Network Fundamentals & Data Transmission

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

In a Local Area Network (LAN), how are the devices typically connected?

  • Directly to the internet without any intermediary.
  • Through a mesh network topology.
  • Using satellite connections.
  • Via a central network device or server. (correct)

What is a primary benefit of implementing a Virtual LAN (VLAN)?

  • To increase the physical distance between networked devices.
  • To improve network performance and manageability by logically grouping devices. (correct)
  • To eliminate the need for physical network devices.
  • To provide direct internet access to each device.

Which network type is designed to connect multiple Local Area Networks (LANs) across different geographical locations?

  • Virtual LAN (VLAN)
  • Storage Area Network (SAN)
  • Wide Area Network (WAN) (correct)
  • Personal Area Network (PAN)

What is the main purpose of a Virtual Private Network (VPN)?

<p>To create a secure connection over a public network, ensuring privacy and data security. (D)</p> Signup and view all the answers

Which of the following is a key feature of a Peer-to-Peer (P2P) network?

<p>Direct connection between devices without a central server. (B)</p> Signup and view all the answers

What is the primary role of 'encryption' in the context of VPNs?

<p>To ensure data security by making it unreadable to anyone intercepting it. (C)</p> Signup and view all the answers

How does using a VPN contribute to data privacy?

<p>By masking the user's IP address and location. (D)</p> Signup and view all the answers

What is the main difference between an Intranet and an Extranet?

<p>An Intranet is accessible only to employees, while an Extranet allows access to external parties like suppliers and customers. (B)</p> Signup and view all the answers

Why are hardware and software standards important in network construction?

<p>They ensure that devices from different vendors can communicate effectively. (A)</p> Signup and view all the answers

What do network communication protocols primarily define?

<p>The rules governing network communication, including data format and error handling. (B)</p> Signup and view all the answers

Which layer of the OSI model is responsible for defining the format of data on the network?

<p>Data Link Layer (D)</p> Signup and view all the answers

What is the function of the Transport Layer in the TCP/IP model?

<p>Establishing end-to-end connections and managing data delivery. (D)</p> Signup and view all the answers

Why is it important for the Transport Layer to label packets with a sequence number?

<p>To reassemble the packets in the correct order at the destination. (C)</p> Signup and view all the answers

In packet switching, what is the role of network routers?

<p>To determine the best path to transfer packets to their destination. (D)</p> Signup and view all the answers

What is the purpose of 'error checking bits' in an IP packet?

<p>To verify that the data arrives in the same state it was sent. (A)</p> Signup and view all the answers

What is a key advantage of compressing data before transmitting it across a network?

<p>It reduces the bandwidth required for transmission and the storage space needed. (A)</p> Signup and view all the answers

What is a potential drawback of using lossy compression methods?

<p>They can result in a loss of data and detail from the original file. (C)</p> Signup and view all the answers

Which factor can cause a slowdown in network speed?

<p>Malicious software infections on the network. (C)</p> Signup and view all the answers

What is a primary advantage of wireless networks compared to wired networks?

<p>Increased mobility for connected devices. (C)</p> Signup and view all the answers

Which hardware component is essential for a device to connect to a wireless network?

<p>A wireless Network Interface Card (NIC). (C)</p> Signup and view all the answers

What is the role of an access point in a wireless network?

<p>To connect wireless devices to a wired network. (A)</p> Signup and view all the answers

Which wireless security method checks a list of approved MAC addresses to grant network access?

<p>Media Access Control (MAC) filtering (A)</p> Signup and view all the answers

What is the biggest security risk associated with WEP (Wired Equivalent Privacy)?

<p>It has weak encryption protocols that are easily cracked. (C)</p> Signup and view all the answers

What is the purpose of a firewall in network security?

<p>To prevent unauthorized access to a network. (C)</p> Signup and view all the answers

Which of the following actions helps to prevent unauthorized access to a network?

<p>Regularly changing passwords and making them complex. (D)</p> Signup and view all the answers

What is the primary function of a 'proxy server' in network security?

<p>To act as an intermediary between devices on the LAN and the internet. (C)</p> Signup and view all the answers

What distinguishes WiMAX from WiFi in terms of network range?

<p>WiMAX is designed for longer distances compared to WiFi. (A)</p> Signup and view all the answers

How do 3G and 4G networks primarily benefit mobile device users?

<p>By enabling tunneling, for simultaneous internet and phone line usage. (A)</p> Signup and view all the answers

How can a VPN improve a company's productivity?

<p>By allowing employees to work remotely from various geographic locations (A)</p> Signup and view all the answers

Flashcards

Local Area Network (LAN)

A network connecting devices in a limited geographical area.

Virtual Local Area Network (VLAN)

A LAN created via software, grouping devices logically rather than physically.

Wide Area Network (WAN)

A network that covers a broad area, often spanning cities or countries.

Storage Area Network (SAN)

A network dedicated to providing block-level storage access to servers.

Signup and view all the flashcards

Wireless Local Area Network (WLAN)

A LAN that uses wireless connections instead of cables.

Signup and view all the flashcards

Virtual Private Network (VPN)

A network that uses a public network (like the internet) to create a secure, private connection.

Signup and view all the flashcards

Personal Area Network (PAN)

A network centered around an individual's personal devices.

Signup and view all the flashcards

Peer-to-peer (P2P) Network

A decentralized network where devices share resources directly with each other.

Signup and view all the flashcards

Intranet

A private network within an organization, used for internal communication and collaboration.

Signup and view all the flashcards

Extranet

A private network that allows controlled access to authorized external users.

Signup and view all the flashcards

Importance of standards in networks

Compatibility and interoperability.

Signup and view all the flashcards

Protocol

A set of rules governing data communication.

Signup and view all the flashcards

Data Packet

A formatted unit of data carried by a network.

Signup and view all the flashcards

Data Integrity

Ensures data is complete, accurate and reliable during transmission.

Signup and view all the flashcards

Flow Control

A mechanism to manage the rate of data transmission.

Signup and view all the flashcards

Deadlock

A condition where processes are blocked indefinitely.

Signup and view all the flashcards

Congestion

A state where network resources are overwhelmed.

Signup and view all the flashcards

Error Checking

Techniques to identify and handle errors in data transmission.

Signup and view all the flashcards

Communication over networks

Breaking down communication into layers.

Signup and view all the flashcards

Characteristics of transmission media

Speed, reliability, cost, and security.

Signup and view all the flashcards

Packet Switching

Breaking data into small units for efficient transmission.

Signup and view all the flashcards

VPN Technologies

Routers, encryption protocols, and VPN applications.

Signup and view all the flashcards

Advantages of VPN

Work from home, hire global experts, secure data.

Signup and view all the flashcards

Data Transformation for Transmission

Data is transformed into bits encoded as signals.

Signup and view all the flashcards

Packetized data

Data is divided and transmitted in small pieces.

Signup and view all the flashcards

How data compression helps

Data file size is reduced to save space.

Signup and view all the flashcards

Factors impacting speed of data transmission

Data, time, distance, traffic impact network throughput.

Signup and view all the flashcards

Types of wireless networks

WiFi, WiMAX, 3G, and 4G.

Signup and view all the flashcards

Components of wireless networks

Access point, repeater, NI Card, and router.

Signup and view all the flashcards

Methods of network security

Authentication, encription and MAC address control.

Signup and view all the flashcards

Study Notes

  • Topic is networks

Network Fundamentals

  • Networks include local area network (LAN), virtual local area network (VLAN), wide area network (WAN), storage area network (SAN), wireless local area network (WLAN), internet, extranet, virtual private network (VPN), personal area network (PAN), and peer-to-peer (P2P).
  • Standards enable compatibility through a common "language" internationally.
  • Communication over networks is broken down into different layers
  • Awareness of the OSI seven layer model is required
  • Understanding the functioning of each layer is not needed
  • The use of a virtual private network has led to changes in working patterns
  • Globalization has been accelerated by the technical advances linked to network development

Data Transmission

  • Protocols ensure data integrity, flow control, prevent deadlocks and congestion, and provide error checking
  • The speed of data transmission across a network can vary
  • Compression has enabled information to be disseminated more rapidly due to compression reducing transmission times
  • Transmission media characteristics include speed, reliability, cost, and security
  • Transmission media options include metal conductor, fiber optic, and wireless
  • Data is transmitted by packet switching

Network Types and Devices

LAN (Local Area Network)

  • Network of nodes are connected through a central network device or server
  • Limited to one geographical location without connections to other outer networks
  • Switches and hubs connect devices
  • Switches have tables to direct packets to the correct port
  • Used for communication within small offices

VLAN (Virtual Local Area Network)

  • Logically groups workstations, servers, and network devices
  • Appear on the same LAN despite geographical distribution
  • VLANs improve network performance
  • Network administrators manage permissions and security for node groups with different permission level
  • These groups are not physically linked to the same router/switch but form logical groups
  • Examples are teachers and admins on different VLANs in a school network

SAN (Storage Area Network)

  • Network of storage disks that are block level storage for servers
  • Used to store data and maintain backups

WAN (Wide Area Network)

  • Connects multiple LANs
  • Distributed across different geographical locations
  • Used in larger areas like schools, offices, and hospitals
  • Routers and digital subscriber lines are needed to construct WANs

VPN (Virtual Private Network)

  • Company's private network using an internet connection to connect remote sites or employees
  • Access requires secure login.
  • Masks IP addresses and locations
  • Secures privacy through tunneling
  • Data security is ensured through encryption
  • Applications, routers, and encryption protocols like SSL and TLS are needed

PAN (Personal Area Network)

  • Connects devices or peripherals directly to a device
  • Examples are printers, external hard drives, and Bluetooth devices connected

P2P (Peer-to-Peer Network)

  • Devices connect without a central server
  • It is easy to implement, requiring only wired or wireless NIC cards
  • Central management is not present
  • Purpose is to share resources like printers and storage

WLAN (Wireless Local Area Network)

  • Allows devices to connect and communicate wirelessly
  • Unlike LAN, communication is over Wi-Fi versus Ethernet cables
  • Wireless access points and integrated routers are used to construct WLANs
  • Devices connect via a pass key

Intranet vs. Extranet

  • Intranet is a private network for secure collaboration and communication among a company’s employees, used to store crucial information
  • Extranet is similar to the intranet, it's a private network within an organization
  • Extranets use the internet to connect to entities outside the network such as suppliers and customers
  • It provides a real-time platform for collaboration with external parties and streamlines processes

Standards in Networks

  • Standards enable the construction of networks using different devices from different manufacturers
  • They also enable communication between devices from different locations

Hardware Standards

  • Computer networks use equipment from various vendors, that must work together
  • This is achieved through standardized manufacturing procedures
  • Ports, Ethernet cables, and wireless standards are consistent across devices

Software and Protocols

  • Networks also follow standard communication protocols
  • Protocols create rules for network communication, including packet formatting, type, size, and error handling
  • Protocols work in layers, from the user interface to the physical connection, with each layer following specific rules

OSI Layers

  • Application Layer: Provides human-computer interaction where applications can access network services
  • Presentation Layer: Ensures data is in a usable format and handles data encryption
  • Session Layer: Maintains connections and controls ports and sessions
  • Transport Layer: Transmits data using transmission protocols including TCP and UDP
  • Network Layer: Decides which physical path the data will take
  • Data Link Layer: Defines the format of data on the network
  • Physical Layer: Transmits raw bit streams over the physical medium

TCP/IP Stack

Sender Side

  • Application Layer: selects protocol related to app sending message (HTTPS, SMTP)
  • Transport Layer: establishes end-to-end connection with recipient, splits data into numbered packets, and requests lost packets to acknowledge receipt
  • Network Layer: adds receiver and destination IP addresses
  • Link Layer: establishes connection by adding MAC addresses of sender and destination on each hop

Destination Side

  • Link Layer: removes MAC addresses
  • Network Layer: removes IP addresses
  • Transport Layer: uses port number to decide what application to send the packet to
  • It reassembles all the packets in the correct order
  • Application Layer: data is received by the correct app from the transport layer

Virtual Private Networks (VPNs)

Features

  • Use a company's private network over the internet to connect remote sites or employees via a secure login
  • Masks IP addresses and locations
  • Secures privacy through VPN tunneling
  • Data security is ensured through encryption

Technologies Used To Establish VPN

  • VPN client and server with communications
  • Encryption protocols such as SSL 3.0, TLS, and IPSec are used for secure data transmission

Authentication

  • It is a vital part of VPNs, requiring more than just usernames and passwords
  • Stronger methods use certificates, one-time passwords, and software tokens

Tunnelling

  • It is implemented using software. The one creates a secure tunnel between a user's device and the VPN server
  • It hides the user's real IP address by adopting the server's IP

Security and Use

  • Allows working from home or other countries
  • Helps to hire experts from other countries
  • Data is encrypted, preventing interception
  • Reduces day-to-day office costs
  • Companies can hire staff from different time zones, which impacts overall business and productivity

Compression

  • Involves restructuring files using compression algorithms to reduce storage space and transmission time
  • Lossy and lossless compression techniques are used
  • Different compression algorithms support text, images, and sound files
  • Compression reduces both file size and bandwidth needed for transmission
  • Lossy compression discards data, which may be unacceptable for audio and video files

Factors Impacting Network Speed

  • Malicious software, spyware, malware, and viruses can attack the system
  • Wired, wireless, mobile, broadband, fixed wireless, satellite, and cable represent different connection types
  • Hardware malfunction such as modem or router configuration issues are a factor
  • External factors include network traffic volume

Wireless Networking: Advantages and Disadvantages

  • Wireless networks have changed working patterns, social activities, and raised health issues
  • They enable connectivity between different locations

Advantages

  • Connected devices are able to move around the coverage area
  • Eliminates the need for cables, reduces costs, and saves time
  • Provides automatic switching between routers based on connection quality
  • Requires minimal setup costs

Disadvantages

  • Offers a higher chance of interference compared to wired networks
  • Uses limited range
  • It can be hacked with WEP encryption
  • Access points can be used to steal data
  • Network speed compromised when more devices are connected

Reliability

  • Reliability depends on the strength of the wireless signal, distance from the router and topology of surrounding area
  • Slower data transfer speeds apply
  • Ethernet is more reliable as the signal doesn't depend on distance from a router, and wires support longer distances
  • Ethernet is also immune to interference
  • With ethernet, topology is not an issue but reliability is affected if it is cut

Devices for Wireless Networks

  • Access point/repeater connects wireless devices to a network and strengthens the signa
  • Wireless/wired NIC (network interface card) facilitates connections
  • Embedded antenna in wireless cards allow them to connect wirelessly
  • Routers forward data by inspecting packets' destination addresses
  • Router's ensure secure and reliable packet delivery

Wireless Network Security Methods

Authentication and access permissions

  • Proving identity access to data and using passwords and biometrics are possible
  • Permissions for accessing files/resources should be specified

Encryption protocols

  • Data is encrypted using an encryption key
  • The key is transmitted in an encrypted state and decrypted at the receiver

MAC Media Access Lists

  • Checks MAC addresses against a list of authorized devices
  • Denies network access to unauthorized devices.
  • Prevents unauthorized access, and adds an extra authentication layer

Protection Against Unauthorized Access

  • Prevent with no access without usernames/passwords, which should be regularly changed and made difficult to guess.
  • Decrypted data should be allowed to be accessed only when user has the decryption code.
  • User (User should be of the context of the questions) should be trained for safe practices; to create a risk-conscious /security-aware culture within the organisation
  • By installing virus checkers/spyware software, prevent damage to data files or the system / to prevent data being extracted from the files/system.
  • Physical security measures should be in place

Firewall

  • Blocks and allows traffic from specific IP addresses
  • Blocks and allows certain types of packet; examples are pings/echo requests
  • Maintains information about current connections and only allows packets relevant to these connections through.
  • Acts as a proxy server, stops computers on the Internet directly accessing devices on the LAN;
  • Identifies unusual behavior from a host; for example, sending an unusually large amount of data.
  • Rules are written to specify conditions under which to block/allow.

Types of Wireless Networks

  • WiFi: Small radius, for example at home
  • WiMAX: Long distance and cheap
  • 3G and 4G: Mobile networks, allow tunneling

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Networking Fundamentals Quiz
10 questions
Networking Fundamentals Quiz
5 questions

Networking Fundamentals Quiz

AdorableAlgorithm9500 avatar
AdorableAlgorithm9500
Networking Fundamentals Quiz
8 questions

Networking Fundamentals Quiz

AdorableAlgorithm9500 avatar
AdorableAlgorithm9500
Use Quizgecko on...
Browser
Browser