Communication & Networking - A Level Comp Sci

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/103

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

104 Terms

1
New cards

What are the 2 main types of data transmission?

  • Serial

  • Parallel

2
New cards

How does serial transmission work? (+ what distances is it best for?)

Data is sent 1 bit at a time along 1 wire

  • best for medium/long distance

3
New cards

How does parallel transmission work? (+ what distances is it best for?

Multiple bits are sent simultaneously across multiple wires

  • Short distance - generally less than 5 metres

4
New cards

What is data skew in parallel transmission? (+why does it occur?)

The time delay between data from different wires reaching the receiver in parallel transmission

  • due to slightly differing electrical properties between each wire/medium

5
New cards

Why is serial better than parallel transmission? (4 reasons)

  1. No data skew (only 1 wire) - more reliable

  2. Cheaper to install (only 1 wire, less complex)

  3. Less interference between wires (crosstalk) with use of shielded cables

  4. Lower power consumption

6
New cards

What is synchronous transmission? (+ serial or parallel?)

Mostly parallel data transmission; can be serial

  • data is sent at regular intervals using a clock signal shared between transmitter & receiver

7
New cards

When & where is synchronous data transmission used?

  • Where? In control bus of a CPU

  • When? during the fetch-execute cycle

8
New cards

What is asynchronous data transmission?

A method of serial data transmission;

  • Data is sent without a clock signal, so transmitted when it’s ready

  • Involves the use of start, stop & parity bits for tracking data and error checking

9
New cards

When & where does asynchronous transmission occur?

  • When? For small intermittently-sent data

  • Where? In the computer’s communication ports for connecting peripherals

10
New cards

What is the purpose of a start bit in asynchronous transmission?

Signals the beginning of data packet/byte to the reciever’s clock

11
New cards

What is the purpose of a stop bit in asynchronous transmission?

Signals the end of a data packet/byte for the receiver to process the received data

12
New cards

What is latency (in computer communication)?

Time delay between when an instruction is transmitted and when it’s received

13
New cards

What is latency measured in?

milliseconds (ms)

14
New cards

What is bit rate?

Number of bits transmitted over a communication medium in 1 second

15
New cards

What is baud rate?

Number of distinct signal changes/symbols transmitted over a communication channel per second

16
New cards

What is bandwidth?

Maximum range of frequencies / rate of data transfer over a communication channel

17
New cards

What is bandwidth measured in?

bits per second (bps)

18
New cards

What is the relationship between bandwidth and bit rate?

  • It is directly proportional

  • Higher bandwidth = higher bit rate

19
New cards

In what circumstances is the baud rate NOT equal to the bit rate?

When each symbol is encoded with more than 1 bit - bit rate will be higher

20
New cards

How does odd parity work in asynchronous data transmission?

Parity bit = 1 when number of 1s is odd (otherwise is 0)

21
New cards

How does even parity work in asynchronous data transmission?

Parity bit = 1 when number of 1s is even (otherwise is 0)

22
New cards

What is a network topology?

The physical and logical arrangement of devices & its connections in a network

23
New cards

What is the order of devices that data arrives at in home networking?

  1. Modem

  2. Router

  3. Switch

  4. W.A.P (wireless access point)

24
New cards

What is the purpose of the Modem in home networking?

Device that:

  • Recieves the internet signal from the ISP (internet service provider)

  • Converts it into a format suited for home network

25
New cards

What is the purpose of the Router in home networking?

Device that:

  • Receives data from the Modem & manages network traffic (incl the internet)

  • Uses IP addresses to determine data travel across networks

26
New cards

What is the purpose of the Switch in home networking?

Device that:

  • Connects devices within same network & forwards data packets to correct device using MAC (media access control) addresses

27
New cards

What is the purpose of the W.A.P (wireless access point) in home networking?

Device that:

  • Allows wireless devices to connect to network by receiving & transmitting data signals via radio waves

28
New cards

What are the 3 main types of network topology?

Bus, Star, Ring

29
New cards

What are the pros of using a ring topology?

  • Cheap to expand & add new devices

  • Fast data travel - only 1 direction

  • No reliance on central device/hub

30
New cards

What are the cons of using a ring topology?

  • Slows down with lots of devices (as data moves in 1 direction only)

  • If 1 computer in topology fails, entire network fails

31
New cards

What is a NIC (network interface card)?

A hardware component that allows a computer to connect to a network, whether wired or wireless

32
New cards

What is a physical network topology?

The physical architecture of the connections in a computer system

33
New cards

What is the most common type of physical network topology?

Physical STAR topology

34
New cards

What is a logical network topology?

How data packets flow within a network, irrespective of physical arrangement

35
New cards

How can a physical star topology behave as a logical bus topology?

  • A bus protocol is run on the hub for it to distribute packets to all connected devices in a network

36
New cards

When are star topologies most commonly used?

  • Home networks

  • Schools

  • Small businesses

37
New cards

What is the issue with using a star topology both physically and logically?

