PTASAPTASA
Slide 1
Slide 2
Slide 3
Slide 4
<
>

DAE CIT 324 CH 1 SHORT QUESTIONS

CIT 324

Network Administration

Chapter 1 : Introduction

DAE Computer Information Technology | Third Year

Short Questions




A computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital interconnections to communicate with each other.

The following are some characteristics which make a network to be use in most type of organizations and companies.
1. High Security

2. Fast communication
3. High Speed
4. Sharing Resources
5. Reliability

1. Desktop computers, laptops, mainframes, and servers
2. Consoles and thin clients
3. Firewalls
4. Bridges
5. Repeaters
6. Network Interface cards
7. Switches, hubs, modems, and routers
8. Smartphones and tablets
9. Webcams

The term network topology describes the relationship of connected devices in terms of a geometric graph. Devices are represented as vertices, and their connections are represented as edges on the graph.

A person who manages a local area communications network (LAN) or wide area network (WAN) for an organization.

LAN Stands for (Local Area Network). Network that limited geographical area such as home or office building Metro is called LAN. Data transmission speed of LAN is 1 to 100 Mb per second. LAN is the most common type of network.

A Personal Area Network is a computer network used for communication among computer devices, including telephones and personal digital assistants, in proximity to an individual’s body. PAN’s can be wired or wireless.

A Metropolitan area Network is a communications network that covers a geographical area of the size of a city. A MAN typically includes one or more LANs but cover a small geographical are than WAN. A MAN typically covers an area of between 5 and 50 km diameter.

WAN stands for (Wide Area Network). Network that covers large geographical area using many types of media is called WAN. Data transmission speed of WAN is 56Kbps to 45Mbps.

1. Design, installation and evaluation of the network
2. Execution and administration of regular backups
3. Creation of precise technical documentation, such as network diagrams, network cabling
4. documents, etc.
5. Provision for precise authentication to access network resources
6. Provision for troubleshooting assistance
7. Administration of network security, including intrusion detection

By using the error control process, we can be confident that the transmitted and received data are identical. Data can be corrupted during transmission.

There are two Types of error.
1. Single bit error
2. Burst Error

The uses of Network are:
1. Communication and Access to Information
2. Resource Sharing
3. Centralized Support and Administration

A multiplexing is a technique by which different analog and digital streams of transmission can be simultaneously processed over a shared link. Multiplexing divides the high capacity medium into low-capacity logical medium which is then shared by different streams.
Demultiplexing: Working of demultiplexing is just the reverse of the multiplexing process and demultiplexing delivers the segment received from the receiver to the correct process.

A Checkpoint firewall is a device that allows multiple networks to communicate with one another according to a defined security policy.

An enterprise private network is a computer network that helps enterprise companies with a number of disparate offices connect those offices to each in a secure way over a network.
A virtual private network is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.


NOTE
If you find any mistake in them, do tell in the comment, so that it can be corrected.

If you face any issues feel free to contact me on WhatsApp
03129671316, 03085507292

If you want more improvement
Share feedback in the comment

INSTRUCTOR
MUHAMMAD BIN JAMEEL
BSC ENGG. CIVIL
 

Post a Comment

Previous Post Next Post