Network Protocols and Text Encoding

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Text encodings are needed to map characters to ______ data.

binary

UTF-8 can handle over ______ characters, making it far more versatile than ASCII.

1 million

We use an ______ address to identify a device on the internet.

IP

Processes are addressed using ______ numbers.

<p>port</p> Signup and view all the answers

TCP ensures that all packets are delivered successfully and in the correct ______.

<p>order</p> Signup and view all the answers

Error detection in TCP is accomplished through the use of ______.

<p>checksums</p> Signup and view all the answers

When dealing with non-English text or special characters, ______ is preferable to ASCII.

<p>UTF-8</p> Signup and view all the answers

TCP prevents network congestion by adjusting the transmission rate based on network ______.

<p>conditions</p> Signup and view all the answers

The HTTP request line includes the method, ______, and HTTP version.

<p>URI</p> Signup and view all the answers

HTTP status codes are grouped by their ______, indicating different response categories.

<p>first digit</p> Signup and view all the answers

A status code of ______ indicates that the request succeeded and the server returned the requested resource.

<p>200</p> Signup and view all the answers

Proxies act on behalf of clients to improve performance or provide ______.

<p>security</p> Signup and view all the answers

The ______ header informs the receiver about the data format of the message.

<p>Content-Type</p> Signup and view all the answers

Character ______ ensures text data is correctly interpreted, especially for non-ASCII characters.

<p>encoding</p> Signup and view all the answers

HTML organizes web content into semantic elements using ______.

<p>tags</p> Signup and view all the answers

The ______ layer in web content formats is responsible for providing the look and feel.

<p>Style</p> Signup and view all the answers

GET requests retrieve data while ______ requests send data to the server.

<p>POST</p> Signup and view all the answers

______ is the loopback address used for testing web servers and applications locally.

<p>127.0.0.1</p> Signup and view all the answers

Wavelength Division Multiplexing (WDM) is used in ________.

<p>fiber optics</p> Signup and view all the answers

The name 'Internet' comes from the term '______-networking'.

<p>inter</p> Signup and view all the answers

A node is any ________ connected to the network.

<p>device</p> Signup and view all the answers

The arrangement of nodes and links in a network is known as ________.

<p>topology</p> Signup and view all the answers

Reliable transmission in TCP is achieved through a three-way ______.

<p>handshake</p> Signup and view all the answers

The OSI Model comprises ________ layers.

<p>seven</p> Signup and view all the answers

The receiver sends an ______ for each successfully received packet.

<p>ACK</p> Signup and view all the answers

The maximum payload size for an IPv4 packet is ________ bytes.

<p>65,515</p> Signup and view all the answers

Each byte of data in TCP has a unique ______ number.

<p>sequence</p> Signup and view all the answers

TCP ensures reliable transmission by using a ________ handshake.

<p>three-way</p> Signup and view all the answers

If an ACK is not received within a certain time, TCP performs ______.

<p>retransmissions</p> Signup and view all the answers

An IP address provides ________ information to help route a packet.

<p>location</p> Signup and view all the answers

Data integrity in TCP is validated using ______.

<p>checksums</p> Signup and view all the answers

The address 127.0.0.1 refers to the ________ interface.

<p>loopback</p> Signup and view all the answers

Applications that require low latency, such as ______, do not work optimally with TCP.

<p>video streaming</p> Signup and view all the answers

________ govern the rules of communication between devices on a network.

<p>Protocols</p> Signup and view all the answers

______ is often preferred over TCP for applications requiring fast, uninterrupted data transfer.

<p>UDP</p> Signup and view all the answers

Latency refers to the ________ in transmitting data from the source to the destination.

<p>delay</p> Signup and view all the answers

The Domain Name Service (DNS) translates human-readable domain names into ______.

<p>IP addresses</p> Signup and view all the answers

IP does not ensure that packets reach the receiver in the same ________ they were sent.

<p>order</p> Signup and view all the answers

Bandwidth is defined as the maximum ________ rate a network link can handle.

<p>data</p> Signup and view all the answers

The client-side component that queries the DNS server is known as the ______.

<p>DNS resolver</p> Signup and view all the answers

DNS uses a hierarchical structure that includes ______ DNS servers at the highest level.

<p>Root</p> Signup and view all the answers

TLD servers are responsible for storing information about ______-level domains.

<p>second</p> Signup and view all the answers

The ______ stores actual DNS records, providing the final answer to a query.

<p>authoritative server</p> Signup and view all the answers

In binary numbers, the leftmost bit is referred to as the Most ______ Bit (MSB).

<p>Significant</p> Signup and view all the answers

To convert the binary number 1101 to decimal, you calculate it as (1×2^3)+(1×2^2)+(0×2^1)+(1×2^0) = ______.

<p>13</p> Signup and view all the answers

The system can continue functioning even if some nodes fail, known as ______ tolerance.

<p>fault</p> Signup and view all the answers

New nodes can be added to handle increased demand, a feature referred to as ______.

<p>scalability</p> Signup and view all the answers

Examples of systems that illustrate these concepts include cloud computing platforms, web applications, and ______ systems.

<p>peer-to-peer</p> Signup and view all the answers

A ______ is a text-based interface where users interact with the operating system by typing commands.

<p>command line interface</p> Signup and view all the answers

The receiver sends ______ to confirm the successful receipt of data.

<p>acknowledgments</p> Signup and view all the answers

Each byte in the data stream is assigned a ______ number to ensure proper order.

<p>sequence</p> Signup and view all the answers

In the CLI, users execute tasks like file manipulation, process management, and ______ configuration.

<p>network</p> Signup and view all the answers

If an acknowledgment is not received within a timeout period, TCP ______ the data.

<p>retransmits</p> Signup and view all the answers

Signals can be classified as either ______ or digital.

<p>analog</p> Signup and view all the answers

TCP uses ______ to verify data integrity during transmission.

<p>checksums</p> Signup and view all the answers

______ cables transmit electrical signals and are used for short to medium distances.

<p>Copper</p> Signup and view all the answers

______ cables transmit light signals and are ideal for high-speed communication.

<p>Fiber optic</p> Signup and view all the answers

TCP is not ideal for applications that prioritize ______ and real-time performance over reliability.

<p>speed</p> Signup and view all the answers

Modulation techniques are employed to encode binary data on an ______ signal.

<p>analog</p> Signup and view all the answers

In video streaming, dropped packets are ______ as the content is time-sensitive.

<p>tolerable</p> Signup and view all the answers

In Amplitude Modulation (AM), the ______ of the analog wave varies based on binary input.

<p>amplitude</p> Signup and view all the answers

Real-time actions in online gaming require low ______.

<p>latency</p> Signup and view all the answers

Voice over IP (VoIP) needs real-time audio to be delivered with minimal ______.

<p>delay</p> Signup and view all the answers

In Frequency Modulation (FM), the ______ of the analog wave changes based on binary input.

<p>frequency</p> Signup and view all the answers

Phase-Shift Keying (PSK) represents binary data by changing the ______ of the analog wave.

<p>phase</p> Signup and view all the answers

IPv4 addresses consist of four decimal numbers, each ranging from 0 to ______.

<p>255</p> Signup and view all the answers

IPv6 addresses are written as eight groups of four ______ digits.

<p>hexadecimal</p> Signup and view all the answers

Multiplexing combines multiple signals to transmit them over a single ______ channel.

<p>communication</p> Signup and view all the answers

Time Division Multiplexing (TDM) allows signals to share the channel by taking turns in ______ slots.

<p>time</p> Signup and view all the answers

A ______ is a stateless, application-layer protocol that forms the foundation of data communication on the World Wide Web.

<p>URL</p> Signup and view all the answers

The ______ method is used to submit data to create or modify a resource.

<p>POST</p> Signup and view all the answers

Frequency Division Multiplexing (FDM) allows signals to occupy separate ______ bands.

<p>frequency</p> Signup and view all the answers

HTTP/2 uses ______ to improve performance by allowing multiple requests to be sent over a single connection.

<p>request pipelining</p> Signup and view all the answers

The ______ protocol improves performance, security, and efficiency over HTTP/1.1.

<p>HTTP/2</p> Signup and view all the answers

The parts of a URL include Scheme, Host, ______, Path, and Query String.

