9618 Computer Science
AS Content
Chpater 1 Information representation
1.1 Data representation
1.2 Multimedia
1.3 Compression
Chapter 2 Communication
2.1 Networking
2.2 The internet
Chpater 3 Hardware
3.1 Computers and their components
3.2 Logic Gates and Logic Circuits
Chapter 4 Processor Fundamentals
4.1 Central Processing Unit (CPU) Architecture
4.2 Assembly Language
4.3 Bit manipulation
Chapter 5 System Software
5.1 Operating Systems
5.2 Language Translators
Chapter 6 Security, privacy and data integrity
6.1 Data Security
6.2 Data Integrity
Chpater 7 Ethics and Ownership
7.1 Ethics and Ownership
Chapter 8 Databases
8.1 Database Concepts
8.2 Database Management Systems (DBMS)
8.3 Data Definition Language (DDL) and Data Manipulation Language (DML)
Chapter 9 Algorithm Design and Problem-solving
9.1 Computational Thinking Skills
9.2 Algorithms
Chapter 10 Data Types and Records
10.1 Data Types and Records
10.2 Arrays
10.3 Files
10.4 Introduction to Abstract Data Types (ADT)
Chapter 11 Programming
11.1 Programming Basics
11.2 Constructs
11.3 Structured Programming
Chapter 12 Software Development
12.1 Program Development Life cycle
12.2 Program Design
12.3 Program Testing and Maintenance
A2 Content
Chapter 13 Data Representation
13.1 User-defined data types
13.2 File organisation and access
13.3 Floating-point numbers, representation and manipulation
Chpater 14 Communication and internet technologies
14.1 Protocols
14.2 Circuit switching, packet switching
Chpater 15 Hardware
15.1 Processors, Parallel Processing and Virtual Machines
15.2 Boolean Algebra and Logic Circuits
Chapter 16 Operating System
16.1 Purposes of an Operating System (OS)
16.2 Translation Software
Chpater 17 Security
17.1 Encryption, Encryption Protocols and Digital certificates
Chpater 18 Artificial intelligence (AI)
18.1 Artificial Intelligence (AI)
未命名
Chapter 19 Computational thinking and problem solving
19.1 Algorithms
19.2 Recursion
Chapter 20 Further programming
20.1 Programming Paradigms
20.2 File Processing and Exception Handling
Mr. Theo
-
+
首页
14.1 Protocols
- Application Layer - Transport Layer - Internet Layer - Link Layer Purpose of Application Layer - To provide services / interface with the user // access to applications, for example login, file transfer, network file access, email, etc - To provide mechanisms for securing communication e.g. encryption/authentication - To define/provide protocols used to allow the exchange of data/communication // to contain programs that exchange data - Error detection and recovery mechanisms to handle application specific errors Purpose of Transport Layer - To provide logical communication between applications running on different hosts // To ensure that data is delivered to the correct application process on the destination machine - To ensure error-free, end-to-end delivery of data between a source and a destination, in sequence // to provide error recovery techniques such as error detection codes and automatic repeat request - To break data into segments when sent and to reconstruct when received // To reassemble segments at destination - To regulate network connections // to provide flow control mechanisms to prevent data loss. Purpose of Internet layer - To identify the intended network and host. - To add header containing IP addresses. // To address packets with their source and destination IP Addresses. - To prepare packets for delivery by formatting them into datagrams. - To route datagrams through the optimum route over a network. Purpose of Link layer - To prepare the next hop by managing the link between two directly connected devices. // To identify and move traffic across local segments. - To format datagrams into frames for transmission. - To identify network protocols in the packet header. // To ensure correct network protocols are/is followed. - To deliver frames to the receiving network. // To receive frames from the sending network. // To map IP addresses to MAC physical addresses. - To provide error checking/error correction/recovery/reconstruction - including resend requests. Describe how the TCP/IP protocol suite is applied when a message is sent through the internet from one host to another. Do not describe the function of individual layers of the TCP/IP protocol suite. - The TCP/IP suite can be viewed as layers within a stack - Each layer can only accept input from the next higher or the next lower layer/adjacent layer - The user/sender/computer interfaces with the top layer/application layer to send/receive a message - The message when sent passes from the top layer/application layer to the bottom layer/link layer - The message when received passes from bottom layer/link layer to the top layer/application layer - The link layer interfaces directly with the network and sends/receives the message. Secure Socket Layer (SSL) and Transport Layer Security (TLS) are two protocols. - Ensure security/privacy when using the internet - Data encryption - Identification / authentication of client and server Give two examples of situations where the use of SSL/TLS would be appropriate. - When transmitting authentication data e.g. passwords, session cookies - When transmitting data that must be protected from modification on its way to or from a server e.g. user input, or results from the server - When transmitting data classified as non-public. how SSL/TLS is initiated - An SSL/TLS connection is initiated by an application/client. - Every new session begins with a handshake as defined by the SSL/TLS protocols. - The client requests the digital certificate from the server // The server sends the digital certificate to the client. - The client verifies the server’s digital certificate and obtains the server’s public key. - The encryption algorithms are agreed. // The symmetric session keys are generated/defined. - A secure session is established between client and server.
Theo
2026年1月13日 13:04
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
Word文件
PDF文档
PDF文档(打印)
分享
链接
类型
密码
更新密码
有效期