We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
6th of October Technological University
Faculty of Industrial and Energy Technology
Course Name: Introduction to Cyber Security Course Code: ……
Semester: 1st Semester Lecturer: Dr. Mohamed Shalaby
Sheet 1 & 2
1. What is meant by each term of the following;
Network Two or more computers connected together in a way that it allows resource sharing. Categories of networks according to the coverage area Local area network LAN: collection of computers that can extend up to few meters “100 m”. Metropolitan area network MAN: collection of computers that can extend up to a city “few kilometers”. Wide area network: collection of computers that can extend up to a lot of kilometers such as the internet. Server based network Collection of computers connected together through a server. 2. What is the function offered by each term of the following; Active hub The “hub” can connect a lot of computers whereas the “active” means that the hub can amplify the signal before sending it to the other parities. Router It can connect a lot of networks even they have different protocols. Modem It consists of two devices which are; modulator and demodulator. They can match the digital computer data to the signal that can go through communication channel over long distances. 3. What are the merits and demerits of the mesh network topology; The mesh topology has a high availability. On the other side, it has a high cost.
*********************************** With our best wishes Dr. Mohamed Saeid Shalaby
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
Computer Networking: The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging