Note: See Study Notes Below

Networking Study Notes – Year 11 & 12 AIT

Topic: Network Topologies, Communication Protocols, Network Security


Network Topologies

A network topology is the layout or structure of a computer network. It refers to how devices (nodes) are connected and how data is transmitted.

Types of Topologies:

Topology Description Advantages Disadvantages
Bus All devices share a single backbone cable. Easy to set up, cost-effective. Data collisions, slower as traffic increases.
Star All devices connect to a central hub/switch. Easy to add/remove devices, fault isolation. If hub fails, whole network goes down.
Ring Devices connected in a circular manner. Data moves in one direction. Predictable performance. Failure in one node can disrupt network.
Mesh Every device is connected to every other device. Very reliable, robust. Expensive, complex setup.
Hybrid Combination of two or more topologies. Flexible and scalable. Complex to design and maintain.

Communication Protocols

Communication protocols are a set of rules that determine how data is transmitted across a network.

Key Protocols to Know:

Protocol Full Form Purpose
HTTP/HTTPS HyperText Transfer Protocol (Secure) Used for accessing web pages. HTTPS adds encryption.
TCP/IP Transmission Control Protocol / Internet Protocol Basis of internet communication. TCP ensures delivery; IP handles addressing.
FTP/SFTP File Transfer Protocol / Secure FTP Used to transfer files between computers.
SMTP/POP3/IMAP Simple Mail Transfer Protocol / Post Office Protocol / Internet Message Access Protocol Email sending and receiving.
DNS Domain Name System Translates domain names to IP addresses.
Ethernet - Standard protocol for local area networks (LANs).

Network Security

Network security involves protecting data during transmission and ensuring network integrity, confidentiality, and availability.

Common Threats:

Malware Malicious software (e.g., viruses, worms, trojans).
Phishing Deceptive attempts to steal sensitive info.
Man-in-the-Middle Attacks Intercepting communication between two parties.
Denial of Service (DoS) Overloading a network or server to crash it.
Ransomware Data encrypted until payment is made.

 

Preventive Measures:

Measure Description
Firewalls Filter incoming and outgoing network traffic.
Antivirus Software Detects and removes malicious software.
Encryption Scrambles data to prevent unauthorized access.
User Authentication Strong passwords, two-factor authentication (2FA).
Access Control Ensures only authorized users access certain data.
Regular Updates Keeps software secure from known vulnerabilities.