Computer Networks: PAN, LAN, MAN and WAN

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which line coding scheme uses only positive voltages to represent binary data?

  • Polar
  • Manchester
  • Bipolar
  • Unipolar (correct)

In half-duplex communication, data can flow in both directions simultaneously.

False (B)

What type of multiplexing divides the communication channel into different frequency bands?

Frequency Division Multiplexing, FDM

The process of converting analog signals to digital using sampling, quantization, and encoding is known as ______.

<p>Pulse Code Modulation, PCM</p> Signup and view all the answers

Match each Data Representation method with its corresponding example:

<p>Text = 'A' in ASCII → Binary 01000001 Number = Decimal 10 → Binary 1010 Image = A 2D grid of pixels with RGB color codes Audio = Sampling an audio wave at regular intervals</p> Signup and view all the answers

Which transmission medium is most suitable for high-speed data transfer and is immune to electromagnetic interference?

<p>Fiber Optics (B)</p> Signup and view all the answers

Which characteristic is crucial for audio or video streaming?

<p>Consistent Jitter (D)</p> Signup and view all the answers

In the context of data communication, what is the primary purpose of 'line coding'?

<p>To convert binary data into signals suitable for transmission (C)</p> Signup and view all the answers

Which type of noise is primarily caused by the thermal agitation of electrons in electronic components?

<p>Thermal Noise (B)</p> Signup and view all the answers

Which network type would be most suitable for connecting multiple branches of a multinational corporation across different countries?

<p>Wide Area Network (WAN) (A)</p> Signup and view all the answers

In circuit switching, resources are allocated dynamically during the communication, allowing for more efficient use of network capacity compared to packet switching.

<p>False (B)</p> Signup and view all the answers

An extranet provides completely open access to the public, similar to the internet, but with added security protocols.

<p>False (B)</p> Signup and view all the answers

What technique is used to minimize the impact of delay distortion in communication channels?

<p>equalization</p> Signup and view all the answers

Why is 'jitter' a significant concern in real-time communication applications, such as video conferencing, and what negative impact can it have on communication quality?

<p>Jitter can cause disruptions in audio/video, leading to a choppy and unsynchronized experience.</p> Signup and view all the answers

A ______ forwards data packets between different networks, using IP addresses to determine the optimal path.

<p>router</p> Signup and view all the answers

The protocol that is used for securely browsing web pages is ______.

<p>HTTPS</p> Signup and view all the answers

Match the following protocols with their corresponding functions:

<p>SMTP = Sending emails DNS = Domain name resolution to IP addresses DHCP = Automatic IP address assignment FTP = File transfer</p> Signup and view all the answers

Match the networking device with its primary function:

<p>Hub = Broadcasts data to all connected devices. Switch = Sends data to specific devices using MAC addresses. Bridge = Connects two LANs. Router = Routes packets between different networks using IP addresses.</p> Signup and view all the answers

In data communication, what is the primary role of protocols?

<p>To ensure proper and standardized communication (C)</p> Signup and view all the answers

Which error detection method involves adding a bit to a data string to indicate whether the number of 1s in the string is even or odd?

<p>Parity Check (A)</p> Signup and view all the answers

A lower latency always indicates a better network performance.

<p>True (A)</p> Signup and view all the answers

Which characteristic of effective data communication is most compromised when a file download results in corrupted data?

<p>Accuracy (C)</p> Signup and view all the answers

What is the primary function of an Intrusion Detection System/Intrusion Prevention System (IDS/IPS) in network security?

<p>To detect and prevent malicious activities (D)</p> Signup and view all the answers

Which of the following scenarios would be most effectively addressed by implementing an intranet?

<p>Facilitating secure internal communication and resource sharing among employees. (C)</p> Signup and view all the answers

In a network employing a star topology, what is the most significant consequence of a central hub failure?

<p>The entire network becomes inoperable due to the hub's role as the central point of communication. (A)</p> Signup and view all the answers

The Session Layer within the OSI model is entirely encompassed by the Application Layer in the TCP/IP model.

<p>False (B)</p> Signup and view all the answers

Explain how subnetting enhances network security and efficiency.

<p>Subnetting enhances network security by isolating traffic within subnetworks, limiting the scope of security breaches. It improves efficiency by reducing network congestion and optimizing routing.</p> Signup and view all the answers

The command ______ is used to display the IP address, subnet mask, and default gateway configuration of a network interface.

<p>ipconfig</p> Signup and view all the answers

Match the following OSI model layers with their primary functions:

<p>Physical Layer = Handles hardware connections and transmission of raw data. Data Link Layer = Provides error detection and framing of data for transmission. Network Layer = Manages IP addressing and routing of data packets. Transport Layer = Ensures reliable data delivery using protocols like TCP.</p> Signup and view all the answers

Within the context of IP address classes, which range is exclusively reserved for multicast addressing?

<p>224.0.0.0 to 239.255.255.255 (A)</p> Signup and view all the answers

In a mesh topology, adding more devices to the network decreases overall network reliability due to increased complexity.

<p>False (B)</p> Signup and view all the answers

Explain the purpose and functionality of the nslookup command in network troubleshooting.

<p>The nslookup command is used to query Domain Name System (DNS) servers to find the IP address associated with a domain name or vice versa, aiding in diagnosing DNS resolution issues.</p> Signup and view all the answers

Flashcards

Computer Network

Interconnected devices sharing data and resources.

Personal Area Network (PAN)

Small network (up to 10 meters) for personal devices.

Local Area Network (LAN)

Network in a building or campus.

Metropolitan Area Network (MAN)

Network spanning a city, connecting multiple LANs.

Signup and view all the flashcards

Wide Area Network (WAN)

Network covering a large geographic area (e.g., the Internet).

Signup and view all the flashcards

Internetwork

A network of networks enabling inter-communication.

Signup and view all the flashcards

Router

Routes packets between different networks using IP addresses.

Signup and view all the flashcards

Jitter

Variation in delay between packet arrivals.

Signup and view all the flashcards

Data Representation

Representing data using binary code (0s and 1s).

Signup and view all the flashcards

Analog Signals

Continuous waveforms used in technologies like radio.

Signup and view all the flashcards

Digital Signals

Binary data represented as discrete pulses (on or off states).

Signup and view all the flashcards

Line Coding

Converting binary data into signals suitable for transmission.

Signup and view all the flashcards

PCM (Pulse Code Modulation)

Converts analog signals to digital using sampling, quantization, and encoding.

Signup and view all the flashcards

Parallel Transmission

Sending multiple bits simultaneously.

Signup and view all the flashcards

Serial Transmission

Sending bits one after another over a single channel.

Signup and view all the flashcards

Full-Duplex

Simultaneous two-way communication.

Signup and view all the flashcards

OSI Physical Layer

Handles hardware connections and data transmission over a physical medium.

Signup and view all the flashcards

OSI Data Link Layer

Provides error detection and correction in data frames that are transmitted over a network.

Signup and view all the flashcards

OSI Network Layer

Manages IP addressing and routing of data packets between different networks.

Signup and view all the flashcards

OSI Transport Layer

Ensures reliable and ordered delivery of data between applications.

Signup and view all the flashcards

Star Topology

All devices connect to a central hub. Device failure doesn't affect others.

Signup and view all the flashcards

Bus Topology

All devices share a single cable. Simple but vulnerable to cable breaks.

Signup and view all the flashcards

Ping Command

Tests network connectivity by sending packets to a specified host.

Signup and view all the flashcards

Ipconfig Command

Displays IP address, subnet mask, and default gateway information.

Signup and view all the flashcards

Attenuation

Weakening of signal strength over distance during transmission.

Signup and view all the flashcards

Delay Distortion

Signal components arriving at different times, causing distortion.

Signup and view all the flashcards

Noise (in transmission)

Unwanted signals interfering with the intended message.

Signup and view all the flashcards

De Facto Standard

Unofficial, but widely adopted standards.

Signup and view all the flashcards

De Jure Standard

Officially approved standards (e.g., IEEE).

Signup and view all the flashcards

Circuit Switching

A dedicated path is established before transmission for calls.

Signup and view all the flashcards

Packet Switching

Data divided into packets and sent independently.

Signup and view all the flashcards

Bandwidth

Maximum data transfer rate, measured in bits per second (bps).

Signup and view all the flashcards

Study Notes

  • Computer networks are interconnected devices that share data and resources.
  • Networks facilitate file sharing, communication, and internet access.

Types of Networks

  • Personal Area Network (PAN): A small network up to 10 meters, like Bluetooth devices, wireless keyboards, and smartwatches.
  • Local Area Network (LAN): Confined to a building or campus, found in offices, schools and Ethernet-based.
  • Metropolitan Area Network (MAN): Spans a city, connecting multiple LANs, such as citywide Wi-Fi and cable TV networks.
  • Wide Area Network (WAN): Covers a large geographic area, even countries. The Internet is the largest WAN.
  • Internetwork: Networks communicate with each other, forming the global internet.

Internet, Intranet, and Extranet

  • Internet: A global public network for communication and information sharing.
  • Intranet: A private internal network for employees.
  • Extranet: A private network allowing controlled access to external parties.

Networking Devices

  • Hub: Broadcasts data to all connected devices.
  • Switch: Sends data to specific devices using MAC addresses.
  • Router: Routes packets between different networks using IP addresses.
  • Bridge: Connects two LANs.
  • Access Point: Provides wireless connectivity.

Data Communication Elements

  • Message: Information being sent.
  • Sender: Device transmitting the message.
  • Receiver: Device receiving the message.
  • Transmission Medium: The communication path.
  • Protocols: Rules ensuring proper communication, like TCP/IP.

Effective Data Communication essential characteristics

  • Delivery: Data must reach the correct recipient.
  • Accuracy: Received data must be error-free.
  • Timeliness: Data should arrive without delays, ensuring real-time communication.
  • Jitter: Variation in delay between packet arrivals, crucial for audio/video streaming.

Data Representation Techniques

  • Text: Represented in binary using ASCII or Unicode (e.g., 'A' in ASCII → 01000001).
  • Number: Numeric data converted into binary (e.g., Decimal 10 → 1010).
  • Image: Stored as pixels in formats like JPEG or PNG.
  • Audio: Analog signals converted to digital using Pulse Code Modulation (PCM) with audio wave sampled at regular intervals.
  • Video: Sequence of images (frames) displayed at a specific rate (e.g., 30 FPS).

Signal Types

  • Analog Signals: Continuous waveforms used in AM/FM radio, like sine waves.
  • Digital Signals: Represent binary data (0s and 1s) as discrete pulses, like square waves.

Digital Conversion

  • Line Coding: Converts binary data to signals; types include Unipolar, Polar, and Bipolar.
    • Unipolar: Uses only positive voltages.
    • Polar: Uses positive and negative voltages.
    • Bipolar: Alternates polarities for 1s.
  • PCM (Pulse Code Modulation): Converts analog signals to digital using sampling, quantization, and encoding.

Transmission Modes

  • Parallel Transmission: Sends multiple bits simultaneously.
  • Serial Transmission: Sends bits one by one.
  • Multiplexing: Combines multiple signals into one; includes FDM, TDM and WDM.
    • FDM (Frequency Division Multiplexing): Divides channels by frequency.
    • TDM (Time Division Multiplexing): Divides channels by time slots.
    • WDM (Wavelength Division Multiplexing): Used in fiber optics.

Communication Modes

  • Simplex: One-way communication.
  • Half-Duplex: Data flows both ways, but one direction at a time.
  • Full-Duplex: Simultaneous two-way communication.

Transmission Media

  • Guided (Wired):
    • Twisted Pair Cable: commonly used in LANs.
    • Coaxial Cable: Used in cable TV and dated networks.
    • Fiber Optics: High-speed data transfer using light.
  • Unguided (Wireless):
    • Radio Waves: Wi-Fi and long-range communication.
    • Microwaves: Satellite communication.
    • Infrared: Short-range communication like remote controls.

Transmission Impairments

  • Transmission impairments degrade the quality of communication signals.
  • Attenuation: Signal weakens with distance, solved using amplifiers or repeaters.
  • Delay Distortion: Signal components arrive at different times, rectified using equalizers.
  • Noise: Unwanted signals interfere with the message.
    • Thermal Noise: Heat in components.
    • Crosstalk: Interference from nearby communication lines.
    • Impulse Noise: Bursts caused by lightning or faults.

Protocols

  • Protocols:
    • HTTP/HTTPS: Web browsing.
    • SMTP: Sending emails.
    • FTP: Transferring files.
    • DNS: Converts domain names to IP addresses.
    • DHCP: Automatically assigns IP addresses.
    • Telnet: Provides remote access to devices.

Standards

  • De Facto: Unofficial but widely adopted standards.
  • De Jure: Officially approved standards.

Switching Techniques

  • Circuit Switching: Dedicated path established before transmission.
    • Advantage: Reliable with low latency.
    • Disadvantage: Inefficient resource usage.
  • Packet Switching: Data divided into packets transmitted independently.
    • Advantages: Efficient and scalable.
    • Disadvantages: Potential latency and packet loss.

Error Detection and Correction

  • Parity Check: Detection by adding a bit to indicate parity.
  • CRC (Cyclic Redundancy Check): Detection using polynomial division.
  • Backward Error Correction: Correction by requesting retransmission of corrupted packets.
  • Forward Error Correction: Correction by automatically correcting errors using abundant data.

Network Performance

  • Bandwidth: Maximum data transfer rate (bits per second).
  • Latency: Delay in data transfer (milliseconds).

Security Mechanisms

  • Firewalls: Block unauthorized access.
  • IDS/IPS (Intrusion Detection/Prevention Systems): Detect and prevent malicious activities.

Common Protocols and Their Ports

  • HTTP (80): Web browsing.
  • HTTPS (443): Secure web browsing.
  • FTP (21): File transfers.
  • SMTP (25): Email sending.
  • DNS (53): Domain name resolution.
  • DHCP (67/68): Dynamic IP assignment.

OSI and TCP/IP Models

  • OSI Model:
    • Physical Layer: Hardware connections and transmission.
    • Data Link Layer: Error detection and framing.
    • Network Layer: IP addressing and routing.
    • Transport Layer: Reliable data delivery.
    • Session Layer: Manages sessions between devices.
    • Presentation Layer: Data translation and encryption.
    • Application Layer: Services to users.
  • TCP/IP Model:
    • Network Interface: Combines physical and datalink layer functions.
    • Internet: Handles routing and IP addressing.
  • Transport: Reliable delivery using TCP or UDP.
  • Application: Combines OSI session, presentation, applications layers.

Computer Network Topologies

  • Point-to-Point: Two devices connected directly.
  • Bus: Devices share a single line, simple but failure-prone.
  • Star: Devices connect to a central hub; hub failure affects all.
  • Ring: Devices form a closed loop; one connection failure affects the network.
  • Mesh: Every device connects to every other; reliable but expensive.
  • Hybrid: Combination of different topologies.

IP Address Classes

  • Class A: 1-127 (127 is reserved for loopback).
  • Class B: 128-191.
  • Class C: 192-223.
  • Class D: 224-239 (Multicast).
  • Class E: 240-255 (Experimental).

Private Address Space

  • Class A: 10.0.0.0 to 10.255.255.255
  • Class B: 172.16.0.0 to 172.31.255.255
  • Class C: 192.168.0.0 to 192.168.255.255

Default Subnet Masks

  • Class A: 255.0.0.0
  • Class B: 255.255.0.0
  • Class C: 255.255.255.0
  • Subnetting divides networks into smaller more secure and efficient parts
  • Subnet Mask defines the network and host portions of IP addresses

CMD Commands for Networking

  • Ping: Tests connectivity.
  • Ipconfig: Displays IP address, subnet mask, and default gateway.
  • Tracert: Traces the route packets take.
  • Nslookup: Resolves domain names to IP addresses.
  • Netstat: Displays active connections and network statistics.
  • Arp -a: Displays the ARP table for IP-to-MAC address mapping.
  • Msconfig: Configures computer startup programs and services.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Networks 1: LAN vs MAN vs WAN
10 questions

Computer Networks 1: LAN vs MAN vs WAN

SelfDeterminationConstellation4657 avatar
SelfDeterminationConstellation4657
Computer Networks 1: LAN vs MAN vs WAN
24 questions
Computer Networks: LAN, MAN, WAN
20 questions
Use Quizgecko on...
Browser
Browser