Fundamentals of Communication and Networking

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

What does TCP/IP stand for?

1 / 94

flashcard set

Earn XP

95 Terms

1

What does TCP/IP stand for?

Transmission Control Protocol / Internet Protocol

New cards
2

What does MAC stand for?

Media Access Control

New cards
3

What are the main 4 network layers?

  • Application

  • Transport

  • Network

  • Link

ATNL A TuNneL

New cards
4

What does FTP stand for?

FTP — (File Transfer Protocol)

<p>FTP — (File Transfer Protocol)</p>
New cards
5

What does HTTP/S stand for?

HTTP/S — (Hyper Text Transfer Protocol / Secure)

<p>HTTP/S — (Hyper Text Transfer Protocol / Secure)</p>
New cards
6

What does POP3 stand for?

POP3 — (Post Office Protocol v3)

<p>POP3 — (Post Office Protocol v3)</p>
New cards
7

What does SMTP stand for?

SMTP — (Simple Mail Transfer Protocol)

<p>SMTP — (Simple Mail Transfer Protocol)</p>
New cards
8

What does SSH stand for?

SSH — (Secure Shell)

(Allows for Secure Shell Tunnelling Port)

<p>SSH — (Secure Shell)</p><p>(Allows for Secure Shell Tunnelling Port)</p>
New cards
9

What does DHCP stand for?

DHCP — (Dynamic Host Configuration Protocol)

New cards
10

What does NAT stand for?

Network Address Translation

New cards
11

What does CRUD stand for?

Create, Retrieve, Update, Delete

New cards
12

What does REST do?

Allows for CRUD to become available for database mapping functions.

<p>Allows for CRUD to become available for database mapping functions.</p>
New cards
13

What does the Application layer do?

The Application layer somewhat being featured in the name is responsible for selection and use of correct protocols like using right protocols for User interacted application software.

<p>The Application layer somewhat being featured in the name is responsible for selection and use of correct protocols like using right protocols for User interacted application software.</p>
New cards
14

What does the Transport layer do?

The Transport layer establishes Transport funny enough technically making a virtual path and e2e encryption like featured on whatsapp.

in addition of course what’s required for networking is not one massive payload but instead all of the possible millions of packets to be sent according to the size for the data to be transmitted.

<p>The Transport layer establishes Transport funny enough technically making a virtual path and e2e encryption like featured on whatsapp.</p><p>in addition of course what’s required for networking is not one massive payload but instead all of the possible millions of packets to be sent according to the size for the data to be transmitted.</p>
New cards
15

What does the Network layer do?

The Network layer simply is what allows for networking being the provider which assigns the correct IP address to each packet source and destination.

Routers work in Unison here in order to accomplish successful sending to set destinations.

<p>The Network layer simply is what allows for networking being the provider which assigns the correct IP address to each packet source and destination.</p><p>Routers work in Unison here in order to accomplish successful sending to set destinations.</p>
New cards
16

What does the Link layer do?

Finally the link layer once again does exactly as described making the physical link between pieces of hardware then to the network.

This adds the personal MAC to the packets received to the network layer and for security each hop changes to the then brand new corresponding MAC address.

New cards
17

What happens once the user receives their data?

  1. The packet gets stripped of extra detail

  2. link layer removes MAC of course to add the new one

  3. Network removes IP for security

  4. Transport then uses packet port to see correct port to send through and packet number to see if in the correct order.

  5. Finally application layer shows user their requested data.

New cards
18

What is a socket address?

An IP combined with a port number.

Example :

Socket Address : 114.26.20.199:443
IP : 114.26.20.199
Port : 443

New cards
19

What does a Socket Address do?

Identifies what application the packet should get sent to.

New cards
20

What ports do FTP use?

20&21

New cards
21

What port does SSH use?

22

New cards
22

What port does HTTP use?

80

New cards
23

What port does HTTPS use?

443

New cards
24

What port does POP3 use?

110&995

New cards
25

What port does SMTP use?

