top of page

NETWORKS | QUESTION BANK

Network Fundamentals

​Identify different types of networks. A network is a connection of two or more computers. The World Wide Web is different from the Internet. There are different types of networks, such as Local Area Network (LAN), which connects devices within a limited area, and Wide Area Network (WAN), which spans a larger geographical area. Wireless Local Area Network (WLAN) uses wireless technology to connect devices, while Personal Area Network (PAN) connects devices within a person's immediate proximity. Virtual Private Network (VPN) allows remote users to access a private network securely, and Storage Area Network (SAN) provides access to high-speed storage devices for storing large amounts of data.

Describe how communication over networks is broken down into different layers. The OSI (Open Systems Interconnection) Seven Layer Model is a theoretical model that explains how data is transmitted between networked devices. It consists of seven layers - Physical, Data Link, Network, Transport, Session, Presentation, and Application. The Physical layer is responsible for transmitting and receiving raw bitstreams, while the Data Link layer ensures reliable data transfer between adjacent nodes. The Network layer routes data between different networks, and the Transport layer provides reliable end-to-end communication between applications. The Session layer manages communication sessions between applications, and the Presentation layer represents data in a format that can be understood by applications. The Application layer is responsible for providing application services to users, including protocols and services that support applications like email, file transfer, and web browsing.

Identify the technologies required to provide a VPN. To provide a VPN, the main components required are a VPN client, VPN server, VPN protocol, authentication, and encryption. The VPN client establishes the encrypted connection to the remote server, while the VPN server decrypts the traffic from the client and encrypts the traffic sent back to the client. Common VPN protocols include OpenVPN, IKEv2, and L2TP/IPsec, and authentication is done using a username and password, digital certificates, or other methods. Encryption is used to protect data transmission between the client and the server. VPNs use a process called tunneling to encapsulate and encrypt data, creating a new packet that contains the original data and transmitting it through a tunnel between two devices. The process involves encapsulating the data, encrypting the packet, transmitting it through the tunnel, and decrypting the packet at the destination. Tunneling adds an extra layer of security, making it more challenging for attackers to intercept and access sensitive information transmitted over an insecure network.

Evaluate the use of a VPN A VPN, or Virtual Private Network, allows users to create a secure and encrypted connection between their device and a remote server over the internet, creating a private network that enables secure and anonymous access to the internet and other resources, especially on public Wi-Fi networks. The advantages of using a VPN include improved security, privacy, access to restricted content, remote access, and cost savings. By encrypting internet traffic and hiding users' IP addresses, a VPN provides a secure and private connection to the internet, regardless of location or network used.

Data Transmission

Define the terms: protocol, data packet. A protocol is a set of rules and procedures that govern the communication between devices and the operation of computer networks. Protocols provide a standardized way for devices to communicate with each other, ensuring compatibility, efficiency, reliability, and security. Packet switching is a technique for transmitting data over a network by breaking it down into smaller units called packets. Each packet contains a portion of the data, along with a header that contains information about the packet, such as its source and destination addresses. When the packets are transmitted, they may take different routes to reach their destination, and at the receiving end, the packets are reassembled into the original data. Packet switching allows for efficient and reliable data transmission by optimizing network resources and ensuring data integrity.​

Teacher don't teach me nonsense  

                                       

                     - Fela Kuti

bottom of page