The Internet Flashcards
What is the Internet?
- A network of interconnected computer networks which uses an end-to-end communication protocol
- Mostly a wired network, underwater cables connect different continents
What are ISPs?
- Stands for Internet Service Provider
- Companies that provide customers with access to the Internet
- The largest ISPs / national ISPs provide internet to smaller regional ISPs
- Homes / businesses can buy access to the Internet from these
What is a packet?
- Containers in which data is transmitted over networks
- Labelled with addresses for their sender and recipient
- Contain information intended for the recipient
What are packet switching networks?
- Network in which data is sent in packets
How do packet switching networks work?
- One message is split into multiple packets, each of which is sent to its recipient via the best possible route
- Packets are reassembled with other packets that form part of the same message by their recipient
- These pass through a number of routers before the destination, where the router determines where to send them by using the recipient address
- Every time a packet goes through a router, a hop occurs, only a finite nmber of hops can occur
- When a packet’s TTL expires, the packet is dropped
- The recipient notices a missing packet and requests for a retransmission
What is TTL?
- Stands for Time to Live
- A packet’s TTL is a number that indicates how many hops the packet can partake in
- Reduced by one with each hop
What are the components of a packet?
- Primary components of a packet:
- Sender’s address
- Receiver’s address
- Packet contents
- TTL
- Sequence number
What is the sequence number of a packet?
- Contains the number of packets in a message and identifies a packet’s position in relation to others
What are routers?
- Routers connect different networks
- They send packets to their recipient via the fastest route
- Hold tables with info relating to the fastest routes to certain devices
What is a gateway?
- Gateways connect different networks
- Where two networks use different protocols, packets must be modified by a gateway so as to conform to both protocols
- Gateways strip away most of the packets details, leaving just the contents, then gives it a new send and receive address to comply with the new protocol
What is a URL?
- Stands for Uniform Resource Locator
- Addresses assigned to files on the Internet
What is the https:// part of a URL?
- The protocol being used to access a file
What is the www part of a URL?
- Subdomain for the World Wide Web
What is the bbc.co.uk part of a URL?
- Domain
What is the .html part of a URL?
- The file’s extension
What are the different TLDs available for use?
- Stands for Top Level Domain
- .com or .net or .org
What is a domain name?
- Identifies an organisation or individual on the Internet
- Easy for humans to remember
What is a FQDN?
- Stands for Fully Qualified Domain Name
- A domain that specifies an exact resource and always includes the server’s host name (e.g. www)
What is an IP address?
- Stands for Internet Protocol address
- Assigned to every computer on the Internet and every device that communicates on a network
What is a domain name server?
- Used to translate domain names into their corresponding IP addresses
- Stores a table of domain names and their corresponding IP addresses
- If a DNS doesn’t have a record of a domain, the request will be passed onto another DNS
What is an internet registry?
- Organisations responsibe for the allocation of IP addresses
- Only 5 in operation, each serving a different geographical area
- When a new IP address is requested, a registry will looked for a previously allocated unused IP address rather than allocated a brand new IP address
What is a firewall?
- These sit between a device and the Internet
- Regulates the packets that pass through them
- Either software or hardware
What is packet filtering?
- Firewalls use this to accept or block packets based on their source IP address or the protocol in use
- Network admins can:
- Specify particular IP addresses or protocols
- Use automatic filtering software that can block suspicious packets
What is stateful inspection?
- Examines the contents of a packet before deciding to allow it through the firewall
What is a proxy server?
- Servers that sit between a public and private network
- Manages every packet that passes between the two
- Firewalls can be said to act as proxy servers in this scenario
How do firewalls in proxy servers provide anonymity?
- When a device in a private network sends a packet through a firewall and into a public network
- The packets “sender” address is of the firewall, rather than the private IP address
- This provides the anonymity
What is symmetric encryption?
- Both the sender and receiver share the same private key
- This key is used to both encrypt and decrypt data sent
What is the issue of symmetric encryption?
- Before sending info, the sender and receiver participate in a key exchange
- If this same key is exchanged over a network, it is vulnerable to interception
What is asymmetric encryption?
- Each device has a pair of mathematically related keys
- One key is kept secret; the private key
- The other is shared on the Internet; the public key
- When a message is encrypted with the public key, ONLY the corresponding private key can decrypt it
- The recipient is the only one with the private key, the sender has the public key
What is a digital signature?
- Can be used alongside asymmetric encryption to:
- Verify the sender of the message
- Verify any message tampering/corruption during transmission
Describe the digital signature process in asymmetric encryption
- A digest of the message is created
- This is encrypted with the sender’s private key
- The encrypted digest is appended to the message
- The message and appended digest are encrypted with the recipient’s public key
- When the message is received, the recipient:
- Decrypts the message using their private key
- Decrypts the digest using the sender’s public key
- Carry out the same digest algorithm on the message
- Check whether their result matches the now decrypted digest
What is a digital certificate?
- Verifies ownership of a key pair used in asymmetric encryption
- Can be used to check that a fake key pair isn’t being used by an imposter
- Issued by certificate authorities, with the files containing the owners details, public key, and the digital signature of the CA
What is a worm?