The Ethernet Protocol is only designed to work on a bus topology

38
New cards

What is a server? (In a client-server network)

A specialised computer that manages resources & provides functionality to clients within a network

39
New cards

What is a client? (In a client-server network)

A computer that requests the services/resources provided by a server

40
New cards

What are the main features of a client-server network? (Management, storage, suitability)

  • Central server manages security

  • Performs some processing tasks

  • Suitable for any size organisation or network that requires centralised management

41
New cards

What are 2 pros of client-server networks?

Pros:

  • Easy centralised management - increased reliability

  • Easy to add new clients

42
New cards

What are 2 cons of client-server networking?

  • Dependency on central server - entire network fails if it fails

  • Expensive to set up and maintain - requires specialist management

43
New cards

What are the 4 main features of peer-to-peer networking?

  • No centralised management of files or security

  • Easy communication between computers w/o a central server

  • Each peer has equal status in the network

  • Most suitable for homes, small businesses, live streaming

44
New cards

What are 2 pros of peer-to-peer networking?

Pros:

  • Cheaper set up & maintenance than client-server

  • No dependency on central server

45
New cards

What is a con of peer-to-peer networking?

  • Data/files from a computer can’t be accessed by peers if computer is off

46
New cards

What is Wi-Fi?

= A type of WLAN & a family of protocols based on international standards

47
New cards

What 2 components are needed for wireless networking? (+ what is their purpose?)

  • Wireless access point (converts wired signals from router into Wi-Fi signals)

  • Wireless network adapter (allows wired device to send & recieve Wi-Fi signals)

48
New cards

How does WPA/WPA2 encryption secure wireless networks?

Encrypts wireless traffic & requires user to enter password/credentials to gain access

49
New cards

How does disabling Service Set Identifier (SSID) secure wireless networks?

SSID is not displayed so user must manually enter network name to access network

50
New cards

How does MAC address filtering secure wireless networks?

Whitelist created so only users with authorised MAC address can access network

51
New cards

What are 3 methods of securing wireless networks?

  • WPA/WPA2 encryption

  • Service Set Identifier (SSID) disabled

  • MAC address filtering

52
New cards

What is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)?

= A protocol used in wireless networks to avoid data collisions when multiple devices communicate simultaneously

53
New cards

How does CSMA/CA work? (Explain the steps)

  1. When ready to transmit, device listens to communication channel to check its idle

  2. If idle, device waits for a back off period (random amount of time), then data is transmitted

  3. If busy, device waits for another back off period & checks channel again (repeats until idle)

  4. Data is transmitted

54
New cards

What is Request To Send / Clear To Send (RTS/CTS)?

= A protocol used in addition to CSMA/CA to get around the hidden node problem

55
New cards

How does RTS/CTS work?

  1. After device has checked whether channel is idle, a “Request to Send” message is sent to the server

  2. If server is idle, it responds with “Clear to Send” message & data is transmitted

  3. If “Clear to Send” message is not received, then server is communicating with hidden node & CSMA process restarts

56
New cards

What is a potential problem of using CSMA/CA without RTS/CTS?

Risk of the hidden node problem = when 2 nodes in a wireless network can’t connect with each other, but can connect with a 3rd node (eg an access point)

  • May lead to a collision & corrupted data

<p>Risk of the <strong>hidden node problem </strong>= when 2 nodes in a wireless network can’t connect with each other, but can connect with a 3rd node (eg an access point)</p><ul><li><p>May lead to a collision &amp; corrupted data</p></li></ul><p></p>
57
New cards

What is a Service Set Identifier?

= a unique identifier that allows devices to connect to a Wi-Fi network

58
New cards

What is the Internet?

= A global WAN of interconnected computer networks that uses an end-to-end communication (TCP/IP)

59
New cards

What is the World Wide Web?

= A interconnected system of public web pages accessible via the Internet

60
New cards

What protocol is used to transfer resources on the internet?

Hypertext Transfer Protocol (HTTP)

61
New cards

What is an Internet Service Provider?

= A company/3rd party that provides its customers with access to the Internet

62
New cards

What is a packet?

= A container in which data is transmitted over a network

63
New cards
  1. What is packet switching? (+ how it works) *

= Process of transferring data over a network by sending it in packets

  1. Data is split into packets, sent via best possible route, and reassembled into order when received

  2. Data is passed through routers (each pass = a hop), that use recipient address to determine where to send it

64
New cards

What are the 5 main components of a packet?

  1. Sender’s address

  2. Recipient’s address

  3. Packet contents

  4. Time To Live (TTL): number of hops packet can do until being dropped

  5. Sequence number: contains number of packets in a message + a packet’s position compared to the others

65
New cards

What is a packet’s Time To Live (TTL)?

= Number of hops a packet can do until being dropped

66
New cards

What is the purpose of a sequence number in a packet?

  • Allows packets to be reassembled in the correct way order

  • Missing packets can be identified

67
New cards

What does a router & gateway both do?

= Directs packets being transmitted across networks towards their destinations

68
New cards

How are gateways used for 2 networks with different protocols?

