Networks

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

CH of OCR A Level Computer Science

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Internet Protocol Addressing System

Each device on a network needs to be uniquely identified so that data can be sent to the correct destination.

2
New cards

Data Packet

A segment of data that needs to be sent, often referred to as the payload.

Header → Sender and Recipient IP protoco. Packet number x of y.

Trailer → End of the packet flag, checksum.

3
New cards

Buffer Overflow

Occurs when a program accidentally writes data to a location too small to hande it.

4
New cards

Packet Filtering

Packets of data are inspected by the firewall to check which port they are attempting to access.

5
New cards

Indexing

When a search engine keeps a record of the resources it locates.

6
New cards

Index

The search engine index contains entries for trillions of web pages, the size of googles index is estimated at over 100 petabytes.

7
New cards

Domain Name System

Dedicated computers with an index of domain names and their corresponding IP address.

8
New cards

Uniform Resource Locator (URL)

Used to specify means of accessing a resource accross a network and its location.

HTTPS:/ = Protocol

website.com = Domain

/glossaries = resource/path

9
New cards

Search Engine

Systems that locate resources on the WWW, search engines make it easier to find the relevant resources in an efficient way.

10
New cards

Web Crawlers

Internet bots that continuously crawl the web to discover and record publically available web pages.

11
New cards

Information Stored by Web Crawlers

> Resource URL

> Contents of the resource

> Last time updated

> Quality of the resource

and more…

12
New cards

Encryption

Encoding a plain text message so that it cannot be deciphered unless you have a numerical key to decrypt it.

13
New cards

Backbone

Dedicated physical connectionsthat connect several large networks at various points across the globe. Usually controlled by the internet service provider (ISP)

14
New cards

Internet

The internet is a network of interconnected networks.

15
New cards

Local Area Network (LAN)

Two or more devices connected in a small geographical area.

16
New cards

Wide Area Network (WAN)

A large computer network in a wide geographical area.

17
New cards

Wireless Access Point (WAP)

A wireless access point for a network, it requires a connection to a router.

18
New cards

Router

The ‘bridge’ between LAN and WAN

19
New cards

Packet Size

Deliberately kept small (500 - 1500 Bytes), ensures that individual packets dont take excessive time to transfer.

20
New cards

Firewalls

Software and hardware that controls access to and from a network.

21
New cards

Proxy Servers

Makes a request on behalf of your own computer, hiding the true request IP addresses from the recipient.

Can be used for Anonymous Surfing, Filtering Content, and Providing a cache.

22
New cards

SQL Injection

A malicious user can enter SQL commands via an online database form to change the processing of your device.

23
New cards

Input Steralisation

Special characters are turned into text characters to ensure any added code becomes invalid.

24
New cards

Malware

Annoys the user or damages their data.

25
New cards

Virus

Self-replicating, embeds itself in the programs or files. Requires a users interaction to work.

26
New cards

Worms

Stand alone program that requires no user aid and exploits the systems vulnerabilities.

27
New cards

Trojans

Malware that masquerades as innocuous or useful applications, they cannot self-replicate and acts to openm backdoors in a computer.

28
New cards

Phishing

Typically emails, manipulates a user into giving away personal data.

29
New cards

Wireless Network Interface Card (NIC)

A station consists of a computer and a NIC, stations share a radio frequency channel.

30
New cards

Bus Topology

Arrangement where nodes are connected in a daisy chain by a single computer network.

  1. It is slow

  2. Does not scale well

  3. Contains a terminator

  4. Cheaper

  5. Restricted by Cable length

31
New cards

Star Topology

Arrangement where nodes are connected by a common connecton node.

  1. Easy to fix/isolate issues

  2. Better performance and scalability

  3. Central device is a point of failure

  4. Can be expensive to set up

32
New cards

TCP/IP Stack

A set of rules used in turn, to format a message so it can be sent over a network.

Application Layer → Used to provide service for applications that want to communicate across networks. It seperates control instructions and data, using FTP. it has two different ports.

Transport Layer → Uses the transmission control protocol (TCP) to establish an end-to-end connection with the recipients computer. Splits data into packets, numbering them.

Internet/Network Layer → Uses IP to address packets with source and destination IP addresses. Labels the packets then sends them on.

Link Layer → Finds next locations MAC address. Sending over network connection operating the physical connection between devices.

33
New cards

Port Numbers

A port is used to alert a specific application to a network message.

34
New cards

(Port 20) File Transfer Protocol Data

Application level protocol used to move files accross a network.

35
New cards

(Port 21) File Transfer Protocol Control

controls the FTP Data.

36
New cards

(Port 22)

Secure Shell (SSH) Remote Login

37
New cards

(Port 443)

HyperText Transfer Protocol Secure (HTTPS)

38
New cards

(Port 23)

Telnet Unencrypted Remote Login

39
New cards

(Port 80/8080)

HyperText Transfer Protocol (HTTP)

40
New cards

(Port 143) Interim Mail Access Protocol (IMAP)

Manages emails on a server so multiple clients can access the same email account in Synchronicity.

41
New cards

(Port 110) Post Office Protocol V3 (POP3)

Downloads emails stored on a remote server to a local client.

42
New cards

(Port 25) Simple Mail Transfer Protocol (SMTP)

Used to send/forward emails between mail servers to their destination.

43
New cards

Client Server

Features:

  1. User IDs, passwords and access levels are centrally controlled

  2. Used in many large to small organisations.

  3. Can be expensive to set up and maintain.

  4. Backups usually are automated.

  5. No access to other users files.

44
New cards

Peer-To-Peer Servers

Features:

  1. Files and programs stored on individual computers.

  2. Suitable for a home network.

  3. Cheap to set up and maintain.

  4. Each computer on the network acts as a client server.

  5. Can be used for sharing of music and streaming coverage of live events.

45
New cards

Client-Server Networks

Central Server to manage security, some files held on a central server, some processing tasks performed by the server.

46
New cards

Peer-To-Peer Networks

No central server, each device is connected to each other.

47
New cards

Client-Server Functions

  1. Initial Validation

  2. Web Page Interactivity

  3. Manipulating Interface Elements

  4. Applying Styles

  5. Reduces Server Load

  6. Reduces Web Traffic

48
New cards

Server Processing Functions

  1. Database Queries

  2. Encoding Data to Readable HTML

  3. Updating the Database

  4. Calculations

  5. Further Validation

  6. Keeps Data Secure

49
New cards

Meta Tags

Describes the contents of a web page, web develepors can place meta tags inside HTML pages to make the pages more likely to be found.

50
New cards

Page Rank

Developed to list search result in the orfer and rank of usefulness and relevance.

51
New cards

PageRank Algorithm

PR(A)=(1-d)+d(PR(Ti)/C(Ti))+…+PR(Tn)/c(Tn)

52
New cards

PR(A)

Page Rank of Page A

53
New cards

d

Damping Factor, Usually 0.85

54
New cards

PR(Ti)

Page Rank of pages Ti which link to page A.

55
New cards

C(Ti)

The number of outbound links on page Ti

56
New cards

PageRank Factors

  1. Domain Name → Relevance to the search item.

  2. Frequency of search term in web page.

  3. Age of web page.

  4. Frequency of page updates.

  5. Magnitude of content updates.

  6. Keywords in <H1> tags,