CPE 046 Flashcards
A collection of computing devices connected in order to communicate and share resources
Computer network
Facilitates the transmission of data between devices, such as files, emails, and messages.
Data Transfer
Allows users to access and control
devices and resources from remote locations.
Remote Access
Enables the sharing of physical
resources like printers, scanners, and storage devices.
Hardware Sharing
Allows multiple users to access and utilize shared software applications.
Software Sharing
Provides access to the vast
amount of information available on the internet.
Internet Connectivity
Enables access to centralized
databases for data storage and retrieval.
Database Access
Allows for centralized
management and monitoring of network devices and
resources.
Network Administration
Enhances security measures to protect network
resources from unauthorized access.
Security
Key Functions of a Computer Network
Communication:
Resource Sharing:
Information Access:
Centralized Management:
Security:
how is hardware (physically) connected?
Network Topology
how is a message’s destinations identified?
Addressing
should all data be sent in the same fashion?
Message Delivery
what path through the network is taken?
Routing
Any device on a network
Node
The speed with which data is moved from
one place to another on a network
Throughput
- refers to the amount of data that can be
transmitted and received during a specific period of time.
Bandwidth
measures delay. Delay is simply the time
taken for a data packet to reach its destination after being
sent.
Latency
is any computer hardware or software device
that requests access to a service provided by a server.
Client
is a computer program or device that provides a
service to another computer program and its user, also
known as the client.
Server
is the
data transfer rate that a network
connection can support.
*It’s usually measured in bits per
second (bps).
bandwidth
is the actual
data transfer rate that is sent over a network.
throughput
It’s the time it takes for a packet
of data to travel from the source
to the destination.
Latency:
Computer networks have opened up an entire frontier in the world of computing called the
client/server model
A set of rules that defines how data is formatted and
processed on a network; i.e., rules that allow client/server
interaction
Protocol
A computer that stores and manages files for multiple
users on a network
File server
A computer dedicated to responding to requests (from the
browser client) for web pages
Web server
a physical arrangement through which various endpoints and links in an enterprise network communicate with each other.
Network Topology
A simple topology that directly links two nodes and reserves the entire bandwidth of the connection for them to
communicate with one another.
Point to Point
All the nodes are linked using a single cable with a terminator on both ends.
Bus topology
Each node is linked with its neighbor to form a
closed network.
Ring Topology
All nodes are connected to a central hub using a
communication link.
Star Topology
nodes are arranged in
a configuration that resembles a tree’s
leaves, branches, and trunk.
Tree Topology
all the nodes are interconnected and
can send and receive their data and relay data from other
nodes.
Mesh Topology
Features characteristics of multiple other
topologies. The creation of such a
configuration depends on the requirement of the network.
Hybrid Topology
Two most commonly used hybrid topologies
are
star-ring and star-bus.
A network that connects local-area networks over a
potentially large geographic distance
Wide-area network (WAN)
The communication infrastructures that have been
developed in and around large cities
Metropolitan-area network (MAN)
a collection of devices connected together in one physical
location, such as a building, office, or home.
Local-area network (LAN)
Types of Networks
Internet
Gateway
A wide area network that spans the planet
Internet
One particular set up to handle all
communication going between that
LAN and other networks
Gateway
A set of high-speed networks that carry
Internet traffic.
Internet backbone
is the first Internet Exchange
Point in the Philippines.
Philippine Internet
eXchange
A company that provides other companies
or individuals with access to the Internet
Internet service provider (ISP)
2 Categories of Transmission Media
Guided Media
Unguided Media
It is also referred to as Wired or Bounded
transmission media.
Guided Media
3 Major Types of Guided
Media
- Twisted Pair Cable
- Coaxial Cable
- Fiber Optic Cable
This type of cable has the ability to block interference and does
not depend on a physical shield for this purpose. It is used for
telephonic applications.
Unshielded Twisted Pair
(UTP)
This type of cable consists of a special jacket to block external
interference. It is used in fast-data-rate Ethernet and in voice and data
channels of telephone lines.
Shielded Twisted Pair (STP)
It has an outer plastic covering containing 2 parallel conductors each
having a separate insulated protection cover.
Coaxial Cable
It uses the concept of reflection of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for transmission of
large volumes of data.
Fiber Optic Cable
RJ45, stands for
Registered Jack-45
An 8-pin/8-position plug or jack is
commonly used to
to connect computers
onto Ethernet-based local area
networks (LAN).
are used to terminate
the twisted-pair cable onto the connector
interface.
Two wiring schemes–T568A and T568B–
a description for layered communications and computer network protocol & transmission design
Open System
Interconnection Reference
Model
True or False
The osi model is a physical implementation
False
What are the 7 Layers of the osi model
Application
Presentation
Session
Transport
Network
Data Link
Physical
- End User layer
- HTTP, FTP, IRC, SSH, DNS
Application
- Syntax layer
- SSL, SSH, IMAP, FTP, MPEG, JPEG
Presentation
- Synch & send to port
- API’s, Sockets, WinSock
Session
- End to end connections
- TCP, UDP
Transport
- Packets
- IP, ICMP, IPSec, IGMP
Network
- Frames
- Ethernet, PPP, Switch, Bridge
Data Link
- Physical structure
- Coax, Fiber, Wireless, Hubs, Repeaters
Physical
RESPONSIBLE FOR THE TRANSMISSION OF
RAW BIT STREAMS OVER A PHYSICAL
MEDIUM.
PHYSICAL LAYER
CONVERTS DIGITAL DATA INTO ELECTRICAL SIGNALS OR LIGHT PULSES SUITABLE FOR TRANSMISSION. PHYSICAL
BIT TRANSMISSION
DEFINES THE PHYSICAL CHARACTERISTICS OF THE NETWORK, SUCH AS CABLES, CONNECTORS, AND INTERFACES.
CONNECTION
DETERMINES HOW BITS ARE REPRESENTED AS SIGNALS (EG, MANCHESTER ENCODING, NRZ).
SIGNAL ENCODING
ENSURES THAT THE SENDER AND RECEIVER CLOCKS ARE SYNCHRONIZED
BIT SYNCHRONIZATION:
IMPLEMENTS BASIC ERROR DETECTION TECHNIQUES LIKE PARITY CHECKING.
ERROR DETECTION
RESPONSIBLE FOR RELIABLE DATA
TRANSFER BETWEEN NODES ON A NETWORK SEGMENT.
DATA LINK
DIVIDES DATA INTO SMALLER UNITS CALLED
FRAMES.
FRAMING
ASSIGNS UNIQUE PHYSICAL ADDRESSES (MAC ADDRESSES) TO EACH NETWORK INTERFACE CARD (NIC).
PHYSICAL ADDRESSING
EMPLOYS TECHNIQUES
LIKE CYCLIC
REDUNDANCY CHECK (CRC) TO DETECT ERRORS
IN TRANSMITTED DATA.
ERROR DETECTION AND CORRECTION
REGULATES THE RATE OF DATA TRANSMISSION TO PREVENT THE RECEIVER FROM BEING OVERWHELMED.
FLOW CONTROL
RESPONSIBLE FOR LOGICAL
ADDRESSING AND ROUTING DATA PACKETS ACROSS DIFFERENT
NETWORKS.
NETWORK LAYER
BREAKS DATA INTO SMALLER PACKETS FOR EFFICIENT TRANSMISSION.
PACKET SWITCHING:
DETERMINES THE BEST PATH FOR PACKETS
TO TRAVEL FROM SOURCE TO
DESTINATION.
ROUTING:
ASSIGNS UNIQUE LOGICAL ADDRESSES (IP ADDRESSES) TO EACH DEVICE ON A NETWORK.
LOGICAL ADDRESSING:
BREAKS DATA INTO SMALLER PACKETS FOR EFFICIENT TRANSMISSION
PACKET SWITCHING
DETERMINES THE BEST PATH FOR PACKETS TO TRAVEL FROM SOURCE TO DESTINATION
ROUTING
MANAGES NETWORK TRAFFIC TO PREVENT
CONGESTION AND ENSURE EFFICLENT DATA
FLOW.
CONGESTION CONTROL
ASSIGNS UNIQUE
ADDRESSES TO DEVICES CONNECTED TO THE NETWORK,
ENABLING COMMUNICATION BETWEEN THEM.
IP (INTERNET PROTOCOL)
SPECIFIES THE UNIQUE NUMBER WHICH IS ASSIGNED TO YOUR NETWORK
NETWORK ADDRESS
IS A SPECIFIC ADDRESS NUMBER ASSIGNED TO EACH HOST MACHINE
HOST ADDRESS
USES FIXED-LENGTH SUBNET MASKS AND CATEGORIZES IP ADDRESSES INTO FIVE CLASSES (A, B, C, D, E )
CLASSFUL ADDRESSING (1981)
USES VARIABLE LENGTH SUBNET MASKS (VLSM) AND ALLOWS FOR FLEXIBLE ALLOCATION OF BITS TO NETWORK ID AND HOST ID
CLASSLESS ADDRESSING
THESE HAVE TI DI WITH SIZE OF NETWORKS AS THEY ARE ASSIGNED FROM IANA
CLASSFUL AND CLASSLESS
THESE HAVE TO DO WITH HOW YOU ALLOCATE YOUR IP SPACE WITHIN YOUR NETWORKS
FLSM AND VLSM
IN A WORD, CLASSLESS ADDRESSING CAN BE SUMMARIZED AS ______
EFFICIENT
IT ALSO CALLED CIDR
CLASSLESS ADDRESSING (1993)
VLSM STAND FOR
VARIABLE-LENGTH SUBNET MASKS
TAKING A NETWORK AND DIVIDING IT INTO SUB-NETWORKS
SUBNETTING
OFFERS A COMPACT AND EXTREMELY USEFUL WAY TO REPRESENT IP ADDRESSES AND THEIR ASSOCIATED SUBNET MASKS
CIDR NOTATION
8 ATTRIBUTES OF SUBNETTING
NETWORK ID
BROADCAST ID
FIRST HOST IP
LAST HOST
NEXT NETWORK IP
NUMBER OF IP ADDRESSES
NUMBER OF HOST ADDRESES
SUBNET MASK
A TABLE THAT MAKES SUBNETTING MORE EASIER
SUBNETTING CHEAT SHEET