8.1 Introduction to Networking Flashcards
What is a computer network?
A computer network consists of multiple devices connected together to share resources and services.
The ___________ model is a network computing model that defines how resources and services are shared across a network.
The client-server model is a network computing model that defines how resources and services are shared across a network.
Client-Server Model
This two-way conversation between the client and server is known as the ___________ method of device communication.
This two-way conversation between the client and server is known as the request and response method of device communication.
What are the mian risks and thrests included in newtork security?
- Unauthorized access to networks
- Denial of service (DoS) attacks
- Eavesdropping
- Datamodifcation
____________ is a private
computer network that connects devices in smaller physical areas.
A local area network (LAN)—a private
computer network that connects devices in smaller physical areas.
LANs offer the following advantages:
Netwroks speed & performanc - Since the devices are physically near each other, connections are significanly faster and perform better.
Netwrok secuirty - With security devices, a business can control what data comes in and out of their local network as well as who has access to resources.
Versatility - New network devices can be easily added or removed inside a LAN due to the proximity of the devices within the network.
As technology advanced, computer networks expanded and small networks in diffrent locations were able to connect, creating ___________.
As technology advanced, computer networks expanded and small networks in diffrent locations were able to connect, creating Wide Area Networks (WAN)
What is a network topology?
Machines on a network are connected in a specific design in order to properly serve the required performance, data flow, and security factors.
What are the pros of Ring topology?
Pros:
Reduced chances of data collision as each node release a data packet after receiving the token.
Cable faults are easily located, making
troubleshooting easier
Ring networks are moderately easy to
install
What are all the network topologies? (8)
- Ring
- Linear
- Star
- Bus
- Tree
- Fully Connected
- Mesh
- Hybrid
Cons of Ring topology
In Unidirectional Ring, a data packet must pass through all the nodes.
A single break in the cable can disrupt the
entire network.
Expansion to the network can cause
network disruption
What is the most common network topology?
Hybrid
Explain Star Topology
All computers/devices connect to a central
device called hub or switch.
• Each device requires a single cable • point-to-point connection between the device and hub. • Most widely implemented • Hub is the single point of failure
What are the pros of star topology?
Easily expanded without disruption
Cable failure affects only a single
user
Easy to troubleshoot and isolate problems
What are the cons of star topology?
Requires more cable
A central connecting device allows
for a single point of failure
More difficult to implement
Explain Mesh Topology
Each computer connects to every other.
• High level of redundancy.
• Rarely used.
– Wiring is very complicated
– Cabling cost is high
– Troubleshooting a failed cable is tricky
– A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation.
Explain Hybrid Topology
Hybrid topology is an integration of two or more different topologies to form a resultant topology which has many advantages (as well as disadvantages) of all the constituent basic topologies rather than having characteristics of one specific topology
Explain Fully Connected Topology
A fully connected network, complete topology, or full mesh topology is a network topology in which there is a direct link between all pairs of nodes. In a fully connected network with n nodes, there are n(n-1)/2 direct links.
Netwrok Devices: Router
A router is a networking device that forwards (routes) resources to other networks. A router can connect two different LANs, two different WANs, a LAN to a WAN.
Network Devices: Switch
A switch is a networking device that forwards resources within a network. In other words, switches connect devices within a LAN.
Network Devices: Hub
A hub serves the exact same purpose as a switch, except it is not an intelligent device. Therefore, hubs cannot be
programmed. Instead, they will direct a copy of the exact same resource to all computers connected to them.
True or False?
Hubs are less secure than switches since they direct resources to all computers, even those that do not need them. Hubs are outdated and no longer commonly used.
True
True or False?
Switches are typically used in large businesses with many computers.
Switches typically feed into routers.
Switches are intelligent devices, meaning they can be programmed to direct resources to certain computers.
True
Network Devices: Bridge
Bridges are switches that only have two connections: one in and one out.
True or False
Bridges are often used to tie two WANs together.
Flase
Bridges are often used to tie two LANs together.
Network Devices: Network Interface Controller (NIC)
An NIC is hardware that connects a computer to a computer network.
True or False
An NIC is usually a circuit board or chip
installed on a computer.
True
True or False
Each computer must have an NIC in order to receive or send resources.
True
True o False
NICs can ONLY be wired.
False
NICs can be wired or wireless
Network Devices: Modem
Modems (modulator-demodulator) converts resource data into a format that the next type of connection can understand.
In simple terms: your computer and your internet service provider speak different languages, and the modem acts as the translator.
Network Devices: All-in-One Device
All-in-one devices can have modems, WAPs, routers, and more all built into a single device. All-in-one devices are very common household devices.
Network Devices: Firewall
A firewall is an intelligent network security device that monitors incoming and outgoing traffic based on security rules.
True or False
Firewalls are typically placed at the entry point of a LAN. This protects the resources inside.
True
Network Devices: Load Balancers
A load balancer is an intelligent network security device that distributes incoming network traffic across multiple servers.
True or False
A load balancer ensures no single server has too much traffic to handle.
True
Network Devices: Demilirarized Zones (DMZ)
A DMZ is a smaller subnetwork within a LAN used to add an additional layer of security to an organization’s LAN, protecting secure data within the internal networks.
True or False
A DMZ typically has its own network security devices, such as firewalls, that attempt to detect network attacks
before they access the internal networks.
True
IPv4 IP addresses are written as _________ separated by decimals.
IPv4 IP addresses are written as four octets separated by decimals.
What are the two primary versions of IP addresses?
IPv4 and IPv6
Each IP octet can range from _____ to _____
Each IP octet can range from zero to 255
IP addresses are categorized as ______ or ______.
IP addresses are categorized as public or private.
What’s the difference between public and private IP addresses?
Public IP addresses are addresses that can be accessed over the internet
Private IP addresses are addresses that are not exposed to the interent.
What’s the advatages/disavantages of public IPs
Advantages: Public IPs’ resources are
accessible over the internet.
Disadvantages: Not all devices should be accessed over the internet, as this potentially exposes these devices to malicious actors.
What’s the advatages of private IPs?
Private IP addresses aren’t publicly accessible, and therefore more secure.
Private IPs can be reused, as long as they are in different LANs, since they can’t conflict across different networks.
What’s the disavantages of private IPs?
Private IPs are not directly accessible over the public internet.
Private IPs are assigned by a network administrator of the LAN they belong to.
This process of breaking up an IP address range into smaller, more specific networks of grouped devices is called ________.
This process of breaking up an IP address range into smaller, more specific networks of grouped devices is called subnetting.
When we subnet, we don’t have to list and assign IP addresses one by one. Instead, we use a fromat known as _____________.
When we subnet, we don’t have to list and assign IP addresses one by one. Instead, we use a fromat known as Classles Inter-Domain Routing (CIDR).
CIDRs are made up of two sets of numbers: An ___________ and a
range of available ___________.
CIDRs are made up of two sets of numbers: An IP address (the prefix) and a range of available IP addresses (the suffix).
Besides IP addresses, another important network address utilized within a LAN is the ___________________.
Besides IP addresses, another important network address utilized within a LAN is the Media Access Contol Address (MAC address)
True or False
MAC addresses are connected to network adapters on a computer and can be changed.
False
MAC addresses are connected to network adapters on a computer and can’t be changed.
True or False
A MAC address is a string of six sets of alphanumeric characters, separated by colons.
True
True or False
MAC addresses can also indicate the manufacturer of the network device.
True
How do you tell if you have a private or public IP address
Private IP Addresses have the following ranges:
- 0.0.0 - 10.255.255.255
- 16.0.0 - 172.31.255.255
- 168.0.0 - 192.168.255.255