Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
52 Cards in this Set
- Front
- Back
Local Loop
|
Local network of wires, terminating at the CO, ran by LECs
|
|
Packet
|
a message at the internet layer, a chunk of data, sometimes called frames, blocks, or segments
|
|
Frame
|
1) a message at the data link layer, 2) In time division multiplexing, a brief time period, which is further subdivided into slots
|
|
Encapsulation
|
packets at one layer become payload for the next layer, the placing of a message in the data field of another message
|
|
Circuit switching
|
Switching in which capacity for a voice conversation is reserved on every switch and trunk line end-to-end between the two subscribers
|
|
Packet switching
|
the breaking of conversations into short messages (typically a few hundred bits long); allows multiplexing on trunk lines to reduce trunk line costs
|
|
Serial
|
Ethernet transmission over a single pair in each direction
|
|
Parallel
|
a form of transmission that uses multiple wire pairs or other transmission media simultaneously to send a signal; increases transmission speed
|
|
Synchronous
|
synchronization bits are sent at fixed intervals whether you are transmitting or not, 99% efficient using 7-bit ASCII
|
|
Asynchronous
|
start and stop bits are sent for each byte, time between bytes can vary, 77% efficient using 7-bit ASCII
|
|
Modulation
|
converting a digital to an analog signal
|
|
Amplitude
|
The height or power of a wave
|
|
Frequency
|
the number of cycles of a wave within a period of time, measured in Hz, or Hertz, or cycles per second
|
|
Multiplexing
|
sending multiple messages over the same channel
|
|
I-picture
|
Intra-coding frames in video compression, similar to JPEG, offer moderate compression
|
|
P-picture
|
Forward Prediction frames in video compression, start with an I-picture and estimate which pixels change; introduces error, but has good compression
|
|
B-picture
|
Bidirectional Prediction, the average between I- and P-pictures, though B-pictures are not used to predict P-pictures, offers excellent compression, but is computationally expensive
|
|
Physical Topology
|
how devices on a network are physically linked, not necessarily the same as the logical topography, normally using the following three approaches
|
|
Bus
|
Linear arrangement, requiring terminators at each end of the line
|
|
Ring
|
similar to bus, though forms a ring instead of a line, requiring no terminators
|
|
Star
|
Hub-and-spoke, each device is connected to a central unit, most common topography today, easy to centrally manage, but with a single point of failure
|
|
Flow control
|
one device sends faster than another, causing a backlog, fixed by queuing packets, sending a pause request, or a sliding window technique
|
|
Token Passing
|
a centralized MAC scheme, transmit if have permission by the token, some systems you ask for the token and others it is passed at regular intervals
|
|
Logical Topology
|
Determine how messages are passed, two options, sequential and broadcast
|
|
Sequential
|
Ring, aka Bucket-brigade, packet sent to neighbor, they read the address, if addressed to them they read it, if not they pass it to the next machine
|
|
Broadcast
|
message sent to all, everyone reads the address, if addressed to them, they read it, if not they ignore it
|
|
Ethernet
|
standard datalink protocol, IEEE 802.3, Error Checking using CRC, Flow control of pause or sliding window, CSMA/CD access control, logical topology is broadcast, physical topology is usually a Star
|
|
Token Ring
|
datalink architecture IEEE 802.5, Checksum error checking, sliding window flow control, Token MAC, Sequential logic, physical star
|
|
T1
|
a standard for digital transmission circuits over twisted pair, 1.544Mbps, synchronous needing framing bits, 24 channels at 64 Kbps each, 8 bits per channel, TDM- like
|
|
Channel
|
small frequency range that is a subdivision of a service band
|
|
Virtual Tributaries
|
packing multiple data types into SONET
|
|
Virtual Circuit
|
a tool to create pseudo circuits on a packet switched network. Send call set-up packets to find best route, then send data packets along that route. Requires cooperation from other protocols to work properly
|
|
X.25
|
defines how data get on and off a packet switched network, not how packets move across the network, performs hop by hop error checking
|
|
Frame Relay
|
lets end nodes worry about errors, ignores bad packets, minimal flow control, still supports virtual circuits
|
|
Class A
|
Small number of big networks have Class A IPv4 address, first bit 0, 7 bits to ID segment, 24 bits to ID hosts
|
|
Class B
|
Midway between A&C
|
|
Class C
|
first 3 address bits are 110, 21 bits to ID segment, 8 bits to ID host, large number of small networks
|
|
Class D
|
IP addresses used in multicasting
|
|
Port
|
In TCP and UDP messages, a header field that designates the application layer process on the server side and a specific connection on the client side
|
|
Steganography
|
The practice of hiding messages, often in plain sight
|
|
Cryptography
|
Encrypting messages, the practice/study of hiding information
|
|
Transposition
|
rearrange the letters in a message, ex. A=C, B=D, C=E, etc
|
|
Substitution
|
Replace letters with other letters, usually with random mapping, but requires key
|
|
Key Exchange
|
problem of securely sharing a decryption key with the communication partner alone.
|
|
Symmetric Key
|
the same key is used to encrypt as is used to decrypt the message
|
|
Asymmetric Key
|
a different key is used to decrypt than is to encrypt the message. A public key is used to encrypt, and a private key is used to decrypt
|
|
Digital Signature
|
a private key is used to encrypt the message, and a public key is used to decrypt the message. Only your public key can decrypt a message from you, so the receiver knows the message was encrypted by you alone
|
|
Rectilinear Orientation
|
Photon transmission scheme where 1s and 0s can only be read if the correct detector is used, in this case, a vertical or horizontal reader. If the wrong reader is used, the message is lost. Eavesdropping is prevented as a key is needed to know when to change orientations when reading the message
|
|
Diagonal orientation
|
same as Rectilinear, in this case, a diagonal reader
|
|
Virus
|
a piece of executable code that attaches itself to programs or data files. When the program is executed or the data file opened, the virus spreads to other programs or data files
|
|
Worm
|
an attack program that propagates on its own by seeking out other computers, jumping to them and installing itself
|
|
Trojan Horse
|
a program that looks like an ordinary system file, but continues to exploit the user indefinitely
|