1.3.3 Networks

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:17 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

43 Terms

1
New cards

Protocol

A set of rules that allow (defines how) two devices to communicate

2
New cards

Protocol Layering

The concept of a protocol not simply being a set of rules but those rules being built up into very specific layers and those rule layers behind built on top of each other in a deliberate order creating a layered protocol stack. This results in the rules of a protocol being executed in a specific sequence as you move through the protocol stack

3
New cards

HTTP/ HTTPS

Web page transfer

4
New cards

FTP

file transfer

5
New cards

TCP/IP

packet routing and delivery

6
New cards

POP

Retrieving/ deleting email

7
New cards

IMAP

Synching/ storing email

8
New cards

SMTP

sending email

9
New cards

TCP/IP Stack (Transmission Control Protocol / Internet Protocol)

The most common general-purpose standard protocol that allows any networked computers (including those on The Internet) to communicate with each other whatever their equipment

10
New cards

TCP/IP Stack - 1. Application Layer

Chooses protocol for the application, e.g. HTTP, FTP, POP3

11
New cards

TCP/IP Stack - 2. Transport Layer

Uses TCP protocol - splits data into packets, adds packet numbers and port numbers, and requests retransmission of lost packets

12
New cards

TCP/IP Stack - 3. Network Layer

Adds source and destination IP addresses. Routers operate here, IP + port = socket address

13
New cards

TCP/IP Stack - 4. Link Layer

Handles physical connection. Uses MAC addresses of NICs and uses router MAC if device is on another network

14
New cards

Data Packets Structure

Header: Source and destination IP, Protocol, Packet order, Time to Live

Payload: Actual data

Trailer: Checksum / CRC (error detection)

15
New cards

DNS (Domain Name System)

The Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines access websites based on IP addresses

16
New cards

Packet Switching

A method of sending data over a wide area network in which the message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination

17
New cards

Packet Switching advantages

Multiple routes available, fault tolerant, suitable for large networks

18
New cards

Packet Switching disadvantages

Must reassemble packets, all packets must arrive first

19
New cards

Circuit Switching

A method of sending data over a wide area network in which two network nodes establish a dedicated communications channel through the network before the nodes may communicate. All data then follows this same path for the duration of the data transfer

20
New cards

Circuit Switching advantages

Data arrives in order, no delay

21
New cards

Circuit Switching disadvantages

Wasted bandwidth, network tied up, same transmission rate required

22
New cards

LAN (Local Area Network)

A collection of computers / computing devices on the same network which are physically close together, for example, all located within one building or site e.g. a home or school network

23
New cards

WAN (Wide Area Network)

A collection of computers / computing devices on the same network which are spread out over a geographically large area, for example a university across several campuses, or a multinational corporation with offices / sites in different cities or even different countries (require extra telecommunications hardware, infrastructure usually owned by third parties)

24
New cards

NIC (network interface card)

Connects device to network, contains unique 48-bit MAC address and written as 12-digit hexadecimal

25
New cards

Switch

Directs data within a network, common in star topology

26
New cards

Router

Connect different networks e.g. connects LANS to internet

27
New cards

Wireless Access Point

Allows wireless connection, often combined with router

28
New cards

Gateway

Translates between different protocols, removes and replaces packet headers

29
New cards

Transmission Media Types

Twisted pair (copper), coaxial (shielded), fibre optic (light)

30
New cards

Advantages of a network

Resource sharing, centralised management, communication

31
New cards

Disadvantages of a network

Security risks, server dependency, traffic congestion

32
New cards

Client-Server

A method of network organisation in which network stations make use of resources available at one or more servers.

33
New cards

Client-Server advantages

Secure, central backups, easy data sharing

34
New cards

Client-Server disadvantages

Expensive, server failure affects all clients, requires specialist staff

35
New cards

Peer to Peer

A method of network organisation in which network stations can share resources on other network stations, so one station can use a printer on another station or save data on another station’s local storage

36
New cards

Peer to Peer advantages

Cheap, easy to set up, no specialist staff needed

37
New cards

Peer to Peer disadvantages

poor security, difficult to locate, separate backups requires, used in piracy

38
New cards

Firewall

A computer application used in a network to prevent external users gaining unauthorised access to a computer system (Prevents unauthorised access by using packet filtering and examining IPs, ports and protocols. Packets can be dropped (no response) or rejected (error message))

39
New cards

Proxies

A computer application that accesses data on a different computer system or network. It controls the access of authorised users to data and allows the operation of the system to be isolated from control by external users (Acts as an intermediary - it hides user identity and caches data for faster loading, reducing traffic and blocking inappropriate content)

40
New cards

Encryption

The process of making data in a computer system unintelligible (uses keys to encrypt/ decrypt data ensures confidentiality during transmission)

41
New cards

Anti-malware & Patching

Software designed to detect, prevent and remove malicious code from a system and keep the system updated

42
New cards

User education

Addressing several specific vulnerabilities created by human behaviour

43
New cards

Threats

Malware - viruses, spyware, Social engineering - phishing, farming, DoS & DDoS attacks, SQL injection, Hackers (black, white, grey hat)