25&587&465

New cards
26

What are the 2 parts of an IP Address?

  • Network Identifier

  • Host Identifier

New cards
27

What are subnets?

Subnets are broken down networks with the requirement that different network identifiers are used.

New cards
28

How do you find the network identifier?

Through use of the subnet mask.

<p>Through use of the subnet mask.</p>
New cards
29

What is the link between Binary and subnets?

They’re similar in the fact that floating point has the choice between Size of precision and this is featured also with subnet IPs where you can either have more networks or more hosts/users.

New cards
30

What are the 2 types of IPs?

  • IPv4

  • IPv6

(Internet Protocol version 4/6)

New cards
31

What is the difference between IPv4 and IPv6?

The difference between them relates to overall size of IPs that can be stored/used with IPv4 storing over 4 billion while IPV6 is able to use 10^ 37.

This being a requirement because there are 8 billion people on the planet meaning IPv4 is not enough.

New cards
32

How does DHCP work?

For example if a Device turns on but then is forgotten their assigned IP would be wasted making it so that Devices once they leave they lose their IP adding it to a pool of available IPs to be granted to whoever requires. Dynamic IPs

New cards
33

How can a private IP access the internet when its IP is not accessible?

Through the use of a NAT as with a Network Address Translation somewhat like a Hash Table it will store them both separately and technically assign the private IP a public one of which it will remember the conversion for when the time comes to receive the output.

New cards
34

What is port forwarding?

Port forwarding is used when a client is attempting to communicate with a server that is connect to a private network.

Similar to the problem that NAT fixes instead with Port Forwarding it works on a larger level allowing for entire client to gain access to the private network.

New cards
35

What does API stand for?

Application Programming Interface

New cards
36

What is an API?

A set of protocols which handle how different apps talk with each other.

The WebSocket protocol is an example.

New cards
37

What does it mean if a WebSocket protocol is full-duplex?

Means that data can be transmitted in both directions simultaneously.

New cards
38

What does REST stand for?

REpresentational State Transfer

New cards
39

What does XML stand for?

eXtensible Markup Language

New cards
40

What does JSON stand for?

JavaScript Object Notation

New cards
41

What is the difference between XML and JSON?

They are both simply styles of writing HTML with each to their benefit.

New cards
42

What is the difference between Thin and Thick-client networks?

Thin-client networks and thick-client networks are somewhat described in their name with thin-clients stating that they’re pretty thin and don’t really have that much too them being pretty simple and cheap with the main server handling pretty much everything compared to the thick-clients where they’re pretty well supplied and can overall handling everything theirself.

New cards
43

What does URL stand for?

Uniform Resource Locator

New cards
44

What does FQDN stand for?

Fully Qualified Domain Name

New cards
45

What does DNS stand for?

Domain Name Server

New cards
46

What does ISP stand for?

Internet Service Provider

New cards
47

What does TTL stand for?

Time-To Live

New cards
48

What are key 5 parts of a packet?

  • Sender Address

  • Receiver Address

  • Packet Contents

  • TTL

  • Sequence Number

<ul><li><p>Sender Address</p></li><li><p>Receiver Address</p></li><li><p>Packet Contents</p></li><li><p>TTL</p></li><li><p>Sequence Number</p></li></ul>
New cards
49

What does hop mean in networking?

It refers to that every time a packet has been passed through a router it counts as a hop which has a limit for security reason designated within each packet.

New cards
50

What is the difference between Routers and Gateways?

Routers working on a smaller level compared to gateways where routers connect computers together and gateways connect entire networks together and one of the possible features of a gateway is to be able to change protocols of packets.

New cards
51

What are the 7 possible parts to a URL?

For example:

https://www.bbc.co.uk/news/technology/index.html — FQDN

https:// — Protocol
www. — Subdomain
bbc.co.uk — Domain

You’ll see this bit looks alot like file management and thats because it is this URL pretty much is accessing a servers folder/file.
/new — Directory
/technology — Sudirectory
/index — Name of file
.html — File extension

New cards
52

What are the main 3 parts of a URL?

  • Protocol

  • subdomain

  • domain

FQDN must contain all these

New cards
53

How does a Domain work?

A Domain name like zedf.co.uk is the English version to where what it actually looks like is a IP Address and the reason we simply don’t just use the address is because you wont remember it compared to a nice domain and how this is all handled is then done through the DNS.

New cards
54

What are 3 types of security featured by a proper firewall?

  • Packet Filtering

  • Stateful Inspection

  • Proxy Server

New cards
55

What does a packet filter do? :D

it simply will filter packets accepting good and blocking bad depending entirely on their IP and protocol which they are using.

Use of a whitelist would also suffice for this.

New cards
56

What does stateful inspection do?

Stateful inspection pretty much will inspect the data being sent for example what data is within a packet to see whether it is harmful or not.

New cards
57

What is a proxy server?

A proxy server is like a substitute server that works for the primary server and acts somewhat as a middle-person / mask

New cards
58

What is the difference between Symmetric and Asymmetric encryption?

Symmetric means that both the sender and receiver obtain the same private key. (able to encrypt and decrypt data) while Asymmetric encryption makes use of four different keys with two coming from each user (a public and private)

New cards
59

How does Symmetric Encryption work?

Firstly both users in the ordeal must agree to sharing their keys each having their own copy which allows for the process to work as then they can both decrypt however if anyone else has this key then they can easily intercept which Asymmetric solves

<p>Firstly both users in the ordeal must agree to sharing their keys each having their own copy which allows for the process to work as then they can both decrypt however if anyone else has this key then they can easily intercept which Asymmetric solves</p>
New cards
60

How does Asymmetric Encryption work?

When a message gets encrypted with a public key then only the corresponding private key is even able to decrypt it vise versa.

This gets done before sending to the recipient of which the recipients public key is used so then only they can view it because only they have access to their corresponding private key.

It acts like those boat transmission things to where they have to place you in that holding place to where then they fill it with water so you can move on.

<p>When a message gets encrypted with a public key then only the corresponding private key is even able to decrypt it vise versa.</p><p>This gets done before sending to the recipient of which the recipients public key is used so then only they can view it because only they have access to their corresponding private key.</p><p>It acts like those boat transmission things to where they have to place you in that holding place to where then they fill it with water so you can move on.</p>
New cards
61

What does a Digital Signature do?

A Digital Signature allows for Asymmetric encryption to verify the sender of the message so that when they do unbox the sent message with their private key it isn’t something that is malicious.

New cards
62

How does a Digital Signature work?

  1. Message hashed for unique value.

  2. Hash encrypted with private key.

  3. Encrypted hash attached to message.

  4. Recipient decrypts hash with sender's public key.

  5. Compares decrypted hash with rehashed message for verification.

New cards
63

What is a digital certificate?

Quite literally acting like professional paper/documents which get sent along in asymmetric encryption which acts as another step proving whoever is sending is rightful which again shows how it solves the interception problem featured on symmetric encryption.

New cards
64

What are 3 main types of Malware?

  • Worms

  • Trojan

  • Viruses

New cards
65

What does Malware stand for?

Malicious Software

New cards
66

What is a worm?

Worms have the ability to self replicate within a network spreading or rather digging or via users downloading/executing the worm programs.

New cards
67

What is a trojan?

just like the real thing it pretends to be the real thing tricking users to open it and these are usually sent to users through email where it all begins.

New cards
68

What is a virus?

Viruses truly acting like one from biology acts with living hosts just like the real thing where a host cell must emody the virus and once they’ve been caught like an illness its too late to of which they’re usually found as .exe so it may be there for a very long time but until it truly is triggered it will just wait somewhat like cancer.

New cards
69

What are two types of topology?

  • Physical

  • Logical

New cards
70

What is a physical network topology?

Considering a physical network topology this refers to the actual architecture of the network.

New cards
71

What are 2 types of physical network topology?

