SLR11 - Networks

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:21 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

62 Terms

1
New cards

Networking advantages

  • Share files

  • Share peripherals & connect to networks e.g. internet

  • Access files from any computer on network

  • Server control security, software updates, backup

  • Communicate

2
New cards

Network disadvantages

  • Security risk - malware & viruses spread easier

  • If server fail, computers may not work

  • Computer may run slower if lot data travelling on network

3
New cards

Standards

  • Set of hardware & software specifications

  • Allow manufacturers to create products & services that are compatible with each other

  • E.g. character set

4
New cards

Protocol

  • Allow devices communicate

  • By ensuring all follow same standards

5
New cards

8 Main Protocols

  • TCP

  • IP

  • HTTP/HTTPS

  • POP

  • IMAP

  • SMTP

6
New cards

TCP

  • Transmission Control Protocol

  • Provides error free transmission between two routers

7
New cards

IP

  • Internet protocol

  • Routs packets across a WAN

8
New cards

UDP

  • User Datagram Protocol

  • Simple connectionless transmission model

9
New cards

HTTP/HTTPS

  • Hypertext Transfer Protocol / Secure

  • Allow client & server to request and deliver HTML web pages / added encryption

10
New cards

FTP

  • File Transfer Protocol

  • Used to send files between computers, normally WAN

11
New cards

POP

  • Post Office Protocol

  • Retrieves emails from mail server and transfers them to device, removing them from server

12
New cards

IMAP

  • Internet Message Access Protocol

  • Keep emails on mail server, keeping devices in cync

13
New cards

SMTP

  • Simple Mail Transfer Protocol

  • Transfers outgoing emails between severs and from email client to servers

14
New cards

Internet

  • Collection of interconnected networks, routers, cables

  • Home network connected via typical wireless router

  • Router connects to Internet Service Provider (ISP) via fibre optic

  • ISP connected to DNS and other routers

15
New cards

Layering

Concept of layering is to divide complex task of networking into smaller, simple tasks that work in tandem with each other

16
New cards

Layering advantages

  • Reduce complex problems to smaller sub-problem

  • Devices can be manufactured to operate particular layer

  • Products from different vendors work together

17
New cards

TCP/IP

  • Transmission control protocols

  • Protocols are set of rules of communication across internet

  • Each protocol belongs to different layer

  • Data further encapsulated as its passed to next layer

18
New cards

TCP/IP Layers

  • Application

  • Transport

  • Internet

  • Link

19
New cards

Application layer

  • Network applications such as web browsers, or email programs operate at this later

  • FTP, HTTP/S, SMTP, IMAP

20
New cards

Transport layer

  • Sets up communication between two hosts - agree settings such as language & packet size

  • TCP, UDP

21
New cards

Internet layer

  • Addresses & packages data for transmission

  • Routes packets across network

22
New cards

Link layer

  • Network hardware & connection port standards

  • Operating system device drivers also sit here

  • Facilitates transmission of binary via any media

  • Copper twist pair, fibre, Wi-Fi

23
New cards

MAC address

  • Required when communicating on same LAN which only requires link layer

  • MAC unique to each device

  • MAC address can be found by sending request to all surrounding devices only devices with matching Ip respond, not possible on internet - too many devices

24
New cards

IP address

  • Communication between two devices on different networks (WAN) requires both network layers, which uses IP address to create packets and link layer frame

  • IP tells roughly where devices would be on internet

25
New cards

Sending over same network

  • One host can send to another

  • Host may need to broadcast first if MAC isn’t already known - ARP protocol used for this

  • As traffic passes trough switch, it examines the source code and destination MAC and learns which address links to which device

26
New cards

Sending packets over networks

  • Data transmitted via router

  • Destination MAC address will be address of router when sending

  • When frame reaches router, router works out where needs to send packets by looking at destination IP

  • Router then sets own MAC address as source and next device as destination

  • Router can also use ARP protocol to find destination MAC address if router doesn’t already know it

  • If there are several routers on path to destination, source & destination MAC address will be overwritten at every hop

  • Original message split apart and wrapped in segments which are wrapped in packets which are wrapped in frames

  • Once arrive destination, will travel up through layer of TCP/IP stack in reverse order, stripping headers & tails as it goes on = destination receives message

27
New cards

World wide web

Collection of files with information stored in hypertext web pages hosted on web server

28
New cards

DNS

  1. User request URL

  2. Browser send domain name to DNS

  3. DNS maps domain name to IP address & return it to browser

  4. Request for web page or resource is sent to web server using IP address

  5. Requested web page returned to clients web browser

29
New cards

LAN

  • Local area network

  • Network covering small geographical area, typically on single site

  • All hardware owned to organisation using it

  • Typically connected by;

    • UTP cable

    • Fibre optic

    • Wi-Fi

30
New cards

WAN

  • Wide area network

  • Collection of connected computer over large geographical area

  • Multiple LANs in different areas are connected form WAN

  • Infrastructure leased from telecommunication companies own & manage it

  • Typically connected by:

    • Telephone lines

    • Fibre optic cables

    • Satellite links

31
New cards

Client server model

  • Controls access & security for stored files

  • Manages access to printer

  • Provides email services

  • Runs regular backups of data

  • Client makes requests to server for data, connections & other services

32
New cards

Client server model advantages

  • Easy manage file security

  • Easier backup shared files

  • Easier to install software updates to all computers

33
New cards

Client server model disadvantages

  • Expensive

  • Requires IT specialist to maintain

  • Server single point of failure

  • User will lose internet access if server fails

34
New cards

Peer to peer model

  • Peer = computer connected to network

  • Peer == other peers

  • Peers send own files to each other

  • Each peer responsible for own security

  • Peer usually have own printer

  • Peer can usually send print jobs to another peer to process, but that peer must be on

35
New cards

Peer to peer model advantage

  • Easy maintain

  • No specialist staff

  • No dependence on single computer

  • Cheaper

  • No expensive hardware

36
New cards

Peer to peer model disadvantage

  • Network less secure

  • Users need manage own backup

  • Can be difficult to maintain well-ordered file store

37
New cards

Circuit switching

  • Creates temporary & dedicated link of fixed bandwidth between source & destination that only lasts until transmission is complete - physical pathway

  • All packets use same path

  • Reserves bandwidth in advance

  • Can cause lot bandwidth wastage

  • No store & forward transmission

  • Guarantees quality of transmission though dedicated bandwidth

38
New cards

Packet switching

  • No physical pathways - each packet takes own path

  • Packets travel independently - breaks stream of data into smaller blocks

  • Doesn’t reserve bandwidth = no bandwidth wastage

  • Supports store & forward transmission

39
New cards

What is hacker

Individual attempts gain access to computer with intent of damaging data or harming system

40
New cards

Types of hackers

  • Black hat hacker: Gain access via nefarious means, typically to steal company secrets or cause damage

  • White hat hacker: Ethical hacking, use expertise to try identify & fix vulnerabilities

  • Grey hat hacker: Attempt to locate flaws in company’s computer system without permission

41
New cards

Security issues & threats

  • Malware

  • Denial-of-service attack

  • SQL injection

  • Social engineering

42
New cards

Malware

Code written with intent to frustrate or harm

43
New cards

Types or malware

Virus: Piece of code capable of copying itself & spread through system, designed to corrupt file

Spyware: Covertly obtains information about user’s computer activity by transmitting data from their device

44
New cards

Denial-of-service attack

  • Attacker floods server with useless traffic, exploiting TCP/IP stack

  • Distributed denial-of-service (DDOS) attack occurs when multiple systems orchestrate synchronised DOS attack at single target

45
New cards

SQL injection

  • Designed to exploit vulnerabilities in poorly coded database applications

  • Code in entered into input box & executed by server

46
New cards

Social engineering

Manipulation techniques used to exploit human error, with aim to obtain private information

47
New cards

Types of social engineering

Phishing: Trick user into giving personal information by disguising as trustworthy source

Pharming: Malicious code installed on Pc/server misdirecting users to fraudulent websites without knowing

48
New cards

Methods of minimising & preventing threats

Firewall

Secure password system

Up to date software & anti-malware software

Proxies

Encryption

49
New cards


Firewalls

Software configured to only let certain types of traffic through to prevent:

  • Unauthorised internet traffic from outside LAN

  • Users in LAN from accessing prohibited parts of internet

50
New cards

Proxy

Physical device placed between network & remote source that manages traffic in and out of network

51
New cards

Encryption

Process of changing plain text to unreadable form, wont prevent hacking but makes it difficult for stolen data to be read

52
New cards

Why are people considered the weak point

  • Not locking doors

  • Not logging off

  • Not encrypting data

  • Sharing passwords

  • Mitigated through training & education programs

53
New cards

Moden

  • Transforms digital information from computer to analogue signals to transmit wirelessly

  • Can also translate incoming analogue signal

  • Modulates/demodulates electrical signal sent through phone lines

  • Ports:

    • One connected to outside world

    • Ethernet connected to computer/router

54
New cards

Router

  • Routes data between:

    • Devices on home network

    • Between devices on network and internet

  • Modem connected to one port on router

  • Other devices connected by other ports/wirelessly Wi-Fi

55
New cards

Cables

  • Twisted pair

  • Coaxial

  • Fibre optic

56
New cards

Twisted pair

  • Made up of pair of insulated copper wire

  • Effected by noise from magnetic fields

  • Affordable

  • Low bandwidth

  • Used for telephone networks, data networks, cable shielding

57
New cards

Coaxial

  • Made up of solid conductor wire & layers of insulation

  • Also affected by external magnetic fields, less that twist

  • Moderate bandwidth & price

  • Used for feedlines connected to radio transmission & receivers

58
New cards

Fibre optic

  • Made of optical fibres bundled into single cable

  • Immune to external magnetic field noise

  • High bandwidth & price

  • Used for long distance connections & data centres

59
New cards

Network interface card (NIC)

  • Allows both wired & wireless communication between computers

  • Is both physical & link layer

60
New cards

Wireless access point (WAP)

Device that creates wireless LAN by connecting to the router/hub via ethernet and projects Wi-Fi that is limited & affected by various materials

61
New cards

Hub

  • Allows connect multiple devices to network

  • Operates on physical layer & considered passive device - broadcasts transmissions received to all other connected devices

  • Can cause network to become flooded with unnecessary traffic

62
New cards

Switch

  • Also allow multiple device connect to network

  • Operates on link layer & considered active device - can inspect transmissions & route them to correct device, reducing unnecessary traffic

  • Faster than hub