- Piece of malicious software that can self-replicate between computers
- Either within a network or by users downloading and running malicious files
What is a trojan?
- A type of malware that is disguised as a benign file
- Users can be tricking into opening it
- Spread as email attachments or downloaded from malicious websites
What is a virus?
- Requires a host file in which to reside
- Files are usually executable files
- Can lie dormant until their host file is opened
- Spread between computers over private networks or the Internet
What precautions can be taken to avoid malware?
- Good code quality, as malware exploits bugs in code
- Antivirus software
- Train employees the risks of opening suspicious files/attachments
What is TCP/IP?
- Stands for Transmission Control Protocol / Internet Protocol
- Used in all parts of the Internet to enable communication between devices
- Formed from four distinct layers that form the TCP/IP stack:
- Application
- Transport
- Network
- Link
What is the role of the application layer of the TCP/IP stack?
- Selects and uses the correct protocol to transmit data
- Interacts with the user with application software
What is the role of the transport layer of the TCP/IP stack?
- Establishes a virtual path between the sender and receiver
- Splits the transmission into packets
- Each packet has a sequence number
- Also contains a port number which identifies the protocol
What is the role of the network layer of the TCP/IP stack?
- Provides the correct IP addresses for each packet’s source and destination
- Routers work within the network layer, using the IP addresses on a packet to send it to its destination
What is the role of the link layer of the TCP/IP stack?
- Controls physical connections between pieces of hardware in a network
- Adds MAC addresses to packets that are received from the network layer
- These identify the hardware to where a packet should be sent
- These change with every hop through a network
What happens when a packet has been received?
- It is stripped of extra info by reversing the stack
- The link layer removes MAC addresses
- The network layer removes IP addresses
- The transport layer uses the packet’s port number to determine the correct application to send the packet, but also uses the sequence number
- The application layer receives the packets and displays the info to the user
What two parts are IP addresses split into?
- A network identifier (computers in the same network share these)
- A host identifier
What is a subnet?
- When networks are divided into smaller networks, subnets
- These have different network identifiers
How is a network identifier found?
- It can be determined with a subnet mask
- To find it:
- Convert its IP address and subnet mask into binary
- Perform an AND on both numbers
- Convert to decimal
What are the two types of IP address?
- Version four; IPv4
- Version six; IPv6
What are IPv4 addresses?
- Dotted quad numbers
- Consists of 4 parts that are separated by dots, each of which is assigned one byte
- Over 4 billion unique addresses, but are in short supply
Why were IPv6 addresses created?
- IPv4 were in short supply, and the number of devices on the Internet that require a routable IP address is increasing rapidly
What are IPv6 addresses?
- Formed of eight blocks separated by colons, each of which contains four hex characters
What is a routable and non-routable IP address?
- Routable is a public
- ## Non-routable is a private
Why do most homes share the same IP address?
- If every device that is connected to a network had its own IP address, there wouldn’t be enough IP addresses to go around
What is DHCP?
- Stands for Dynamic Host Configuration Protocol
- The number of available private IPs within a private network is limited, DHCP assigns IPs to devices when they join a network, by using a pool of available IPs
- These are allocated for the duration, once a device leaves, the IP returns to the reallocation pool
What is NAT?
- Stands for Network Address Translation
- When a computer on a private network communicates with a device online, the device cant respond directly to the computer as the computers IP isn’t globally unique
- NAT sends packets through the router which:
- Makes a record of the packet
- Replaces the private IP with its own routable IP
What is port forwarding?
- Used when a client communicates with a server that is connected to a private network
- The client sends packets to the public IP of the router belonging to the server’s private network which contains the port number of the app on the server
- The packets are forwarded by the private router to the server using NAT
What are the steps for a client to connect to a database?
- Client-sever request made by client to web browser
- Web browser responds with the requested web page
- The file contains JavaScript which loads an API, which uses REST to enable the database server to be queried by the client using HTTP
- The database server responds by using JSON or XML
- The clients browser processes the JSON or XML and displays the response
What is XML?
- Stands for Extensible Markup Language
What is JSON?
- Stands for JavaScript Object Notation
Compare JSON with XML
- JSON is more compact, easier to read, easier to create and faster for computers to process
- XML is more flexible
What is a thin-client network?
- The majority of network’s processing power belongs to servers
- These provide services and resources
What are the advantages of thin-client networking?
- Easy to add new clients
- Clients are cheap machines
- Software updates and security are managed from the server, allowing for greater control
What are the disadvantages of thin-client networking?
- Requires a powerful server which is expensive and requires expertise to set up and maintain
What is a thick-client network?
- The clients are powerful enough to provide their own processing power and services
- This removes the requirement for a server, although servers can still exist
What are the advantages of thick-client networking?
- No high costs and expertise needed as there is no server to set up and maintain
- Much quieter communication channels which reduces the likelihood of collisions compared to thin-client
What are the disadvantages of thick-client networking?
- Require more powerful clients than thin-client networks, so there is some cost in setting up
- Harder to maintain, no facility to issue updates and manage security from a central server