<p>Port</p> Signup and view all the answers

In One's Complement, negative numbers are represented by ______ all the bits of their absolute value.

<p>inverting</p> Signup and view all the answers

Two's complement simplifies arithmetic operations because it only has ______ representation of zero.

<p>one</p> Signup and view all the answers

In floating point values, the part that determines the range of the value is called the ______.

<p>exponent</p> Signup and view all the answers

A character set includes letters, digits, special characters, and ______ characters.

<p>control</p> Signup and view all the answers

Character encoding maps characters from the character set to their corresponding ______ values.

<p>binary</p> Signup and view all the answers

UTF-8 is better than ASCII because it supports over ______ million characters from multiple languages.

<p>1.1</p> Signup and view all the answers

The instruction set of a CPU is the complete set of ______-level commands that the processor understands.

<p>machine</p> Signup and view all the answers

A program is a static set of instructions, while a ______ is a program in execution.

<p>process</p> Signup and view all the answers

Operating systems manage CPU, memory, disk, and other ______.

<p>resources</p> Signup and view all the answers

Programming languages allow developers to write ______ for computers to execute tasks.

<p>instructions</p> Signup and view all the answers

For +5 in an 8-bit binary, the representation is ______ (unchanged).

<p>00000101</p> Signup and view all the answers

In the instruction set, commands like ADD, SUB, and ______ are used for data movement.

<p>MOV</p> Signup and view all the answers

A significant feature of an Operating System is ______ management, which handles the creation and scheduling of processes.

<p>process</p> Signup and view all the answers

The ______ of floating point values determines their precision.

<p>mantissa</p> Signup and view all the answers

In ASCII, the character A is encoded as ______.

<p>01000001</p> Signup and view all the answers

Flashcards

Text Encoding

Transforming characters into binary data for computer processing and transmission.

UTF-8

Variable-length character encoding supporting all Unicode characters, backwards compatible with ASCII.

IP Address

Unique numerical address identifying a device on the internet.

Port Number

Identifies a specific application or service running on a device.

Signup and view all the flashcards

Socket Address

Combination of IP address and port number to uniquely identify a process on a device.

Signup and view all the flashcards

TCP Reliability

Ensures data delivery in order and without errors (e.g., lost packets).

Signup and view all the flashcards

TCP Flow Control

Preventing a fast sender from overwhelming a slow receiver.

Signup and view all the flashcards

TCP Congestion Control

Prevents network overload by regulating data transmission rate based on network conditions.

Signup and view all the flashcards

TCP Reliable Transmission

TCP uses a three-way handshake, acknowledgments, sequence numbers, retransmissions, and checksums to ensure reliable data delivery.

Signup and view all the flashcards

Three-Way Handshake

A process where both sender and receiver acknowledge each other to establish a reliable connection before data transfer.

Signup and view all the flashcards

Acknowledgments (ACKs)

A signal sent by the receiver to confirm that a packet was received successfully.

Signup and view all the flashcards

Sequence Numbers

Unique identifiers assigned to each byte of data to ensure correct ordering and detect lost packets.

Signup and view all the flashcards

Retransmissions

Resending data if the receiver doesn't acknowledge the packet within a certain time.

Signup and view all the flashcards

Checksums

Used to verify data integrity, if errors are detected, retransmission is triggered

Signup and view all the flashcards

DNS

Domain Name Service. It translates human-readable domain names to IP addresses.

Signup and view all the flashcards

DNS Resolver

The client-side part that queries DNS servers to find IP addresses.

Signup and view all the flashcards

Boolean Algebra

Based on two values: True (1) and False (0).

Signup and view all the flashcards

Boolean OR

Outputs True if at least one input is True.

Signup and view all the flashcards

MSB

Most Significant Bit, the leftmost bit in a binary number.

Signup and view all the flashcards

LSB

Least Significant Bit, the rightmost bit in a binary number.

Signup and view all the flashcards

Binary to Decimal Conversion

A method to change binary numbers into decimal numbers.

Signup and view all the flashcards

Binary Addition Rules

Rules for basic binary arithmetic functions.

Signup and view all the flashcards

Signed Number Representation

Different ways (e.g., sign-magnitude, one's complement, two's complement) to represent positive and negative numbers in binary.

Signup and view all the flashcards

One's Complement

A method to represent negative numbers in binary by inverting all the bits of the positive number.

Signup and view all the flashcards

Two's Complement

The most common method for representing negative numbers in binary. It involves inverting all the bits of the positive number and adding 1.

Signup and view all the flashcards

Floating Point Value

A representation of real numbers (including fractions and decimals) that combines sign, exponent, and mantissa.

Signup and view all the flashcards

Character Set

A collection of symbols (letters, digits, special characters, and control characters) that a computer can understand.

Signup and view all the flashcards

Character Encoding

A system that maps characters from a character set to their corresponding binary values.

Signup and view all the flashcards

Why is UTF-8 better than ASCII?

UTF-8 surpasses ASCII and ISO-8859-1 due to its wide character range, backward compatibility, efficient storage, and universal standard.

Signup and view all the flashcards

Instruction Set of a CPU

The set of machine-level commands that a CPU understands and executes.

Signup and view all the flashcards

Program vs. Process

A program is a static set of instructions, while a process is a dynamic instance of a program running with allocated resources.

Signup and view all the flashcards

Operating System (OS)

A software layer that manages hardware resources, processes, file systems, security, and provides a user interface for interaction with the computer.

Signup and view all the flashcards

Resource Management by OS

The OS controls access to and allocation of hardware resources like CPU, memory, disk space, and peripherals.

Signup and view all the flashcards

Process Management by OS

The OS creates, schedules, and terminates processes, ensuring efficient use of CPU time.

Signup and view all the flashcards

File System Management by OS

The OS organizes and manages files and directories for storage and retrieval, providing a structured way to access data.

Signup and view all the flashcards

Programming Languages

Structured systems of communication used to write instructions for computers to execute tasks.

Signup and view all the flashcards

Benefits of Computer Networks

Networks enable resource sharing, communication, and distributed processing, enhancing efficiency and collaboration.

Signup and view all the flashcards

Fault Tolerance

A system's ability to continue functioning even if some components (nodes) fail.

Signup and view all the flashcards

Scalability

The ability to easily add or remove nodes to handle changes in demand, like increasing or decreasing traffic.

Signup and view all the flashcards

Command Line Interface (CLI)

A text-based interface where you interact with the operating system by typing commands.

Signup and view all the flashcards

Signals

Representations of data used for communication between devices.

Signup and view all the flashcards

Analog Signal

A continuous signal that varies over time, like sound waves.

Signup and view all the flashcards

Digital Signal

A discrete signal represented as binary values (0s and 1s).

Signup and view all the flashcards

Copper Cables

Electrical signals are transmitted through metal wires.

Signup and view all the flashcards

Fiber Optic Cables

Light signals are transmitted through thin glass fibers.

Signup and view all the flashcards

Wireless Mediums

Electromagnetic signals are used to transmit data over the air.

Signup and view all the flashcards

NRZ Encoding

A method of encoding binary data onto a signal by using high voltage for '1' and low voltage for '0'.

Signup and view all the flashcards

Amplitude Modulation (AM)

Encoding binary data by varying the amplitude (strength) of an analog wave.

Signup and view all the flashcards

Frequency Modulation (FM)

Encoding binary data by varying the frequency (number of waves in a given time) of an analog wave.

Signup and view all the flashcards

Phase-Shift Keying (PSK)

Encoding binary data by shifting the phase (position) of an analog wave.

Signup and view all the flashcards

Multiplexing

A technique to combine multiple signals and transmit them over a single channel.

Signup and view all the flashcards

Time Division Multiplexing (TDM)

Signals share a channel by taking turns in time slots.

Signup and view all the flashcards

Frequency Division Multiplexing (FDM)

Signals occupy separate frequency bands to share a channel simultaneously.

Signup and view all the flashcards

Networks: Facilitate Connectivity

Networks allow devices like computers and smartphones to communicate and exchange data with each other.

Signup and view all the flashcards

Networks: Share Resources

Networks enable shared access to resources like printers, servers, and the internet among connected devices.

Signup and view all the flashcards

Networks: Enable Scalability

Networks can accommodate growing numbers of devices without significant disruption.

Signup and view all the flashcards

Networks: Ensure Reliability

Networks often use redundant paths to maintain communication even if a part of the network is temporarily down.

Signup and view all the flashcards

Networks: Enhance Communication

Networks enable real-time interactions such as video conferencing and VoIP calls.

Signup and view all the flashcards

Network Nodes

The individual devices connected to a network, such as computers, routers, or switches.

Signup and view all the flashcards

Network Links

The physical or logical connections between network nodes, including cables, wireless signals, or virtual connections.

Signup and view all the flashcards

Network Topology

The arrangement of nodes and links within a network, examples include star, bus, and ring.

Signup and view all the flashcards

Network Protocols

Rules governing communication between devices on a network, such as TCP/IP and HTTP.

Signup and view all the flashcards

Network Bandwidth

The maximum data rate a network link can handle, measured in bits per second.

Signup and view all the flashcards

Network Latency

The delay in transmitting data from source to destination, measured in milliseconds.

Signup and view all the flashcards

Internet Origins

The name "Internet" stems from "inter-networking", connecting various computer networks using standard protocols.

Signup and view all the flashcards

OSI Model: Key Idea

A conceptual framework that divides network communication into seven layers, each handling a specific function.

Signup and view all the flashcards

IP Layer (Network Layer) Role

Responsible for routing packets across networks using IP addresses, managing packet fragmentation, and ensuring delivery.

Signup and view all the flashcards

HTTP Request Line

The first line of an HTTP request, containing the method (e.g., GET), URI (resource address), and HTTP version.

Signup and view all the flashcards

HTTP Status Code Groups

The first digit of an HTTP status code, indicating a general response category (e.g., success, error, redirection).

Signup and view all the flashcards

2XX: Success

HTTP status codes between 200-299 signal that the request was processed successfully. Ex: 200 OK, 201 Created.

Signup and view all the flashcards

4XX: Client Error

HTTP status codes 400-499 indicate that the client's request had an issue (e.g., wrong URL, missing data). Ex: 404 Not Found, 400 Bad Request.

Signup and view all the flashcards

Proxy

A server that acts as an intermediary between a client and another server, improving performance (caching) or providing security (hiding IPs).

Signup and view all the flashcards

Content-Type Header

An HTTP header specifying the data format of the message body (e.g., application/json, text/html).

Signup and view all the flashcards

HTML Structure

A markup language using tags (e.g., , ) to define the structure and content of web pages.

Signup and view all the flashcards

GET Request

An HTTP method used to retrieve data from a server, where parameters are visible in the URL. Ex: GET /search?query=cat.

Signup and view all the flashcards

127.0.0.1

The loopback address, which points to the local machine. Used for testing web servers without external connections.

Signup and view all the flashcards

TCP Retransmissions

When TCP doesn't receive an acknowledgment (ACK) within a set time, it retransmits the data to ensure reliable delivery.

Signup and view all the flashcards

TCP Checksums

TCP uses checksums to verify data integrity during transmission. If errors are detected, the data is retransmitted.

Signup and view all the flashcards

When is TCP not the best choice?

TCP is not ideal for applications that prioritize speed and real-time performance over reliability, such as video streaming, online gaming, and VoIP.

Signup and view all the flashcards

What is UDP?

UDP (User Datagram Protocol) is a faster alternative to TCP, prioritizing speed over reliability. It doesn't guarantee data delivery or order.

Signup and view all the flashcards

IPv4 Address Format

IPv4 addresses consist of four decimal numbers, each ranging from 0 to 255, separated by periods.

Signup and view all the flashcards

IPv6 Address Format

IPv6 addresses are written as eight groups of four hexadecimal digits, separated by colons.

Signup and view all the flashcards

What is HTTP?

HTTP (Hypertext Transfer Protocol) is a stateless application-layer protocol used for communication on the World Wide Web.

Signup and view all the flashcards

HTTP Statelessness

HTTP is stateless, meaning each request-response pair is independent; no memory is retained between interactions.

Signup and view all the flashcards

What are web resources?

Web resources are any identifiable item accessible via HTTP, such as web pages, images, videos, and files.

Signup and view all the flashcards

HTTP Methods

HTTP methods define the actions you can perform on web resources, such as GET, POST, PUT, DELETE, and more.

Signup and view all the flashcards

What is a URL?

A URL (Uniform Resource Locator) specifies the location of a web resource and how to access it.

Signup and view all the flashcards

URL Components

A URL has components: scheme, host, port, path, and query string.

Signup and view all the flashcards

HTTP/2 Improvements

HTTP/2 is a more efficient and performant version of HTTP, with features like request pipelining, server push, and binary encoding.

Signup and view all the flashcards

HTTP Message Structure

An HTTP message consists of a request or response, with headers and a message body.

Signup and view all the flashcards

RESTful Architecture

RESTful architecture uses standard HTTP methods for interacting with resources.

Signup and view all the flashcards

Study Notes

Text Encoding

  • Text encodings map characters to binary data for computer processing and transmission.
  • Standardization ensures text exchange across platforms without misinterpretation.

UTF-8

  • UTF-8 encodes all Unicode characters with variable byte lengths (1 to 4 bytes per character).
  • Supports multiple languages and symbols.
  • Backward compatible with ASCII.
  • Better than ASCII when handling non-English text or special characters.

Machine/Process Addressing

  • IP addresses (IPv4, IPv6) identify devices on the Internet.
  • Port numbers identify processes/applications on a machine.
  • Combined IP address and port number form a socket address for routing.

TCP vs. IP

  • TCP ensures reliable data transmission—packets delivered correctly in order.
  • TCP handles error detection, flow control, and congestion control.
  • IP is best-effort (unreliable); packets might be lost or out of order.

Reliable TCP Transmission

  • Three-way handshake establishes connections.
  • Acknowledgments (ACKs) confirm packet delivery.
  • Sequence numbers ensure order and detect missing packets.
  • Retransmissions compensate for lost packets.
  • Checksums validate data integrity.

Applications Not Ideal for TCP

  • Applications requiring low latency (e.g., video streaming, VoIP, online gaming) are better served by UDP.
  • TCP’s reliability features introduce delays.

DNS

  • DNS translates domain names (e.g., www.example.com) to IP addresses.
  • Simplifies accessing websites by using human-friendly names rather than numerical IP addresses.

DNS Structure

  • DNS Resolver: Queries DNS servers.
  • Root DNS Servers: Point to TLD servers.
  • TLD Servers: Handle specific top-level domains (e.g., .com).
  • Authoritative DNS Servers: Store DNS records and provide answers.
  • DNS Records: (e.g., A, AAAA, MX, CNAME, TXT).

Boolean Algebra

  • Boolean Algebra uses two values: True (1) and False (0).

Boolean Operator OR

  • The OR operator returns True if at least one input is True.
  • Truth table shows possible outcomes.

Binary Numbers

  • Most Significant Bit (MSB) is the leftmost bit with the highest value.
  • Least Significant Bit (LSB) is the rightmost bit with the lowest value.

Binary to Decimal Conversion

  • Convert binary 1101 to decimal 13 by using the place value of each bit in the binary number system.

Binary Addition Rules

  • Describes the four basic rules for adding two binary digits and a carry.

Signed Binary Numbers

  • Naive (Sign-Magnitude): First bit represents sign, rest is absolute value.
  • One's Complement: Inverts bits of the positive representation.
  • Two's Complement: Inverts bits and adds 1 (most common).

Floating-Point Values

  • Floating-Point values represent real numbers (including fractions and decimals) using a sign, exponent, and mantissa.

Character Set

  • A character set is a collection of recognizable characters (letters, digits, symbols).

Character Encoding

  • Character encoding maps characters from a character set to their binary equivalents.

UTF-8 vs. ASCII/ISO-8859-1

  • UTF-8 is more versatile than ASCII or ISO-8859-1.
  • Can encode many different characters from numerous languages, including emojis.
  • Backward compatible with ASCII; has variable-length encoding.

CPU Instruction Set

  • The instruction set comprises commands interpreted by the CPU.
  • Includes instructions for arithmetic, data movement, logic, and control flow.

