Note: See Study Notes Below
Networking Study Notes – Year 11 & 12 AIT
Topic: Network Topologies, Communication Protocols, Network Security
Network Topologies
A network topology is the layout or structure of a computer network. It refers to how devices (nodes) are connected and how data is transmitted.
Types of Topologies:
Topology |
Description |
Advantages |
Disadvantages |
Bus |
All devices share a single backbone cable. |
Easy to set up, cost-effective. |
Data collisions, slower as traffic increases. |
Star |
All devices connect to a central hub/switch. |
Easy to add/remove devices, fault isolation. |
If hub fails, whole network goes down. |
Ring |
Devices connected in a circular manner. Data moves in one direction. |
Predictable performance. |
Failure in one node can disrupt network. |
Mesh |
Every device is connected to every other device. |
Very reliable, robust. |
Expensive, complex setup. |
Hybrid |
Combination of two or more topologies. |
Flexible and scalable. |
Complex to design and maintain. |
Communication Protocols
Communication protocols are a set of rules that determine how data is transmitted across a network.
Key Protocols to Know:
Protocol |
Full Form |
Purpose |
HTTP/HTTPS |
HyperText Transfer Protocol (Secure) |
Used for accessing web pages. HTTPS adds encryption. |
TCP/IP |
Transmission Control Protocol / Internet Protocol |
Basis of internet communication. TCP ensures delivery; IP handles addressing. |
FTP/SFTP |
File Transfer Protocol / Secure FTP |
Used to transfer files between computers. |
SMTP/POP3/IMAP |
Simple Mail Transfer Protocol / Post Office Protocol / Internet Message Access Protocol |
Email sending and receiving. |
DNS |
Domain Name System |
Translates domain names to IP addresses. |
Ethernet |
- |
Standard protocol for local area networks (LANs). |
Network Security
Network security involves protecting data during transmission and ensuring network integrity, confidentiality, and availability.
Common Threats:
Malware |
Malicious software (e.g., viruses, worms, trojans). |
Phishing |
Deceptive attempts to steal sensitive info. |
Man-in-the-Middle Attacks |
Intercepting communication between two parties. |
Denial of Service (DoS) |
Overloading a network or server to crash it. |
Ransomware |
Data encrypted until payment is made. |
Preventive Measures:
Measure |
Description |
Firewalls |
Filter incoming and outgoing network traffic. |
Antivirus Software |
Detects and removes malicious software. |
Encryption |
Scrambles data to prevent unauthorized access. |
User Authentication |
Strong passwords, two-factor authentication (2FA). |
Access Control |
Ensures only authorized users access certain data. |
Regular Updates |
Keeps software secure from known vulnerabilities. |