Académique Documents
Professionnel Documents
Culture Documents
Bus topology: Computer network in which a "bus" connects all the devices together
through a common cable
cable: Copper Wire(usually coaxial and twister pair and fibre (fibre optic cable-made
from glass) Cables allow for the connection of computers over a network.
check digit : Extra digit added to numerical data that is used to check data integrity
after input, transmission, storage and processing.
data integrity : The accuracy of data after input, transmission, storage or processing.
check sum : Error-detecting procedure that generates a sum from the digits of a
number.
gateway : Link that resides between computer networks and is responsible for
converting data passing through into the appropriate format so it can be understood
by the receiving network.
hub : Network connection point for devices. Data arriving at a hub is copied and
send to all the devices on the network.
local area network (LAN) : Computer network where all the connected computers are
within a limited geographical area (ex. a home, school, etc.). Connection between
the computers may be through cables and/or microwave transmission.
network : Computer systems that are interconnected and can share resources and
data.
packet : Group of bits. May include control signals, error control bits, coded
information, as well as the destination for the data.
packet switch : Network communication method that creates and transmits small
units of data, called packets, through a network, independently of the overall
message.
parity bit : Error-detecting procedure that appends a binary digit to a group of binary
digits. The sum of all the digits, including the appended binary digit, establishes the
accuracy of the data after input, transmission, storage or processing.
protocol : International rules that ensure the transfer of data between systems. A
protocol that is recognized as the standard for a specific type of transfer is called
standard protocol. For example: TCP/IP is a standard protocol.
wide area network (WAN) : Computer network where all the connected computers
are in a larger geographic area than that served by a LAN or a MAN (metropolitan
area network).
4) Compare and contrast the similarities and differences between LAN and WLAN.
Similarities:
Both act on a local level. WLAN
Both allow communication.
Both used to connect devices Both allow sharing of resources
Differences
They use different transmission medium.
A LAN is safer.
The LAN is faster.
WLANs offer greater flexibility.
LAN (Pros)
Sometimes the management of a LAN is easier
LAN (Cons)
A LAN delivers worst performance.
A LAN is not that safe.
It does not provide formation of virtual workgroups.
LANs offer less flexibility.
The partitioning of resources is harder. ,
LANs are dependent on the medium and the physical topology of the network.
VLAN ( Pros)
A VLAN delivers better performance.
A VLAN is safer.
The formation of virtual workgroups is easy.
VLANs offer greater flexibility. Even if someone who is using a laptop moves to
another place he/she will remain in his/her dedicated VLAN.
The partitioning of resources is easier.
VLANs are independent on the medium and the physical topology of the network.
VLAN (Cons)
Sometimes the management of a VLAN is complex.
A network can accommodate a maximum number of VLANs (this number is big and
so it is not a real disadvantage.)
6) Compare and contrast the similarities and differences between LAN and VLAN.
Similarities
Both act on a local
They both have same attributes
Both allow communication
Both used to connect devices
Both allow sharing of resources
Differences
A VLAN delivers better performance.
A VLAN is safer.
The formation of virtual workgroups is easy
VLANs offer greater flexibility. Even if someone who is used a laptop moves to
another place he/she will remain in his/her dedicated VLAN
The partitioning of resources is easier
VLANs are independent on the medium and the physical topology of the network
Sometimes the management/administration of a VLAN is complex.
7) Compare and contrast the Similarities and differences between LAN and WAN
Similarities:
Both allow communication
Both used to connect devices
Both allow sharing of resources
Differences:
A LAN is usually faster
A WAN is more expensive
LAN is easier to main than WAN
LAN serves local areas while WAN saves large geographic areas.
8) Compare and contrast the similarities and differences between VPN and Extranet
Similarities:
Both use the internet
They are both considered inexpensive solutions
They both provide security
Differences:
A VPN provides a secure connection to employees of the company , while an
extranet limits access to the company network to selected(authenticated) outsiders
VPN provides more security (data send and received always encrypted)
9) Compare and contrast the similarities and difference between LAN and PAN
Similarities:
Used for data transmission
Differences
A LAN connects computers and devices belong to different people. while a PAN suits
the needs of a single person
A PAN operates on a smaller area than a LAN
A PAN does not require a device such as hub or switch. USB and Bluetooth
technologies are used instead.
10) Compare and contrast the similarities and differences between the client-server
model and P@P
Similarities:
They both serve a lot of devices and users
They both can act on different scales(local,wider)
Differences:
The client-server model offers a centralised control of services. In P2P model, the
control is decentralised.
The client-server model is based on a server that provides services and client that
request services, which the P2P model includes computers that act as both servers
and clients(suppliers and consumers)
The client-server model offers better security.
1. Easy to manage.
2. Greater understanding of each layer.
3. Common language for each layer.
4. Makes protocol design easier.
5. A manufacturer can focus on technologies of a particular layer.
6. Products of different manufacturers can work together.
7. Technology advances of a layer are independent of technology advancements of
other layers (wireless technology advances are not dependent on advances of media
format compression (GIF))
- Internet Access
- VPN software ( Client software, utilities and server software).
- VPN software enables private communication over the internet
- VPN routers
- VPN appliances
- VPN concentrators
- VPN servers
- Secure VPN (All the traffic on the VPN must be encrypted, authenticated and then
sent along virtual tunnels)
- Trusted VPN (All traffic on the VPN relies on the security of a providers network to
protect the network)
- Hybrid VPN (Hybrid VPN technologies: A combination of both secure and trusted
technologies or a combination of two VPN technologies)
- Site to site VPN: This type of VPN connects entire networks and facilities secure
data interchange between different sites. VPN gateways are used.
There are two types of site-to-site VPNs (intranet and Extranet)
- Remote-Access VPN: This type of VPN connects individual hosts to private
networks and facilities teleworkers who need to access their company’s network
securely using the internet.
Think of it as a example,
1. Communication is easier
2. Companies take advantage of the Internet to provide secure connections
3. Decreases operational costs versus traditional Wide Area Networks
4. Employees work as if they were directly connected to the company's network
5. Extends connections across numerous geographic sites without the use of a
leased line
6. Improves overall productivity
7. Improves productivity of remote employees
8. Improves security
9. Offers the flexibility to employees to take advantage of the company's Intranet
over an existing Internet connection
10. Offers flexibility to remote offices
11. Offers global networking opportunities
12. Provides teleworker support
13. Reduces environmental footprint
14. Reduces travel times and traveling costs for remote users
15. Simplifies network topology for administrators and companies
16. Positive changes in working patterns
18) Compare and Contrast the similarities and differences between OSI and TCP/IP
Similarities:
Both include a number of different layers
They are used to describe network functionality
Differences:
The OSI has more layers than the TCP/IP
OSI is a reference model while TCP/IO is a protocol model
Cloud storage is provided by cloud storage providers such as Dropbox, Microsoft for
OneDrive, Apple for iCloud, and Google for Google Drive. These providers use
various servers, infrastructure and software to provide free or paid data storage to
individuals and companies. All cloud storage providers have the responsibility for
keeping the data available and accessible and maintain in the best possible way
their infrastructure.
Lossy Data Compression: Some data a is loss upon compression. E.g JPEG,
MPEG2
Copper Cable, Coaxial Cable, Unshielded Twisted Pair Cable, Shielded Twisted pair,
Fiber Optic Cable
Microwave Radio( e.g. Satellite ), Infrared, RFID, Bluetooth, Free Space Optics
26)
Datagram Packet Switching: Each datagram takes different route from source to
destination
Virtual Circuit Packet Switching: Each packet is defined route from source to
destination.
A star network consists of one central node (computer or hub), to which all other
nodes (computers) are connected.
Advantages:
Installing a cable can often be difficult.
Installing a cable can often be expensive
Easy to set up a temporary link
Wireless communication is truly wireless
It costs less to set up a wireless network
Easier to plan a wireless network
A lot of public access points exist
It is the only way to connect some devices
Flexibility and Convenience
Disadvantages:
Wireless communication gives relatively low speed
Wireless communication gives high error rate
Wireless communication is affected by weather
Wireless communication offers weakest protection, security and privacy.
Wireless networks are less reliable
Health concerns
Some old devices don’t have wireless connection capability.
Modem: A modem allows you to connect to the internet (It acts as a translation i.e.
modulator / demodulator)
Wireless Network Adopter: It is also known as wireless NIC is required for each
device on wireless network.
Wireless Antennas: Access points and routers frequently utilise Wi-Fi antennas that
significantly increase the effective communication area of the wireless network.
These antennas are fixed, optional or removable.
Ethernet over power line to wireless repeater or wap: It uses power lines to carry the
signals to wireless repeaters or WAP.
Software Firewall: A network security system that determines what data comes in
and goes out of a network or a pc.
NIC Drivers: A network interface card driver is a device driver for the NIC card. A
network interface card driver operates or control the hardware of the card. It acts like
a translator between the wireless card and the application or operating system of the
device.
OS: The operating system handles system resources and is responsible for
managing all the protocols, hardware and applications that have to cooperate in
order that a network can exist and function correctly.
Security Software: It includes all software that prevents unauthorised access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction. It
includes access control, firewall, anti-spyware, anti-subversion software. anti-
sampler software, antivirus software, cryptographic software, ani-key logger.
Web Browser: A Web Browser is an application that is used to find, retrieve and
display content on the WWW, including web pages, text, images, audio, videos and
other content.
33) What can Intruders, hackers and unauthorised users can do?
- Disable Operation
- Disturb the privacy of legitimate users
- Gain Unauthorised access
- Insert virsues or malicious code
- Launch denial of service attacks
- Steal identities
- Steal devices and
- Steal sensitive information that is stored or transmitted.
- Encryption
Symmetric Key Encryption: Single Key Encryption or Secret Key Encryption.
The same key is used for encryption and decryption.
Public-Key Encryption or Asymmetric Key Encryption: This uses a public key for
encryption and a private key for decryption. These two keys are mathematically
linked. This type of encryption is used on the internet. Transport Layer Security or
SSL encryption protocols, used for secure web communication, are based on public
key encryption.
- Free Access
No Security: Wireless routers initially does not have security enabled.
26) Laptops and computers are able to connect to wireless network. State five other
devices that are able to connect to a wireless network.
27) All these devices need a hardware component to connect to the wireless
network. State the name of this component.
Wireless network interface card.
28) State the name of the hardware component that is essential to set up a wireless
network.
Wireless router
Because it uses an Advanced Encryption Standard (AES) block cipher that allows
stronger encryption than WEP. So, it offers greater security.