Edexcel GCSE Computer Science 2020

4: Networks

Revision tools
You can print this page for a quick reference guide or you can use the tools below to create printable test sheets
4.1.1: understand why computers are connected in a network
Networks
KeywordDefinition
cloud storagewhere people can access remote storage devices to save/load more data than their local computer is capable of storing
collaborationwhere more than one person can work on the same document at the same time
communicationwhere people can send messages to each other over a network connection
computer systemhardware and software which allows programs to be run
connectionlink between two computers
networktwo or more computers connected together to share data
4.1.2: understand different types of networks (LAN, WAN)
Networks
KeywordDefinition
Local Area Networkwhere computers are connected together that are physically close together
Wide Area Networkwhere computers are connected together that are spread out over a large physical area
4.1.3: understand how the internet is structured (IP addressing, routers)
Networks
KeywordDefinition
destination addressIP address of the computer which should receive data
IP addresssequence of numbers which specifies the location of a computer on the Internet
routera device with multiple network connections which sends passes on network traffic so that it can eventually reach the right destination
routing tableused by routers to work out which network connection to use to forward network traffic so that it reaches the right destination address
source addressIP address of the computer which sends data
The Internetinternational, interconnected network of networks
4.1.4: understand how the characteristics of wired and wireless connectivity impact on performance (speed, range, latency, bandwidth)
Networks
KeywordDefinition
bandwidththe maximum possible amount of bits per second a network can achieve if there was no latency or collisions
Bluetoothway of connecting wireless networks between personal devices
collisionwhen multiple computers attempt to send data at the same time over the same network connection or wireless frequency
copper cableway of connecting wired networks which is relatively cheap but slow
fire opticway of connecting wired networks which is relatively expensive but fast
latencythe amount of time you have to wait after sending a request over a network before you receive a response
network performancea measure of how fast and responsive a network is
NFCway of connecting wireless devices over small distances such as contactless payment cards
rangethe distance a computer can move before it is no longer able to connect to the network
RFIDway of sending small amounts of data over small distances to identify products or people
speedthe actual number of bits per second that is transferred over a network
wired connectivitybeing able to connect to a network using a physical connection (e.g. ethernet / fibre optic)
wireless connectivitybeing able to connect to a network without a physical connection (e.g. bluetooth / WIFI)
Zigbeeway of connecting wireless devices to a mesh network without needing WIFI
4.1.5: understand that network speeds are measured in bits per second (kilobit, megabit, gigabit) and be able to construct expressions involving file size, transmission rate and time
Networks
KeywordDefinition
download timethe number of seconds a file takes to be sent from a server to your computer
file sizethe number of bytes needed to store a file
gigabit1,000,000,000 bits
kilobit1,000 bits
megabit1,000,000 bits
transmission ratethe number of bits that is transferred over a network every second
upload timethe number of seconds a file takes to send from your computer to a server
4.1.6: understand the role of and need for protocols (Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP and email (POP3, SMTP, IMAP))
Networks
KeywordDefinition
Ethernetnetwork protocol for wired networks
FTPnetwork protocol used to transfer files across a network
HTTPnetwork protocol used to transfer data over the WWW such as viewing web pages
HTTPSnetwork protocol used to transfer encrypted data securely over the WWW such as logging into web pages
IMAPemail protocol for accessing messages stored on a network server
IPnetwork protocol used to route packets of data across a network to the correct destination
network protocolset of rules computers must follow in order to allow them to transfer data
POP3email protocol for downloading messages from a network on to your own computer
SMTPemail protocol for sending messages over a network
TCPnetwork protocol used to split data into packets and ensure they arrive and can be reassembled in order
TCP/IPnetwork protocols used for the Internet
WiFinetwork protocol for wireless networks
4.1.7: understand how the 4-layer (application, transport, internet, link) TCP/IP model handles data transmission over a network
Networks
KeywordDefinition
applicationhighest level of the TCP/IP protocol stack which determines how programs request and send data over a network (e.g. HTTP)
internetsecond lowest level of the TCP/IP protocol stack which determines how packets are routed to the right destination over a network (e.g. IP)
layerlevel of abstraction in a model of how different devices communicate over a network
linklowest level of the TCP/IP protocol stack which determines how individual bits and bytes are sent over a network (e.g. Ethernet / WiFi)
network protocolset of rules which determine how computers communicate over a network
TCP/IPtransfer control protocol and internet protocol
transportsecond highest level of the TCP/IP protocol stack which determines how data is split into packets and reassembled in the correct order (e.g. TCP)
4.1.8: understand characteristics of network topologies (bus, star, mesh)
Networks
KeywordDefinition
bus topologyway of connecting computers to a network where all devices are linked with one main cable.
hubdevice at the centre of a star topology network which forwards network traffic to all connected devices
mesh topologyway of connecting computers to a network where some or all devices are connected to each other directly
star topologyway of connecting computers to a network where each device is connected to a central hub or switch
switchintelligent device at the centre of a star topology network which routes traffic to the right connected device
terminatordevice at both ends of the shared cable in a bus topology network which stops data bouncing back down the cable
4.2.1: understand the importance of network security, ways of identifying network vulnerabilities (penetration testing, ethical hacking) and methods of protecting networks (access control, physical security, firewalls)
Networks
KeywordDefinition
access controllimiting the rights of specific groups or individual users so that you can control what they can and can't do
ethical hackingobtaining permission to identify security vulnerabilities on a computer network and then reporting them responsibly so that they can't be exploited by malicious hackers
firewallusing a set of rules to filter network traffic to block data from malicious sources or to allow data from trusted sources
malicious hackersomeone who breaks into a network or computer system without permission
penetration testingattempting to break into a network using a list of common vulnerabilities in order to find out if there are any possible ways to gain unauthorised access
physical securitylimiting how close people can get to a computer system by using locks, biometrics or locking down devices
vulnerabilitya weakness in network security which could allow unauthorised users to gain access