Network Communication Flashcards

(111 cards)

1
Q

What is serial transmission and give an example

A

Serial transmission sends and receives data one bit at a single communication channel or wire e.g usb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is parallel transmission and give an example

A

A method of data transfer where multiple bits are sent simultaneously across multiple wires. The more wires there are, the more data can be sent at any one time. e.g internal computer buses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between serial transmission and parallel transmission

A

Serial Transmission
Less crosstalk because only one channel is used.* Reliable over long distances since there is no timing skew between bits.* Cheaper and simpler cabling (fewer wires and connectors).* Higher practical speeds with modern technologies but traditionally slower because bits are sent one at a time

Parallel Transmission
Multiple bits sent simultaneously, so it can be faster over short distances.* Timing skew – bits may arrive at slightly different times.* Not reliable over long distances.* More expensive and bulky cabling due to multiple wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is sychronous transmission and give an example

A

A method where data is sent continuously in blocks or frames with the sender and receiver synchronised by a shared clock signal. e.g ethernet communications on networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens when two devices are not synchronised

A

*If the two devices are not synchronised then data could be lost during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is asynchronous transmission with an example

A

A method where data is sent one character at a time, and each character is framed with start and stop bits so the receiver knows where the data begins and ends. No shared clock signal is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the features of a start bit
( 3marks)

A

The start bit signals the beginning of a data packet or character.
It alerts the receiving device that data is about to be transmitted so it can begin reading the incoming bits at the correct time.
Usually represented by a 0
Allows the receiver to synchronise its timing with the incoming data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the features of a stop bit

A

The stop bit signals the end of the data packet or character.
It tells the receiving device that the transmission of that character has finished.
Usually represented by a 1
Gives the receiver time to process the character before the next one arrives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

difference between synchronous transmission and asynchronous transmission

A

Synchronous Transmission
Faster data transfer speeds* More efficient (no start/stop bits for each character)* Suitable for large continuous data transfers. More complex hardware required

Asynchronous Transmission
Simpler and cheaper to implement* No shared clock required* Suitable for irregular or small transmissions. Slower due to start and stop bits* Less efficient because extra bits are added* Not suitable for large continuous data transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is band width and what is it measured in .

A

The maximum data transfer capacity of a network or channel, usually measured in bits per second (bps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is bit rate

A

the number of bits that are transmitted over the medium per second. Bit rate is directly proportional to bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between bit rate and baud rate

A

Baud rate
Number of signal changes per second on a communication channel.

Bit Rate
Number of bits transmitted per second.Bit rate = Baud rate × number of bits per signal change
One signal change can carry multiple bits using advanced encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is baud rate

A

The number of signal changes per second in a communication channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Latency

A

Latency is the time delay between an action being started and its results being seen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a handshake

A

Handshaking establishes a connection between two devices and establishes the rules under which they will communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is protocol

A

*A protocol is a set of rules. agreed for communications between computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of protocol

A

*TCP/IP (Transmission Control Protocol/Internet Protocol) is actually two protocols that are usually referred to as one and relate to the set of rules that govern the transmission of data around the Internet.

*HTTP (Hypertext Transfer Protocol) is the set of rules governing the exchange of the different types of file that make up displayable web pages.

*FTP (File Transfer Protocol) is similar to HTTP in that it provides the rules for the
transfer of files on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The system sends the data over a long distance using serial communication.

Explain why serial communication is more appropriate in this instance than parallel communication.

A

Eliminates risk of desynchronisation (between data signals)

Bits transmitted together may arrive at different time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

State three advantage of serial data transmission over parallel data transmission.

A

the hardware required for transmission wiring is cheaper
No data skew
No cross talk
Easier to impement
Better for long distatnce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State the purpose of the stop bit in asynchronous serial transmission.

A

Provides time for the receiver to process the received data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State the purpose of the start bit in asynchronous serial transmission

A

. to synchronise the receiver and transmitter clocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a physical star topology and how does it work

A

A network in which all devices are connected to a central hub, The hub acts as a central point for data transfer. (star)

When a device sends data, it is transmitted to the central hub.
The hub forwards the data to the intended recipient device.
Each device has a dedicated connection to the hub, so one cable failure only affects the device connected to that cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

logical bus topology

A

A network in which all devices are connected to a single communication line (bus). Data is sent along the bus and is received by all devices, but only the intended recipient processes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the two different networking between hosts

A

Peer to peer
Client server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is peer to peer network (4)
All computers are equal . Each device can act as both a client and a server, sharing resources direclty with othe devices without a central server.Each peer is responsible for managing its own data and permissions. FIles , printers and other resources are shared between peers
26
Advanatges of peer to peer network
Simple and cheap to set up No central point of failure ,
27
What is the disadvantage of peer to peer network(3)
Data transfer may be very slow because of –data collisions –shared processor power -All clients who provide services must be running in order fir the network to be fully sponsored - Less secure and harder to manage
28
Where is a peer to peer network suitable for?
*Only really suitable for small and low traffic networks. *This is a very popular design for a home network
29
What is client server
Client sevrer is when one or more sevrer provide services to the clients on the netwrok .Clients requests data and servers manage store and respond to the requests.
30
What is a client server suitable for
Email services, web hosting and online banking services Corporate networks with centralised file storage and access control
31
Advantages and Disadvantages of client server
Easier to manage and secure efficiently Expensive Requires expertise to set up and mantain Single point of failure if the server goes down.
32
What are ISP's
An internet service provider (or ISP) is a company that provides its customers with access to the Internet
33
What is wlan, advantage and what does it do (4 marks)
Wi-Fi is a wireless local area network (WLAN) technology that is based on international standards, allowing devices to connect to a network without physical cables. It is easy to install Multiple devices can communicate and share information Mobility
34
What is the difference between a Wireless Network Adapter and a Wirless Acess Point ( WAP)
Wirless Network Adapter : Device that allows computer to connect to a wireless network . Converts data into radio signals; enables wireless connectivity for devices without built-in Wi-Fi WAP - Device that broadcasts the wirless network signals . Central hub for devices; connects wireless devices to the network and internet
35
Wifi Security Measures
SSID Broadcast Disables MAC Address Allow List WPA ( Wifi Protected Acess )
36
What is an SSID Broadcast Disabled and what does it do
The network’s name (SSID) is not publicly broadcast to devices scanning for Wi-Fi networks. This makes the network less visible to casual users and attackers as the devices must know the SSID before connecting
37
How is a MAC Address Allow List used for Wifi - security Measures
A list of devices’ unique hardware addresses (MAC addresses) that are allowed to connect to the network. Oly devices with a MAC address on the list can connect, adding an extra layer of control
38
How does a WPA works for wifi security measures
encrypts data transmitted over a wireless network.Protects data from being intercepted by unauthorized users.
39
WHat is a Trojan and what are the vulnerabilties exploited (3)
This is a malware designed to cause harm to a computer system , disguised and it is hidden away inside another file. Social engineering and downloading unknown files
40
What is a virus and what are the vulnerabilities exploited (2)
Malware attached to files that executes when file is opened. Weak user practices and lack of antivirus
41
WHat are worms
Worms also malewares that replicate themselves and are designed to spread without the users actions
42
What does a DDOS do
malicious attempt to make an online service, server, or network resource unavailable to legitimate users by overwhelming it with a flood of useless or excessive traffic from multiple sources.
43
What is a firewall
This is a network security that controls incoming and outgoing network traffic based on a set of security rules.
44
What is an anti malware software
Anti-malware software is used to scan a computer system for harmful files which it then removes
45
How does an anti malware work ?
It does this by comparing the source code of a file with the source code of all known harmful files on their database
46
What are the protection stragtegies to prevent from malicious software
- Improve code quality ; write secure bug free codes as this reduces vulnerabilties may exploit Protection - Use of antivirus software scans Regular software updates Use of firewall to block unauthorised access.
47
What is a proxy server
Connecting to a server and then the server acts on your behalf of you by connecting to a LAN , hence there is no direct connections between the computer on the Lan and the internet
48
What is Packet Filtering
Examines each packet’s header information , and allows or blocks it according to rules
49
WHat is Stateful inspection
tracks the state of active connections and makes decisions based on the context of traffic, not just individual packets
50
What are internet registries
Manage the allocation of IP addresses and domain names globally and regionally . It ensures that each IP address is unique Domain names are unique and globally resolvable
51
52
What are symmetric keys encryption ( 4marks)
Both sender and receiver share a secret key. Sender uses the shared key to encrypt plaintext into ciphertext. Ciphertext is sent over the network.Receiver uses the same key to decrypt ciphertext back into plaintext.
53
What are asymmetric keys encryption
Each user has a key pair Sender uses the recipients public key to encrypt the message Encypted message is sent over the network Reciever uses thier private key to decrypt the messagr into plaintext
54
What is a digital service certificate also known as ?
SSL (Secure Socket Layer)
55
What is a digital service certificate and what does the file contain
This is used to ensure the authenticity of a sender showing they are genuine A serial number , the owners name An expiry date , the owners public key
56
What mode of encyrption does a digital Certificate Signature use and how is done (3 mrks )
They use asymmetric encryption .Sender can also sign a message with their private key. Receiver verifies signature using sender’s public key, ensuring authenticity and integrity
57
A message is to be sent from Computer A to Computer B Describe the steps that would be involved in producing a digital signature for the message before it is transmitted by Computer A.
Hash/digest produced/calculated from message contents // (shortened) value calculated from message; A. Message is hashed A. Message digest created N.E. Hash produced Hash encrypted; A’s private key is used for the hash encryption; N.E. Uses A’s private key Encrypted hash is known as the (digital) signature; (Digital) signature is appended to message; A. Encrypted hash for digital signature I. Description of encryption not related to digital signature
58
What is the application layer
This is the top layer - handles series of protocols such as FTP , HTTP, POP3 Provides network services directly to applications,
59
WHat is transport layer
layer 3 - They contain most of the configuration and coordination associated with the transmission . it ensures that all the packets have arrived and that there are no errors in the packets It also handles the way in which connections are made to create a path for data to travel between nodes e.g tcp
60
What is a port number
This is used to pass packets to the correct application in the application layer
61
What is network / internet layer
Responsible for addressing and routing packets across multiple networks It handles the creation and routing of packets being sent or received
62
What is a router and what its purpose
A device that forwards data packets between networks based on their destination IP Addresss . It directs packets along the most efficient roue to reach its target device .
63
What is the main components of a packets
Header -Contains control information, e.g., source IP, destination IP, sequence number, protocol Payload -The actual data being sent (message, file, or part of a file) Footer -May include error-checking information like checksums to detect corrupted packets
64
What is the link layer
This is layer 1 - ( the last) Physical interface with medium/ cable Conversion of IP datagrams to network frames Adds Ethernet Adds header
65
Role of Sockets in TCP(3marks)
A socket is a software endpoint that allows a program to communicate over a network using TCP . Allows multiple programs to communicate simultaneously over the network.
66
Role of MAC (3marks)
A MAC address is a unique identifier assigned to a network interface card (NIC) for communications on the local network. Ensures devices can be uniquely identified on a LAN. Used by the link layer to forward frames between devices
67
What is the full meaning of HTTP and HTTPS
This is an hypertext Transfer Protocol (Secure)
68
What is port forwarding
Port forwarding is a network technique where a router or firewall is configured to redirect traffic from a specific external port to a specific internal device and port on a private network.
69
Benefits of port forwarding
Provide Access to Internal Services: Makes devices like web servers, FTP servers, or game servers accessible from the Internet. Control Traffic: Only specific ports are exposed, improving security. Support NAT Networks: Works with NAT so that devices behind a private network can still be reached externally.
70
What is the role of https
