1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network protocol
A set of rules that allow devices/ networks to communicate/ transfer data
TCP/IP Model:
- Application layer (HTTP/S, FTP, IMAP, SMTP) - network applications (web browsers/ email programs) operate, data encoded, formatting, added appropriate headers accroding to protocol so can be understood by recipient
- Transport Layer (TCP, UDP) - communication set up between two hosts + agree settings like language + size of packets, splits data, adds packet info (like number to specify order + total no of packet), hides diff netwrork techonoliges + architectures
- Internet Layer (IP) - addresses + packages data for transmission, routes packets across the network, attaches IP address of sender so know who sent + destination IP add
- Link Layer - nw hardware like NIC, OS device drivers, attaches MAC add of sender + recipinet so packet can be directed to specific device on LAN
UDP = simple connectionless transmission model; computer applications can send messages/ datagrams to other hosts on an IP network/ alternative to TCP but no error checking or correction -> maintains open connection between sender + recipient (often faster so used for live stream/ gaming sessions)
PROTOCOLS
TCP = standard that defins how messages are broken up into packetes + reassembled at desintation; detects errors + resends lost packets
IP = identifies loctaion of a device on Internet + routes the individual packets from source to destination via routers
SMTP: sends emails between servers (sending)
IMAP: stores emails on a server; retrieves emails + view + manipulate emails; email displayed on client programs/ devices (usually receiving)
HTTP: accessing/receiving web pages in form of HTML files on Internet; protocol requests web server to transmist requested web page to user's browser for viewing
HTTPS protocol: sending/ receiving web pages; using an encrypted connection (encrypted vers of HTTP); more secure web transactions; authentication of website being visited; encryption of data between server + client; reduces likelihood of man-in-the-middle attacks
FTP = standard network protocol used to transfer files between client + server on comp network; based on client-server model + uses separate control/data connections between c + server
Authentication: ways of identifying a genuine, authorised user
eg: Password protection, combination of username + password, should be strong; user access levels (should be set for disks, folders, files; Read-Only, Data Protection Act says employers must keep personal data secure so legal responsibility); encryption - process of converting plaintext into ciphertext (makes data more secure, prevent being hacked -> scrambles data b4 transmission so can't be understood unless has necessary decryption tools - key, encryption algorithm)
Firewall
network security device that monitors incoming + outgoing network traffic; decides whether to allow or block specific traffic, based on defined set of security rites (eg: may block data from certain IPs, OS like MS Windows have fw utilies included)
MAC address filtering:
allows devices to access/ be blocked from accessing a network based on their physical address embedded within device's network adapter (everyone has unique, so possible to used on wireless network tool but doesn't identity to user itself only device)