Circuit Switching vs Message Switching

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of the Network Layer?

  • To move data(frames) from one node to another node
  • To handle access control and flow control
  • To encode bits into signals
  • To provide logical addressing and routing (correct)

What is the primary function of the Physical Layer?

  • To move data(frames) from one node to another node
  • To handle error control and access control
  • To provide logical addressing and routing
  • To transmit bits over a medium (correct)

What is the main purpose of framing in the Data Link Layer?

  • To add MAC addresses to the frame
  • To synchronize the clock between sender and receiver
  • To group binary data into a frame (correct)
  • To control the flow of data packets

What is the purpose of access control in the Data Link Layer?

<p>To avoid clashing or using a specific link (C)</p> Signup and view all the answers

What is the term for the rate of how many number of bits sent each second?

<p>Data rate (D)</p> Signup and view all the answers

What is the purpose of physical addressing in the Data Link Layer?

<p>To add a MAC address to the frame (C)</p> Signup and view all the answers

What is the purpose of error control in the Data Link Layer?

<p>To identify and correct errors in the frame (C)</p> Signup and view all the answers

What is the term for the process of converting zeroes and ones into a signal?

<p>Encoding (D)</p> Signup and view all the answers

What is the key characteristic of circuit switching?

<p>A dedicated path is established between the sender and receiver (A)</p> Signup and view all the answers

What is the primary function of sequence numbers in packet switching?

<p>To detect missing packets and send acknowledgement (C)</p> Signup and view all the answers

Which of the following is an advantage of layering in data communication?

<p>It provides more modular design and easy troubleshooting (B)</p> Signup and view all the answers

What is the key difference between datagram and virtual circuit approaches in packet switching?

<p>Datagram approach is connectionless, while virtual circuit is connection-oriented (A)</p> Signup and view all the answers

What is the main purpose of protocols in data communication?

<p>To set rules that govern data communication (B)</p> Signup and view all the answers

Which of the following is a phase in circuit switching?

<p>Connection establishment (A)</p> Signup and view all the answers

In a Point to Point Communication, how many nodes share the channel or medium?

<p>Two nodes (D)</p> Signup and view all the answers

What is the characteristic of message switching?

<p>Store and forward mechanism is used at the intermediary node (D)</p> Signup and view all the answers

What is the main responsibility of the Network Layer in the OSI model?

<p>Dealing with routing by the use of IP address (D)</p> Signup and view all the answers

What is the main advantage of circuit switching?

<p>It ensures guaranteed bandwidth for data transfer (A)</p> Signup and view all the answers

What is an exploit in the context of Computer Network Security?

<p>A piece of code that finds and takes advantage of a security flaw (A)</p> Signup and view all the answers

What is the purpose of Network Security?

<p>To create a secure infrastructure for devices and applications (C)</p> Signup and view all the answers

In a Point to Multipoint Communication, how many nodes share the channel or medium?

<p>Many nodes (B)</p> Signup and view all the answers

What type of transmission mode allows data to flow in one direction?

<p>Simplex (B)</p> Signup and view all the answers

What type of transmission mode allows two devices to send and receive at the same time?

<p>Full Duplex (D)</p> Signup and view all the answers

What is the responsibility of the Data Link Layer in the OSI model?

<p>Node to node ensuring all is well, and adding MAC address (A)</p> Signup and view all the answers

What is the purpose of a firewall in network security?

<p>To act as a barrier between trusted internal and untrusted external networks (C)</p> Signup and view all the answers

What is the primary purpose of Intrusion Detection and Prevention Systems (IDS/IPS)?

<p>To monitor network traffic for suspicious activity and policy violations (A)</p> Signup and view all the answers

What is the main benefit of network security?

<p>To protect the organization's reputation (C)</p> Signup and view all the answers

What is the main reason why organizations need network security?

<p>To deliver services that customers and employees demand (B)</p> Signup and view all the answers

What is the primary purpose of a Virtual Private Network (VPN)?

