Network Types and Components

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which network type is best suited for a large geographical area, connecting multiple LANs?

  • WAN (Wide Area Network) (correct)
  • Intranet
  • Extranet
  • LAN (Local Area Network)

Fiber optic cables are more susceptible to electromagnetic interference compared to copper cables.

False (B)

What is the purpose of twisting the wire pairs in twisted pair copper cables?

reduce crosstalk

An __________ is a private network within an organization accessible only to authorized users.

<p>intranet</p> Signup and view all the answers

Match the following network devices with their primary function:

<p>Router = Forwards data packets between networks based on IP addresses Switch = Forwards data frames within a network based on MAC addresses Firewall = Protects a network from unauthorized access Wireless Router = Provides wireless connectivity and network address translation.</p> Signup and view all the answers

What is the primary drawback of using satellite internet connections?

<p>high latency (C)</p> Signup and view all the answers

A unicast delivery option sends data from one source to all devices on the network.

<p>False (B)</p> Signup and view all the answers

What is the role of a PDU (Protocol Data Unit) in networking?

<p>encapsulation of data</p> Signup and view all the answers

In the TCP/IP model, _________ is the protocol for web communication and is often encrypted with TLS.

<p>http/https</p> Signup and view all the answers

Match the following protocols with their corresponding TCP/IP layers:

<p>HTTP = Application Layer TCP = Transport Layer IP = Internet Layer Ethernet = Network Access Layer</p> Signup and view all the answers

What address is used to identify a Network Interface Card (NIC) on the same network?

<p>MAC address (physical) (C)</p> Signup and view all the answers

Multiplexing allows multiple communication sessions to share the same network connection.

<p>True (A)</p> Signup and view all the answers

What is the function of the Address Resolution Protocol (ARP)?

<p>find mac address from ip address</p> Signup and view all the answers

The process of adding headers and trailers to data as it moves down the TCP/IP stack is called __________.

<p>encapsulation</p> Signup and view all the answers

Match the following concepts with their description:

<p>Latency = The time it takes for data to travel from source to destination Throughput = The actual amount of data transferred over a medium Goodput = The useful data rate, excluding overhead Bandwidth = The capacity of a medium to transport data</p> Signup and view all the answers

Which layer in the OSI model is responsible for providing access to the communication medium?

<p>Datalink Layer (C)</p> Signup and view all the answers

The physical topology of a network describes how data flows between devices.

<p>False (B)</p> Signup and view all the answers

What is the size of a MAC address, in bits?

<p>48</p> Signup and view all the answers

In Ethernet, a frame is discarded if its size is less than the minimum of __________ bytes.

<p>64</p> Signup and view all the answers

Match the MAC address type with its description:

<p>Unicast = One-to-one communication Broadcast = One-to-all communication Multicast = One-to-many communication</p> Signup and view all the answers

What is the function of the preamble in an Ethernet frame?

<p>Synchronize sender and receiver clocks (D)</p> Signup and view all the answers

DHCP is used to automatically assign MAC addresses to devices.

<p>False (B)</p> Signup and view all the answers

What is the size, in bytes, of the IPv6 header?

<p>40</p> Signup and view all the answers

In IPv4, the __________ field in the header is used to limit the number of hops a packet can take.

<p>ttl</p> Signup and view all the answers

Match the IPv6 address type with the starting characters:

<p>Link-Local Address = FE80::/10 Global Unicast Address = 2000::/3</p> Signup and view all the answers

Which ICMP message type is used to test the reachability of a host?

<p>Echo Request/Reply (C)</p> Signup and view all the answers

ICMP messages are always required and cannot be blocked for security reasons.

<p>False (B)</p> Signup and view all the answers

What is the purpose of the TCP three-way handshake?

<p>establish a reliable connection</p> Signup and view all the answers

TCP uses __________ numbers to reassemble data in the correct order.

<p>sequence</p> Signup and view all the answers

Match the transport protocol with its characteristics:

<p>TCP = Connection-oriented, reliable UDP = Connectionless, unreliable</p> Signup and view all the answers

Which well-known port does HTTP use?

<p>80 (B)</p> Signup and view all the answers

In a peer-to-peer (P2P) network, a central server is always required.

<p>False (B)</p> Signup and view all the answers

Name one common attack that ARP Spoofing enables

<p>man-in-the-middle</p> Signup and view all the answers

________ is where an attacker overburdens a DHCP server with fake petitions, so that it can't give out new addresses

<p>dhcp starvation</p> Signup and view all the answers

Match the following ports with its usage:

<p>PortFast = Quickly initialize port BPDU Guard = Deactive port on BPDU</p> Signup and view all the answers

What is a native VLAN?

<p>Untagged (D)</p> Signup and view all the answers

Traffic can not flow between VLANs with switches in layer 2

<p>True (A)</p> Signup and view all the answers

Which Layer 3 protocol to dynamically discover network

<p>ospf</p> Signup and view all the answers

________ automatically konfigures cable type (straight or crossover) into needed state. Enabled when Duplex and Speed are also set to automatic

<p>auto-mdix</p> Signup and view all the answers

Flashcards

Peer-to-Peer (P2P)

Computers act as both clients and servers, sharing resources directly.

LAN (Local Area Network)

A network that covers a small geographical area.

WAN (Wide Area Network)

A network that spans a large geographic area, connecting multiple LANs.

Intranet

A private network within an organization, accessible only to authorized users.

Signup and view all the flashcards

Extranet

Allows external users access to an organization's data securely.

Signup and view all the flashcards

End Devices

PCs, servers, printers.

Signup and view all the flashcards

Intermediary Devices

Routers, switches, firewalls.

Signup and view all the flashcards

Network Media

Twisted pair, coaxial, fiber optic cables, Wi-Fi, Bluetooth.

Signup and view all the flashcards

Electromagnetic Interference (EMI)

Distortion of signals due to radio or electrical sources; solve with shielding.

Signup and view all the flashcards

Crosstalk

Interference between nearby cables; solve by twisting cable pairs.

Signup and view all the flashcards

Fiber Optic

High-speed data transmission over long distances, immune to EMI.

Signup and view all the flashcards

Single-Mode Fiber (SMF)

Long-distance, low dispersion fiber optic cabling.

Signup and view all the flashcards

Multimode Fiber (MMF)

Short-distance, higher dispersion fiber optic cabling.

Signup and view all the flashcards

Physical Topology

Physical arrangement of devices and cabling.

Signup and view all the flashcards

Logical Topology

How devices connect and address each other in the network.

Signup and view all the flashcards

IP (Internet Protocol)

Rules for addressing and routing on the internet.

Signup and view all the flashcards

TCP/UDP

Protocols that ensure reliable data delivery.

Signup and view all the flashcards

Fault Tolerance

Network continues functioning after a failure through redundant systems.

Signup and view all the flashcards

Scalability

Network's ability to grow without major costs or impact.

Signup and view all the flashcards

QoS (Quality of Service)

Prioritizing network traffic based on need.

Signup and view all the flashcards

Network Security

Protecting data and devices from threats using firewalls, VPNs, etc.

Signup and view all the flashcards

Public Cloud

Shared infrastructure, cost-effective, and scalable.

Signup and view all the flashcards

Private Cloud

Dedicated to a single organization, offering increased control/security.

Signup and view all the flashcards

Hybrid Cloud

Combines public and private clouds for increased flexibility.

Signup and view all the flashcards

Protocols

Rules for communication between devices.

Signup and view all the flashcards

Unicast

One-to-one communication.

Signup and view all the flashcards

Multicast

One-to-many communication.

Signup and view all the flashcards

Broadcast

One-to-all communication.

Signup and view all the flashcards

PDU (Protocol Data Unit)

Data packet at each layer (segment, packet, frame).

Signup and view all the flashcards

Encapsulation/De-encapsulation

Process of adding/removing headers and trailers as data moves through layers.

Signup and view all the flashcards

IP Address (logical)

Rules for addressing and routing in a network.

Signup and view all the flashcards

MAC address (physical)

Identifies a NIC on the same network (switching).

Signup and view all the flashcards

Segmentation

Splitting large messages into smaller pieces for efficiency.

Signup and view all the flashcards

Multiplexing

Multiple communications sharing a network connection.

Signup and view all the flashcards

Router

Routers forward packets between networks using IP addresses.

Signup and view all the flashcards

Switch

Switches forward frames within a network using MAC addresses.

Signup and view all the flashcards

Ethernet

Ethernet sends frames using MAC addresses.

Signup and view all the flashcards

HTTP/HTTPS protocol

Web communication (often encrypted).

Signup and view all the flashcards

DNS protocol

Translates domain names to IP addresses.

Signup and view all the flashcards

DHCP protocol

Automatically allocates IP addresses.

Signup and view all the flashcards

Study Notes

Chapter 1: Network Types and Components

  • Peer-to-Peer (P2P) networks allow computers to act as both clients and servers, directly sharing data resources.
  • Local Area Networks (LAN) cover small geographical areas.
  • Wide Area Networks (WAN) cover large geographical areas, linking multiple LANs.
  • An Intranet is a private network exclusively for authorized users within an organization.
  • An Extranet allows external users secure access to an organization's data.
  • End devices include PCs, printers, and servers.
  • Intermediary devices encompass routers, switches, firewalls, and wireless routers.
  • Network media consist of copper cables (twisted pair, coaxial), fiber optic cables, and wireless transmission (Wi-Fi, Bluetooth).
  • Copper cables are used for short to medium distances at a lower cost and include Ethernet cables like Cat5e and Cat6.
  • Fiber optics are suitable for high-speed transmission over long distances and are resistant to electromagnetic interference, often used by internet service providers, offering long range, high bandwidth, immunity to EMI/RFI, and low signal dampening.

