Computer Network Definition and Types
24 Questions
0 Views

Computer Network Definition and Types

Created by
@FervidManganese

Questions and Answers

What is a computer network?

  • A collection of interconnected devices that communicate with each other (correct)
  • A type of software used for data transmission
  • A single device that communicates with itself
  • A type of hardware used for data storage
  • What type of network connects devices over a larger geographical area?

  • WAN (correct)
  • WLAN
  • LAN
  • MAN
  • What is the difference between physical and logical topology?

  • Physical topology is the way data is transmitted, and logical topology is the physical layout
  • Physical topology is used for wired networks, and logical topology is used for wireless networks
  • Physical topology is the physical layout, and logical topology is the way data is transmitted (correct)
  • Physical topology is used for LAN, and logical topology is used for WAN
  • What protocol is used for transferring data over the web?

    <p>HTTP</p> Signup and view all the answers

    What is the function of a switch in a network?

    <p>Connects multiple devices together and filters traffic</p> Signup and view all the answers

    What is the function of a router in a network?

    <p>Connects multiple networks together and routes traffic</p> Signup and view all the answers

    What is the purpose of the physical layer in a network?

    <p>Defines the physical means of data transmission</p> Signup and view all the answers

    What is the function of the network layer in a network?

    <p>Routes data between networks</p> Signup and view all the answers

    Which OSI layer is responsible for routing data between networks?

    <p>Network Layer (Layer 3)</p> Signup and view all the answers

    What is the equivalent layer in the TCP/IP model to the OSI's Network Layer?

    <p>Internet Layer</p> Signup and view all the answers

    Which security feature filters incoming and outgoing traffic based on source IP, destination IP, port numbers, and protocols?

    <p>Access Control Lists (ACLs)</p> Signup and view all the answers

    What is the primary goal of router hardening?

    <p>To prevent attacks and unauthorized access</p> Signup and view all the answers

    Which OSI layer is responsible for providing error-free transfer of data frames?

    <p>Data Link Layer (Layer 2)</p> Signup and view all the answers

    What is the purpose of changing default passwords on a router?

    <p>To prevent unauthorized access to the router</p> Signup and view all the answers

    Which of the following is NOT a security feature used to secure routers?

    <p>Quality of Service (QoS)</p> Signup and view all the answers

    What is the purpose of regularly updating router firmware?

    <p>To patch security vulnerabilities</p> Signup and view all the answers

    What is the primary layer that connects devices to the network in a hierarchical architecture?

    <p>Access Layer</p> Signup and view all the answers

    Which switch fabric architecture is known for its high-speed switching capabilities?

    <p>Crossbar</p> Signup and view all the answers

    What is the primary mode of switching where the switch stores the entire packet before forwarding it?

    <p>Store-and-Forward</p> Signup and view all the answers

    In which network topology do devices connect in a circular configuration, providing redundancy and fault tolerance?

    <p>Ring Topology</p> Signup and view all the answers

    What is the function of the distribution layer in a hierarchical architecture?

    <p>Aggregates multiple access layer switches</p> Signup and view all the answers

    Which switch fabric architecture is limited in scalability due to a single shared bus?

    <p>Shared Bus</p> Signup and view all the answers

    What is the primary advantage of the cut-through switching mode?

    <p>Lower latency</p> Signup and view all the answers

    In which topology does a central switch connect to multiple devices?

    <p>Star Topology</p> Signup and view all the answers

    Study Notes

    Definition and Types

    • A computer network is a collection of interconnected devices that communicate with each other to share resources and exchange data.
    • Types of computer networks:
      1. LAN (Local Area Network): connects devices in a limited geographical area (e.g., home, office building).
      2. WAN (Wide Area Network): connects devices over a larger geographical area (e.g., city, country).
      3. MAN (Metropolitan Area Network): connects devices in a metropolitan area (e.g., city, town).
      4. WLAN (Wireless Local Area Network): connects devices wirelessly in a limited geographical area.
      5. VPN (Virtual Private Network): connects devices securely over the internet.

    Network Topologies

    • Physical Topology: the physical layout of devices in a network (e.g., bus, star, ring).
    • Logical Topology: the way data is transmitted between devices in a network (e.g., bus, star, ring).

    Network Protocols

    • TCP/IP (Transmission Control Protocol/Internet Protocol): a suite of protocols used for communicating over the internet.
    • HTTP (Hypertext Transfer Protocol): a protocol used for transferring data over the web.
    • FTP (File Transfer Protocol): a protocol used for transferring files over a network.
    • SMTP (Simple Mail Transfer Protocol): a protocol used for sending and receiving emails.

    Network Devices

    • Hub: a simple network device that connects multiple devices together.
    • Switch: a network device that connects multiple devices together and filters traffic.
    • Router: a network device that connects multiple networks together and routes traffic.
    • Gateway: a network device that connects a network to the internet.

    Network Layers

    • Physical Layer (Layer 1): defines the physical means of data transmission.
    • Data Link Layer (Layer 2): provides error-free transfer of data frames.
    • Network Layer (Layer 3): routes data between networks.
    • Transport Layer (Layer 4): provides reliable data transfer between devices.
    • Session Layer (Layer 5): establishes, maintains, and terminates connections.
    • Presentation Layer (Layer 6): converts data into a format that can be understood by the receiving device.
    • Application Layer (Layer 7): provides services to end-user applications.

