Topic 3: Networks Flashcards
Local area network (LAN)
A network that covers a local area.
- This usually includes a local office/building, thought they’re also somewhat common in homes now thanks to the spread of Wi-Fi.
Wide area network (WAN)
A network that covers a wider area than a LAN.
- Distances can range from a network connecting multiple buildings on a corporate or college campus to satellite links connecting offices in different countries.
Virtual local area network (VLAN)
A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution. A VLAN allows a network of computers and users to communicate in a simulated environment as if they exist in a single LAN.
- VLANs are implemented to achieve scalability, and ease of network management.
Storage area network (SAN)
A secure high-speed data transfer network that provides access to consolidated block-level storage. A SAN makes a network of storage devices accessible to multiple servers.
Wireless local area network (WLAN)
A wireless distribution method for two or more devices that use high-frequency radio waves and often includes an access point to the internet.
- A WLAN allows users to move around the coverage area (often a home or small office) while maintaining a network connection.
- A WLAN is sometimes called a Wi-Fi network, but can include other transmission technologies.
Internet
A globally connected network (a network of networks) that uses the TCP/IP protocols to transmit data via various types of media.
Extranet
- A controlled private network that allows customers, partners, vendors, suppliers, and other businesses to gain information (typically about a specific company or educational institution) and do so without granting access to the organization’s entire network.
- An extranet is often a private part of a website. It is restricted to select users through user IDs, passwords, and other authentication mechanisms ion a login page.
Virtual private network (VPN)
Uses the internet to log into a network remotely and access its resources, but encrypts the connection to thwart eavesdroppers.
- If a company sets you up with a VPN, you can access your corporate intranet, file servers, or email from home or a coffee shop – just as if you were using it from your office.
Personal area network (PAN)
A network covering a very small area, usually a room.
- The best-known wireless PAN network technology is Bluetooth, and the most popular wired PAN is USB.
Peer-to-peet (P2P)
A network model in which files are exchanged.
- Some experts describe it as an “equal client” system where instead of accessing files from a server, the “peer” computers just swap them amongst each other.
Standards
The common ground on which hardware and software manufacturers can depend on to build systems that can communicate with each other. As such, they are thought to provide a common international “language” that enables compatibility for all computer systems throughout the globe.
OSI model layers
Application: Human-computer interaction layer, where applications can access the network services
Presentation: Ensures that data is in a usable format and is where data encryption occurs
Session: Maintains connections and is responsible for controlling ports and sections
Transport: Transmits data using transmission protocols including TCP and UDP
Network: Decides which physical path the data will take
Data Link: Defines the format of data on the network
Physical: Transmits raw bit stream over the physical medium
Fundamental VPN technologies
Encryption: The process of encoding data so that only a computer with the right decoder will be able to read and use it
Tunneling: Involves establishing and maintaining a logical network connection (that may contain intermediate hops). On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, and finally de-encapsulated on the receiving side.
In a VPN, the computers at each end of the tunner encrypt the data entering the tunner and decrypt it at the other end.
Pros and cons of VPN
Pros:
- info can be accessed in remote places
- no need for long distance leased lines (therefore decreased cost)
- enhanced security through encryption
Cons:
- not all VPN products are compatible across different vendors
- reliability is not directly under the organization’s control
- needs a professional to ensure sufficient security and protection
Pro or Con: telecommuting
Data Packet
Define
A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched
network.