Please enable JavaScript.
Coggle requires JavaScript to display documents.
Networks (Protocols (Divided into layers (Advantages (Hardware is…
Networks
Protocols
-
-
-
-
Divided into layers
-
Layer 1- data link layer: passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware
Layer 2- network layer: making connections between networks, directing data packets and handling traffic. Used by routers
-
-
-
-
-
-
Data is sent in packets
Packet switching
1) The sending device splits the data into packets to be sent across the network. Each packet is given a packet number to show the order of the data.
2) Each router reads the packet header and decides which way to send the packet next, according to the IP rules.
3) The way the data is sent changes depending on network traffic so the packets can take different routes. If a router receives too many packets at once it may prioritise some over others.
4) As the packets take different routes, they can arrive in the wrong order. The receiving device uses the packet numbers to reassemble them in the right order.
5) Sometimes packets go missing in transit so the receiving device checks periodically that all packets have been received. If it hasn't received them in a certain time, it sends a timeout message back to the sending device.
6) If all of the data is received and the checksums match, a receipt confirmation is sent to the sending device.
-
-
-
-
The internet
-
-
-
World Wide Web- a collection of websites that are hosted on web servers and accessed through the http protocol, which are accessed by URLs
-
Virtual networks
-
-
Has its own security, including a firewall
There can be multiple existing on the same network, all sharing the same hardware
A Virtual Private Network is a type of virtual network that can be used to send data securely over a large network, a virtual LAN allows you to split a LAN into several seperate networks using the same hardware
Hardware
Wireless
-
-
Wireless access point required, which is a switch that allows devices to connect wirelessly
-
-
-
-
-
Security threats
Malware
Actions
-
-
-
Scareware- convince users the software is infected, and give a malicious link or request money
-
-
Access
Viruses- attach to files and are spread by usres copying infected files. They are activated by users opening them.
Worms- self-replicate without any user help, and exploit weaknesses in network system.
-
Network attacks
Denial-of-service attack- where a hacker tries to stop users accessing a network or website by flooding the network with useless traffic, rendering the network extremely slow or completely inaccessible.
Brute force attack- a type of active attack used to gain passwords through trial and error, using automated software to produce likely passwords.
-
-
Passive attack- where someone monitors data travelling on a network and intercepts any sensitive information. They use network-monitoring hardware and software such as packet sniffers.
User exploitation
-
Social engineering
-
A common form of social engineering takes place over the telephone- someone rings up an employee of a company and pretends to be a network administrator and asks them to disclose cofidential information
Phising is when a hacker directs a user to a spoof website of their company and asks them to update information
-
-
Performance
Network topologies
Mesh
Expensive wired setup, cheap when wireless
-
-
-
-
-
Bus
Data sent both ways, causing frequent data collisions
-
-
-
-
-
-
LANs and WANs
-
WANs
-
-
-
-
-
Connected using telephone lines, satellite links or radio links
-
-