Comp sci unit 3 terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

TCP

Transmission control protocol

Communication standard that enables application programs and computing devices to successfully exchange data packets over networks

For email/messaging, file transfers, web browsing

2
New cards

TCP connections:

Requires an established connection before transmitting data

Can sequence data

Can retransmit data if packets fail to arrive

Uses error-checking to guarantee that data arrives in intended state

Don’t support delivering continuous data

Can be slower than UDP

3
New cards

UDP

User datagram protocol

“Connectionless” communications standard that enables application programs and computing devices to exchange packets of data over networks

For: live streaming, online gaming, video chat

4
New cards

UDP connections:

Require no connection to start and end a data transfer

Cannot sequence or arrange data

Cannot retransmit data if packets fail to arrive

Use minimal error-checking that may not prevent all errors

Support delivering continuous data

Can be faster than TCP

5
New cards

IP address

Internet protocol address

Numerical label assigned to identify a device

Divided into network and host portion

6
New cards

Class A

Mask - 255.0.0.0

Addresses - 16,777,216

First octet - 0-127

/8

7
New cards

Class B

Mask - 255.0.0.0

Addresses - 65,536

First octet - 128-191

/16

8
New cards

Class C

Mask - 255.255.255.0

Addresses - 256

First octet - 192-223

/24

9
New cards

Subnet mask addresses

For each subnet mask, usable host IP addresses is less by 2

First address for network

Last address for broadcast (used to send data to all other hosts on subnet)

10
New cards

IPv4

uses 32-bit addresses

Represented by four 8-bit fields (octets)

Separated by periods

11
New cards

IPv6

Uses 128-bit addresses

Represented by eight 16-bit hexadecimal fields

Separated by colons

12
New cards

Public IP

Identifies you to the wider internet so that all the info you’re searching for can find you

13
New cards

Private IP

Used within a private network to connect securely to other devices within the same network

14
New cards

MAC address

Media access control address

Unique identifier assigned to a network interface controller to identify physical hardware in a network

15
New cards

MAC vs IP

MAC: designates the physical location of a device

IP: signifies the device’s global or internet-accessible identity

16
New cards

Subnet

Network inside a network

Makes networks more efficient

Data can travel a shorter distance without passing through unnecessary routers

17
New cards

Subnet mask

Like an IP address, but only for internal usage within a network

Used by routers to route data packets to the right place

Not indicated within data packets traversing the internet

18
New cards

Collision domain

Section of a network where packet collisions can occur

Collisions occur when 2 or more data packets try to occupy the same network channel at the same time, which can lead to packet loss

Problem when using hubs instead of switches

19
New cards

Network segmentation

Used to compartmentalise subnets to deliver unique security controls and services to each subnet

20
New cards

Hub

Like a router but doesn’t route frames intelligently

When it receives a signal, it will repeat it out on all connections except the one where it received the signal from

Physical (OSI) layer

21
New cards

Switch

Prevent collision by buffering Ethernet frames

Receives incoming data packets and redirect them to the destination on a LAN

Operates using MAC addresses to switch data on the ethernet layer

Internet (DoD) and data link (OSI) layer

22
New cards

Port number

Way to direct TCP/UDP connection to a specific process

Serve to identify the purpose of a connection

Come after an IP address, separated by a colon

23
New cards

OSI model layers

  1. physical

  2. data link

  3. network

  4. transport

  5. session

  6. presentation

  7. application

24
New cards

Physical layer

Responsible for the physical cable or wireless connection between network nodes

Protocols: Ethernet, DSL, fibre optic

25
New cards

Data link layer

Establishes and terminates a connection between two physically connected nodes on a network

Protocols: LCP, NCP

26
New cards

LLC

Logical link control

Identifies network protocols, performs error checking and synchronises frames

27
New cards

MAC

Uses MAC addresses to connect devices and define permissions to transmit and receive data

28
New cards

Network layer

Breaks up segments into network packets and reassembles them on the receiving end

Routes packets by discovering the best path across a physical network

Uses network addresses (IP) to route packets to a destination node

29
New cards

Layer 3 routing

Use IP address to decide where to forward packets through a hardware switch

Switch/router accepts a packet, looks at its destination address and makes a routing decision

30
New cards

Transport layer

Takes data transferred in the session layer and breaks it into ‘segments’ on the transmitting end

Responsible for reassembling the segments on the receiving end, turning it back into data that can be used

31
New cards

Transport layer carries out…

Flow control - sending data at a rate that matches the connection speed of the receiving device

Error control - checking if data was received correctly and if not, requesting it again

32
New cards

Session layer

Creates communication channels (sessions) between devices

Responsible for opening sessions, ensuring they remain open and functional while data is being transferred

Responsible for closing them when communication ends

33
New cards

Session layer checkpoints

Allows devices to resume data transfer from the last checkpoint if session is interrupted

34
New cards

Presentation layer

Prepares data for the application layer

Defines how 2 devices should encode, encrypt and compress data so it’s received correctly

Takes data transmitted by the application layer and prepares it for transmission over the session layer

Protocols: TLS, SSL

35
New cards

Application layer

Used by end-user software

Provides protocols that allow software to send and receive info and present meaningful data to users

Protocols: HTTP, FTP, SMTP

36
New cards

OSI model

Open systems interconnection model

Based on the concept of splitting up a communication system into 7 abstract layers, with each layer dependent upon the last

Data passes through each layer in sequence

37
New cards

DoD TCP/IP model

Department of defence transmission control protocol/internet protocol model

Condensed version of OSI model

Basis for the current internet

38
New cards

Packets

Basic unit of communication between source and destination in a network

Data sent through the network is broken into packets that are recombined by the destination devices

Dividing data allows the network to easily transmit, route, keep track of and retransmit lost or corrupted data

39
New cards
<p>IPv4 packets</p>

IPv4 packets

Contains header (20/24 bytes long) and data (variable length)

Header - IP addresses of source and destination, other fields that help route the packet

Data - actual content (e.g., string of letters, part of webpage)

40
New cards

Data at TCP/IP model

Encapsulates/modifies data according to a 4 layer procedure

Data is sent out through the layers, converted into packets and routed to their destination

Packets are received and reassembled by the destination device into data usable by apps

41
New cards

Data at application layer

Unencapsulated, not modified

Sends data to the transport layer

Encapsulation details are mostly hidden from the user, process and software developer through abstraction

42
New cards

Segments at transport layer

Protocols start the process

Data is wrapped with a header which contains a source and destination port, checksum and session establishment

TCP - segment

UDP - datagram

43
New cards

Checksum

Value that represents the number of bits in the segment

Used to detect data corruption

44
New cards

Packets at internet layer

Data wrapped in ‘IP envelope’ which contains source and destination IP addresses, info on protocol type (TCP) and version (v4/v6) and time to live (TTL)

45
New cards

TTL

Time to live

Amount of time (hops) that a packet is set to exist inside a network before being discarded by a router

46
New cards

Frames at network layer

Packet wrapped in ethernet frame which contains info on source and destination MAC addresses, Frame Check Sequence (FCS) for error correction and header and footer that mark the start and end of frame

47
New cards

Data at different layers of OSI

Encapsulated as data -> segments -> packets -> frames

Physical layer: data is known as bits - the raw ‘bit stream’ of 1s and 0s over the network, transmitted as electrical or wireless signals

48
New cards

DoD application protocols

SMTP, FTP, HTTP, HTTPS, DHCP, DNS, PING

49
New cards

DoD transport protocols

TCP, UDP

50
New cards

DoD internet protocols

IPv4, IPv6, ARP

51
New cards

DoD network protocols

Ethernet (802.3), Wi-Fi (802.11)

52
New cards

Transmission media

Provides a physical path between a transmitter and receiver

Channel through which data is sent from one place to another

Network (DoD) and physical (OSI) layer

53
New cards

LAN

Local area network

Collection of devices connected together in one physical location

54
New cards

WLAN

Wireless local area network

Group of co-located devices that form a network based on radio transmissions

55
New cards

WAN

Wide area network

Collection of LANs or other networks that communicate with each other

56
New cards

Problems from unauthorised network access

Data breaches, which can also lead to ransomware.

Identity theft - access to one’s personal details through their personal network can give hackers substantial content to steal the identity of the person whose info they are accessing

Disruptions - shutting down systems or making it more difficult to access data

57
New cards

Firewall

Acts as a gatekeeper for network traffic, filtering and controlling access to prevent unauthorised access and protect against cyberattacks

Examines incoming and outgoing data based on predefined security rules, allowing legit traffic while blocking malicious or unwanted connections

Transport or internet (DoD) and network or transport (OSI) layer

58
New cards

Packet filtering

Involves inspecting incoming and outgoing data packets based on rules

Can be based on IP addresses, port numbers, and protocols

Can block traffic that doesn't match the established rules, preventing unauthorised access

59
New cards

Stateful inspection

Enhances packet filtering by keeping track of active connections and the state of the packets within a session

Allows the firewall to make more informed decisions about which packets to allow or block based on the context of the connection

60
New cards

Proxy services

Act as intermediaries between the client and the destination, inspecting the content before it's allowed onto the network

Can help prevent malicious content from entering the network

61
New cards

OSI vs TCP/IP model

Similarities - describe how info is transmitted between 2 devices, use encapsulation where data is packaged into headers and trailers that contain info about the data and how it should be handled

OSI - delivery is guaranteed

TCP/IP - more reliable

62
New cards

DoD layers

Application

Transport

Internet

Network

63
New cards

Application layer role (DoD)

Provides network services directly to user applications

64
New cards

Transport layer role (DoD)

Ensures reliable data transfer between devices, manages error detection and correction, flow control

65
New cards

Internet layer role (DoD)

Determines the best path for data to travel across networks, handles logical addressing and routing

66
New cards

Network layer role (DoD)

Manages the physical transmission of data over network media

67
New cards

Router

Determines the best path for data packets to travel across an internetwork

Utilises routing tables and protocols to make routing decisions

Internet (DoD) and network (OSI) layer

68
New cards

WAP

Wireless Access Point

Allows wireless devices to connect to a wired network

Acts as a bridge between the wired network and wireless clients

Network (DoD) and physical and data link (OSI) layer

69
New cards

Bandwidth

The maximum rate at which data can be transferred through a network

70
New cards

Layer 2 switching

Uses MAC address table that identifies the MAC address of the connected device and port number

Enables the switch to direct frames towards the correct destination

71
New cards

TCP vs UDP

TCP - reliable, provides extensive error-checking mechanisms, sequencing to ensure packets arrive in order

UDP - no acknowledgement segment, faster, simpler, more efficient, no retransmission of lost packets

72
New cards

TCP packet architecture

20-60 byte variable length header

Heavy-weight

Byte stream connection type

Low overhead (higher than UDP)

73
New cards

UDP packet architecture

8 byte fixed length header

Lightweight

Message stream connection type

Very low overhead

74
New cards

Subnetting

Process of dividing a large network into smaller networks

Saves IP addresses, keeps networks faster and protects sensitive data

Contains broadcast domains to minimise bandwidth consumption

75
New cards

Default gateway

Node that forwards the packet to other networks when there’s no routing info about the destination

76
New cards

DNS

Domain name system

Translates human-readable domain names into machine-readable IP addresses, enabling internet connection

77
New cards

Gateway

Connects 2 networks with different transmission protocols

Physical network gateway includes network interface cards (NICs), inputs and outputs and software for translating protocols

Internet (DoD) and network (OSI) layer

78
New cards

Network topology

Arrangement of different elements in a computer network

e.g., bus, ring, star, point to point

79
New cards

Network design

Efficient designs reduce the number of hops and bottlenecks, improving data flow across the network

80
New cards

Ping

Helps check the reachability of a server/IP address

Measures the round-trip time for messages sent from computer to destination and back

Verifies whether a device/server is active and responsive

81
New cards

Traceroute

Traces the path that packets take from computer to a remote server/host

Provides a detailed map of the route the data packets follow across the network

Shows how long it takes to travel from one hop (router/intermediary device) to the next

82
New cards

Malware

Any type of malicious software designed to harm or exploit any programmable device, service or network

83
New cards

Malware effects

Costs people and businesses money and can lead to data loss, identity theft and other serious problems

84
New cards

Ransomware

Locks up or encrypts files so user can’t access them, requiring a ransom to restore access to the files

85
New cards

Virus

Programs or code that self-replicates or copies itself in order to spread to other devices or areas of the network

86
New cards

Rootkit

Tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity

87
New cards

Spyware

Enters a user’s computer, gathers data from the device and user and sends it to third parties without their consent

88
New cards

Backdoors

Any method by which authorised and unauthorised users are able to get around normal security measures and gain high level user access on a computer system, network or software application

89
New cards

Phishing

Way attackers trick users into giving them personal info, usually through fraudulent emails or text messages pretending to be from a large, trusted and known org

90
New cards

Reliance on software

Software systems, the algorithms that drive them and the the hardware devices they operates on are more powerful and capable than ever

91
New cards

Social networking

Computer networks have been used to socialise, chat and share information

92
New cards

Cyber safety

Refers to the ways we protect ourselves, data and others in the digital world

93
New cards

Cyber safety importance

Proliferation of cyber crime, ease of accessing people’s private data and overreach of governments

94
New cards

Internet information

Large volumes of info (which may be unsupported, unverifiable, misleading or incorrect) available through the internet

95
New cards

Class

Blueprint for an object

96
New cards

Object

New instance of a class

97
New cards

Attributes

Data contained within an object

98
New cards

Methods

Functions callable on an object or attribute

99
New cards

Instantiation

To create an “instance” of a class (an instance is called an object)

100
New cards

Using methods

Method or operation is a function that can only act on a specific class/object. Use dot notation to access an object’s methods or attributes.