  • Gateway strips away packet details (except packet contents)

  • New sender & recipient addresses are given to packet to comply with new protocol

69
New cards
70
New cards

What is a Uniform Resource Locator (URL)?

= A unique text-based address of a file/resource on the internet

71
New cards

What is a Fully Qualified Domain Name (FQDN)?

= The complete unique address that specifies an exact resource

(Contains: host name, domain name, top level domain

72
New cards

What is a domain name?

= The part of a URL that locates a domain on the internet

73
New cards

What is the purpose of a domain name server?

Stores domain names and their corresponding IP addresses

74
New cards

What is an IP address?

= A unique numerical address assigned to a device using Internet Protocol to identify its host & location

75
New cards

How are domain names organised? (Outline the DNS System hierarchy)

  1. Root server

  2. Top Level Domains (TLD)

  3. Second Level Domains (2LD)

  4. Subdomains

  5. Hosts

76
New cards

What is the purpose of the Root Name Server?

Directing DNS queries to the right TLD server during the DNS lookup process

77
New cards

78
New cards

Explain the DNS lookup process

  1. User enters URL & browser checks its local cache for the IP address (if there, process stops)

  2. If not there, DNS query is sent to a DNS server (normally the ISP) to get the IP address

  3. Recursive resolver checks its cache to find IP address & starts recursive process if not there

  4. Resolver sends query to root server & it directs the resolver to the right TLD server

  5. TLD server tells resolver address of the authoritative name server

  6. Authoritative name server responds to resolver with final IP address

  7. IP address is sent back to browser & user can connect to the web server

79
New cards

What is a Recursive Resolver?

= A server that translates a human-readable domain name into its corresponding IP address

80
New cards

What is an Internet Registry? (+ their purpose)

= An organisation responsible for allocating IP adresses within a geographical area

81
New cards

What is encryption?

= The encoding & scrambling of data using a key so it cannot be intercepted/understood

82
New cards

What is are the 2 types of encryption?

  • Symmetric encryption

  • Asymmetric encryption

83
New cards

How does symmetric encryption work?

  • Both sender & receiver share the same private key that is used for both encryption and decryption

  1. Sender encrypts data with the shared key

  2. Key is exchanged/shared to recipient over a network

  3. Recipient uses key to decrypt message

84
New cards

What is the main drawback of symmetric encryption?

  • Security risk: is key is intercepted when exchanged over a network → encryption is broken

85
New cards

How does asymmetric encryption work?

  • 2 pairs of mathematically linked keys are generated

    • 2 pairs of keys; sender & recipient each have public and private key

  1. Sender encrypts message with recipient’s public key, available to anyone

  2. Message can only be decrypted with recipient’s private key

86
New cards

What is a digital signature used for?

Verifies the sender of the message + checks it hasn’t been tampered with during transmissions

87
New cards

How is a digital signature made?

  1. A digest of the message is created (a unique value) often by hashing/checksum algorithm

  2. Digest encrypted using sender’s private key & appended onto message (anyone with sender public key can

  3. Appended message is encrypted using recipient’s public key (only recipient can decrypt)

To decrypt it fully: recipient private key → sender’s public key

88
New cards

What is a digital certificate & its purpose?

An electronic document that proved ownership of a key pair used in asymmetric encryption

  • checks that fake key isn’t used by an imposter

89
New cards

What does a digital certificate contain?

  • Serial number

  • Owner number

  • Expiry date

  • Owner public key

  • Certificate authority’s signature

90
New cards

What is a firewall?

A security checkpoint software/hardware that:

  • monitors network/packet traffic

  • prevents unauthorised user access to a network

91
New cards

What are the 3 main types of firewalls?x

  • Packet filtering

  • Proxy servers

  • Stateful inspection

92
New cards

How does a packet filtering firewall work?

  • Inspects the header of a packet & accepts and blocks it based on set of filters:

    • Its source IP address, destination IP address, port numbers, and protocol type

93
New cards

How does a stateful inspection firewall work?

Internal contents of the packet are scanned + compares it to a state table (a log of all active connections) to check if it:

  • Belongs to a legitimate, existing connection

  • Is not part of an existing malware database

If yes, packet is allowed through

94
New cards

What is a proxy server?

= An separate intermediate device between a user and a remote web server that traffic must pass through

95
New cards

How does a proxy server firewall work?

It uses its own IP address instead of the user’s one when receiving requests

  • Privacy/security measure against threats

96
New cards

What is a worm?

= A type of malware that can self-replicate and spread across networks independently without user interaction

97
New cards

What type of vulnerabilities do worms exploit?

  • Network flaws

  • Unpatched systems

98
New cards

What is a Trojan horse?

= A type of malware that disguised as a benign file, often via email attachments & malicious website downloads

99
New cards

What type of vulnerabilities do Trojan horses exploit?

Ignorant user trust via social engineering

100
New cards

What is a virus?

= A type of malware that requires a host program/file to spread & corrupt a system