0% found this document useful (0 votes)
15 views2 pages

Class Note 3: Computer Networks

Intro into Computer Networks

Uploaded by

Dillon Sterling
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Class Note 3: Computer Networks

Intro into Computer Networks

Uploaded by

Dillon Sterling
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Networks

Page 1
Network Fundamentals

Network Topology: The physical and logical arrangement of devices in a network,


including:
Bus Topology: A single cable connects all devices in a linear sequence.
Star Topology: All devices connect to a central hub or switch.
Ring Topology: Devices connect in a circular configuration, and data
travels in one direction.
Mesh Topology: Each device connects to every other device, providing
multiple paths for data transmission.
Network Protocols: A set of rules and standards that govern data communication
over a network, including:
TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of
protocols used for routing and addressing data packets over the internet.
HTTP (Hypertext Transfer Protocol): A protocol used for transferring data
over the web, including web pages and files.
FTP (File Transfer Protocol): A protocol used for transferring files over a
network.
Network Devices: Hardware components that facilitate communication over a
network, including:
Routers: Devices that connect multiple networks and route data packets
between them.
Switches: Devices that connect multiple devices within a network and
forward data packets between them.
Firewalls: Devices or software that monitor and control incoming and
outgoing network traffic based on security rules.

Network Layers

Physical Layer (Layer 1): Defines the physical means of data transmission,
including cable specifications, wireless transmission, and network topology.
Data Link Layer (Layer 2): Provides error-free transfer of data frames between
two devices on the same network, including flow control and error detection.
Network Layer (Layer 3): Routes data packets between networks, including
addressing, routing, and congestion control.
Transport Layer (Layer 4): Provides reliable data transfer between devices,
including segmentation, acknowledgment, and reassembly.
Session Layer (Layer 5): Establishes, manages, and terminates connections
between applications, including dialogue control and synchronization.
Presentation Layer (Layer 6): Converts data into a format that can be
understood by the receiving device, including data compression and encryption.
Application Layer (Layer 7): Provides services and interfaces for applications
to communicate with each other, including email, file transfer, and web browsing.

Page 2
Network Security

Threats: Malicious activities or entities that can compromise network security,


including:
Viruses: Malicious software that replicates itself and spreads to other
devices.
Worms: Self-replicating malware that spreads without human interaction.
Trojans: Malicious software that disguises itself as legitimate software.
Spyware: Malware that monitors and collects user data without consent.
Security Measures: Techniques and technologies used to protect networks from
threats, including:
Firewalls: Network devices or software that monitor and control incoming
and outgoing network traffic based on security rules.
Antivirus Software: Programs that detect and remove malware from devices.
Encryption: The process of converting plaintext data into unreadable
ciphertext to protect it from unauthorized access.
Authentication: The process of verifying the identity of users, devices, or
systems before granting access to network resources.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy