Network Review Flashcards
Differentiate the LAN and WAN
LAN (Local Area Network) and WAN (Wide Area Network) are two types of computer networks that differ in terms of geographical coverage and scale. Here’s a comparison between the two:
Geographical Coverage:
LAN: A LAN covers a small geographical area such as a home, office building, or campus. It is typically confined to a single building or a group of nearby buildings.
WAN: A WAN covers a large geographical area, often spanning cities, countries, or even continents. It connects multiple LANs and remote locations over long distances.
Size and Scale:
LAN: LANs are smaller in scale and designed to serve a limited number of users within a specific area. They provide high-speed and low-latency connections.
WAN: WANs are larger in scale and can accommodate a significantly larger number of users and devices spread across extensive distances. They often operate at lower speeds and may have higher latency due to the long-distance connections.
Ownership and Control:
LAN: LANs are privately owned and controlled by a single organization or entity. The organization has full control over the network infrastructure, security measures, and configurations.
WAN: WANs are typically composed of multiple interconnected networks, and their ownership and control may be distributed among different organizations or service providers. Collaboration and agreements between organizations are necessary to establish and maintain a WAN.
Transmission Media:
LAN: LANs commonly utilize wired technologies like Ethernet cables (e.g., Cat5e, Cat6) or wireless technologies like Wi-Fi within a confined area.
WAN: WANs employ a variety of transmission media, including dedicated leased lines, optical fibers, satellite links, and public internet connections, to connect geographically dispersed locations.
Speed and Performance:
LAN: LANs offer high data transfer speeds, typically ranging from 10 Mbps to 10 Gbps, allowing for fast communication and file sharing between devices within the network.
WAN: WANs often have lower data transfer speeds compared to LANs, and their performance can vary depending on factors like distance, network congestion, and the quality of the underlying infrastructure.
Cost:
LAN: Setting up and maintaining a LAN is generally less expensive compared to establishing a WAN since LANs cover a smaller area and require fewer networking resources.
WAN: Building and operating a WAN involves higher costs due to the need for additional networking equipment, long-distance connections, and potentially paying for leased lines or WAN service providers.
In summary, LANs are smaller, localized networks serving a limited area, while WANs cover larger areas, connect multiple LANs, and span long distances. LANs provide faster and more controlled connectivity, while WANs offer broader reach but may have slower speeds and higher costs.
What are the network topologies?
Bus, Star, Ring, Mesh, Tree, Hybrid
On this network topology, all devices are connected to a single communication medium, typically a coaxial cable or a backbone cable.
Each device is linked to the cable through a connector, and the data transmitted by any device is received by all other devices.
Bus Topology
On this network topology, all devices are connected to a central hub or switch. Each device has a dedicated connection to the central hub, enabling point-to-point communication between devices.
Star Topology
What network topology is this: devices are connected in a circular manner, forming a closed loop. Each device is connected to its neighboring devices, and data travels in one direction around the ring.
Ring Topology
On this Network Topology, every device is connected to every other device in the network, creating multiple redundant paths.
Mesh Topology
This Network Topology is a combination of bus and star topologies. It consists of multiple star topologies connected to a central bus backbone.
It divides the network into multiple levels or layers, with each layer having its own central hub or switch.
Tree Topology
This Network Topology combines two or more different network topologies to meet specific requirements. For example, a network may incorporate a combination of star, ring, and mesh topologies to achieve redundancy, scalability, and efficient data transmission.
Hybrid Topology
Is a reliable and connection-oriented protocol that operates at the transport layer of the TCP/IP protocol suite.
TCP (Transmission Control Protocol)
Its primary role is to provide reliable, ordered, and error-checked delivery of data packets between devices.
TCP (Transmission Control Protocol)
It establishes and maintains a connection between two devices, handles data segmentation, flow control, and retransmission of lost packets.
