Communications 2 (Internet) Flashcards
What is meant by Packet Switching?
Data to be sent across is split into packets
Each packet is given a destination address and a sequence number
Packets are sent invidually via the fastest possible route across the network
The sequence numbers are used once the packets have been received to reassemble the packets
What are the components of a Packet?
Sender’s Address
Receiver’s Address
Packet Contents
Time to Live
Sequence Number
What is a router?
A device used to send packets to the recipient via the fastest possibvle route - this may be the fewest number of hops or least congested route
What is the Time to Live for a packet?
When a packet is sent through a network, it passes through multiple routers to reach its destination. Every time a packet passes through a router, a hop occurs.
Each packet has a finite number of hops - the time to live indicates how many hops a packet can have.
When the Time to Live expires, the packet is deleted - the recipieint will have to get the packet to be transmitted again
What is a gateway?
A device used to convert transmitted data from one protocol to another, when two networks use different protocols.
It does this by stripping the packet so it has just its contents, and then gives it a sender and receiver address which complies with the new protocol
https://www.bbc.co.uk/news/technology/index.html
https:// - Protocol used to access the file
bbc.co.uk - Domain Name
/news/technology/index.html - The file path
www - The host name (World Wide Web)
What is a fully qualified domain name?
A domain that specifies an exact resource and can only be interpreted in one way - it will always include the server’s host name
e.g. - https://www.bbc.co.uk/news/index.html
What is the Domain Name Server System? (DNS)
Each domain name has a direct relationship with an IP address
When you enter a domain name into the search bar, a domain name server will translate is into its corresponding IP address
A DNS stores a table of domain names and their corresponding IP address - if a DNS doesn’t have a record of the domain you are using, the request is passed onto a different DNS.
Smaller websites may take muiltiple changes of server before a record can be found, hence why they are slower to access
What is an Internet Registry?
An organisation responsible for the allocation of IP addresses - there are only 5 in operation.
They must protect the depleting pool of unallocated IP addresses. When a new IP address is requested, the registry will look for a previously allocated IP address that is now unused - instead of a new one.
What is a firewall?
A firewall sits between a device and the internet and it regulates the packets that pass through it. It acts as a proxy server which can perform both packet filtering and stateful inspectionm
What is a proxy server?
A server that sits between a public and a private network - they manage every packet that passes between the networks
When a packet is sent from a private network into a public network, the sender address is the firewall and not the private IP address
What is packet filtering?
Firewalls use packet filtering to accept and block packets based on their source IP address or the protocol they use.
What is stateful inspection?
Stateful Inspection examines the contents of a packet before allowing it throuugh a firewall - meaning some packets that are unrelated or suispicious are blocked
What is symmetric encryption?
Both the sender and receiver share the same private key - this is used to encrypt and decrypt the data swent across the network.
Before sending any information - they need to exchange the private key, this is the flaw of symmetric information as it is vulernable to interception
What is aysmmetric encryption?
When using asymmetric encryption, a digital signature can be used to verify if the sender of a message and to verify that a message hasn’t been tampered with during transmission
1) A digest of the message is created using a checksum or hashing algorithm - the value depends on the message and will change if the message is changed
2) The digest is encrypted using the sender’s private key
3) The digest is appended to the message
4) The message and digest are encrypted using the recipient’s public key - meaning only the recipient can decrypt it
5) When the recipient receives it, thety decrypt it using their private key - leaving them with a decrypted message and an encrypted digest
6) They then decrypt the digest using the sender’s public key - this verifies if it was sent by the sender
7) The recipient carries out the same hashing/checksum algorithm to see if the result matches the decrypted digest