0% found this document useful (0 votes)
113 views

Computer Networks - AQA Computer Science Cheat Sheet: by Via

A computer network allows nodes like computers to share resources using digital telecommunications. It has advantages like easier communication and flexibility but also disadvantages like hardware costs and vulnerability. Network security is important to protect sensitive data from unauthorized access. Common network protocols include TCP/IP, Ethernet, Wi-Fi and HTTPs. Networks can have topologies like bus, star or mesh that determine how devices connect and transmit data.

Uploaded by

indira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

Computer Networks - AQA Computer Science Cheat Sheet: by Via

A computer network allows nodes like computers to share resources using digital telecommunications. It has advantages like easier communication and flexibility but also disadvantages like hardware costs and vulnerability. Network security is important to protect sensitive data from unauthorized access. Common network protocols include TCP/IP, Ethernet, Wi-Fi and HTTPs. Networks can have topologies like bus, star or mesh that determine how devices connect and transmit data.

Uploaded by

indira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Networks - AQA Computer Science Cheat Sheet

by [deleted] via cheatography.com/56036/cs/15127/

What is a Computer Network? Methods of Network Security

A digital teleco​mmu​nic​ations network which allows nodes (i.e. Auth​‐ Checking the identity of a user, usually by requiring them
computers) to share resources. ent​ica​‐ to input a password or biometric ID.
tion
Pros and Cons of Networks Encr​ypt​‐ Encoding data it using a key, meaning that the same key
Advant​ Comm​uni​cat​ion: becomes easier as a result of technology ion is needed to decrypt the data. This is how HTTPS works.
ages: like texting, emailing, etc. Fire​‐ Protects a network from unauth​orised access.
Flex​ibi​lity: if inform​ation is stored on a network, it means walls
users can access it from anywhere in the world. MAC Allows devices to access or be blocked from accessing a
Sharing resour​ces: sharing files and inform​ation over a Address network based on their physical address embedded
network, including software (can be streamed using web Filter​ing within the device’s network adapter.
applic​ations) and access to printers.
TCP/IP
Disadv​ Hard​ware: routers, network cards etc are required to set
ant​‐ up a network. This is expensive and requires profes​sional TCP Tr​ans​mission Co​ntrol Pr​otocol, a protocol dictating how
ages: expertise to set up. to establish and maintain a network conver​sation.
Vuln​era​bil​ity: hackers can break into networks. Malware IP In​ternet Pr​otocol
can spread and damage files on many computers via a TCP/IP A 4-layer model that is essential to networ​king.
network.
Appl​‐ Where the network applic​ations, such as web browsers
Depe​nde​nce: users relying on a network might be stuck ication or email programs, operate. Examples: HTTP, HTTPS
without access to it. Layer
Tran​‐ Sets up the commun​ication between the two hosts and
Wired vs Wireless
sport they agree settings such as ‘language’ and size of
Wired Networks Layer packets.
The computers are physically connected by wires (e.g. coaxial Network Addresses and packages data for transm​ission. Routes
copper cables, fibre optics). They are arranged in topo​log​ies. Layer the packets across the network.
Wireless Networks Data This is where the network hardware such as the NIC
There is no physical connec​tion, as radio waves (e.g. in the form Link (network interface card) is located. OS device drivers
of WiFi) are used to commun​icate data instead. Layer also sit here.

Which is Better?
TCP/IP Diagram
It is dependent on situation. Wired networks are more reliable, as
there is less interf​erence. Security is also easier to manage.
However, cabling and other physical components can make it
very expensive. Wireless networks allow mobility and flexib​ility,
but are much less secure and interf​erence can occur. Data
transfer may also be slower.

Why is network security important?

Network security is a broad term for any measures that protect a


http:/​/mi​cro​chi​pde​vel​ope​r.c​om/​tcp​ip:​tcp​-ip​-fi​ve-​lay​er-​model
network from unauth​orized access, misuse, destru​ction, or the
sharing of confid​ential inform​ation. It is important because otherwise
sensitive data may be shared or lost. It is also essential from a legal
persep​ctive. For busine​sses, corporate espionage is another a
potential issue.

By [deleted] Published 16th May, 2018. Sponsored by CrosswordCheats.com


cheatography.com/deleted- Last updated 16th May, 2018. Learn to solve cryptic crosswords!
56036/ Page 1 of 2. http://crosswordcheats.com
Computer Networks - AQA Computer Science Cheat Sheet
by [deleted] via cheatography.com/56036/cs/15127/

Network Protocols Network Topologies (cont)

Ethe​‐ A family of protocols that dictate how devices on the same What is bus topolo​gy?
rnet network segment format and transmit data. A network where there is a central backbone of cable connecting
Wi-Fi A family of protocols that deal with wireless transm​ission. every computer. At each end of the cable is a term​ina​tor to stop
or data from contin​ually being moved around.
WLAN
Advantages of bus toplogy:
TCP Tr​ans​mission Co​ntrol Pr​otocol: splits (and later reasse​‐
1. Cheap.
mbles) data into packets. Also involves error checking, as
2. Easy to add more devices.
expects an acknow​led​gement transm​ission within a set
Disadv​antages of bus topology:
time frame.
1. Only approp​riate for small networks, otherwise data transm​‐
UDP User Da​tagram Pr​otocol:
ission is too slow.
IP In​ternet Pr​otocol: each device has an IP address. Packets
2. Data collisions are likely.
are 'addre​ssed' to ensure they reach the correct user.
3. If the backbone is severed, all computers are impacted.
HTTP Hy​pertext Tr​ansfer Pr​otocol: used to access a web-page
from a web server.
Bus Topology
HTTPS Hy​pertext Tr​ansfer Pr​otocol Se​cure: u7ses encryption to
protect data.
FTP File Tr​ansfer Pr​otocol: handles file uploads and
downloads, transfers data and programs.
SMTP Simple Mail Tr​ansfer Pr​otocol: handles outbound email. http:/​/ww​w.b​bc.c​o.u​k/​sch​ool​s/g​cse​bit​esi​ze/​ict​/da​tac​omm​/ne​two​rkt​‐
SMTP servers have databases of user's email addresses. ops​rev​1.shtml

IMAP In​ternet Me​ssage Access Pr​otocol: handles inbound


Star Topology
emails.

A network protocol is a set of rules/​con​ven​tions that dictate how a


network operates.

Network Topologies

What is network topolo​gy?


http:/​/ww​w.b​bc.c​o.u​k/​sch​ool​s/g​cse​bit​esi​ze/​ict​/da​tac​omm​/2n​etw​ork​‐
The way that a network is physically struct​ured.
sre​v6.s​html
What is star topolo​gy?
A network where there is a central server that all of the computers Types of Network
and periph​erals are connected to. PAN Pe​rsonal Area Ne​twork - a network comprising only a small
Advantages of star toplogy: number of devices belonging to only one individual (e.g.
Blueto​oth).
1. If a computer fails, there is no impact on the other devices.
2. Security is good, because the data only passes through the LAN Local Area Ne​twork - a network that encomp​asses a small
server, not any other devices. area (e.g. one company's network).
3. There are no data collis​ions. WAN Wide Area Ne​twork - a network comprising many devices
and covering a large area (e.g. the Internet). Often under
Disadv​antages of star topology:
collective ownership.
1. If the server fails, it's a catast​rophe.
2. Lots of cabling is need to connect all the devices indivi​dually,
so it's quite expensive.

By [deleted] Published 16th May, 2018. Sponsored by CrosswordCheats.com


cheatography.com/deleted- Last updated 16th May, 2018. Learn to solve cryptic crosswords!
56036/ Page 2 of 2. http://crosswordcheats.com

You might also like