Tag Archives: Networking Standards and Protocols

Section 2.4 – Networking Standards and Protocols – TestOut

Objective: 

This section introduces you to networking protocols and standards and gives you practice connecting to a secure wireless network. After finishing this section, you should be able to:

  • Describe basic Internet protocols.
  • Compare and contrast wireless network standards.
  • Describe how networking devices transmit data to the right location on a network.
  • Connect to a public WiFi network.
  • Connect to a secure wireless network.
  • Describe various careers in computer networking.

Links:

Key Terms:

  • Physical Address The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device’s MAC address.
  • Logical Address An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.
  • Default Address Class A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
  • Internet Protocol (IP) The principal communications protocol in the internet protocol suite that is used to route information over the Internet.
  • Transmission Control Protocol (TCP) An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.
  • User Datagram Protocol (UDP) An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn’t verify that the packets were correctly received.
  • Domain Name System (DNS) A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.
  • Hypertext Transfer Protocol (HTTP) A protocol that governs the transfer of web content between computers.
  • Hypertext Transfer Protocol Secure (HTTPS) A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.
  • Simple Mail Transfer Protocol (SMTP) A protocol used to send email.
  • Post Office Protocol 3 (POP3) A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.
  • Internet Message Access Protocol (IMAP) A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.
  • IEEE 802 Standards A family of standards that deal mostly with how data is transferred between hosts in a local area network (LAN).
  • IEEE 802.11 Standards A family of standards under the 802 standards that deal with how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
  • IEEE 802.11 Encryption Protocols Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
  • Frequency A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.
  • Attenuation A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.
  • Speed A characteristic of 802.11 protocols that require protocols to transfer data at a specific number of bits per second.
  • Network Architect A person that develops and implements an organization’s communication network, including the hardware and software components needed for both physical and wireless connections.
  • Network Administrator A person that maintains and expands a company’s network. They install and configure network media, create and manage user accounts, implement firewalls and other network security, manage an organization’s mail system, configure network printers, and maintain Internet connectivity.
  • Network Technician A person that works closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company’s IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings.

Topics Discussed:

  • Why is it important that computers on a network use the same protocols?
  • How do computer networks locate specific devices on the network?
  • What career opportunities are available in computer networking?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 2.4: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.

Assigned: November 4th, 2019
Teacher Pacing Due Date: November 6th, 2019