GCSE OCR Computer Science - Networks and Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

LAN

(Local Area Network) covers a small geographical area.

2
New cards

WAN (Wide Area Network)

Connects LANs that are in different geographical locations.

3
New cards

Server

A device which provides service for other devices

4
New cards

Bandwidth

The amount of data that can be transferred in a given time.

5
New cards

Latency

The time taken for a message to travel from one device to another across a network.

6
New cards

Factors affecting network performance (5)

Bandwidth of transmission medium, latency, number of devices, interferences, network traffic

7
New cards

Client-server network

A network managed by the server with devices connected to the server as clients.

8
New cards

Describe the client-server relationship

  • The client sends requests to the server

  • The server processes the request and responds to it

9
New cards

Advantages of client-server networks (4)

  • Easy to manage network security

  • Easy to install and update software

  • Easy to perform back-ups

  • Easy to keep track of files (they are stored centrally)

10
New cards

Disadvantages of client-server networks (3)

  • Expensive to set up and needs specialists to maintain

  • Server dependance

  • Server may be overloaded

11
New cards

Peer-to-peer network

A network in which devices connect directly to each other without a server.

12
New cards

Advantages of peer-to-peer networks (2)

  • Easy to maintain

  • No dependence on the server

13
New cards

Disadvantages of peer-to-peer networks (3)

  • No centralised management

  • Machines are prone to slow down when accessed by another device

  • Copying files between devices creates duplicates

14
New cards

Topology

The layout of a network

15
New cards

Star topology

All the devices are connected to a central switch or server that controls the network.

16
New cards

Star topology advantages (3)

  • If one device fails the rest of the network is unaffected

  • Easy to add more devices

  • Better performance

17
New cards

Star topology disadvantages (2)

  • Can be expensive to connect each device to the central switch or server by cable

  • Single point of failure

18
New cards

Mesh topology

Network devices are either directly or indirectly connected to every other device.

19
New cards

Advantage of mesh topology

No single point of failure

20
New cards

Disadvantage of mesh topology

If the network is wired, it can be very expensive as many wires are needed to connect each device.

21
New cards

Full mesh topology

Each device is connected to each other device.

22
New cards

Partial mesh topology

Not all devices are fully connected.

23
New cards

Switch

Connects devices on a network by receiving and transmitting data.

24
New cards

Wireless Access Point (WAP)

A switch that allows devices to connect wirelessly.

25
New cards

Router

Transmits data between at least two networks.

26
New cards

What is the role of routers on the Internet?

Direct data in packets to their destination.

27
New cards

Network Interface Card (NIC)

An internal piece of hardware that allows a device to connect to a network.

28
New cards

Transmission media

The communication channel along which data is transferred.

29
New cards

Ethernet cables

Transfer data between devices on a LAN. (for example CAT 5e or CAT 6 ‘twisted pair’ cables)

30
New cards

Coaxial cables

A single copper wire surrounded by a plastic layer for insulation and a metallic mesh.

31
New cards

Fibre optic cables

High performance cables that transmit data as light over very large distances.

32
New cards

Wireless networks

Use radio waves to transmit data

33
New cards

Advantages of wireless networks (2)

  • More convenient - you can move around while still being connected

  • Cheaper - fewer wires

34
New cards

Bluetooth

Wireless technology that directly connects two devices over a short range.

35
New cards

Wi-Fi

Wireless technology that can connect multiple devices to a LAN over a wider range.

36
New cards

Network standard

A set of agreed requirements for hardware and software.

37
New cards

Network protocol

A set of rules for how devices communicate and how data is transmitted.

38
New cards

MAC address

A unique identifier assigned to the NIC in a networked device by the manufacturer.

39
New cards

MAC address format

  • 48 or 64-bit binary number

  • six or eight 8-bit pairs in hex separated by dashes

40
New cards

IP addresses

Used for sending data between TCP/IP networks.

41
New cards

IPv4 address format

  • 32 bit address

  • represented in denary with four 8-bit segments

42
New cards

IPv6 address format

  • 128 bit address

  • represented in hexadecimal with eight 16-bit segments separated by colons

43
New cards

TCP/IP

Protocol that dictates how data is sent between networks

44
New cards

Transmission Control Protocol (TCP)

Allows packets to be sent and received between computer systems. (It breaks the data into packets and reorders them)

45
New cards

Internet Protocol (IP)

Controls the routing and addressing of data packets.

46
New cards

Hyper Text Transfer Protocol (HTTP)

Used by web browsers to access websites and communicate with web servers.

47
New cards

HTTP Secure (HTTPS)

A more secure version of HTTP that encrypts all information sent and received.

48
New cards

File Transfer Protocol (FTP)

Used to access, edit and move files between devices on a network.

49
New cards

Post Office Protocol (POP)

Retrieves emails from a server which holds the email and deletes it after you download it.

50
New cards

Internet Message Access Protocol (IMAP)

Retrieves emails from a server which holds the email until you delete it - you only download a copy.

51
New cards

Simple Mail Transfer Protocol (SMTP)

Sends emails and transfers them between servers.

52
New cards

Layer

A self-contained set of protocols that provide a specific function.

53
New cards

Advantages of using layers (2)

  • Breaks network communication into manageable pieces for developers.

  • Layers can be changed without affecting other layers

54
New cards

World Wide Web (WWW)

A collection of websites that are hosted on web servers and accessed through the http protocol.

55
New cards

Domain Name Service (DNS)

Used to translate domain names into IP addresses.

56
New cards

Domain Name Servers

Store IP addresses matching domain names.

57
New cards

The cloud

Storage remotely accessed through the internet.

58
New cards

Cloud advantages (4)

  • Files can be accessed from any device

  • Less expensive

  • Provides security and back-ups for you

  • Easy to increase storage

59
New cards

Cloud disadvantages (4)

  • Requires internet connection

  • Dependent on host

  • Data may be vulnerable to hackers

  • Subscription fee

60
New cards

Passive attack

Data travelling on a network is monitored and sensitive information is intercepted.

61
New cards

Active attack

A network is attacked with malware or other planned attacks.

62
New cards

Brute-force attack

Information is gained by cracking passwords using trial and error.

63
New cards

Denial-of-service attack

Hackers stop users from accessing a part of a network or website, usually by flooding the network with useless traffic.

64
New cards

Malware

Malicious software installed on a person’s device without their knowledge or consent.

65
New cards

Viruses

Attach to certain files and are spread by users copying files and activated by users opening them.

66
New cards

Worms

Viruses that self-replicate without the user’s help, so spread very quickly.

67
New cards

Trojans

Malware disguised as legitimate software.

68
New cards

Social engineering

Gaining sensitive information or illegal access to networks by influencing people.

69
New cards

SQL Injection

Pieces of SQL typed into a website’s input box which reveal sensitive information.

70
New cards

Penetration testing

Specialists are employed to simulate potential attacks on a network.

71
New cards

Physical security

Protecting the physical parts of a network from either intentional or unintentional damage.

72
New cards

Anti-malware software

Software that stops malware from damaging a network and the devices on it.

73
New cards

Firewall

Blocks unauthorised access and examines all data entering and leaving the network.

74
New cards

User access levels

Control which parts of a network different users can access.

75
New cards

Passwords

Help prevent unauthorised users accessing the network.

76
New cards

Encryption

Data is translated into a code which only someone with the correct key can access.