Fundamentals of Communication & Networking Flashcards

1
Q

What is a symbol in communication?

A

A symbol is a particular pattern of bits represented by a signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is baud rate?

A

Baud rate is the number of signal changes in the medium per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is bit rate defined?

A

Bit rate refers to the number of bits transmitted over the medium per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the relationship between bit rate and baud rate?

A

Bit rate is equal to baud rate multiplied by the number of bits per signal.

Bit rate = Baud rate × № of bits per signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is bandwidth in communication?

A

Bandwidth refers to the range of frequencies that a communication medium can transmit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is latency in communication?

A

Latency is the difference in time between an action being initiated and its effect being noticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a protocol in communication?

A

A protocol is a set of rules relating to communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between serial and parallel data transmission?

A

Serial data transmission sends data one bit at a time over one communication line, while parallel data transmission uses multiple parallel lines to send multiple bits simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is skew in parallel data transmission?

A

Skew refers to the difference in time taken for one bit to be transferred among the parallel communication lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is serial data transmission more reliable over long distances?

A

Serial data transmission doesn’t suffer from skew or crosstalk, making it more reliable over long distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is synchronous data transmission?

A

Synchronous data transmission uses a shared clock signal to time when signals are sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is asynchronous data transmission?

A

Asynchronous transmission uses start and stop bits to indicate the duration of a transmission and does not require a shared clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is physical network topology?

A

Physical network topology refers to the actual architecture or structure of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of physical network topology mentioned?

A

The two types are star and bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a physical star network topology?

A

In a physical star network, each client has its own direct connection to a central hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the advantages of a physical star network topology?

A

Advantages include direct communication between clients, easy addition/removal of clients, and elimination of collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the disadvantages of a physical star network topology?

A

Disadvantages include network failure if the central hub fails and higher installation cost due to cable requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a physical bus network topology?

A

A physical bus network connects clients to a single cable called a backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the advantages of a physical bus network topology?

A

Advantages include lower cost of installation and shared backbone for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the disadvantages of a physical bus network topology?

A

Disadvantages include the risk of collisions and network failure if the backbone fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is logical network topology?

A

Logical network topology refers to the flow of data packets within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between a logical bus network and a logical star network?

A

In a logical bus network, packets are delivered to all clients, while in a logical star network, packets are delivered only to their recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can a physical star network behave as a logical bus network?

A

Yes, by running a bus protocol on the hub, a physical star network can distribute packets to all connected clients, behaving like a bus network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is client-server networking?

A

In client-server networking, central servers provide services to clients on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which type of networks often use client-server networking?

A

Most schools, colleges, and businesses use client-server networks for central management of clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is peer-to-peer networking?

A

In peer-to-peer networking, services are provided by the clients themselves, and every client has equal status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the primary disadvantage of peer-to-peer networking?

A

All clients providing services must be running for the network to be fully operational. If a client responsible for managing storage is turned off or faulty, other clients cannot access their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How does peer-to-peer networking compare to client-server networking in terms of cost and setup?

A

Peer-to-peer networking is more cost-effective and easier to set up and maintain than client-server networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some examples of networks that use peer-to-peer networking?

A

Large file-sharing networks and multimedia providers often use peer-to-peer networking for high-performance services without the need for a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is wireless networking?

A

Wireless networking allows clients to communicate within a network without being physically connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a wireless access point?

A

A wireless access point is a device that connects to a wired network and allows wireless devices to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is WiFi?

A

WiFi refers to a wireless local area network based on international standards, allowing devices to connect seamlessly to wireless networks worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How are wireless networks secured?

A

Wireless networks are secured by encrypting transmitted data using WPA or WPA2 and by methods such as disabling SSID broadcast and setting up MAC address filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)?

A

Protocol used in wireless networks to avoid data collisions caused by multiple devices communicating simultaneously.

Stands for Carrier Sense Multiple Access with Collision Avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does CSMA/CA work?

A

When a device is ready to transmit, it listens to its communication channel to check if it is idle. If it is idle, the device transmits the data. If the channel is busy, the device waits for a random period of time before checking the channel again.
(Note: this explanation does not include RTS/CTS).

36
Q

What is Exponential Backoff Algorithm?

A

Algorithm used in CSMA/CA to increase the waiting time period for a device with each check of the channel, helping to avoid collisions.

37
Q

What is Hidden Nodes?

A

Problem in wireless networks where devices checking for an idle channel cannot “see” some parts of the network where communication may be occurring. CSMA/CA alone cannot overcome this issue.

38
Q

What is Request to Send/Clear to Send (RTS/CTS)?

A

Protocol used to overcome the problem of hidden nodes in CSMA/CA. It adds an additional step where the transmitting device sends a “request to send” message to the server, and if the server is idle, it responds with a “clear to send” message to initiate communication.

39
Q

How does RTS/CTS protocol work?

A

After checking for an idle channel, the transmitting device sends a “request to send” message. If the server responds with a “clear to send” message, the transmitting device can begin communication. If no response is received, the server is busy with a hidden node, and the transmitting device must wait before starting the CSMA/CA process again.

40
Q

What is the structure of the Internet?

A

The Internet is defined as a network of interconnected computer networks that uses an end-to-end communication protocol.

41
Q

What is the role of an internet service provider (ISP)?

A

An internet service provider is a company that provides customers with access to the Internet. They offer internet access to smaller regional and local ISPs, who then sell access to homes and businesses.

42
Q

What is packet switching and how does it work?

A

Packet switching is a method of transmitting data over networks. Data is split into packets and sent individually to the recipient via the best possible route. Routers play a crucial role in directing packets to their destination.

43
Q

What is the purpose of routers and gateways?

A

Routers and gateways connect different networks and allow packets to reach their destination. Routers find the fastest route for packets, while gateways modify packets to conform to different protocols when networks use different protocols.

44
Q

What is a uniform resource locator (URL)?

A

A uniform resource locator is an address assigned to files on the Internet. It specifies the protocol, subdomains, domain, directories, file name, and file extension required to access a specific resource.

45
Q

What is a domain name and how does it work?

A

A domain name identifies an organization or individual on the Internet. It uses alphanumeric characters and maps to an IP address. Domain names are easier for humans to remember than IP addresses.

46
Q

What is the role of a firewall in internet security?

A

A firewall regulates the packets that pass between a device and the Internet. It can perform packet filtering and stateful inspection to control and monitor network traffic.

47
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric encryption uses a shared private key for both encryption and decryption. Asymmetric encryption involves a pair of mathematically related keys: a private key kept secret and a public key shared on the Internet.

48
Q

How do digital signatures work in ensuring message integrity?

A

Digital signatures verify the sender of a message and confirm that it hasn’t been tampered with during transmission. A digest of the message is encrypted with the sender’s private key and appended to the message. The recipient can verify the signature using the sender’s public key.

49
Q

What are worms, trojans, and viruses?

A

Worms, trojans, and viruses are types of malware. Worms self-replicate between computers, trojans disguise themselves as benign files, and viruses require a host file to reside in. They can spread through networks, the Internet, or physical media.

50
Q

How can malware be prevented?

A

Preventing malware involves maintaining good code quality, using antivirus software, keeping software up to date, practicing good security measures, and training employees about the risks of opening suspicious email attachments.

51
Q

What does TCP/IP stand for?

A

TCP/IP stands for Transmission Control Protocol/Internet Protocol.

52
Q

How many layers form the TCP/IP stack?

A

The TCP/IP stack is formed from four layers: application, transport, network, and link.

53
Q

What is the role of the application layer in TCP/IP?

A

The application layer selects and uses the correct protocol to transmit data. It interacts with the user through application software.

54
Q

What is the responsibility of the network layer in TCP/IP?

A

The network layer provides the correct IP addresses for each packet’s source and destination. It involves routers that use IP addresses to send packets to their destinations.

55
Q

What does the transport layer do in TCP/IP?

A

The transport layer establishes a virtual path between the sender and receiver, splits the transmission into packets, assigns sequence numbers to packets, and identifies the port number to be used.

56
Q

What is the role of the link layer in TCP/IP?

A

The link layer controls physical connections between hardware in a network, adds MAC addresses to packets, and identifies the hardware to which a packet should be sent.

57
Q

What happens to a packet when it reaches the receiving end?

A

When a packet reaches the receiving end, it goes through the reverse process of the TCP/IP stack. The link layer removes MAC addresses, the network layer removes IP addresses, and the transport layer uses the port number and sequence number to ensure proper positioning.

58
Q

What is a socket address?

A

A socket address is formed by combining an IP address with a port number. It identifies the application to which a packet should be sent.

59
Q

What are the two types of IP addresses commonly used?

A

The two types of IP addresses commonly used are IPv4 and IPv6

60
Q

What are the well-known ports used for FTP?

A

Port numbers 20 and 21.

61
Q

What is the purpose of SSH?

A

SSH is used for remote management of computers, allowing them to be accessed and controlled remotely.

62
Q

Which port is commonly used for HTTP?

A

Port 80

63
Q

What is the difference between HTTP and HTTPS?

A

HTTPS performs the same function as HTTP but encrypts information during transmission, providing security and preventing tampering or modification of data.

64
Q

What are the port numbers used for POP3?

A

Port numbers 110 and 995.

65
Q

Which protocol is used for sending emails?

A

SMTP (Simple Mail Transfer Protocol).

66
Q

How is an IP address divided?

A

An IP address is divided into a network identifier and a host identifier.

67
Q

How can the network identifier part of an IP address be determined?

A

The network identifier part can be determined by applying a subnet mask.

68
Q

What is the difference between IPv4 and IPv6?

A

IPv4 addresses are represented as dotted quad numbers, while IPv6 addresses are formed of eight blocks separated by colons and use hexadecimal characters.

69
Q

What is the purpose of DHCP?

A

DHCP is used to assign IP addresses to devices as they join a network.

70
Q

How does NAT facilitate communication between a private network and the Internet?

A

NAT replaces the private IP address of a device with a router’s public (routable) IP address when communicating with devices on the Internet.

71
Q

When is port forwarding used?

A

Port forwarding is used when a client needs to communicate with a server connected to a private network.

72
Q

What is the client-server model?

A

In the client-server model, clients send request messages to servers, and servers reply with response messages.

73
Q

What is an API?

A

An API (Application Programming Interface) is a set of protocols that define how different applications can communicate with each other.

74
Q

What is the purpose of the WebSocket protocol?

A

The WebSocket protocol allows for a constant stream of information between a client’s web browser and a server.

75
Q

What is CRUD in the context of online databases?

A

CRUD stands for create, retrieve, update, delete, representing four commands used to query databases.

76
Q

What are the four HTTP request methods used in REST?

A

The four HTTP request methods used in REST are POST, GET, PUT, and DELETE.

77
Q

What are the advantages of JSON over XML

A

JSON is more compact, easier to read, easier to create, and faster for computers to process compared to XML.

78
Q

What is the difference between thin-client and thick-client computing?

A

In thin-client computing, the majority of processing power belongs to servers, while in thick-client computing, clients have their own processing power and storage.

79
Q

What are the advantages of thin-client networks?

A
  • Centralized control and management of software updates and security.
  • Lower hardware costs as thin clients are typically less expensive than full-fledged computers.
  • Easier addition of new clients to the network.
  • Reduced maintenance requirements as most tasks are handled by the server.
  • Lower energy consumption due to the lower processing power of thin clients.
80
Q

What are the advantages of thick-client networks?

A
  • Higher performance as the processing power and storage are located on the client device.
  • Greater offline functionality as thick clients can perform tasks independently of a server.
  • Reduced dependency on network connectivity.
  • Enhanced user experience with potentially more advanced graphics and features.
  • Lower server infrastructure costs compared to thin-client environments.
81
Q

What are the disadvantages of thin-client computing?

A
  • Reliance on network connectivity; if the network goes down, thin clients may become unusable.
  • Performance limitations as the processing power is dependent on the server’s capabilities.
  • Limited offline functionality as most tasks require a connection to the server.
  • Higher server infrastructure costs to handle the processing and storage demands of multiple thin clients.
82
Q

What are the disadvantages of thick-client computing?

A
  • Higher hardware costs as thick clients require more powerful and expensive components.
  • Increased maintenance requirements as each client device needs individual updates and security measures.
  • Difficulties in managing software compatibility across multiple client devices.
  • Potential security risks if individual client devices are compromised or lost.
  • Less centralized control and management compared to thin-client environments.
83
Q

What does CRUD stand for?

A

CRUD stands for create, retrieve, update, delete.

84
Q

What are the SQL equivalents for the CRUD commands?

A
  • Create: INSERT
  • Retrieve: SELECT
  • Update: UPDATE
  • Delete: DELETE
85
Q

What does REST stand for?

A

REST stands for representational state transfer.

86
Q

What is the purpose of REST in online database applications?

A

REST is a design methodology used for online database applications that are queried with a web browser.

87
Q

What are the corresponding SQL commands for the four HTTP request methods in REST?

A
  • POST: INSERT
  • GET: SELECT
  • PUT: UPDATE
  • DELETE: DELETE