Network Fundamentals and Routing Protocols

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What distinguishes a WAN from a LAN?

  • WAN connects devices within a small geographical area.
  • WAN covers a larger geographical area than LAN. (correct)
  • LAN primarily uses public communication links.
  • LAN is used for connecting multiple networks over long distances.

Which of the following is a characteristic of OSPF?

  • It is a distance-vector protocol.
  • It uses hop count for path determination.
  • It is a link-state protocol that uses bandwidth cost. (correct)
  • It requires manual configuration of routes.

What is the main purpose of VLANs in a network?

  • To segment network traffic for enhanced security and performance. (correct)
  • To establish dedicated paths in circuit-switched networks.
  • To ensure data is sent as a continuous stream rather than packets.
  • To increase the number of available IP addresses in a network.

What best describes the format of an IPv4 address?

<p>A 32-bit format expressed as four decimal octets. (A)</p>
Signup and view all the answers

Which protocol performs dynamic routing using a hybrid approach?

<p>EIGRP (Enhanced Interior Gateway Routing Protocol) (B)</p>
Signup and view all the answers

What is the primary purpose of subnetting a network?

<p>To improve network management and security (B)</p>
Signup and view all the answers

Which of the following statements about CIDR is accurate?

<p>CIDR allows for more efficient IP address allocation (D)</p>
Signup and view all the answers

What is a characteristic feature of IPv6 addresses?

<p>They are designed to replace IPv4 with a hexadecimal format (C)</p>
Signup and view all the answers

What role do firewalls play in network security?

<p>They control and filter network traffic based on security rules (D)</p>
Signup and view all the answers

Which of the following threats is characterized by overwhelming a network's resources?

<p>DDoS attacks (A)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Network Fundamentals

  • Definition: Understanding how networks operate, including devices and protocols.
  • Types of Networks:
    • LAN (Local Area Network)
    • WAN (Wide Area Network)
    • MAN (Metropolitan Area Network)
  • Network Topologies:
    • Star, Mesh, Bus, Ring
  • OSI Model: 7 Layers (Physical, Data Link, Network, Transport, Session, Presentation, Application)
  • TCP/IP Model: 4 Layers (Link, Internet, Transport, Application)
  • Devices:
    • Routers: Connect different networks, route data.
    • Switches: Connect devices within a network, operate at Layer 2.
    • Hubs: Basic device for connecting multiple Ethernet devices.

Routing Protocols

  • Purpose: Determine the best path for data to travel across networks.
  • Types:
    • Static Routing: Manually configured routes; no automatic updates.
    • Dynamic Routing Protocols:
      • RIP (Routing Information Protocol): Distance-vector protocol; uses hop count.
      • OSPF (Open Shortest Path First): Link-state protocol; uses cost based on bandwidth.
      • EIGRP (Enhanced Interior Gateway Routing Protocol): Hybrid protocol; combines features of both distance-vector and link-state.
  • Routing Tables: Maintain routes to different networks; updated dynamically by routing protocols.

Switching Concepts

  • Function: Connect devices within the same network segment.
  • Types of Switching:
    • Circuit Switching: Dedicated path for the duration of the connection.
    • Packet Switching: Data divided into packets; sent independently.
  • Ethernet: Most common LAN technology; operates at Layer 2.
  • VLANs (Virtual Local Area Networks): Segment network traffic, improve security and performance.
  • Spanning Tree Protocol (STP): Prevent loops in switched networks.

IP Addressing

  • IP Address: Unique identifier for devices on a network.
  • IPv4: 32-bit address; format: xxx.xxx.xxx.xxx.
    • Classes: A, B, C, D, E (Class A for large networks, Class C for smaller).
  • Subnetting: Dividing a network into smaller sub-networks to improve management and security.
  • CIDR (Classless Inter-Domain Routing): More efficient IP address allocation; format: xxx.xxx.xxx.xxx/xx.
  • IPv6: 128-bit address; hexadecimal format; designed to replace IPv4.

Network Security

  • Importance: Protecting data and resources from unauthorized access and attacks.
  • Key Concepts:
    • Firewalls: Control incoming and outgoing network traffic based on security rules.
    • VPN (Virtual Private Network): Secure connection over the internet, encrypts data.
    • Access Control Lists (ACLs): Define permissions for users and devices on a network.
  • Security Protocols:
    • HTTPS: Secure version of HTTP, encrypts data in transit.
    • SSH (Secure Shell): Secure network protocol for remote access.
  • Threats:
    • Malware, phishing, DDoS attacks, man-in-the-middle attacks.

Network Fundamentals

  • Networks consist of interconnected devices that communicate using various protocols.
  • Local Area Network (LAN) covers small geographical areas, typically a single building.
  • Wide Area Network (WAN) spans large geographical areas, connecting multiple LANs.
  • Metropolitan Area Network (MAN) serves a city or large campus, bridging LANs and WANs.
  • Network topologies define the layout of devices: Star, Mesh, Bus, and Ring configurations are common.
  • The OSI Model comprises seven layers (Physical, Data Link, Network, Transport, Session, Presentation, Application) that standardize network communication.
  • The TCP/IP Model has four layers (Link, Internet, Transport, Application) and is integral to the internet's architecture.
  • Routers facilitate data routing between different networks, while switches connect devices within a single network segment at Layer 2.
  • Hubs are basic devices used to connect multiple Ethernet devices but lack intelligence compared to switches.

Routing Protocols

  • Routing protocols are designed to identify the most efficient path for data transmission across networks.
  • Static Routing requires manual configuration and remains fixed; it does not adapt to changes.
  • Routing Information Protocol (RIP) operates as a distance-vector protocol based on hop count for path determination.
  • Open Shortest Path First (OSPF) is a link-state protocol that calculates paths based on bandwidth cost, enhancing routing efficiency.
  • Enhanced Interior Gateway Routing Protocol (EIGRP) integrates both distance-vector and link-state functionalities for dynamic path-finding.
  • Routing tables are essential for maintaining and updating available paths to different networks.

Switching Concepts

  • Switching provides connectivity among devices within the same network, ensuring efficient communication.
  • Circuit Switching establishes a dedicated communication path for the duration of a session.
  • Packet Switching breaks data into packets for individual, independent transfers, optimizing network usage.
  • Ethernet is the predominant technology for Local Area Networks, functioning at Layer 2.
  • Virtual Local Area Networks (VLANs) help segregate network traffic to enhance security and performance.
  • Spanning Tree Protocol (STP) is crucial for preventing loops in networks that use multiple switches.

IP Addressing

  • An IP Address serves as a unique identifier for devices in a network, essential for routing.
  • IPv4 uses a 32-bit addressing scheme, formatted as xxx.xxx.xxx.xxx, with established classes for different sized networks (A, B, C, D, E).
  • Subnetting partitions a larger network into smaller sub-networks, improving management and security.
  • Classless Inter-Domain Routing (CIDR) optimizes IP address allocation through a format of xxx.xxx.xxx.xxx/xx.
  • IPv6 introduces a 128-bit addressing format using hexadecimal, aimed at addressing the limitations of IPv4.

Network Security

  • Network security is critical for safeguarding data and resources from unauthorized access and cyber threats.
  • Firewalls are essential tools for controlling the flow of network traffic based on predefined security rules.
  • Virtual Private Networks (VPNs) provide secure, encrypted connections over the internet to protect data integrity.
  • Access Control Lists (ACLs) specify user and device permissions, enhancing security within networks.
  • Security protocols like HTTPS ensure data encryption in transit, while SSH secures remote access protocols.
  • Cybersecurity threats include malware, phishing, Distributed Denial of Service (DDoS) attacks, and man-in-the-middle attacks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser