Network Security and Architecture

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the role of encrypted messages and security devices in a local network?

  • They reduce the need for regular software updates.
  • They enhance the speed of data transfer within the network.
  • They are primary methods of implementing network security. (correct)
  • They simplify the process of network maintenance.

Why is network security particularly important for institutions like hospitals and doctor's offices?

  • To facilitate faster data transfer between departments.
  • To reduce operational costs associated with IT infrastructure.
  • To ensure compliance with industry regulations.
  • To protect the privacy of their clients' personal information. (correct)

What is a primary concern that led to the development of fault-tolerant network architecture, exemplified by the Internet's design?

  • The increasing cost of maintaining traditional telephone networks.
  • The need for faster data transmission speeds across networks.
  • The desire to create a more user-friendly interface for network users.
  • The ability to withstand widespread destruction of communication infrastructure. (correct)

What is a key characteristic of a circuit-switched, connection-oriented network?

<p>A temporary, physical connection is established for each communication session. (B)</p> Signup and view all the answers

In the context of computer networking, what components are analogous to 'friends who can call or text each other'?

<p>Computers and other networked devices. (C)</p> Signup and view all the answers

Which of the following is an essential function of a network?

<p>Facilitating resource sharing among connected devices. (A)</p> Signup and view all the answers

In network communications, what is the significance of establishing 'rules or protocols'?

<p>To facilitate successful communication between devices. (A)</p> Signup and view all the answers

Which of the following is considered an external factor that can affect successful communication on a data network?

<p>The quality of the pathway between the sender and recipient. (C)</p> Signup and view all the answers

How are networks categorized based on transmission media?

<p>By the type of cabling or wireless technology used. (A)</p> Signup and view all the answers

Which network type is commonly used to connect devices within a range of about 10 meters around an individual?

<p>Personal Area Network (PAN). (B)</p> Signup and view all the answers

What is the defining characteristic of a Local Area Network (LAN)?

<p>It is restricted in size, allowing for predictable transmission times. (A)</p> Signup and view all the answers

What distinguishes a Metropolitan Area Network (MAN) from a Local Area Network (LAN)?

<p>A MAN covers a larger geographical area than a LAN. (B)</p> Signup and view all the answers

Which network model does not differentiate between clients and servers, where each node can both request and provide services?

<p>Peer-to-Peer Network. (C)</p> Signup and view all the answers

What is a key disadvantage of peer-to-peer networks compared to client-server networks?

<p>Limited security and management capabilities. (B)</p> Signup and view all the answers

In a client-server network, what is the primary role of the server?

<p>To manage network resources and control access. (A)</p> Signup and view all the answers

What is a significant disadvantage of client-server networks?

<p>They are dependent on the server; if the server fails, the entire network is affected. (C)</p> Signup and view all the answers

What does network topology primarily define:

<p>The structure of the network. (B)</p> Signup and view all the answers

In the context of network topology, what is the 'physical topology'?

<p>The actual layout of the wire or media. (B)</p> Signup and view all the answers

What is a defining characteristic of a bus topology?

<p>A single cable serves as the backbone for the entire network. (C)</p> Signup and view all the answers

In a ring topology, what mechanism allows a computer to send data?

<p>Token passing. (B)</p> Signup and view all the answers

What happens to a network with a ring topology if one computer fails?

<p>The entire network fails. (C)</p> Signup and view all the answers

What is a primary advantage of a star topology over a bus topology?

<p>Greater resistance to network failure if one computer fails. (A)</p> Signup and view all the answers

What is the role of a Multi-Station Access Unit (MSAU) in a Token Ring network?

<p>It acts as a hub or concentrator. (D)</p> Signup and view all the answers

Which of the following is an example of a network end device?

<p>A computer (PC, Laptop, Server). (C)</p> Signup and view all the answers

Which of the following best describes the function of a router in a network?

<p>It connects different networks and directs data between them. (B)</p> Signup and view all the answers

What is the primary function of a switch in a local area network (LAN)?

<p>To direct data only to the intended recipient, using MAC addresses. (B)</p> Signup and view all the answers

What problem does a hub create in a network, which switches are designed to solve?

<p>Network congestion by broadcasting data to all devices. (D)</p> Signup and view all the answers

What is the main purpose of a modem in a network?

<p>To convert digital signals from a computer into analog signals and vice versa. (D)</p> Signup and view all the answers

What is the function of an access point (AP) in a network?

<p>To extend Wi-Fi coverage in a wireless network. (C)</p> Signup and view all the answers

What does a gateway primarily do in a computer network?

<p>It translates data between different network types, such as IPv4 to IPv6. (D)</p> Signup and view all the answers

What is the primary role of a firewall in network security?

<p>To block unauthorized access to the network. (B)</p> Signup and view all the answers

What is the purpose of a Network Interface Card (NIC) in a computer?

<p>To enable a computer to connect to a network. (A)</p> Signup and view all the answers

What is the main characteristic of a MAC address?

<p>It is a unique physical address assigned to a network interface card. (A)</p> Signup and view all the answers

What is the purpose of an IP address in a network?

<p>To provide a logical address for a device on a network. (A)</p> Signup and view all the answers

Which type of IP address is automatically assigned by a DHCP server?

<p>Dynamic IP Address. (C)</p> Signup and view all the answers

Flashcards

Network Security

Protecting digital assets and ensuring secure communication over networks.

Encryption

Converting data into an unreadable format to protect its confidentiality during transmission or storage.

Fault-Tolerant Network

A network that prioritizes fault tolerance in its design, ensuring continuous operation despite failures.

Network

Two or more computers connected to share resources.

Signup and view all the flashcards

Networking

Processes involved in designing, implementing, and managing networks.

Signup and view all the flashcards

Communication Protocols

A set of rules or protocols that govern how devices communicate.

Signup and view all the flashcards

Wired Network

A network that uses physical cables for connection.

Signup and view all the flashcards

Wireless Network

A network that uses radio waves (Wi-Fi) for connection.

Signup and view all the flashcards

Personal Area Network (PAN)

Network for devices within personal range (up to 10 meters).

Signup and view all the flashcards

Local Area Network (LAN)

Network covering a small geographic area (home, office).

Signup and view all the flashcards

Metropolitan Area Network (MAN)

Network covering a large geographical area (cities).

Signup and view all the flashcards

Wide Area Network (WAN)

Network spanning a country or continent.

Signup and view all the flashcards

Peer-to-Peer Network

Network where each node acts as client and server.

Signup and view all the flashcards

Client-Server Network

Network where clients request resources from servers.

Signup and view all the flashcards

Network Topology

The structure of the network's connections.

Signup and view all the flashcards

Physical Topology

Actual layout of the network's wire or media.

Signup and view all the flashcards

Logical Topology

Defines how media is accessed by hosts to send data.

Signup and view all the flashcards

Bus Topology

Simple network with a single cable (backbone).

Signup and view all the flashcards

Ring Topology

Each computer acts as a repeater in a closed loop.

Signup and view all the flashcards

Star Topology

Each device connects to a central hub.

Signup and view all the flashcards

Extended Star Topology

A network that combines multiple star topologies.

Signup and view all the flashcards

Tree/Hierarchical Topology

Topology with central root node connected to other nodes serially.

Signup and view all the flashcards

Mesh Topology

Each host connects to all other hosts for redundancy.

Signup and view all the flashcards

Token Passing Topology

Controls network access by passing an electronic token to hosts.

Signup and view all the flashcards

Network Hardware

Physical devices used in a network.

Signup and view all the flashcards

End Devices (Hosts)

Devices that send or receive data.

Signup and view all the flashcards

Network Devices

Devices which manage and direct network traffic.

Signup and view all the flashcards

Network Software

Software essential for controlling communication in a network.

Signup and view all the flashcards

Network Operating System (NOS)

Software that manages network resources.

Signup and view all the flashcards

Network Protocols

Defines rules for communication between devices.

Signup and view all the flashcards

Network Services

Supports network operations and resource sharing.

Signup and view all the flashcards

Security Software

Ensures network protection against cyber threats.

Signup and view all the flashcards

Router

Connects different networks and directs data.

Signup and view all the flashcards

Switch

Connects devices within a LAN and directs data.

Signup and view all the flashcards

Modem

Device that converts digital to analog signals and vice versa.

Signup and view all the flashcards

Study Notes

Network Security Importance

Essential for public confidence in Internet use, especially for financial transactions

Governments and businesses handling personal data must protect clients' privacy

Security is vital for retaining web users, who might leave without it

Encryption and security devices are used for security

Network Security Limitations

Encryption and firewalls alone may not suffice to protect networks

The need for security and privacy exceeds current architectural capabilities

Efforts are focused on research, development, and tools to address network security weaknesses

Fault-Tolerant Network Architecture

The Internet was initially designed with fault tolerance as a priority

The U.S. Department of Defense (DoD) aimed for a communication system able to withstand infrastructure damage

Circuit-Switched Networks

Early infrastructure was circuit-switched and connection-oriented

Phone operators established temporary, physical circuits for calls to travel between sender and receiver

Technology was connection-oriented as physical disconnections would drop the call, requiring a new call and circuit

Circuit-switched design had flaws as only one phone call occupied each circuit

Introduction to Computer Networking

Computer Networking is like friends with phones texting each other

Computers connect through cables, Wi-Fi, and share files, printers, and internet

This way they share information quickly like friends talking on their phones.

Computer networks consist of nodes like servers, networking hardware, personal computers

Hostnames and network addresses identify devices on a network

Network Definition

A network involves two or more computers connected to share resources like files, folders, printers, and disk drives

A network is a collection of computers or hardware devices connected physically or logically for exchanging information and cooperation

Networking Definition

Networking is designing, implementing, upgrading, managing, and working with networks and network technologies

Communications Principles

Communication is varied and occurs in different environments

Communication relies on protocols or rules, including:

Identifying sender and receiver

Agreeing on a method

Speaking a common language

Setting speed and delivery

Confirming receipt

Successful communication sends the intended message

Data networks require the same basic criteria for successful communication

External Factors in Communication

The pathway quality between sender and recipient is an external factor

With external factors, the number of times the message is redirected can affect the quality of communication

The number of messages being transmitted during communication can also impact external factors

The time allotted for successful communication

Internal Factors in Communication

Message size impacts data networks

Message complexity, and message importance also affect data networks

Delivering a smaller message is more efficient than delivering a bulky message

Network Classifications by Media

Transmission media classifies: Wired (UTP, coaxial & fiber optic cables) and wireless network

Network Classifications by Scale

Network scale classes are LAN, WAN and MAN

Personal Area Network (PAN): Connects devices within 10 meters, such as a computer to its peripherals (keyboard, mouse, printer) or a PDA controlling a hearing aid via Bluetooth

Local Area Network (LAN): Privately-owned networks cover small areas like homes, offices, to share printers with size restrictions to set a time limit

Network Classifications for MAN and WAN

Metropolitan Area Network (MAN): Covers larger geographic than a LAN, from city blocks to cities, and may use channels for moderate-high data rates

A MAN might be a single organization for public utilities that allows 50km interconnection of LANs for modem and wire/cable applications

Network Classifications Methods

Networks are classified based on management method: Peer-to-Peer and Client Server

Two main network models are used for data exchange and resource sharing that are Client-Server and Peer-to-Peer Networks

Peer-to-Peer Networks

Peer-to-Peer Networks do not differentiate clients from servers

Each node in the network can request and provide services

Peer-to-peer networks typically involve fewer than 12 machines, each with its unique security measures

Each peer-to-peer network consumes and gives resources and the capability for the network to share resources

Client-Server networks see an overload with greater number of active nodes

Peer-to-peer networks are challenging to secure, as each node acts as both a client and a server

Denial of service attacks can occur, and most OS come with software to implement networks

P2P Network Characteristics

Decentralized: Lacks central servers; all devices are equal

Direct communication: Any device sharing file to another

Small-scale networks: Use for home and small offices

Limited security & management: Managed for their own use

P2P Network Examples

Home networks: Share files without the use of central server

File sharing applications: Shared through P2P file-sharing systems

Small business networks: Sharing printers and drivers among a few employees

P2P Network Advantages

Cost effective to not need servers

Easy to set up simple network function

Does not depend on central servers, the network is functional when one device fails

P2P Network Disadvantages

Security is limited where each divide is responsible for their own security leaving it vulnerable

The network is difficult to manage when it grows increasing connections

Devices slow down if the amount of users requesting data is high

Networks: Client-Server

Model for this network is broadly used

Clients and servers are differentiated and servers along with clients are set in place

The centralized server is used to store data which makes its management centralized

The client requests services from the server

Client-Server Characteristics

Centralized control has dedicated servers to manage the network (files, printers, DBs)

A large number of users can scale efficiently

Access managed on each server for better security

Complex set ups require network admin to manage

Client-Server Examples

Within company networks, employees request files from a server that centrally holds it

Email services connect clients to a mail server such as Gmail

Web apps are accesses by users on websites that are centrally hosted

Banking uses centralized banking servers

Client-Server Advantages

Better security is accomplished through centralized control to protect data and control access management

Efficient management to maintain networking performance

Improved scalability can process client requests with proper structure

Higher performing servers process requests faster

Client-Server Disadvantages

Expense to prepare servers for network base

Requires IT experts to maintain/troubleshoot

Network is affected is server experiences complications

Network Topology

Types of network typology are based on connectivity, bus, star, ring

Structure based on wire or the physical

Logical data is defined on how media is accessed when sending data

Bus Topology

The bus topology is simple and low in cost

Cable trunk as the backbone

Only one computer can send messages at a time

Computer only regenerates and listens to data

Ring Topology

Every computer functions as a repeater, boosting signals

Each computer must send the token to send data

More costly

Entire networks fail based on single computer

Star Topology

Each computer must connect to one point via cable

This topology has the cabling, and therefore a higher cost

When the hub is down the entire network is down

Extended Star Topology

Topology joins unique stars to extend the switch/hub

Network coverage area is also extended

Hierarchical/Tree Topology

Root node is at the central of the network

One or more of the roots are connected to other nodes lower in its hierarchy

Mesh Topology

Designed to implemented for high protection or interruption of service

Each host has unique connections to connect with the others

Internet applies many paths to connect, does not use fully meshed topology

Token Passing Topology

Multistation access uses network to have access to computers on its LAN

The electronic token passed around each host controls access

The computer then sends data when the token is received

When the computer does not send data the token is passed to the next host

Network Components

With the computer network comes hardware and software to allow communication where sharing resources takes place

  • Network Hardware Components

Within the network, physical devices are used

Send data on computers, laptops, & other servers

Smartphones and tablets

IoT, scanners and printers

  • Network, Intermediary Devices

Network, intermediary devices, like routers or switches, manage and direct network traffic

Routers: Connect Networks to the home internet

Switch: Device to connect multiple devices onto a LAN, directing data

Hub: Broadcasts data (inefficient)

Modem: Converts signals for internet access of DSL wires

Extends wifi for wireless networks

Repeater is used to boost the strength/distance

Types of Networks

  • VoIP gateways connect types of networks

Transmission media used to transmit data through different types of wires

LANs via etheret

Cable TV on coated cable

Wifi & bluetooth on the radio

Remote controls on IR

Network Software Components

Controls transmission management

Controls communication between devices

Can run peer-to-peer

NOS Operation

Specialized to manage and connect devices

Security, management of files/users

Types of NOS

Windows & Linux for Peer-to-Peer operations

Unix server for centralized control

Network Protocols

Communications follows network protocol which is between devices on the net/

Types of communications are TCP/IP for internet

UDP is faster but streaming is less reliable, used by TCP

Networking Protocols

Standard wired internet relies on Ethernet

WiFi applies 802.11

IP Addresses

Converts name domains for Internet communication

Software Security

Protects for cybersecurity, i.e. anti-virus

Network Services

Network operations support resource sharing

DNS can translates domain names into IP addresses

DHCP assigns devices and is automized

VPNs offers encrypted connections through IPs

  • Other Software Safeguards

Security measures must also involve

Firewalls: Monitor Incoming & Outgoing traffic

Proxy Servers: Act as Intermediaries

Safeguards: Management

Wireshark tools finds network trouble

Health server monitors on NAglos

Tools and monitoring and admin of networks happen on SolarWind

Intermediary Components

The components connect printers & other cell phones for security/data transmission

Filter and manage, optimize for traffic

  • Networking: Routers

Different networks connecting and directs traffic

Finds best pathway

Routers

Routes data and can function for both LAN & WAN internet

DHCP assigns for IP Adress Protocol

Firewalls protect at every level

Uses for Routers

Can be used to connect offices

Used in large scale securities

Connections to external networks/ISP applications are edge routers

Function of Switches

Connect with the intended recipient

Each switch uses MAC Addresses

How Switches Operate

Efficiency to lessen collision

LAN segmentation done through VLANS

Switches

Can be unmanaged for plug-and-play small networks connectivity

Management allows traffic control

Legacy Device Hub

Basic connections but does not traffic the LAN

Broadcasts info through devices increasing unnecesary traffic

Modern Networks

Creates network congestion

Less secure due to data collection/sending being unintended for receivers

Moderns

Modem is an analog signal

converts devices digital to computer, using cable/phone lines

Types of Network Cables

DSL: Telephone lines

Coaxial: Broadband Internet

Fiber: Fiber Optics/Hi-Speed Internet

Access Points

Wireless access point will extend the network

Can connects devices to network

Has security (WPA encryptions)

Router delivers and manages wireless traffic

Provides a LAN to connect from

Gateways

Acts as a bridge for communication

Transfers data between each network

Routes internally with internet access, allowing interal network transfer

Firewall

Hardware & software security

Monitors pre-defiend network traffic by blocking unauthorized access and data packets

Protects & monitors cyber threat (DDoS attacks)

Types of Networking Firewalls

Equipment through Fortinet

Windows Defender on software

Networking Interface Card

Wired connects to each device

Wifi connections are then allow

NIC Functions

NIC functions include wireless operation between devices to data transmission while supporting different speeds

Assigns code address

Network Addressing

Ensured transmission data through two protocols of mac-ip code

MAC Addresses

Control over the MAC address/physical code

Written in hexadecimal format

Addressing MAC

Unique: no unique device addresses will ever have a similar address code

Set by manufactuer

Delivery of devices within networks and codes

Types of MAC

Unicast is one code one communication

Multicast is a used code for many communication

Broadcast mac transfer data to all devices

Types of IP Addresses

Address assigned to devices for identification in various networks so device can connect to LAN or internets

IP4

Protocol version to assign addresses: example (192.168.1.1), written (192.168.0.1) with few addresses to use

IP6

Protocol version, 2001:0db8:85a3:0000:0000:8a2e:0370:7334 written code, hexadecimal and separated by colons and trillions of data

IPs

Security addressing applies dynamic and static IPs

Assigned privately which needs manual changes or DHCP based on ISP

Data Networks

Network is connected so the data transmits which differentiates the host through subnet

External networks are gateway for IP and are common on routers connecting local internet serversNetwork Security Importance

Essential for public confidence in Internet use, especially for financial transactions

Governments and businesses handling personal data must protect clients' privacy

Security is vital for retaining web users, who might leave without it

Encryption and security devices are used for security

Network Security Limitations

Encryption and firewalls alone may not suffice to protect networks

The need for security and privacy exceeds current architectural capabilities

Efforts are focused on research, development, and tools to address network security weaknesses

Fault-Tolerant Network Architecture

The Internet was initially designed with fault tolerance as a priority

The U.S. Department of Defense (DoD) aimed for a communication system able to withstand infrastructure damage

Circuit-Switched Networks

Early infrastructure was circuit-switched and connection-oriented

Phone operators established temporary, physical circuits for calls to travel between sender and receiver

Technology was connection-oriented as physical disconnections would drop the call, requiring a new call and circuit

Circuit-switched design had flaws as only one phone call occupied each circuit

Introduction to Computer Networking

Computer Networking is like friends with phones texting each other

Computers connect through cables, Wi-Fi, and share files, printers, and internet

This way they share information quickly like friends talking on their phones.

Computer networks consist of nodes like servers, networking hardware, personal computers

Hostnames and network addresses identify devices on a network

Network Definition

A network involves two or more computers connected to share resources like files, folders, printers, and disk drives

A network is a collection of computers or hardware devices connected physically or logically for exchanging information and cooperation

Networking Definition

Networking is designing, implementing, upgrading, managing, and working with networks and network technologies

Communications Principles

Communication is varied and occurs in different environments

Communication relies on protocols or rules, including:

Identifying sender and receiver

Agreeing on a method

Speaking a common language

Setting speed and delivery

Confirming receipt

Successful communication sends the intended message

Data networks require the same basic criteria for successful communication

External Factors in Communication

The pathway quality between sender and recipient is an external factor

With external factors, the number of times the message is redirected can affect the quality of communication

The number of messages being transmitted during communication can also impact external factors

The time allotted for successful communication

Internal Factors in Communication

Message size impacts data networks

Message complexity, and message importance also affect data networks

Delivering a smaller message is more efficient than delivering a bulky message

Network Classifications by Media

Transmission media classifies: Wired (UTP, coaxial & fiber optic cables) and wireless network

Network Classifications by Scale

Network scale classes are LAN, WAN and MAN

Personal Area Network (PAN): Connects devices within 10 meters, such as a computer to its peripherals (keyboard, mouse, printer) or a PDA controlling a hearing aid via Bluetooth

Local Area Network (LAN): Privately-owned networks cover small areas like homes, offices, to share printers with size restrictions to set a time limit

Network Classifications for MAN and WAN

Metropolitan Area Network (MAN): Covers larger geographic than a LAN, from city blocks to cities, and may use channels for moderate-high data rates

A MAN might be a single organization for public utilities that allows 50km interconnection of LANs for modem and wire/cable applications

Network Classifications Methods

Networks are classified based on management method: Peer-to-Peer and Client Server

Two main network models are used for data exchange and resource sharing that are Client-Server and Peer-to-Peer Networks

Peer-to-Peer Networks

Peer-to-Peer Networks do not differentiate clients from servers

Each node in the network can request and provide services

Peer-to-peer networks typically involve fewer than 12 machines, each with its unique security measures

Each peer-to-peer network consumes and gives resources and the capability for the network to share resources

Client-Server networks see an overload with greater number of active nodes

Peer-to-peer networks are challenging to secure, as each node acts as both a client and a server

Denial of service attacks can occur, and most OS come with software to implement networks

P2P Network Characteristics

Decentralized: Lacks central servers; all devices are equal

Direct communication: Any device sharing file to another

Small-scale networks: Use for home and small offices

Limited security & management: Managed for their own use

P2P Network Examples

Home networks: Share files without the use of central server

File sharing applications: Shared through P2P file-sharing systems

Small business networks: Sharing printers and drivers among a few employees

P2P Network Advantages

Cost effective to not need servers

Easy to set up simple network function

Does not depend on central servers, the network is functional when one device fails

P2P Network Disadvantages

Security is limited where each divide is responsible for their own security leaving it vulnerable

The network is difficult to manage when it grows increasing connections

Devices slow down if the amount of users requesting data is high

Networks: Client-Server

Model for this network is broadly used

Clients and servers are differentiated and servers along with clients are set in place

The centralized server is used to store data which makes its management centralized

The client requests services from the server

Client-Server Characteristics

Centralized control has dedicated servers to manage the network (files, printers, DBs)

A large number of users can scale efficiently

Access managed on each server for better security

Complex set ups require network admin to manage

Client-Server Examples

Within company networks, employees request files from a server that centrally holds it

Email services connect clients to a mail server such as Gmail

Web apps are accesses by users on websites that are centrally hosted

Banking uses centralized banking servers

Client-Server Advantages

Better security is accomplished through centralized control to protect data and control access management

Efficient management to maintain networking performance

Improved scalability can process client requests with proper structure

Higher performing servers process requests faster

Client-Server Disadvantages

Expense to prepare servers for network base

Requires IT experts to maintain/troubleshoot

Network is affected is server experiences complications

Network Topology

Types of network typology are based on connectivity, bus, star, ring

Structure based on wire or the physical

Logical data is defined on how media is accessed when sending data

Bus Topology

The bus topology is simple and low in cost

Cable trunk as the backbone

Only one computer can send messages at a time

Computer only regenerates and listens to data

Ring Topology

Every computer functions as a repeater, boosting signals

Each computer must send the token to send data

More costly

Entire networks fail based on single computer

Star Topology

Each computer must connect to one point via cable

This topology has the cabling, and therefore a higher cost

When the hub is down the entire network is down

Extended Star Topology

Topology joins unique stars to extend the switch/hub

Network coverage area is also extended

Hierarchical/Tree Topology

Root node is at the central of the network

One or more of the roots are connected to other nodes lower in its hierarchy

Mesh Topology

Designed to implemented for high protection or interruption of service

Each host has unique connections to connect with the others

Internet applies many paths to connect, does not use fully meshed topology

Token Passing Topology

Multistation access uses network to have access to computers on its LAN

The electronic token passed around each host controls access

The computer then sends data when the token is received

When the computer does not send data the token is passed to the next host

Network Components

With the computer network comes hardware and software to allow communication where sharing resources takes place

  • Network Hardware Components

Within the network, physical devices are used

Send data on computers, laptops, & other servers

Smartphones and tablets

IoT, scanners and printers

  • Network, Intermediary Devices

Network, intermediary devices, like routers or switches, manage and direct network traffic

Routers: Connect Networks to the home internet

Switch: Device to connect multiple devices onto a LAN, directing data

Hub: Broadcasts data (inefficient)

Modem: Converts signals for internet access of DSL wires

Extends wifi for wireless networks

Repeater is used to boost the strength/distance

Types of Networks

  • VoIP gateways connect types of networks

Transmission media used to transmit data through different types of wires

LANs via etheret

Cable TV on coated cable

Wifi & bluetooth on the radio

Remote controls on IR

Network Software Components

Controls transmission management

Controls communication between devices

Can run peer-to-peer

NOS Operation

Specialized to manage and connect devices

Security, management of files/users

Types of NOS

Windows & Linux for Peer-to-Peer operations

Unix server for centralized control

Network Protocols

Communications follows network protocol which is between devices on the net/

Types of communications are TCP/IP for internet

UDP is faster but streaming is less reliable, used by TCP

Networking Protocols

Standard wired internet relies on Ethernet

WiFi applies 802.11

IP Addresses

Converts name domains for Internet communication

Software Security

Protects for cybersecurity, i.e. anti-virus

Network Services

Network operations support resource sharing

DNS can translates domain names into IP addresses

DHCP assigns devices and is automized

VPNs offers encrypted connections through IPs

  • Other Software Safeguards

Security measures must also involve

Firewalls: Monitor Incoming & Outgoing traffic

Proxy Servers: Act as Intermediaries

Safeguards: Management

Wireshark tools finds network trouble

Health server monitors on NAglos

Tools and monitoring and admin of networks happen on SolarWind

Intermediary Components

The components connect printers & other cell phones for security/data transmission

Filter and manage, optimize for traffic

  • Networking: Routers

Different networks connecting and directs traffic

Finds best pathway

Routers

Routes data and can function for both LAN & WAN internet

DHCP assigns for IP Adress Protocol

Firewalls protect at every level

Uses for Routers

Can be used to connect offices

Used in large scale securities

Connections to external networks/ISP applications are edge routers

Function of Switches

Connect with the intended recipient

Each switch uses MAC Addresses

How Switches Operate

Efficiency to lessen collision

LAN segmentation done through VLANS

Switches

Can be unmanaged for plug-and-play small networks connectivity

Management allows traffic control

Legacy Device Hub

Basic connections but does not traffic the LAN

Broadcasts info through devices increasing unnecesary traffic

Modern Networks

Creates network congestion

Less secure due to data collection/sending being unintended for receivers

Moderns

Modem is an analog signal

converts devices digital to computer, using cable/phone lines

Types of Network Cables

DSL: Telephone lines

Coaxial: Broadband Internet

Fiber: Fiber Optics/Hi-Speed Internet

Access Points

Wireless access point will extend the network

Can connects devices to network

Has security (WPA encryptions)

Router delivers and manages wireless traffic

Provides a LAN to connect from

Gateways

Acts as a bridge for communication

Transfers data between each network

Routes internally with internet access, allowing interal network transfer

Firewall

Hardware & software security

Monitors pre-defiend network traffic by blocking unauthorized access and data packets

Protects & monitors cyber threat (DDoS attacks)

Types of Networking Firewalls

Equipment through Fortinet

Windows Defender on software

Networking Interface Card

Wired connects to each device

Wifi connections are then allow

NIC Functions

NIC functions include wireless operation between devices to data transmission while supporting different speeds

Assigns code address

Network Addressing

Ensured transmission data through two protocols of mac-ip code

MAC Addresses

Control over the MAC address/physical code

Written in hexadecimal format

Addressing MAC

Unique: no unique device addresses will ever have a similar address code

Set by manufactuer

Delivery of devices within networks and codes

Types of MAC

Unicast is one code one communication

Multicast is a used code for many communication

Broadcast mac transfer data to all devices

Types of IP Addresses

Address assigned to devices for identification in various networks so device can connect to LAN or internets

IP4

Protocol version to assign addresses: example (192.168.1.1), written (192.168.0.1) with few addresses to use

IP6

Protocol version, 2001:0db8:85a3:0000:0000:8a2e:0370:7334 written code, hexadecimal and separated by colons and trillions of data

IPs

Security addressing applies dynamic and static IPs

Assigned privately which needs manual changes or DHCP based on ISP

Data Networks

Network is connected so the data transmits which differentiates the host through subnet

External networks are gateway for IP and are common on routers connecting local internet servers

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser