Podcast
Questions and Answers
Which network topology ensures data packets are sent through a central device?
Which network topology ensures data packets are sent through a central device?
- Star (correct)
- Hybrid
- Mesh
- WPAN
Data redundancy involves storing data on a single server to prevent data loss.
Data redundancy involves storing data on a single server to prevent data loss.
False (B)
What is the approximate range, in meters, of Bluetooth connectivity, using spread spectrum frequency hopping?
What is the approximate range, in meters, of Bluetooth connectivity, using spread spectrum frequency hopping?
100
A ________ is a device that connects LANs which use different protocols.
A ________ is a device that connects LANs which use different protocols.
Match each network device with its primary function:
Match each network device with its primary function:
Which of the following cable types uses light pulses to transmit data?
Which of the following cable types uses light pulses to transmit data?
A WNIC (wireless network interface card/controller) is commonly associated with a MAC address set at the factory.
A WNIC (wireless network interface card/controller) is commonly associated with a MAC address set at the factory.
What situation occurs when two devices on a network are configured with the same IP address?
What situation occurs when two devices on a network are configured with the same IP address?
Which of the following is the primary function of CSMA/CD in a network?
Which of the following is the primary function of CSMA/CD in a network?
Bit rate is a measure of the storage capacity of a network server.
Bit rate is a measure of the storage capacity of a network server.
Define the term 'buffering' in the context of bit streaming.
Define the term 'buffering' in the context of bit streaming.
In a star network topology, each device connects to a central ______.
In a star network topology, each device connects to a central ______.
Match the streaming type with its description:
Match the streaming type with its description:
Which of the following is NOT typically considered a drawback of networking computers?
Which of the following is NOT typically considered a drawback of networking computers?
In a peer-to-peer network, a central server is required to authenticate users before they can share resources
In a peer-to-peer network, a central server is required to authenticate users before they can share resources
Which network topology uses a single central cable to which all computers and devices are connected?
Which network topology uses a single central cable to which all computers and devices are connected?
Which network type is most suitable for connecting multiple buildings within a university campus?
Which network type is most suitable for connecting multiple buildings within a university campus?
A hub directs incoming data packets to a specific destination address only, improving network efficiency.
A hub directs incoming data packets to a specific destination address only, improving network efficiency.
What is the primary function of a router in the context of computer networks?
What is the primary function of a router in the context of computer networks?
A device that converts digital data to analogue data for transmission over telephone lines, and vice versa, is called a ______.
A device that converts digital data to analogue data for transmission over telephone lines, and vice versa, is called a ______.
Match the following network components with their functions:
Match the following network components with their functions:
In a peer-to-peer network, what is the role of a central server?
In a peer-to-peer network, what is the role of a central server?
A thick client relies heavily on a continuous internet connection for its basic functionality.
A thick client relies heavily on a continuous internet connection for its basic functionality.
What is the main characteristic of a bus network topology that affects data transmission?
What is the main characteristic of a bus network topology that affects data transmission?
What is the primary cause of IP address conflicts on a local area network (LAN)?
What is the primary cause of IP address conflicts on a local area network (LAN)?
CSMA/CD resolves collisions by immediately retransmitting the data frame.
CSMA/CD resolves collisions by immediately retransmitting the data frame.
What must occur with large files, such as video, before bit streaming?
What must occur with large files, such as video, before bit streaming?
Which of the following is a characteristic of IPv6 addresses that distinguishes them from IPv4 addresses?
Which of the following is a characteristic of IPv6 addresses that distinguishes them from IPv4 addresses?
To ensure smooth playback of media files during bit streaming, it is necessary to have some form of ______.
To ensure smooth playback of media files during bit streaming, it is necessary to have some form of ______.
Zero compression can be applied multiple times in an IPv6 address to further shorten it.
Zero compression can be applied multiple times in an IPv6 address to further shorten it.
What is the primary function of the Domain Name System (DNS)?
What is the primary function of the Domain Name System (DNS)?
Which of the following describes the relationship between the Internet and the World Wide Web?
Which of the following describes the relationship between the Internet and the World Wide Web?
HTML is used to write URLs.
HTML is used to write URLs.
The practice of dividing a network into smaller, more manageable segments is known as ______.
The practice of dividing a network into smaller, more manageable segments is known as ______.
What is the purpose of a web browser?
What is the purpose of a web browser?
Which of the following best describes the difference between the internet and the World Wide Web (WWW)?
Which of the following best describes the difference between the internet and the World Wide Web (WWW)?
Match the term with its description:
Match the term with its description:
Match the following IP address types with their corresponding descriptions:
Match the following IP address types with their corresponding descriptions:
Which technology converts voice and webcam images into digital data packets for transmission over the internet?
Which technology converts voice and webcam images into digital data packets for transmission over the internet?
The Public Switched Telephone Network (PSTN) is used for transmitting data over the internet.
The Public Switched Telephone Network (PSTN) is used for transmitting data over the internet.
Which of the following best describes the key difference between routing and flooding in mesh networks?
Which of the following best describes the key difference between routing and flooding in mesh networks?
Hybrid networks always combine a bus topology with a star topology.
Hybrid networks always combine a bus topology with a star topology.
In a ring topology, how many network connectors does each computer typically have?
In a ring topology, how many network connectors does each computer typically have?
Companies using cloud storage may relinquish control of their own data _________.
Companies using cloud storage may relinquish control of their own data _________.
Which of the statements is correct regarding cloud software?
Which of the statements is correct regarding cloud software?
What happens to the data if a user loses internet connection while using cloud software?
What happens to the data if a user loses internet connection while using cloud software?
Match each cloud computing aspect with its correct description:
Match each cloud computing aspect with its correct description:
Flooding in mesh networks ensures data reaches its destination via the most efficient route.
Flooding in mesh networks ensures data reaches its destination via the most efficient route.
Flashcards
CSMA/CD
CSMA/CD
Method to detect and resolve collisions in network communication.
Bit Streaming
Bit Streaming
A continuous flow of digital bits transmitted over a network.
Buffering
Buffering
Temporary storage holding data before processing or transmission.
Bit Rate
Bit Rate
Signup and view all the flashcards
On Demand (Bit Streaming)
On Demand (Bit Streaming)
Signup and view all the flashcards
Real-time (Bit Streaming)
Real-time (Bit Streaming)
Signup and view all the flashcards
Peer-to-peer Network
Peer-to-peer Network
Signup and view all the flashcards
Bus Network
Bus Network
Signup and view all the flashcards
Star Network Topology
Star Network Topology
Signup and view all the flashcards
Mesh Network Topology
Mesh Network Topology
Signup and view all the flashcards
Hybrid Network
Hybrid Network
Signup and view all the flashcards
Cloud Storage
Cloud Storage
Signup and view all the flashcards
Data Redundancy
Data Redundancy
Signup and view all the flashcards
Bluetooth
Bluetooth
Signup and view all the flashcards
WPAN
WPAN
Signup and view all the flashcards
Gateway
Gateway
Signup and view all the flashcards
File Server
File Server
Signup and view all the flashcards
Hub
Hub
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Node
Node
Signup and view all the flashcards
PSTN
PSTN
Signup and view all the flashcards
VoIP
VoIP
Signup and view all the flashcards
Internet Protocol (IP)
Internet Protocol (IP)
Signup and view all the flashcards
IPv4
IPv4
Signup and view all the flashcards
IPv6
IPv6
Signup and view all the flashcards
Zero Compression
Zero Compression
Signup and view all the flashcards
Private IP Address
Private IP Address
Signup and view all the flashcards
Public IP Address
Public IP Address
Signup and view all the flashcards
IP Address Conflict
IP Address Conflict
Signup and view all the flashcards
Network Collision
Network Collision
Signup and view all the flashcards
Internet
Internet
Signup and view all the flashcards
World Wide Web (WWW)
World Wide Web (WWW)
Signup and view all the flashcards
Uniform Resource Locator (URL)
Uniform Resource Locator (URL)
Signup and view all the flashcards
Mesh Network: Routing
Mesh Network: Routing
Signup and view all the flashcards
Mesh Network: Flooding
Mesh Network: Flooding
Signup and view all the flashcards
Ring Topology
Ring Topology
Signup and view all the flashcards
Cloud Data Security Risk
Cloud Data Security Risk
Signup and view all the flashcards
Cloud Software
Cloud Software
Signup and view all the flashcards
Cloud Software Advantages
Cloud Software Advantages
Signup and view all the flashcards
Software as a service (SaaS)
Software as a service (SaaS)
Signup and view all the flashcards
Study Notes
- Unit 2 covers communication in networking
Networking Definitions
- ARPAnet: Advanced Research Projects Agency Network
- WAN: Wide area network, covers a very large geographical area
- LAN: Local area network, covers a small area like a single building
- MAN: Metropolitan area network, larger than a LAN but smaller than a WAN (can cover several buildings like a campus)
- File server: A network server where central files are stored, accessible to logged-in users
- Hub: Hardware that connects devices to form a LAN, directing incoming data packets to all devices
- Switch: Hardware that connects devices to form a LAN, directing data packets to a specific destination address
- Router: A device that enables data packets to be routed between different networks, like joining LANs to form a WAN
- Modem: Modulator demodulator, converts digital to analogue data (for phone lines) and vice versa
- WLAN: Wireless LAN
- (W)AP: Wireless access point, allows a device to access a LAN without a wired connection
- PAN: Network centered around a person or workspace
- Client-server: Network that uses separate dedicated servers and specific client workstations
- All client computers connect to the dedicated servers
- Spread spectrum technology: Wideband radio frequency with a range of 30-50 meters
- Node: A device connected to a network (computer, storage, etc.)
- Peer-to-peer: Network where each node shares files with all others, each node has its own data and there is no central server
- Thin client: Device needing internet access to work, relies on a powerful computer for processing
- Thick client: Works both offline and online, can do processing without a network connection
- Bus network topology: Uses a single central cable, data travels in one direction and only one device can transmit at a time
- Packet: Message/data sent over a network, includes sender/recipient addresses and the actual data
- Star network topology: Uses a central hub/switch, all devices connect to it and data packets are directed through it
- Mesh network topology: Interlinked computers/devices, uses routing logic to send data packets via the shortest route
- Hybrid network: Combination of different network topologies
- Cloud storage: Data storage on off-site servers
- Data redundancy: Same data stored on multiple servers for maintenance or repair purposes
Additional terms
- Wi-Fi: Wireless connectivity using radio waves/microwaves, implementing IEEE 802.11 protocols
- Bluetooth: Wireless connectivity using radio waves in the 2.45GHz band
- Spread spectrum frequency hopping: Transmitting radio signals by randomly picking one of 79 channels, range up to 100 meters
- WPAN: Wireless personal area network, connects devices in close proximity (laptop, smartphone, etc.)
- Twisted pair cable: Cable with two wires of a single circuit twisted together
- Coaxial cable: Cable made of a central copper core, insulation, copper mesh, and outer insulation
- Fibre optic cable: Cable with glass fibre wires, uses light pulses to transmit data
- Gateway: Device that connects LANs using different protocols
- Repeater: Device used to boost a signal on wired and wireless networks
- Repeating hubs: Network devices as a hybrid of hub and repeater unit
- Bridge: Device that connects LANs using the same protocols
- Softmodem: Software modem; software-based, uses minimal hardware
- NIC: Network interface card, allows devices to connect to a network/internet, usually with a MAC address
- WNIC: Wireless network interface cards/controllers
- Ethernet: Protocol IEEE 802.3 used by many wired LANs
- Conflict: Two devices have the same IP address
- Broadcast: Communication where data is sent from sender to receiver
- Collision: Two messages from different sources try to transmit along the same data channel
- CSMA/CD: Carrier sense multiple access with collision detection, method to detect and resolve collisions
- Bit streaming: Contiguous sequence of digital bits sent over a network/internet
- Buffering: Store which holds data temporarily
- Bit rate: Number of bits per second transmitted over a network, measures data transfer rate
- On-demand (bit streaming): System to stream video/music files from a central server without saving them to a device
- Real-time (bit streaming): System captures an event via camera/mic connected to a computer, sends to a server, accessed "as it happens"
Benefits of networking computers and devices
- Share devices and reduce costs
- Cheaper software licenses
- File and data sharing
- Central data access
- Central data backup
- Communication via email and messaging
- Network management with access rights and restrictions
Drawbacks of networking computers and devices
- Expensive cabling and servers
- Complex network management
- Breakdown of key devices affects the entire network
- Malware and hacking risks
Networked computers form an infrastructure including:
- Hardware: LAN cards, routers, switches, wireless routers, cabling
- Software: Network operation/management, firewalls, security applications/utilities
- Services: DSL, satellite communication, wireless protocols, IP addressing
Network categorization
- Private networks: Owned by a single entity, such as a company, for internal use with restricted access
- Public networks: Owned by communications carriers, used by many organizations without specific password requirements, although sub-networks may have security management
Client-Server model
- Users can access most files stored on dedicated servers
- Client sends request to server, server finds and sends data back
- A system administrator manages the network
- Server dictates data access
- Central security databases controlling access to shared resources via user login to access assigned resources only
- Easily scalable
- Central server handles email
- Stable system with nightly backups to restore deleted resources
- Clients have more control to store their own programs and data/files
- Cheaper to expand with low energy devices
Peer-to-Peer Model
-
Each node joins the network to allow provision of services to all other networks
-
Nodes on the network to simply access data from another node
-
For communication with other peers connected to a network Suppliers and consumers are peers to be both suppliers and consumers.
-
Nodes participate as equals on the network
-
Does not have a central system
-
Each node/workstation shares it files with all the others
-
There is no requirement to authenticate users
Thick and thin clients have pros and cons:
-
Thin client runs some software even if not connected to a server
-
They rely heavily on local resources
-
More tolerant of slow network connection
-
Can store data in local resources (HDD or SSD)
-
Less secure (relies on clients to keep their own data secure
-
Each client needs to update data individually
-
Data integrity issues, since many clients access the same data which can lead to inconsistencies
-
High reliance on the server, if the server goes down, so does communication link for thick client
-
Thin clients need a connection to a remote computer to work
-
Requires very few local resources and fast connection for its to wirk
-
Data us stored on a remote PC
-
They are more robust device can carry out processing even when not on a server
-
The serve can prevent hacker from accessing the device
Network topologies
- Devices linked to server of data updates and new software installation
Bus Topology
- Uses a single central cable to which all computers connect
Star Topology
- Uses a central hub/switch; each device connects to it
Mesh Topology
- Nodes are interlinked
- Uses routing logic to direct data
- Data is directed to destination by shortest route
Hybrid Topology
- Mixture of two or more different topologies
Ring Topology
- All computers have two network connectors
- Each connector is used to run clockwise and onticlockwise on the next node
Pros
- Relatively easy to expand
- It is easy to identify where faults on the network have occurred.
- Good privacy and security, since packets travel along dedicated routes.
- Is is simple to set up
Disadvantages
- A large amount of cabling is needed
- It is difficult and complex
- If one part of the cable breaks the entire network goes down
Public and private cloud computing storage systems
- Cloud storage stores data on offsite servers
- The same data is store on multiple servers for repairs to allow data access when needed
System examples:
- Private: Is storage provider by a dedicated environment behind a computer firewall
- Public: Is a storage environment where the customer and cloud storage provider are different companies
- Hybrids: Combination of public and private clouds
- There may be issues if a customer as slow and unstable network connection, high cost of storage capacity is required
Data security in the could
- Considers if personal are able to access data for monetary expenses
- Considers who can access data if building is hacked and safety provided with building housing the data
- Cloud software application are delivered to uses device using computing services
- A use will connecter t the internet and their cloud services supplier allows them to connect the software application
Wireless connectivity
- Both WIFI and Blues tooth use electromagnetic radiation
- Bluetooth sends and receives radio waves in different channels
- Bluetooth use key encryption to the WPAN
- WIFI uses spread spectrum technology more faster data/range than BLUETOOTH
- WIFI enabled device can access from the internet 100 meters away
Wired Cable facts
-
Twisted pair cables are most common cable types
-
They have the lowest rated
-
Coaxial cable is most commonly used in televisions
-
Fibre cable are used to send data over long distances
There a few more Pros and Cons
-
Hardwares are network hardware can be written
-
It is easier to expanded networks
-
Some devices haves increased mobility to be in range
-
Not needed to connected devices using cables
-
Network Interface Card
-
Wireless Network Interface cards are more ordinary
-
Ethernet cable uses nodes and median to device use such as Ethernet cords
-
Collisions can also occur and cause a collision
-
NIC is needed to connection internet with a devices and it is a part of the hardware
-
WiNics the card are use to connect using the internet
Bit Streaming (how file is delivered)
- It requires a high speed communications link
- Large file must undergo some data compression before transmission
- It also needs to undergo some buffering to ensure smoother media files
Media files delivered by:
- 1 No need to wait for a whole data download
- 2 Allow video, music files played on demand
- 3 No need for specialized hardware
- 4 Provides piracy protection making is more difficult to copy files
- However users can't streaming files if there is connection is lost and the security risks with downloading
- Band with is lost with no internet
On demand bit-streaming (when file is encoded and placed on web server)
- File is converted to steam format, then to user and video broadcast as required
- Can pause data as required
Real time (bit streaming) file upload
- An even it sent and uploaded file, a video sent to user device, footage cant be shared
Internet/WWW
Internet
- Massive network of networks, uses TCP/IP communication protocols
Word Wide Web(WWW)
-
A collection Of web pages on a website
-
Use of hypertext Mark language with uniform research location to web page address using Browsers that connects to DSN to address Internet services providing with a service Public and private switch telephone network used in traditional phones Over internet protocol converted images through the internet
-
TCP/IP,IPv4,IPV6 are all addresses to connet too devices using number to identified devices using the internet
-
Classless domain router Increased IP flexity by allowing to add a suffix to IIP address also has a code to compress address and subdivide network using address as well, a DNS as to finds domain names
IP address information
- Private IP address( like a home or office) help devices without needing a network
- Public IP address used to identify the ISP on internet
Website addressed useds HTML codes to search files using HTTP Internet uss transfer protocol to network while World Wide Web users and accesses internet files by using the web browsing with a file to device connecting via phone wire and router
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of network topologies, devices, and protocols. This quiz covers various aspects of computer networking, from data transmission methods to network devices and their functions. Review concepts like CSMA/CD, IP addressing, and network topologies.