Podcast
Questions and Answers
What distinguishes a WAN from a LAN?
What distinguishes a WAN from a LAN?
- WAN connects devices within a small geographical area.
- WAN covers a larger geographical area than LAN. (correct)
- LAN primarily uses public communication links.
- LAN is used for connecting multiple networks over long distances.
Which of the following is a characteristic of OSPF?
Which of the following is a characteristic of OSPF?
- It is a distance-vector protocol.
- It uses hop count for path determination.
- It is a link-state protocol that uses bandwidth cost. (correct)
- It requires manual configuration of routes.
What is the main purpose of VLANs in a network?
What is the main purpose of VLANs in a network?
- To segment network traffic for enhanced security and performance. (correct)
- To establish dedicated paths in circuit-switched networks.
- To ensure data is sent as a continuous stream rather than packets.
- To increase the number of available IP addresses in a network.
What best describes the format of an IPv4 address?
What best describes the format of an IPv4 address?
Which protocol performs dynamic routing using a hybrid approach?
Which protocol performs dynamic routing using a hybrid approach?
What is the primary purpose of subnetting a network?
What is the primary purpose of subnetting a network?
Which of the following statements about CIDR is accurate?
Which of the following statements about CIDR is accurate?
What is a characteristic feature of IPv6 addresses?
What is a characteristic feature of IPv6 addresses?
What role do firewalls play in network security?
What role do firewalls play in network security?
Which of the following threats is characterized by overwhelming a network's resources?
Which of the following threats is characterized by overwhelming a network's resources?
Flashcards are hidden until you start studying
Study Notes
Network Fundamentals
- Definition: Understanding how networks operate, including devices and protocols.
- Types of Networks:
- LAN (Local Area Network)
- WAN (Wide Area Network)
- MAN (Metropolitan Area Network)
- Network Topologies:
- Star, Mesh, Bus, Ring
- OSI Model: 7 Layers (Physical, Data Link, Network, Transport, Session, Presentation, Application)
- TCP/IP Model: 4 Layers (Link, Internet, Transport, Application)
- Devices:
- Routers: Connect different networks, route data.
- Switches: Connect devices within a network, operate at Layer 2.
- Hubs: Basic device for connecting multiple Ethernet devices.
Routing Protocols
- Purpose: Determine the best path for data to travel across networks.
- Types:
- Static Routing: Manually configured routes; no automatic updates.
- Dynamic Routing Protocols:
- RIP (Routing Information Protocol): Distance-vector protocol; uses hop count.
- OSPF (Open Shortest Path First): Link-state protocol; uses cost based on bandwidth.
- EIGRP (Enhanced Interior Gateway Routing Protocol): Hybrid protocol; combines features of both distance-vector and link-state.
- Routing Tables: Maintain routes to different networks; updated dynamically by routing protocols.
Switching Concepts
- Function: Connect devices within the same network segment.
- Types of Switching:
- Circuit Switching: Dedicated path for the duration of the connection.
- Packet Switching: Data divided into packets; sent independently.
- Ethernet: Most common LAN technology; operates at Layer 2.
- VLANs (Virtual Local Area Networks): Segment network traffic, improve security and performance.
- Spanning Tree Protocol (STP): Prevent loops in switched networks.
IP Addressing
- IP Address: Unique identifier for devices on a network.
- IPv4: 32-bit address; format: xxx.xxx.xxx.xxx.
- Classes: A, B, C, D, E (Class A for large networks, Class C for smaller).
- Subnetting: Dividing a network into smaller sub-networks to improve management and security.
- CIDR (Classless Inter-Domain Routing): More efficient IP address allocation; format: xxx.xxx.xxx.xxx/xx.
- IPv6: 128-bit address; hexadecimal format; designed to replace IPv4.
Network Security
- Importance: Protecting data and resources from unauthorized access and attacks.
- Key Concepts:
- Firewalls: Control incoming and outgoing network traffic based on security rules.
- VPN (Virtual Private Network): Secure connection over the internet, encrypts data.
- Access Control Lists (ACLs): Define permissions for users and devices on a network.
- Security Protocols:
- HTTPS: Secure version of HTTP, encrypts data in transit.
- SSH (Secure Shell): Secure network protocol for remote access.
- Threats:
- Malware, phishing, DDoS attacks, man-in-the-middle attacks.
Network Fundamentals
- Networks consist of interconnected devices that communicate using various protocols.
- Local Area Network (LAN) covers small geographical areas, typically a single building.
- Wide Area Network (WAN) spans large geographical areas, connecting multiple LANs.
- Metropolitan Area Network (MAN) serves a city or large campus, bridging LANs and WANs.
- Network topologies define the layout of devices: Star, Mesh, Bus, and Ring configurations are common.
- The OSI Model comprises seven layers (Physical, Data Link, Network, Transport, Session, Presentation, Application) that standardize network communication.
- The TCP/IP Model has four layers (Link, Internet, Transport, Application) and is integral to the internet's architecture.
- Routers facilitate data routing between different networks, while switches connect devices within a single network segment at Layer 2.
- Hubs are basic devices used to connect multiple Ethernet devices but lack intelligence compared to switches.
Routing Protocols
- Routing protocols are designed to identify the most efficient path for data transmission across networks.
- Static Routing requires manual configuration and remains fixed; it does not adapt to changes.
- Routing Information Protocol (RIP) operates as a distance-vector protocol based on hop count for path determination.
- Open Shortest Path First (OSPF) is a link-state protocol that calculates paths based on bandwidth cost, enhancing routing efficiency.
- Enhanced Interior Gateway Routing Protocol (EIGRP) integrates both distance-vector and link-state functionalities for dynamic path-finding.
- Routing tables are essential for maintaining and updating available paths to different networks.
Switching Concepts
- Switching provides connectivity among devices within the same network, ensuring efficient communication.
- Circuit Switching establishes a dedicated communication path for the duration of a session.
- Packet Switching breaks data into packets for individual, independent transfers, optimizing network usage.
- Ethernet is the predominant technology for Local Area Networks, functioning at Layer 2.
- Virtual Local Area Networks (VLANs) help segregate network traffic to enhance security and performance.
- Spanning Tree Protocol (STP) is crucial for preventing loops in networks that use multiple switches.
IP Addressing
- An IP Address serves as a unique identifier for devices in a network, essential for routing.
- IPv4 uses a 32-bit addressing scheme, formatted as xxx.xxx.xxx.xxx, with established classes for different sized networks (A, B, C, D, E).
- Subnetting partitions a larger network into smaller sub-networks, improving management and security.
- Classless Inter-Domain Routing (CIDR) optimizes IP address allocation through a format of xxx.xxx.xxx.xxx/xx.
- IPv6 introduces a 128-bit addressing format using hexadecimal, aimed at addressing the limitations of IPv4.
Network Security
- Network security is critical for safeguarding data and resources from unauthorized access and cyber threats.
- Firewalls are essential tools for controlling the flow of network traffic based on predefined security rules.
- Virtual Private Networks (VPNs) provide secure, encrypted connections over the internet to protect data integrity.
- Access Control Lists (ACLs) specify user and device permissions, enhancing security within networks.
- Security protocols like HTTPS ensure data encryption in transit, while SSH secures remote access protocols.
- Cybersecurity threats include malware, phishing, Distributed Denial of Service (DDoS) attacks, and man-in-the-middle attacks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.