Networks Flashcards

(51 cards)

1
Q

What is a symbol in communication?

A

A particular pattern of bits represented by a signal, e.g., 1110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Baud rate measure?

A

The number of signal changes in the medium per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the relationship between bit rate and Baud rate?

A

Bit rate = Baud rate x Number of bits per signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is bit rate defined?

A

The number of bits transmitted over the medium per second, often measured in bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does bandwidth refer to in communication?

A

The range of frequencies that a communication medium is capable of transmitting, expressed in Hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is latency in communication?

A

The difference in time between an action being initiated and its effect being noticed, measured in milliseconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What typically happens to latency with increased distance?

A

Latency usually increases with distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a protocol in communication?

A

A set of rules relating to communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is serial data transmition

A

Data is sent one bit at a time along 1 line.

Used for long range communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is parallel data transmission

A

Data is sent along parallel wires one bit along each line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages,
disadvantages of serial data transmition

A

ADV
Cheaper,no skew or crosstalk,more reliable.

DIS
Takes longer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages,disadvantages of parallel data transmition.

A

ADV
More bits sent per second,

DIS
Data going to other branches (crosstalk), different times of output (skew), expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Synchronous transition

A

A clock signal (shared by sender and reciever) data sent then.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asynchronous transmition

A

Start,end bit is opposite.

Start bit tells driver clock to synchronise with sender clock.

Then data sent

Then end bit tells clock that the processor can then processor the data sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical network topology

A

Actual archtecture of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Star topology

A

Clients have a connection to a Hub. Hub receives packets and send then to correct recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bus topology

A

Uses a single cable called a backbone. Terminators are at the end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Logical network topology

A

This refers to the flow of data packets in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Client-server nerworks

A

One or more servers provided services and the clients request the services from them and the server responds to them.

ADV
Security, central management,

DIS
Expert needed to make and manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Peer-Peer networking

A

Services are provided by clients and are all equal. All have some importance and resources as shared and stored.

ADV
Cheaper,no powerful server,easy to set up

DIS
Security, if one doesn’t work nobody can use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is packet switching

A

Packets are data that is sent over the network
The object is split into packets and then sent over the Internet by the router.
Every time it passes through a roster it counts as a hop.

22
Q

What does a packet contain

A

Sender IP address
Recipient IP address
Time to live (number of hops)
Packet contents
Sequence number (the order of them)

23
Q

What is a router

A

They send packets in the fastest way (lowest hops). They hold INFO about fastest routes and is usually updated.

24
Q

What is a gateway

A

When 2 networks use different protocols.
It strips everything away leaving the contents. It then gives knew sending and recent addresses.

25
What is a URL
An address assigned to files on the Internet. Different protocols acces different files.
26
What is a FQDN
Is a domain that specifies an exact resource and interpreted in only 1 way.
27
What is a DNS system
It is a table of domain names and their corresponding IP addresses.
28
What is an Internet register
An organisation responsible for the allocation of IP address. There in only 5 in the 🌎
29
What is a Fire wall
Sits between Internet and the device. Filters through packets and does packet filtering and stateful inspection.
30
What is packet filtering
The firewall to accept/block packets based on IP address or the protocol.
31
What is stateful inspection
Examines the contents of packets before deciding whether to allow it through the firewall.
32
What is a proxy server
Sits between a public and private network. It manages the packets that pass through the network.
33
What is symmetric encryption
Both the the sender and recier share the same keys The key is shared on the network and easily intercepted.
34
Asymmetric encryption
The digest is created by a hashing algorithm. This is determined by the message. **The digest changes if the message changes** They send the public keys to each other.
35
What is a worm
Pieces of malicious software that self replicate between computers. Usually happens by downloading it or can be in a network.
36
What is a trojan
Is a type of malware that is hidden as a usefull file
37
What is a virus
These are usually files that are on computers and need to be ran to start replicating **it needs a host**
38
What can we do to prevent malware?
Making sure code does not have errors Make sure anti virus is up to date. And use it **don't open sketchy stuff**
39
What are the processes of TCP/IP stacks
**APLICATION** Selects the correct protocol to transport the data. **TRANSPORT** Creates a virtual path that is from sender to the recipient. Splits it in to packets. They have sequence numbers and TCP added on. **NETWORK** This layer adds the IP address of the sender and the recipient. **LINK** This ads the MAC address to the packets and controls the physical connections between pieces of hardware in a network.
40
What's a socket adress
When an IP address is combined to a port number.
41
What is the well known port for FTP and what is this protocols used for?
Port 20 and 21 Used for sending files over the network
42
What is the well known port for HTTP/HTTPS and what is this protocols used for?
80 HTTP 443 HTTPS This is used to hold Web pages. HTTPS stop people with tampering with it.
43
What is the well known port for POP3 and what is this protocols used for
110 & 995 Used for receiving email.
44
What is an IP address split into
A network identifier and a host identifier.
45
What is it called when you beak a network into a smaller network
Subnets
46
If 255.255.255 is the subnet mask and the IP address is 192.168.3.24. What is the network identifier.
47
How do you send items on WiFi on network on phone.
You need a WAP
48
How to encrypt a WiFi network
WPA/WPA2 Need a password to have WiFi. SSID Disabling it stops wireless items joining the network as it is not shown to the user. Only those who know the SSID can join. MAC address filter. Blacklist people you don't want on the network.
49
What is CSA/CSMA and how does it work.
50
What is thin and thick client computing
51
What is DHCP