GCSE OCR Computer Science: Networks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

What is a network?

A collection of computers or electronic devices, that are connected together for the purpose of communication.

2
New cards

Give six advantages of using a LAN.

- File sharing: network users can access the same files, work collaboratively on them and copy files between machines.

- Hardware sharing: users can share hardware, such as a printer.

- Internet connection: the internet connection can be shared between every device connected to the LAN.

- Software installing, software can be installed and updated on all computers, rather than one by one.

- Communication: LAN users can communicate cheaply and easily.

- User accounts can be stored centrally, so users can log in from any device on the network.

3
New cards

Give four disadvantages of using networks.

- Cost: digital equipment is needed to allow computers to communicate.

- Management: networks require management by technical staff, such as a network manager.

- Spread of malware: viruses and other forms of malware can easily spread across an improperly secure network.

- Hacking, once a device is connected another device, it is possible that data may be accessed without the device owner's permission.

4
New cards

What is a LAN?

A local area network; a network that is spread over a small geographical area, where all the hardware for the network is owned by the organisation that uses it.

5
New cards

What is a WAN?

A wide area network; a network that that consists of multiple LANs connected together, is spread over a large geographical area, and the infrastructure is hired not owned outright.

6
New cards

What is a NIC?

A network interface card; an internal piece of hardware that allows a device to connect to a network.

7
New cards

What is a Switch?

A switch is a networking device, that connects devices on a LAN. They receive data in units called frames from one device and transmit this data to the device on the network with the correct MAC address.

8
New cards

What is a hub?

A hub is a networking device, that allows devices to connect to a network. Hubs broadcast the signals they receive to all connected computers, unlike a switch, which only sends data to the intended recipient. This greatly decreases network performance due to the amount of transmissions.

9
New cards

What is a router?

A router is a networking device that transmits data between networks in packets. Alternatively a router can mean a device which contains a hub, modem and WAP, to allow devices to connect to the internet.

10
New cards

What is a modem?

Stands for modulate/demodulate: a networking device that converts data intended for communication between different formats.

11
New cards

What is transmission media?

A method of carrying data signals from one computer to another. They are either wired or wireless.

12
New cards

What are CAT 5e and CAT 6 cables?

Transmission media that consist of "twisted pair cables" containing pairs of copper wires, twisted together to reduce internal interference. They are the most common kind of Ethernet cable.

13
New cards

What are coaxial cables.

Transmission media, that consist of a single coper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference.

14
New cards

What are fibre optic cables?

Transmission media that use light to transmit data, through cables. They are high performance, therefore very expensive, they can transmit data over very large distances without loss of signal quality.

15
New cards

What is a wireless network?

A network that uses radio waves to transmit data.

16
New cards

What is the difference between a WAP and a hotspot?

A WAP is essentially a switch, that allows devices to connect wirelessly, whereas a hotspot is just a location where you can connect to a WAP.

17
New cards

What is a WAP?

A wireless access point, a device that uses a radio transceiver to allow wireless connections to a network, in effect creating its own network.

18
New cards

What is needed to set up a wireless network?

You need a WAP(wireless access point), and the devices need wireless capability.

19
New cards

What is WiFi?

Wireless Fidelity; a standard for connecting devices on a wireless network using radio waves.

20
New cards

What is meant by a "frequency band", and "channels".

A frequency band is a range of frequencies that data is transmitted on, a channel is a range of frequencies within a band. They both help to reduce interference.

21
New cards

What is a client-server network?

A network managed by a server, where the devices connected to it are the clients. The clients send requests to the server, and the server processes the requests and responds.

22
New cards

Give 5 advantages of a client-server network.

- They make it easier to keep track of files, as they're stored centrally.

- Easier to perform back-ups.

- Easier to install and update software.

- Easier to manage network security(e.g anti-malware software and user access levels).

- Servers are very reliable and always on.

23
New cards

Give 3 disadvantages of a client-server network.

- They are expensive to set up and need IT specialists to maintain the network and server.

- Server dependence - if the server goes down, all clients lose access to the network.

- The server may become overloaded if too many different clients are accessing it at once.

24
New cards

What is a peer-to-peer network?

A network, where all devices are equal, connecting directly to each other without a server. Files are stored on individual devices, and are shared with others.

25
New cards

What are 2 advantages of a peer-to-peer network?

- They are easy to maintain: they don't need any expertise or expensive hardware.

- No dependence on server: if one device fails, the whole network isn't lost.

26
New cards

Give 4 disadvantages of a peer-to-peer network.

- No centralised management: devices need their updates and security installed individually. Backups are more complicated.

- Copying files between devices creates duplicate files - its easy to lose track of whats stored where and which files are up to date.

- Peer machines are less reliable and data may be lost if one fails.

- Machines are prone to slow down when other devices access them.

27
New cards

What is a star topology?

A type of network, where all the devices are connected to a central node, which is usually a switch or server.

28
New cards

What are 3 advantages of a star topology?

- If a device fails, the rest of the network is unaffected.

- Its simple to add more devices to the network.

- It has better performance than alternatives, as data goes straight to the central node, so devices can all transmit data at once, meaning there are very few data collisions.

29
New cards

What are 2 disadvantages of a start topology?

- In wired start topologies, every devices needs a cable to connect to the central node, this can be expensive.

- If there is a problem with the central node, then the whole network is affected.

30
New cards

What is a bus topology?

A network arrangement, where devices are arranged in a line, all connected to a single backbone cable with a terminator at each end. Devices send data in both directions, meaning lots of data collisions occur, slowing the network.

31
New cards

What is a ring topology?

A network arrangement, where data moves in one direction around the ring, preventing collisions, but only one device can send data at a time and data passes through many devices, before reaching its destination.

32
New cards

What is a mesh toplogy?

A network arrangement, where the devices are either directly or indirectly connected to every other one without the need for one central server or switch. Data is sent along the fastest route from one device to another.

33
New cards

What is an advantage of a mesh network?

There is no single point of failure in the network, if a device fails, then data is sent along a different route.

34
New cards

What is a disadvantage with a mesh network?

Wired mesh networks require lots of cabling to connect all the devices together, this can be expensive.

35
New cards

What is meant by a "full" or "partial" mesh?

A full mesh is where every device is connected to every other device. In a partial mesh, not all devices are fully connected.

36
New cards

What is a protocol?

A set of rules for how devices communicate and how data is transmitted across a network

37
New cards

What is a MAC address?

MAC addresses are unique identifiers so a device can be found on a network, they are made up of 48 or 64 bit binary numbers.

38
New cards

What is an IP address?

A unique address for each computer device on a network that uses TCP/IP.

39
New cards

What is a static IP address?

A permanent IP address. They are used to connect printers on a LAN, and for hosting websites on the internet.

40
New cards

What is a dynamic IP address?

An IP address assigned when a device logs on to a network, meaning that it may have a different address each time it connects.

41
New cards

Whats the difference between an IP and a MAC address?

MAC addresses are linked to hardware, whereas IP addresses aren't, they're either assigned manually(static) or automatically(dynamic).

42
New cards

How is data sent between networks?

- Data sent on networks is split into equal sized packets.

- Every packet of data has a header - which contains the control information, the control information is like the envelope of a letter, and includes the destination address, the source address, and the packet number.

- The packets payload is like the letter inside an envelope, it is the whole reason the packet was sent and contains its contents.

- Packets may also have a checksum number, a checksum number is a form of validation used to check that the payload data has not been corrupted during transit. The sending and receiving devices both calculate a checksum value by performing a function on the payload data, if the values match, then the data has been received correctly.

43
New cards

What is packet switching?

Packet switching is how routers direct data packets on the internet and other IP networks.

44
New cards

What are the steps involved in packet switching?

- The sending device splits the data into packets to be sent across the network. Each packet is given a packet number to show the order of the data.

- The routers in the network read the packet header and decide which way to send the packet next, according to the IP rules.

- The way the data is sent changes depending on network traffic so the packets can take different routes. If a router receives too many packets at once it may prioritise some over others.

- As the packets take different routes, they can arrive in the wrong order. The receiving device uses the packet numbers to reassemble them in the right order.

- Some packets go missing in transit, so the receiving device checks periodically that all the packets have been received. If it hasn't received them within a certain time, then it sends a timeout message back to the sending device.

- If all the data is received and the checksums match, a receipt confirmation is sent to the sending device.

45
New cards

What is TCP/IP?

A protocol which dictates how data is sent between networks. It is made up of two protocols - TCP and IP.

46
New cards

What is TCP?

Transmission control protocol; sets the rules for how devices connect on a network. It's in charge of splitting the data into packets and reassembling the packets back into the original data once they reach the receiving device. It's also responsible for checking the data is sent correctly and delivered.

47
New cards

What is IP?

A protocol responsible for packet switching.

48
New cards

List 6 other protocols, and explain their functions.

HTTP - Hyper text transfer protocol: used by web browsers to access websites and communicate with web servers.

HTTPS - HTTP secure: a more secure version of HTTP, encrypts all information sent and received.

FTP - File transfer protocol: used to access, edit and move files between devices on a network, e.g. to access files on a server from a client computer.

POP 3 - Post office protocol v3: used to retrieve emails from a server. The server holds the email until you download it, at which point it is deleted from the server.

IMAP - Internet message access protocol: used to retrieve emails from a server. The server holds the email until you actually delete it - you only download a copy. Used by most web-based clients.

SMTP - Simple mail transfer protocol: used to send emails. Also used to transfer emails between servers.

49
New cards

What are network protocols divided into?

Layers.

50
New cards

What is meant by a layer?

A layer is a group of protocols which have similar functions. Layers are self-contained, so protocols in each layer can do their job without needing to know what's happening in other layers. In the order of layers, each layer serves the layer above it - it does the hidden work needed for an action on the layer above.

51
New cards

What are the four layers and protocol examples?

Layer 4 - Application layer: Turning data into websites and other applications and visa versa. E.g. HTTP, FTP, SMTP.

Layer 3 - Transport layer: Controlling the flow of data. E.g. packet splitting. E.g. TCP.

Layer 2 - Internet Layer: Making connections between networks, directing data packets and handling traffic. Used by routers. E.g. IP.

Layer 1 - Link layer: Passing data over the physical network. Responsible for how bits are send as electric signals over cables, wireless and other hardware. E.g. Ethernet.

52
New cards

What are 3 advantages of using layers?

- It breaks network communication into manageable pieces. This helps developers concentrate on only one area of the network without having to worry about the others.

- As layers are self contained, they can be changed without the other layers being effected.

- Having a set of rules for each layer, forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way.

53
New cards

What is the internet?

The internet is a WAN which connects devices from all over the world, using the TCP/IP protocol.

54
New cards

What is the difference between the world wide web and the internet?

The internet is the physical infrastructure that allows devices to communicate, whereas the world wide web is a collection of websites that are hosted on web servers.

55
New cards

What are URLs?

Addresses used to access web servers and resources on them.

56
New cards

What is a DNS?

A domain name server; a computer that translates a websites domain name into its IP address. The internet has a network of domain name servers, meaning you don't need to remember IP addresses to access websites - you can use domain names instead.

57
New cards

What is hosting?

When a business uses its servers to stores the files of another organisation.

58
New cards

What is the cloud?

General storage of user files accessed through online software on the internet.

59
New cards

Give six advantages of using the cloud.

- Users can access files from any connected device.

- It's very easy to increase the amount of storage available for users.

- No expensive hardware is needed by the user to store data.

- No need to pay IT staff to manage hardware.

- Cloud host may provide security and backups for you.

- Cloud software is usually updated automatically.

60
New cards

Give five disadvantages of using the cloud.

- A connection to the internet is needed to access files.

- Dependent on the host for security and backups.

- Data in the cloud can be vulnerable to hackers.

- Unclear who has ownership over cloud data.

- Subscription fees for using cloud storage and software may be expensive.

61
New cards

What is a virtual network?

