A Level AQA 4.9 Fundamentals of communication and networking | 4.9.3 The Internet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Define the Internet

A network of interconnected computer networks which uses an end-to-end communication protocol

2
New cards

Define what is a protocol

A set of rules that allows for communication between devices

3
New cards

What is the primary structure of the Internet

The Internet is mostly a wired network, with cables that pass under oceans to connect different continents.

4
New cards

What does ISP stand for

Internet Service Provider

5
New cards

What is an Internet Service Provider (ISP)

An ISP is a company which provides its customers with access to the internet

6
New cards

What are the largest ISP providers

The largest ISP providers are national companies

7
New cards

What are the largest ISP providers called

National Internet Service Provider

8
New cards

How do National Internet Service Providers provide access to the internet

They provide internet access to smaller regional and local ISPs, from whom homes and business can buy access to the internet

9
New cards

Define a packet

Is a container in which data is transmitted over networks.

10
New cards

What is packet switching

Packet switching is a method of transmitting data where messages are broken into smaller packets and sent individually over the network. Each packet is routed independently to the destination, where they are reassembled into the original message

11
New cards

What is the role of a router in packet switching

A router directs data packets between networks. It examines the header of each packet to determine the best path for it to reach its destination based on current network conditions.

12
New cards

How does a router determine the best path for a packet

A router uses routing tables and algorithms to decide the most efficient route for a packet based on factors like network congestion and distance.

13
New cards

What is a hop in networking

A hop is each time a packet passes through a router on its way to the destination. The number of hops a packet can take is limited by its Time to Live (TTL) value.

14
New cards

What is the Time to Live (TTL) value in a packet

The TTL value is a counter that decrements each time a packet passes through a router. When the TTL reaches zero, the packet is discarded to prevent it from circulating indefinitely.

15
New cards

What is the purpose of packet switching

Packet switching improves network efficiency and reliability by allowing multiple packets to take different paths to their destination, reducing congestion and ensuring data can still reach its destination even if some routes fail.

16
New cards

How do routers handle congestion

Routers use algorithms to manage congestion by selecting alternative paths for packets, prioritizing certain types of traffic, and sometimes dropping packets when the network is too congested.

17
New cards

What is the difference between packet switching and circuit switching

Packet switching breaks data into packets and sends them independently, while circuit switching establishes a dedicated path for the entire communication session.

18
New cards

What is the role of routing tables in routers

Routing tables store information about network paths and are used by routers to determine the best route for each packet.

19
New cards

How do routers contribute to network security

Routers can implement security measures like firewalls and access control lists (ACLs) to filter traffic and protect the network from unauthorized access.

20
New cards

What are the primary components of a packet

  • Senders address

  • Receiver’s address

  • Packet contents

  • Time to live (TTL)

  • Sequence number

21
New cards

What is the purpose of the Senders address in a packet

Identifies where the packet was sent from, and therefore where the response should be sent to.

22
New cards

What is the purpose of the Receiver’s address in a packet

Identifies the packet’s indented recipient, allowing it to be routed to the correct device.

23
New cards

What is the purpose of the Packet contents in a packet

Where the packet’s intended recipient, allowing it to be routed to the correct device

24
New cards

What is the purpose of the Time to live (TTL) in a packet

Holds the number of hops a packet can go through before being dropped

25
New cards

What is the purpose of the Sequence number in a packet

Contains the number of packets in a message and identifies a packet’s position in relation to others. This allows packets to be reassembled in the correct order and allows missing packets to be identified

26
New cards

What is the main job that both Routers and Gateways do

They connect different networks, allowing packets to reach their destination

27
New cards

Define routers

28
New cards

Where and why are routers used

Used in networks to direct data packets efficiently.

29
New cards

Define Gateways

A network point that acts as an entrance to another network.

30
New cards

Where and why are gateways used

Connect different networks and translate data between protocols.

31
New cards

How is routing achieved across the Internet

Routers use routing tables and protocols to find the best path for data packets.

32
New cards

What does URL stand for

Uniform Resource Locater

33
New cards

Define a URL (Uniform Resource Locater)

A reference to a web resource specifying its location and retrieval method.

34
New cards

What are the parts of a URL

  • https://

  • www

  • bbc.co.uk

  • /news

  • /technology

  • /index

  • /html

35
New cards

What is the purpose of the https:// part of a URL

The protocol being used to access the file.

36
New cards

What is the purpose of the www part of a URL

Subdomain for world wide web. This will usually point to the web server hosted at the following domain.

37
New cards

What is the purpose of the bbc.co.uk part of a URL

A Domain. BBC is the name of the organisation. .uk is a top-level domain (TLD) and .co is a second-level domain (2LD)

38
New cards

What is the purpose of the /news part of a URL

Directory of the file being requested

39
New cards

What is the purpose of the /technology part of a URL

Subdirectory of the file being requested

40
New cards

What is the purpose of the /index part of a URL

Name of the file being requested

41
New cards

What is the purpose of the .html part of a URL

The file’s extension. Hyper text markup language (HTML) which is frequently used for creating web pages

42
New cards

Examples of top level domains (TLDs)

  • .com

  • .org

  • .net

43
New cards

Define Domain names

Identifies an organisation or individual on the Internet. They use alphanumeric characters which make them easy for humans to remember

44
New cards

What does 2LD stand for

Second level domain

45
New cards

How are domain names organized

Hierarchically: TLD (e.g., .com or .uk), 2LD (e.g., example or .co), and subdomains (e.g., news.example.com or bbc.co.uk ).

46
New cards

What does FQDN stand for

Fully Qualified Domain Name

47
New cards

Define the term Fully Qualified Domain Name (FQDN)

Is a domain that specifies an exact resource and can be interpreted in only one way. An FQDN will always include the server’s host name.

<p>Is a domain that specifies an exact resource and can be interpreted in only one way. An FQDN will always include the server’s host name.</p>
48
New cards

What does IP stand for

Internet Protocol

49
New cards

Define the term IP address

Uniquely identifies devices on a network, such as the Internet. Since IP addresses are hard to remember, domain names are used to map to IP addresses. As they are a human-friendly representation of an IP address

50
New cards

True or False | Does every Computer have an IP address

True.

An IP address is assigned to every computer on the Internet and every device that communicates on a network

51
New cards

What does DNS stand for

Domain Name System

52
New cards

What is the purpose of the domain service and DNS system

Translates domain names to IP addresses using DNS servers.

53
New cards

What service does an Internet registry provide

Internet registries manage the allocation and registration of domain names and IP addresses.

54
New cards

What do Internet registries do

They ensure the uniqueness of domain names and IP addresses and maintain a centralized database to prevent conflicts.

55
New cards

What is a Firewall

A firewall is a combination of hardware and software that isolates an organisation’s internal network from the Internet at large, allowing some packets to pass and blocking others.

<p>A firewall is a combination of hardware and software that isolates an organisation’s internal network from the Internet at large, allowing some packets to pass and blocking others.</p>
56
New cards

Name 3 firewall techniques

  • Packet filtering

  • Stateful inspection

  • Proxy server

57
New cards

What is Packet filtering

A firewall technique used to accept or block packets based on their source IP address or protocol (determined by port number). Network administrators can specify IP addresses or protocol

58
New cards

What is Stateful inspection

Examines the contents of a packet before allowing it through the firewall. Some firewalls keep track of current network connections, filtering out packets that are not related to ongoing network activity.

59
New cards

What is a Proxy server

It is a server that sits between a public network and a privet network. They manage every packet that passes between the two networks

<p>It is a server that sits between a public network and a privet network. They manage every packet that passes between the two networks </p>
60
New cards

Firewalls are said to act as a proxy when …

They control the movement of packets between public and private networks.

61
New cards

Describe when a device in a private network sends a packet through a firewall and into a public network

The packet’s “sender” address is that of the firewall rather than the device’s private IP address. This provides some degree of anonymity to devices on probate networks as their private address is never sent beyond the private network

<p>The packet’s “sender” address is that of the firewall rather than the device’s private IP address. This provides some degree of anonymity to devices on probate networks as their private address is never sent beyond the private network</p>
62
New cards

Define encryption

The process of scrambling data so that it can not be understood if intercepted

63
New cards

When is encryption used

When information needs to be transmitted securely over a network

64
New cards

Two types of encryption

  • Symmetric

  • Asymmetric

65
New cards

Define Symmetric encryption

Both the sender and receiver share the same private key. This key is used to both encrypt and decrypt data sent between the two parties

66
New cards

Define Asymmetric encryption

When there are two devices communicating using asymmetric encryption, four different keys are used. Each device has a pair of mathematically related keys, one of which is kept secret (the private key) and the other shared on the Internet (the public key).

67
New cards

The process of Symmetric

Before any information is sent. The sender and receiver must engage in a key exchange to ensure they both have a copy of the shared key.

68
New cards

What is a major flaw of Symmetric

Because the key needs to be shared, if it’s exchanged over a network it’s venerable to interception

69
New cards

The process of Asymmetric encryption

Before a message is sent, it’s encrypted by the sender using the recipients public key. This means only the corresponding private key can decrypt it and vice versa.

The recipients private key (which the recipient only has access too) means that only the recipient can decrypt the message

<p>Before a message is sent, it’s encrypted by the sender using the recipients public key. This means only the corresponding private key can decrypt it and vice versa. </p><p>The recipients private key (which the recipient only has access too) means that only the recipient can decrypt the message </p>
70
New cards

Define digital certificate

A digital certificate verifies ownership of a key pair used in asymmetric encryption. It ensures that a key pair is authentic and not being used by an imposter.

71
New cards

Define digital signature

A digital signature is a cryptographic technique used to verify the sender of a message and ensure the message has not been tampered with during transmission.

72
New cards

Explain how digital certificates are used and obtained

Digital certificates are issued by certificate authorities (CAs) and contain information such as a serial number, owner’s name, expiry date, owner’s public key, and the CA’s digital signature. They verify the authenticity of key pairs in asymmetric encryption.

73
New cards

Explain how digital signatures are used and obtained

A digital signature is created by hashing a message, encrypting the hash with the sender’s private key, and appending it to the message. The recipient decrypts the hash with the sender’s public key and checks if it matches a newly computed hash of the received message to verify authenticity and integrity.

74
New cards

Why are digital signatures important

Digital signatures provide authentication, integrity, and non-repudiation, ensuring that messages are from a verified sender and have not been altered.

75
New cards

What is the role of a certificate authority (CA)?

A certificate authority (CA) is a trusted organization that issues digital certificates to verify the legitimacy of key pairs in asymmetric encryption.

76
New cards

How does hashing relate to digital signatures

Hashing creates a unique fixed-length digest of a message, which is encrypted with the sender’s private key to form the digital signature. Any change to the message alters the hash, revealing tampering.

77
New cards

Types of malware

  • Worms

  • Trojans

  • Viruses

78
New cards

Define worms

Are a piece of malicious software that can self- replicate between computers, this can happen either within a network or by users downloading and running malicious software

79
New cards

Define Trojans

A type of malware that disguisesas a benign file that users tricked into opening. These are often spread as email attachments or downloaded from malicious websites

80
New cards

Define what is a benign file

A type of software that does not pose any malicious threat to the system or user data

81
New cards

Define viruses

Require a host file in which to reside. These files are typically executable files, meaning that viruses can lie dormant in a computer until their host file is opened or run.

Viruses can spread between computers over a private network, the Internet or even through the use of physical media like hard drives, flash drives and optical disks.

82
New cards

Vulnerabilities that malware might exploit

  • Exploit bugs in the code

  • Out of date software

  • Poor security (lack of good security features)

  • Lack of anti-virus software

83
New cards

Ways to prevent malware

  • Anti-virus software

  • No out of date software

  • Good security (so good security features)

  • Good code quality

84
New cards

What are anti-virus software

Specialist pieces of software that scan the files on a computer and remove any suspicious files

85
New cards

How does malware exploit out of date software

The primary issue lies in the undressed security features and out of date protection/ security

86
New cards

How does malware exploit poor security

Malware takes advantage of weak passwords, outdated software, and misconfigured settings to gain unauthorized access and spread infections.

87
New cards

How does malware exploit bugs in the code

Malware exploits coding flaws, such as buffer overflows and injection vulnerabilities, to execute malicious code and compromise systems.