Program vs. Process

  • A program is a set of static instructions.
  • A process is a program in execution, with allocated resources and state.

Operating Systems

  • Manage computer resources (CPU, memory, disk).
  • Handle processes (creation, scheduling, termination).
  • Organize files and directories (file system).
  • Protect system resources (security).
  • Provide user interfaces (CLI, GUI).

Programming Languages

  • Used to write instructions for computers.
  • Python, C++ are examples.

Networks

  • Facilitate communication between devices.
  • Share resources (e.g., printers, data).
  • Enable scalability and reliability.
  • Client-server model is common for centralized data handling.

Signals

  • Signals represent data for communication.
  • Analog signals are continuous, digital signals are discrete.
  • Transmission mediums (copper, fiber, wireless) affect the signal method (electrical, light, electromagnetic).

Binary Signal Encoding

  • NRZ (Non-Return-to-Zero): 1 is high, 0 is low voltage.
  • Other methods: Manchester Encoding, NRZ-Inverted.

Analog Signal Encoding

  • Modulation techniques alter signal characteristics (amplitude, frequency, phase).
    • AM (Amplitude Modulation): Amplitude changes based on binary input.
    • FM (Frequency Modulation): Frequency changes based on binary input.
    • PSK (Phase-Shift Keying): Phase changes represent binary input.

Multiplexing

  • Combine multiple signals onto a single channel to improve resource usage and reduce costs.
  • Time Division Multiplexing (TDM), Frequency Division Multiplexing (FDM), Wavelength Division Multiplexing (WDM).

Network Elements

  • Nodes: Devices connected to the network (computers, routers).
  • Links: Physical/logical connections between nodes (cables).
  • Topology: Arrangement of nodes and links (star, bus).
  • Protocols: Rules for communication (e.g., TCP/IP).
  • Bandwidth: Maximum data rate over a network link.
  • Latency: Delay in transmitting data.

Internet Protocol (IP)

  • Internet originated from inter-networking projects.
  • The OSI model is a conceptual framework to standardize networking.
  • The Network Layer (IP) handles routing of packets across networks using IP addresses.
  • IP packet includes header (source, destination, protocol) and payload (data).

IPv4 vs. IPv6

  • IPv4 addresses are four decimal numbers.
  • IPv6 addresses are eight groups of hexadecimal digits, with possible shortening rules for easier representation.
  • 127.0.0.1 points to the local host on the device.

TCP

  • TCP is a connection-oriented protocol for reliable data transmission.
  • Uses mechanisms like acknowledgments (ACKs), sequence numbers, retransmissions, and checksums.
  • TCP is suitable for applications that need reliability but not for low-latency operations.

HTTP

  • HTTP (Hypertext Transfer Protocol) is used for communication on the Web.
  • Uses methods (GET, POST, PUT, DELETE, HEAD, ... ) to interact with resources.
  • URLs specify the location of resources (scheme, host, path, query params).
  • HTTP/2 improvements include request pipelining, server push, and binary encoding.

HTTP Structures

  • HTTP messages have a request or status line, headers, and an optional body (containing data).
  • Headers provide metadata (Content-Type, Content-Length).

HTTP Status Codes

  • Codes grouped by first digit (1xx-5xx) indicate response type (informational, success, redirection, client error, server error).

Character Encoding

  • Character encoding is critical, especially for non-ASCII characters in HTTP.

Proxies/Gateways

  • Proxies improve performance or security (e.g., caching, hiding IPs).
  • Gateways encapsulate services or enforce security on the server side.

HTML Structure

  • HTML uses tags to structure web content (headers, paragraphs, etc.).
  • HTML is used to define document structure, embed multimedia, and provide links.

Web Content Layers

  • HTML (content), CSS (style), and JavaScript (behavior) make up layers of web content formats.

GET vs. POST

  • GET retrieves data; POST sends data to the server.

Loopback Address (127.0.0.1)

  • 127.0.0.1 points to the local machine; used in testing web applications.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Basic Economics Concepts Quiz
5 questions
Text Encoding and Networking Quiz
86 questions
Computer Networking and Text Encoding
91 questions
Use Quizgecko on...
Browser
Browser