(P2) Fundamentals of Communication And Networks Flashcards
Describe what thin client computing is.
Thin client computing are programs that are executed on an application server.
Explain two reasons why a thin client system is better than a thick client system.
Clients are cheaper as they have lower hardware specifications. Easier to add new clients. Simpler to update software.
Describe the relationship between bitrate and bandwidth.
Greater the bandwidth, the higher the bit rate. They are directly proportional.
Describe the difference of operation between of serial and parallel transmission.
Serial sends one bit at a time, but parallel sends multiple bits at the same time.
Explain why a laser printer with a built in wireless network adapter is likely to be a suitable choice for a small office.
Laser printer: cheaper than buying ink. Cheaper per page.
Wireless: Cheaper as no cabling. All devices can use it.
State one reason why IPv6 has been introduced to replace IPv4.
Not enough unique addresses in IPv4.
Explain how the CSMA/CA protocol with RTS/CTS is used.
- Computer with data to send monitors data signals.
- If data signal is present, then continue to wait.
- When no signal presents, computer sends Request To Send (RTS).
- Two computers could start transmitting at the same time if they both detect no data signal.
- Wireless Access Point (WAP) responds to RTS with Clear To Send (CTS) signal.
- RTS/CTS signal blocks any other transmission from nodes for specific time.
- When CTS received then start to transmit.
- If CTS not received, continue to wait.
- Reciever sends acknowledgement.
- After transmitting, the transmitter waits to recieve acknowledgement packet.
- If no acknowledgement then wait and listen again.
- Acknowledgement notifies other computers they can transmit again.
- Collisions cannot be detected by transmitter.
State two reasons why JSON is better than XML.
Less lines of code so take up less storage/ memory.
Easier for humans to read and debug.
State one advantage of using DHCP.
No requirements to manually assign IP addresses. Facilitates efficient use of a limited pool of IP addresses.
Explain how two or more computers connected to the Internet can have the same IP address and still communicate with each other.
Computers have private IP addresses. Network address translation (NAT) will be performed so that computers can communicate on the Internet.
Explain four different ways that a firewall can protect computers on a LAN.
Block specific protocols. Block certain types of packets. Firewall maintains information about current connections and only allows packets relevant to these connections through. Acts as proxy server.
Explain how Computer A will use a subnet mask to determine whether or not it can send the packet directly to Computer B across the LAN or if the packet must be send via the Internet.
AND operation of subnet mask with Computer A’s and B’s IP address. Result of each AND operation is the subnet ID. Subnet ID compared, if they are different packets, then must be sent through Internet.
Explain how packets are routed across the Internet.
Hierarchical organisation of routers. Path to take selected by each router. Route may change as a result of congestion. Route determined using the IP address. Router decrementing “time to live” of packet. Source and destination MAC address changed at each router.
Explain how the checksum can be used to determine if the recieved packets has been changed during transmission.
Checksum produced when packet transmitted. Checksum calculated from packet content. MOD operation used to limit magnitude of checksum. Recalculated checksum and compare. If these match, data is accurate.
State the name of two application protocols and their use.
SMTP- Send/ transmit emails
IMAP- Send and recieve emails
Explain how the transport layer of TCP/IP stack determines which application layer software on the server should deal with the received request.
It uses the port to determine which server should deal with the request.
Describe one function of the network layer of the TCP/IP stack.
Adds source IP address. Adds destination IP address.
Explain the difference between asynchronous and synchronous communication.
Asynchronous: The receiver and transmitter are not synchronised by a common clock.
Synchronous: The reciever and transmitter are synchronised by a common clock.
In asynchronous data transmittion, where are the stop, start and parity bit located?
Left to Right:
Stop. Parity. Start.
A message is to be sent from Computer A to B and will be encrypted using asymmetric encryption. To enable Computer B to authenticate that the message was sent by Computer A, a digital signature will also be sent with the message.
Explain how Computer B will decrypt the message and verify that it was sent by Computer A.
Receiver’s private key is used to decrypt message. Hash is calculated from the message. Sender’s public key is used to decrypt the digital signature. If both hashs match then the sender then the sender can be authenticated.
Explain why the DCHP system is used.
Reduces the need for expert knowledge when configuring a host. Facilities efficient use of a pool of IP addresses. Content of communication: Host sends to discover a DHCP server. DHCP server offers configuration to host. Host accepts offer of configuration from DHCP server by echoing the accepted to host.
What is the purpose of DHCP system?
To auntomate the configuration of hosts connecting to a TCP/IP network.
What is the key exchange problem with a symmetric cipher?
How to pass the key from sender to reciever as the key can be intercepted if transmitted.
Explain how External Routers are configured so that web servers can be accessed by computers outside of the network.
Trafiic arriving on the HTTPS port must be forwarded by the external router to the IP address on the Web Server.