Podcast
Questions and Answers
Which network type is best suited for a large geographical area, connecting multiple LANs?
Which network type is best suited for a large geographical area, connecting multiple LANs?
- WAN (Wide Area Network) (correct)
- Intranet
- Extranet
- LAN (Local Area Network)
Fiber optic cables are more susceptible to electromagnetic interference compared to copper cables.
Fiber optic cables are more susceptible to electromagnetic interference compared to copper cables.
False (B)
What is the purpose of twisting the wire pairs in twisted pair copper cables?
What is the purpose of twisting the wire pairs in twisted pair copper cables?
reduce crosstalk
An __________ is a private network within an organization accessible only to authorized users.
An __________ is a private network within an organization accessible only to authorized users.
Match the following network devices with their primary function:
Match the following network devices with their primary function:
What is the primary drawback of using satellite internet connections?
What is the primary drawback of using satellite internet connections?
A unicast delivery option sends data from one source to all devices on the network.
A unicast delivery option sends data from one source to all devices on the network.
What is the role of a PDU (Protocol Data Unit) in networking?
What is the role of a PDU (Protocol Data Unit) in networking?
In the TCP/IP model, _________ is the protocol for web communication and is often encrypted with TLS.
In the TCP/IP model, _________ is the protocol for web communication and is often encrypted with TLS.
Match the following protocols with their corresponding TCP/IP layers:
Match the following protocols with their corresponding TCP/IP layers:
What address is used to identify a Network Interface Card (NIC) on the same network?
What address is used to identify a Network Interface Card (NIC) on the same network?
Multiplexing allows multiple communication sessions to share the same network connection.
Multiplexing allows multiple communication sessions to share the same network connection.
What is the function of the Address Resolution Protocol (ARP)?
What is the function of the Address Resolution Protocol (ARP)?
The process of adding headers and trailers to data as it moves down the TCP/IP stack is called __________.
The process of adding headers and trailers to data as it moves down the TCP/IP stack is called __________.
Match the following concepts with their description:
Match the following concepts with their description:
Which layer in the OSI model is responsible for providing access to the communication medium?
Which layer in the OSI model is responsible for providing access to the communication medium?
The physical topology of a network describes how data flows between devices.
The physical topology of a network describes how data flows between devices.
What is the size of a MAC address, in bits?
What is the size of a MAC address, in bits?
In Ethernet, a frame is discarded if its size is less than the minimum of __________ bytes.
In Ethernet, a frame is discarded if its size is less than the minimum of __________ bytes.
Match the MAC address type with its description:
Match the MAC address type with its description:
What is the function of the preamble in an Ethernet frame?
What is the function of the preamble in an Ethernet frame?
DHCP is used to automatically assign MAC addresses to devices.
DHCP is used to automatically assign MAC addresses to devices.
What is the size, in bytes, of the IPv6 header?
What is the size, in bytes, of the IPv6 header?
In IPv4, the __________ field in the header is used to limit the number of hops a packet can take.
In IPv4, the __________ field in the header is used to limit the number of hops a packet can take.
Match the IPv6 address type with the starting characters:
Match the IPv6 address type with the starting characters:
Which ICMP message type is used to test the reachability of a host?
Which ICMP message type is used to test the reachability of a host?
ICMP messages are always required and cannot be blocked for security reasons.
ICMP messages are always required and cannot be blocked for security reasons.
What is the purpose of the TCP three-way handshake?
What is the purpose of the TCP three-way handshake?
TCP uses __________ numbers to reassemble data in the correct order.
TCP uses __________ numbers to reassemble data in the correct order.
Match the transport protocol with its characteristics:
Match the transport protocol with its characteristics:
Which well-known port does HTTP use?
Which well-known port does HTTP use?
In a peer-to-peer (P2P) network, a central server is always required.
In a peer-to-peer (P2P) network, a central server is always required.
Name one common attack that ARP Spoofing enables
Name one common attack that ARP Spoofing enables
________ is where an attacker overburdens a DHCP server with fake petitions, so that it can't give out new addresses
________ is where an attacker overburdens a DHCP server with fake petitions, so that it can't give out new addresses
Match the following ports with its usage:
Match the following ports with its usage:
What is a native VLAN?
What is a native VLAN?
Traffic can not flow between VLANs with switches in layer 2
Traffic can not flow between VLANs with switches in layer 2
Which Layer 3 protocol to dynamically discover network
Which Layer 3 protocol to dynamically discover network
________ automatically konfigures cable type (straight or crossover) into needed state. Enabled when Duplex and Speed are also set to automatic
________ automatically konfigures cable type (straight or crossover) into needed state. Enabled when Duplex and Speed are also set to automatic
Flashcards
Peer-to-Peer (P2P)
Peer-to-Peer (P2P)
Computers act as both clients and servers, sharing resources directly.
LAN (Local Area Network)
LAN (Local Area Network)
A network that covers a small geographical area.
WAN (Wide Area Network)
WAN (Wide Area Network)
A network that spans a large geographic area, connecting multiple LANs.
Intranet
Intranet
Signup and view all the flashcards
Extranet
Extranet
Signup and view all the flashcards
End Devices
End Devices
Signup and view all the flashcards
Intermediary Devices
Intermediary Devices
Signup and view all the flashcards
Network Media
Network Media
Signup and view all the flashcards
Electromagnetic Interference (EMI)
Electromagnetic Interference (EMI)
Signup and view all the flashcards
Crosstalk
Crosstalk
Signup and view all the flashcards
Fiber Optic
Fiber Optic
Signup and view all the flashcards
Single-Mode Fiber (SMF)
Single-Mode Fiber (SMF)
Signup and view all the flashcards
Multimode Fiber (MMF)
Multimode Fiber (MMF)
Signup and view all the flashcards
Physical Topology
Physical Topology
Signup and view all the flashcards
Logical Topology
Logical Topology
Signup and view all the flashcards
IP (Internet Protocol)
IP (Internet Protocol)
Signup and view all the flashcards
TCP/UDP
TCP/UDP
Signup and view all the flashcards
Fault Tolerance
Fault Tolerance
Signup and view all the flashcards
Scalability
Scalability
Signup and view all the flashcards
QoS (Quality of Service)
QoS (Quality of Service)
Signup and view all the flashcards
Network Security
Network Security
Signup and view all the flashcards
Public Cloud
Public Cloud
Signup and view all the flashcards
Private Cloud
Private Cloud
Signup and view all the flashcards
Hybrid Cloud
Hybrid Cloud
Signup and view all the flashcards
Protocols
Protocols
Signup and view all the flashcards
Unicast
Unicast
Signup and view all the flashcards
Multicast
Multicast
Signup and view all the flashcards
Broadcast
Broadcast
Signup and view all the flashcards
PDU (Protocol Data Unit)
PDU (Protocol Data Unit)
Signup and view all the flashcards
Encapsulation/De-encapsulation
Encapsulation/De-encapsulation
Signup and view all the flashcards
IP Address (logical)
IP Address (logical)
Signup and view all the flashcards
MAC address (physical)
MAC address (physical)
Signup and view all the flashcards
Segmentation
Segmentation
Signup and view all the flashcards
Multiplexing
Multiplexing
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Ethernet
Ethernet
Signup and view all the flashcards
HTTP/HTTPS protocol
HTTP/HTTPS protocol
Signup and view all the flashcards
DNS protocol
DNS protocol
Signup and view all the flashcards
DHCP protocol
DHCP protocol
Signup and view all the flashcards
Study Notes
Chapter 1: Network Types and Components
- Peer-to-Peer (P2P) networks allow computers to act as both clients and servers, directly sharing data resources.
- Local Area Networks (LAN) cover small geographical areas.
- Wide Area Networks (WAN) cover large geographical areas, linking multiple LANs.
- An Intranet is a private network exclusively for authorized users within an organization.
- An Extranet allows external users secure access to an organization's data.
- End devices include PCs, printers, and servers.
- Intermediary devices encompass routers, switches, firewalls, and wireless routers.
- Network media consist of copper cables (twisted pair, coaxial), fiber optic cables, and wireless transmission (Wi-Fi, Bluetooth).
- Copper cables are used for short to medium distances at a lower cost and include Ethernet cables like Cat5e and Cat6.
- Fiber optics are suitable for high-speed transmission over long distances and are resistant to electromagnetic interference, often used by internet service providers, offering long range, high bandwidth, immunity to EMI/RFI, and low signal dampening.
Electromagnetic Interference (EMI), Radio Frequency Interference (RFI) and Crosstalk
- EMI/RFI can distort signals due to radio and electrical sources, which can be resolved through shielding and grounding.
- Crosstalk, interference between nearby cables, can be minimized by twisting wire pairs to cancel electromagnetic fields.
Optic Fiber Cabling
- Single-mode fiber (SMF) is used for long-distance data transfer with low dispersion.
- Multimode fiber (MMF) is used for shorter distances with higher dispersion.
- MMF has a higher dispersion rate than SMF, restricting range to 500 meters.
Wireless Transmission
- Utilized for mobility (Wi-Fi, 4G/5G, Bluetooth) and applications like smartphones or IoT devices.
Network Topology
- Physical topology shows the physical placement of devices and cabling.
- Logical topology illustrates how devices are connected and addressed in the network.
Protocols, Security and Availability
- IP (Internet Protocol) governs addressing and routing on the internet.
- TCP/UDP are transport protocols ensuring reliable data transfer.
- Fault tolerance means the network continues to operate despite failures with redundant systems and alternative routes preventing downtime.
- Scalability enables the network to grow without substantial costs or impacting existing systems
- Quality of Service (QoS) prioritizes network traffic based on need.
- Security measures protect data and devices from external and internal threats.
- Security measures include firewalls, VPNs, intrusion prevention systems (IPS), antivirus software, and access control lists (ACL).
Cloud Solutions
- Public cloud offers shared infrastructure and is cost-effective and scalable, available to all.
- Private cloud is dedicated to a single organization for enhanced control and security.
- Hybrid Cloud combines public and private clouds for increased flexibility and optimization.
- Community cloud is shared among organizations with similar requirements offering cost savings and security.
Internet connection types
- Cable offers high bandwidth and availability using the same cable as cable TV.
- DSL, using telephone lines, provides high bandwidth with faster download speeds than upload speeds (ADSL).
- Mobile (Cellular) offers internet access through mobile networks, limited by phone and tower capacity.
- Satellite provides internet access to remote areas requiring a clear view of the satellite.
- Dial-Up is inexpensive but slow internet access using telephone lines, suitable for mobile access during travel.
Type | Description | Advantages | Disadvantages |
---|---|---|---|
Cable | High bandwidth, always-on internet via cable TV line | High speed and reliability | More expensive, limited availability in some areas |
DSL | High bandwidth over phone lines, ADSL | Faster than dial-up, cost-effective | Speed decreases with distance from the central office |
Mobile | Internet via mobile network | Flexible and widely available | Limited speed and coverage, higher data costs |
Satellite | Internet for remote areas with satellite visibility | Available in remote areas | High latency, weather-dependent connection |
Dial-Up | Cheap, slow internet via phone lines | Cost-effective, widely available | Very slow, unsuitable for modern internet use |
Chapter 3: Protocols and Delivery Options
- Protocols - Agreed upon rules for communication between devices like HTTP, TCP/IP, and Ethernet.
- Unicast is a one-to-one delivery from a web browser to a web server.
- Multicast is a one-to-many delivery method used in video streaming.
- Broadcast is a one-to-all delivery, for example, ARP requests.
- PDU (Protocol Data Unit) defines a data packet at each layer of the protocol stack (segment, packet, frame).
- Encapsulation/De-encapsulation: Adding or removing headers and trailers as data moves through the protocol stack.
- Application Layer protocols include HTTP, DNS, DHCP, and SMTP.
- Transport Layer protocols include TCP (segment) and UDP (datagram).
- Internet Layer protocols include IPv4/IPv6, ICMP, and OSPF.
- Network Access Layer protocols include Ethernet (frame) Wi-Fi and ARP.
Encapsulation
- Application Layer: Data with no additional information (e.g., HTTP request).
- Transport Layer: Segment/datagram with TCP/UDP header (source/destination ports, sequence number, ACK).
- Network Layer: Packet with IP header (source/destination IP, TTL).
- Datalink Layer: Frame with MAC header + trailer (source/destination MAC, CRC).
- Physical Layer: Bits converted to electrical, optical, or radio signals.
De-encapsulation
- Physical Layer: Receives bits and reconstructs the frame, for example, Ethernet cable converts electrical signals to binary data.
- Datalink Layer: Removes MAC header, checks CRC for errors, and switch uses MAC addresses for forwarding.
- Network Layer: Checks IP address, determines forwarding (route or local), & routers use IP tables for decisions.
- Transport Layer: TCP reconstructs data stream using sequence numbers and UDP delivers datagram directly to application.
- Application Layer: Processes raw data, for example, HTTP response to browser.
Addressing in Networks
Network Layer | Address Type | Purpose |
---|---|---|
Network | IP address | Identifies a device across networks (routing) |
Datalink | MAC address | Identifies a NIC on the same network (switching) |
- Segmenting increases efficiency by dividing large messages into smaller parts.
