β Definition and Types of Networks (LAN, WAN, Wi-Fi)
A network is a system that connects multiple devices to share resources, communicate, and exchange data.
π Types of Networks:
πΉ Local Area Network (LAN):
-
Covers a small geographical area (e.g., homes, offices, schools).
-
Uses Ethernet cables or Wi-Fi for connectivity.
-
Example: Office network connecting multiple computers and printers.
πΉ Wide Area Network (WAN):
-
Spans large areas, such as cities or countries.
-
Uses fiber optics, satellite links, or leased telephone lines.
-
Example: The Internet is the largest WAN.
πΉ Wireless Networks (Wi-Fi):
-
Allows devices to connect without physical cables.
-
Uses radio waves to transmit data.
-
Common in homes, cafes, and public spaces.
Each type of network serves different purposes, from local connections to global communication! π
β Basic Internet Protocols (TCP/IP, HTTP, DNS)
Internet protocols define how data is transmitted and received across networks.
πΉ Transmission Control Protocol/Internet Protocol (TCP/IP):
-
The foundation of internet communication.
-
TCP: Ensures reliable data transmission.
-
IP: Routes data packets to the correct destination.
πΉ Hypertext Transfer Protocol (HTTP/HTTPS):
-
HTTP: Transfers web pages between browsers and servers.
-
HTTPS: A secure version of HTTP using encryption (SSL/TLS).
πΉ Domain Name System (DNS):
-
Translates domain names (e.g., google.com) into IP addresses.
-
Ensures users can access websites without remembering numerical IPs.
These protocols enable seamless browsing, secure transactions, and efficient communication! π
β Cybersecurity and Data Protection (Encryption, Firewalls)
Cybersecurity safeguards networks, devices, and data from cyber threats.
πΉ Common Cyber Threats:
βοΈ Malware: Viruses, ransomware, and spyware that harm devices.
βοΈ Phishing: Fraudulent emails or messages tricking users into revealing sensitive information.
βοΈ DDoS Attacks: Overloading a network to make services unavailable.
πΉ Key Security Measures:
β
Encryption: Converts data into unreadable code to protect it during transmission.
β
Firewalls: Monitor and control incoming/outgoing traffic to block unauthorized access.
β
Strong Passwords: Use complex, unique passwords and multi-factor authentication (MFA).
Understanding and applying cybersecurity principles ensures data privacy and system integrity! ππ