Computer Networks Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main characteristic of a Local Area Network (LAN)?

  • Uses only satellite technology
  • Covers a highly populated area
  • Covers a restricted area, such as a building (correct)
  • Covers a large geographical area

A Wide Area Network (WAN) typically uses wireless technology as its primary connection method.

False (B)

What is the function of a server in a network?

Manages network resources such as storage, files, and peripherals.

A ______ enables a computer to connect with the file server and share data with other computers on the network.

<p>network card</p> Signup and view all the answers

Match the following network devices to their functions:

<p>Switched Hub = Connection point for nodes and checks destination addresses Repeater = Extends the range of signals Wireless Access Point = Connects wireless devices to a wired network Media Converter = Changes the form of a network signal</p> Signup and view all the answers

Which of the following defines a foreign key?

<p>A primary key in one entity appearing as a non-key in another entity (D)</p> Signup and view all the answers

Data duplication occurs when an attribute is stored multiple times across different tables.

<p>False (B)</p> Signup and view all the answers

What is the primary purpose of normalization in a database?

<p>To reduce redundancy and increase data integrity.</p> Signup and view all the answers

A set of rules that ensures a foreign key corresponds to a valid primary key is known as __________ integrity.

<p>referential</p> Signup and view all the answers

Match the components of a data dictionary with their descriptions:

<p>Field name = The name of the data attribute in a table Data type = The kind of data (e.g., integer, varchar) Field size = The maximum length of data that can be stored Validation rules = Rules to ensure data quality and integrity</p> Signup and view all the answers

What characteristic must a database possess to be considered in Second Normal Form (2NF)?

<p>It contains no partial key dependencies. (D)</p> Signup and view all the answers

Query By Example (QBE) can be used to create tables and manage a database without requiring technical skills.

<p>True (A)</p> Signup and view all the answers

What happens in Third Normal Form (3NF)?

<p>It eliminates non-key dependencies.</p> Signup and view all the answers

In a relational database, each record in a table must be uniquely identified by a __________ key.

<p>primary</p> Signup and view all the answers

What is a primary characteristic of Structured Query Language (SQL)?

<p>It is designed for creating and manipulating databases. (B)</p> Signup and view all the answers

What is the primary function of a repeater in network transmission?

<p>To regenerate or amplify weakened signals (A)</p> Signup and view all the answers

A MAC address identifies the connection address of a computer on the Internet.

<p>False (B)</p> Signup and view all the answers

What is the purpose of an IP address?

<p>To identify the connection address of a computer on the Internet.</p> Signup and view all the answers

In a __________ network, each node is connected to the central file server by its own cable.

<p>star</p> Signup and view all the answers

Match the following network topologies with their characteristics:

<p>Bus = Direct connection to a main cable Ring = Data travels in one direction only Star = Each node connects to a central server Peer-to-Peer = All computers have equal status</p> Signup and view all the answers

Which layer of the OSI model is responsible for reassembling data packets at their destination?

<p>Transport Layer (A)</p> Signup and view all the answers

A broken cable in a star network will stop all communication within the network.

<p>False (B)</p> Signup and view all the answers

What does CSMA/CD stand for?

<p>Carrier Sense Multiple Access with Collision Detection.</p> Signup and view all the answers

The __________ layer of the OSI model converts data into a physical signal.

<p>Physical</p> Signup and view all the answers

Match the following communication protocols with their functions:

<p>TCP = Handles file transfer and splits data into packets IP = Transfers packets of data from node to node Ethernet = Defines the networking protocol and physical connections OSI Model = A framework for understanding network communications layers</p> Signup and view all the answers

What does the Presentation layer of the OSI model primarily do?

<p>Converts data into the correct format (A)</p> Signup and view all the answers

In a peer-to-peer network, one computer has the authority to manage all resources.

<p>False (B)</p> Signup and view all the answers

What is the main advantage of using communication protocols?

<p>They allow devices from different manufacturers to communicate coherently.</p> Signup and view all the answers

A media converter allows two __________ types or protocols to connect with each other.

<p>dissimilar</p> Signup and view all the answers

What happens when two stations attempt to transmit simultaneously in a network?

<p>A collision occurs (D)</p> Signup and view all the answers

A token in a token passing network accommodates multiple packets at once.

<p>False (B)</p> Signup and view all the answers

What is the primary function of VoIP technology?

<p>To allow telephone calls over computer networks.</p> Signup and view all the answers

The measure of the capacity of a communication channel is known as __________.

<p>bandwidth</p> Signup and view all the answers

Match each transmission media type with its description:

<p>Fibre Optic = Transmits data using modulated light beams Metal Cable = Transmits electrical signals over short distances Wireless = Uses radio waves for data transmission Bluetooth = Connects devices over short ranges using low power</p> Signup and view all the answers

Which method is NOT used for error detection in data transmission?

<p>Binary Tree Checking (C)</p> Signup and view all the answers

A primary key uniquely identifies a record in a table.

<p>True (A)</p> Signup and view all the answers

What is the difference between a primary key and a foreign key?

<p>A primary key uniquely identifies a record, while a foreign key links one table to another.</p> Signup and view all the answers

Broadband refers to high-speed Internet access that is __________.

<p>always on</p> Signup and view all the answers

Which of the following is a characteristic of a logical data model?

<p>Identifies entities and relationships (B)</p> Signup and view all the answers

Echo checking requires the original sender to be involved in verifying data.

<p>True (A)</p> Signup and view all the answers

Describe the role of a checksum in data transmission.

<p>A checksum is an error detection method that checks whether data has been corrupted during transfer.</p> Signup and view all the answers

RFID uses __________ emitted from an RFID reader to activate the tag.

<p>radio waves</p> Signup and view all the answers

Which type of data transmission method uses very fine glass strands?

<p>Fibre Optic (B)</p> Signup and view all the answers

Match the error correction method to its description:

<p>Parity bits = Detects error presence but not correction Checksums = Validates data integrity during transfer Echo Checking = Sends data back to the original sender for verification Cyclic Redundancy Check = Uses division for error detection and correction</p> Signup and view all the answers

Flashcards

Local Area Network (LAN)

A computer network covering a small geographical area, like an office or building, typically using cabling or wireless technology.

Metropolitan Area Network (MAN)

A computer network spanning a city or metropolitan area, often using fiber optic or wireless technology.

Wide Area Network (WAN)

A computer network spanning a wide geographical area, covering a country or even multiple countries, using various technologies like fiber optics, satellites, and undersea cables.

Network Card

An electronic device in a computer that allows it to connect to a network, enabling data sharing and communication with other devices.

Signup and view all the flashcards

Server

A central device in a network that manages and controls access to shared resources like files, printers, hardware, and software.

Signup and view all the flashcards

Attribute

A field value that contains the entities for example (an actual value)

Signup and view all the flashcards

Entity

An object about which data is stored

Signup and view all the flashcards

Primary Key

Uniquely identifies a record in a table/tuple in an entity

Signup and view all the flashcards

Composite Key

Consists of more than one attribute which uniquely identify an entity occurrence

Signup and view all the flashcards

Foreign Key

A primary key in one entity which appears as a non-key in another entity as a link

Signup and view all the flashcards

Referential Integrity

If a foreign key is used it must correspond to a valid/existing primary key

Signup and view all the flashcards

Data Duplication

A (non-key) attribute is stored more than once in the database/table

Signup and view all the flashcards

Data Inconsistency

An attribute for an entity has more than one value

Signup and view all the flashcards

First Normal Form (1NF)

A database is in 1NF if it contains no repeating groups.

Signup and view all the flashcards

Second Normal Form (2NF)

A database is in 2NF if it is in 1NF and contains no partial key dependencies.

Signup and view all the flashcards

Repeater

A device that regenerates or amplifies signals during network transmission. It's especially useful for long-distance communication, preventing signal weakening or distortion.

Signup and view all the flashcards

Wireless Access Point (WAP)

A device that allows Wi-Fi enabled devices to connect to a network. It typically connects to a router and provides wireless coverage to a specific area.

Signup and view all the flashcards

Media Converter

A device that enables communication between two different network media types or protocols. For example, it can connect a fiber optic cable to a copper cable.

Signup and view all the flashcards

MAC Address

A unique identifier assigned to each network interface card (NIC) on a local area network (LAN). It identifies the physical address of the device.

Signup and view all the flashcards

IP Address

A unique numerical address assigned to each device connected to the internet. It identifies the device's location on the network.

Signup and view all the flashcards

Peer-to-peer network

A network where all computers have equal status. Each device can act as both a supplier and consumer of resources, with control over its own resource sharing.

Signup and view all the flashcards

Server-based network

A network with a central server managing resources and security. Multiple client devices rely on the server for access and data.

Signup and view all the flashcards

Bus network

A network topology where all devices are connected to a single main cable. Data can travel in both directions.

Signup and view all the flashcards

Ring network

A network topology where devices are connected in a circular loop. A token is passed from one device to the next, allowing only the token holder to transmit data. Data travels in one direction.

Signup and view all the flashcards

Star network

A network topology with a central server connected to each device via individual cables. All communication within the network passes through the server.

Signup and view all the flashcards

Communication protocol

A set of rules that govern communication between different devices, ensuring they understand and interpret data correctly

Signup and view all the flashcards

Open System Interconnection (OSI) Model

A model that divides network communication into seven distinct layers, each responsible for specific tasks, ensuring smooth and organized data flow.

Signup and view all the flashcards

Application layer

The layer in the OSI model responsible for presenting information and data to the end user. It interacts with the Presentation layer and handles user interface functions.

Signup and view all the flashcards

Presentation layer

The layer in the OSI model responsible for data formatting and presentation. It converts information into the correct formats for transmission and handles encryption and compression.

Signup and view all the flashcards

Session layer

The layer in the OSI model responsible for managing communication sessions. It establishes connections for communication and maintains the flow of data.

Signup and view all the flashcards

Transport layer

The layer in the OSI model responsible for dividing data into packets and ensuring their reliable delivery. It also handles packet reassembly at the destination.

Signup and view all the flashcards

Network layer

The layer in the OSI model responsible for routing data packets through the network. It determines the best path and adds addresses to each packet.

Signup and view all the flashcards

Data Link layer

The layer in the OSI model responsible for error detection and correction, data block synchronization, and converting packets into bits for transmission. It interacts with the Physical layer.

Signup and view all the flashcards

Physical layer

The layer in the OSI model responsible for converting data into electrical or optical signals for transmission over the physical medium. It interacts with the Data Link layer.

Signup and view all the flashcards

Transmission Control Protocol/Internet Protocol (TCP/IP)

A suite of protocols that defines how data is packaged, sent, and received on the internet. TCP handles file transfer and packet segmentation, while IP manages packet routing.

Signup and view all the flashcards

Ethernet

A networking protocol that defines the rules and physical connections for communication on a network. It covers the Physical and Transport layers of the OSI Model.

Signup and view all the flashcards

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A set of rules that handle network collisions, where two devices try to transmit simultaneously. Ethernet networks use CSMA/CD to detect and resolve collisions.

Signup and view all the flashcards

Token

A carrier for a packet that travels around a network, preventing packet collisions and ensuring orderly data transmission.

Signup and view all the flashcards

Collision Detection

The process of detecting and resolving conflicts when two or more devices attempt to transmit data simultaneously on a shared network.

Signup and view all the flashcards

Bluetooth

A short-range wireless communication technology that allows devices to connect and exchange data over a limited distance, typically within 10 meters.

Signup and view all the flashcards

Wi-Fi

A type of wireless technology using radio waves enabling computers to connect to a local area network (LAN) within a limited range, often 60-90 meters.

Signup and view all the flashcards

Bandwidth

The range of frequencies or data rates available on a communication channel, determining the amount of data that can be transferred per unit of time.

Signup and view all the flashcards

Broadband

High-speed internet access that is always connected, capable of handling multiple signals and data types simultaneously.

Signup and view all the flashcards

Voice over Internet Protocol (VoIP)

Transmission of voice calls over computer networks, converting analog voice signals into digital data packets.

Signup and view all the flashcards

Radio-Frequency Identification (RFID)

A small tag containing a microchip storing data, activated by radio waves emitted from a reader. The tag transmits data back to the reader, enabling identification and tracking.

Signup and view all the flashcards

Fiber Optic

A method of data transmission using thin strands of glass to transmit light pulses at high speeds over long distances, providing secure and interference-free communication.

Signup and view all the flashcards

Metal Cable

A method of data transmission using different types of copper cabling to transmit electrical signals over shorter distances. Examples include coaxial cable and twisted pair.

Signup and view all the flashcards

Wireless

A method of data transmission using radio waves to transmit data between devices without physical cables. Examples include Bluetooth and Wi-Fi.

Signup and view all the flashcards

Parity Bits

A method of detecting errors in data transmission by appending a parity bit to each byte. The parity bit reflects whether the number of 1 bits in the byte is odd or even.

Signup and view all the flashcards

Checksums

A method of error detection by calculating a checksum value from a block of data and appending it to the block. The checksum is recalculated upon reception, and any mismatch indicates an error.

Signup and view all the flashcards

Echo Checking

A method of error detection and correction where the receiver sends back a copy of the received data to the sender for comparison. Any discrepancy triggers retransmission of the original data.

Signup and view all the flashcards

Cyclic Redundancy Check (CRC)

A method of error detection and correction using a mathematical algorithm to calculate a checksum, called a CRC, for a block of data. Any discrepancy in the CRC upon reception indicates an error.

Signup and view all the flashcards

Relational Database

A type of database organized as a collection of tables linked together through relationships. Data is structured in rows (records) and columns (attributes), and relationships are established using primary and foreign keys.

Signup and view all the flashcards

Logical Data Model

A data model that describes the logical structure of a database independently from the underlying software implementation. It defines entities, relationships, attributes, and primary/foreign keys.

Signup and view all the flashcards

Physical Data Model

A data model that specifies the physical implementation of a database, including details like tables, columns, data types, and storage mechanisms.

Signup and view all the flashcards

Study Notes

Network Scope

  • Local Area Network (LAN): Covers a limited area like an office or building. Uses cabling or wireless technology.
  • Metropolitan Area Network (MAN): Covers a populated area or community. Employs fiber optic or wireless technology.
  • Wide Area Network (WAN): Spans a large geographical area, potentially a country or more. Uses fiber optic, public phone systems, communication satellites, or undersea cables.

Network Components and Their Purpose

  • Network Card: An electronic device allowing a computer to connect to a file server and share data with other network computers. Often built into the motherboard.
  • Server: Manages network resources like storage, files, hardware devices, peripherals (printers), communications, email, and web services.
  • Switched Hub: A connection point for nodes. It examines data packet destinations, forwarding packets to their intended recipients.
  • Repeater: Regenerates or amplifies signals that weaken or distort during network transmission, especially over long distances.
  • Wireless Access Point (WAP): Enables Wi-Fi enabled devices to connect to a network, typically through a router. Used in Wi-Fi hotspots.
  • Media Converter: Allows dissimilar media types (e.g., fiber optic to copper cable) or protocols to connect.
  • MAC Address: Identifies the unique physical address of a computer's network interface card (NIC) on a LAN.
  • IP Address: Identifies a computer's connection address on the internet.

IP and MAC Addresses

  • MAC Address: Uniquely identifies a computer's network interface card (NIC).
  • IP Address: Identifies the computer's connection on the internet.

Network Types

  • Server-Based Network: A server manages resources and security. Multiple client computers (or "dumb terminals") request resources from the server.
  • Peer-to-Peer Network: All computers have equal status; each computer supplies and consumes resources. Each computer controls shared resource access.

Network Topologies

  • Bus Network: All nodes connect directly to a main cable (backbone). Data travels in both directions.
  • Ring Network: Each node connects to two adjacent nodes. A token passes data in one direction only; this prevents collisions.
  • Star Network: A central file server connects all nodes via their own cables. The file server controls all network communication.

Communication Protocols

  • Communication Protocol: Set of rules enabling coherent device communication.
  • Advantages of Communication Protocols: Manufacturers can connect devices, and users have more choices in devices.
  • TCP/IP: Dictates information packaging and delivery. TCP handles file transfer and packet allocation; IP handles packet transfer between nodes using IP addresses.
  • Ethernet: Defines networking protocol and physical connections, covering the physical and transport layers.
  • CSMA/CD: Rules for device responses when two devices try to use a data channel simultaneously (collision). Standard ethernet uses CSMA/CD for physical traffic monitoring.
  • Token Passing: A token carries data across a ring network, preventing collisions.
  • Wi-Fi: Connects wireless devices to a network (e.g., within a hotspot) over a short distance. Can be open or requires a password.
  • Bluetooth: Enables device connection if both are Bluetooth enabled, requiring pairing if needed.
  • VoIP: Enables telephone calls via computer networks, converting analog to digital data packets. Supports real-time, two-way conversations.
  • RFID: Tags containing data are activated by radio waves from a reader, transferring that data back to the reader. Tags can be active or passive.

Bandwidth and Broadband

  • Bandwidth: Capacity of a communication channel, measured in Hz or transmission rates (e.g., kbps).
  • Broadband: High-speed, always-on internet access. Commonly uses DSL, coaxial, or fiber optic technologies. Bandwidth greater than 3 kHz (often >300 MHz).

Transmission Media

  • Fiber Optic: Uses glass strands to transmit light beams at high speed over long distances; secure and interference-free.
  • Metal Cable: Uses copper cabling for shorter distances. Types include coaxial, twisted pair, and unshielded twisted pair; shielding prevents interference. Relatively less secure than other methods, as data can potentially be intercepted. Wireless: A range of radio-based data transmission methods, including Bluetooth for short distance, Wi-Fi to connect to a LAN.
  • Wireless: Data transmission via radio waves.

Data Transmission Error Detection/correction

  • Parity Bits: A bit that ensures the sum of all bits (including parity) is odd (odd parity) or even (even parity). Simple detection, but isn't always effective at correcting errors or detecting errors with even numbers of affected bits.
  • Checksums: Algorithm applied to a data block to generate a checksum. The checksum is added with the data block and then recalculated later to see if it changed.
  • Echo Checking: Data is sent back to the sender, and compared for differences to determine if retransmission is needed.
  • CRC (Cyclic Redundancy Check): Fixed number (hashing algorithm) used to divide the data block to calculate a checksum. If checksum is incorrect, a source of the error is detected.

Relational Databases

  • Relational Database: Multiple tables linked by relationships using primary keys to uniquely identify records and foreign keys to link tables.

Logical vs Physical Data Models

  • Logical Data Model: Designed during database design; not software-specific; identifies entities, relationships, attributes, primary and foreign keys.
  • Physical Data Model: Created during implementation, specifying table structures, column names, data types, keys, and validation rules.

Database Terminology

  • Attribute: Value of an entity (e.g., name, value).
  • Entity: Object described in a database (ex: person, place).
  • Primary Key: Uniquely identifies a record in a table.
  • Composite Key: Multiple attributes used to identify a unique record.
  • Foreign Key: Primary key from one table, used as non-key attribute in another to link tables.
  • Referential Integrity: Foreign keys must correspond to valid primary keys.
  • Data Duplication: An attribute repeated multiple times in the database.
  • Data Inconsistency: An attribute has multiple values for an entity.

Database Normalization

  • First Normal Form (1NF): No repeating groups.
  • Second Normal Form (2NF): In 1NF and no partial key dependencies.
  • Third Normal Form (3NF): In 2NF and no non-key dependencies.

Data Dictionary

  • Data Dictionary: Contains information about database data: attribute names, data types, sizes, formats, default values, tables, keys, validation rules, indices, input masks.

SQL and QBE

  • SQL (Structured Query Language): Programming language used for database creation, access, and manipulation.
  • QBE (Query By Example): Graphical method for database querying. User constructs queries using examples, resulting in SQL-based code.
  • Comparison: SQL requires technical knowledge to create databases and generate queries; QBE requires less technical skill.

Normalization Advantages/Disadvantages

  • Advantages: Reduced redundancy, increased data integrity and consistency.
  • Disadvantages: Increased complexity in database design.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Test Your Knowledge
5 questions

Test Your Knowledge

ResilientStrait avatar
ResilientStrait
Networks: Overview and Types
29 questions
Use Quizgecko on...
Browser
Browser