This is a set of rules that govern how multimedia files are transmitted around the internet.
71
WHat is FTP and what its role
File transfer Protocol Used for transfer files between devices.
72
What can an FTP client software do
Application installed on a user’s device to connect to an FTP server. Can upload and download files.
73
What can an FTP server do
Stores files and responds to client requests. Manages user authentication and permissions
74
What is SMPT
Sending email between servers or from client to servers
75
What is the role of NAT
NAT (Network Address Translation) is a process where a router or firewall modifies the IP address information in packets as they pass between a private network and the Internet.
76
benefits of NAT
Conserves Public IP Addresses:Multiple devices on a private network can share a single public IP. Provides Security:Devices inside the private network are not directly visible on the Internet. Simplifies Network Management: Private IP addresses can be reused in different networks without conflict.
77
What is a non - routable IP Address
A non-routable IP address is a private IP address used within a local network and cannot be routed across the public Internet.
78
What is a routable Ip Adress and where it is used
A routable IP address is a public IP address that can be used on the Internet. It is globally unique and can be routed by Internet routers. it is used in web servers , email servers
79
What is DHCP
DHCP is a network protocol used to automatically assign IP addresses and other network configuration settings to devices on a network.
80
Advanatages of DHCP
Automatic IP configuration Reduces configuration errors Efficient management of IP addresses Allows devices to join networks easily
81
What is DNS
Resolving domain names to IP addresses
82
What is SSH and its role
Secure shell - Used for remote management of computers, allowing computers to be accessed and controlled remotely. -
83
Explain the difference between network identifier and a host identifier
Each computer in a network shares the same network identifier but has its own host identifier .
84
Explain one similarity and one difference between the Internet and an intranet
They both use the same protocols Uses same software to access two devices Internet publicly available , intranet only accessible within privately Internet use of public telecommunications network vs intranet may use private network;
85
Explain how the transport layer of the TCP/IP stack determines which application layer software on the server should deal with a received request.
The transport layer will use the port number to determine which server should deal with the request
86
What is an ip address
An IP address is a dotted quad number that identifies every computer that sends or receives data on a network and on the Internet.
87
What is a network address translation
The system that is used to match up the private IP addresses with the public ones
88
What is a subnet mask
is used to determine which part of an IP address represents the network identifier and which part represents the host identifier. The subnet mask works by matching bits with the IP address. 1s in the mask represent the network portion. 0s in the mask represent the host portion this is done by convertin gthe ip address and subnet mask to binary forms and perform operation add then convert it back to decimal
89
What is a sub net mask used for
Devices use this to determine: whether another device is on the same network whether the packet must be sent to a router to reach another network.
90
What is subnetting
Subnetting is the process of dividing a larger network into smaller networks called subnets. This helps improve network organisation, security, and efficiency by limiting traffic within smaller groups of devices.
91
What is an ipv 6 and what wwere the reasons for switching to ipv 6
Uses 128-bit addresses, written in hexadecimal and separated by colons.IPv6 was introduced mainly because IPv4 addresses were running out.It also has proved network efficiency and features such as automatic network configuration
92
What is ipv 4
Uses 32-bit addresses, written as four decimal numbers separated by dots. owing about 4.3 billion unique addresses. The rapid growth of the Internet, smartphones, and IoT devices has used most of these addresses.
93
What is a CSMA and what's its role
It is a carrier sense multiple access This was developed to enable various devices to transmit data at high speeds without interfering with each other. *When data is sent around networks, it is sent in frames with all frames being re-assembled at the receiving end. *Any device on a wireless network may attempt to send frames. Before each frame is sent, the device uses the CSMA/CA protocol to see whether the transmission medium is idle or whether another device is using it. *If the transmission medium is idle, the data is sent. If it is busy, the device will wait and try again later. *Each device will then wait a random amount of time before checking to see if the medium is free again so that it can send the data.
94
What is RTS / CTS