    Network Security

    • Firewall: a network device that filters incoming and outgoing traffic based on security rules.
    • Encryption: the process of converting plaintext data into unreadable ciphertext.
    • Authentication: the process of verifying the identity of a user or device.
    • Authorization: the process of granting access to resources based on a user's identity.

    Definition and Types

    • A computer network is a collection of interconnected devices that communicate with each other to share resources and exchange data.
    • There are five types of computer networks: LAN, WAN, MAN, WLAN, and VPN.

    Network Topologies

    • Physical Topology refers to the physical layout of devices in a network, and can be bus, star, or ring.
    • Logical Topology refers to the way data is transmitted between devices in a network, and can also be bus, star, or ring.

    Network Protocols

    • TCP/IP is a suite of protocols used for communicating over the internet.
    • HTTP is a protocol used for transferring data over the web.
    • FTP is a protocol used for transferring files over a network.
    • SMTP is a protocol used for sending and receiving emails.

    Network Devices

    • A Hub is a simple network device that connects multiple devices together.
    • A Switch is a network device that connects multiple devices together and filters traffic.
    • A Router is a network device that connects multiple networks together and routes traffic.
    • A Gateway is a network device that connects a network to the internet.

    Network Layers

    • The Physical Layer (Layer 1) defines the physical means of data transmission.
    • The Data Link Layer (Layer 2) provides error-free transfer of data frames.
    • The Network Layer (Layer 3) routes data between networks.
    • The Transport Layer (Layer 4) provides reliable data transfer between devices.
    • The Session Layer (Layer 5) establishes, maintains, and terminates connections.
    • The Presentation Layer (Layer 6) converts data into a format that can be understood by the receiving device.
    • The Application Layer (Layer 7) provides services to end-user applications.

    Network Security

    • A Firewall is a network device that filters incoming and outgoing traffic based on security rules.
    • Encryption is the process of converting plaintext data into unreadable ciphertext.
    • Authentication is the process of verifying the identity of a user or device.
    • Authorization is the process of granting access to resources based on a user's identity.

    Network Architecture

    • OSI Model: A 7-layered framework for network communication
      • Layer 1: Physical layer defines physical means of data transmission (e.g., Wi-Fi, Ethernet)
      • Layer 2: Data Link layer provides error-free transfer of data frames between nodes on the same network
      • Layer 3: Network layer routes data between networks (e.g., IP addressing, routing protocols)
      • Layer 4: Transport layer provides reliable data transfer between devices (e.g., TCP, UDP)
      • Layer 5: Session layer establishes, manages, and terminates connections between applications
      • Layer 6: Presentation layer converts data into a format for transmission (e.g., encryption, compression)
      • Layer 7: Application layer supports functions such as email, FTP, and HTTP
    • TCP/IP Model: A 4-layered framework for network communication
      • Layer 1: Network Access layer combines OSI's Physical and Data Link layers
      • Layer 2: Internet layer routes data between networks (equivalent to OSI's Network layer)
      • Layer 3: Transport layer equivalent to OSI's Transport layer
      • Layer 4: Application layer equivalent to OSI's Session, Presentation, and Application layers

    Router Configuration

    • Router Security: Measures to secure routers and prevent unauthorized access and attacks
      • Access Control Lists (ACLs): Filter traffic based on source IP, destination IP, port numbers, and protocols
      • Firewall Configuration: Block or allow traffic based on predetermined security rules
      • Authentication, Authorization, and Accounting (AAA): Verify user identities, grant access, and track network activity
    • Router Hardening: Securing router configurations to prevent attacks
      • Disable Unnecessary Services: Turn off unused services and features to reduce attack surface
      • Change Default Passwords: Replace default passwords with strong, unique passwords
      • Limit Access: Restrict access to the router's configuration interface to authorized users
      • Regularly Update Firmware: Ensure router firmware is up-to-date to patch security vulnerabilities

    Network Architecture

    Hierarchical Architecture

    • A network switch follows a hierarchical architecture consisting of three layers:
    • Access Layer connects devices to the network, such as computers and printers.
    • Distribution Layer aggregates multiple access layer switches and connects to the core layer.
    • Core Layer provides high-speed connectivity between distribution layers and connects to other networks.

    Switch Fabric Architecture

    • Switch fabric is the internal architecture of the switch, responsible for forwarding packets between ports.
    • Common switch fabric architectures include:
    • Shared Bus has a single bus shared among all ports, limiting scalability.
    • Shared Memory uses a shared memory buffer to store packets, allowing for better performance.
    • Crossbar is a matrix of paths connecting input and output ports, enabling high-speed switching.

    Switching Modes

    • Network switches operate in two primary modes:
    • Store-and-Forward stores the entire packet before forwarding it to the destination port.
    • Cut-Through begins forwarding the packet as soon as it receives the destination MAC address.

    Network Topology

    • Network switches can be connected in various topologies, including:
    • Star Topology has a central switch connecting to multiple devices.
    • Mesh Topology connects each device to every other device, providing redundancy and fault tolerance.
    • Ring Topology has devices connected in a circular configuration, with data traveling in one direction.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the definition and types of computer networks, including LAN, WAN, and MAN. Test your knowledge of these interconnected devices that share resources and exchange data.

    More Quizzes Like This

    Networking Roles and Network Types Quiz
    5 questions
    Computer Networking Basics
    12 questions
    Computer Networks: Definition and Types
    5 questions
    Network Types
    48 questions

    Network Types

    FoolproofTopaz avatar
    FoolproofTopaz
    Use Quizgecko on...
    Browser
    Browser