Uploaded by Matthew Kwarteng

indellible flow

advertisement
1. Wireless and Mobile Network:
Introduction:
● A wireless network is a communication network that uses radio waves to transmit and
receive data.
● Mobile networks are wireless networks designed for mobile devices such as
smartphones, tablets, and laptops.
Types of Wireless Networks:
● Wireless Personal Area Network (WPAN): A personal network used for
communication between devices in proximity, usually within 10 meters. Examples
include Bluetooth and Zigbee.
● Wireless Local Area Network (WLAN): A network that connects devices within a
limited area, such as a building or campus. Examples include Wi-Fi and Wimax.
● Wireless Metropolitan Area Network (WMAN): A network that connects devices
over a larger geographic area, such as a city. Examples include WiMAX and LTE.
● Wireless Wide Area Network (WWAN): A network that connects devices over a
large geographic area, such as a country or continent. Examples include 2G, 3G, 4G,
and 5G.
Mobile Network Standards:
● 1G (First Generation) - Analog cellular networks that were introduced in the 1980s.
They allowed voice calls and had a low data transfer rate.
● 2G (Second Generation) - Digital cellular networks that were introduced in the 1990s.
They allowed voice calls and limited data transfer.
● 3G (Third Generation) - High-speed digital cellular networks that were introduced in
the 2000s. They provided better voice quality and higher data transfer rates.
● 4G (Fourth Generation) - All-IP based high-speed digital networks that were
introduced in the 2010s. They provided even higher data transfer rates and lower
latency.
● 5G (Fifth Generation) - Advanced digital networks with high data rates, low latency,
and massive connectivity. They were introduced in the 2020s.
Mobile Network Architecture:
● Radio Access Network (RAN): The part of the mobile network that connects mobile
devices to the core network. It includes base stations, antennas, and other equipment.
● Core Network (CN): The part of the mobile network that connects the RAN to the
Internet or other networks. It includes switches, routers, and other equipment.
● User Equipment (UE): The mobile device that connects to the mobile network.
Wireless Network Security:
● Encryption: The process of converting data into a code that can only be read by
authorized users.
● Authentication: The process of verifying the identity of a user or device.
● Access Control: The process of controlling who has access to a wireless network. ●
Firewall: A security system that controls incoming and outgoing network traffic. ●
Intrusion Detection and Prevention: The process of detecting and preventing
unauthorized access to a wireless network.
Advantages:
● Convenience: Wireless and mobile networks allow for more flexibility and
convenience compared to wired networks. Users can access the network from
anywhere within the coverage area.
● Mobility: Mobile networks allow users to stay connected while on the move, enabling
them to access information and communicate with others at any time and from any
location.
● Cost savings: Wireless networks can be more cost-effective than wired networks, as
they require less cabling and infrastructure.
● Scalability: Wireless networks can be easily scaled up or down depending on the
number of users and devices.
● Accessibility: Wireless networks can provide connectivity to remote areas where
wired networks are not available.
Disadvantages:
● Interference: Wireless networks can be affected by interference from other wireless
networks, electronic devices, or physical obstructions such as walls and buildings.
● Security: Wireless networks are more vulnerable to security threats, such as hacking
and eavesdropping, compared to wired networks.
● Limited range: Wireless networks have a limited range and coverage area, which can
be a disadvantage in large buildings or outdoor areas.
● Speed: Wireless networks can have slower data transfer rates compared to wired
networks, depending on the network technology and coverage.
● Reliability: Wireless networks can be less reliable than wired networks, as they can
experience downtime or interruptions due to interference, network congestion, or
other issues.
Applications of wireless and mobile networks:
1. Mobile Communications: Wireless and mobile networks enable users to communicate
and access information on the move. This includes voice and video calls, messaging,
email, and web browsing.
2. Internet of Things (IoT): Wireless and mobile networks are used to connect and
control smart devices, such as home automation systems, wearable technology, and
3.
4.
5.
6.
7.
industrial sensors. IoT devices rely on wireless networks for connectivity and data
transfer.
Location-based Services: Wireless and mobile networks enable location-based
services, such as GPS navigation, geotagging, and location-based advertising. These
services rely on wireless networks to determine the location of a mobile device and
provide relevant information.
Entertainment: Wireless and mobile networks provide access to entertainment
services, such as streaming video and music, online gaming, and social media. These
services rely on wireless networks for high-speed data transfer and low latency.
Healthcare: Wireless and mobile networks are used in healthcare for remote patient
monitoring, telemedicine, and mobile health applications. These services rely on
wireless networks for real-time data transfer and connectivity.
Education: Wireless and mobile networks are used in education for e-learning, virtual
classrooms, and online collaboration. These services rely on wireless networks for
connectivity and data transfer.
Transportation: Wireless and mobile networks are used in transportation for vehicleto-vehicle communication, vehicle-to-infrastructure communication, and intelligent
transportation systems. These services rely on wireless networks for real-time data
transfer and connectivity.
2. Web Technology
Web technologies refer to the tools, languages, and protocols used to develop and deliver
web applications and services. The World Wide Web (WWW) is the primary platform for
web technologies, which includes websites, web applications, and web services. The
following are some key components of web technologies:
1. HTML: Hypertext Markup Language (HTML) is the standard markup language used
to create web pages. It defines the structure and content of a web page using tags and
attributes.
2. CSS: Cascading Style Sheets (CSS) is a stylesheet language used to define the
presentation of a web page, including the layout, colours, fonts, and other visual
elements.
3. JavaScript: JavaScript is a scripting language used to add interactivity and dynamic
functionality to web pages. It can be used to create animations, validate forms, and
manipulate the Document Object Model (DOM) of a web page.
4. Web servers: Web servers are software programs that run on a server computer and
respond to client requests for web pages or web services. Examples of web servers
include Apache, Nginx, and Microsoft IIS.
5. HTTP: Hypertext Transfer Protocol (HTTP) is the protocol used to transfer data over
the web. It defines how client and server applications communicate with each other to
request and deliver web content.
6. Web frameworks: Web frameworks are software libraries that provide a set of prebuilt components and tools to facilitate web development. Examples of web
frameworks include React, Angular, and Django.
7. Web services: Web services are applications that provide data and functionality over
the web, using standards such as SOAP, REST, and XML-RPC. Examples of web
services include APIs, RSS feeds, and webhooks.
Web technologies have revolutionized the way we access and consume information,
communicate with others, and conduct business. They have enabled the creation of dynamic,
interactive web applications and services that are accessible from any device with an internet
connection.
