Networks CH1 Flashcards
(33 cards)
Involves the exchange of DATA between DEVICES or nodes connected to a network
Networking
can include computers, servers, smartphones, IoT(Internet of Things) devices, and more
Devices
The physical or logical layout of a network, describing how devices are arranged and connected. Common topologies include bus, star, ring, mesh, and tree
Network Topology
OSI meaning
Open Systems Interconnection
A conceptual framework that standardizes the functions of a networking or telecommunication system into seven distinct layers, each with its own responsibilities and protocols.
OSI Model
IP meaning
Internet Protocol
A unique identifier assigned to each device on a network, enabling data to be routed to its intended destination.
IP address
Measures taken to protect the confidentiality, integrity, and availability of data transmitted over a network, including firewalls, encryption, and access control
Network Security
Year where Local Area Networks (Lan) emerged. Ethernet, a popular LAN technology was developed during this period
1970 - 1980
Year where The World Wide Web (WWW) was invented. The introduction of web browser HTML made the internet more accessible
1990s
Year where Wireless networking technology, such as Wi-Fi and cellular networks, gained prominence. Enabling to rise the use of mobile and smartphones
2000s
The year where Internet of Things (IoT) has taken the stage. Billions of devices connecting and exchanging data in the internet. Cloud computing, edge computing and Software defined network emerged as the key trends
2010s
SDN meaning
Software Defined Network
A set of rules that explains how different computer systems communicate over a network
Open Systems Interconnection (OSI) Model
Sets of rules and conventions that define how data is formatted, transmitted, and received over a network. Examples include TCP/IP, HTTP, FTP, and SMTP.
Network Protocols
The highest layer of the OSI model, and the closest to the end-user, all kinds of services like web browsers, email, and more happen on this layer
Application layer (7th layer)
The most vulnerable when it comes to cybersecurity.
Application layer
This layer ensure the incoming data is in an appropriate, presentable form for the recipient
Presentation layer
The layer responsible for converting and formatting the machine-readable code into a form the end-user can understand and use in the application layer
Presentation layer
Data encryption also happens in this layer
Presentation layer
Other name for Session Layer
Port layer
Facilitates the setting up and taking down of connections between two endpoints
Session layer
When two endpoints are communicating with each other, it’s called a ______
Session
The layer that manages the transportation of data, facilitating a reliable arrival of data while also providing error checking functions and data flow controls
Transport layer