Computer Science Chapter 4.9 - Fundamentals of communication and networking

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/94

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Serial Data Transmission

Single bits are sent one after another along a single wire.

2
New cards

Parallel Data Transmission

Multiple bits are sent down several wires simultaneously.

3
New cards

What happens when data skew occurs?

bits sent together may not be received together

4
New cards

Bandwidth

the range of signal frequencies that may be transmitted.

5
New cards

Baud rate

The rate at which signals on a wire may change.

6
New cards

Bit rate

The number of bits transmitted per second.

7
New cards

Latency

Time delay between the moment something is initiated and the moment the effect begins

8
New cards

Crosstalk

unwanted transfer of signals between communication channels

9
New cards

Synchronous data transmission

a clock signal is used to time when signals are sent.

10
New cards

Asynchronous data transmission

sender and receiver have separate clocks which are not kept synchronised - a start bit is used to signal the arrival of data and to synchronise the transmitter and receiver temporarily

11
New cards

Advantages of a network (5)

  • Sharing resources such as printers makes it cheaper

  • site licenses are likely to be cheaper than several standalone

  • files can be shared easily

  • work can be easily accessed using any computer on the network

  • data is easy to backup as all the data is stored on the server

12
New cards

Disadvantages of a network (4)

  • Purchasing the network cabling and file servers can be expensive

  • Managing a large network is complicated - requires training and usually a network manager

  • if the file server breaks down the files on the file server become inaccessible

  • viruses can spread to other computers throughout a computer screen

13
New cards

Advantages of wired networks (4)

  • reliable

  • faster (than wireless)

  • more secure

  • can extend further easier

14
New cards

Disadvantages of wired networks (3)

  • can be expensive

  • less flexible (cannot easily move devices)

  • trip hazards

15
New cards

Advantages of wireless networks (3)

  • cheaper

  • very flexible

  • no trip hazards

16
New cards

Disadvantages of wireless networks

  • not always reliable

  • slower

  • less secure

  • don’t extend very far

17
New cards

Where are Ethernet cables usually used for

You will usually find them in buildings - they connect the school computers together and are widely used in businesses

18
New cards

Where/What are fibre optic and copper cables used (for)

usually used to join together houses, businesses and other locations externally

19
New cards

What do copper cables use to work

electrical signals travelling along the wire (sometimes slow)

20
New cards

What do fibre optic cables use to work

Fibre optic cables use light to transmit data, and light moves at the speed of light! So these cables are a lot faster (than copper cables)

21
New cards

What does PAN, LAN and WAN stand for?

  • Personal area network

  • Local area network

  • Wide area network

22
New cards

LAN

when computers or devices are connected together over a single geographical area, such as within a home, a building or one site. (eg. the school/home)

23
New cards

WAN

when computers or devices are connected together over multiple geographical areas. (eg. the internet)

24
New cards

PAN

network on a very small scale. (eg. Bluetooth)

25
New cards

What are the 4 components that allow you to access the internet

The modem, the router, the switch, the WAP (Wireless access point)

26
New cards

What does the modem do?

Connects the device to the internet through a phone line

27
New cards

What does the router do?

A router is a networking device that forwards data packets between computer networks

28
New cards

What does the switch do?

Allows you to connect multiple devices to the router

29
New cards

What does the WAP do?

Lets your wireless devices connect to the network

30
New cards

Whats the purpose of a stop bit?

ensures that the receiver has time to process each byte before receiving the next one

31
New cards

Whats the purpose of a start bit?

temporarily synchronises the clocks in both the receiver and the transmitter

32
New cards

Advantages of a bus topology

  • Cheap as it uses the least amount of cable

  • Adding another computer is easily done

33
New cards

Disadvantages of a bus topology

  • Slow with many computers (has to check with every computer)

  • If the backbone breaks the whole system breaks

34
New cards

Advantages of a ring topology

  • Cheap to expand

  • Does not rely on a central hub

35
New cards

Disadvantages of a ring topolgy

  • slow if a lot of computers are on the system

  • If one computer breaks the whole network breaks

36
New cards

Advantages of a star topology

  • If a cable fails it only affects one computer

  • Computers can be easily added

37
New cards

Disadvantages of a star topology

  • more cabling needed

  • fail if the centre hub fails 

38
New cards

Topology definition

The structure of the connections that connect devices to the network.

39
New cards

Physical topology definition

The physical layout of the cabling between the devices on the network

40
New cards

Logical topology definition

How the data flows around a network

41
New cards

How does a logical bus topology work

The network will physically be set up in one way however it will logically operate like a bus topology. Using a bus protocol meaning it will check with each computer if the packet is meant for it like a bus topology

42
New cards

Client server definition

A system in which some computers (the clients), request services provided by other computers, the servers

43
New cards

Peer-to-peer network definition

A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers

44
New cards

Server definition

A computer that provides shared resources to network users

45
New cards

3 examples of servers

  • file server

  • mail server

  • database server

46
New cards

3 examples where peer-to-peer networks are used

  • file sharing

  • online gaming

  • streaming media

47
New cards

3 examples where client servers are used

  • the internet

  • in businesses (file servers, database etc)

  • cloud services

48
New cards

What is Wi-Fi

A family of related protocols that define how devices should communicate over wireless connections (WLAN)

49
New cards

What does Wi-Fi allow you to do

Allows you to create a WLAN thats based on internation standards

50
New cards

What two (extra) components required for wireless networking (compared to wired)

  • wireless network adaptor

  • wireless access point

51
New cards

Whats a wireless network adaptor

a piece of hardware, such as a device or a card installed inside a computer, that allows a device to connect to a wireless network (like a Wi-Fi network) or the internet without using an Ethernet cable

52
New cards

What are the 3 ways to make wireless networks more secure

  • Disabling SSID broadcast - means that in order to connect to the network you must already know the name of the network (SSID)

  • MAC address whitelist - You can filter out unwanted devices

  • Encryption (WPA,WPA2)

53
New cards

 What is the SSID

The service set identifier - a unique ID that consists of up to 32 characters and is used for naming wireless networks

54
New cards

Whats the MAC address

Media access control - Used to uniquely identify pieces of hardware

55
New cards

Whats the advantages of a client-server network over a peer-to-peer network?

  • The server computer can manage security

  • Files can be stored on the server - accessed at all times even when computers are off

  • processing some tasks can be performed on servers instead of having to purchase more powerful computers

56
New cards

What does CSMA/CA stand for?

Carrier sense multiple access 

57
New cards

How does CSMA/CA work?

It allows a computer to listen out for transmissions - and if it hears one it waits. Then it checks again after some time and if it doesn’t hear anything it’ll wait a random short amount of time before sending the data over

58
New cards

What does RTS stand for?

Request to send

59
New cards

What does CTS stand for?

Clear to send

60
New cards

What does RTS and CTS do?

RTS - when the computer sends an RTS signal it is telling the WAP it is ‘ready to send’ data 

Then the WAP temporarily stops all over transmissions 

CTS - The WAP sends a CTS signal to the computer telling it that the network is clear then the computer sends over the data 

61
New cards

What is the internet?

A network of interconnected computer networks

62
New cards

What do internet service providers (ISPs) do?

Companies that provide their customers with access to the internet. National internet service providers provide internet access to smaller regional and local ISPs from whom homes and businesses can buy from

63
New cards

What happens in packet switching?

Data is split up into packets and transmitted over networks through routers. Routers send to the recipient via the fastest route → routers hold tables with information relating to the fastest routes to certain devices which are frequently updated

64
New cards

What is TTL?

Time to live → each packet can only pass through a finite number of routers/only perform a finite number of hops. When a packets TTL expires the packet is said to be dropped meaning it is deleted. The recipient will notice a missing packet and request that the sender transmits the missing packet again

65
New cards

What are the 5 main parts of a packet?

Senders address, Receivers address, Packet contents, TTL, Sequence number

66
New cards

What do gateways do?

Where two networks use different protocols packets must be modified so as to conform to both protocols. Gateways strip away most of the packet details leaving just the packet contents. The gateway will then give packets new sender and receiver addresses which comply to the new protocol 

67
New cards

What does URL stand for?

Uniform resource locator

68
New cards

Why are domain names used?

As humans cannot understand IP addresses so domain names are used as we can understand them

69
New cards

How does a domain name server system work?

Each domain name has a direct relationship with an IP address. A domain name server stores a table of domain names and their corresponding IP address.

70
New cards

What happens when a domain name isn’t found in a DNS server?

The request will be passed onto another DNS -> some very small and rarely visited websites will require numerous changes of servers before a record can be found. Makes these websites slower to access

71
New cards

What does an internet registry do?

They assign IP addresses to devices. There are only 5 internet registries in operation (each for a different geographical area). They will look for an unused previously allocated IP address which can then be reused instead of creating a new one 

72
New cards

What do firewalls do?

They sit in between a device and the internet and regulates the packets that pass through it. 

73
New cards

Whats packet filtering?

Firewalls use packet filtering to accept and block packets on their source IP address or the protocol that they are using. A networks administrator can specify particular IP addresses or protocols to block or use automatic filtering software that can block suspicious packets 

74
New cards

Whats stateful inspection?

It actually examines the contents of a packet before deciding whether to allow it through the firewall. some firewalls keep a record of current connections in a network allowing them to filter out packets that aren’t related to activity on the network. 

75
New cards

Whats the hierarchy structure in DNS systems?

Each server tells the resolver how to resolve the next level down. The root server tells the resolver where to find the TLD server which then tell the resolver where to find the authoritative name server.   

76
New cards

Whats a proxy server?

A server that sits in between a public network and a private network. When a device in a private network sends a packet through a firewall and into a public network the packets sender address is that of the firewall rather than the devices private IP address. IP addresses on a LAN are generally not route able to the internet (as all IPs on internet must be unique) → also provides anonymity 

77
New cards

Whats symmetric encryption?

Both the sender and the receiver share the same private key. This key is used to both encrypt and de-crypt data. If the key is exchanged over a network it is vulnerable to interception

78
New cards

Whats asymmetric encryption?

When both person A and B have a pair of keys - one public and private. They encrypt messages for each other using the other persons public key and decrypt using their own private key.

79
New cards

How does caeser cipher work?

Things are encrypted by shifting the letters either clockwise or anti-clockwise along the alphabet

80
New cards

Whats a one time pad cipher?

It is a completely random one time use key used to encrypt data

81
New cards

What are the 4 rules needed for a one time pad to work securely?

  • It must be the same length or longer than the plaintext message 

  • It must be completely random

  • It must be destroyed after being used

  • it must be kept securely 

82
New cards

How does Vernam cipher work?

A key is created the same length or longer than the plaintext. Each letter in both the key and message are turned into binary (usually using ASCII) and then the XOR is performed to create a new binary number. All the numbers are then turned back into letters to create a new string of encrypted letters 

83
New cards

What are digital signatures?

Can be used to verify that the sender is who they said they are and also that the message hasn’t been tampered with during transmission

84
New cards

How does it work?

  • A hash function is performed on the plaintext message to create a message digest

  • Person A uses their private key to encrypt this message digest which creates the digital signature

  • this digital signature is attached to the end of the plaintext message and it is all encrypted using person B’s public key

  • When person B recives the message they use their private key to decrypt the whole message with their private key

  • They then extract the digital signature. then they take the plaintext message they recieved and use a hash function on it

  • They then use this regenerated message digest to compare it to the one sent in the message 

  • If they match that means that the message came from the right sender and that it hasn’t been tampered with 

85
New cards

Whats a digital certificate? 

It verify’s ownership of a key pair (in this circumstance) and can be used to check that a fake key isn’t being used by an imposter. Issued by a certificate authority → they contain → A serial number, the owner name, an expiry date, the owners public key and the certificate authority’s digital signature

86
New cards

What are worms?

They are self-replicating pieces of malware that can move between computers either within a network of by users downloading and running a malicious file 

87
New cards

Whats a trojan?

A type of malware that is disguised as a benign file that users can be tricked into opening. These are often spread as email attachments or downloaded from malicious websites 

88
New cards

Whats a virus?

They require a host file in which to reside. These files are typically executable files meaning they can lie dormant in a computer until their host file is opened or run 

89
New cards

How are some ways to prevent malware?

  • malware often exploits bugs in code → good quality code is an important factor in preventing malware

  • installing antivirus software → specialist pieces of software that scan the files on a computer and remove suspicious files

  • employees can be trained about the risks of opening suspicious email attachments in order to reduce the ris

90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards