Network Fundamentals and Classifications

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is an example of content that can be exchanged and shared using network software?

  • Music
  • Videos
  • Pictures
  • All of the above (correct)

Which of the following describes a Personal Area Network (PAN)?

  • A network spanning across neighbor cities
  • A network covering a local community
  • A network connecting computers within a single building or campus
  • A network with short-range communication, typically within a few meters (correct)

In the context of network classifications, what does 'topology' refer to?

  • The geographical scope of the network
  • The protocols used for communication
  • The way machines are connected within the network (correct)
  • The ownership of the network

Which of the following is a characteristic of a 'Bus' network topology?

<p>It relies on a common communication line for all devices (B)</p> Signup and view all the answers

What is the primary function of network protocols?

<p>To avoid all machines transmitting at the same time. (D)</p> Signup and view all the answers

In CSMA/Collision Detection, what happens when a collision is detected during data transmission in Ethernet?

<p>Both machines involved in the collision stop transmitting and wait for a random amount of time before retransmitting. (C)</p> Signup and view all the answers

In CSMA/Collision Avoidance, why can collisions not be detected in WiFi networks?

<p>Not all machines can hear each other due to the hidden terminal problem. (D)</p> Signup and view all the answers

What is the main function of a 'repeater' in the context of combining networks?

<p>To pass all messages across two buses. (D)</p> Signup and view all the answers

Which of the following best describes the function of a 'bridge' in network communication?

<p>Passes only messages that are destined for computers on the other bus. (C)</p> Signup and view all the answers

What is the key distinction between an 'internet' and the 'Internet'?

<p>'Internet' refers to the global network we commonly use, while 'internet' refers to any network of networks. (D)</p> Signup and view all the answers

What is the primary function of a 'router' in network communication?

<p>To connect two incompatible networks. (B)</p> Signup and view all the answers

What information is typically stored within a router's forwarding table?

<p>The router's knowledge of network destinations. (B)</p> Signup and view all the answers

Which of theses best describes 'Interprocess communication'?

<p>Processes executing on the same or different machines need to communicate with each other. (C)</p> Signup and view all the answers

In the client-server model, what is the primary role of the server?

<p>To continuously execute and serve many clients. (C)</p> Signup and view all the answers

Which of the following is a hallmark of peer-to-peer (P2P) communication?

<p>Processes communicate as equals on a temporary basis. (B)</p> Signup and view all the answers

Which of the following is characteristic of 'cluster computing'?

<p>Independent computers working closely together instead of a single, much larger machine. (A)</p> Signup and view all the answers

In 'grid computing,' what is meant by a 'voluntary distributed grid'?

<p>Computers available when not otherwise used. (C)</p> Signup and view all the answers

Which of the following is a key characteristic of cloud computing?

<p>Huge pools of shared computers on the network can be allocated for use of clients as needed. (B)</p> Signup and view all the answers

Which of the following was an original goal in the development of the Internet?

<p>To link a variety of networks into a connected system unaffected by local disasters (D)</p> Signup and view all the answers

What is the role of a Tier-1 Internet Service Provider (ISP) in the Internet architecture?

<p>Operate very high-speed, high-capacity international WANs forming the Internet backbone. (D)</p> Signup and view all the answers

What role does a Tier-3 ISP play in the Internet infrastructure?

<p>Providing connectivity to the Internet (A)</p> Signup and view all the answers

Which of the following represents a 32-bit IP address?

<p>192.207.177.133 (C)</p> Signup and view all the answers

What is the primary purpose of Mnemonic addresses?

<p>To be readable by humans. (C)</p> Signup and view all the answers

Which organization oversees the registration of domains and domain names?

<p>ICANN (Internet Corporation for Assigned Names and Numbers) (A)</p> Signup and view all the answers

What are name servers responsible for in the Domain Name System (DNS)?

<p>Providing address translation services to clients. (A)</p> Signup and view all the answers

Which early internet application is used to copy files across networks?

<p>FTP (C)</p> Signup and view all the answers

What protocol is associated with email?

<p>SMTP (D)</p> Signup and view all the answers

Which of the following characterizes N-unicast in Internet Multimedia Streaming?