  • Star

  • Bus

New cards
72

How does a physical star network topology function?

In a physical star network each client is connected to a central hub and have their own direct connection so they all can receive and talk to the central hub with new connections easily being made and broken however if the central hub goes down they all do.

New cards
73

How does a physical bus network topology function?

A physical bus connects the clients through a single cable quite similar to a star however instead of a central hub they all rely on the cable (Backbone)

New cards
74

What is a logical network topology?

For logical networking this instead of focusing on the actuality instead looks at logically what is actually happening like where the packets are going and how they move within the network.

New cards
75

Are you able to combine/mix topologies?

Yes, a physical star is able to logically even work like a bus even if the hardware doesn’t match all you would need to do for this logical idea is then make use of bus protocols.

New cards
76

What are 2 types of networking between hosts?

  • Client Sever

  • P2P (Peer-2-Peer)

New cards
77

What does WPA stand for?

WiFi Protected Access

New cards
78

What does SSID stand for?

Service Set IDentifier

New cards
79

How can Wi-Fi be made more secure?

  • WPA/WPA2 — any sussy business will not go un-noticed

  • Disabling SSID Broadcasting making it invisible to the unknowing eye. — only those which know the name can add

  • Addition of MAC Address filter — Only those allowed may join

New cards
80

What does CSMA/CA stand for?

Carrier Sense Multiple Access / Collision Avoidance

New cards
81

Why is use of CSMA/CA done?

CSMA/CA is used in order to avoid any possible data collisions

<p>CSMA/CA is used in order to avoid any possible data collisions</p>
New cards
82

What does RTS stand for?

Request To Send

New cards
83

What does CTS stand for?

Clear To Send

New cards
84

What is Baud Rate?

Baud Rate refers to the overall amount/speed of which channels change every second.

New cards
85

What is Bit Rate?

Bit Rate refers to the overall speed/amount of which bits are being transferred every second.

New cards
86

What is Bandwidth?

Bandwidth refers to the total width of the amount of overall data can be handled/worked with at one single time.

New cards
87

What is Latency?

Latency refers to the time delay between doing something and the actual response then finally ocurring.

New cards
88

What is a Protocol?

A protocol is a rule that is set/used across networking etc. in order to organise/control everything.

New cards
89

What is a symbol?

A symbol is simply a pattern of bits.

New cards
90

How do you calculate the Bit Rate?

Bit Rate - Baud Rate X Number of Bits per signal.

New cards
91

What is the difference between Serial and Parallel Data Transmission?

overall its the abilities provided from both with Serial being able to work over longer distances and parallel working with more at one single time.

New cards
92

What are two possible issues caused by Parallel Data Transmission?

  • Skew

  • Crosstalk

New cards
93

What is skew?

Skew refers to the wires used in a parallel data transmission because as not everything can be perfect by trying to perfectly make a set of wires to be used within a parallel transmission is incredibly difficult and this effects the overall quality being a feature it relies on with all supposedly arriving at the same time but if one wire is off then this is all wrong.

New cards
94

What is crosstalk?

Crosstalk refers to these wires being so close together that it is possible the frequencies could overlap ending up crosstalking and overriding the data only getting worse over longer distances.

New cards
95

What is the difference between Synchronous and Asynchronous transmission?

Synchronous transmission and asynchronous overall refers to how data is sent with when it is done in sync it means that the data is sent inline with the clock pulse meaning that it can be slower but is overall more ordered which then compared to being asynchronous which will just send data as soon as possible whenever possible which could get messy but also pretty fast.

New cards

Explore top notes

note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 48 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 2650 people
... ago
4.9(37)
note Note
studied byStudied by 34 people
... ago
5.0(3)
note Note
studied byStudied by 76 people
... ago
5.0(2)
note Note
studied byStudied by 55 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (162)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 31 people
... ago
5.0(1)
flashcards Flashcard (109)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 884 people
... ago
4.4(7)
flashcards Flashcard (25)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (193)
studied byStudied by 20 people
... ago
5.0(2)
robot