1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Networking
Links computers for shared resources through the internet.
Network
Connect computers and other devices to allow for communication and data sharing.
Purposes of Networks
Communication, Collaboration, Access to Information, Economic Development, Social Development.
Personal Area Network (PAN)
The smallest type of network with a limited span interconnects compatible personal devices.
Local Area Network
Used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.
Campus Area Network
An enterprise network covering multiple buildings in a campus environment, including universities and large organizations.
Metropolitan Area Network
Covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.
Wide Area Network
A much larger network covering vast areas, such as cities, provinces, and countries.
Network Architecture
A diagram displaying the structure of network devices and services to serve the clients' connectivity needs.
Access Networks
In campuses and branches bring users and devices together, such as linking employees in a corporate building.
Networks for Data Centers
In a company link multiple servers with data and applications and make them easily accessible to users.
Wide-area Networks (WANs)
Connect users to programs and services, such as hospital employees connecting to health applications.
Open Systems Interconnection
Provides a structure for networking that secures compatibility in the network hardware and software and expedites the advancement of upcoming networking technologies.
Physical Layer
Handles signal and media.
Data Link Layer
Assigned for the flow of data.
Network Layer
Provides addressing and routing decisions.
Transport Layer
Manages end-to-end delivery to ensure error-free packets.
Session Layer
Establishes, manages, and terminates sessions.
Presentation Layer
Manages protocol conversion and data translation.
Application Layer
Provides support for applications.
Wired Network
Uses cabling and connectors to initiate network connections.
Advantages of Wired Network
Faster network data transfer speed, Inexpensive setup, Not susceptible to outside interference.
Disadvantages of Wired Network
Specialized tools for cable connections, Labor-intensive.
LAN Ethernet Cable
Connects devices within a local area network.
Hub
Interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.
Switch
Initiates a direct connection from the sender to the destination bypassing the data traffic to ensure data privacy.
Cable Modem
Uses a cable connection to create a broadband network connection from a home network to the internet service provider (ISP).
Servers
Provide resources, data, services, and programs to other computers or clients over a network.
Firewall
A security device that monitors and secures incoming and outgoing network traffic based on established security policies.
Wireless Network
Uses radio signals to initiate network connections.
Advantages of Wireless Network
User mobility, Simple installation.
Disadvantages of Wireless Network
Security issues, Slower data transfer.
Wireless Access Point
Connects wireless devices and provides a connection to wired LANs.
Wireless Router
Consists of a router, switch, and wireless access point that uses radio frequency to link networking devices.
Wi-Fi Modem
Combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.
Network Topologies
The physical and logical arrangement of nodes such as a switch or hub and connections in a network.
Point-To-Point
The simplest network topology where two devices, like a computer or router, are connected directly.
Token Ring
Its deterministic nature ensures access to message transmissions at regular or fixed time intervals for each connected station.
Bus
Occurs when computers share the media for data transmission using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.
Star
Most common networking topology in LANs today, where all the devices connect to a central switch or hub.
Mesh
It's when the networking devices are directly connected where several paths exist between the end devices.
Fully meshed topology
If a direct path exists from each end device to other end devices in the network.
Partially meshed topology
If multiple paths are observed between the end devices.
Internet Privacy
Deals with the fundamental human rights of a person's privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.
Techniques to Protect Internet Privacy
Without internet privacy, interested third-party companies will collect and analyze every online activity to take advantage of these data.
Securing a Web Browser
Web browsers such as Google Chrome and Mozilla Firefox are the most used browsers online for their specific features and familiarity, although a total security guarantee is not automatic.
Using a Virtual Private Network (VPN)
Best way to have Internet privacy.
Double-checking Unfamiliar Links
Never trust links from suspicious emails, sketchy websites, and advertisements.
Limited Sharing on Social Media
Social media platforms like Instagram, Facebook, and Twitter are all publicly accessible.
Using Multi-factor Authentication
It's an added verification step besides a conventional password.
Network Security
Ensures the integrity, confidentiality, and accessibility of computer networks.
Intrusion Detection System (IDS)
A software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
Wi-Fi Protected Access 3 (WPA3)
The latest wireless network security certificate protocol by the WiFi alliance.
Virtual Private Network (VPN)
Connects any remote device to an enterprise server wherein company data is hosted.
Email Security
The most effective security methods include email spam filters with deep learning to filter domains that send spam.
Revenue Loss
One of the most significant consequences companies face during an internet, and network downtime.
Maintenance Cost
Repairing damaged internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.
Lesser Productivity
Internet and network failure significantly affect productivity as tasks heavily rely on the internet.
Damaged Reputation
If internet and network failures regularly occur, it negatively impacts the employees and the company's clients and partners.
Legal Repercussions
Failures in operations and transactions mean failure to meet agreed upon outputs and deliverables on time.