- Multiplexing enables multiple communications to share the same network connection.
- Standards (TCP/IP) ensure different devices can communicate.
- Routers use IP addresses to forward packets between networks.
- Switchers use MAC addresses to send frames within a network.
Protocol | Layer | Function |
---|---|---|
HTTP/HTTPS | Application | Web Communication (encrypted with TLS) |
DNS | Application | Translates domain names to IP addresses |
DHCP | Application | Automatically assigns IP addresses |
TCP | Transport | Reliable, connection-oriented Communication |
UDP | Transport | Unreliable, connectionless Communication |
IP | Internet | Routing and Logical addressing |
Ethernet | Network Access | Transfers the frames over LAN via MAC addresses |
ARP | Network Access | Dicovers MAC address using IP address |
SSH vs Telnet
- SSH is encrypted (port 22) and provides secure remote access.
- Telnet is unencrypted (port 23) and insecure.
Switching and MAC Addresses
- MAC table: The switch learns which port a MAC address belongs to.
- Flooding is when the switch sends the frame out all ports except the incoming port if an unknown MAC address is used. The frame is sent through the gateway (router's MAC).
- Aging time: MAC address entries are deleted due to inactivity often set for 300 seconds.
The role of the physical layer
- Handlesthe translation of raw data into electrical signals, light pulses, or radio waves, allowing data to move physically across a network.
Principal Tasks performed by the Physical Layer
- Transmitting binary bits (as electrical signals through copper, light through fiber, or radio waves through wireless).
- Defining transmission media (cable or wireless)
- Encoding data
- Signaling
Physical Network Cards
- Network Interface Cards (NICs) connect devices to the network.
- Ethernet NICs are utilized to make wired connections.
- Wireless LAN (WLAN) NICs are utilized to make wirless connections
Compnents of physical connection
- Includes signal transmission, representing data using electrical signals, light pulses, or radio waves.
- Included also is hardware, which includes network interface cards, interfaces, contacts, and cables
Media Type | Signal Form | Advantages | Disadvantages | Typical Use |
---|---|---|---|---|
Copper Cables | Electrical pulses | Cheap, Easy to Install | Limited Bandwidth, EMI/RFI Vulnerable | LAN, telephone lines |
Fiber Optics | Light Pulses | Hight Speed, Low Attenuation, EMI Immune, Long Distance | Expensive, Advanced Instillation | Backbone Networks, WAN |
Wireless | Radio Waves | Mobility, no Cables | limited Range, Susceptible to Interference | WLAN, IoT Devices |
Copper Cabling Issues
- EMI/RFI refers to electromagnetic interference which manifests as elextromagentic noise
- Crosstalk occurs when signal leak from nearby cables
- This can be mitigated by implementing proper shielding, using sheilded twisted pair cables in addition to the correct cabling techniques
Cable Type | Shielding | Category | Max Speed | Bandwidth |
---|---|---|---|---|
UTP | Unshielded | Cat 5e | 1 Gbps | 100 MHz |
STP | Individual | Cat 6a | 10 Gbps | 500 MHz |
Coaxial | Outer metal shield | RG-6 | 10 Gbps* | 1 GHz |
Unshielded Twisted Pair Specification
- Consists of four pairs of color-coded copper wires twisted together
- Often utilized to connect to a local area network due to its compact size and relative ease of istallation
- RJ-45 is utilized to create standards
- signal loss occurs with improper implimentation
Cable Specifications
- Utilize Ethernet Straight Through to connect a client to either a router or switch
- Utilize Ethernet Crossover to connect similar hardware for example a router to a router, or a switch to a switch
- Rollover cables are proprietory to Cisco for console ports
Encoding and Signaling
- Encoding Transforms data bits into distinct signals recognizable by both ends.
- Transmission and voltage indicates 0: High to low voltage shift 1: Low to high voltage shift 1: is a long pulse 0 is a short pulse Mid way through every bit is transition
Network Performance
- Bandwith: Capacity of data transmitted through a communications medium. Bps(bits per second) is the measurement of this medium
- Elements Influencing this quality are the media and signaling attributes
- Latency: Delay experienced due to the movement of data from one source to another through a network.
- Throughput: Quantitative measurement of data actually transmitted over a link, can be restricted by traffic conditions or network
- Goodput - Effective data transmitted over a line, throughput is the measure once overhead is removed goodput>throughout>bandwith
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.