4.9 Fundamentals Of Communication & Networking

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Serial Data Transmission

1 / 138

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

139 Terms

1

Serial Data Transmission

Single bits are sent one after another along a single wire. Only one line is required to transmit data in one direction. (Two lines are required for two-way communication, plus a common signal ground wire).

New cards
2

Parallel Data Transmission

Several bits (usually one byte) are simultaneously sent along separate lines or channels. Risk of skew when bits arrive out of sync.

New cards
3

Serial Connectors

Smaller and cheaper than alternatives. Most common type is USB, which a computer contains ports for.

New cards
4

Advantages Of Serial Transmission

  • Uses less conducting wires

  • Reduced cost

  • Supports long distance communication

New cards
5

Disadvantages Of Serial Transmission

  • Slower than parallel transmission.

New cards
6

Parallel Connectors

Ribbon of several small cables used primarily for connecting internal components.

New cards
7

Advantages Of Parallel Transmission

  • Data is sent faster than serial transmission

  • Easier to program

  • More bits can be sent at one time

New cards
8

Disadvantages Of Parallel Transmission

  • Requires more transmission channels

  • Requires more wires

  • Data can become out of sync

  • More costly

  • Only used for short distances

  • Cross talk

  • Skew

New cards
9

Skew

Transmitted bits travel at slightly different speeds in the wires in parallel cables due to the individual wires having slightly different properties.

New cards
10

Crosstalk

Occurs when the signals of one wire affect the signals on an adjacent wire due to electromagnetic interference. Becomes more pronounced as the speed of transmission (frequency) increases.

New cards
11

Synchronous Transmission

A type of serial data transmission in which data is organized into groups or blocks of data that are transferred at regular, specified intervals (usually the internal clock pulse). There are no gaps in the transmission.

New cards
12

Asynchronous Transmission

A type of serial data transmission in which data is sent when it is ready to be sent without being synchronized. Each byte is proceeded by a start bit and ends with a stop bit or stop period (a short time gap between each set of bits).

New cards
13

Advantages of Asynchronous Transmission

It is cheap and an effective form of serial transmission well suited to low-speed connections such as keyboard and mouse.

New cards
14

Disadvantages Of Asynchronous Transmission

Relatively slow due to the increased number of bits being sent.

New cards
15

Requirement of Start & Stop Bits

The two bits need to be opposite of each other.

New cards
16

Latency

Measure of delay in communication between two devices over a network.

New cards
17

Protocol

A set of rules governing the exchange or transmission of data between devices.

New cards
18

Baud Rate

The rate at which signals on a wire may change.

New cards
19

Bit Rate

The number of bits transferred or received per unit of time. Baud Rate x Number Of Bits Per Signal.

New cards
20

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time

New cards
21

Propagation Latency

Length of time taken for a signal to reach it's destination.

New cards
22

Transmission Latency

The time taken from when the first bit leaves the transmitter to when the last bit is recieved.

New cards
23

Processing Latency

Time taken for routers to process the data packet's header.

New cards
24

Ping Test

Measures latency by determining the time it takes a given network packet to travel from source to destination and back.

New cards
25

Local Area Network (LAN)

Two or more computers that exchange data, confined to a small geographic area usually one building.

New cards
26

Advantages Of LAN

  • Faster communications

  • More secure as it is not reliant on the internet.

  • Is able to identify all devices connected to it.

  • Allows for sharing internet and software.

New cards
27

Disadvantages Of LAN

  • Quite expensive to install

  • Does not cover a large geographical area.

  • Requires maintenance

  • LAN can spread malware.

  • Servers can crash.

New cards
28

Wide Area Network (WAN)

Computers and peripherals connected together over a large geographical area and exceeds a single site, like the internet.

New cards
29

Advantages Of WAN

  • Applies over a much larger area

  • Allows sharing for sharing of software and resources

  • Allows for centralised data

  • Assured up-time

New cards
30

Disadvantages Of WAN

  • Expensive to setup

  • More security issues that hackers can use and intercept

  • Maintenance issues

  • Server crashes can potentially lose data.

  • High bandwidth required

  • Fully reliant on public and private infrastructure

New cards
31

Network Toplogy

The arrangement of the various computing devices which make up a computer network

New cards
32

Bus Network

A network consisting of a central backbone cable to which all network devices are attached. Each end of the backbone is connected to a device or terminator, preventing data from bouncing back. Each node is passive, and data is sent in one direction at a time.

New cards
33

Advantages Of A Bus Network

  • Inexpensive to set up

  • Devices easily added

  • Good for small networks

New cards
34

Disadvantages Of A Bus Network

  • Main cable is a point of failure

  • Limited cable length

  • Performance degrades with heavy use, owing to data "collisions"

  • Poor security

New cards
35

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A protocol that detects when two nodes are attempting to transmit simultaneously. Both nodes cease transmission and wait a random amount time before reattempting. Used with wireless networks.

New cards
36

CMSA/CA Using RTS/CTS

When data is being sent, a 'request to send' (RTS) is transmitted to the wireless access point. If no other devices are being used, then a 'clear to send' (CTS) is transmitted to the node, and the node transmits the data. If a CTS has not been recieved, the node waits a random amount of time before transmitting another RTS. This method allows hidden nodes to stay hidden by only communicating with the wireless access point.

New cards
37

Hidden Node Problem

A situation on a wireless network in which a node on one side of a coverage area is too far apart from and therefore invisible to nodes on the other side of the coverage area. This situation prevents nodes from collaborating to prevent collisions.

New cards
38

Star Network

Each device is connected to a central device such as a hub or switch.

New cards
39

Advantages Of A Star Network

  • Easier to isolate problems

  • Good performance

  • More secure if a switch is used as data is only sent to the recipient.

New cards
40

Disadvantages Of A Star Network

  • Expensive for switch/hub and cabling

  • Central node is a point of failure.

New cards
41

Switch

Sends each communication to the specific computer it is intended for. It holds all of the MAC addresses for each device connected to it and uses these to direct packets of data to the correct device.

New cards
42

Hub

Broadcasts the data it receives to all devices connected to its ports.

New cards
43

Network Interface Card

A card installed in a computer that allows you to connect to a network (can be Ethernet, telephone, or wireless)

New cards
44

Media Access Control (MAC)

Given to a network adapter when it is manufactured. It is hardwired or hard-coded onto your computer's network interface card (NIC) and is unique to it. Six pairs of hex digits seperated by colons, with the first being the manufacture code, while the second half is the device code.

New cards
45

Physical Topology

Defines how the devices are physically connected.

New cards
46

Logical Topology

Defines how the devices communicate across the physical topologies. E.g. A network wired in a star topology can behave logically as a bus Network by using a bus protocol and appropriate physical switching.l

New cards
47

Client

A computer that requests data stored or resources provided by a server.

New cards
48

Server

A powerful computer which provides services or resources required by any client.

New cards
49

Client-Server Network

A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.

New cards
50

Features Of A Client-Server Network

  • A central server used to manage security

  • Some files stored on the central server

  • Some processing tasks are performed by the server.

  • Clients issue requests to the server for services such as email, file storage, backup and printing.

  • Suitable for many different types of organisation, large or small.

  • Can require specialist IT staff to adminster the network.

New cards
51

Advantages Of Client-Server Network

  • Easier to upgrade the server than to upgrade every device

  • Centralised back-up

  • No access to other people's files (advantage depending on the situation)

  • Used in small, medium and large companies.

New cards
52

Disadvantages Of Client-Server Network

  • Requires maintenance and a specialist team

  • Server is a point of failure.

  • Can be expensive

New cards
53

Peer-to-Peer Network (P2P)

A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

New cards
54

P2P File Sharing

A practice in which individuals can obtain music, video, and other types of files from other users on a network (BBC iPlayer uses P2P networking); sometimes the files are shared without authorization from the copyright holder.

New cards
55

Cloud Computing

use of web services to perform functions that were traditionally performed with software on an individual computer; i.e. Flickr, Google Docs, etc.

New cards
56

Advantages Of Cloud Computing

  • Allows collaboration on work

  • Back-ups can be made up easily.

  • Software and data is accessible from any computer.

  • Software and data do not take up space on the user's hardrive

New cards
57

Disadvantages Of Cloud Computing

  • Requires constant internet connection.

  • May require a subscription

  • Hackers could attack it.

  • Relies on other organisations, for security.

New cards
58

Wi-FI

Wireless local area network that uses radio signals to transmit data

New cards
59

The Purpose of Wi-Fi

Allows devices to connec to each other via wireless technology, which is particularly useful for small portable devices that don't have enough ports.

New cards
60

Requirements For A Wireless Network

  • Internet Service Provider (ISP)

  • Modem & Wireless Router (Often Combined)

  • Device with a network interface card (NIC).

New cards
61

Service Set Identifier (SSID)

A network name that wireless routers use to identify themselves. Can be hidden, making it harder to detect.

New cards
62

Wireless Protected Access (WPA)

Provides sophisticated data encryption and user authentication.

New cards
63

Wireless Protected Access 2 (WPA2)

A stronger security protocol that is more secure by increasing the level of encryption.

New cards
64

MAC Address Whitelist

Identifies authorised sites/users/machines that are allowed to use the network. Any devices with a MAC address not identified will not be authorised access.

New cards
65

Internet

A global network connecting millions of computers, making it possible to exchange information. A network of inter-connected networks.

New cards
66

World Wide Web (WWW)

An electronic collection of information posted on websites. It includes text, audio, video, and graphics. It is accessed via the internet.

New cards
67

Backbone

A set of dedicated connections that connect several large networks at various points on the globe. Each of these points are then connected to other regional networks, usually controlled by ISPs

New cards
68

Internet Service Provider (ISP)

An organisation that provides services for accessing and using the internet. Internet services include internet access, internet transit, domain name registration, web hosting, etc.

New cards
69

Internet Protocol (IP)

A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.

New cards
70

IP Address

A dotted quad number that identifies every computer that sends or recieves data on a network and on the internet. Each device needs to uniquely identified so that data can be sent to the correct destination.

New cards
71

IPv4 vs IPv6

IPv4: 32-bit number: 4 billion addresses; four sets of numbers marked off by periods IPv6: 128-bit addresses, able to handle up to 1 quadrillion addresses; almost an unlimited number of addresses

New cards
72

Uniform Resource Locator (URL)

A full internet address that identifies hypertext documents.

New cards
73

Domain Name

The part of a network address that identifies it as belonging to a particular domain and identifies the type of site it is (.gov, .edu, .com).

New cards
74

Types Of Domain Names

.co - indicates a type of organisation. .com - indicates a commercial organisation. .gov - indicated it is part of a government facility .ac - indicates it is an acedemic institution. .sch - school .org - identifies an organisation that is not a buisness. .net - company providing an internet service. .uk - indicates it is registered within the UK

New cards
75

Domain Name Server (DNS)

Dedicated computers with an index of domain names and their corresponding IP addresses. When a computer queries a DNS server for a domain name, the server returns an IP address that the computer can use to send a message to it.

New cards
76

Resolving An IP Address

If a Domain Name Server does not have a record for a domain, it either:

  • handles the DNS query so that it can eventually deliver an IP address or a 'DNS address could not be found' error message.

  • Refers to a DNS server authoratitive (e.g. .uk) and follows this and subsquent referrals to successively lower level Domain Name Servers.

New cards
77

Internet Registries

Organisations who allocate and administer domain names and IP addresses There are 5 global internet registries that work togethor to maintain a database of address assignments that ensure IP addresses and domain names are unique.

New cards
78

Five Regional Internet Registers

  • Africa Network Information Center (Africa)

  • American Registry For Internet Numbers (US, Canada, several parts of the Carribean and Antarctica)

  • Asia Pacific-Network Information Center (Asia, Austrailia, New Zealand and neighbouring countries)

  • Latin America And Carribean Network (Latin America and parts of the Carribean region)

  • Réseaux IP Européens Network Coordination Centre (Europe, Russia, Middle East, and Central Asia)

New cards
79

Packet Switching

A method of transmitting packets of data via the quickest route on a network. Packets are routed via the least congested route, which makes it more secure as the packets are not all on the same routes.

New cards
80

Data Packet

Data that is broken up into chunks of data for transmitting over a network, and it is assembled again at the recieving end. Increases network efficiency and reliability. Each one contains a sequence number, a source, a destination and a checksum. The ideal compromise size is 500-1500 bytes.

New cards
81

Header

Information that appended to the beginning of a data packets. Includes:

  • MAC addresses of the sender and reciever

  • IP address of the sender and reciever

  • What protocol should be used

  • The packet number or sequence number.

New cards
82

Body

The part of the data packet that contains the actual data being transmitted.

New cards
83

Footer

Appended at the end of a data packet, and contains a checksum.

New cards
84

Sender's Address

Identifies where the packet was sent from, and therefore where the response should be sent to.

New cards
85

Reciever's Address

Identifies the packet's intended recipient, allowing it to be routed to the correct device.

New cards
86

Time To Live

Holds the number of hops (number of routers) a packet can go through before the transmission is dropped.

New cards
87

Sequence Number

Contains the number of packets in a message, and identifies the packet's position in relation to the others.

New cards
88

Checksums

An error detection method using an algorithm to calculate the sum of bytes in a data packet transmission, and this calculated sum is also sent with the transmission. The receiving computer recalculates the sum with the transmission it received, and if the values of the sums don't match with the one appended to the transmission, an error has occured or the data packet has been altered.

New cards
89

Routing

The process of directing packets of data between networks. Routers forward data packets from one network to another.

  • Each router stores data about the available routes to the destination node

  • It looks up the destination IP address in its routing table to find the best router to which to forward the packet. Each forward is known as a 'hop'.

  • Routers continue to forward the packet until it reaches its destination node.

New cards
90

Gateway

A bridge between two networks that use different protocols. It removes header data from a packet and reapplies it using the correct the format of the new network. Can sometimes be combined with a router into one integrated device.

New cards
91

Firewall

A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Either hardware or software that opens certain ports so that only certain traffic is allowed to pass through.

New cards
92

Packet Filtering

A process that uses various fields in a packet's IP and TCP headers to decide what to do with the packet. A technique that examines the contents of packets and rejecting them if they do not confrom to specfied rules. Firewall software is used to examine the packets to ensure it does not contain unauthorised data, and the header can be checked to see if it is from a recognised source.

New cards
93

Stateful Inspection

Examines the contents of a packet before deciding whether to allow it through the firewall. It remembers actions for futer decisions.

New cards
94

Proxy Server

A server that acts as an intermediary between a user and the Internet. It makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient.

New cards
95

Functions Of A Proxy Server

  • No direct connection between device on LAN and the internet.

  • Evaluate requests to ensure they come from a legitimate source

  • Anonymous surfing

  • Filter undesirable online content

  • Log user data with their requests

  • Provide a cache of previously visited sites to speed access.

New cards
96

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

New cards
97

Symmetric Encryption

An encryption method whereby the same key is used to encode and to decode the message. The key needs to be transferred to the communicating devices so they know how to encrypt and decode the messages. It is a relatively fast form of encryption and is used for home and small office Wi-Fi networks, mainly a pre-shared key.

New cards
98

Man In The Middle Attack

A Hacker placing themselves between a client and a host to intercept communications between them. If they have the key for the symmetric encryption they are using, they can access all the communications.

New cards
99

Asymmetric Encryption

An encryption method which uses a mathmatically linked public and private key to encrypt and decrypt data. The sender encrypts data using the recipient's public key, and the encrypted data is sent to the recipient. The recipient then can only use their own private key to decrypt the message. This prevents man in the middle attacks as it requires access to the public and private key.

New cards
100

Private Key

A code used to encrypt/decrypt data that is only known by one user but is mathematically linked to a corresponding public key.

New cards

Explore top notes

note Note
studied byStudied by 18 people
... ago
4.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 34 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(2)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 57 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(1)
note Note
studied byStudied by 1975 people
... ago
4.7(11)

Explore top flashcards

flashcards Flashcard (93)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (115)
studied byStudied by 13 people
... ago
5.0(2)
flashcards Flashcard (22)
studied byStudied by 17 people
... ago
5.0(3)
flashcards Flashcard (75)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 27 people
... ago
5.0(2)
flashcards Flashcard (40)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (134)
studied byStudied by 2615 people
... ago
4.0(26)
robot