Basics of computer networking
- Differences between an open system and a closed system, why would anyone use a closed system if it can’t be connected to a network or communicated with. Computer networks include the devices and also things can help connect the devices such as routers and switches.
How can the MAC address help incriminate an electronic device compared to just using the IP Address?
How can you use the IP address to physically locate the electronic device?
Intro to basic networking terminology
- To facilitate the connection between two parties, a number of protocols have to be in place so the products can communicate and share information. A number of protocols working together are called protocol suites or stacks.
Why would it be useful to have network reference models developed for products(different manufacturers)?
Why would VPNs be useful to you?
Layers of OSI
- The physical layer would be the one responsible for the connection of devices and also for translate to 0s and 1s. It’s required that the physical layer translate and then the data link pieces the message back together.
Which layer would be most important to ensure the connection is secure? What’s the use of the dialog controller?
TCP/IP
- The application layer of the TC/IP model performs the top three layers of OSI, Application, Presentation, and Session. TC/IP model protocols are not easily replaced and can only provide connectionless services.
What are the key differences between layers of OSI and layers of TCP/IP models?
Why would VPNs be useful to you?
VPN creates an secure encrypted tunnel from your device to the companies network. There are multiple services and application companies uses that are only accessible within the companies network and are not connect to the internet for security purposes. In time like this where every one is working from home they would need a secure way to access those services and application and this is where the VPN would be useful because it can create a secure connection from the users’s device to the companies network. IS provides would not be able to see the traffic between the user’s device to their companies network.