The internet Flashcards
What is the internet
A network of networks that are Inter-Connected networks
how are devices on the internet uniquely identified
an ip address
Describe IPV4
IP version 4, addresses are made up of four octet values ( numerical values described by 8 bits) separated by a full stop
What is A FQDN
A fully qualified domain name can be broken down into constituent parts including a host name, and the domain name itself.
www.example.com
what is bbc.co.uk
the domain name
what does URL stand for
Uniform resource locator
what does www. do
specifies the host
what would be the FQDN for the bbc
www.bbc.co.uk
what is the url made up of
the protocol and the domain name of the resource together form the URL.
what does DNS servers mean
Domain Name System- servers are dedicated computers with an index of domain names and their corresponding ip addresses.
Describe the process of resolving an ip address (7 steps)
1st URL request by browser from a user
2nd Browser extracts the FQDN and sends it to a dns server
3rd Local dns server maps the FQDN to ip address and returns it to browser
4. If local DNS doesnt have the request is moved to the Regional DNS. (has a much larger look up table)
5. Unlikely event Regional DNS doesnt have it it mvoed to NSP (network service provider)
6. Ip is sent to browser and GET request is sent to web server.
7. File is returned to web browser
Simply put what is the TCP IP protocol
A set of protocols that support network communication
what is the purpose of the dns system
domain name system resolves names to ip addresses
Why do websites have both domain names and ip addresses
hard to remember ip
IP address required for computer to access the site.
Describe the process of packet switching (6 steps)
Messages are split into packets
Each packet is given a destination and source address
Packets are given a sequence number
Each packet in independently dispatched to the Internet through a router gateway
Routers forward packets to other nodes on the network until they reach destination
Packets reassembled at the destination
What is a router
Connects two networks together
Determines which node to send a packet to next
Describe the process of Routing (3)
Routers forward data packets from one network to another
Each router stores data about the available routes to the destination node
Routers are organised in a hierarchy
What does the header of a packet contain (4)
the destination’s (recipient’s) address so that it can be directed appropriately across the network
the source (sender’s) address
the packet (sequence) number and number of packets
the Time To Live (TTL) or hop limit is also included
What are the 3 parts of the data packet
Trailer payload header
What does the payload contain
At its core, a data packet is a segment of data that needs to be sent, often referred to as the payload
This part of the packet will often vary in size from 500 to
1,500 bytes
Payload refers to the actual data being sent in the packet
What does the Trailer/Footer contain
A packet trailer / footer contains error checking components that verify the data received in the payload has not been corrupted on transfer
Techniques such as checksums are used to check the data by the receiving host
The same checksum is recalculated at the destination
If they do not match, the data has become corrupted and is refused and a new copy is requested to be sent again
What is a gateway when is it required (2)
A gateway is required where data is travelling from one network to another that use different protocols
Networks using different transmission media can require this
A router and gateway can often be combined into one integrated device
Describe how a gateway operates
Header data are removed and reapplied using the correct format of the new network
Describe what is meant by the Time To Live data in a data packet.
a maximum number of hops a packet can take to reach its destination
why are packets a certain size
small enough to ensure individual packets do not take excessive time to transfer
However, they should not be too small as the additional data added makes data transfer inefficient as unnecessary headers and trailers would be required each time
Example gateways
Examples include connecting a LAN to the Internet, or connecting different types of internal networks
describe what happens to the data packet at a gateway
header is removed and reapplied using the correct format of the new newtork.
What is the point of the application layer of the TCP/IP Layer (2)
The application layer uses an appropriate protocol relating to the application sending data.
For websites this would be http
How is the transport layer of the TCP/IP Model used (4 parts)
Uses TCP protocol
establishes end to end connection
splits data into packets.
adds sequence number and port to packets.
How is the network layer of the tcp/ip layer used (4)
Uses the internet protocol (IP)
Adds source IP destination IP addressses to packets
Performs routing
Creates checksum for the packet.
How is the link layer of the TCP/IP used
Adds mac address of source device and destination device to the packets of data.
What happens at the link layer when receiving data
removes the MAC addressfrom each packet and passes it to the network layer
What happens at the network layer when receiving data
The network layer removes the ip address from each packet and passes it to the internet
What happens at the transport layer when receiving data
The transport layer removes the port number from each packet, reassembles the packets in correct order and passes them to the application layer.
What happens at the application layer when receiving data
The application layer presents the image data for the user in a browser.
Describe how a port number is used
A port is used to alert a specific application to deal with data sent to a computer
These are used by protocols to specify what data is being sent
What are the two types of port numbers
Well known port numbers
Client port numbers
what are well known port numbers
A reserved port number that has a specific purpose assigned by the Internet Assigned Numbers Authority (IANA)
what are client port numbers
Temporary port numbers that are assigned by the transport layer to the network application on the client computer.
What is Secure Shell
An encrypted protocol that allows secure communication between nodes across a network.
What does SSH stand for
Secure Shell
Why was SSH invented, and what are its functions
As a protocol used to securely connect to and manage devices or servers over an unsecured network, such as the internet.
It provides encrypted communication and ensures confidentiality, integrity, and authentication during data transfer
What are the key features of SSH ( 6)
Encryption
Authentication
Port Forwarding
Secure Remote Access
Command execution
File transfer
What protocols are used for sending an receiving emails
SMTP
POP3
IMAP
Explain SMTP
Used to send emails and forward them between mail servers to their destination
Explain POP3
Downloads emails stored on a remote server to a local client(removed after download)
Explain IMAP
Manages emails on a server so multiple clients can access the same email account in synchronicity
What is a firewall
A firewall is either software or hardware that controls access to and from a network
How does a firewall operate
A firewall is either software or hardware that controls access to and from a network
Data packets from specific IP addresses can be filtered
Data packets also have ports which can be used to only allow traffic through from certain port numbers.
Describe packet filtering
Packets of data are inspected by the firewall to check their source IP address and which port they are attempting to access
Different network protocols use different port numbers for example, HTTP traffic, used to transfer web page data, uses port 80 or 8080
If this traffic is to be allowed through, the port must be opened for the duration of the connection, otherwise the firewall will automatically reject it
What is a proxy server
A proxy server makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient
What are the functions of a proxy server
Enables anonymous surfing
Can be used to filter undesirable online content
Logs user data with their requests
Provides a cache of previously visited sites to speed up access
four different ways that a firewall can protect computers on a LAN
Block/allow traffic on specific ports
Block/allow traffic from specific IP addresses
Block/allow certain types of packet
Firewall maintains information about current connections and only allows packets relevant to these connections through
Definition of encryption
The act of encoding a plaintext message so that it cannot be deciphered unless you have a numerical key to decrypt it.
What is meant by symmetric encryption
Symmetric encryption uses the same key to encrypt and decrypt the data being transferred
What is asymmetric encryption
Uses two separate, but related keys
What is a popular and secure way for generating a key pair for asymmetric encryption
One way of achieving this would be by using the RSA algorithm.
Describe the steps of asymettric encryption
recipients public key is made available
The recipient’s public key is then used to encrypt the data before sending
The encrypted message is sent
The recipient’s private key is used to decrypt the message
Summarise the Digital Signature Creation and Encryption process ( 3steps)
Hashing: The sender computes a hash (digest) of the message using a hashing algorithm.
Signing: The sender encrypts the hash using their private key, creating the digital signature.
Encryption for Recipient: The sender bundles the digital signature with the message and encrypts the bundle using the recipient’s public key.