While CSMA/CA is effective at eliminating collisions in small networks, it cannot overcome hidden nodes: a problem that arises when the device checking for an idle channel cannot “see” some parts of the network on which communication may be occuring. To get around this issue, a protocol called RTS/CTS (Request To Send/Clear To Send) is used. This protocol adds an additional step into the CSMA process. Once the transmitting device has checked whether the channel is idle, it sends a “request to send” message to the server. If the server is indeed idle, it will respond with a “clear to send” message at which point the transmitting device can begin communication with the server. If no “clear to send” message is received, the server is busy communicating with a hidden node and the transmitting device must wait before starting the CSMA process again.
95
What is a thin client
This is a computer that depends heavily on a more powerful server to fulfil most of its requirements and processing
96
What is a thick client
A client device that performs most processing locally. Application relies on the device itsef
97
Pros and Cons of a Thick Server
Reduced pressure on the server , leading to more uptime Fewer servers and lower bandwidth can be used Clients can store programs and data locally, giving them more control . Reduced security if clients can download software or access the internet remotely More difficult to manage and update a new hardware and software need installing on each client machine
98
Difference between JSON vs XML
JSON Very easy to read as it is based on defining objects and value s Less is code is created than XML Easier to create as the syntax of the coding is easier It is not sufficient for all applications XML Slightly less easy to read as data is contained with markup tags More code required than JSON Slowe than JSON Similar to programming so therefore more knowledge is required More flexibile for all application
99
Explain the process the transmitting device will go through to transmit data and what the receiving device would then do when it receives data in majority voting
The transmitter would send each bit an odd number of times The receiver checks the bits received and if they are not all the same it assumes the one it received the most copies of is the correct value
100
Explain the process the transmitting device will go through to transmit data and what the receiving device would then do when it receives data. Carrier Sense Multiple Access with Collision Avoidance (CSMA / CA) with Request to Send / Clear to Send (RTS / CTS) ( You have to learn them ( 8 Lines )
Transmitting device checks for traffic; *   If (data) signal present/another transmission is in progress, then the transmitter continues to wait; *   If the channel is detected as idle, the transmitter would send a request to send (RTS); Receiver responds (to RTS) with a Clear to Send (CTS) signal *   If CTS is not received, the transmitter would wait a random amount of time/until the end of the transmission before resending the RTS; *   When CTS is received, the transmitter begins transmitting data; *   Receiver sends acknowledgement (ACK) (if all data is received); *   If no ACK received then data is resent;
101
Differemce between a star and bus topology
Star topology connects devices to a central hub/switch, offering easier fault isolation and scalability but higher cost; Bus topology connects all devices to a single backbone cable, using less cable and simpler setup but failing entirely if the backbone breaks.
102
What extra hardware is needed for each stand-alone computer to be connected to a LAN via cables?
Network adapter/network (interface) card/Ethernet card;
103
Why is a protocol needed?
To ensure successful communication between different computers
104
Explain why a server-based network is likely to be more appropriate than a peer-to-peer network
System will be storing confidential data (that must be kept securely / safely); improved security management administration will be easier;
105
Explain what the checksum is used for
To check if the contents of the packet/data have been corrupted/changed (during transmission)
106
What is the defintion of a URL
it is the address of a resources on the ineternet specofyonh the protocl , domain name and optional file. Allows browsers and applications to locate and retrieve resources from the Internet.
107
Features of JSON
Easier human readability more compact size Faster / easier for computers to parse Simpler creation
108
What is REST
REST allows JavaScript in the browser to communicate with the server using HTTP methods. Create- POST Retrieve- GET Update- PUT Delete- DELETE
109
What is a client server model
In a client-server model, a client sends a request to a server, and the server responds with a reply. The server provides services or resources, while the client requests them.Clients are typically browsers, apps, or programs. Servers host resources like web pages, databases, or files
110
What is a websocket protocol and example
A WebSocket is a protocol that establishes a persistent, full-duplex connection between a browser and server over TCP used in online gaming and live chats
111
Difference between a network identifier and a host identifier
Network Identifier (Network ID): Identifies the specific network a device belongs to. All devices on the same network share this part. Host Identifier (Host ID): Identifies the specific device on that network. Must be unique within that network.