Networking 2: Final Activity - Core Concepts Review
Objective: To demonstrate understanding of the core concepts of client-server
networking, protocols, and security.
Activity Description: This activity consists of short-answer questions and a
simplified diagram exercise designed to assess your understanding of the key
concepts covered in the course.
Part 1: Short Answer Questions
Answer the following questions clearly and concisely.
1. Explain the fundamental difference between a client and a server in a
network. Provide a simple example of each.
- A client is a device or program that requests services or information from another
device, while a server is the one that provides those services or information. They
work together to complete tasks on a network. Example, When you use your phone
to browse Facebook, your phone is the client because it sends a request to
Facebook’s server, which then sends back the information you want to see.
2. Briefly describe the client-server architecture. What are its main
advantages?
- Client-server architecture is a network design where clients make requests for
data or services, and servers respond to those requests. The main advantages are;
It’s organized and easy to manage, Servers can handle many clients at once,
Resources are centralized, making updates and backups easier.
3. List and briefly describe three different types of servers and their primary
functions.
- Web Server: Delivers website content like text, images, and videos to your
browser.
- Mail Server: Manages the sending, receiving, and storage of emails.
- File Server: Stores files and lets users access or share them over a network.
4. What is a communication protocol? Why are communication protocols
essential for network communication?
- A communication protocol is a set of rules that devices follow to communicate with
each other.
They are important because without them, devices wouldn’t understand how to
send or receive data properly. Protocols make sure data is sent in a way both sides
can understand.
5. Name and describe two commonly used communication protocols in client-
server communication.
- HTTP (Hypertext Transfer Protocol): This is used to send and receive web pages
between a browser and a web server.
- FTP (File Transfer Protocol): This is used to upload and download files between a
computer and a server.
6. Explain the role of IP addresses in a network.
- An IP address is a unique number assigned to each device on a network. It acts like
a digital home address so data knows exactly where to go. Without IP addresses,
devices wouldn’t know where to send or receive information.
7. What is a network topology? Give an example of a simple network topology
and briefly describe it.
- Network topology is the way devices are connected in a network. Example is Star
topology, All devices are connected to one central device like a hub or switch. If one
device has a problem, others are usually not affected.
8. Define "middleware" in the context of client-server applications. Provide a
simple example of how middleware can be used.
- Middleware is software that sits between the client and the server and helps them
talk to each other. It handles tasks like translating data, connecting systems, or
adding security. Example, In online shopping, middleware helps your order from the
app reach the warehouse system and get processed smoothly.
9. What is an API? Explain its purpose in client-server communication.
- An API or Application Programming Interface is like a messenger that helps
programs talk to each other. In client-server communication, the API lets the client
request something from the server, and the server gives a response in a way the
client understands.
10. Briefly explain the difference between authentication and authorization.
- Authentication is checking if someone is who they say they are, like logging in with
a password. While, Authorization is checking what they’re allowed to do, like
whether they can view or edit certain files.
11. Describe a basic method for authenticating users in a web application.
- A simple method is the login system where users enter a username and password.
The web application checks if the details match the records in its database. If they
match, access is granted.
12. Why is security important in client-server applications? Give one example
of a common security threat.
- Security keeps sensitive data safe and prevents hackers from attacking systems.
Example threat is Phishing, where attackers trick users into giving away personal
info like passwords through fake emails or websites.
Part 2: Simplified Diagram
Draw a simple diagram illustrating the communication flow between a client (a web
Browser) and a server when a user requests a web page. Include the following
elements In your diagram:
• Client (Web Browser)
• Server (Web Server)
• HTTP Request
• HTTP Response
Add labels to your diagram explaining each step of the communication flow (e.g., “1.
User Enters URL,” “2. Browser sends HTTP request,” etc.).
*I draw this diagram using a digital editing app (ibis Paint X).
Labels and Explanation of Each Step in the Client-Server Communication Flow:
1. User Enters URL in Web Browser
The process begins when the user opens a web browser like Chrome, Firefox,
or Edge. And types in a website address or URL, such as www.example.com.
Pressing Enter tells the browser to start looking for that website.
2. Browser Sends HTTP Request to the Web Server
After getting the URL, the browser builds an HTTP request. This is like a
formal message that says to server, to send the content of the specific web
page. The browser sends this request to the IP address of the web server that
hosts the website.
3. Web Server Receives and Processes the Request
The web server receives the HTTP request and checks what exactly is being
asked for. It looks in its files and databases to find the requested page or
content. If everything is okay, it prepares the necessary data to send back.
4. Web Server Sends Back an HTTP Response
Once the content is ready, the server sends an HTTP response back to the
browser. This response usually contains HTML, CSS, JavaScript, and images of
all building blocks of the web page.
5. Web Browser Displays the Web Page to the User
The browser takes all the data from the HTTP response and renders it into a
full webpage. The user now sees the website loaded and can interact with it.