0% found this document useful (0 votes)
42 views

Data Communication and Networking 1 Prelim Reviewer (AMA)

Uploaded by

misstrinitea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Data Communication and Networking 1 Prelim Reviewer (AMA)

Uploaded by

misstrinitea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Every computer connected to a network is called a host Wide Area Network (WAN), spans a large geographic

or end device. area typically involving a telecommunications service


provider.
Servers are computers that provide information to end
devices on the network. Metropolitan Area Network (MAN), is a computer
network that connects computers within a metropolitan
Clients are computers that sends requests to the area, which could be a single large city, multiple cities
servers to retrieve information such as a web page from and towns, or any given large area with multiple
a web server or email from an email server. buildings.
Client and server software usually run on separate Wireless LAN (WLAN), is a group of collocated
computers. computers or other devices that form a network based
However, in small businesses or homes, it is typical for a on radio transmissions rather than wired connections.
client to also function as the server. These networks are e.g Wi-Fi network is a type of WLAN.
called peer-to-peer networks. Storage Area Network (SAN), is a network of storage
Peer-to-peer networking advantages: easy to set up, devices that can be accessed by multiple servers or
less complex, and lower cost. computers, providing a shared pool of storage space.

Disadvantage: no centralized administration, not as LANS


secure, and slower performance. • Spans a small geographic area
• Usually administered by a single organization or
Network infrastructure contain three broad categories of individual
network components: Devices, Media, Services. • Provides high speed bandwidth to end and
intermediary devices within the network
An End device is where a message originates from or
where it is received. WANS
• WANs interconnect LANs over wide geographical area
Data originates with an end device, flows through the
• Usually administered by multiple service providers
network and arrives at an end device.
• WANs typically provide slower speed links between
An intermediary device interconnects end devices in a LANs
network.
The internet is a worldwide collection of interconnected
The management of data as it flows through a network is LANs and WANs.
also the role of an intermediary device including:
LANs are connected to each other using WANs.
Regenerate and retransmit data signals
Maintain information about what pathways exist WANs are then connected to each other using copper
though the network and internetwork. wires, fiber optic cables, and wireless transmissions.
Notify other devices of error and communication
failures. The internet is not owned by any individual or group,
however it is maintained by: IETF, ICANN, IAB
Networks typically use three types of media:
Metallic wires within cables, such as copper An Intranet is a private collection of LANs and WANs
Glass, such as fiber optic cables internal to an organization that is meant to be accessible
Wireless transmission only to the organization members or others with
authorization.
Network diagrams, often called Topology diagrams,
use symbols to represent devices within the network. An organization might use an Extranet to provide secure
access to their network for individuals who work for a
A physical topology describes how network devices are different organization that need access to their data on
physically connected - in other words, how devices are their network.
actually plugged into each other.
Cable, has a high bandwidth, always on, Internet
Logical topology defines the logical layout of the connection offered by cable television service providers.
network. It describes how the devices in the network DSL, has high bandwidth, always on, Internet
communicate with each other and how data is connection that runs over a telephone line.
transmitted.
Cellular, uses a cellphone network to connect to the
Local Area Network (LAN), spans a small geographic internet, only available where you can get a cellular
area owned or operated by an individual or IT signal.
department.
Satellite, has major benefit to rural areas without Cloud computing is a global trend that allows us to store
Internet Service Providers. personal files or back up our data on servers over the
internet.
Dial-up telephone, is an inexpensive low bandwidth
option using a modem. Four types of Clouds:

Corporate business connections may require higher • Public Clouds


bandwidth, dedicated connections, or managed services. Services and applications are made available to
the general public through a pay-per-use model or for
Dedicated Leased Line, is reserved circuits within the free
service provider’s network that connect distant offices
with private voice and/or data networking. • Private Clouds
Applications and services are intended for a
Ethernet WAN, extends LAN access technology into the specific organization or entity such as the government
WAN.
• Hybrid Clouds
DSL, business DSL is available in various format Made up of two or more cloud types for
including Symmetric, Digital Subscriber Lines. example, part custom and part public, each part remains
Satellite, can provide a connection when a wired a distinctive object but both are connected using the
solution is not available. same architecture.

Converged data networks carry multiple services on one • Custom Clouds


link including data, voice and video. Smart home technology is a growing trend that allows
Network Architecture refers to the technologies that technology to be integrated into every day appliances
support the infrastructure that moves data across the which allows them to interconnect with other devices.
network. Powerline networking can allow devices to connect to a
There are four basic characteristics that the underlying LAN where data network cables or wireless
architectures need to address to meet user expectations: communications are not a viable option.
Fault Tolerance, Scalability, Quality of Service, Security Wireless broadband is another solution for the home and
A Fault Tolerant network limits the impact of a failure by small businesses. Uses the same cellular technology
limiting the number of affected devices. Multiple paths used by a smart phone. An antenna is installed outside
are required for a fault tolerance. This is not possible the house providing wireless or wired connectivity for
with circuit switched networks which establish dedicated devices in the home.
circuits. Network security is an integral part of networking
A Scalable network can explain quickly and easily to regardless of the size of the network.
support new users and applications without impacting Security must be implemented in multiple layers using
the performance of services to existing users. more than one security solution.
Quality of Service is the primary mechanism used to Home or small office based: Antivirus and antispyware,
ensure reliable delivery of content for all users. Firewall
Two main types of network security: Larger network security requirements: Dedicated
• Network infrastructure security firewall, Access Control lists. Intrusion prevention
Physical security of network devices systems, VPN
Preventing unauthorized access to the
management software on those devices Network architecture refers to the devices, connections
• Information Security and products that are integrated to support the
Protection of the information or data transmitted necessary technologies and applications.
over the network
The foundation of all network architectures including the
Three goals of network security: internet are routers and switches.
• Confidentiality, only intended recipients can read the
data
• Integrity, assurance that the data has not been altered
with during transmission
• Availability, assurance of timely and reliable access to
data for authorized users

You might also like