Computer Science Summary
Computer Science Summary
Trace table: Table that tracks what happened to the input depending
on the instruction.
(11001110)
a
=128+64+32
+16+8+4+2
=(206)
10
2. Decimal (base 10):
You can convert from decimal binary and decimal hex. An
example is:
2206 r 16 206 r
(206)18 (206)1016
2103 12 14
=(1100110)22
2 s i =(CE)
16
s
vid-las
d
3. Hexadecimal (base 16):
You can convert from hex denary. For example:
(CE)If (C )(16)+(E)(16)=206
1 2
=(206) 10
0 1 0
0 0 0
0 0 0
0 1 1
0 0 1
5. NOR: True if both are false. Relationship is opposite of OR, for
example: &
A B AB '
1 1 0
1 0 0
0 1 0
0 0 1
6. XOR:
True if both variables are different. Relationship is subtraction, for
example:
A B AB
1 1 0
1 0 1
0 1 1
0 0 0
ALU: The arithmetic logic unit; it does all the arithmetic (+, -) and
logic calculations (logic gates). Sometimes called the core. Some
CPUs have 2 to calculate at the same time.
MAR and MDR: MAR gives the address data, and MDR is to be written/
read.
Extranet:
• Is a controlled private network allowing people to gain
information without granting access to the company’s entire
network.
• Part of a private part of a website.
• Restricted to users without passwords.
P2P (Peer-to-Peer)
• It is a network model that computers exchange files.
• Described as “equal client systems,” instead of getting files
from servers, they swap files
Standards
• Standards are important to have common ground between
manufacturers.
• Without standards, communication would be impossible.
OSI Model
Apps
Presentations
Sessions
Transport
Network
Data Link
Physical
VPN Fundamentals
1. Encryption: Process of encoding data so that only a computer
with the right decoder can read it.
2. Tunneling: Involves establishing and maintaining a logical
network connection. On this network connection, packets are
encapsulated within another base and transmitted between VPN
clients.
3. Telecommuting: With a VPN, it is possible to connect a LAN
that is protected from outside access. This makes it possible to work
online.
Protocol
• Set of rules for data communication over a network.
Data Packet
• Data is anything suitable for use with a computer. Packets are
a small unit of data used in network communication.
Essential Protocol Functions
2. Flow Control
• Ensures the rate at which a sender is transmitting data is in
proportion to the receiver’s receiving capabilities.
• Sends data much faster.
3. Deadlock
• A situation where two nodes are trying to access the same
node at the same time, causing neither to be able to proceed.
• To fix this, they both stop and retry. They do this due to the
protocol.
4. Congestion Control
• A network state where a node carries so much data that it
can deteriorate network quality, resulting in queue delay or
data packet loss and blocking of new connections.
5. Error Checking
• Detects noise or other problems introduced into the data while
transferring.
• Often uses parity bits calculated to be 0 or 1.
Factors That Affect Network Speed
Primary:
1) Traffic.
Secondary:
1) Time.
2) Distance.
3) Infrastructure.
Tertiary:
1) Environmental issues.
2) Infrastructure limitations.
3) Type of data being transmitted.
Data Compression
• Involves encoding information to use fewer bits than the
original entity.
There are two types:
1. Lossless: Original Compressed Restored.
2. Lossy: Original Compressed Smaller.
Advantages of Compression:
Backups, file transfer, encryption, media file transfer.
Characteristics of Media:
Security, reliability, cost, speed.
3 types are:
1. UTP (Unshielded Twisted Pair):
• Security: Medium if encrypted
• Reliability: Susceptible to EMI
• Cost: $1 per meter
• Speed: 100 Mbps - 1 Gbps
• Material: Metal
2. Fibre-Optic:
• Security: Very good
• Reliability: Fragile
• Cost: $2–8 per meter
• Speed: 5–100 Gbps
• Material: Glass
3. Radio Waves:
• Security: Very bad
• Reliability: Susceptible to interference
• Cost: $0 per meter
• Speed: 5–200 Mbps
• Material: WLAN/Wi-Fi
Packet:
Unit of data
Packet Switching:
Type of network that sends small packets. Packets are routed
through a network based on destination addresses.
Wireless Network:
Pros:
• Uses unlicensed radio spectrum.
• Can be set up without cabling for LANs.
• Wi-Fi can support roaming between access points.
• Global standards.
• Setup costs are minimal.
Cons:
• Interference.
• Limited range.
• WEP (security concern).
• Access points.
• Health concerns.
Hardware:
• Node
• Wireless interface card
• Radio waves
• Router
Software:
• Network operating system
• Protocol stack
• Applications
3G (Third Generation):
• Primary way phones access the internet.
• Fast.
Security Properties:
1. Confidentiality
2. Integrity: Maintaining accuracy of data.
3. Availability(DoS attacks).
3 Types of Authentication:
1. One factor (something you know).
2. Two factor (something you have).
3. Three factor (something you are).
Firewalls:
• Hardware or software.
• Control traffic.
• Analyze data packets based on predetermined set of rules.
User ID:
Pros:
• Access rights to the network.
• User groups can be created to manage user rights.
Cons:
• User ID can be stolen.
• Can be bypassed.
• Does not protect against intercepting messages in the
network.