Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Networks 3
3 types of sorting algorithm
2 types of memory
1 explanation of 'disk thrashing'
To understand the threats posed to networks
To revise the 4 layer model
The four layer model
Used to help us understand the relationship between different protocols
By understanding what each layer does, we can have a good idea as to what an unknown protocol is used for!
Above and below
Protocols in different layers can only interact with protocols in layers above and below their own layer
Makes writing new protocols easier!
NITA
Now answer the questions on LAYERS
A physical network of millions of connected LANs
The WWW is simply a service delivered VIA the internet - websites!
Each website has it's own unique address - a URL
This is used to locate an individual site
When we access a site we really are just asking a server to send us information
DNS means we can use a more human friendly URL rather than remembering the IP of the server
Lookup a URL on dastabase
If it's in there - send the corresponding IP
If it's not, send it to another DNS
If it's on the next server, update the previous ones!
Now complete the table
Virtualised resources delivered via the internet
Storage is common, but so is software!
+ Pay for what you need - nothing else
+ Easy to buy more resources
- Who owns the data
-Need internet connection
Fill in information on the cloud!
Creating more than 1 network from only 1 physical network
We take our physical LAN and assign different network addresses - This makes it appear as though different users are working in different physical locations!
Deny access to certain services on the same LAN
Common on guest WiFi systems
Establishing a secure, encrypted communication with a private network
Common way to 'dial in' to work from home
Complete questions on virtual networks
SQL injection involves adding SQL code to login screens to try to force access to a database
Brute force attacks try to compromise the authentication system by systematically trying different username and passwords
Data interception involves using hardware and software to intercept messages being sent, copy them, and send them on to their destination
DDOS attacks use 'botnets' to spam servers with so many requests that legitimate users are unable to use the service
Malware - Malicious software
Viruses spread on infected hosts - have to be executed to start infecting- multiply!
Worms - have the capability to infect machines without a host!
Trojan - Appear to be useful pieces of software but infected with malware!
The idea that people are the weak point in systems
Phishing is a social engineering attack that scams people via email - normally by clicking on a link!