TCP (Transmission Control Protocol)
This is a network layer protocol on TCP/IP model that enables the identification and addressing of devices on a network.
internet protocol (IP)
Its role is to facilitate the routing of data packets across different networks, using unique IP addresses assigned to each device.
internet protocol (IP)
It provides a best-effort delivery service, meaning it does not guarantee packet delivery or provide error-checking and retransmission.
internet protocol (IP)
is an application-layer protocol used for communication between web browsers and web servers.
Hypertext Transfer Protocol (HTTP):
Its role is to facilitate the retrieval and delivery of web resources, such as HTML documents, images, and other media.
Hypertext Transfer Protocol (HTTP):
It defines how clients send requests to servers and how servers respond with the requested resources.
Hypertext Transfer Protocol (HTTP):
It is an application-layer protocol used for sending and receiving email messages between mail servers.
Simple Mail Transfer Protocol (SMTP):
Its role is to handle the transmission, delivery, and routing of email messages over the Internet.
Simple Mail Transfer Protocol (SMTP):
It defines the rules for establishing a reliable connection between mail servers and the format for composing and transmitting email messages.
SMTP
It is an application-layer protocol used for translating human-readable domain names (e.g., www.example.com) into IP addresses.
Domain Name System (DNS):
Its role is to provide a distributed and hierarchical naming system that allows devices to locate and communicate with resources on the internet.
Domain Name System (DNS):
translates domain names into IP addresses through a network of _____ servers and supports various record types, including A, CNAME, MX, and more.
Domain Name System (DNS):
is a network management protocol used for dynamically assigning IP addresses and configuring network parameters to devices on a network.
Dynamic Host Configuration Protocol (DHCP):
Its role is to automate the process of IP address assignment, subnet mask configuration, gateway configuration, and other network settings.
Dynamic Host Configuration Protocol (DHCP):
_______ servers manage a pool of available IP addresses and lease them to devices on the network, ensuring efficient address allocation.
Dynamic Host Configuration Protocol (DHCP):
What are the layers of OSI Model?
Physical, Data Link, Network, Transport, Session, Presentation and Application layer
This layer on OSI Model is the transmission of raw unstructured bits over a communication channel. It defines the electrical, mechanical, and procedural aspects of physical connections, such as cables, connectors, and signaling.
Physical Layer
This model is a conceptual framework that standardizes the functions of a communication system into seven distinct layers. Each layer has a specific role and interacts with the layers above and below it
The OSI (Open Systems Interconnection)
This layer on OSI provides error-free, reliable transmission of data frames between two directly connected nodes over a physical medium. It handles framing, error detection, and correction, flow control, and manages access to the physical medium.
Data Link Layer
This OSI Layer is responsible for logical addressing, routing, and forwarding of packets across different networks. It determines the best path for data packets to reach their destination and handles the fragmentation and reassembly of packets if necessary.
Network Layer
This layer on the OSI ensures reliable end-to-end data delivery between hosts and provides mechanisms for error recovery, flow control, and segmentation/reassembly of data.
It establishes connections, manages data transmission, and ensures the integrity and sequencing of data.
Transport Layer
This layer establishes, manages, and terminates communication sessions between applications running on different devices. It provides services for session establishment, synchronization, checkpointing, and recovery in case of failures.
Session Layer
It is responsible for data representation, encryption, compression, and protocol conversion. It ensures that data from the application layer of one system can be understood by the application layer of another system.
Presentation Layer
It provides services directly to end-users or applications. It enables user interactions with network services, such as file transfer, email, web browsing, and other network-based applications.
Application Layer
What are the layers of TCP/IP Model?
Network Interface/Access, Internet, Transport, and Application layer
It is a conceptual framework that is widely used for the implementation of network protocols and communication in the Internet. It consists of four layers, which are sometimes mapped to the seven layers of the OSI model.
The TCP/IP (Transmission Control Protocol/Internet Protocol) model
It is equivalent to the combination of the Physical Layer and Data Link Layer in the OSI model. It handles the physical transmission of data packets over the network media and provides protocols for accessing the physical network.
Network Interface Layer (or Network Access Layer):
This layer on the TCP/IP is responsible for addressing, routing, and packet forwarding between different networks.
Internet Layer
It is a layer that provides reliable end-to-end data delivery and error-checking mechanisms between applications running on different hosts.
The two main protocols in this layer are TCP and UDP.
Transport Layer
combines the Session Layer, Presentation Layer, and Application Layer in the OSI model.
It directly interacts with end-user applications and provides various services for network-based applications.
Application Layer
Which is more commonly used TCP/IP Model or OSI layer model?
It’s worth noting that the TCP/IP model is more commonly used in practical network implementations, especially in the context of the Internet. However, both the TCP/IP and OSI models serve as useful reference frameworks for understanding network communication protocols and their functionalities.
It is a widely used protocol for identifying and addressing devices on a network.
IPv4 (Internet Protocol version 4)
are 32-bit numbers expressed in dotted-decimal notation, consisting of four octets (8 bits each) separated by periods.
IPv4 (Internet Protocol version 4)
Each octet on this can range from 0 to 255, representing a decimal value in the range of 00000000 to 11111111 in binary.
IPv4 (Internet Protocol version 4)
It represents the decimal value of each octet. For example, 192.168.0.1 is a valid IPv4 address.
“xxx” on xxx.xxx.xxx.xxx, (On IP)
For example 192.168.0.1 (The 192 is the first octet, the second is 168, then third is 0 and fourth is 1. Those are the decimal representation. But the general value of octet is represented by 8 binary digits or bits.
IPv4 addresses are divided into two parts which are?
Network portion and Host portion
The division between the two parts of IPv4 is determined by what?
by the subnet mask associated with the address.
It identifies how many bits are allocated to the network portion and the remaining bits for the host portion.
The subnet mask
Why network classes were introduced?
To allocate IP addresses based on the size of the network. The network classes were denoted as A, B, and C:
One byte is equivalent to?
eight bits
This class addresses have their first bit set to 0, indicating that the network portion occupies the most significant bit.
Class A
The range of this class addresses is from 1.0.0.0 to 126.0.0.0.
Class A
On this class, the first octet represents the network portion, while the last three octets represent the host portion.
Class A
This class can support a large number of hosts per network.
Class A Addresses
This class have their first two bits set to 10, indicating that the first two octets represent the network portion
Class B Addresses
The range of this class addresses is from 128.0.0.0 to 191.255.0.0.
Class B
On this class, the first two octets represent the network portion, while the last two octets represent the host portion.
Class B
This class can support a moderate number of hosts per network.
Class B addresses
This class have their first three bits set to 110, indicating that the first three octets represent the network portion.
Class C addresses
The range of this class addresses is from 192.0.0.0 to 223.255.255.0.
Class C
On this Class, the first three octets represent the network portion, while the last octet represents the host portion.
Class C
This class addresses can support a small number of hosts per network.
Class C
These addresses reserved for multicast and experimental purposes, respectively.
Class D and Class E
The concept of network classes has been largely replaced by?
subnetting techniques
It is represented in the same format as an IP address, using dotted-decimal notation (e.g., 255.255.255.0).
Subnet Mask
It is a 32-bit value used to divide an IP address into the network portion and the host portion.
Subnet Mask
It consists of consecutive 1s in the leftmost bits, followed by consecutive 0s in the rightmost bits.
Subnet Mask
On this, the 1s indicate the network portion, while the 0s represent the host portion of the IP address.
Subnet Mask
How to do the subnet calculations?
Determine the number of subnets and hosts required and calculating the subnet mask and network addresses. You need to decide on the number of subnets needed and the number of hosts required per subnet.
The formula for calculating the number of hosts per subnet is?
2^h-2, where h is the number of host bits (subtracting 2 accounts for the network and broadcast addresses).
CIDR Stands for?
(Classless Inter-Domain Routing)
It is a compact representation of IP addresses and their associated subnet masks.
CIDR notation
It replaces the traditional subnet mask with a forward slash (“/”) followed by the number of network bits in the subnet mask.
CIDR notation
allows for a more flexible and efficient allocation of IP addresses, as it does not rely on the predefined network classes (A, B, C) but can accommodate networks of any size.
CIDR notation
is commonly used in networking to optimize IP address allocation, improve network security, and facilitate efficient routing.
Subnetting
It enables the creation of smaller, manageable subnets within a larger network, providing better control and organization of IP address assignments.
Subnetting
is assigned to a device by the Internet Service Provider (ISP) and is globally unique on the internet.
Public IP Address
It serves as the address that allows devices to communicate with other devices over the internet.
Public IP Address
Are routable on the internet and can be accessed from anywhere in the world.
Public IP Address
Organizations typically obtain this addresses from their ISPs to connect their network to the internet and host public-facing services.
Public IP Address
This address is used on home or office network, to identify devices within that network.
Private IP Address
are not globally unique and cannot be routed over the internet directly.
Private IP Address
They are reserved and defined by specific address ranges specified by the Internet Assigned Numbers Authority (IANA).
Private IP Address
What is the private IP address range of Class A on IPv4 ?
Class A: 10.0.0.0 to 10.255.255.255
What is the private IP address range of Class B on IPv4 ?
Class B: 172.16.0.0 to 172.31.255.255
What is the private IP address range of Class C on IPv4 ?
Class C: 192.168.0.0 to 192.168.255.255
What is the private IP address on IPv6 ?
IPv6: fc00::/7 (Unique Local Addresses)
is a technique used to map multiple private IP addresses to a single public IP address.
Network Address Translation (NAT)
allows devices within a private network to communicate with the internet using a shared public IP address.
NAT
When a device from the private network initiates an outbound connection, __________ translates the private IP address to the public IP address.
NAT
maintains a translation table to track the correspondence between private IP addresses and their corresponding public IP addresses and ports.
NAT
provides a level of security by hiding the internal IP addresses from external networks, acting as a firewall to some extent.
NAT
The use of private IP addresses and NAT enables organizations and households what?
create their own private networks and share a limited number of public IP addresses.
It also allows for easier management and scalability within private networks without requiring unique public IP addresses for each device.
The use of private IP addresses and NAT
refer to situations where devices or networks are unable to establish a connection or communicate with each other.
Connectivity issues
What are the common causes of connectivity issues?
Faulty cables or connectors, misconfigured network settings, firewall or antivirus software blocking the connection, or network equipment failures.
What are the troubleshooting steps for Connectivity issues?
- Check physical connections: Ensure cables are properly plugged in and not damaged.
- Verify IP configuration: Ensure devices have correct IP addresses, subnet masks, and gateway settings.
- Check network settings: Ensure devices are on the same network and have proper DNS settings.
- Restart devices and networking equipment: Power cycling devices and equipment often resolves connectivity issues.
refers to situations where network speeds are significantly lower than expected, causing delays in data transfer and application responsiveness.
Slow network performance
What are the common cause of slow network performance?
Network congestion, bandwidth limitations, outdated hardware, misconfigured network settings, or malware/viruses.
What are the troubleshooting steps on slow network performance?
- Check bandwidth usage: Identify if any specific device or application is consuming excessive bandwidth.
- Update network equipment: Ensure routers, switches, and network cards have the latest firmware/drivers.
- Perform speed tests: Use online tools to measure network speeds and compare against expected values.
- Optimize network settings: Adjust Quality of Service (QoS) settings, prioritize critical applications, or limit bandwidth for non-essential tasks.
occur when multiple devices on a network are assigned the same IP address, leading to communication problems and network disruptions.
IP Conflicts
What are the common causes of IP Conflicts?
Common causes include manually assigning duplicate IP addresses, DHCP server configuration issues, or rogue devices conflicting with DHCP-assigned addresses.
What are the troubleshooting steps on IP Conflicts?
- Check IP addresses: Verify that no devices have conflicting IP addresses within the same network.
- Release and renew IP addresses: Use the “ipconfig” command (Windows) or “ifconfig” command (Linux) to release and renew IP addresses.
- Restart DHCP server: Power cycle the DHCP server or verify its configuration settings.
- Use static IP addressing: Manually assign unique IP addresses to devices to avoid conflicts.
is a basic network troubleshooting tool used to test connectivity between two devices.
Ping
It sends a small packet of data (ICMP Echo Request) to a target IP address and waits for an ICMP Echo Reply.
Ping
How to use Ping tool
To use ping, open the command prompt (Windows) or terminal (Linux/Mac) and type “ping <IP>".</IP>
This tool will display round-trip time (RTT) information and indicate whether the target device is reachable.
Ping
If the Ping fails, what are the possible other issues?
If the ping fails, it could indicate a connectivity issue, such as a misconfigured network, firewall blocking ICMP, or a device being offline.
is used to trace the route that packets take from your device to a target device or IP address.
Tracert (Windows) / traceroute (Linux/Mac)
It helps identify network hops, latency, and potential points of failure along the path.
Tracert (Windows) / traceroute (Linux/Mac)
How to use Tracert (Windows) / traceroute (Linux/Mac)?
To use tracert (traceroute), open the command prompt or terminal and type “tracert <IP>" (Windows) or "traceroute <IP>" (Linux/Mac).</IP></IP>
This tool will display a list of intermediate routers and their IP addresses, along with round-trip times (RTTs) for each hop.
By analyzing the tracert (traceroute) output
you can identify any network issues, such as high latency or packet loss at specific hops by analyzing what?
By analyzing the tracert (traceroute) output
is used to view and manage IP configuration details of your network interfaces.
ipconfig (Windows) / ifconfig (Linux/Mac)
It provides information about IP addresses, subnet masks, default gateways, DNS servers, and more.
ipconfig (Windows) / ifconfig (Linux/Mac)
This tool will display the IP configuration details for all network interfaces on your device.
ipconfig (Windows) / ifconfig (Linux/Mac)
How to use ipconfig (Windows) / ifconfig (Linux/Mac)?
To use ipconfig (ifconfig), open the command prompt or terminal and type “ipconfig” (Windows) or “ifconfig” (Linux/Mac).
By examining this, you can verify if the correct IP address, subnet mask, and gateway are assigned to your device.
By examining the IP configuration
is a command-line tool used to query DNS (Domain Name System) servers and resolve domain names to IP addresses.
nslookup
It helps troubleshoot DNS-related issues, such as incorrect DNS settings or DNS resolution problems.
nslookup
How to use nslookup?
To use nslookup, open the command prompt or terminal and type “nslookup <domain>".</domain>
This tool will display the corresponding IP address(es) associated with the domain name or vice versa.
nslookup
By using this, you can verify if DNS resolution is working correctly and identify any DNS-related issues.
nslookup
Why we need to understand the network troubleshooting tools?
These network troubleshooting tools provide valuable information for diagnosing and resolving network problems. They help identify connectivity issues, latency, misconfigurations, and DNS-related problems. By using these tools and analyzing their output, you can gain insights into network behavior and take appropriate steps to resolve the issues.
Give me the 1st importance of analyzing network logs and error messages to identify the root cause of issues.
Troubleshooting and Diagnosing:
Network logs and error messages provide valuable information about network events, errors, and anomalies.
They offer insights into the sequence of events leading up to a problem, which helps in identifying the source of the issue.
By examining log entries and error messages, network administrators can gain a better understanding of the problem and its potential causes.
Give me the 2nd importance of analyzing network logs and error messages to identify the root cause of issues.
Identifying Patterns and Trends:
Network logs capture a wide range of information, including device status, network traffic, errors, and performance metrics.
Analyzing logs over time allows for the identification of patterns and trends in network behavior.
By detecting recurring issues or irregularities, network administrators can pinpoint underlying problems or potential sources of network disruptions.
Give me the 3rd importance of analyzing network logs and error messages to identify the root cause of issues.
Incident Response and Resolution:
When a network issue occurs, logs and error messages play a crucial role in incident response.
They provide a detailed timeline of events leading up to the problem, enabling faster identification of the root cause.
Examining error messages can guide administrators in taking appropriate actions to resolve the issue effectively.
Give me the 4th importance of analyzing network logs and error messages to identify the root cause of issues.
Performance Optimization:
Network logs and error messages can shed light on performance bottlenecks, network congestion, or resource limitations.
By analyzing performance-related logs, administrators can identify areas for optimization and fine-tuning.
This analysis helps improve network efficiency, minimize downtime, and enhance overall network performance.
Give me the 5th importance of analyzing network logs and error messages to identify the root cause of issues.
Security Analysis:
Logs can serve as valuable resources for security analysis and threat detection.
They capture information about network traffic, access attempts, authentication failures, and system vulnerabilities.
Analyzing logs can help identify potential security breaches, unauthorized access attempts, or anomalous behavior indicative of a cyberattack.
In general, why network logs are important?
In summary, network logs and error messages provide critical information for troubleshooting, diagnosing, and resolving network issues. They enable network administrators to identify patterns, detect anomalies, respond to incidents, optimize performance, and enhance network security. Analyzing these logs is an essential practice for maintaining a healthy and reliable network infrastructure.
What Network Topology has this Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.
Partial Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.
Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.
Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.
Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.
Tree Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.
Partial Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.
Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.
Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.
Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.
Tree Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.
Partial Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.
Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.
Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.
Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.
Tree Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Allows for customization and flexibility to meet specific network needs.
Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.
Hybrid Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.
Partial Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.
Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.
Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.
Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.
Tree Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Allows for customization and flexibility to meet specific network needs.
Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.
Hybrid Topology
What part of OSI layer will these be?
Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.
Physical Layer
What part of OSI layer will these be?
Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).
Data Link Layer
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
On this type of Mesh Topology, devices have redundant connections with some, but not all, devices.
Partial Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Provides high redundancy and fault tolerance, as multiple paths ensure data can still reach its destination if a link or device fails.
Disadvantages: Requires a significant amount of cabling and is more complex and costly to implement and maintain.
Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Allows for customization and flexibility to meet specific network needs.
Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.
Hybrid Topology
What part of OSI layer will these be?
Examples: Ethernet cables, fiber optics, voltage levels, modulation techniques.
Physical Layer
What part of OSI layer will these be?
Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP).
Data Link Layer
What Network Topology has these Advantages and Disadvantages:
Advantages: Scalable and allows for hierarchical network management, making it suitable for large networks.
Disadvantages: Dependence on the central bus backbone can lead to performance issues if it becomes a bottleneck or experiences a failure.
Tree Topology
What Network Topology has these Advantage and Disadvantages:
Advantages: Simple to implement, requires less cabling, and cost-effective for small networks.
Disadvantages: Network performance may suffer if heavy traffic or a cable failure occurs, and it can be difficult to identify and troubleshoot issues.
Bus Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Data transmission is efficient as each device receives and forwards the data, ensuring equal access to network resources.
Disadvantages: A cable or device failure can disrupt the entire network, and adding or removing devices can be challenging without disrupting the network.
Ring Topology
This principle on information security focuses on keeping sensitive information protected and accessible only to authorized individuals or entities. Measures such as access controls, encryption, and secure communication channels are employed.
Confidentiality
What are the two types of Mesh Topology?
Full-Mesh and Partial Mesh
What Network Topology has these Advantages and Disadvantages:
Advantages: Easy to install, manage, and troubleshoot. If a cable fails, only the affected device is disconnected, while other devices remain functional.
Disadvantages: Requires more cabling than a bus topology, and the central hub represents a single point of failure.
Star Topology
On this type of Mesh Topology, each device has a direct link to every other device
Full-Mesh Topology
What Network Topology has these Advantages and Disadvantages:
Advantages: Allows for customization and flexibility to meet specific network needs.
Disadvantages: Can be complex to design and implement, and may require additional resources and expertise.
Hybrid Topology