Topic 9 - Communication and networking - Complete Flashcards

1
Q

Define serial data transmission?

A

Is where data is transmitted one bit at a time along a single data cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define parallel data transmission?

A

Is where data is transmitted more than one bit at a time along separate data cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define speed in terms of parallel data transmission?

A

If a parallel data bus had eight cables it would transmit data eight times faster than the single data cable used in a serial bus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define interference?

A

There is interference between the parallel wires which reduces the bandwidth of parallel connections, so parallel transmission bit rate is limited by interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define connections?

A

Connection cables are short to minimise the interference effect with the parallel transmission, whereas in the serial connection there is no interference or noise problem so connecting cables can be as long as 300 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define cables?

For parallel and serial data transmission

A

Parallel data transmission uses more cables than serial data transmission, therefore they are larger more expensive to produce and more complex than serial cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define synchronous data transmission?

A

Is where a block of data is transmitted along with a computer-clock-generated timing signal, this will ensure that the data transmitter and receiver are synchronised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define asynchronous data transmission?

A

Is where a data stream is not synchronised and transmitted at fixed time intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define start bit?

A

Used to indicate the start of a unit of data for asynchronous data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define stop bit?

A

Used to indicate the end of a unit of data for asynchronous data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define baud rate?

A

Is the number of symbols that are transferred across a network in a set amount of time.
Is the number of symbol changes, waveform changes, or signaling events across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define bit rate?

A

Is the number of bits transferred across a network in a set amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define bandwidth?

A

Maximum rate at which data is transferred in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define latency?

A

Measure the time delay between the source sending a data packet and the destination receiving the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a protocol?

A

Is a set of rules or standards which computers use for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define a network topology?

A

Is a way of describing the interconnections and cabling of a group of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define physical topology?

A

Is how devices or a group of computers are physically connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define logical topology?

A

Is how network devices communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define the physical star topology?

A

Is based on connecting each workstation to a single point such as a hub which may also be linked to a file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State 2 advantages of a physical star topology?

A

If one of the network cables break only the computer connected to that cable is affected.
Less/ no data bus traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State 2 disadvantages of a physical star topology?

A

If the main network cable breaks anywhere then none of the workstations can access the network.
More hardware so more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define a client-server model?

A

Is where the workstations in any network design use the server to provide a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define a client?

A

Is a computer or workstation on a typical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define a file server?

A

Is the computer with the main processing power and storage that interacts with the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is peer-to-peer networking?

A

Do not have special workstations which are are used as servers. Any workstation on the network can load information from the hard disk or use a local pointer for any other workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define Wi-Fi?

A

Allows devices to communicate wirelessly within a particular network area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define WAP (Wireless access point)?

A

Is a device that allows wireless devices to connect to a wired network using Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define wireless adaptor?

A

Performs a similar function to a network interface card (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define WPA/WPA2?

A

Are encryption protocols designed to protect a Wi-Fi connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define SSID?

A

Service set identification - Is a unique 32-character identifier that is used to name a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define MAC?

A

Media Access Control - MAC address is the physical address of a networking device. Assigned by the manufacturer and is stored in the devices ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define CSMA/CA?

A

Carrier Sense Multiple Acess with Collision Avoidance - Operates by the computer sending a signal indicating that is about to transmit data. Other computers can then avoid a collision by delaying when they will transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What happens when the CSMA/CA uses RTS/CTS?

A
  • RTS signal is sent by the sender of the package.
  • Then a CTS signal is sent by the intended receiver of the package.
  • Consequently, the sender and receiver are aware of a data transmission and hold off for the duration of the main transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What happens when the CSMA/CA doesn’t use RTS/CTS?

A
  • The computer wanting to send a data packet senses if the channel is ‘idle’
  • Then it is able to send the data packet
  • If the channel is sensed as ‘busy’, the sender will wait and try again.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define the internet?

A

A massive network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define packets?

A

Data is sent over a network in manageable amounts, known as packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define router?

A

Is a device that forwards data packets within networks.

Determine an efficient route for the data transfer between networks.l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define TCP/IP?

A

Is the transmission control protocol/ Internet protocol that is used to carry data packets on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define the check code?

