Untitled Document

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Networking concepts facts part 1

1. Tcp and udp ports identify the application protocol or the process that generated the
information in a datagram client ports are chosen randomly from a range 1024 to
65,534. Server ports are well known and are chosen from range 1 to 1023
2. A local area network is a group of computers contained within a small geographic
area. WANS connect lans that are geographically distant. Mans are not confined to
a small area, they are typically larger than a lan, but smaller than a wan . A can
typically includes a group of adjacent buildings such as a corporation or
university
3. The first ethernet networks used a physical layer implementation commonly
known as a thick ethernet or 10base5. The network used coaxible cable ina bus
topology, later ethernets standards used twisted pair cabling in a star topology.
Ethernet has never used ring or mesh.
4. The NTP is used to synchronize computer clocks. Time signals can be provided
by internal servers or time servers on the internet. The trivial file transfer protocol
is used to transfer files between systems without authentication. The hypertext
transfer protocol is used to exchange web traffic between client and servers. The
simple mail transfer protocol is used to transmit email traffic between client and
servers.

Networking concepts facts part 2


1. Ftp uses two ports one for control messages (20) and one for data transfers(20)
port 23 is used by telnet.53 is used by the dns server. Port 69 is used by the trivial
ftp(tftp)
2. The transmission control protocol provides connection oriented service at the
transport level, with guaranteed delivery. The user datagram protocol provides
connectionless service at the transport layer, ( HTTP) operates at the application
layer, and internet protocol is a connectionless network protocol
3. A router connects networks together at the network layer of the osi model, proxy
servers operate at the application layer. Network interface adapters operate at
both the data link and physical layers, hubs are physical layer devices
4. Switches and bridges are involved in local area network communications only and
operate at the data link layer
5. Class d addresses are used for multicast transmissions, Class A,B,C are used for
unicast transmissions. Class e is for experimental uses only
6. A local area network is a group of computers contained within a small geographic
area. WANS connect lans that are geographically distant. Mans are not confined to
a small area, they are typically larger than a lan, but smaller than a wan . A can
typically includes a group of adjacent buildings such as a corporation or
university
7. Integrated services digital network is a wide area networking technology that uses
the telephone infrastructure to provide a high speed dial up service, Bluetooth,
z-wave, Nfc are all short range wireless technologies that are capable of proving
communications between pan devices
8. A mesh topology is one in which every node is directly connected to every other
node, therefore providing complete redundancy through the network. In a star
topology every node is connected to one central device, in a ring, each node is
connected to two other nodes, providing two possible paths through the network,
in a bus topology nodes are chained together in a line providing no redundancy
9. Multiple input and output calls for the use of two or more antenna, enabling
wireless devices to effectively multiplex signals, herby increasing their
transmission speeds. TDMA is a communication technique that splits a frequency
into multiple time slots enabling it to carry multiple data streams. A personal area
network provides communication among devices associated with a person. Ant+
is a wireless protocol that is typically used to monitor data gathered by sensors.
10. Software as a service provides consumers with access to specific application
running on the providers service, consumers have a control over some of their
email functions, but they have no control over the operating system , the serves,
or underlying resources. The infrastructure as a software provides consumers
with access to processing, storage, and networking resources that the consumer
can use as needed. Platform as a service provides consumers with the ability to
install applications of their choice on a service provided by the provider
11.

You might also like