<p>A single sender transmitting to multiple receivers. (B)</p> Signup and view all the answers

Who is credited with inventing the World Wide Web (WWW)?

<p>Tim Berners-Lee (B)</p> Signup and view all the answers

What is the purpose of 'hyperlinks' in hypertext documents?

<p>To link to other documents. (D)</p> Signup and view all the answers

What action does a browser perform?

<p>Presents materials to the user. (A)</p> Signup and view all the answers

Which of the following statements is true regarding URLs?

<p>They are unique addresses of hypertext documents. (D)</p> Signup and view all the answers

What is the purpose of tags in HTML?

<p>To communicate with the browser (A)</p> Signup and view all the answers

What is the primary purpose of XML?

<p>To define the structure and content of data. (C)</p> Signup and view all the answers

Which of the following is an example of client-side activity?

<p>Javascript (B)</p> Signup and view all the answers

Which of the following is a form of malware?

<p>Trojan Horse (B)</p> Signup and view all the answers

Which of the following describes 'spyware'?

<p>Collects information about activities at the computer. (B)</p> Signup and view all the answers

What is the purpose of a firewall in network security?

<p>To filter traffic passing through a point in the network. (D)</p> Signup and view all the answers

Which security measure can learn via a training process?

<p>Spam filters (D)</p> Signup and view all the answers

In cryptography, what is the main characteristic of symmetric key encryption?

<p>It uses only one key for both encryption and decryption. (A)</p> Signup and view all the answers

In public-key encryption (asymmetric), what is the purpose of the private key?

<p>Used to decrypt messages (A)</p> Signup and view all the answers

What role do Certificate Authorities play in public-key encryption?

<p>Maintain lists of public keys and provide certificates. (A)</p> Signup and view all the answers

What is the primary purpose of 'authentication' in the context of cryptography?

<p>To verify the identity of a user or device. (A)</p> Signup and view all the answers

Imagine a scenario where two separate WiFi LANs exist in neighboring buildings, each operating on different and incompatible wireless standards. You need to enable seamless communication between devices on both networks without compromising security or performance. Which network device is best suited for this task, and what specific feature is most critical for ensuring successful inter-network communication in this complex environment?

<p>A router with Network Address Translation (NAT) and protocol conversion capabilities, enabling translation between incompatible standards while masking internal IP addresses. (A)</p> Signup and view all the answers

Flashcards

Network Software

Software that allows users to exchange information and share resources over a network.

Personal Area Network (PAN)

A short-range network for devices like wireless mice, headsets and smartphones.

Local Area Network (LAN)

A network that connects computers within a single building or campus.

Metropolitan Area Network (MAN)

A network that connects computers within a local community.

Signup and view all the flashcards

Wide Area Network (WAN)

A network that covers greater distances, such as neighbor cities or opposite sides of the world.

Signup and view all the flashcards

Closed Network

Network owned by an individual or corporation.

Signup and view all the flashcards

Open Network

Network in the public domain that is freely circulated.

Signup and view all the flashcards

Network Topology

The arrangement / configuration of how machines are connected in a network.

Signup and view all the flashcards

Bus Topology

Network topology where devices are connected via a common communication line.

Signup and view all the flashcards

Star Topology

Network topology where devices are connected to a central point.

Signup and view all the flashcards

Network Protocols

Rules by which activities are conducted on a network, ensuring compatibility between different vendors' products.

Signup and view all the flashcards

CSMA/Collision Detection

A protocol used in Ethernet networks where machines send messages to all other machines and detect collisions.

Signup and view all the flashcards

CSMA/Collision Avoidance

Protocol used in WiFi networks to avoid collisions by requiring machines to request and acknowledge messages.

Signup and view all the flashcards

Repeater

Device that passes all messages across two buses.

Signup and view all the flashcards

Bridge

Device that passes only messages destined for computers on the other bus.

Signup and view all the flashcards

Switch

Device that acts like a bridge but with connections to multiple buses.

Signup and view all the flashcards

Router

Connects two incompatible networks, resulting in a network of networks.