<p>To secure data transmission over public networks (B)</p> Signup and view all the answers

What is the purpose of Network Access Control (NAC)?

<p>To regulate access to the network (B)</p> Signup and view all the answers

What is an exploit in the context of cybersecurity?

<p>A method used by cybercriminals to deliver malware (D)</p> Signup and view all the answers

What is the purpose of Anti-Malware and Anti-Virus Software?

<p>To protect systems from malware (A)</p> Signup and view all the answers

What is the primary purpose of Data Loss Prevention (DLP)?

<p>To monitor and protect sensitive data to prevent unauthorized access, usage, or transmission (C)</p> Signup and view all the answers

What is the purpose of Secure Email Gateway?

<p>To protect email communication by filtering out harmful content and ensuring secure transmission of email data (B)</p> Signup and view all the answers

Which of the following is a feature of Web Security Gateway?

<p>Spam filtering (C)</p> Signup and view all the answers

What is the purpose of Network Segmentation?

<p>To divide a network into smaller, isolated segments to contain security breaches and limit lateral movement of attackers within the network (B)</p> Signup and view all the answers

What is SQL Injection?

<p>A type of cyber attack in which an attacker manipulates an SQL query to execute malicious SQL code on a database (B)</p> Signup and view all the answers

What is the primary purpose of Identity and Access Management (IAM)?

<p>To manage user identities and access permissions (B)</p> Signup and view all the answers

What is the purpose of Wireless Security?

<p>To protect wireless networks from unauthorized access and attacks, ensuring secure data transmission over Wi-Fi (A)</p> Signup and view all the answers

What is a component of Security Information and Event Management (SIEM)?

<p>Log management (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Network Fundamentals

  • Circuit switching: a dedicated path is established between sender and receiver before data transfer
    • 3 phases: connection establishment, data transfer, connection disconnection
    • Example: telephone network
  • Message switching: store and forward mechanism, message is transferred as a complete unit
  • Packet switching: message is broken into individual packets, each with source and destination IP address and sequence number
    • 2 approaches: datagram packet switching (connectionless) and virtual circuit packet switching (connection-oriented)

Network Layers

  • Layering: decomposing problem into manageable components (layers)
    • Advantages: modular design, easy troubleshooting
  • Network Layer: provides logical addressing, routing
  • Data Link Layer: responsible for moving data (frames) between nodes
    • Services: framing, physical addressing, flow control, error control, access control
  • Physical Layer: responsible for transmitting bits over a medium, provides electrical and mechanical specifications
    • 2 kinds of medium: wired and wireless

Physical Layer

  • Physical characteristics of medium: determines type of medium (wired or wireless)
  • Representation of bits: encoding (converting 0s and 1s into signal)
  • Data rate: transmission rate (number of bits sent per second)
  • Synchronization of bits: clock synchronization between sender and receiver
  • Line configuration: point-to-point communication (single channel/medium) vs. point-to-multipoint communication (shared channel/medium)
  • Physical topology: type of network topology
  • Transmission mode: simplex (one-way), half-duplex (two-way, not simultaneous), full-duplex (two-way, simultaneous)

Computer Network Security

  • Network security: protection of underlying networking infrastructure from unauthorized access, misuse, or theft
    • Combines multiple layers of defenses at the edge and in the network
  • Exploits: programs or code designed to find and take advantage of security flaws
  • Types of network security:
    • Firewall security
    • Intrusion Detection and Prevention Systems (IDS/IPS)
    • Virtual Private Network (VPN)
    • Anti-malware and anti-virus software
    • Network Access Control (NAC)
    • Data Loss Prevention (DLP)
    • Secure Email Gateway
    • Web Security Gateway
    • Wireless Security
    • Network Segmentation
    • Security Information and Event Management (SIEM)
    • Identity and Access Management (IAM)

Network Threats

  • SQL injection: type of cyber attack that manipulates SQL queries to execute malicious code on a database

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser