Networks CH1 Flashcards
Involves the exchange of DATA between DEVICES or nodes connected to a network
Networking
can include computers, servers, smartphones, IoT(Internet of Things) devices, and more
Devices
The physical or logical layout of a network, describing how devices are arranged and connected. Common topologies include bus, star, ring, mesh, and tree
Network Topology
OSI meaning
Open Systems Interconnection
A conceptual framework that standardizes the functions of a networking or telecommunication system into seven distinct layers, each with its own responsibilities and protocols.
OSI Model
IP meaning
Internet Protocol
A unique identifier assigned to each device on a network, enabling data to be routed to its intended destination.
IP address
Measures taken to protect the confidentiality, integrity, and availability of data transmitted over a network, including firewalls, encryption, and access control
Network Security
Year where Local Area Networks (Lan) emerged. Ethernet, a popular LAN technology was developed during this period
1970 - 1980
Year where The World Wide Web (WWW) was invented. The introduction of web browser HTML made the internet more accessible
1990s
Year where Wireless networking technology, such as Wi-Fi and cellular networks, gained prominence. Enabling to rise the use of mobile and smartphones
2000s
The year where Internet of Things (IoT) has taken the stage. Billions of devices connecting and exchanging data in the internet. Cloud computing, edge computing and Software defined network emerged as the key trends
2010s
SDN meaning
Software Defined Network
A set of rules that explains how different computer systems communicate over a network
Open Systems Interconnection (OSI) Model
Sets of rules and conventions that define how data is formatted, transmitted, and received over a network. Examples include TCP/IP, HTTP, FTP, and SMTP.
Network Protocols
The highest layer of the OSI model, and the closest to the end-user, all kinds of services like web browsers, email, and more happen on this layer
Application layer (7th layer)
The most vulnerable when it comes to cybersecurity.
Application layer
This layer ensure the incoming data is in an appropriate, presentable form for the recipient
Presentation layer
The layer responsible for converting and formatting the machine-readable code into a form the end-user can understand and use in the application layer
Presentation layer
Data encryption also happens in this layer
Presentation layer
Other name for Session Layer
Port layer
Facilitates the setting up and taking down of connections between two endpoints
Session layer
When two endpoints are communicating with each other, it’s called a ______
Session
The layer that manages the transportation of data, facilitating a reliable arrival of data while also providing error checking functions and data flow controls
Transport layer
Two main protocols associated with the transport layer
Transmission Control Protocol & User Datagram Protocol
meaning of TCP
Transmission Control Protocol
meaning of UDP
User Datagram Protocol
This layer routes and reroutes data through various physical networks, facilitating data transmission to its destinations.
Network layer
The layer that receives and transmits packets of information from and to the physical network devices. It manages how much data should be allowed to be transferred to the next layer and assesses possible errors in data transmission.
Data link layer
2 sub layer of data link layer
Logical Link Control & Media Access Control
meaning of LLC
Logical Link Control
meaning of MAC
Media Access Control
The layer that covers the physical components of the network or computing system: cables, routers, endpoints, etc.
Physical layer