0% found this document useful (0 votes)
6 views12 pages

Computer Networking - Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

Computer Networking - Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

Worksheets Name

Computer Networking Part 2


Class
Total questions: 30
Worksheet time: 16mins
Date
Instructor name: Anupriya Soundararaj

1.

Computer Network
2​ or more computers (or network
devices) connected form a network
​Enables us to share files, printers,
email, and many other resources
​Examples of devices include:
computers, laptops, phones, printers,
scanners, routers, servers, and so
much more.

2.

​Local Area Network (LAN)


​A group of connected computers
within a small geographic area
​Range in size and scale based on use
h​ ome network
​school network
s​ mall office network
​Wireless LANs (WLANs) extend a
LAN to provide wireless connection

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 1/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

3.

​Metropolitan Area Network (MAN)


a​ network that operates within a
large city or multiple small cities
(AKA Metro area)
​much larger than a LAN because it
covers a larger geographic area
​typically operated by local
governments or private companies

4.

​Wide Area Network (WAN)


​ he largest network type
T
​Connects 2 or more LANs together
​Owned and maintained by the owner
of the LANs it connects
​The largest WAN in the world is The
Internet

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 2/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

5.

Intranet
b​ ehind a company firewall
(restricted access)
​content and files are only accessible
by company employees granted
permission
​Company: calendars, photos,
projects, news, groups, etc

6.

​Extranet
v​ ery similar to intranet, but can be
accessed from outside the physical
location of the organization.
​usually requires login/password

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 3/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

7.

​Virtual Private Network (VPN)


​ ecure network connection that
S
allows access to a private network
across a public network (such as The
Internet)
​Secure "tunnel"
​Users get a special username &
password to access company
resources remotely
​Enables employees to work from
home, grant contractor access, etc

8.

​Network Topologies
​ he way a network uses a PHYSICAL layout scheme tells us what type of NETWORK
T
TOPOLOGY it is using.

​ ach topology has a different and unique purpose for the sharing information across the
E
network.
​Bus
​Star
​Ring (aka Token Ring)
​Mesh

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 4/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

9.

​BUS Topology
​ onnects devices through ONE (1)
C
physical line
​Information can flow in only 1
direction
​Only 1 computer can send data at a
time
​Requires a "terminator" at the end of
the cable
​If the cable fails, the entire network
goes down

10.

​STAR Topology
​ ach computer/device connects to
E
one (1) network device
​Network device receives info and
transmits it accordingly
​High speeds because computers can
communicate simultaneously
​If one (1) cable fails, most of the
network keeps running
​Most common topology today

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 5/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

11.

​RING (aka Token Ring) Topology


​ onnects all computers through one
C
(1) single line
​Only one (1) computer can send data
at a time
​Computer must possess a "token" to
send data
​"Token" is passed clockwise
​If main cable fails, entire network
goes down

12.

​MESH Topology
​ ach computer has a DEDICATED
E
connection to EVERY OTHER
COMPUTER.
I​ f one cable fails, the entire network
is still running
​Most secure and reliable
​Most expensive topology due to the
amount of cable required

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 6/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

13.

And now...​

14.

​Lesson Objectives
I​ dentify common network models
​Describe the functions of various network hardware
​Compare and contrast various methods of network connectivity
​ escribe the OSI reference model and each layer
D
​Explain how two network nodes communicate through the OSI model

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 7/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

15.

Client/Server Network Model


Most commonly used model
​Client = the user's computer
​Server = the user requests to use the
server
Server ​Examples:​file, print, ​e-mail,
domain controller
​Advantage: companies can control
security and file backups
​Disadvantage: Expensive and if the
server fails, it could stop all work

16.

Mainframe/Terminal Network Model


Has a main host that other computers interact
with
​However, mainframe computers run ALL
programs directly on the mainframe instead of
on individual computers
​The terminal computers are simply "access
points" to log into the mainframe
​ dvantage: security and software installed on
A
mainframe only
​Disadvantage: Very expensive and network
goes down if mainframe goes down

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 8/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

17.

Peer-to-Peer Network Model


Allows computers to connect to each
other
​Each computer is "both the server
and client"
​Advantage: cost effective and
flexible
​Disadvantage: security risks,
possible legal issues, and extremely
difficult to troubleshoot

18. Which network models provide pretty good overall security?

a) Client/Server b) Peer-to-Peer

c) Mainframe/Terminal

19. Which network model do you run ALL applications on a central computer?

a) Peer-to-Peer b) mainframe/terminal

c) client/server

20. Which network model can cause legal issues in operating/using it?

a) Peer-to-Peer b) mainframe/terminal

c) client/server

21. Which network model is the most commonly used by most companies?

a) client/server b) Peer-to-Peer

c) mainframe/terminal

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 9/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

22.

​Connecting to a Network
Computers - desktop, notebook, tablet, mobile devices

Operating system - Windows, Linux, Mac OS, Mobile OS's, Chrome OS, etc

Network media - the material used (wired or wireless) that connects devices

Network hardware - physical hardware connecting computers across a network

​ etwork protocol - set of rules defining HOW the computers on the network
N
communicate

23.

Network Media
BROADBAND - high-speed, data cables connect computer together. (Media: coaxial, fiber-
optic, and twisted-pair cable <cat5/cat6 etc>)

​ i-Fi (802.11) - Wireless standard for using a WLAN. Based on IEEE 802.11 which has
W
many versions (802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac)

​BLUETOOTH - connects device directly to another by pairing. Best for short range uses
(e.g. headphones, speakers, mouse, etc)

​ ELLULAR - Use cell towers to connect wirelessly (3G, 4G, 5G, etc)
C

​SATELLITE - Wireless through satellites, limited speed, line-of-sight req'd

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 10/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

24.

​Broadband Media Cables

​Coaxial cable Fiber-Optic cable Twisting Pair (CAT-6 etc)

25. Another name for the wires/wireless connection options available to connect computers

a) network media b) network protocol

c) operating system d) network hardware

26. Another name for the routers, hubs, switches, servers, etc

a) network hardware b) operating system

c) network media d) network protocol

27. The rules defining how computers communicate together on a network

a) operating system b) network protocol

c) network hardware d) network media

28. Which are NOT wireless network standards?

a) 802.11b b) 801.11n

c) 802.13g d) 802.11ac

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 11/12
5/3/24, 8:29 AM Computer Networking Part 2 | Quizizz

29.

​The OSI Reference Model

Created to
standardize
how computers
communicate
with one
another

​"All People Seem To Need Data Processing"

30. Which layer of the OSI model is the starting point (transmitting) and end point (receiving) of data as it passes
through networks?

a) data link b) application

c) transport d) physical

https://quizizz.com/print/quiz/66330eeca402ca7fbedb7895 12/12

You might also like