Podcast
Questions and Answers
Which of the following best describes the role of encrypted messages and security devices in a local network?
Which of the following best describes the role of encrypted messages and security devices in a local network?
- They reduce the need for regular software updates.
- They enhance the speed of data transfer within the network.
- They are primary methods of implementing network security. (correct)
- They simplify the process of network maintenance.
Why is network security particularly important for institutions like hospitals and doctor's offices?
Why is network security particularly important for institutions like hospitals and doctor's offices?
- To facilitate faster data transfer between departments.
- To reduce operational costs associated with IT infrastructure.
- To ensure compliance with industry regulations.
- To protect the privacy of their clients' personal information. (correct)
What is a primary concern that led to the development of fault-tolerant network architecture, exemplified by the Internet's design?
What is a primary concern that led to the development of fault-tolerant network architecture, exemplified by the Internet's design?
- The increasing cost of maintaining traditional telephone networks.
- The need for faster data transmission speeds across networks.
- The desire to create a more user-friendly interface for network users.
- The ability to withstand widespread destruction of communication infrastructure. (correct)
What is a key characteristic of a circuit-switched, connection-oriented network?
What is a key characteristic of a circuit-switched, connection-oriented network?
In the context of computer networking, what components are analogous to 'friends who can call or text each other'?
In the context of computer networking, what components are analogous to 'friends who can call or text each other'?
Which of the following is an essential function of a network?
Which of the following is an essential function of a network?
In network communications, what is the significance of establishing 'rules or protocols'?
In network communications, what is the significance of establishing 'rules or protocols'?
Which of the following is considered an external factor that can affect successful communication on a data network?
Which of the following is considered an external factor that can affect successful communication on a data network?
How are networks categorized based on transmission media?
How are networks categorized based on transmission media?
Which network type is commonly used to connect devices within a range of about 10 meters around an individual?
Which network type is commonly used to connect devices within a range of about 10 meters around an individual?
What is the defining characteristic of a Local Area Network (LAN)?
What is the defining characteristic of a Local Area Network (LAN)?
What distinguishes a Metropolitan Area Network (MAN) from a Local Area Network (LAN)?
What distinguishes a Metropolitan Area Network (MAN) from a Local Area Network (LAN)?
Which network model does not differentiate between clients and servers, where each node can both request and provide services?
Which network model does not differentiate between clients and servers, where each node can both request and provide services?
What is a key disadvantage of peer-to-peer networks compared to client-server networks?
What is a key disadvantage of peer-to-peer networks compared to client-server networks?
In a client-server network, what is the primary role of the server?
In a client-server network, what is the primary role of the server?
What is a significant disadvantage of client-server networks?
What is a significant disadvantage of client-server networks?
What does network topology primarily define:
What does network topology primarily define:
In the context of network topology, what is the 'physical topology'?
In the context of network topology, what is the 'physical topology'?
What is a defining characteristic of a bus topology?
What is a defining characteristic of a bus topology?
In a ring topology, what mechanism allows a computer to send data?
In a ring topology, what mechanism allows a computer to send data?
What happens to a network with a ring topology if one computer fails?
What happens to a network with a ring topology if one computer fails?
What is a primary advantage of a star topology over a bus topology?
What is a primary advantage of a star topology over a bus topology?
What is the role of a Multi-Station Access Unit (MSAU) in a Token Ring network?
What is the role of a Multi-Station Access Unit (MSAU) in a Token Ring network?
Which of the following is an example of a network end device?
Which of the following is an example of a network end device?
Which of the following best describes the function of a router in a network?
Which of the following best describes the function of a router in a network?
What is the primary function of a switch in a local area network (LAN)?
What is the primary function of a switch in a local area network (LAN)?
What problem does a hub create in a network, which switches are designed to solve?
What problem does a hub create in a network, which switches are designed to solve?
What is the main purpose of a modem in a network?
What is the main purpose of a modem in a network?
What is the function of an access point (AP) in a network?
What is the function of an access point (AP) in a network?
What does a gateway primarily do in a computer network?
What does a gateway primarily do in a computer network?
What is the primary role of a firewall in network security?
What is the primary role of a firewall in network security?
What is the purpose of a Network Interface Card (NIC) in a computer?
What is the purpose of a Network Interface Card (NIC) in a computer?
What is the main characteristic of a MAC address?
What is the main characteristic of a MAC address?
What is the purpose of an IP address in a network?
What is the purpose of an IP address in a network?
Which type of IP address is automatically assigned by a DHCP server?
Which type of IP address is automatically assigned by a DHCP server?
Flashcards
Network Security
Network Security
Protecting digital assets and ensuring secure communication over networks.
Encryption
Encryption
Converting data into an unreadable format to protect its confidentiality during transmission or storage.
Fault-Tolerant Network
Fault-Tolerant Network
A network that prioritizes fault tolerance in its design, ensuring continuous operation despite failures.
Network
Network
Signup and view all the flashcards
Networking
Networking
Signup and view all the flashcards
Communication Protocols
Communication Protocols
Signup and view all the flashcards
Wired Network
Wired Network
Signup and view all the flashcards
Wireless Network
Wireless Network
Signup and view all the flashcards
Personal Area Network (PAN)
Personal Area Network (PAN)
Signup and view all the flashcards
Local Area Network (LAN)
Local Area Network (LAN)
Signup and view all the flashcards
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
Signup and view all the flashcards
Wide Area Network (WAN)
Wide Area Network (WAN)
Signup and view all the flashcards
Peer-to-Peer Network
Peer-to-Peer Network
Signup and view all the flashcards
Client-Server Network
Client-Server Network
Signup and view all the flashcards
Network Topology
Network Topology
Signup and view all the flashcards
Physical Topology
Physical Topology
Signup and view all the flashcards
Logical Topology
Logical Topology
Signup and view all the flashcards
Bus Topology
Bus Topology
Signup and view all the flashcards
Ring Topology
Ring Topology
Signup and view all the flashcards
Star Topology
Star Topology
Signup and view all the flashcards
Extended Star Topology
Extended Star Topology
Signup and view all the flashcards
Tree/Hierarchical Topology
Tree/Hierarchical Topology
Signup and view all the flashcards
Mesh Topology
Mesh Topology
Signup and view all the flashcards
Token Passing Topology
Token Passing Topology
Signup and view all the flashcards
Network Hardware
Network Hardware
Signup and view all the flashcards
End Devices (Hosts)
End Devices (Hosts)
Signup and view all the flashcards
Network Devices
Network Devices
Signup and view all the flashcards
Network Software
Network Software
Signup and view all the flashcards
Network Operating System (NOS)
Network Operating System (NOS)
Signup and view all the flashcards
Network Protocols
Network Protocols
Signup and view all the flashcards
Network Services
Network Services
Signup and view all the flashcards
Security Software
Security Software
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Modem
Modem
Signup and view all the flashcards
Study Notes
Network Security Importance
Essential for public confidence in Internet use, especially for financial transactions
Governments and businesses handling personal data must protect clients' privacy
Security is vital for retaining web users, who might leave without it
Encryption and security devices are used for security
Network Security Limitations
Encryption and firewalls alone may not suffice to protect networks
The need for security and privacy exceeds current architectural capabilities
Efforts are focused on research, development, and tools to address network security weaknesses
Fault-Tolerant Network Architecture
The Internet was initially designed with fault tolerance as a priority
The U.S. Department of Defense (DoD) aimed for a communication system able to withstand infrastructure damage
Circuit-Switched Networks
Early infrastructure was circuit-switched and connection-oriented
Phone operators established temporary, physical circuits for calls to travel between sender and receiver
Technology was connection-oriented as physical disconnections would drop the call, requiring a new call and circuit
Circuit-switched design had flaws as only one phone call occupied each circuit
Introduction to Computer Networking
Computer Networking is like friends with phones texting each other
Computers connect through cables, Wi-Fi, and share files, printers, and internet
This way they share information quickly like friends talking on their phones.
Computer networks consist of nodes like servers, networking hardware, personal computers
Hostnames and network addresses identify devices on a network
Network Definition
A network involves two or more computers connected to share resources like files, folders, printers, and disk drives
A network is a collection of computers or hardware devices connected physically or logically for exchanging information and cooperation
Networking Definition
Networking is designing, implementing, upgrading, managing, and working with networks and network technologies
Communications Principles
Communication is varied and occurs in different environments
Communication relies on protocols or rules, including:
Identifying sender and receiver
Agreeing on a method
Speaking a common language
Setting speed and delivery
Confirming receipt
Successful communication sends the intended message
Data networks require the same basic criteria for successful communication
External Factors in Communication
The pathway quality between sender and recipient is an external factor
With external factors, the number of times the message is redirected can affect the quality of communication
The number of messages being transmitted during communication can also impact external factors
The time allotted for successful communication
Internal Factors in Communication
Message size impacts data networks
Message complexity, and message importance also affect data networks
Delivering a smaller message is more efficient than delivering a bulky message
Network Classifications by Media
Transmission media classifies: Wired (UTP, coaxial & fiber optic cables) and wireless network
Network Classifications by Scale
Network scale classes are LAN, WAN and MAN
Personal Area Network (PAN): Connects devices within 10 meters, such as a computer to its peripherals (keyboard, mouse, printer) or a PDA controlling a hearing aid via Bluetooth
Local Area Network (LAN): Privately-owned networks cover small areas like homes, offices, to share printers with size restrictions to set a time limit
Network Classifications for MAN and WAN
Metropolitan Area Network (MAN): Covers larger geographic than a LAN, from city blocks to cities, and may use channels for moderate-high data rates
A MAN might be a single organization for public utilities that allows 50km interconnection of LANs for modem and wire/cable applications
Wide Area Network (WAN): Covers large areas like a country or continent with communications links across metropolitan, regional, or national boundaries
A WAN utilizes routers and public communications links
Network Classifications Methods
Networks are classified based on management method: Peer-to-Peer and Client Server
Two main network models are used for data exchange and resource sharing that are Client-Server and Peer-to-Peer Networks
Peer-to-Peer Networks
Peer-to-Peer Networks do not differentiate clients from servers
Each node in the network can request and provide services
Peer-to-peer networks typically involve fewer than 12 machines, each with its unique security measures
Each peer-to-peer network consumes and gives resources and the capability for the network to share resources
Client-Server networks see an overload with greater number of active nodes
Peer-to-peer networks are challenging to secure, as each node acts as both a client and a server
Denial of service attacks can occur, and most OS come with software to implement networks
P2P Network Characteristics
Decentralized: Lacks central servers; all devices are equal
Direct communication: Any device sharing file to another
Small-scale networks: Use for home and small offices
Limited security & management: Managed for their own use
P2P Network Examples
Home networks: Share files without the use of central server
File sharing applications: Shared through P2P file-sharing systems
Small business networks: Sharing printers and drivers among a few employees
P2P Network Advantages
Cost effective to not need servers
Easy to set up simple network function
Does not depend on central servers, the network is functional when one device fails
P2P Network Disadvantages
Security is limited where each divide is responsible for their own security leaving it vulnerable
The network is difficult to manage when it grows increasing connections
Devices slow down if the amount of users requesting data is high
Networks: Client-Server
Model for this network is broadly used
Clients and servers are differentiated and servers along with clients are set in place
The centralized server is used to store data which makes its management centralized
The client requests services from the server
Client-Server Characteristics
Centralized control has dedicated servers to manage the network (files, printers, DBs)
A large number of users can scale efficiently
Access managed on each server for better security
Complex set ups require network admin to manage
Client-Server Examples
Within company networks, employees request files from a server that centrally holds it
Email services connect clients to a mail server such as Gmail
Web apps are accesses by users on websites that are centrally hosted
Banking uses centralized banking servers
Client-Server Advantages
Better security is accomplished through centralized control to protect data and control access management
Efficient management to maintain networking performance
Improved scalability can process client requests with proper structure
Higher performing servers process requests faster
Client-Server Disadvantages
Expense to prepare servers for network base
Requires IT experts to maintain/troubleshoot
Network is affected is server experiences complications
Network Topology
Types of network typology are based on connectivity, bus, star, ring
Structure based on wire or the physical
Logical data is defined on how media is accessed when sending data
Bus Topology
The bus topology is simple and low in cost
Cable trunk as the backbone
Only one computer can send messages at a time
Computer only regenerates and listens to data
Ring Topology
Every computer functions as a repeater, boosting signals
Each computer must send the token to send data
More costly
Entire networks fail based on single computer
Star Topology
Each computer must connect to one point via cable
This topology has the cabling, and therefore a higher cost
When the hub is down the entire network is down
Extended Star Topology
Topology joins unique stars to extend the switch/hub
Network coverage area is also extended
Hierarchical/Tree Topology
Root node is at the central of the network
One or more of the roots are connected to other nodes lower in its hierarchy
Mesh Topology
Designed to implemented for high protection or interruption of service
Each host has unique connections to connect with the others
Internet applies many paths to connect, does not use fully meshed topology
Token Passing Topology
Multistation access uses network to have access to computers on its LAN
The electronic token passed around each host controls access
The computer then sends data when the token is received
When the computer does not send data the token is passed to the next host
Network Components
With the computer network comes hardware and software to allow communication where sharing resources takes place
- Network Hardware Components
Within the network, physical devices are used
Send data on computers, laptops, & other servers
Smartphones and tablets
IoT, scanners and printers
- Network, Intermediary Devices
Network, intermediary devices, like routers or switches, manage and direct network traffic
Routers: Connect Networks to the home internet
Switch: Device to connect multiple devices onto a LAN, directing data
Hub: Broadcasts data (inefficient)
Modem: Converts signals for internet access of DSL wires
Extends wifi for wireless networks
Repeater is used to boost the strength/distance
Types of Networks
- VoIP gateways connect types of networks
Transmission media used to transmit data through different types of wires
LANs via etheret
Cable TV on coated cable
Wifi & bluetooth on the radio
Remote controls on IR
Network Software Components
Controls transmission management
Controls communication between devices
Can run peer-to-peer
NOS Operation
Specialized to manage and connect devices
Security, management of files/users
Types of NOS
Windows & Linux for Peer-to-Peer operations
Unix server for centralized control
Network Protocols
Communications follows network protocol which is between devices on the net/
Types of communications are TCP/IP for internet
UDP is faster but streaming is less reliable, used by TCP
Networking Protocols
Standard wired internet relies on Ethernet
WiFi applies 802.11
IP Addresses
Converts name domains for Internet communication
Software Security
Protects for cybersecurity, i.e. anti-virus
Network Services
Network operations support resource sharing
DNS can translates domain names into IP addresses
DHCP assigns devices and is automized
VPNs offers encrypted connections through IPs
- Other Software Safeguards
Security measures must also involve
Firewalls: Monitor Incoming & Outgoing traffic
Proxy Servers: Act as Intermediaries
Safeguards: Management
Wireshark tools finds network trouble
Health server monitors on NAglos
Tools and monitoring and admin of networks happen on SolarWind
Intermediary Components
The components connect printers & other cell phones for security/data transmission
Filter and manage, optimize for traffic
- Networking: Routers
Different networks connecting and directs traffic
Finds best pathway
Routers
Routes data and can function for both LAN & WAN internet
DHCP assigns for IP Adress Protocol
Firewalls protect at every level
Uses for Routers
Can be used to connect offices
Used in large scale securities
Connections to external networks/ISP applications are edge routers
Function of Switches
Connect with the intended recipient
Each switch uses MAC Addresses
How Switches Operate
Efficiency to lessen collision
LAN segmentation done through VLANS
Switches
Can be unmanaged for plug-and-play small networks connectivity
Management allows traffic control
Legacy Device Hub
Basic connections but does not traffic the LAN
Broadcasts info through devices increasing unnecesary traffic
Modern Networks
Creates network congestion
Less secure due to data collection/sending being unintended for receivers
Moderns
Modem is an analog signal
converts devices digital to computer, using cable/phone lines
Types of Network Cables
DSL: Telephone lines
Coaxial: Broadband Internet
Fiber: Fiber Optics/Hi-Speed Internet
Access Points
Wireless access point will extend the network
Can connects devices to network
Has security (WPA encryptions)
Router delivers and manages wireless traffic
Provides a LAN to connect from
Gateways
Acts as a bridge for communication
Transfers data between each network
Routes internally with internet access, allowing interal network transfer
Firewall
Hardware & software security
Monitors pre-defiend network traffic by blocking unauthorized access and data packets
Protects & monitors cyber threat (DDoS attacks)
Types of Networking Firewalls
Equipment through Fortinet
Windows Defender on software
Networking Interface Card
Wired connects to each device
Wifi connections are then allow
NIC Functions
NIC functions include wireless operation between devices to data transmission while supporting different speeds
Assigns code address
Network Addressing
Ensured transmission data through two protocols of mac-ip code
MAC Addresses
Control over the MAC address/physical code
Written in hexadecimal format
Addressing MAC
Unique: no unique device addresses will ever have a similar address code
Set by manufactuer
Delivery of devices within networks and codes
Types of MAC
Unicast is one code one communication
Multicast is a used code for many communication
Broadcast mac transfer data to all devices
Types of IP Addresses
Address assigned to devices for identification in various networks so device can connect to LAN or internets
IP4
Protocol version to assign addresses: example (192.168.1.1), written (192.168.0.1) with few addresses to use
IP6
Protocol version, 2001:0db8:85a3:0000:0000:8a2e:0370:7334 written code, hexadecimal and separated by colons and trillions of data
IPs
Security addressing applies dynamic and static IPs
Assigned privately which needs manual changes or DHCP based on ISP
Data Networks
Network is connected so the data transmits which differentiates the host through subnet
External networks are gateway for IP and are common on routers connecting local internet serversNetwork Security Importance
Essential for public confidence in Internet use, especially for financial transactions
Governments and businesses handling personal data must protect clients' privacy
Security is vital for retaining web users, who might leave without it
Encryption and security devices are used for security
Network Security Limitations
Encryption and firewalls alone may not suffice to protect networks
The need for security and privacy exceeds current architectural capabilities
Efforts are focused on research, development, and tools to address network security weaknesses
Fault-Tolerant Network Architecture
The Internet was initially designed with fault tolerance as a priority
The U.S. Department of Defense (DoD) aimed for a communication system able to withstand infrastructure damage
Circuit-Switched Networks
Early infrastructure was circuit-switched and connection-oriented
Phone operators established temporary, physical circuits for calls to travel between sender and receiver
Technology was connection-oriented as physical disconnections would drop the call, requiring a new call and circuit
Circuit-switched design had flaws as only one phone call occupied each circuit
Introduction to Computer Networking
Computer Networking is like friends with phones texting each other
Computers connect through cables, Wi-Fi, and share files, printers, and internet
This way they share information quickly like friends talking on their phones.
Computer networks consist of nodes like servers, networking hardware, personal computers
Hostnames and network addresses identify devices on a network
Network Definition
A network involves two or more computers connected to share resources like files, folders, printers, and disk drives
A network is a collection of computers or hardware devices connected physically or logically for exchanging information and cooperation
Networking Definition
Networking is designing, implementing, upgrading, managing, and working with networks and network technologies
Communications Principles
Communication is varied and occurs in different environments
Communication relies on protocols or rules, including:
Identifying sender and receiver
Agreeing on a method
Speaking a common language
Setting speed and delivery
Confirming receipt
Successful communication sends the intended message
Data networks require the same basic criteria for successful communication
External Factors in Communication
The pathway quality between sender and recipient is an external factor
With external factors, the number of times the message is redirected can affect the quality of communication
The number of messages being transmitted during communication can also impact external factors
The time allotted for successful communication
Internal Factors in Communication
Message size impacts data networks
Message complexity, and message importance also affect data networks
Delivering a smaller message is more efficient than delivering a bulky message
Network Classifications by Media
Transmission media classifies: Wired (UTP, coaxial & fiber optic cables) and wireless network
Network Classifications by Scale
Network scale classes are LAN, WAN and MAN
Personal Area Network (PAN): Connects devices within 10 meters, such as a computer to its peripherals (keyboard, mouse, printer) or a PDA controlling a hearing aid via Bluetooth
Local Area Network (LAN): Privately-owned networks cover small areas like homes, offices, to share printers with size restrictions to set a time limit
Network Classifications for MAN and WAN
Metropolitan Area Network (MAN): Covers larger geographic than a LAN, from city blocks to cities, and may use channels for moderate-high data rates
A MAN might be a single organization for public utilities that allows 50km interconnection of LANs for modem and wire/cable applications
Wide Area Network (WAN): Covers large areas like a country or continent with communications links across metropolitan, regional, or national boundaries
A WAN utilizes routers and public communications links
Network Classifications Methods
Networks are classified based on management method: Peer-to-Peer and Client Server
Two main network models are used for data exchange and resource sharing that are Client-Server and Peer-to-Peer Networks
Peer-to-Peer Networks
Peer-to-Peer Networks do not differentiate clients from servers
Each node in the network can request and provide services
Peer-to-peer networks typically involve fewer than 12 machines, each with its unique security measures
Each peer-to-peer network consumes and gives resources and the capability for the network to share resources
Client-Server networks see an overload with greater number of active nodes
Peer-to-peer networks are challenging to secure, as each node acts as both a client and a server
Denial of service attacks can occur, and most OS come with software to implement networks
P2P Network Characteristics
Decentralized: Lacks central servers; all devices are equal
Direct communication: Any device sharing file to another
Small-scale networks: Use for home and small offices
Limited security & management: Managed for their own use
P2P Network Examples
Home networks: Share files without the use of central server
File sharing applications: Shared through P2P file-sharing systems
Small business networks: Sharing printers and drivers among a few employees
P2P Network Advantages
Cost effective to not need servers
Easy to set up simple network function
Does not depend on central servers, the network is functional when one device fails
P2P Network Disadvantages
Security is limited where each divide is responsible for their own security leaving it vulnerable
The network is difficult to manage when it grows increasing connections
Devices slow down if the amount of users requesting data is high
Networks: Client-Server
Model for this network is broadly used
Clients and servers are differentiated and servers along with clients are set in place
The centralized server is used to store data which makes its management centralized
The client requests services from the server
Client-Server Characteristics
Centralized control has dedicated servers to manage the network (files, printers, DBs)
A large number of users can scale efficiently
Access managed on each server for better security
Complex set ups require network admin to manage
Client-Server Examples
Within company networks, employees request files from a server that centrally holds it
Email services connect clients to a mail server such as Gmail
Web apps are accesses by users on websites that are centrally hosted
Banking uses centralized banking servers
Client-Server Advantages
Better security is accomplished through centralized control to protect data and control access management
Efficient management to maintain networking performance
Improved scalability can process client requests with proper structure
Higher performing servers process requests faster
Client-Server Disadvantages
Expense to prepare servers for network base
Requires IT experts to maintain/troubleshoot
Network is affected is server experiences complications
Network Topology
Types of network typology are based on connectivity, bus, star, ring
Structure based on wire or the physical
Logical data is defined on how media is accessed when sending data
Bus Topology
The bus topology is simple and low in cost
Cable trunk as the backbone
Only one computer can send messages at a time
Computer only regenerates and listens to data
Ring Topology
Every computer functions as a repeater, boosting signals
Each computer must send the token to send data
More costly
Entire networks fail based on single computer
Star Topology
Each computer must connect to one point via cable
This topology has the cabling, and therefore a higher cost
When the hub is down the entire network is down
Extended Star Topology
Topology joins unique stars to extend the switch/hub
Network coverage area is also extended
Hierarchical/Tree Topology
Root node is at the central of the network
One or more of the roots are connected to other nodes lower in its hierarchy
Mesh Topology
Designed to implemented for high protection or interruption of service
Each host has unique connections to connect with the others
Internet applies many paths to connect, does not use fully meshed topology
Token Passing Topology
Multistation access uses network to have access to computers on its LAN
The electronic token passed around each host controls access
The computer then sends data when the token is received
When the computer does not send data the token is passed to the next host
Network Components
With the computer network comes hardware and software to allow communication where sharing resources takes place
- Network Hardware Components
Within the network, physical devices are used
Send data on computers, laptops, & other servers
Smartphones and tablets
IoT, scanners and printers
- Network, Intermediary Devices
Network, intermediary devices, like routers or switches, manage and direct network traffic
Routers: Connect Networks to the home internet
Switch: Device to connect multiple devices onto a LAN, directing data
Hub: Broadcasts data (inefficient)
Modem: Converts signals for internet access of DSL wires
Extends wifi for wireless networks
Repeater is used to boost the strength/distance
Types of Networks
- VoIP gateways connect types of networks
Transmission media used to transmit data through different types of wires
LANs via etheret
Cable TV on coated cable
Wifi & bluetooth on the radio
Remote controls on IR
Network Software Components
Controls transmission management
Controls communication between devices
Can run peer-to-peer
NOS Operation
Specialized to manage and connect devices
Security, management of files/users
Types of NOS
Windows & Linux for Peer-to-Peer operations
Unix server for centralized control
Network Protocols
Communications follows network protocol which is between devices on the net/
Types of communications are TCP/IP for internet
UDP is faster but streaming is less reliable, used by TCP
Networking Protocols
Standard wired internet relies on Ethernet
WiFi applies 802.11
IP Addresses
Converts name domains for Internet communication
Software Security
Protects for cybersecurity, i.e. anti-virus
Network Services
Network operations support resource sharing
DNS can translates domain names into IP addresses
DHCP assigns devices and is automized
VPNs offers encrypted connections through IPs
- Other Software Safeguards
Security measures must also involve
Firewalls: Monitor Incoming & Outgoing traffic
Proxy Servers: Act as Intermediaries
Safeguards: Management
Wireshark tools finds network trouble
Health server monitors on NAglos
Tools and monitoring and admin of networks happen on SolarWind
Intermediary Components
The components connect printers & other cell phones for security/data transmission
Filter and manage, optimize for traffic
- Networking: Routers
Different networks connecting and directs traffic
Finds best pathway
Routers
Routes data and can function for both LAN & WAN internet
DHCP assigns for IP Adress Protocol
Firewalls protect at every level
Uses for Routers
Can be used to connect offices
Used in large scale securities
Connections to external networks/ISP applications are edge routers
Function of Switches
Connect with the intended recipient
Each switch uses MAC Addresses
How Switches Operate
Efficiency to lessen collision
LAN segmentation done through VLANS
Switches
Can be unmanaged for plug-and-play small networks connectivity
Management allows traffic control
Legacy Device Hub
Basic connections but does not traffic the LAN
Broadcasts info through devices increasing unnecesary traffic
Modern Networks
Creates network congestion
Less secure due to data collection/sending being unintended for receivers
Moderns
Modem is an analog signal
converts devices digital to computer, using cable/phone lines
Types of Network Cables
DSL: Telephone lines
Coaxial: Broadband Internet
Fiber: Fiber Optics/Hi-Speed Internet
Access Points
Wireless access point will extend the network
Can connects devices to network
Has security (WPA encryptions)
Router delivers and manages wireless traffic
Provides a LAN to connect from
Gateways
Acts as a bridge for communication
Transfers data between each network
Routes internally with internet access, allowing interal network transfer
Firewall
Hardware & software security
Monitors pre-defiend network traffic by blocking unauthorized access and data packets
Protects & monitors cyber threat (DDoS attacks)
Types of Networking Firewalls
Equipment through Fortinet
Windows Defender on software
Networking Interface Card
Wired connects to each device
Wifi connections are then allow
NIC Functions
NIC functions include wireless operation between devices to data transmission while supporting different speeds
Assigns code address
Network Addressing
Ensured transmission data through two protocols of mac-ip code
MAC Addresses
Control over the MAC address/physical code
Written in hexadecimal format
Addressing MAC
Unique: no unique device addresses will ever have a similar address code
Set by manufactuer
Delivery of devices within networks and codes
Types of MAC
Unicast is one code one communication
Multicast is a used code for many communication
Broadcast mac transfer data to all devices
Types of IP Addresses
Address assigned to devices for identification in various networks so device can connect to LAN or internets
IP4
Protocol version to assign addresses: example (192.168.1.1), written (192.168.0.1) with few addresses to use
IP6
Protocol version, 2001:0db8:85a3:0000:0000:8a2e:0370:7334 written code, hexadecimal and separated by colons and trillions of data
IPs
Security addressing applies dynamic and static IPs
Assigned privately which needs manual changes or DHCP based on ISP
Data Networks
Network is connected so the data transmits which differentiates the host through subnet
External networks are gateway for IP and are common on routers connecting local internet servers
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.