communications

    Cards (45)

    • serial transmission
      bits are sent one after the other along the same data line
    • parallel transmission
      bits are sent simultaneously across separate data channels
    • disadvs. of parallel transmission
      skew - different wires have slightly different properties, so bits travel at different speeds. crosstalk - electromagnetic interference between adjacent wires. Increases as speed of transmission increases. If data is corrupted, it has to be retransmitted. Is only suitable for distances up to 2m
    • synchronous transmission
      data is sent in packets at certain time intervals (timed with internal clock pulse). No gaps in transmission. Receiver counts the bits and reconstructs into bytes
    • asynchronous transmission
      data is sent when it is available. Each byte has a start bit and a stop bit. Transmitter and receiver are not synchronised
    • latency
      time delay between sending and receiving of first packet of a communication
    • protocol
      set of rules regarding the communication between devices, e.g data format, error checking procedures, rate of transmission
    • bit rate
      amount of bits transferred per second
    • baud rate
      amount of signal changes per second
    • baseband
      where one bit is transferred per each signal change. bit rate = baud rate
    • bandwidth
      maximum capacity of communication channel. The range of frequencies at which data can be transmitted through a channel.
    • physical topology
      physical arrangement of connections between devices
    • logical topology
      how data flows around a network
    • bus topology
      nodes are connected to a single communication line. Each end has a terminator to stop signals bouncing back. Only one computer can successfully transmit at a time
    • star topology
      nodes are connected to a central device. Usually a hub (transmits message to every computer on the network) or a switch (transmits message to intended computer only).
    • features of peer to peer network?
      No central server, all computers can see all files, direct communication, if a computer is turned off data cannot be retrieved
    • features of client server network?
      server - powerful computer which provides services. Client - computers which send requests. Servers control backups and client access.
    • features of cloud computing?
      uses remote servers. Data is remotely accessible. Automatic backups. Does not need to be downloaded.
    • examples of network security measures?
      WPA, WPA-2 (generates a new 128 bit key for each packet it sends), MAC whitelisting
    • Which collision avoidance method works when nodes are hidden from each other?
      CSMA/CA with RTS/CTS - sends request to send and waits for "clear" response
    • two ways of increasing network security?
      Disabling SSID broadcast (hides network), using WPA (encrypts transmission)
    • relationship between bit rate and bandwidth?
      directly proportional
    • what is WAP?
      wireless access point - enables wireless devices to connect to a local network
    • what is SSID?
      service set identifier - identifies the network by a unique name. Must be used by all devices on the network.
    • what is wireless network adapter?
      installed in device so that it can access wireless networks
    • what is WiFi?
      wireless local area network based on international standards
    • define the internet:
      a global wide area network formed from the connection of many other networks, uses TCP/IP protocol
    • what is a packet?
      container in which data is transmitted over networks
    • what is a router?
      a device that receives packets (from host /router) and uses their destination IP address to pass them (correctly formatted) to another host/router
    • what is a gateway?
      a device used to connect networks which use different protocols so that info can be transferred
    • what is packet switching?
      a message is split into packets, each packet is transmitted via the best route (individual to each packet) and reassembled by the recipient
    • explain time to live:
      when a packet passes through a router, this is a hop. each packet can only go through a certain amount of hops before it is dropped - this is its time to live
    • components of a packet:
      sender's address, receiver's address, time to live, packet contents, sequence number
    • what is the domain name system?
      how domain names are translated to their IP addresses, using the domain name server (a table of domain names and their IP address)
    • what is packet filtering?
      accepts or blocks packets depending on their source IP address or their protocol, can be done by network admin or automatically
    • what is stateful inspection?
      looking at packet's contents to decide whether to accept it
    • what is a proxy server?
      server that sits between public and private network, manages every packet that passes through
    • how do firewalls provide anonymity for private networks?

      when a packet is sent from a private network, it goes through a firewall, so firewall address becomes sender address when it reaches the public network
    • what is encryption?
      using an algorithm and a key to convert a message into a form that is only understandable with the key
    • symmetric encryption:
      sender and receiver share private key, which is used for encryption and decryption. Before transmission, a key exchange must occur
    See similar decks