Electromagnetic Interference (EMI), Radio Frequency Interference (RFI) and Crosstalk

  • EMI/RFI can distort signals due to radio and electrical sources, which can be resolved through shielding and grounding.
  • Crosstalk, interference between nearby cables, can be minimized by twisting wire pairs to cancel electromagnetic fields.

Optic Fiber Cabling

  • Single-mode fiber (SMF) is used for long-distance data transfer with low dispersion.
  • Multimode fiber (MMF) is used for shorter distances with higher dispersion.
  • MMF has a higher dispersion rate than SMF, restricting range to 500 meters.

Wireless Transmission

  • Utilized for mobility (Wi-Fi, 4G/5G, Bluetooth) and applications like smartphones or IoT devices.

Network Topology

  • Physical topology shows the physical placement of devices and cabling.
  • Logical topology illustrates how devices are connected and addressed in the network.

Protocols, Security and Availability

  • IP (Internet Protocol) governs addressing and routing on the internet.
  • TCP/UDP are transport protocols ensuring reliable data transfer.
  • Fault tolerance means the network continues to operate despite failures with redundant systems and alternative routes preventing downtime.
  • Scalability enables the network to grow without substantial costs or impacting existing systems
  • Quality of Service (QoS) prioritizes network traffic based on need.
  • Security measures protect data and devices from external and internal threats.
  • Security measures include firewalls, VPNs, intrusion prevention systems (IPS), antivirus software, and access control lists (ACL).

Cloud Solutions

  • Public cloud offers shared infrastructure and is cost-effective and scalable, available to all.
  • Private cloud is dedicated to a single organization for enhanced control and security.
  • Hybrid Cloud combines public and private clouds for increased flexibility and optimization.
  • Community cloud is shared among organizations with similar requirements offering cost savings and security.

Internet connection types

  • Cable offers high bandwidth and availability using the same cable as cable TV.
  • DSL, using telephone lines, provides high bandwidth with faster download speeds than upload speeds (ADSL).
  • Mobile (Cellular) offers internet access through mobile networks, limited by phone and tower capacity.
  • Satellite provides internet access to remote areas requiring a clear view of the satellite.
  • Dial-Up is inexpensive but slow internet access using telephone lines, suitable for mobile access during travel.
Type Description Advantages Disadvantages
Cable High bandwidth, always-on internet via cable TV line High speed and reliability More expensive, limited availability in some areas
DSL High bandwidth over phone lines, ADSL Faster than dial-up, cost-effective Speed decreases with distance from the central office
Mobile Internet via mobile network Flexible and widely available Limited speed and coverage, higher data costs
Satellite Internet for remote areas with satellite visibility Available in remote areas High latency, weather-dependent connection
Dial-Up Cheap, slow internet via phone lines Cost-effective, widely available Very slow, unsuitable for modern internet use

Chapter 3: Protocols and Delivery Options

  • Protocols - Agreed upon rules for communication between devices like HTTP, TCP/IP, and Ethernet.
  • Unicast is a one-to-one delivery from a web browser to a web server.
  • Multicast is a one-to-many delivery method used in video streaming.
  • Broadcast is a one-to-all delivery, for example, ARP requests.
  • PDU (Protocol Data Unit) defines a data packet at each layer of the protocol stack (segment, packet, frame).
  • Encapsulation/De-encapsulation: Adding or removing headers and trailers as data moves through the protocol stack.
  • Application Layer protocols include HTTP, DNS, DHCP, and SMTP.
  • Transport Layer protocols include TCP (segment) and UDP (datagram).
  • Internet Layer protocols include IPv4/IPv6, ICMP, and OSPF.
  • Network Access Layer protocols include Ethernet (frame) Wi-Fi and ARP.

Encapsulation

  • Application Layer: Data with no additional information (e.g., HTTP request).
  • Transport Layer: Segment/datagram with TCP/UDP header (source/destination ports, sequence number, ACK).
  • Network Layer: Packet with IP header (source/destination IP, TTL).
  • Datalink Layer: Frame with MAC header + trailer (source/destination MAC, CRC).
  • Physical Layer: Bits converted to electrical, optical, or radio signals.

De-encapsulation

  • Physical Layer: Receives bits and reconstructs the frame, for example, Ethernet cable converts electrical signals to binary data.
  • Datalink Layer: Removes MAC header, checks CRC for errors, and switch uses MAC addresses for forwarding.
  • Network Layer: Checks IP address, determines forwarding (route or local), & routers use IP tables for decisions.
  • Transport Layer: TCP reconstructs data stream using sequence numbers and UDP delivers datagram directly to application.
  • Application Layer: Processes raw data, for example, HTTP response to browser.

Addressing in Networks

Network Layer Address Type Purpose
Network IP address Identifies a device across networks (routing)
Datalink MAC address Identifies a NIC on the same network (switching)
  • Segmenting increases efficiency by dividing large messages into smaller parts.
  • Multiplexing enables multiple communications to share the same network connection.
  • Standards (TCP/IP) ensure different devices can communicate.
  • Routers use IP addresses to forward packets between networks.
  • Switchers use MAC addresses to send frames within a network.
Protocol Layer Function
HTTP/HTTPS Application Web Communication (encrypted with TLS)
DNS Application Translates domain names to IP addresses
DHCP Application Automatically assigns IP addresses
TCP Transport Reliable, connection-oriented Communication
UDP Transport Unreliable, connectionless Communication
IP Internet Routing and Logical addressing
Ethernet Network Access Transfers the frames over LAN via MAC addresses
ARP Network Access Dicovers MAC address using IP address

SSH vs Telnet

  • SSH is encrypted (port 22) and provides secure remote access.
  • Telnet is unencrypted (port 23) and insecure.

Switching and MAC Addresses

  • MAC table: The switch learns which port a MAC address belongs to.
  • Flooding is when the switch sends the frame out all ports except the incoming port if an unknown MAC address is used. The frame is sent through the gateway (router's MAC).
  • Aging time: MAC address entries are deleted due to inactivity often set for 300 seconds.

The role of the physical layer

  • Handlesthe translation of raw data into electrical signals, light pulses, or radio waves, allowing data to move physically across a network.

Principal Tasks performed by the Physical Layer

  • Transmitting binary bits (as electrical signals through copper, light through fiber, or radio waves through wireless).
  • Defining transmission media (cable or wireless)
  • Encoding data
  • Signaling

Physical Network Cards

  • Network Interface Cards (NICs) connect devices to the network.
  • Ethernet NICs are utilized to make wired connections.
  • Wireless LAN (WLAN) NICs are utilized to make wirless connections

Compnents of physical connection

  • Includes signal transmission, representing data using electrical signals, light pulses, or radio waves.
  • Included also is hardware, which includes network interface cards, interfaces, contacts, and cables
Media Type Signal Form Advantages Disadvantages Typical Use
Copper Cables Electrical pulses Cheap, Easy to Install Limited Bandwidth, EMI/RFI Vulnerable LAN, telephone lines
Fiber Optics Light Pulses Hight Speed, Low Attenuation, EMI Immune, Long Distance Expensive, Advanced Instillation Backbone Networks, WAN
Wireless Radio Waves Mobility, no Cables limited Range, Susceptible to Interference WLAN, IoT Devices

Copper Cabling Issues

  • EMI/RFI refers to electromagnetic interference which manifests as elextromagentic noise
  • Crosstalk occurs when signal leak from nearby cables
  • This can be mitigated by implementing proper shielding, using sheilded twisted pair cables in addition to the correct cabling techniques
Cable Type Shielding Category Max Speed Bandwidth
UTP Unshielded Cat 5e 1 Gbps 100 MHz
STP Individual Cat 6a 10 Gbps 500 MHz
Coaxial Outer metal shield RG-6 10 Gbps* 1 GHz

Unshielded Twisted Pair Specification

  • Consists of four pairs of color-coded copper wires twisted together
  • Often utilized to connect to a local area network due to its compact size and relative ease of istallation
  • RJ-45 is utilized to create standards
  • signal loss occurs with improper implimentation

Cable Specifications

  • Utilize Ethernet Straight Through to connect a client to either a router or switch
  • Utilize Ethernet Crossover to connect similar hardware for example a router to a router, or a switch to a switch
  • Rollover cables are proprietory to Cisco for console ports

Encoding and Signaling

  • Encoding Transforms data bits into distinct signals recognizable by both ends.
  • Transmission and voltage indicates 0: High to low voltage shift 1: Low to high voltage shift 1: is a long pulse 0 is a short pulse Mid way through every bit is transition

Network Performance

  • Bandwith: Capacity of data transmitted through a communications medium. Bps(bits per second) is the measurement of this medium
  • Elements Influencing this quality are the media and signaling attributes
  • Latency: Delay experienced due to the movement of data from one source to another through a network.
  • Throughput: Quantitative measurement of data actually transmitted over a link, can be restricted by traffic conditions or network
  • Goodput - Effective data transmitted over a line, throughput is the measure once overhead is removed goodput>throughout>bandwith

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Networks: Overview and Types
29 questions
Computer Networks Overview
44 questions

Computer Networks Overview

ProperAwareness8919 avatar
ProperAwareness8919
Use Quizgecko on...
Browser
Browser