3.9 Fundamentals of Communication and Networking Flashcards
Internet address
Each device on a network needs to be uniquely identified so that the data can be sent to the correct destination
what are URLs used for
URLs are used to specify the means of accessing a resource across a network and its location
how is a URL formed
the protocol and the domain name of the resoruce
URL
Uniform Resource Locator
DNS
Domain Name System
define the Internet
a network of interconnected computer networks which uses an end-to-end communication protocol
ISP
Internet Service Provider
what is an ISP?
a company that provides its customers with access to the internet
TTL
Time To Live
what name is given to the process of a packet moving from one router to another
hop
primary components of a packet
sender’s address, receiver’s address, packet contents, TTL, sequence number
gateways
a device that is used between networks that uses different protocols
purpose of a sender’s address
identifies where the packet was sent from
purpose of a receiver’s address
identifies the packet’s intended recipient
purpose of packet contents
where the packet holds the data that is being transferred
purpose of TTL
holds the number of hops a packet can go through before being dropped
purpose of sequence number
contains the number of packets in a message and identifies a packet’s position in relation to others
what is a domain name
it identifies an organisation or individual on the internet using alphanumerical characters
FQDN
Fully Qualified Domain Name
what is a FQDN
a domain that specifies an exact resource and can be interpreted in only one way, will always include the server’s host name
three types of malware
worms, trojans, viruses
worms
pieces of malware that can self-replicate between computers, either within a network or by users downloading and running a malicious file
trojans
a type of malware that is disguised as a benign file, users can be tricked into opening this as an email attachment
viruses
requires a host file to reside in, the files are typically executable, can lie dormant until the host file is opened, can spread between computers over a private network