1.5 Network Topologies And Protocols Flashcards
Authentication
Method for confirming users’ identities often by checking if their username exist and then there subsequent password
Encryption
Process of turning data from a human readable format to a non human readable format
Firewall
a software or hardware used in a network to prevent external users gaining unauthorised access to the system
MAC address
a hardware address that uniquely identifies each node on the network,
Ethernet
A standard communication protocol used in most lans
Ethernet work
data is sent in frames -> node will wait for connection to be quiet before sending -> if 2 nodes try send data at the same time they will stop and wait a random amount of time before reattempting -> faulty frames are rejected and resent
Ethernet frame
source and destination address, data and crc
TCP/IP
Protocol that connects computers to the internet and tells computers how to exchange information over the internet
TCP
provides reliable ordered and error checked delivery of a stream of packets
IP
rules used to pass packets from one host to another using the best route
HTTP
the protocol used for transmitting web pages over the internet
HTTPS
encrypts http traffic with ssl or tls
SMTP
protocol used to send electronic mail from server to serve pr on the internet -> message is removed from mail server once received
IMAP
protocol used by email clients in communicating with email servers. Leaves a copy of the message on the mail server
FTP
a protocol that inclusively used for sending files from a host to a remote computer