1.8 Identifying Network Topologies and Standards Part 2 - MTAN
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
4 hours 30 minutes
Welcome back to Cy Berries Empty, A 98 3 66 network and Fundamentals Certification prep course.
When we come through Ethan that
now either net or adapt or that controller is a term used to describe it, even that network card used to connect a desktop computer to a network. If you're looking for networking that the driver, you confined them again obsolete. Do the various vent do that vendor
and how could now can you go about the prosecutor letting anything that came all you need to do away? If you said that one in your home network,
use Ethernet cable to your computer. The price is the same you look for on your camper. You look for Nick or network interface card. Once you locate that network interface card, you're gonna push that cable. Connect into the pore until you hear a click if connected properly with the connection on the other end
what you're going to see. The green light should appear to indicate the signal it's found.
If you want a discontinuity that cable, you simply press down on the top tap and pulled the back gently on that connector.
We put much restored some of this particular presentation are doing this presentation. We learned that the network gets in private to a more complete exchange. Data we also learned in the local area network is a group of these computers. Again, they could be in a small geographical area or one building well, *** trust, a network adapter or Nick Carter,
where all devices
most bit device. And now they have on some type of what we call the network interface card
the car. Obviously, we tell by the network interface card. It could also be a wireless network interface card as well. Obviously, multiple device can hit at each other and communicate using again a switch
We also learned it in. That protocol is part of the TCP I P that, among other thing, what it does for that governs I p addresses. In that protocol, it's a corner. Obviously I pee again. Address is obviously the cornerstone of networking. It defines computers or host that you're working on. We also discuss while it's local area that we're gonna win
or while its access born a person with a laptop again on handheld computer are tablet. They can live to connect to any other vices and can work from anywhere. Other words of advice. And with that mobility,
we also discussed not to party. Defied the physical connection. We learned what? What a bus works, we learn with a ring. We learned some of that advantage and disadvantage of the mess is. Well,
at this point time, we have a quiz for you. As I mentioned before, the first question we're gonna be going over doing this. Particular Marjorie is course number one.
You have a key network administrators leave your company.
Therefore, what does the company pin on to continue to use the network? Is it eh?
Our uses path, Where is be active directory, is it? See a master network switch? Or is it d?
Okay, if you said like the day, you're absolutely correct.
So again, the better understand your land better. It helps to write down what its structure is. In other words, to document it, you need to have some form of documentation, never documentations any information that helps describe defined, otherwise explained how the network computers connected physically as well asked logically. In fact,
if you're gonna build on that with the first thing, I'm gonna do is build it, get on paper
before you actually physically go out by the price of doing that as well.
Question number two What is the most common central device used today? Connect computers to a network? Is it a up? Is it be a switch? Is it? See a small office home office Roger or is it D A. V P and running.
If you say like that again or switch, you're absolutely correct because hubs are considered legacy devices and they have been replaced by switches. Switches allow multiple computers connected together. The evangel switched over. Hope is that it can handle several conversation
at the same time, and it has intelligent built within it.
Unlike the Hub
course, Number three was the most common adapter connected. Used to connect a computer to a wired network isn't a RG six? Is it be an RG 58? Or is it? See it R J 45 or D and R J eight.
If you selected See
and r. J. 45 you're absolutely correct
because an R J. 45 is associate with Ethan. That network is the most common Why, adapted by default, it's found on virtually every computer these days.
Course the number four, which you're following doesn't switch. Use for increase performance again. We're looking at an increase performance. Is it a simplex? Is it be? Ah, half duplex is the C four duplex or the D A sliding duplex.
Now, if you select it again, see, you're absolutely correct.
Switch is very A switch switch is very fast between multiple connections, which allows motor computers communicate at the same time as Rizzo each client and sent and received at the same time. You have four duplex woods gives better performance.
Question number five What? What do you use to isolate a group of computers within your organization?
Is it a
C or D
again? Remember the key? What? What do you use the isolated group of computers
if you selected again V land. You're absolutely correct because it stands for a virtual land.
If you remember a virtual and is a group of host with a common set of requirements that communicated through, they were connected together as normal on one switch. Regardless, that physical connection, a villainous implemented to segment and network reduce collision, organizing network
boost performance and last night's of things of which you want to increase your performance.
Question number six.
What do you use to create a V land? We discussed that during the presentation.
Is it a A router? Isn't B or switch, is it See a firewall or the D A proxy server?
Take a few moments and think about this.
If you select the switch, you're absolutely correct. Switches you to control the villain like seven in a V. Lang compartmentalized, compartmentalize eyes other words with a network anchor and isolate the metal. So again they used to isolate the network as well.
We'll compartmentalize. That is, well,
question number seven.
What zone is used? A public external websites for an organization?
Is that a intra
ex Annette Inter Network or D M Z?
If you said let the D you're absolutely correct, A permanent they're also known as the D. M. Z is a small network that is Sep. Separate from the company's private land and the Internet. It's called a perimeter network because it is usually on the edge off your local area network
course. The number eight,
which the party is the most redundant as well as the most expensive
for you. Is it a a start apology?
Is it be a ring
isn't see mess? Or is it the ah bus?
If you select it again, I mess. You're absolutely correct.
A network apart defies a physical connection of hosts in a computer network with the Mesta party area. Computer connects to area other computer no central unit devices needed. Since Air Computer connects the area. Other contributors, it requires the most cabling, which increases the costs
so it could be very pricey. In other words,
what's the number nine?
What Standard describes again? A CS in May
backs last CD
is that a eight or two out 2801.2 is the 82.3. Is it see attitude out? Five or eight? 02 died 11.
Okay, the correct answer is
the art Tripoli. It'll two out. Three Defines caress since multiple access with collision detection. Because computers on a D for Internet land all share the same channel,
it go again. This assistant governor with computers coexist with limited collisions. So again you use is mainly on a wire type network, not a while its network.
My last question is course number 10. What mechanism to Wallace that were used to access again? The network.
Is it a
Is it B
or the C or D?
If you select it
be you're absolutely correct.
If an organization uses wireless Ethernet caress, since multiple access with collision of ordnance is use again, I want to thank you very much for your attention to detail
drew in the course of this particular discussing a murder one, and I look forward to seeing your future training presentations.