Advantages of Web Technologies:
1. Platform independence: Web technologies are based on open standards that are
accessible from any platform, device or operating system.
2. Wide reach: Web technologies have a global reach and can be accessed from
anywhere with an internet connection.
3. Low cost: Web technologies are often more cost-effective than traditional software
development because they can be developed once and deployed across multiple
platforms.
4. Easy maintenance: Web technologies can be updated and maintained centrally,
reducing the need for software installations and updates on individual devices.
5. Scalability: Web technologies can scale to accommodate large numbers of users and
provide high availability.
Disadvantages of Web Technologies:
1. Security risks: Web technologies are vulnerable to security risks, such as hacking,
phishing, and malware attacks.
2. Limited functionality: Web technologies may not have the same level of functionality
as native applications that are developed for specific platforms.
3. Performance issues: Web technologies may suffer from performance issues, such as
slow loading times or limited processing power.
4. Browser compatibility issues: Web technologies may not be compatible with all web
browsers, which can affect the user experience.
5. Dependence on the internet: Web technologies require an internet connection, which
can limit their use in areas with poor connectivity.
Applications of Web Technologies:
1. E-commerce: Web technologies are widely used in e-commerce for online shopping,
payment processing, and inventory management.
2. Social media: Web technologies are used in social media platforms, such as Facebook
and Twitter, for user engagement, content sharing, and advertising.
3. Online gaming: Web technologies are used in online gaming for multiplayer games
and social features.
4. Education: Web technologies are used in online education for e-learning platforms,
virtual classrooms, and online assessments.
5. Healthcare: Web technologies are used in healthcare for telemedicine, online
consultations, and remote patient monitoring.
6. Publishing: Web technologies are used in digital publishing for online magazines, ebooks, and digital newspapers.
7. Business operations: Web technologies are used in business operations for project
management, CRM, and other business applications.
3. Network system administration:
Network system administration involves managing and maintaining computer networks and
their components, including servers, routers, switches, and other network devices. A network
administrator is responsible for ensuring that the network is secure, reliable, and efficient.
The following are some key components of network system administration:
1. Network design: Network design involves planning and implementing the
architecture of a computer network. It includes selecting hardware and software
components, configuring network protocols, and setting up security measures.
2. Network monitoring: Network monitoring involves tracking the performance and
activity of a computer network. It includes monitoring network traffic, identifying
bottlenecks and failures, and analysing network data to improve network
performance.
3. Network security: Network security involves protecting a computer network from
unauthorized access, attacks, and other security threats. It includes implementing
security protocols, configuring firewalls and intrusion detection systems, and
monitoring network activity for potential security breaches.
4. Network maintenance: Network maintenance involves keeping a computer network
running smoothly and efficiently. It includes routine tasks such as updating software,
backing up data, and troubleshooting network issues.
5. Network documentation: Network documentation involves creating and maintaining
records of network configurations, hardware and software components, and other
network information. It includes network diagrams, system logs, and other
documentation that can be used to troubleshoot network issues and improve network
performance. 6.
Network system administration is essential for businesses and organizations that rely on
computer networks for their daily operations. A well-managed network can improve
productivity, reduce downtime, and enhance security. Network administrators are responsible
for ensuring that the network is reliable and secure, and they must stay up-to-date with the
latest technologies and best practices for network management.
6. User management: User management involves managing user accounts and
permissions on the network. This includes creating and deleting user accounts,
assigning permissions and access levels, and managing user passwords.
7. Network performance tuning: Network performance tuning involves optimizing the
network for maximum performance and efficiency. This includes configuring network
settings and parameters to improve network speed, reduce latency, and minimize
network congestion.
8. Disaster recovery and business continuity: Network system administrators are
responsible for planning and implementing disaster recovery and business continuity
strategies. This includes backing up data, creating disaster recovery plans, and testing
these plans regularly to ensure that they are effective.
9. Virtualization: Network system administrators are often responsible for managing
virtualized environments, which involve running multiple virtual machines on a
single physical server. This includes configuring virtual networks, managing virtual
machine resources, and troubleshooting virtualization issues.
10. Cloud computing: Network system administrators are also responsible for managing
cloud computing environments, which involve running applications and services on
remote servers over the internet. This includes configuring and maintaining cloud
infrastructure, monitoring cloud performance, and ensuring cloud security. 11.
Overall, network system administration requires a combination of technical knowledge,
problem-solving skills, and attention to detail. Network administrators must be able to
troubleshoot network issues quickly and efficiently, and they must be able to communicate
effectively with other IT professionals and end-users. The field of network system
administration is constantly evolving, and network administrators must stay up-to-date with
the latest technologies and best practices to ensure that their networks are secure, reliable,
and efficient.
Characteristics:
● Network system administration involves managing and maintaining computer
networks and their components.
● A network administrator is responsible for ensuring that the network is secure,
reliable, and efficient.
● Network administrators must stay up-to-date with the latest technologies and best
practices to ensure that their networks are secure, reliable, and efficient.
● Network system administration requires a combination of technical knowledge,
problem-solving skills, and attention to detail.
Advantages:
● Well-managed networks can improve productivity, reduce downtime, and enhance
security.
● Network system administration can help to optimize network performance and
efficiency.
● Disaster recovery and business continuity strategies can help to minimize data loss
and downtime in the event of a disaster.
● Virtualization and cloud computing can provide greater flexibility and scalability.
Disadvantages:
● Network system administration can be complex and time-consuming.
● Managing network security can be challenging, particularly in the face of evolving
security threats.
● Implementing disaster recovery and business continuity strategies can be expensive
and time-consuming.
● Virtualization and cloud computing can introduce new security risks and require
specialized technical knowledge.
Overall, network system administration plays a critical role in ensuring that computer
networks are secure, reliable, and efficient. However, it can be a complex and challenging
field, requiring a combination of technical knowledge, problem-solving skills, and attention
to detail. Network administrators must stay up-to-date with the latest technologies and best
practices to ensure that their networks are secure, reliable, and efficient.
4. Distributed systems:
1. Definition: A distributed system is a collection of independent computers that work
together as a single system. The computers in a distributed system communicate with
each other through a network, and each computer has its own memory and processing
power.
2. Characteristics: Distributed systems are characterized by several key features,
including:
● Decentralization: There is no central control or hierarchy in a distributed system.
● Autonomy: Each computer in a distributed system is independent and can make its
own decisions.
● Concurrency: Multiple computers in a distributed system can execute tasks
simultaneously.