Signup and view all the flashcards

Interprocess communication

Processes on same or different machines need to communicate with each other.

Signup and view all the flashcards

Client-Server Model

Many clients, one server, server satisfies requests made by clients.

Signup and view all the flashcards

Peer-to-Peer (P2P)

Two processes communicating as equals and execute on a temporary basis.

Signup and view all the flashcards

Cluster computing

System where independent computers work closely together instead of a single, much larger machine.

Signup and view all the flashcards

Grid computing

Loosely coupled network of computers working together to accomplish large tasks.

Signup and view all the flashcards

Voluntary distributed grid

Computers are available when not otherwise used, on a complex problem.

Signup and view all the flashcards

Cloud computing

Huge pools of shared computers on the network that can be allocated for use of clients as needed.

Signup and view all the flashcards

The Internet

An internet that spans the world, linking a variety of networks.

Signup and view all the flashcards

Tier-1 ISP

Very high-speed, high-capacity, international WANs, operated by large companies.

Signup and view all the flashcards

Tier-3 ISP

Provides connectivity to the Internet to homes and companies.

Signup and view all the flashcards

IP Address

Internet protocol address (pattern of 32 or 128 bits)

Signup and view all the flashcards

Mnemonic Address

Readable address for humans (e.g., mu.edu, uef.fi).

Signup and view all the flashcards

Name Servers

Translate addresses to clients.

Signup and view all the flashcards

ICANN

Non-profit corporation, coordinates Internet's operation. Oversees domains registration.

Signup and view all the flashcards

File Transfer Protocol (FTP)

Listing and copying files across network.

Signup and view all the flashcards

Telnet and Secure Shell (SSH)

Access another computer.

Signup and view all the flashcards

Hypertext Transfer Protocol (HTTP)

Web pages.

Signup and view all the flashcards

Electronic Mail

Transmission of email messages

Signup and view all the flashcards

Mail server

Sending mail from “dalek” to “doctor”.

Signup and view all the flashcards

Hypertext

Combines internet technology with concept of linked documents.

Signup and view all the flashcards

Webservers

Provides access to documents.

Signup and view all the flashcards

URLs

Unique address of the hypertext document.

Signup and view all the flashcards

Extensible Markup Language XML

Language for constructing markup languages similar to HTML.

Signup and view all the flashcards

Study Notes

Network Fundamentals

  • Network software facilitates information exchange and resource sharing among users
  • Examples of content shared include music, videos, pictures, and text
  • Software includes apps and operating systems
  • Data storage facilities include Google Drive and Dropbox
  • Network software has evolved into network-wide operating systems

Network Classifications: Scope

  • Personal Area Network (PAN) covers a short range, typically a few meters
    • Examples: Wireless mouse, headset, and smartphone
  • Local Area Network (LAN) covers a building or campus
    • It typically has computers in a single building or campus
  • Metropolitan Area Network (MAN) serves a local community
  • Wide Area Network (WAN) spans greater distances
    • It could be neighboring cities or opposite sides of the world

Network Classifications: Ownership

  • Closed networks are owned by individuals or corporations
  • Open networks are in the public domain and freely circulated
    • The Internet uses the TCP/IP protocol suite and has no playing fees or licensing agreements

Network Classifications: Topology (Configuration)

  • Topology defines how machines are connected
  • Bus: Uses a common communication line, like Ethernet
    • Fast Ethernet can work like a star network (Figure 4.1.a)
  • Star: History in large central computers
    • Modern wireless networks use a central Access Point
    • Star networks can emulate bus networks (Figure 4.1.b)

Communication Protocols

  • Protocols are rules governing activities on a network
    • For example, coordinating the transmission of messages to prevent simultaneous transmissions from all machines
  • Protocols allows vendors to create compatible products with those from other vendors

Protocols for Transmitting Messages

  • CSMA/Collision Detection is used in Ethernet
    • Machines send messages to all other machines, but only processes messages addressed to itself
    • Transmissions occur only when the bus is silent
    • If a collision is detected: Devices stop and wait for a random amount of time before retransmitting
  • CSMA/Collision Avoidance is used in WiFi
    • It’s vital when not all machines can hear each other, known as the hidden terminal problem
    • Collisions cannot be detected
    • Machines that have been waiting longer are given priority
    • All machines send a request and need an acknowledgement before sending their message
    • All machines hear acknowledgements

Combining Networks

  • Repeater: Passes all messages across two busses.
  • Bridge: Passes only messages destined for computers on the other bus.
  • Switch: Acts like a bridge, but with connections to multiple busses (Figure 4.4).
  • Router: Connects two incompatible networks, resulting in a network of networks called an internet.
    • Internet (with a capital "I") is different from an internet. The former is only a larger network of networks.
    • Routers connect two WiFi networks and an Ethernet network (Figure 4.5)
    • Passes only messages destined to other networks
    • Contains a forwarding table with information on network destinations
    • A Router is a gateway to other networks

Methods of Process Communication

  • Interprocess communication is required when processes on the same or different machines need to communicate
    • Required for coordinate action
  • Client-server
    • Achieved with many clients and one server running continuously (Figure 4.6)
    • Server serves and satisfies requests from clients
    • Printer servers and file servers
  • Peer-to-peer (P2P)
    • Has two processes communicating as equals and execute on a temporary basis (Figure 4.6)
    • Allows instant messaging, interactive games, and distribution of files via the Internet (swarm)

Distributed Systems

  • Systems units that execute as processes on different computers and can be communication and security systems
  • Cluster computing
    • Independent computers work closely together instead of a large machine
    • Requires a high-speed network and offers high-availability and load-balancing
  • Grid computing
    • Loosely coupled network of computers work together to accomplish large tasks
    • Voluntary distributed grid includes computers available when not otherwise in use
  • Cloud computing
    • Features huge pools of shared computers on the network that can be allocated for use of clients as needed
    • Examples: Amazon Elastic Compute Cloud (Amazon Web Services AWS), Google Drive and Google Apps, Microsoft Azure
    • Rental of virtual computers by the hour for data storage, collaboration, and building web services
    • Can provide different service models: IaaS, PaaS, SaaS while providing services and hiding the details
    • Provides reliability and scalability

The Internet

  • The internet is a global network
  • The original goal was to link a variety of networks into a connected system unaffected by local disasters
    • Originated as a DARPA project, later shifted to academic research
  • Today, it is a commercial undertaking which links PANs, LANs, MANs, and WANs which involves millions of computers

Internet Architecture Includes ISPs

  • Tier-1 (Internet backbone)
    • Features very high-speed, high-capacity, international for WANs
    • Operated by leading companies
  • Tier-2 features regional WANs
    • Many pathways provide redundancy
  • Tier-3 ISP
    • Provides connectivity to the Internet with a single authority
    • Supplies Internet access to homes and companies
    • Cable and telephone companies, universities, corporations
  • End systems or hosts such as laptops, PCs, telephones, video cameras, automobiles, and home appliances
    • Connection by Hot spot (wireless), telephone lines, cellular, cable/satellite systems
    • Has "last mile" problems

Internet Addressing: The Use of IP

  • IP (Internet protocol) address
    • Internet-wide addressing system using 32 or128 bits, represented in dotted decimal notation
    • Example: 192.207.177.133
  • Mnemonic address: Readable for humans
    • Domain names, unique, operated by a single authority, registered with ICANN
    • Top-Level Domains: .edu (education), .org (non-profit organization), .gov (US government), .com (company), .mil (military), .net, .au (Australia), .ca (Canada), .biz (Business), .fi (Finland).
  • Internet addressing uses a domain name system (DNS)
    • Name servers: directories that provide address translation services to clients
    • DNS (Domain name system) lookup hierarchically to other servers on upper levels
    • All domains do not need their own name servers, and use their ISP name server

Internet Corporation for Assigned Names & Numbers (ICANN)

  • A non-profit corporation that coordinates Internet operation
  • Allocations blocks of IP addresses to ISPs, who then assign those addresses within their regions
  • Registration of domains and domain names are overseen

Early Internet Applications

  • The initial applications were separate simple programs with a network protocol
  • The first protocols included are listed below
    • Network News Transfer Protocol (NNTP): A Usenet news reader application (no longer in use)
    • File Transfer Protocol (FTP): Allowed listing and copying files across the network
    • Telnet and Secure Shell (SSH): Allowed user to access another computer
    • Hypertext Transfer Protocol (HTTP): Used to serve web pages
    • Electronic Mail (email): Transmitted email messages in the Internet
    • Simple Mail Transfer Protocol (SMTP): Transmitted email
  • Domain mail server collects incoming/outgoing mail
  • Mail server delivers collected incoming mail to clients via POP3 (Post Office Protocol) or IMAP (Internet Mail Access Protocol)

Recent Application

  • Voice Over IP (VoIP):
    • Includes Skype, analog telephone adapters, 4G phone networks
  • Internet Multimedia Streaming Includes:
    • N-unicast: Sending multimedia with a single sender to multiple receivers like an Internet radio station
    • Multicast: Transmitting server messages through routers
    • On-demand streaming allows users to listen to media at an arbitrary time, start, pause and rewind.
    • Content delivery networks (CDNs): The distribution of streaming copies via Groups of servers

World Wide Web

  • Tim Berners-Lee 1990, CERN invented the world wide web
  • Hypertext combines internet technology with linked-documents
    • Hyperlinks are embedded to other documents and uses protocol for transferring hypertext upon request
  • Browsers presents materials requested from the webserver
    • Chrome, Firefox, Safari, Microsoft Edge are some examples
  • Webservers provide access to documents using Hypertext Transfer Protocol HTTP
    • Apache, Microsoft IIS, Nginx are examples of these programs
  • Documents are identified by URLs (Uniform Resource Locator)
    • Unique address of the hypertext document
    • HTTP protocol is used if the protocol is missing
    • The home page is returned if the filename is missing

Hypertext Markup Language (HTML)

  • Encoded as a text file using ASCII or Unicode, and contains tags to communicate with the broswer
    • Appearance like <h1> to start level one or <p> starts a new paragraph
    • Other documents and content can be linked with <a href = . ..>
    • Images can be embedded in the file with <img src = …>
  • W3C (World Wide Web Consortium) standard.

Extensible Markup Language (XML)

  • Extensible Markup Language is a language for constructing markup languages similar to HTML
    • A descendant of the Standard Generalized Markup Language
    • Opens the door for to a World Wide Semantic Web
    • XML can be used to encode music

Client Side vs Server Side

  • Client-side activities
    • Javascript
    • Java applets
    • Macromedia Flash
  • Server-side activities
    • Common Gateway Interface (CGI)
    • Servlets
    • JavaServer Pages (JSP): Active Server Pages (ASP)
    • PHP

Cypersecurity

  • Forms of Attack include Malware
    • Virus: Code inserted in a program and is executed with the program which is then able to degrade operating systems and erase mass storage
    • Worm: Autonomous program that copy themselves to other computers and performs extreme vandalism and overload networks
    • Trojan Horse: Virus disguise as a game or utility package which performs harmful effects.
    • Spyware: Sniffs and collects information about activities at the computer and also, it reports information to the instigator.
    • Phishing: Obtains information simply by asking for it with emails to numerous recipients with hopes that some will give up the information
  • Denial of service (DoS)
    • Includes spam and is an overloading a system
  • Spam
    • Common medium for delivering malware
  • Protection and Cures include:
    • A firewall to filter traffic passing through a point, incoming and outgoing of a network and blocks messages from malicious clients (spam filters),
    • Antivirus software to detect and remove viruses, and filter spam via unwanted email to detect changes is traffic
    • Has the ability to learn from training.
    • Proxy Servers

Cryptography

  • Designed for sending and receiving messages securely in the presence of adversaries
  • HTTPS is for secure Internet access protocol using Transport Layer Security (TLS)
  • Cryptography uses secure password keys to protect messages via symmetric encryption
  • Public-key Encryption is asymmetric
    • Public keys can be used to encrypt messages
    • Private keys can be used to decrypt message
    • Certification is needed to maintain lists of public keys
    • Provides certificates to clients containing a parties name
    • Authenticates via with digital signatures

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser