![]() CATEGORIES: BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism |
Network Interconnection and TopologyData Encryption, Security and Parity
way to ensure that the data is transmitted correctly is to use parity bits, which involves keeping track of the number of 1’s and 0’s the data should contain.
In private-key encryption the sender and receiver both have the same key. They must keep this key private from outsiders to retain security of the message. The sender encrypts the message with the same key that the receiver uses to decrypt the message.
Public-key encryption has two separate keys. The receiver has a key that he gives to all who wish to send him an encrypted message. This is the public key. The only key that can decrypt the message is the private key, which the recipient has; this key should be secreted away (hence private key).
Plaintext is the message before encoding or after decoding. It is readable text.
Ciphertext is the message after the plaintext has been encoded by the encryption algorithm. This text is not understandable in its current form.
Firewall protects a computer system, by always denying network communications requests that the user has not predefined as permissible.
file virus -virus hidden in an application program. When the program is executed, the virus replicates itself and can perform malicious activities now or later. macro virus - virus hidden in a document type that supports macros or scripts, such as Word or Excel. Opening the document can cause the macro to execute immediately. boot sector virus - virus in the boot sector of the disk or floppy. It spreads every time the infected disk is in the computer when it boots.
Trojan horse - computer program that appears to perform one function while actually performing another.
Worm- program that gains access to a computer, typically through a network security flaw, or another opening caused by careless system administration. The worm then attempts to access additional computer systems. It may have a payload or simply clog up the computer.
Data Communication 1.FQDM (Specify what every segment of www.icarnegie.com represents.) Fully-qualified domain name contains a machine, domain, and top-level domain designation. From this common name structure an IP address can be referenced and the machine connected to. 2.DNS (Describe the acronym as well as what a DNS does.) The function of the DNS is to translate common names, as www.icarnegie.com, to Internet names, 204.194.30.130, that are represented by IP addresses 3.IP Address (What is an IP Address? How long is an IP Address? How is it normally represented?) IP-Internet Protocol specifies the format of packets also called dataprograms and the addressing scheme 4.TCP / IP (Explain the Acronym. What is it used for?) TCP-transmission control protocols, enables two hosts establish a connection and exchangestreams of data 5.MAC Address (What is a MAC Address? What does the MAC address identify? How long is a MAC Address? How is it normally represented?) A MAC address, or Media Access Control address, is a 48- or 64-bit address associated with a network adapter. While IP addresses are associated with software, MAC addresses are linked to the hardware of network adapters 6.Explain a Packet as it relates to Network communication. A packet is the smallest unit of data that is sent over a network. 7.List at least three different types of connections used to connect to the internet. 8.Explain Simplex communication. Simplex communication is mono-directional. There is one sending unit, and at least one receiving unit. As television station is an example of simplex communication 9.Explain Half-Duplex communication. .Half-duplex communication is a bidirectional form of communication, in which any given point (system) can either send or receive data at any given time, but not do both. CB radio is an example of half-duplex communication. Half-duplex communication may have collisions. 10. Explain Full-Duplex communication Full-duplex communications allows any device to both send and receive data at the same time. A telephone is an example of full-duplex communication.
Networking Devices Describe in detail the function of the following network devices:
Backup and Restore Explain :
Network Interconnection and Topology
Date: 2015-12-18; view: 1048
|