● Scalability: Distributed systems can be scaled up or down to handle different
workloads.
● Fault tolerance: Distributed systems can continue to operate even if one or more
computers fail.
3. Types of distributed systems: There are several types of distributed systems,
including:
● Client-server architecture: This architecture involves a central server that provides
services to multiple clients.
● Peer-to-peer architecture: This architecture involves multiple computers that work
together as peers, without a central server.
● Distributed database systems: These systems involve multiple databases that are
distributed across a network.
● Distributed file systems: These systems involve multiple computers that store and
access files in a distributed manner.
4. Challenges of distributed systems: Distributed systems present several challenges,
including:
● Network latency: The time it takes for computers to communicate with each other
over a network can be significant.
● Network partitioning: Network partitions can occur when communication between
computers in a distributed system is disrupted.
● Consistency: Ensuring consistency of data across a distributed system can be
challenging.
● Security: Distributed systems are vulnerable to security threats such as unauthorized
access and data breaches.
5. Applications of distributed systems: Distributed systems are used in a wide range of
applications, including:
● Web applications: Many popular web applications, such as social media platforms,
use distributed systems to handle high traffic loads.
● Cloud computing: Cloud computing involves the use of distributed systems to provide
on-demand access to computing resources.
● Internet of Things (IoT): IoT devices often use distributed systems to communicate
with each other and process data.
● High-performance computing: Distributed systems can be used to combine the
processing power of multiple computers to perform complex calculations.
Advantages:
1. Scalability: Distributed systems can be easily scaled up or down to handle changing
workloads.
2. Fault tolerance: Distributed systems are designed to continue operating even if one or
more components fail.
3. Performance: By combining the processing power of multiple computers, distributed
systems can often perform tasks more quickly than centralized systems.
4. Geographic flexibility: Distributed systems can be geographically distributed, which
can be advantageous in situations where the physical location of data or processing
power is important.
5. Cost-effective: Using distributed systems can often be more cost-effective than using
centralized systems, as it may not require the purchase of expensive hardware or
software.
Disadvantages:
1. Complexity: Distributed systems can be complex to design, implement, and maintain.
2. Security: Distributed systems are vulnerable to security threats, such as unauthorized
access and data breaches.
3. Network latency: Communication between computers in a distributed system can be
slower than communication within a single computer.
4. Consistency: Ensuring consistency of data across a distributed system can be
challenging.
5. Resource overhead: Distributing processing power and data across multiple
computers can result in additional resource overhead, such as increased network
traffic and management complexity.
Overall, distributed systems are a critical component of many modern technologies,
including web applications, cloud computing, IoT, and high-performance computing.
However, they present several challenges, including network latency, network partitioning,
consistency, and security. To overcome these challenges, developers must carefully design
distributed systems and use specialized tools and techniques to ensure that they are secure,
reliable, and efficient.
5. E-commerce:
1. Definition: E-commerce, short for electronic commerce, refers to buying and selling
goods or services online, typically through a website or mobile app.
2. Types of e-commerce:
● Business-to-consumer (B2C): This type of e-commerce involves selling products or
services directly to consumers.
● Business-to-business (B2B): This type of e-commerce involves selling products or
services to other businesses.
● Consumer-to-consumer (C2C): This type of e-commerce involves consumers selling
products or services to other consumers through online marketplaces.
● Consumer-to-business (C2B): This type of e-commerce involves consumers selling
products or services to businesses.
3. E-commerce technologies: E-commerce relies on several technologies to enable
online transactions, including:
● Online payment systems: These systems allow consumers to make secure payments
for goods or services online.
● Electronic data interchange (EDI): This technology enables the exchange of business
documents between different companies.
● Customer relationship management (CRM) software: This software helps businesses
manage interactions with customers and improve customer satisfaction.
4. Benefits of e-commerce:
● Convenience: Consumers can shop online from anywhere, at any time.
● Access to a larger market: E-commerce enables businesses to reach a wider audience
than traditional brick-and-mortar stores.
● Lower costs: E-commerce can be more cost-effective than traditional retail, as it may
not require the purchase or rental of physical storefronts.
● Personalization: E-commerce platforms can offer personalized recommendations and
shopping experiences based on customer data.
5. Challenges of e-commerce:
● Security: E-commerce is vulnerable to security threats, such as data breaches and
payment fraud.
● Competition: The ease of setting up an online store has led to increased competition
in the e-commerce space.
● Logistics: E-commerce requires effective logistics management to ensure that
products are delivered to customers in a timely and cost-effective manner.
6. Examples of e-commerce platforms:
● Amazon: One of the world's largest e-commerce platforms, offering a wide range of
products to consumers.
● Alibaba: A Chinese e-commerce platform that specializes in business-to-business
transactions.
● Shopify: An e-commerce platform that allows businesses to set up online stores and
manage transactions.
Overall, e-commerce has become a critical component of modern business, enabling
consumers to shop online from anywhere, at any time, and providing businesses with access
to a global market. While e-commerce offers many benefits, it also presents several
challenges, including security, competition, and logistics. To succeed in the e-commerce
space, businesses must carefully design their platforms and employ effective marketing and
logistics strategies.
6. Socket programming:
1. Definition: Socket programming is a way of communicating between two computers
over a network using sockets. Sockets are endpoints of a two-way communication
link between two programs running on a network.
2. How it works: In socket programming, one program acts as a server and the other
program acts as a client. The server program listens for incoming requests from
clients, while the client program sends requests to the server. Once a connection is
established, the two programs can exchange data over the network.
3. Types of sockets: There are two types of sockets in socket programming:
● Stream sockets: These sockets use TCP (Transmission Control Protocol) to provide a
reliable, connection-oriented communication channel between two programs.
● Datagram sockets: These sockets use UDP (User Datagram Protocol) to provide an
unreliable, connectionless communication channel between two programs.
4. Common socket functions: Socket programming relies on a set of functions that allow
programmers to create, configure, and manage sockets. Some common socket
functions include:
● socket(): Creates a new socket and returns a socket descriptor.
● bind(): Binds a socket to a specific address and port.
● listen(): Puts a socket in listening mode, waiting for incoming connections from
clients.
● accept(): Accepts a new client connection request and returns a new socket descriptor.
● connect(): Connects a client socket to a server socket.
● send() and recv(): Send and receive data over a socket.
5. Applications of socket programming:
● Web servers: Web servers use sockets to communicate with clients and deliver web
content over the internet.
● Online gaming: Online games use sockets to provide real-time communication
between players.
● File sharing: File sharing applications use sockets to enable users to share files over a
network.
● Instant messaging: Instant messaging applications use sockets to provide real-time
chat communication between users.
Advantages:
1. Flexibility: Socket programming is a flexible way of communicating between two
computers over a network. It allows programmers to create customized
communication protocols for their applications.
2. Efficiency: Socket programming is efficient because it uses low-level system calls to
communicate directly with the network. This reduces overhead and latency, which is
important for real-time applications.
3. Platform independence: Socket programming is platform-independent, meaning that it
can be used on any operating system or platform that supports networking.
4. Scalability: Socket programming is highly scalable, which means that it can be used
to create applications that can handle large numbers of clients.
Disadvantages:
1. Complexity: Socket programming can be complex, especially for beginners. It
requires knowledge of low-level networking protocols and system calls, which can be
difficult to learn.
2. Security: Socket programming can be vulnerable to security threats such as buffer
overflow attacks and denial-of-service attacks. Programmers need to be careful to
implement security measures to protect their applications.
3. Reliability: Socket programming relies on the underlying network infrastructure,
which can be unreliable at times. This can lead to dropped connections and lost data,
which can be problematic for some applications.
4. Performance: Socket programming can be affected by network latency and bandwidth
limitations, which can impact performance. For example, real-time applications such
as online games need to be designed carefully to minimize latency and maximize
performance.
7. Internet of Things (IoT):
1. Definition: The Internet of Things (IoT) is a network of physical devices, vehicles,
buildings, and other objects that are embedded with sensors, software, and network
connectivity. This enables these devices to collect and exchange data with other
devices and systems over the internet.
2. Key components of IoT: There are several key components of IoT that make it
possible:
● Sensors and actuators: These are devices that can detect changes in the environment,
such as temperature, humidity, and motion. Actuators can also take actions based on
this data, such as adjusting the temperature or turning on a light.
● Connectivity: IoT devices need to be connected to the internet or other networks in
order to exchange data.
● Data processing and storage: IoT devices generate large amounts of data, which need
to be processed and stored in order to be useful.
● Applications and services: IoT data can be used to create a wide range of applications
and services, from smart homes and cities to industrial automation and healthcare.
3. Examples of IoT applications:
● Smart homes: IoT devices such as smart thermostats, security systems, and voice
assistants can make homes more convenient and energy-efficient.
● Industrial automation: IoT devices can be used to monitor and control manufacturing
processes, logistics, and supply chains, improving efficiency and reducing costs.
● Healthcare: IoT devices can be used to monitor patients' health remotely, track
medication use, and provide real-time alerts to healthcare providers.
● Smart cities: IoT devices can be used to monitor and optimize traffic flow, manage
waste disposal, and improve public safety.
4. Advantages of IoT:
● Efficiency: IoT can help automate processes and reduce waste, improving efficiency
and reducing costs.
● Convenience: IoT devices can make our lives more convenient by automating tasks
and providing real-time data.
● Safety and security: IoT devices can improve safety and security by monitoring our
environment and detecting potential threats.
● Innovation: IoT is driving innovation in a wide range of industries, creating new
opportunities for businesses and individuals alike.
5. Challenges of IoT:
● Security: IoT devices can be vulnerable to security threats such as hacking and
malware, and it can be difficult to keep them up-to-date with the latest security
patches.
● Privacy: IoT devices collect large amounts of personal data, which can be a privacy
concern if not handled properly.
● Interoperability: IoT devices from different manufacturers may not be compatible
with each other, making it difficult to create integrated systems.
● Complexity: IoT systems can be complex, requiring specialized knowledge in areas
such as networking, data processing, and cybersecurity.
UNIVERSITY OF CAPE COAST COLLEGE OF AGRICULTURE AND
NATURAL SCIENCES SCHOOL OF PHYSICAL SCIENCES
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION
TECHNOLOGY END OF SECOND SEMESTER EXAMINATIONS
(2018/2019) INF 308 - NETWORKING COMPUTING 11
TIME: 2 HOURS
MAY, 2019
ANSWER ALL QUESTIONS FROM THIS SECTION AND ONLY TWO
FROM SECTION B
State whether the following statements are TRUE or FALSE
A) TRUE
B) FALSE
l. Acknowledgement frame completes entries in switching tables (F)
2. A set of rules that governs data communication is called Protocol
(T)
3. Communication channel is shared by all the machines on the network in broadcast
network (T)
4. Virtual-Circuit Networks and datagram networks are sub categories of packet
switched networks(T)
5. Network congestion occurs in case of traffic overloading (T)
6. Enterprise private networks extend a private network across public networks T
When collection of various computers seems a single coherent system to its client,
then it is called distributed system. (T)
7. Two devices are in network if a process is running on both devices.
8. Prime network is built on the top of another network?
9. In computer network nodes are the computer that originates the data 1 10. 10. The TCP and UDP is found on the session layer of the OSI Model. (F)
13. Most packet switches use this principle of store and forward (T)
14. Both Packet switching and Circuit switching move data through a network of
links and switches (T)
15. The resources needed for communication between end systems are reserved for
the duration of the session between end systems in message switching. (F)
16. In packet switching resources are allocated on demand.(T)
17. Performance, reliability and security are criteria of Efficient network (F)
18. NRZ-L and NRZ-I both have an average signal rate of N/8 (F)
19. With Unipolar scheme, all signal levels are on one side of time axis (T)
20. In Return to Zero (RZ), signal changes not between bits but before the
bit (F)
Determine the right answer from the options given after each question (21-3 0)
21. National Internet Service Provider (ISP) networks are connected to one another
by private switching stations called
a) Network Access Points
b) Peering Points
c) National ISP
d) Regional ISP
22, Virtual-Circuit Networks and datagram networks are sub categories
of
a) message-switched networks
b) Packet-switched networks
e) Circuit-Switched Networks
d) None of them
23. Three methods of switching are
a) circuit switching, packet switching, and protocol switching
circuit switching, packet switching, and message switching
b) Loop switching, packet switching, and message switching
d) Node switching, packet switching, and message switching
24. switched network consists of a series of interlinked nodes, called
a) endpoints
b) packets
e) switches
d) links
25, Protocol which assigns IP address to client connected in internet is
a) DHCP
c) RPC
d) HTML
26. Which of following is a governing body to approve computer network standards?
a)
b)
c)
d)
IEEE
EIA
ANSI
all of these
27. Element of a computer protocol which specifies signal level to be used and format
data which is to be send is
a) syntax
b) semantic
c) 'timing
d) format
28. Which protocol is used to resolve IP to MAC addresses?'
a.
b.
c.
d.
DNS
DHCP
ARP
WEP
29. Which protocol is used to provide secure connections across the Internet?
ARP
b.IITTPs
c. NTP
d. POP3
30. Which is a link layer protocol?
a.
ARP
b.
TCP
UDP
d. HTTP
SECTION B
ANSWER OUESTION ONE AND ONE OTHER QUESTION FROM THIS
SECTION
I. Define the following terms:
A. Attenuation
B. Dispersion
C, Delay Distortion
D. Noise
Cross Talk
Multiplexing
A. Attenuation: Attenuation is the reduction in the strength of a signal as it travels through a
medium. It is a natural consequence of signal transmission over distance and can be
caused by factors such as resistance, impedance, and absorption in the medium.
B. Dispersion: Dispersion is the phenomenon where the different components of a signal
travel at different speeds, causing the signal to spread out and become distorted over time.
There are two main types of dispersion: chromatic dispersion and modal dispersion.
C. Delay distortion: Delay distortion is a type of signal distortion that occurs when different
frequency components of a signal travel at different speeds through a medium. This
causes the signal to become distorted in time, resulting in a loss of signal quality and
clarity.
D. Noise: Noise is any unwanted signal or interference that disrupts the transmission of a
desired signal. It can be caused by factors such as electromagnetic interference, thermal
noise, and intermodulation distortion.
E. Crosstalk: Crosstalk is a type of interference that occurs when a signal transmitted on one
circuit or channel causes an unwanted signal to be induced on an adjacent circuit or
channel. It can result in degraded signal quality and data errors.
F. Multiplexing: Multiplexing is the process of combining multiple signals or data streams
into a single transmission channel. This allows multiple signals to be transmitted over the
same physical medium, increasing the efficiency of the transmission and reducing costs.
There are several types of multiplexing techniques, including time-division multiplexing
(TDM), frequency-division multiplexing (FDM), and wavelength-division multiplexing
(WDM)
B) Convert 10.1011100 into the following signals;
G. Unipolar NRZ
H. Manchester Encoding
I. NRZ — Inverted
J. Differential Manchester Encoding
C) Using the ROT 1.3 Encryption algorithm, encrypt the statement below which is
passed over the internet: the quick brown fox jumped over the lazy dog,
D) What are the disadvantages of circuit switching?
Circuit switching has several disadvantages, including:
Inefficient use of resources: Circuit switching dedicates resources for the entire duration of a
call, even if no data is being transmitted during that time. This can lead to inefficient use of
network resources.
Limited scalability: Circuit switching is not scalable, as it requires a dedicated circuit for each
communication session. This can limit the number of users that can be supported by the
network.
Vulnerable to failures: Circuit switching is vulnerable to failures in the network, such as a line
or switch failure, which can cause a call to be dropped.
High cost: Circuit switching requires the establishment of a dedicated circuit for the duration
of a call, which can be costly, especially for long-distance calls.
Slow call setup time: Circuit switching requires the establishment of a dedicated circuit
before data can be transmitted, which can result in slow call setup times.
E) State the default numbers of the following protocols: HTTPS, TELNET,
SSEI, NAT and Internet Relay Protocol
HTTPS (Hypertext Transfer Protocol Secure): 443
TELNET (Terminal Network): 23
SMTP (Simple Mail Transfer Protocol): 25
NAT (Network Address Translation): Not applicable, as it is not a protocol
that operates on a specific port number
IRC (Internet Relay Chat): 6667 (or 6697 for SSL-encrypted connections)
F) State with examples the broad types of network protocols.
There are several types of network protocols that serve different functions in data
communication. Some of the broad types of network protocols include:
Transmission Control Protocol/Internet Protocol (TCP/IP): This is the standard protocol used
for data transmission over the internet. It is a suite of protocols that includes the TCP for
reliable data transmission and IP for addressing and routing.
User Datagram Protocol (UDP): This is a connectionless protocol that is used for applications
that require fast and efficient data transmission, such as real-time streaming and gaming.
File Transfer Protocol (FTP): This protocol is used for transferring files between computers
on a network. It is commonly used by web developers for uploading and downloading files
to web servers.
Simple Mail Transfer Protocol (SMTP): This protocol is used for sending and receiving email
messages over the internet. It is commonly used by email clients and servers.
Hypertext Transfer Protocol (HTTP): This is the protocol used for accessing and transferring
data on the World Wide Web. It is used by web browsers to request and retrieve web pages
from web servers.
Domain Name System (DNS): This protocol is used for translating domain names into IP
addresses. It is used by web browsers and other applications to locate resources on the
internet.
Dynamic Host Configuration Protocol (DHCP): This protocol is used for automatically
assigning IP addresses to devices on a network. It is commonly used in home and office
networks to simplify network configuration.
These are just a few examples of the many network protocols that exist. Each protocol
serves a specific function and operates at a different layer of the network protocol stack.
2.
a. Define Line Coding
Line coding is a process of converting digital data into a
waveform that can be transmitted over a communication
channel.
b. State and explain the three types of line coding schemes
Unipolar: In unipolar line coding, only one voltage level is
used to represent the binary digits, usually a positive voltage,
while the other binary digit is represented by a zero voltage.
This scheme is simple and easy to implement, but it suffers
from the disadvantage of DC offset, where the signal has a
non-zero average voltage, which can cause distortion in the
transmission and reception of the signal.
Polar: In polar line coding, two voltage levels are used to
represent the binary digits, usually a positive voltage for one
binary digit and a negative voltage for the other binary digit,
while the zero voltage represents the absence of a binary
digit. Polar line coding reduces the DC offset problem of
unipolar coding, but it still suffers from the problem of signal
distortion due to the attenuation and noise in the transmission
medium.
Bipolar: In bipolar line coding, three voltage levels are used
to represent the binary digits, including a positive voltage for
one binary digit, a negative voltage for the other binary digit,
and a zero voltage for the absence of a binary digit. Bipolar
line coding reduces the problems of DC offset and signal
distortion of unipolar and polar coding, respectively, by
using alternate polarities for successive 1s in the binary data,
resulting in a zero average voltage for the signal. However,
bipolar coding requires more complex encoding and
decoding circuits than unipolar and polar coding.
Each line coding scheme has its advantages and
disadvantages, and the choice of a specific line coding
scheme depends on the characteristics of the communication
channel, the required data rate, and the noise and interference
in the system.
c. Differentiate between NRZ —L and NRZ — I in Polar
encoding d, Show how the sequence 101 10111 is encoded
using differential
Manchester encoding and Manchester encoding.
NRZ-L (Non-Return-to-Zero Level) and NRZ-I (Non-Returnto-Zero Inverted) are two types of polar line coding schemes.
The main difference between them is the way they encode
consecutive zeros in the binary data.
In NRZ-L, a binary one is represented by one voltage level,
usually a positive voltage, and a binary zero is represented by
the opposite voltage level, usually a negative voltage. This
means that the signal does not change polarity during a
sequence of zeros.
In NRZ-I, the polarity of the signal is inverted for each
consecutive zero in the binary data. A binary one is represented
by one voltage level, usually a positive voltage, and a binary
zero is represented by the opposite voltage level, usually a
negative voltage or a zero voltage. This means that the signal
changes polarity during a sequence of zeros, and it helps to
reduce the DC offset and provide synchronization for the
receiver.
To encode the sequence 101 10111 using differential
Manchester encoding, we can follow these steps:
Divide the binary sequence into individual bits: 1 0 1 1 0 1 1 1
For each bit, create a Manchester encoded symbol by flipping
the polarity of the signal at the middle of the bit period for a
binary one and not flipping it for a binary zero. This will result
in the following symbols:
For the first bit 1: the signal transitions from high to low in the
middle of the bit period.
For the second bit 0: the signal remains low in the middle of
the bit period.
For the third bit 1: the signal transitions from low to high in the
middle of the bit period.
For the fourth bit 1: the signal transitions from high to low in
the middle of the bit period.
For the fifth bit 0: the signal remains low in the middle of the
bit period.
For the sixth bit 1: the signal transitions from low to high in the
middle of the bit period.
For the seventh bit 1: the signal transitions from high to low in
the middle of the bit period.
For the eighth bit 1: the signal transitions from low to high in
the middle of the bit period.
The resulting Manchester encoded sequence is:
10 01 10 11 01 01 11 10
To encode the sequence 101 10111 using standard Manchester
encoding, we can follow these steps:
Divide the binary sequence into individual bits: 1 0 1 1 0 1 1 1
For each bit, create a Manchester encoded symbol by
transitioning the signal from high to low in the middle of the bit
period for a binary one and transitioning it from low to high for
a binary zero. This will result in the following symbols:
For the first bit 1: the signal transitions from high to low in the
middle of the bit period.
For the second bit 0: the signal transitions from low to high in
the middle of the bit period.
For the third bit 1: the signal transitions from high to low in the
middle of the bit period.
For the fourth bit 1: the signal transitions from high to low in
the middle of the bit period.
For the fifth bit 0: the signal transitions from low to high in the
middle of the bit period.
For the sixth bit 1: the signal transitions from high to low in the
middle of the bit period.
For the seventh bit 1: the signal transitions from high to low in
the middle of the bit period.
For the eighth bit 1: the signal transitions from high to low in
the middle of the bit period
e, What is an advantage of Manchester encoding over polar encoding schemes?
One advantage of Manchester encoding over polar encoding schemes, such as NRZ-L and
NRZ-I, is that it provides better clock recovery at the receiver. In Manchester encoding, the
signal transitions at the middle of each bit period, which provides a clock signal that can be
extracted by the receiver. This means that the receiver can recover the clock signal from the
data signal itself, which simplifies the circuit design and reduces the need for a separate
clock signal. In contrast, in polar encoding schemes, the signal level remains constant during
a sequence of zeros, which can make clock recovery more difficult and may require
additional circuitry to recover the clock signal. Additionally, Manchester encoding has a
guaranteed transition in the middle of each bit period, which helps to minimize the error
rate and improve the reliability of the communication system.
State and explain the four means of implementing Protocols.
Hardware Implementation: This involves designing and building custom hardware circuits
that implement the protocol functions directly. This approach is typically used for highspeed and high-throughput applications, where hardware circuits can provide faster and
more efficient processing than software implementations. Hardware implementations can
also be more reliable and secure than software implementations, as they are less
susceptible to software bugs and malware attacks.
Software Implementation: This involves writing software code that implements the protocol
functions on a general-purpose computer or microcontroller. This approach is typically
used for lower-speed and lower-throughput applications, where the processing
requirements are not as demanding. Software implementations can be more flexible and
easier to modify than hardware implementations, as they do not require physical changes
to the hardware.
Firmware Implementation: This involves writing software code that is stored in non-volatile
memory, such as flash memory, and executed by a microcontroller or other embedded
system. Firmware implementations are typically used for applications that require a
combination of hardware and software functions, such as embedded systems and IoT
devices. Firmware implementations can provide the flexibility and ease of modification
of software implementations, while also providing the reliability and security of hardware
implementations.
Middleware Implementation: This involves using pre-existing software libraries or
frameworks that provide a standardized set of protocol functions. Middleware
implementations are typically used for applications that require interoperability with other
systems or devices, as they can provide a standardized interface that simplifies
communication between different systems. Middleware implementations can also provide
additional features, such as security and error checking, that can improve the reliability
and security of the communication system.
3.
a)
With the aid of diagrams, illustrate the difference between the
Asymmetric and the Symmetric Encryption algorithms giving examples
for each.
Asymmetric and symmetric encryption are two different approaches to
cryptography that serve different purposes. The main difference
between them is that symmetric encryption uses the same key for both
encryption and decryption, while asymmetric encryption uses two
different keys - one for encryption and one for decryption. Here are
diagrams illustrating the difference between the two:
Symmetric Encryption:
In symmetric encryption, the same secret key is used for both
encryption and decryption. This means that both the sender and the
receiver must have the same key. The following diagram illustrates how
symmetric encryption works:
Symmetric Encryption Diagram
Example of symmetric encryption algorithms include AES (Advanced
Encryption Standard), DES (Data Encryption Standard), and 3DES
(Triple Data Encryption Standard).
Asymmetric Encryption:
In asymmetric encryption, two different keys are used - a public key for
encryption and a private key for decryption. The sender encrypts the
message using the recipient's public key, and the recipient decrypts the
message using their private key. The following diagram illustrates how
asymmetric encryption works:
Asymmetric Encryption Diagram
Example of asymmetric encryption algorithms include RSA (RivestShamir-Adleman), Diffie-Hellman, and Elliptic Curve Cryptography.
In summary, symmetric encryption is faster and more efficient than
asymmetric encryption, but it requires secure key distribution.
Asymmetric encryption, on the other hand, is slower but more secure
and eliminates the need for secure key distribution. Both types of
encryption have their own strengths and weaknesses and are used in
different scenarios depending on the security requirements and
performance needs.
b)
Why does the internet use packet switching?
The internet uses packet switching because it is a more efficient
and flexible way of transmitting data compared to traditional
circuit-switched networks. In a packet-switched network, data is
divided into smaller packets, each with its own header containing
information about the source and destination addresses, and the
packet's position in the overall message. These packets are then
transmitted over the network independently and reassembled at the
destination.
There are several advantages to using packet switching:
Efficient use of network resources: Packet switching allows
multiple packets to share the same network resources, such as
bandwidth and processing capacity, by interleaving packets from
different sources. This makes better use of the available resources
and can reduce network congestion.
Robustness and fault tolerance: Packet-switched networks are
designed to be fault-tolerant and resilient to network failures. If a
packet is lost or delayed due to congestion or network failure, the
remaining packets can continue to be transmitted and the lost or
delayed packet can be retransmitted.
Flexibility: Packet switching is a flexible and adaptable way of
transmitting data, as it can handle a wide range of data types, such
as voice, video, and data. This makes it suitable for a variety of
applications, from web browsing to video streaming.
Scalability: Packet switching networks can easily scale to
accommodate more users and higher data volumes by adding more
network resources or optimizing the existing ones.
Overall, packet switching has become the dominant method for
transmitting data over the internet due to its efficiency, robustness,
flexibility, and scalability.
c)
With the aid of diagrams, illustrate how web server displays a
webpage and state the protocols involved
When a user requests a web page, the web server responds by sending
the HTML, CSS, and other assets that make up the web page back to the
user's browser. Here is a diagram illustrating the process:
Web Server Diagram
The user enters a URL (Uniform Resource Locator) into their web
browser, which sends an HTTP (Hypertext Transfer Protocol) request to
the web server.
The web server receives the HTTP request and retrieves the web page
content, which may include HTML files, CSS files, images, and other
assets.
The web server sends the web page content back to the user's browser in
the form of an HTTP response.
The user's browser receives the HTTP response and starts rendering the
web page content, using the HTML and CSS files to create the visual
layout and display the images and other media.
The user can interact with the web page by clicking links, submitting
forms, and performing other actions, which generate additional HTTP
requests and responses.
The main protocols involved in this process are HTTP, which is used
for sending requests and responses between the user's browser and the
web server, and TCP/IP (Transmission Control Protocol/Internet
Protocol), which provides the underlying transport mechanism for
transmitting the data packets over the internet. HTTPS (HTTP Secure)
may also be used instead of HTTP to provide secure, encrypted
communication between the user's browser and the web server.
d) What is data encapsulation and data de-encapsulation?
Data encapsulation is the process of wrapping data and its associated control information into
a single unit or packet for transmission over a network. In this process, the data is
encapsulated within a protocol header that includes information about the source and
destination addresses, data length, and other control information. The encapsulated data is
then passed to the next layer in the protocol stack for further processing.
Data de-encapsulation is the process of removing the protocol headers from the encapsulated
data at the receiving end of the network. This process involves checking the protocol
headers to ensure that the data has been correctly addressed and delivered, and then
stripping off the headers to extract the original data. The de-encapsulated data is then
passed up the protocol stack for further processing.
In summary, data encapsulation is the process of adding protocol headers to data to prepare it
for transmission, while data de-encapsulation is the process of removing those headers at
the receiving end to extract the original data. This process allows data to be transmitted
over a network in an efficient and standardized manner, regardless of the underlying
physical network technology.
e) What actions does DHCP (Dynamic Host Configuration Protocol) server take when there
is an IP Address conflict as shown below?
When a DHCP (Dynamic Host Configuration Protocol) server detects an IP address
conflict, which occurs when two devices have been assigned the same IP address, it takes
the following actions:
The DHCP server sends an ARP (Address Resolution Protocol) request to the conflicting
IP address to determine if the address is still in use.
If the ARP request receives a response from the conflicting device, indicating that the IP
address is still in use, the DHCP server marks the address as "bad" in its pool of available
IP addresses.
The DHCP server then sends a NACK (Negative Acknowledgment) message to the
device that requested the IP address, indicating that the address is not available.
The device that received the NACK message must then request a new IP address from the
DHCP server.
The DHCP server may also send a log message to the network administrator indicating
that an IP address conflict has occurred.
Overall, the DHCP server is responsible for managing IP addresses on a network and
ensuring that each device is assigned a unique address. When an IP address conflict
occurs, the DHCP server takes steps to resolve the conflict and prevent it from happening
in the future.
CBC q
.
Review questions
Explain the following Terms
I.
IP: P stands for Internet Protocol, which is a protocol used for communication
between devices over a network. It provides a unique address to each device
connected to the network, called an IP address. IP is responsible for routing packets
II.
III.
of data between devices on the network, ensuring that they reach their intended
destination.
MPlS: MPLS stands for Multiprotocol Label Switching, which is a protocol used in
high-performance telecommunications networks. MPLS works by adding a label to
each packet of data as it enters the network, which is used to route the packet through
the network. MPLS is often used by Internet service providers (ISPs) to provide
virtual private network (VPN) services, as it can help to improve the speed and
efficiency of network traffic.
Load Balancing: Load balancing is a technique used to distribute network traffic
across multiple servers or devices to optimize performance, improve availability,
and prevent overload.
Are there ways in which traffic can be black holed (dropped without any indication) in
the hardware forwarding systems that are addressed in different vendors
implementations
Ans: yes. There are ways and some are:
1. Misconfigured routing tables
2. Hardware failures
3. Congestions
4. Access control list
5. Firewall rules
What is software defined architecture?
Ans: Software-defined architecture is an approach to building computer networks and other
systems that separates the control plane (which governs how the system operates) from
the data plane (which handles the actual processing of data).
Outline two benefits of the control layer
Ans: 1. Centralized Management
2. dynamic configuration and automation
How does the application layer works?
The application layer is the topmost layer in the OSI (Open Systems Interconnection) model,
and it's responsible for providing communication services to user applications. It interacts
with the application or process that is generating the data and provides services that are
relevant to that particular application
What are SDN Controllers?
SDN (Software-Defined Networking) controllers are software applications that are
responsible for managing and controlling the behaviour of the network devices in an SDN
architecture.
1. The SDN controller receives information about the network topology from the
network devices, such as switches and routers.
2. The SDN controller analyses this information and makes decisions about how the
network should operate based on network policies and business requirements.
3. The SDN controller then configures the network devices using OpenFlow or other
protocols to implement the desired network behaviour.
State some of the popular SDN controllers that can be used with Mininet.
1. OpenDaylight
2. Ryu
3. Floodlight
How does network virtualization differ from traditional networking?
Network virtualization differs from traditional networking in that it allows for the creation of
virtual network segments that are isolated from one another on a physical network
infrastructure.
Types of network virtualization
1. VLAN
2. VXLAN
3. VPN
4. VRF: Virtual routing and forwarding
Explain the following terms in network security;
I.
Defense In Depth: Defense in Depth is a security strategy that involves deploying
multiple layers of security controls to protect against different types of threats. The
idea behind this strategy is that if one layer of security fails or is breached, there are
other layers of protection in place to prevent or mitigate the damage caused by the
breach.
II.
II. Cyber killer chain: The Cyber Killer Chain is a model used to describe the
different stages of a cyberattack. Each stage in the Cyber Killer Chain represents a
different phase of the attack, from the initial reconnaissance to the final objective of
the attacker.
What is caching?
CDN caching refers to the process of storing and serving static content such as images,
videos, and files from servers distributed around the world. This can help to improve the
performance of websites by reducing the load on the origin server and reducing the
latency for users accessing the content.
What is caching server?
Caching servers refer to servers that store frequently accessed data in memory so that it can
be served quickly without having to be retrieved from the original source every time. This
can help to improve the performance of websites and other applications by reducing the
time it takes to access and retrieve data.
What is the difference between caching content and compression?
Caching content refers to the process of storing frequently accessed data in memory so that it
can be served more quickly to users. Compression, on the other hand, refers to the
process of reducing the size of files or data so that they can be transmitted more quickly
over the internet. While both caching and compression can help to improve the
performance of websites, they are two distinct processes that serve different purposes.
What is Pop in relation to Content Delivery Networks?
PoP (Point of Presence) is a location in a CDN network where the CDN provider has
deployed caching servers or edge servers. Each PoP is designed to reduce the distance
between the end-user and the website content, which helps to improve website
performance by reducing latency and increasing download speeds.
How does Pop work?
CDN providers typically have multiple PoPs located in various geographic regions around the
world. Each PoP contains a cache of website content, which is delivered to end-users
when they request website content. When a user requests a piece of content, the CDN
server will first check to see if it has a cached copy of the content at the nearest PoP. If
the content is cached at that PoP, it will be delivered to the user from that PoP. If the
content is not cached at that PoP, the CDN server will fetch it from the origin server and
cache it at the nearest PoP for future requests.
What are some examples of CDN providers
Amazon CloudFront
Akamai
Cloudflare
Fastly
Define distributed systems
A distributed system is a network of computers that work together to achieve a common goal.
In a distributed system, each computer, also called a node. Distributed systems are used
in many applications, such as cloud computing, distributed databases, and online gaming.
Types of distributed systems
1. Client – server systems
2. P2p systems
3. Cloud computing systems
4. Distributed databases
Socket operations
What is the most appropriate network infrastructure for modern times?
1. Ethernet: Ethernet is a widely used technology for local area networks (LANs)
and is based on wired connections using Ethernet cables.
2. Wi-Fi: Wi-Fi is a wireless networking technology that allows devices to
connect to a local area network (LAN) without the need for physical cables.
3. Cloud-based networks: Cloud-based networks are becoming increasingly
popular for their flexibility, scalability, and ease of management.
What are some protocols employed in managing data transfer in a network?
1. Transmission Control Protocol (TCP): TCP is a connection-oriented protocol that
ensures reliable and ordered delivery of data packets in a network.
2. User Datagram Protocol (UDP): UDP is a connectionless protocol that provides
fast and lightweight data transmission without the overhead of connection setup
and error recovery.
3. Simple Network Management Protocol (SNMP): SNMP is a protocol used for
managing and monitoring network devices, such as routers, switches, and servers.
It allows network administrators to retrieve and modify configuration settings,
monitor network performance, and manage network devices remotely.
What is Ransomware?
Ransomware is a type of malware that is designed to encrypt the files on a victim's
computer or network, rendering them inaccessible. The attacker then demands a
ransom payment in exchange for providing the victim with the key to decrypt their
files.
List 3 importance of Network Security?
1. Confidentiality: Network security measures are designed to protect the
confidentiality of sensitive information by preventing unauthorized access to data.
2. Integrity: Network security measures ensure that data remains accurate and
uncorrupted during transmission and storage.
3. Availability: Network security measures help ensure that network resources are
available to authorized users when they need them.
What is Virtual Private Network?
A Virtual Private Network (VPN) is a secure network connection that allows users to
access a private network, such as a corporate network, over the public Internet. VPNs
use encryption and authentication mechanisms to secure the connection between the
user's device and the private network, preventing unauthorized access and ensuring
the privacy and integrity of data transmitted over the connection.
What are Network administration tools?
Network administration tools are software applications that help network
administrators manage and maintain their networks
Types of network administration tools?
1. Monitoring tools
2. Performance analysis tools
3. Security tools
4. Configuration tools
Examples of network monitoring tools?
1. Wireshark
2. Nagios
3. SolrWinds network performance monitor
4. PRTG network monitor
State the types of network visualization.
1. Server virtualization
2. Storage virtualization
3. Network virtualization
What is network storage?
Network storage refers to the storage of data on networked devices, such as file
servers or network-attached storage (NAS) devices, rather than on local storage
devices like hard drives or USB flash drives. This allows multiple users to access and
share the same data over a network, rather than having to transfer files back and forth
between individual devices.
State the three types of network storage?
1. Direct-attached storage (DAS)
2. Network-attached storage (NAS)
3. Storage area network (SAN)
What are some
Advantages of overlay networks?
1. Increased network scalability and flexibility
2. Improved network security
3. Enhanced network services
disadvantages of overlay networks?
1. Increased network complexity
2. Higher network latency and overhead
3. Potential for network conflicts
What are Virtual Network Functions?
Virtual Network Functions (VNFs) are software-based network functions that can be
deployed on virtualized infrastructure, like cloud servers or virtual machines.
What are the benefits of VNFs?
1. Scalability
2. Cost-effectiveness
3. Flexibility
4. Faster Time-to-Market
5. Reduced Complexity
Download