Podcast
Questions and Answers
Which of the following is an example of content that can be exchanged and shared using network software?
Which of the following is an example of content that can be exchanged and shared using network software?
- Music
- Videos
- Pictures
- All of the above (correct)
Which of the following describes a Personal Area Network (PAN)?
Which of the following describes a Personal Area Network (PAN)?
- A network spanning across neighbor cities
- A network covering a local community
- A network connecting computers within a single building or campus
- A network with short-range communication, typically within a few meters (correct)
In the context of network classifications, what does 'topology' refer to?
In the context of network classifications, what does 'topology' refer to?
- The geographical scope of the network
- The protocols used for communication
- The way machines are connected within the network (correct)
- The ownership of the network
Which of the following is a characteristic of a 'Bus' network topology?
Which of the following is a characteristic of a 'Bus' network topology?
What is the primary function of network protocols?
What is the primary function of network protocols?
In CSMA/Collision Detection, what happens when a collision is detected during data transmission in Ethernet?
In CSMA/Collision Detection, what happens when a collision is detected during data transmission in Ethernet?
In CSMA/Collision Avoidance, why can collisions not be detected in WiFi networks?
In CSMA/Collision Avoidance, why can collisions not be detected in WiFi networks?
What is the main function of a 'repeater' in the context of combining networks?
What is the main function of a 'repeater' in the context of combining networks?
Which of the following best describes the function of a 'bridge' in network communication?
Which of the following best describes the function of a 'bridge' in network communication?
What is the key distinction between an 'internet' and the 'Internet'?
What is the key distinction between an 'internet' and the 'Internet'?
What is the primary function of a 'router' in network communication?
What is the primary function of a 'router' in network communication?
What information is typically stored within a router's forwarding table?
What information is typically stored within a router's forwarding table?
Which of theses best describes 'Interprocess communication'?
Which of theses best describes 'Interprocess communication'?
In the client-server model, what is the primary role of the server?
In the client-server model, what is the primary role of the server?
Which of the following is a hallmark of peer-to-peer (P2P) communication?
Which of the following is a hallmark of peer-to-peer (P2P) communication?
Which of the following is characteristic of 'cluster computing'?
Which of the following is characteristic of 'cluster computing'?
In 'grid computing,' what is meant by a 'voluntary distributed grid'?
In 'grid computing,' what is meant by a 'voluntary distributed grid'?
Which of the following is a key characteristic of cloud computing?
Which of the following is a key characteristic of cloud computing?
Which of the following was an original goal in the development of the Internet?
Which of the following was an original goal in the development of the Internet?
What is the role of a Tier-1 Internet Service Provider (ISP) in the Internet architecture?
What is the role of a Tier-1 Internet Service Provider (ISP) in the Internet architecture?
What role does a Tier-3 ISP play in the Internet infrastructure?
What role does a Tier-3 ISP play in the Internet infrastructure?
Which of the following represents a 32-bit IP address?
Which of the following represents a 32-bit IP address?
What is the primary purpose of Mnemonic addresses?
What is the primary purpose of Mnemonic addresses?
Which organization oversees the registration of domains and domain names?
Which organization oversees the registration of domains and domain names?
What are name servers responsible for in the Domain Name System (DNS)?
What are name servers responsible for in the Domain Name System (DNS)?
Which early internet application is used to copy files across networks?
Which early internet application is used to copy files across networks?
What protocol is associated with email?
What protocol is associated with email?
Which of the following characterizes N-unicast in Internet Multimedia Streaming?
Which of the following characterizes N-unicast in Internet Multimedia Streaming?
Who is credited with inventing the World Wide Web (WWW)?
Who is credited with inventing the World Wide Web (WWW)?
What is the purpose of 'hyperlinks' in hypertext documents?
What is the purpose of 'hyperlinks' in hypertext documents?
What action does a browser perform?
What action does a browser perform?
Which of the following statements is true regarding URLs?
Which of the following statements is true regarding URLs?
What is the purpose of tags
in HTML?
What is the purpose of tags
in HTML?
What is the primary purpose of XML?
What is the primary purpose of XML?
Which of the following is an example of client-side activity?
Which of the following is an example of client-side activity?
Which of the following is a form of malware?
Which of the following is a form of malware?
Which of the following describes 'spyware'?
Which of the following describes 'spyware'?
What is the purpose of a firewall in network security?
What is the purpose of a firewall in network security?
Which security measure can learn via a training process?
Which security measure can learn via a training process?
In cryptography, what is the main characteristic of symmetric key encryption?
In cryptography, what is the main characteristic of symmetric key encryption?
In public-key encryption (asymmetric), what is the purpose of the private key?
In public-key encryption (asymmetric), what is the purpose of the private key?
What role do Certificate Authorities play in public-key encryption?
What role do Certificate Authorities play in public-key encryption?
What is the primary purpose of 'authentication' in the context of cryptography?
What is the primary purpose of 'authentication' in the context of cryptography?
Imagine a scenario where two separate WiFi LANs exist in neighboring buildings, each operating on different and incompatible wireless standards. You need to enable seamless communication between devices on both networks without compromising security or performance. Which network device is best suited for this task, and what specific feature is most critical for ensuring successful inter-network communication in this complex environment?
Imagine a scenario where two separate WiFi LANs exist in neighboring buildings, each operating on different and incompatible wireless standards. You need to enable seamless communication between devices on both networks without compromising security or performance. Which network device is best suited for this task, and what specific feature is most critical for ensuring successful inter-network communication in this complex environment?
Flashcards
Network Software
Network Software
Software that allows users to exchange information and share resources over a network.
Personal Area Network (PAN)
Personal Area Network (PAN)
A short-range network for devices like wireless mice, headsets and smartphones.
Local Area Network (LAN)
Local Area Network (LAN)
A network that connects computers within a single building or campus.
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
Signup and view all the flashcards
Wide Area Network (WAN)
Wide Area Network (WAN)
Signup and view all the flashcards
Closed Network
Closed Network
Signup and view all the flashcards
Open Network
Open Network
Signup and view all the flashcards
Network Topology
Network Topology
Signup and view all the flashcards
Bus Topology
Bus Topology
Signup and view all the flashcards
Star Topology
Star Topology
Signup and view all the flashcards
Network Protocols
Network Protocols
Signup and view all the flashcards
CSMA/Collision Detection
CSMA/Collision Detection
Signup and view all the flashcards
CSMA/Collision Avoidance
CSMA/Collision Avoidance
Signup and view all the flashcards
Repeater
Repeater
Signup and view all the flashcards
Bridge
Bridge
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Interprocess communication
Interprocess communication
Signup and view all the flashcards
Client-Server Model
Client-Server Model
Signup and view all the flashcards
Peer-to-Peer (P2P)
Peer-to-Peer (P2P)
Signup and view all the flashcards
Cluster computing
Cluster computing
Signup and view all the flashcards
Grid computing
Grid computing
Signup and view all the flashcards
Voluntary distributed grid
Voluntary distributed grid
Signup and view all the flashcards
Cloud computing
Cloud computing
Signup and view all the flashcards
The Internet
The Internet
Signup and view all the flashcards
Tier-1 ISP
Tier-1 ISP
Signup and view all the flashcards
Tier-3 ISP
Tier-3 ISP
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
Mnemonic Address
Mnemonic Address
Signup and view all the flashcards
Name Servers
Name Servers
Signup and view all the flashcards
ICANN
ICANN
Signup and view all the flashcards
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
Signup and view all the flashcards
Telnet and Secure Shell (SSH)
Telnet and Secure Shell (SSH)
Signup and view all the flashcards
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol (HTTP)
Signup and view all the flashcards
Electronic Mail
Electronic Mail
Signup and view all the flashcards
Mail server
Mail server
Signup and view all the flashcards
Hypertext
Hypertext
Signup and view all the flashcards
Webservers
Webservers
Signup and view all the flashcards
URLs
URLs
Signup and view all the flashcards
Extensible Markup Language XML
Extensible Markup Language XML
Signup and view all the flashcards
Study Notes
Network Fundamentals
- Network software facilitates information exchange and resource sharing among users
- Examples of content shared include music, videos, pictures, and text
- Software includes apps and operating systems
- Data storage facilities include Google Drive and Dropbox
- Network software has evolved into network-wide operating systems
Network Classifications: Scope
- Personal Area Network (PAN) covers a short range, typically a few meters
- Examples: Wireless mouse, headset, and smartphone
- Local Area Network (LAN) covers a building or campus
- It typically has computers in a single building or campus
- Metropolitan Area Network (MAN) serves a local community
- Wide Area Network (WAN) spans greater distances
- It could be neighboring cities or opposite sides of the world
Network Classifications: Ownership
- Closed networks are owned by individuals or corporations
- Open networks are in the public domain and freely circulated
- The Internet uses the TCP/IP protocol suite and has no playing fees or licensing agreements
Network Classifications: Topology (Configuration)
- Topology defines how machines are connected
- Bus: Uses a common communication line, like Ethernet
- Fast Ethernet can work like a star network (Figure 4.1.a)
- Star: History in large central computers
- Modern wireless networks use a central Access Point
- Star networks can emulate bus networks (Figure 4.1.b)
Communication Protocols
- Protocols are rules governing activities on a network
- For example, coordinating the transmission of messages to prevent simultaneous transmissions from all machines
- Protocols allows vendors to create compatible products with those from other vendors
Protocols for Transmitting Messages
- CSMA/Collision Detection is used in Ethernet
- Machines send messages to all other machines, but only processes messages addressed to itself
- Transmissions occur only when the bus is silent
- If a collision is detected: Devices stop and wait for a random amount of time before retransmitting
- CSMA/Collision Avoidance is used in WiFi
- It’s vital when not all machines can hear each other, known as the hidden terminal problem
- Collisions cannot be detected
- Machines that have been waiting longer are given priority
- All machines send a request and need an acknowledgement before sending their message
- All machines hear acknowledgements
Combining Networks
- Repeater: Passes all messages across two busses.
- Bridge: Passes only messages destined for computers on the other bus.
- Switch: Acts like a bridge, but with connections to multiple busses (Figure 4.4).
- Router: Connects two incompatible networks, resulting in a network of networks called an internet.
- Internet (with a capital "I") is different from an internet. The former is only a larger network of networks.
- Routers connect two WiFi networks and an Ethernet network (Figure 4.5)
- Passes only messages destined to other networks
- Contains a forwarding table with information on network destinations
- A Router is a gateway to other networks
Methods of Process Communication
- Interprocess communication is required when processes on the same or different machines need to communicate
- Required for coordinate action
- Client-server
- Achieved with many clients and one server running continuously (Figure 4.6)
- Server serves and satisfies requests from clients
- Printer servers and file servers
- Peer-to-peer (P2P)
- Has two processes communicating as equals and execute on a temporary basis (Figure 4.6)
- Allows instant messaging, interactive games, and distribution of files via the Internet (swarm)
Distributed Systems
- Systems units that execute as processes on different computers and can be communication and security systems
- Cluster computing
- Independent computers work closely together instead of a large machine
- Requires a high-speed network and offers high-availability and load-balancing
- Grid computing
- Loosely coupled network of computers work together to accomplish large tasks
- Voluntary distributed grid includes computers available when not otherwise in use
- Cloud computing
- Features huge pools of shared computers on the network that can be allocated for use of clients as needed
- Examples: Amazon Elastic Compute Cloud (Amazon Web Services AWS), Google Drive and Google Apps, Microsoft Azure
- Rental of virtual computers by the hour for data storage, collaboration, and building web services
- Can provide different service models: IaaS, PaaS, SaaS while providing services and hiding the details
- Provides reliability and scalability
The Internet
- The internet is a global network
- The original goal was to link a variety of networks into a connected system unaffected by local disasters
- Originated as a DARPA project, later shifted to academic research
- Today, it is a commercial undertaking which links PANs, LANs, MANs, and WANs which involves millions of computers
Internet Architecture Includes ISPs
- Tier-1 (Internet backbone)
- Features very high-speed, high-capacity, international for WANs
- Operated by leading companies
- Tier-2 features regional WANs
- Many pathways provide redundancy
- Tier-3 ISP
- Provides connectivity to the Internet with a single authority
- Supplies Internet access to homes and companies
- Cable and telephone companies, universities, corporations
- End systems or hosts such as laptops, PCs, telephones, video cameras, automobiles, and home appliances
- Connection by Hot spot (wireless), telephone lines, cellular, cable/satellite systems
- Has "last mile" problems
Internet Addressing: The Use of IP
- IP (Internet protocol) address
- Internet-wide addressing system using 32 or128 bits, represented in dotted decimal notation
- Example: 192.207.177.133
- Mnemonic address: Readable for humans
- Domain names, unique, operated by a single authority, registered with ICANN
- Top-Level Domains: .edu (education), .org (non-profit organization), .gov (US government), .com (company), .mil (military), .net, .au (Australia), .ca (Canada), .biz (Business), .fi (Finland).
- Internet addressing uses a domain name system (DNS)
- Name servers: directories that provide address translation services to clients
- DNS (Domain name system) lookup hierarchically to other servers on upper levels
- All domains do not need their own name servers, and use their ISP name server
Internet Corporation for Assigned Names & Numbers (ICANN)
- A non-profit corporation that coordinates Internet operation
- Allocations blocks of IP addresses to ISPs, who then assign those addresses within their regions
- Registration of domains and domain names are overseen
Early Internet Applications
- The initial applications were separate simple programs with a network protocol
- The first protocols included are listed below
- Network News Transfer Protocol (NNTP): A Usenet news reader application (no longer in use)
- File Transfer Protocol (FTP): Allowed listing and copying files across the network
- Telnet and Secure Shell (SSH): Allowed user to access another computer
- Hypertext Transfer Protocol (HTTP): Used to serve web pages
- Electronic Mail (email): Transmitted email messages in the Internet
- Simple Mail Transfer Protocol (SMTP): Transmitted email
- Domain mail server collects incoming/outgoing mail
- Mail server delivers collected incoming mail to clients via POP3 (Post Office Protocol) or IMAP (Internet Mail Access Protocol)
Recent Application
- Voice Over IP (VoIP):
- Includes Skype, analog telephone adapters, 4G phone networks
- Internet Multimedia Streaming Includes:
- N-unicast: Sending multimedia with a single sender to multiple receivers like an Internet radio station
- Multicast: Transmitting server messages through routers
- On-demand streaming allows users to listen to media at an arbitrary time, start, pause and rewind.
- Content delivery networks (CDNs): The distribution of streaming copies via Groups of servers
World Wide Web
- Tim Berners-Lee 1990, CERN invented the world wide web
- Hypertext combines internet technology with linked-documents
- Hyperlinks are embedded to other documents and uses protocol for transferring hypertext upon request
- Browsers presents materials requested from the webserver
- Chrome, Firefox, Safari, Microsoft Edge are some examples
- Webservers provide access to documents using Hypertext Transfer Protocol HTTP
- Apache, Microsoft IIS, Nginx are examples of these programs
- Documents are identified by URLs (Uniform Resource Locator)
- Unique address of the hypertext document
- HTTP protocol is used if the protocol is missing
- The home page is returned if the filename is missing
Hypertext Markup Language (HTML)
- Encoded as a text file using ASCII or Unicode, and contains tags to communicate with the broswer
- Appearance like
<h1>
to start level one or<p>
starts a new paragraph - Other documents and content can be linked with
<a href = . ..>
- Images can be embedded in the file with
<img src = …>
- Appearance like
- W3C (World Wide Web Consortium) standard.
Extensible Markup Language (XML)
- Extensible Markup Language is a language for constructing markup languages similar to HTML
- A descendant of the Standard Generalized Markup Language
- Opens the door for to a World Wide Semantic Web
- XML can be used to encode music
Client Side vs Server Side
- Client-side activities
- Javascript
- Java applets
- Macromedia Flash
- Server-side activities
- Common Gateway Interface (CGI)
- Servlets
- JavaServer Pages (JSP): Active Server Pages (ASP)
- PHP
Cypersecurity
- Forms of Attack include Malware
- Virus: Code inserted in a program and is executed with the program which is then able to degrade operating systems and erase mass storage
- Worm: Autonomous program that copy themselves to other computers and performs extreme vandalism and overload networks
- Trojan Horse: Virus disguise as a game or utility package which performs harmful effects.
- Spyware: Sniffs and collects information about activities at the computer and also, it reports information to the instigator.
- Phishing: Obtains information simply by asking for it with emails to numerous recipients with hopes that some will give up the information
- Denial of service (DoS)
- Includes spam and is an overloading a system
- Spam
- Common medium for delivering malware
- Protection and Cures include:
- A firewall to filter traffic passing through a point, incoming and outgoing of a network and blocks messages from malicious clients (spam filters),
- Antivirus software to detect and remove viruses, and filter spam via unwanted email to detect changes is traffic
- Has the ability to learn from training.
- Proxy Servers
Cryptography
- Designed for sending and receiving messages securely in the presence of adversaries
- HTTPS is for secure Internet access protocol using Transport Layer Security (TLS)
- Cryptography uses secure password keys to protect messages via symmetric encryption
- Public-key Encryption is asymmetric
- Public keys can be used to encrypt messages
- Private keys can be used to decrypt message
- Certification is needed to maintain lists of public keys
- Provides certificates to clients containing a parties name
- Authenticates via with digital signatures
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.