to connect several devices to a single internet connection (home setting) Many routers have a WAP (Wireless access point) allowing you to create a wireless access point
27
TCP/IP protocol
TCP (transmission control protocol) - breaks up messages sent over the internet into packets - reassembles packets at the other end - detects errors - resends lost messages IP protocol - routes the individual packets between sender and recipient
28
HTTP and HTTPS Protocol
HTTP (hyper text transfer protocol) used for accessing and receiving web pages in the form of HTML files on the internet The protocol requests the web server to upload the requested web page to the users browser for viewing HTTPS (secure protocol) encrypts the information so that it can not be hacked
29
Packet switching files and packets micro def packet header
Each file is broken up into packets Each packet is given a header containing: - IP address its going too (Internet protocol) - IP address it came from - Sequence number of the packet - Number of packets in the whole communication
30
IP Addressing
Every device connected to the internet has an IP address eg. 81. 101. 137. 12 Packets are labelled with the senders and the destinations IP address Packets are sent across the internet along separate routes and reassembled at the end
31
Public vs Private IP addresses
A PC network has a public and private IP address Public IP belongs to the router on your LAN Private IP is accessible only through the LAN ISPs are allocated blocks of IP addresses Once a message arrives at the router of your LAN it will use the private IP address to identify which device requested information
32
MAC Addressing in full and assigned by who how many addresses and for what what it looks like similarity of and combinations role
A media access control address is assigned to each Network interface card by the manufacturer. Computers may have 2, one for ethernet and one for wireless or for a phone wireless and bluetooth Hex value eg. 3B:14:E6:39:0A:2C Every network device in the world has a unique MAC address There are 2^48 possible MAC addresses Role of a MAC address: When you request a web page each router along the way uses the MAC address of the next router to send the data packet to the next leg of its journey.
33
URL
Uniform resource locator is a web page and all are unique WWW. ``` Domains names (TDLs) .uk , .nz etc ```
34
DNS
Domain Name system DNs technology allows you to type a URL into your web browser and it translates the web address into an IP address. There are 13 DNS "root" servers worldwide that keep complete database of all names and IP addresses Lower level DNS servers are owned by ISPs and hold parts of the database When a DNS server receives a request not in its database it will pass it on until reaches one with the matching name and IP address
35
Cookies
A cookie is a small data file that a web server puts onto your computer when you visit a website Cookies save any data entered such as registration details, passwords and relevant adverts for you as well as web preferences.
36
Role of a browser how browser gets webpage/website on your computer
1. User types web address (URL) into browser 2. Browser forwards request to web server to access page 3. Web server acknowledges request and sends HTML source code for the web page to the computer 4. Source code is rendered (translated) into viewable web page
37
Malicious software what it does what it can/typically does types x6
Malware is any software written with malicious intent. - Disrupt computers from their work - Corrupt files - Record key presses and gather information - Gain unauthorised access to a computer or files Not all viruses cause harm, but the ones (most) that do: - limiting hard disk space and memory - destroying or damaging files and data - spamming your address book with contacts - consuming your internet bandwidth Types of Malware: Spyware, gathers information, installs more spyware, sends information back to spyware author, sells to advertising companies or help with identity theft Adware, irritating pop ups, instals itself on a computer, rarely harms Viruses, small program that replicates by inserting itself in other computer programs - attach them self to existing software programs and infect when you run that program - self replicate Worms, a standalone file that does not need a host program to attach itself to Trojans, a non-self-replicating virus that masquerades as a harmless file that you might want to open Ransomware, malware used to lock your computer or access to your flies for which you are then asked to pay a fee to regain access
38
Botnets
A virus can compromise a computer and use the host's storage and processing power to perform jobs This computer can then become a part of a Botnet network ( a group of computers secretly cooperating to send spam or cause disruption on a much larger scale) Computers in a botnet can: - send email spam to other users - store and distribute illegal material - perpetrate a Denial of Service attack
39
DOS attacks
Denial of service attack Frequently aimed at company or web servers to overload them or make them crash by: - flooding servers with millions of requests - absorbing 100% of its processor time or memory - using all available bandwidth Attempts to make a network or website unavailable to legit users and the motive is often revenge, blackmail or terrorism
40
Reducing the risk of any cyber security issues
- personal vigilance - scan external devices and drives - anti-virus softwares - firewall software
41
Anti-virus softwares what they do how they do
- detects viruses - deletes or quarantines infected files - commonly finds all malware including adware, spyware, worms and Trojans Works by: - holding a dictionary of snippets used in viruses - scans new files, downloads, external drives on your computer - looks for suspicious codes by comparison - keeps a dictionary of know viruses up to date
42
Firewall
- acts as a filter or barrier between your own trusted network and others - only allows certain data packets across that meets set filtering rules
43
Hacking
Breaking security defined as unauthorised access to files or data - Exploiting weaknesses in websites or security systems to access data - Guessing default or common passwords - Tricking people into downloading malware to gain access to their computer - Logging in as someone else without their permission In order too: - pure mischief or a challenge - steal money - steal or modify information - for political reasons, expose wrongdoing or revenge on opposing views
44
Black and white hats
Black hat hackers are illegally hacking with criminal intent White hat hackers ethical hackers employed by companies to deliberately find holes in their own security Grey hat hackers look for wholes in other systems and ask for a payment from those systems
45
Cracking
Not hacking Illegally accessing program source code to change it or fool it to: - Bypass security or licensing control - prevent software from expiring - unlock features that otherwise would require a subscription
46
Hyper Text Markup Language
International standard language that all pages can read and all pages are written in. Webpages, webpage code
47
HTML Code
In a text file containing the content of the website to be displayed by the browser Uses to govern how to present sections of content Stores locations of images that are to be displayed Stores the location of other websites that are linked to using hyperlinks
48
HTML vs CSS
HTML controls content and function of a web page Cascading Style Sheets control its style and appearance
49
Writing HTML code
open <> and close > Websites are made of a head and body

,

,

,

- different headings (main , sub) : emphasis Click here for more info : link placed in middle line, click to access

50
Adding CSS to a webpage
# Define the style at the top between tags h1 {colour:blue; text-align: centre} Everything that falls inside the style tag, that html will adopt that style Sector ==> h1 or other Declaration ==> property and value Property ==> colour or other Value ==> blue or other h1 {colour: blue;} To add a CSS style: Define a style for a particular tag eg. h1 or Define a general style and attribute it to a new name eg. #page Attribute style to a
block: **Image file on desktop**