A virtual network is a network that is entirely software based, they are created by partitioning off some of a physical networks bandwidth to form a separate network.

62
New cards

What is a VPN?

A virtual private network; a type of virtual network that can be used to send data securely over a large network.

63
New cards

What is a passive attack?

When someone monitors data travelling on a network and intercepts any sensitive information they find without permission.

64
New cards

What is a good defence against passive attacks?

Data encryption.

65
New cards

What is an active attack?

When a hacker attempts to modify or delete data, or to prevent a network from operating correctly.

66
New cards

What is a good defence against active attacks?

Firewalls.

67
New cards

What is a insider attack?

When someone within an organisation exploits their network access to steal information.

68
New cards

What is a brute force attack?

An attack used to gain information by cracking passwords through trial and error, using automated software.

69
New cards

What is a DoS attack?

A denial of service attack; a form of active attack where a hacker tries to stop users from accessing a part of a network or a website. They often involve flooding the network with useless traffic making it slow or inaccessible.

70
New cards

What is malware?

Malicious software installed on someones device without their knowledge or consent.

71
New cards

What are viruses?

Malware hidden in another program that replicates itself usually to cause damage by deleting or modifying files.

72
New cards

What are worms?

Self-replicating malware that does not necessarily need to embed itself in another program.

73
New cards

What are trojans?

Malware disguised as legitimate software, that are installed by users under the pretence that they are useful.

74
New cards

What is ransomware?

Malware that interferes with the user's operations of a computer or threatens to do so unless a sum of money is paid, either by actually encrypting files or by threatening alone.

75
New cards

What is spyware?

Software that gathers information about a user or organisation and sends it back to a hacker.

76
New cards

Give one example of spyware.

Keyloggers.

77
New cards

What are rootkits?

Malicious software that alters permissions to give malware and hackers administrator level access to systems.

78
New cards

What are backdoors?

An approach whereby malware opens an access channel to outsiders that can bypass normal security checks.

79
New cards

What is social engineering?

A way of gaining sensitive information or illegal access to networks by influencing people, often the employees or large companies.

80
New cards

What is phishing?

When criminals send emails or texts to people claiming to be from a well known business, the messages often contain links to fake versions of the companies website. They then get the user to enter their personal information, and if they do the criminals can use it to access the victims genuine account.

81
New cards

What is data interception and theft?

Where data is intercepted during transmission, using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

82
New cards

What is an SQL injection?

SQL injections are pieces of malicious SQL code entered into a websites input box, which then reveals sensitive information without the permission of the website owner when executed.

83
New cards

What is way to prevent an SQL injection?

Validating all input to text boxes to check for SQL commands.

84
New cards

Give five qualities of a good network policy.

- The network is regularly tested to find and fix security weaknesses and investigate problems if they happen.

- Use passwords to prevent unauthorised people from accessing the network.

- Enforce user access levels to limit the number of people with with access to sensitive information.

- Install anti-malware and firewall software to prevent and destroy malicious software attacks.

- Encrypt sensitive data.

85
New cards

What is penetration testing?

When potential attacks are simulated on a network to identify possible weaknesses in a networks security, which are then reported back and fixed.

86
New cards

What is network forensics?

When investigations are undertaken to find the cause of attacks on a network, by capturing data packets as they enter the network, to analyse and discover how the network was attacked and how to prevent future attacks.

87
New cards

What is the purpose of passwords?

To prevent unauthorised users from accessing a network.

88
New cards

What are the features of a strong password?

- Many characters long.

- Uses a combination of letters numbers and symbols.

- Changed frequently.

89
New cards

What are user access levels?

Rules which dictate which parts of a network different groups of users can access.

90
New cards

What is anti-malware software?

Software that is designed to detect and remove malware, before it damages an organisations network and the devices on it.

91
New cards

What is a firewall?

Software and/or hardware placed between on network and another node, in order to control inbound and outbound traffic. Firewalls make use of predetermined rules in order to exert control over the flow of data.

92
New cards

What is encryption?

The process of encoding data so that it can only be understood by its intended recipient.

93
New cards

What are often the weak point in secure systems?

People.