• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/52

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

52 Cards in this Set

  • Front
  • Back
Local Loop
Local network of wires, terminating at the CO, ran by LECs
Packet
a message at the internet layer, a chunk of data, sometimes called frames, blocks, or segments
Frame
1) a message at the data link layer, 2) In time division multiplexing, a brief time period, which is further subdivided into slots
Encapsulation
packets at one layer become payload for the next layer, the placing of a message in the data field of another message
Circuit switching
Switching in which capacity for a voice conversation is reserved on every switch and trunk line end-to-end between the two subscribers
Packet switching
the breaking of conversations into short messages (typically a few hundred bits long); allows multiplexing on trunk lines to reduce trunk line costs
Serial
Ethernet transmission over a single pair in each direction
Parallel
a form of transmission that uses multiple wire pairs or other transmission media simultaneously to send a signal; increases transmission speed
Synchronous
synchronization bits are sent at fixed intervals whether you are transmitting or not, 99% efficient using 7-bit ASCII
Asynchronous
start and stop bits are sent for each byte, time between bytes can vary, 77% efficient using 7-bit ASCII
Modulation
converting a digital to an analog signal
Amplitude
The height or power of a wave
Frequency
the number of cycles of a wave within a period of time, measured in Hz, or Hertz, or cycles per second
Multiplexing
sending multiple messages over the same channel
I-picture
Intra-coding frames in video compression, similar to JPEG, offer moderate compression
P-picture
Forward Prediction frames in video compression, start with an I-picture and estimate which pixels change; introduces error, but has good compression
B-picture
Bidirectional Prediction, the average between I- and P-pictures, though B-pictures are not used to predict P-pictures, offers excellent compression, but is computationally expensive
Physical Topology
how devices on a network are physically linked, not necessarily the same as the logical topography, normally using the following three approaches
Bus
Linear arrangement, requiring terminators at each end of the line
Ring
similar to bus, though forms a ring instead of a line, requiring no terminators
Star
Hub-and-spoke, each device is connected to a central unit, most common topography today, easy to centrally manage, but with a single point of failure
Flow control
one device sends faster than another, causing a backlog, fixed by queuing packets, sending a pause request, or a sliding window technique
Token Passing
a centralized MAC scheme, transmit if have permission by the token, some systems you ask for the token and others it is passed at regular intervals
Logical Topology
Determine how messages are passed, two options, sequential and broadcast
Sequential
Ring, aka Bucket-brigade, packet sent to neighbor, they read the address, if addressed to them they read it, if not they pass it to the next machine
Broadcast
message sent to all, everyone reads the address, if addressed to them, they read it, if not they ignore it
Ethernet
standard datalink protocol, IEEE 802.3, Error Checking using CRC, Flow control of pause or sliding window, CSMA/CD access control, logical topology is broadcast, physical topology is usually a Star
Token Ring
datalink architecture IEEE 802.5, Checksum error checking, sliding window flow control, Token MAC, Sequential logic, physical star
T1
a standard for digital transmission circuits over twisted pair, 1.544Mbps, synchronous needing framing bits, 24 channels at 64 Kbps each, 8 bits per channel, TDM- like
Channel
small frequency range that is a subdivision of a service band
Virtual Tributaries
packing multiple data types into SONET
Virtual Circuit
a tool to create pseudo circuits on a packet switched network. Send call set-up packets to find best route, then send data packets along that route. Requires cooperation from other protocols to work properly
X.25
defines how data get on and off a packet switched network, not how packets move across the network, performs hop by hop error checking
Frame Relay
lets end nodes worry about errors, ignores bad packets, minimal flow control, still supports virtual circuits
Class A
Small number of big networks have Class A IPv4 address, first bit 0, 7 bits to ID segment, 24 bits to ID hosts
Class B
Midway between A&C
Class C
first 3 address bits are 110, 21 bits to ID segment, 8 bits to ID host, large number of small networks
Class D
IP addresses used in multicasting
Port
In TCP and UDP messages, a header field that designates the application layer process on the server side and a specific connection on the client side
Steganography
The practice of hiding messages, often in plain sight
Cryptography
Encrypting messages, the practice/study of hiding information
Transposition
rearrange the letters in a message, ex. A=C, B=D, C=E, etc
Substitution
Replace letters with other letters, usually with random mapping, but requires key
Key Exchange
problem of securely sharing a decryption key with the communication partner alone.
Symmetric Key
the same key is used to encrypt as is used to decrypt the message
Asymmetric Key
a different key is used to decrypt than is to encrypt the message. A public key is used to encrypt, and a private key is used to decrypt
Digital Signature
a private key is used to encrypt the message, and a public key is used to decrypt the message. Only your public key can decrypt a message from you, so the receiver knows the message was encrypted by you alone
Rectilinear Orientation
Photon transmission scheme where 1s and 0s can only be read if the correct detector is used, in this case, a vertical or horizontal reader. If the wrong reader is used, the message is lost. Eavesdropping is prevented as a key is needed to know when to change orientations when reading the message
Diagonal orientation
same as Rectilinear, in this case, a diagonal reader
Virus
a piece of executable code that attaches itself to programs or data files. When the program is executed or the data file opened, the virus spreads to other programs or data files
Worm
an attack program that propagates on its own by seeking out other computers, jumping to them and installing itself
Trojan Horse
a program that looks like an ordinary system file, but continues to exploit the user indefinitely