A

Is sent in the data packet and is used to confirm the accuracy of the data sent at the destination computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define gateway?

A

Used to connect one network to another where they have different protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define URL?

A

Uniform resource locator refers to the location of a web resource on the internet.

42
Q

What is the first part called? (https://www.bbc.co.uk/news/uk-politics-54954698)

A

The protocol (https)

43
Q

What is the second part called? (https://www.bbc.co.uk/news/uk-politics-54954698)

A

The FQDN (www.bbc.co.uk)

44
Q

What is the last part called? (https://www.bbc.co.uk/news/uk-politics-54954698)

A

The path and resource to be returned (news/uk-politics-54954698)

45
Q

Define IP address?

A

Is a number that uniquely identifies every host on an IP network

46
Q

Define domain name?

A

Is an easy-to-remember numerical IP address

47
Q

Define domain name server (DNS)?

A

Translates domain names into their unique IP address

48
Q

Define firewall?

A

Is a combination of hardware and software that

is designed to check the integrity of incoming messages and requests for service from the system.

49
Q

Define packet filtering?

A

Is where the firewall analyses data packets that are attempting to enter the system. Traffic is blocked unless it confirms to a set of rules.

50
Q

Define stateful inspection?

A

Dynamic packet filtering. Each data packet is examined, and the state of active connection s, IP addresses and port numbers used is recorded. Data packets may be rejected if they come from an unknown port or source.
Is a more secure firewall method than simple packet filtering.

51
Q

Define proxy server?

A

Provides a gateway between users and the internet.
It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.

Processes the information received from the internet and then send it to the user of a private network.

Therefore the website host is not in direct contact with the private network as the material is transmitted via the proxy server.

52
Q

Define encryption?

A

Is used to make stored data more secure, by making it unreadable to unauthorised users.

53
Q

Define symmetric encryption?

A

Is where the data sent is encrypted using one key for encryption and decryption.

54
Q

Define asymmetric encryption?

A

Is where the data sent is encrypted by one key and a second key is used to decrypt it.

55
Q

Define public key?

A

Is made publicly available and is used to encrypt data

56
Q

Define private key?

A

Is only known to the receiver of asymmetric encryption.

57
Q

Define digital certificate?

A

Is an attachment to an encrypted message that is used to show the message is from a certified and so trusted source.

58
Q

Define digital signature?

A

Is a different method used to determine the authenticity of the message source by checking an encrypted and certified digital signature.

59
Q

Define viruses?

A

Are small programs designed to self-replicate between computers and to cause damage or interference with computer operation.

60
Q

Define worms?

A

Are self-replicating malware programs that are designed to reside inactive memory and use up system resources.

61
Q

Define trojans?

A

Are malicious computer programs which appear to be useful to persuade a user to download and install parties.

62
Q

Define spyware?

A

Is a trojan program that is installed in a computer system to gather information and pass it on to other interested parties.

63
Q

Define some security methods?

A

Up to date anti-virus software helps minimise the risk from viruses.
Intrusion detection systems are designed to monitor the network or computer system for malicious activities.

64
Q

Define the 4 layers of the TCP/IP stack?

A

Application
Transport
Network
Link

65
Q

Define process and connection identification?

A

The TCP/IP process contains an identifier termed as a socket, that is based on its IP address and port number it has been assigned.

66
Q

Define application in the TCP/IP stack?

A

the data that is being sent is encoded into a format that is understandable by the recipient.

67
Q

Define transport in the TCP/IP stack?

A

The data is split into parts to be fitted into a data packet, each data packet is assigned a number to indicate the port it will be delivered to and is also assigned a number to indicate the order in which the data packets can be correctly recorded once they have been received.

68
Q

Define ports?

A

TCP/IP networks have ports, which are logical connections that are used by a client program to specify a connection on a networked computer.

69
Q

Define client ports?

A

When a server responds to a client request the port number the client is using must be identified.

70
Q

Define the 6 protocols for the standard application layer?

A
  • FTP
  • HTTP
  • HTTPS
  • POP3
  • SMTP
  • SSH
71
Q

Define FTP (File transfer protocol)?

A

Set of rules used to download or upload files over TCP/IP networks like the internet.

72
Q

Define SSH (Secure shell protocol)?

A

Is a computer application that allows the user to log onto another networked computer to gain remote access to its files.

73
Q

Define email server?

A

Is a network computer whose function is to transmit, store and receive emails.

74
Q

Define SMTP protocol?

A

Is the set of rules used for the transmission of emails.

75
Q

Define POP3 protocol?

A

Is the set of rules used for the recipient of emails.

76
Q

Define web server?

A

Is a network computer whose function is to deliver web content to clients over the internet.

77
Q

Define web browser?

A

Is a software application that is used to navigate and view the internet sources of information.

78
Q

Define the 4 steps the DNS takes to display a web page?

A
  • Select a website
  • Use domain name server translation
  • The website IP address is converted
  • Connect to server or service
79
Q

Define network ID?

A

Identifies the network address on which a device or computer can be found

80
Q

Define host ID?

A

Identifies the address of a specific device on the network.

81
Q

Define subnet mask?

A

Is a number used to divide the IP address into a network address and the host address

82
Q

Define IP address v4?

A

Is based on 32-bit code.

Written as a set of 4 decimal numbers of up to three digits, separated by dots.

83
Q

Define IP address v6?

A

Is based on 128-bit code.

Written as a set of 8 groups of 4 hexadecimal numbers, separated by colons.

84
Q

Define public IP address?

A

Is where a device is assigned to permit direct access routed via the internet, these IP addresses are totally unique and routable.

85
Q

Define private IP address?

A

Is where a device is connected to a private network, e.g. a home network system.

86
Q

Define dynamic host configuration protocol (DHCP)?

A

Is a network protocol in which IP addresses are automatically assigned to devices when they connect to the network.

87
Q

Define static IP address?

A

The network administrator has to manually configure the system to accept the specific IP address for a device.

88
Q

Define dynamic IP address?

A

Is that no administrator is necessary and the server automatically keeps a record of the IP addresses connected to the network.

89
Q

Define NAT (Network addresses translation)?

A

Is the technique used to assign a private network a registered public IP address which can then be mapped to the private IP address of the devices in the network.

90
Q

Define port forwarding?

A

Is a technique used to route data to private IP addresses using additional ports.

91
Q

Define the client-server model?

A

Is where the workstations in any network design use the server to provide a service.
Including: Email server, Web server, File server, Database server, Print server.

92
Q

Define application program interface (API)?

A

Is a set of function calls that enable communication between two programs

93
Q

Define WebSocket protocol?

A

Describes the rules for creating a persistent connection between two networked computers to enable real-time data transfer.

94
Q

Define SQL (Standard query language)?

A

Is used to control and manage relational databases, it contains equivalent commands to DRUD.

95
Q

Define REST (Representational state transfer)?

A

Is a methodology for implementing web-based databases. Uses HTTP commands to perform CRUD function necessary to create and manage databases.

96
Q

Define thin-client model?

A

Are low-specification devices, they have little processing power and rely on the more powerful server to provide resources, such as processing power and storage for main programs and data.

97
Q

Define the positives of thin-client model?

A
  • Improved security as client access rights can be managed to reduce access to vulnerable files on the server.
  • Network administrator can back up all system data more easily and control clients activities.
  • Software and hardware can be configured and updated from the server.
98
Q

Define the negatives of the thin-client model?

A
  • High bandwidth network connection is required to offset poor response time during busy periods.
  • it is expensive to purchase and install a high-specification server capable of operating the thin-client system.
  • Server failure or inaccessibility results in all client work being affected.
99
Q

Define thick-client model?

A

Are fully functional computers, so they can operate without being connected to the network and a server.

100
Q

Define the positives of the thick-client model?

A
  • Improved performance for the thick-client users, as software applications are processed locally on the client device.
  • Can run stand-alone from the network where necessary, minimising the impact of server failure or the network being inaccessible.
  • Thick-client software offers additional features and customisation which improve the usability of the application.
101
Q

Define the negatives of the thick-client model?

A
  • Less security as clients can download applications and access the internet directly.
  • Further tasks for network administrator as hardware and software need to be configured and updated on individual client machine.
  • Additional costs incurred as thick-client computers need to be higher specification than thin clients.