A Level Computer Science Paper 1: 1.3.3 Networks - The Internet
The internet is a global network connecting devices, while the World Wide Web is a system of online resources accessed through it. The backbone consists of high-capacity connections linking major networks worldwide.
Internet
A network of interconnected devices
Key Terms
Internet
A network of interconnected devices
World Wide Web
A collection of resources accessible via the internet
Backbone
A set of dedicated connectors that connect several large networks at different points on the globe
Internet Protocol (IP) Address
A unique identifier for each device on a network, IPv4 has four 8-bit values separated by dots
Uniform Resource Locator (URL)
Specifies the means of accessing a resource across a network as well as its location
Handled by internet registries
Domain Name System (DNS)
The architecture used to map a URL to an IP address. Stored in a DNS server
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Internet | A network of interconnected devices |
World Wide Web | A collection of resources accessible via the internet |
Backbone | A set of dedicated connectors that connect several large networks at different points on the globe |
Internet Protocol (IP) Address | A unique identifier for each device on a network, IPv4 has four 8-bit values separated by dots |
Uniform Resource Locator (URL) | Specifies the means of accessing a resource across a network as well as its location |
Domain Name System (DNS) | The architecture used to map a URL to an IP address. Stored in a DNS server |
Finding an IP address | Checked by the local DNS, the client’s known DNS server, the root DNS then the .co DNS until one can find the IP address |
Protocol | The first part of a URL, usually https: |
Host server name | The second part of a URL, the name of the server, often www. |
Domain name and second domain name | The domain name is the name of the website e.g. ocr/bbc The second domain name is usually the type e.g. .edu/.sch |
Circuit Switching | Creating a communication connection between two endpoints for the duration of data transfer |
Packets | The equal size chunks that data is broken down into and are received |
Latency | The time taken for a packet to reach its endpoint |
Transportation of Packets | Routers store data about available routes to neighbouring routers in a routing table. The router will send the packet to the nearest router that doesn’t go backwards, this is repeated to the end destination. |
Hop | A transfer of packets between routers |
Sequence number | Tells the receiver which order the packets should be in |
What does a header contain? | The sender and recipient’s IP address, the protocol being used, the time to live (hop limit) and packet number x of y |
What does a trailer contain? | The end of packet flag and checksum/CRC (cyclic redundancy checking). Used to check the data has not been corrupted. |
Packet size | Typically 500-1500 bytes |
Protocol | A set of rules, or a formal description, of the format of digital transmission |
TCP/IP and layers | Transmission control protocol / internet protocol A stack, top to bottom: application, transport, network, link |
Application layer | Defines what information is put together to send data and what protocol should be used, displays to the user on return |
Transport layer | Splits the data into a series of packets and numbers each, requests retransmission of lost packets. Reorders packets upon receiving |
| Addresses packets with the source and destination IP addresses, removes on return. |
Link layer | Adds the MAC address of the source and destination or the router if across a different network, removes MAC address on return. |
MAC address | Media Access Control - Uniquely identifies a physical device with a network interface card. |
Port number | Used to alert a specific application to deal with data sent to a computer, used by a protocol to specify what data is sent |
FTP | File transfer protocol - An application level protocol used to move files across a network |
Email protocols | Use SMTP to send, POP3 to download from a mail server and IMAP to manage emails on a server. POP3 is only on one computer, IMAP across multiple. |
Firewall security uses | Only open certain ports so only certain traffic can enter |
Packet filtering | Where the firewall inspects packets to see which port they are trying to enter |
Proxy server | Makes a request on behalf of your computer, hides the request IP address from the recipient |
Proxy server uses | Enables anonymous surfing, filters undesirable web content, logs user data with their request, produces a cache of previously visited sites |
Botnets | A collection of software robots which infect unknowing computers |
Distributed denial of service (DDoS) | Where a malicious user sabotages a network of infected computers to sabotage a website or server by sending many requests |
Hacking | The process by which cyber criminals take over a computer |
Malware | Software which infects the computer that it is being run on |
Pharming | Redirecting a URL to send users to a malicious website |
Phishing | Fake emails or text messages created to look like they are from a legitimate source |
Ransomware | Malware which requires you to pay a ransom to bypass it. Lock screen malware prevents access, encryption malware stops you accessing data |
Spam | Mass distribution of unsolicited messages |
Spoofing | A website or email address designed to appear like a legitimate source |
Spyware | Software which connects personal information without you knowing |
Trojan Horses | A malicious program disguised as or embedded in legitimate software |
Viruses | Malicious computer programs intended to infect you and your contacts |
Wi-FI eavesdropping | Recording information communicated over an unsecure Wi-Fi network |
Worm | A malicious program stored in memory which can self-replicate. |
HTTP | Hypertext Text Transfer Protocol |
SMTP | Simple Mixed Transfer Protocol |
IMAP | Internet Messaging Access Protocol |
Blagging | A type of attack in which the attacker creates a situation in which the user shares confidential information or performs actions that aren't usually performed |
Firewall | A device deigned to prevent unauthorised access to a network. Consists of two NICs between the user and the internet. |