HTTP Provides a way for users to interact with web resources.
Transmits messages between client and
server using hypertext.
HTTPS As HTTP but in addition uses an encryption protocol to ensure communications are secure.
SMTP Enables users to send (and receive) email messagesInitiates sessions between user and mail server.
Server then forwards messages. Uses a process called ‘store and forward’ to store messages and forward as
necessary. The server decides which server to send the message to and the inbox provider then downloads
the message and places it in the recipient’s inbox. Often used in conjunction with IMAP.
IMAP Stores email messages on an ISPs server but allows user to manipulate messages as though on a local
device. Local devices access the ISP server to access the messages. IMAP works with desktop clients and
webmail clients. Allows simultaneous logins from different devices to one account
FTP Allows secure transfer of files between client and server. Files are uploaded to and downloaded from
the server using FTP.
TCP Connects network devices to the Internet. It defines how applications can create channels of
communication across a network. It manages how a message is assembled into smaller packets before
transmission and reassembles packets in the correct order at destination.
UDP Communications protocol that establishes low latency and loss tolerating connections between
applications. Enables the transfer of data before an agreement is provided by the receiving party. This
speeds up transfers. Can start transferring data before agreement is received from receiving party.
IP Relays data across network boundaries. It defines how to address and route each packet to make sure it
reaches the right destination.
Which protocols sit on which layers?
Layer Protocol
Application Layer HTTP
HTTPS
SMTP
IMAP
FTP
Transport Layer TCP
UDP
Internet Layer IP
Link Layer Ethernet, WiFi, 4G, Fibre
A summary of the purpose of each of the layers:
Layer Purpose
Application Layer Provides user access to applications websites, files, email.
Transport Layer Provides transport of data between devices by splitting files into data packets
and checking that they have been sent and received correctly.
Internet Layer Provides the routing of data across the network by making use of addressing.
Link Layer Provides the physical transport of data through electrical signals etc.
More detail - purpose of each of the layers:
Layer Purpose
Application Layer Provides user access to applications websites, files, email. This is where network
applications operate;
Transport Layer Transport layer sets up the communication between the two hosts.
Transport layer splits the data into packets.
Provides transport of data between devices by splitting files into data packets
and checking that they have been sent and received correctly.
Internet Layer Internet layer adds (IP) addresses to the packets.
Internet layer routes the packets across the network
Provides the routing of data across the network by making use of addressing.
Link Layer Link layer is where network hardware operates (eg network interface card).
Link layer is where operating device drivers operate.
Provides the physical transport of data through electrical signals etc.
Authentication
Authentication takes one or more pieces of data specific to the user and compares them to stored
credentials and only allows access to the system if the credentials are valid
Example: Username and Password
Security can be enhanced by asking the user to update their passwords regularly, have complex
passwords and limit login attempts
MAC Address Filtering
MAC Address Filtering takes the specific MAC address for the device and checks to see if it is in the
safelist and only allows the device to connect to the system if it has permission to do so.
If it is in the blocklist then the MAC address is not allowed to use the network
Wi-Fi is offered to the public and so it is difficult to know the MAC addresses of all the devices
connecting to the network
Firewall
A firewall is a piece of software that controls what information goes in and out of a network.
It identifies potential threats using a set of security rules and block any unwanted data. They can be
software of hardware.
They also keep ports closed and open only those that they expect data to receive
Prevents unauthorised access into the network
It makes sure only the right traffic is allowed
Monitors network traffic
Encryption
Encryption is when data is translated into a code which only someone with the correct key can access,
meaning unauthorised users cannot read it.
Essential for sending data over securely
To encrypt data, an encryption key is used which will convert ‘plain text’ into ‘cipher text’.
An encryption key is an algorithm which will systematically alter each piece of data in a file.