Topic 4: Networks Flashcards
Standalone computer
A computer that is not connected to a network
Network
An arrangement(or group or setup) of two or more computers that are connected together for the purpose of sharing hardware and/or data.
Internet of Things (IoT)
A network of physical objects that use sensors, actuators, embedded systems and wireless technology such as WiFi, Bluetooth and Zigbee, to collect and exchange data, with minimal or no human interaction.
VoIP
Voice of Internet Protocol
LAN
Local Area Network ( in a small area)
Example:
- School network
WAN
Wide Area Network
Example:
- Bank network
WLAN
Wireless Local Area Network
Example:
- Hand held scanners
Server
A computer connected to a network used to coordinate(store and share) vast amounts of data.
Latency
The time it takes for a message to transfer (ms). Also known as ping.
Internet
- An interconnected network or network of networks.
- Most networks are part of the internet.
- Consists of multiple cables or links that connect countries together, and can be though of as the backbone.
Packet switching
- Breaking down a large amount of data into small packets, each packet is independent of one another.
- Each packet is tagged with the recipient and source IP and a sequence number for the packets to be put back in order at the destination.
Server
A computer connected to a network used to coordinate(store and share) vast amounts of data.
Network topology
A Network Topology is the arrangement with which computer systems or network devices are connected to each other.
Bus topology
In a bus topology, all nodes in the network are connected directly to a central cable that runs up and down the network.
Ring topology
In a ring topology network, each node is connected to two other devices.
Star topology
In a star topology, all nodes indirectly connect to each other through one or more switches. The switch acts as a central point through which all communications are passed.
Mesh topology
In a mesh topology, there is no central connection point. Instead, each node is connected to at least one other node.
Router
Manages communication on the network. Can have a built-in wireless access point (WAP).
TCP
- Transmission Control Protocol
- Responsible for delivering data to a given address
- Transport layer
Modem
Modulator/Demodulator
HTTP
- Hyper Text Transfer Protocol
- Application layer
SMTP
- Simple Mail Transfer Protocol
- Application layer
IP
- Internet protocol
- Responsible for obtaining the address to which data is sent.
- Internet layer
TCP/IP
- Layered protocol stack (Application layer, Transport layer, Internet layer, Link layer)
- Collection of protocols
- It sets how data should be formatted and transmitted across networks
Web server
Holds and shares web pages
File server
Holds and maintains user files
File server
Holds and maintains user files
Mail server
Handles emails between users
Methods to protect networks
- Access control: Ensures that only authorised users can access the network and its resources
- Authentication (User management) : Ensures that users can only access data relevant to them
- File permissions: Prevents misuse: deleting/copying data, installing software
- Physical security: Prevents damage to hardware
- Firewall: Acts as a barrier between an organisation’s internal network and the internet. Inspects incoming and outgoing data traffic and decides what data to allow through
Importance of network security
- Business success: data on the network is vital for running an organisation, it might fail if comprimised
- Privacy: data on the network might be sensitive
- Financial: the data might be financially valuable
Vulnerabilities of the cloud
Cloud data centres attract many attacks due to the vast amount of information stored, sensitive data is best stored locally.
Ethical hacking
Looks for weaknesses in software and systems by trying to penetrate into them so that they can be addressed.
Penetration testing
Used to test a computer system or network in order to find vulnerabilities
Social engineering
Exploiting human behavior. The attacker will ‘engineer’ a situation where the target individuals give away confidential information
Unpatched software
Someone can exploit a vulnerability in an unpatched (unfixed) software that still has that vulnerability
Anti-malware software
Prevents infection by malware by searching for it and destroying it
Encryption
Scambles data for anyone who doesn’t have the key to unscramble it.
Asymmetric encryption
- Uses two different keys
- Every user has two keys (public and private)
- A message encrypted with a public key can only be decrypted with its private key
Symmetric encryption
- Uses one key
- Encrypts and decrypts data using the same key
- Both ends of the transmission must know the exact shared key
Link layer
- Ethernet
-Wi-Fi
Internet layer
IP
Transport layer
TCP
Application layer
- FTP
- HTTP
- HTTPS
- SMTP
- POP
- IMAP
POP
- Post Office Protocol
- Used by a client to retrieve emails from a mail server
IMAP
- Internet Message Access Protocol
- Similar to POP but messages can be read and stored on the message server
Dynamic IP
When you first connect to the internet, you are given an IP, but returned when you disconnect. In other words, next time you connect to the internet the IP will be different
Domain name
Is a human-friendly form of an IP address.
E.g: www.pearson.com
- easier to use than equivalent IP
URL
Uniform Resource Locator.
- It is the complete web address of a particular web, page, image or any other resource on the internet.
What happens when a web page is requested
1) When a user types URL, the browser sends the URL to a DNS server (its purpose is to match the domain names to IP addresses) , asking for corresponding IP address
2) Once it receives the IP address from the DNS server, the browser sends an HTTP page request to the web server that holds the page data.
3) The server finds the correct files and sends them to the browser. Once it receives the data, the browser renders the page and displays in on the screen.