SEHH1034 Week 7 & 9 Networking
44 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary function of a hub in a connected network?

  • Transfers all data to all devices (correct)
  • Transmits and receives wireless signals
  • Connects two or more networks
  • Transfers data only to the intended recipient
  • Which device is responsible for connecting a network to the Internet through an ISP?

  • Hub
  • Router
  • Modem (correct)
  • Switch
  • What is necessary for a computer to connect to a network?

  • Wireless access point
  • A router
  • Network interface card (NIC) (correct)
  • Cable modem
  • Which network topology is commonly used by Ethernet?

    <p>Bus topology</p> Signup and view all the answers

    What differentiates a switch from a hub in a network?

    <p>A hub transfers data to all devices, while a switch transfers data only to the intended recipient.</p> Signup and view all the answers

    Which of the following is a wireless networking standard?

    <p>IEEE 802.11</p> Signup and view all the answers

    What is required in all networks to facilitate communication?

    <p>Two or more devices and the infrastructure to communicate</p> Signup and view all the answers

    Which device specifically transfers data only to the intended recipient?

    <p>Switch</p> Signup and view all the answers

    What is the main drawback of a bus topology in a network?

    <p>A failure in the central cable halts communication.</p> Signup and view all the answers

    Which topology allows the network to continue functioning even after a device fails?

    <p>Mesh topology</p> Signup and view all the answers

    Which of the following describes a tree topology?

    <p>Devices are arranged in a hierarchy with central nodes.</p> Signup and view all the answers

    Which type of Internet connection allows for always-on broadband access through cable television infrastructure?

    <p>Cable Internet connection</p> Signup and view all the answers

    What happens if a device fails in a star topology?

    <p>All devices connected can still communicate.</p> Signup and view all the answers

    Which topology is least commonly used today due to its vulnerability?

    <p>Bus topology</p> Signup and view all the answers

    In a ring topology, how is data transmitted?

    <p>Data flows in a sequential manner between all devices.</p> Signup and view all the answers

    What is a characteristic of a partial mesh topology?

    <p>Only certain devices are interconnected.</p> Signup and view all the answers

    What is a characteristic of a client/server network?

    <p>Requires dedicated servers to manage resources</p> Signup and view all the answers

    Which network type is designed for communication within a limited area?

    <p>Local Area Network (LAN)</p> Signup and view all the answers

    What distinguishes a wired network from a wireless network?

    <p>Wired networks generally offer faster data transmission</p> Signup and view all the answers

    What is the main purpose of an intranet?

    <p>To facilitate internal communication within an organization</p> Signup and view all the answers

    What is a defining feature of a peer-to-peer (P2P) network?

    <p>Each device can act as both a client and a server</p> Signup and view all the answers

    Which type of network connects personal digital devices within a short range, typically 30 feet?

    <p>Body Area Network (BAN)</p> Signup and view all the answers

    An extranet allows which of the following?

    <p>Access for outsiders to an organization's intranet</p> Signup and view all the answers

    What advantage do wireless networks offer over wired networks?

    <p>Capability to connect devices without physical constraints</p> Signup and view all the answers

    What is a primary benefit of using a virtual private network (VPN)?

    <p>Secure access to a company network</p> Signup and view all the answers

    Which of the following is a risk associated with using a public network?

    <p>Risk of malware installation</p> Signup and view all the answers

    What is an 'evil twin' in the context of network security?

    <p>A fraudulent Wi-Fi network used to capture data</p> Signup and view all the answers

    How can hackers easily obtain information from a targeted computer on the same network?

    <p>By connecting to the network as an authorized user</p> Signup and view all the answers

    What action should one avoid while connected to a public Wi-Fi network?

    <p>Entering confidential information</p> Signup and view all the answers

    Which step is necessary to connect devices to a wireless network?

    <p>Enable the wireless network functionality on each device</p> Signup and view all the answers

    What is a recommended safety precaution for operating a wireless network?

    <p>Perform router firmware updates regularly</p> Signup and view all the answers

    Which of the following accurately describes mobile hotspots?

    <p>Allow Internet connections through a cellular network</p> Signup and view all the answers

    What action should be taken regarding the wireless network name for better security?

    <p>Change it from the default to a custom name</p> Signup and view all the answers

    What should be done regularly to maintain the security of a wireless network?

    <p>Review connected devices periodically</p> Signup and view all the answers

    What is the purpose of encryption in network security?

    <p>To make data unrecognizable to unauthorized users</p> Signup and view all the answers

    Which of the following is a common use of Bluetooth technology?

    <p>Short range device communication</p> Signup and view all the answers

    What is a primary characteristic of network-attached storage (NAS)?

    <p>It connects directly to a network for centralized data storage</p> Signup and view all the answers

    What type of firewall operates at a hardware level?

    <p>Hardware firewalls</p> Signup and view all the answers

    Which protocol is primarily used for internet communication?

    <p>TCP/IP</p> Signup and view all the answers

    How can wireless networks enhance security?

    <p>By implementing encryption protocols</p> Signup and view all the answers

    What is the maximum typical range for Bluetooth communication?

    <p>30 feet</p> Signup and view all the answers

    Which of the following is a characteristic of LTE networks?

    <p>Used for voice and data transmission on cellular networks</p> Signup and view all the answers

    What is a primary function of encryption for data in transit?

    <p>To prevent data interception</p> Signup and view all the answers

    In which settings is Power over Ethernet (PoE) most commonly used?

    <p>For devices requiring network connectivity and power</p> Signup and view all the answers

    Study Notes

    SEHH1034 Week 7 & 9 Networking

    • Networking is covered in Module 10 of the textbook "Technology for Success: Computer Concepts" by Campbell, et al. (2020).

    Lesson Objectives

    • Key features of connected networks, and how connections between networks are formed are discussed.
    • Risks and benefits of utilizing a connected network are explored.

    Key Features of Connected Networks

    • How a network operates is explained.
    • Elements of a connected network are defined.
    • Devices required to create a network are identified.
    • Physical connections between networks and network components are explained.
    • Different types of networks are compared.

    How a Network Operates

    • A network is a system of two or more devices connected through wires, cables, or telecommunications.
    • It requires hardware and software.
    • Some networks provide connections to the internet via an Internet Service Provider (ISP).
    • This allows communication between networks connected to the internet.

    Elements of a Connected Network

    • Hub: Sends all data to all devices.
    • Switch: Transfers data only to the intended recipient.
    • Router: Connects two or more networks.
    • Modem: Connects a communications channel to a device.
    • Connects the network to the internet through the ISP.

    Devices Necessary to Create a Network

    • Two or more devices that need to communicate are necessary.
    • A method for communication is required.
    • Infrastructure to facilitate communication.
    • A network interface card (NIC) is needed for a computer to connect to a network.
    • Cable modem/DSL modem are used.

    Network Interface Card (NIC)

    • Ethernet (IEEE 802.3) is a common standard network using a bus topology.
    • The NIC supports Ethernet protocols.

    Wireless Devices for Networking

    • Wi-Fi (Wireless Fidelity, IEEE 802.11) is explored.
    • Includes Wi-Fi cards (wireless NICs).
    • Wireless access points transmit and receive wireless signals (e.g., wireless routers).
    • Wi-Fi adapters.

    DSL Modem

    • Digital subscriber line (DSL) provides high-speed internet access through phone lines.

    Cable Internet Connection

    • Cable internet provides always-on broadband internet access via cable television infrastructure.
    • Has a cable wall jack, cable splitter, and cable modem.

    Wired and Wireless Networks

    • Wired connections and wireless connections are shown to link devices.
    • The diagram also shows how a file server, router, and other devices link computers and printers.

    Networked Printer Sharing

    • Different methods of networked printer sharing are explained (one computer, print server, direct-to-router).

    Network Topologies

    • Bus: Data travels in a sequential fashion from one to the next device on a central cable. If one device fails, the entire network may stop working.
    • Ring: Data is passed along from device to device in a circular fashion. If one device fails, the entire network may stop working.
    • Star: Each device connects to a central device like a hub or switch. If the central device fails the entire network may stop working, but if a connected device fails the remainder of the network operates normally.
    • Mesh: All devices connect to each other. The network can still work if one device fails due to alternate routes. Full mesh (every device connects to every other device) and partial mesh (some devices connect to each other) are presented.

    Physical Connections Between Networks (Architecture)

    • Network Architecture: Determines the logical design of devices on the network.
    • Client/server network: A central server manages resources.
    • Peer-to-peer (P2P) network: Devices share resources directly with each other.
    • Cloud computing: Provides computing services, storage, and apps via the internet.

    Network Types, Compared

    • Local Area Network (LAN): Connects devices in a limited area.
    • Wide Area Network (WAN): Connects devices over a large area.
    • Metropolitan Area Network (MAN): Operates within a city or county.
    • Personal Area Network (PAN): Connects devices within a small area (e.g., via Bluetooth).
    • Body Area Network (BAN): Uses small biosensors implanted in the body.

    Risks of Connected Networks

    • Malware: Can install, damage, or steal data from computers or devices.
    • Hackers: Can gain access to personal data.
    • Phishing: Attempting to steal personal information via deceptive communications.
    • Social engineering: Obtaining personal data through social manipulation.
    • Denial of Service (DoS) attack: Disrupts service by overloading a targeted system.
    • Distributed Denial-of-Service (DDoS) attack: A DoS attack from multiple sources.
    • Zombie: A compromised computer used in a malicious attack.

    Network Security and Threats

    • Unauthorized network access poses risks.
    • Hackers can connect to the same network.
    • Connecting to fraudulent networks can expose data.
    • Providing confidential information on public Wi-Fi is a security risk.

    How to Secure a Network

    • Authentication: Using user names and strong passwords.
    • Biometrics: Using physical characteristics for authentication (e.g., fingerprints, facial recognition).
    • Firewalls: Hardware or software firewalls.
    • Encryption: Scrambling data to prevent unauthorized access.
    • Secure data storage on a device using NAS (Network attached storage)

    Encrypting a Network

    • Encryption converts data to be unrecognizable to unauthorized users.
    • Wireless networks use network keys to encrypt data.

    Connecting to Network Devices

    • Setting up a home wireless network involves steps to connect various devices.
    • Options with mobile hotspots are discussed
    • Common precautions needed when connecting to wireless networks are given.

    Network Standards and Protocols

    • Network standards and protocols govern communication between devices.
    • Protocols like TCP/IP are explained.
    • Wireless protocols (Bluetooth, RFID, NFC, IrDA) are examined.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts of networking as presented in Module 10 of 'Technology for Success: Computer Concepts'. It discusses the features of connected networks, risks and benefits, and how different types of networks operate. Prepare to explore the essential components needed to create and manage a network effectively.

    More Like This

    Use Quizgecko on...
    Browser
    Browser