100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network-Security Fundamentals Course Notes $10.49   Add to cart

Exam (elaborations)

Network-Security Fundamentals Course Notes

 6 views  0 purchase
  • Course
  • Network and Security Foundations
  • Institution
  • Network And Security Foundations

Network-Security Fundamentals Course Notes

Preview 3 out of 18  pages

  • September 13, 2024
  • 18
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Network and Security Foundations
  • Network and Security Foundations
avatar-seller
EXAMSHAVEN1
9/13/24, 11:05 Network-Security Fundamentals Course
PM Notes




1. Introduction to Computer Networks
Protocol: a set of rules established for users to exchange information
Topology: the physical architecture of a network
Network Topologies:
- Star: the most common networking topology in today’s LANs. Devices are connected
via twisted-pair cables with modular plugs. At the center of the network is a switch
or hub, connecting the network devices and facilitating the transfer of data.
- Bus: All LAN data traffic is carried over a common coaxial cable link. This topology
prevents data transmission from being very bandwidth efficient.
- Mesh: All devices are directly connected to each other, providing full redundancy in
the network data paths. This method is very costly due to the additional data paths,
which increase cabling and networking hardware costs.
- Token Ring: A “token” is placed in the data channel and circulates around the ring.
For a user to transmit data, it must wait until it has control of the token, known as
token passing. This is known as a deterministic network, where access to the
network is provided at fixed time intervals.
OSI (Open Systems Interconnection) Model: A seven-layer model that provides a framework for
networking, ensuring compatibility in the network hardware and software, along with
accelerating the development of new networking technologies.
1. Physical Layer: provides electrical and mechanical connection to the network.
2. Data Link Layer: handles error recovery, flow control, and sequencing. It is
considered the “media access control layer” and where MAC addressing is defined.
3. Network Layer: accepts outgoing messages and combines messages or segments
into packets, adding a header that includes routing information. It acts as the
network controller. ftIP, IPX)
4. Transport Layer: Is concerned with message integrity between source and
destination. It also segments/reassembles packets and handles flow control. ftTCP,
UDP)
5. Session Layer: Provides the control functions necessary to establish, manage, and
terminate the connections as required to satisfy the user request. ftNFS, SQL)
6. Presentation Layer: Accepts and structures the messages for the application. It
translates the message from one code to another, if needed. This layer is responsible
for data compression and encryption. ftASCII, JPEG)
7. Application Layer: Interacts with application programs that incorporate a
communication component such as your Internet browser and email. This layer is
responsible for logging the message in, interpreting the request, and determining
what information is needed to support the request. ftHTTP, FTP, SMTP)




about:bl 1/

,9/13/24, 11:05 Network-Security Fundamentals Course
PM Notes




Frame: a format the provides grouping of the information for transmission, which includes
header, data, and trailer.
- The header includes the preamble fta pattern of 1’s and 0’s for synchronization), start
frame delimiter ft8-bit binary sequence indicating the frame start), destination MAC
addresses, source MAC addresses, and length/type field ftindication of the number of
bytes in the data field).
- The data section includes the actual data being transmitted, and the padding ftused
to bring the total bytes up to the 46-byte minimum if the data is less).
- The trailer section includes the frame check sequence fta 4-byte cyclic redundancy
check [CRC] used for error checking).
Jumbo Frame: any frame that has data above 1500 MB’s

MAC (Media Access Control) Address: a unique address contained in each NIC ftNetwork
Interface Card) which is made up of 6 bytes ftdisplayed in 12 hexadecimal digits). The first 6
digits, known as the OUI ftorganizationally unique identifier), and the last 6 digits form a unique
value for each NIC. You can find your MAC address ftsometimes known as physical address), by
going in the CMD prompt and typing “ipconfig /all”.
IP (Internet Protocol) Address: a unique address that identifies the computer’s local network,
assigned by the IANA ftInternet Assigned Numbers Authority). They are classified as IPv4 or IPv6,
with IPv4 being the current TCP/IP addressing technique used on the Internet. The IP address is
a 32-bit address that identifies which network a computer is located and differentiates the
computer from all other devices on said network. IP Addresses are written as 4, 8-bit parts, with
the format being A.B.C.D, which each section ranging from 0-255.
IP Address Classes ftthe numbers indicate the network number, while the x’s indicate the host or
device number):
Class Description IP Examples Max Hosts
Class A Governments/Large Networks 44.x.x.x or 8.x.x.x 2^24=16,777,214
Class B Midsize companies, universities, etc. 128.123.x.x 2^16=65,534
Class C Small Networks 192.189.1.x 2^8=254
Class D Multicast Groups 224.x.x.x N/A
Intranet: an internal network that provides file and resource sharing but is not accessed from
the Internet.

Wireless Standards:
- 802.11a: provides data transfer rates up to 54 Mbps at a range of 75 ft; 5GHz
- 802.11b: provides data transfer rates up to 11 Mbps at a range of 100-150 ft; 2.4GHz
- 802.11g: provides data transfer rates up to 54 Mbps at a range of 150 ft; 2.4GHz
- 802.11n: provides data transfer rates at 200+ Mbps; 2.4GHz or 5GHz
- 802.11ac: provides data transfer rates up to 1.3 Gbps; 5GHz




about:bl 2/

, 9/13/24, 11:05 Network-Security Fundamentals Course
PM Notes




about:bl 3/

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMSHAVEN1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart