Back to AI Flashcard MakerInformation Technology /A Level Computer Science Paper 1: 1.3.3 Networks - The Internet

A Level Computer Science Paper 1: 1.3.3 Networks - The Internet

Information Technology52 CardsCreated about 1 month ago

The internet is a global network connecting devices, while the World Wide Web is a system of online resources accessed through it. The backbone consists of high-capacity connections linking major networks worldwide.

Internet

A network of interconnected devices

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/52

Key Terms

Term
Definition

Internet

A network of interconnected devices

World Wide Web

A collection of resources accessible via the internet

Backbone

A set of dedicated connectors that connect several large networks at different points on the globe

Internet Protocol (IP) Address

A unique identifier for each device on a network, IPv4 has four 8-bit values separated by dots

Uniform Resource Locator (URL)

Specifies the means of accessing a resource across a network as well as its location
Handled by internet registries

Domain Name System (DNS)

The architecture used to map a URL to an IP address. Stored in a DNS server

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Internet

A network of interconnected devices

World Wide Web

A collection of resources accessible via the internet

Backbone

A set of dedicated connectors that connect several large networks at different points on the globe

Internet Protocol (IP) Address

A unique identifier for each device on a network, IPv4 has four 8-bit values separated by dots

Uniform Resource Locator (URL)

Specifies the means of accessing a resource across a network as well as its location
Handled by internet registries

Domain Name System (DNS)

The architecture used to map a URL to an IP address. Stored in a DNS server

Finding an IP address

Checked by the local DNS, the client’s known DNS server, the root DNS then the .co DNS until one can find the IP address

Protocol

The first part of a URL, usually https:

Host server name

The second part of a URL, the name of the server, often www.

Domain name and second domain name

The domain name is the name of the website e.g. ocr/bbc

The second domain name is usually the type e.g. .edu/.sch

Circuit Switching

Creating a communication connection between two endpoints for the duration of data transfer

Packets

The equal size chunks that data is broken down into and are received

Latency

The time taken for a packet to reach its endpoint

Transportation of Packets

Routers store data about available routes to neighbouring routers in a routing table. The router will send the packet to the nearest router that doesn’t go backwards, this is repeated to the end destination.

Hop

A transfer of packets between routers

Sequence number

Tells the receiver which order the packets should be in

What does a header contain?

The sender and recipient’s IP address, the protocol being used, the time to live (hop limit) and packet number x of y

What does a trailer contain?

The end of packet flag and checksum/CRC (cyclic redundancy checking). Used to check the data has not been corrupted.

Packet size

Typically 500-1500 bytes
Packets are small to ensure that packets don’t take too long to transfer but not too large that adding headers and trailers slows it down.

Protocol

A set of rules, or a formal description, of the format of digital transmission

TCP/IP and layers

Transmission control protocol / internet protocol

A stack, top to bottom: application, transport, network, link

Application layer

Defines what information is put together to send data and what protocol should be used, displays to the user on return


Transport layer

Splits the data into a series of packets and numbers each, requests retransmission of lost packets. Reorders packets upon receiving



Network layer

Addresses packets with the source and destination IP addresses, removes on return.


Link layer

Adds the MAC address of the source and destination or the router if across a different network, removes MAC address on return.

MAC address

Media Access Control - Uniquely identifies a physical device with a network interface card.
A 48-bit 12-digit hexadecimal number

Port number

Used to alert a specific application to deal with data sent to a computer, used by a protocol to specify what data is sent

FTP

File transfer protocol - An application level protocol used to move files across a network

Email protocols

Use SMTP to send, POP3 to download from a mail server and IMAP to manage emails on a server. POP3 is only on one computer, IMAP across multiple.

Firewall security uses

Only open certain ports so only certain traffic can enter

Packet filtering

Where the firewall inspects packets to see which port they are trying to enter

Proxy server

Makes a request on behalf of your computer, hides the request IP address from the recipient

Proxy server uses

Enables anonymous surfing, filters undesirable web content, logs user data with their request, produces a cache of previously visited sites

Botnets

A collection of software robots which infect unknowing computers

Distributed denial of service (DDoS)

Where a malicious user sabotages a network of infected computers to sabotage a website or server by sending many requests

Hacking

The process by which cyber criminals take over a computer

Malware

Software which infects the computer that it is being run on

Pharming

Redirecting a URL to send users to a malicious website

Phishing

Fake emails or text messages created to look like they are from a legitimate source

Ransomware

Malware which requires you to pay a ransom to bypass it. Lock screen malware prevents access, encryption malware stops you accessing data

Spam

Mass distribution of unsolicited messages

Spoofing

A website or email address designed to appear like a legitimate source

Spyware

Software which connects personal information without you knowing

Trojan Horses

A malicious program disguised as or embedded in legitimate software

Viruses

Malicious computer programs intended to infect you and your contacts

Wi-FI eavesdropping

Recording information communicated over an unsecure Wi-Fi network

Worm

A malicious program stored in memory which can self-replicate.

HTTP

Hypertext Text Transfer Protocol

SMTP

Simple Mixed Transfer Protocol

IMAP

Internet Messaging Access Protocol

Blagging

A type of attack in which the attacker creates a situation in which the user shares confidential information or performs actions that aren't usually performed

Firewall

A device deigned to prevent unauthorised access to a network. Consists of two NICs between the user and the internet.