• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/29

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

29 Cards in this Set

  • Front
  • Back
The most popular LAN architecture that can run at 10 Mbps, 100 Mbps, or 1 Gbps
Ethernet
A ring-based network that does not require a centralized hub and can transfer data at a rate of 100 Mbps
FDDI (Riber Distributed Data Interface)
The header and trailer information added to data to form a data packet to be sent over a network
frame
Communication that happens in two directions at the same time
full duplex
a computer or device that connects networks
gateway
Communication between two devices whereby transmission takes place in only one direction at a time
half-duplex
any computer or other device on a network that has been assigned an IP address; also called a node
host
a network device or box that provides a central location to connect cables
hub
a private network that uses the TCP/IP protocols
intranet
a computer network that covers only a small area, usually within one building
LAN (Local Area Network)
A process that converts private IP addresses on a LAN to the proxy server's IP address before a data packet is sent over the Internet
NAT (Network Address Translation)
An expansion card that plugs into a computer's motherboard and provides a port on the back of the card to connect a PC to a network
NIC (Network Interface Card
An operating system that resides on the controlling computer in the network
NOS (network operating system)
Segment of network data that also includes header, destination address, and trailer information that is sent as a unit
packet
a network cable that is used to connect a PC to a hub, switch, or router
patch cable
a Windows and Unix command used to troubleshoot network connections; verifies that the host can communicate with another host on the network
Ping (Packet Internet Grouper)
A server that acts as an intermediary between another computer and the Internet; substitues its own IP address for the IP address of the computer on the network making a request, so that all traffic over the Internet appears to be coming from only the IP address of the proxy server
proxy server
A device that amplifies signals on a network so they can be transmitted further down the line
repeater
a network topology in which the nodes in a network form a ring; each node is connected only to two other nodes, and a centralized hub is not required
ring topology
a LAN in which all the devices are connected to a central hub
star topology
a LAN that uses a logical bus design, but all devices connected to a central hub, making a physical star
star bus topology
a topology that is physically arranged in a star formation but is logically a ring because of the way information travels on it
star ring topology
a group of four numbers (dotted decimal numbers) that tell TCP/IP if a remote computer is on the same or a different network
subnet mask
a device used to segment a network; it can decide which network segment is to receive a packet, on the basic of the packet's destination MAC address
switch
The suite of protocols that supports communication on the Internet; part of it responsible for error checking and the other for routing
TCP/IP
an older LAN technology developed by IBM that transmits data at 4 Mbps or 16 Mbps
token ring
a network or group of networks that span a large geographical area
WAN (Wide Area Network)
A data encryption method used on wireless networks that use either 64 bit or 128 bit encryption keys that are static keys, meaning the keys do not change while the wireless network is in use
WEP (Wired Equivalent Privacy)
A data encryption method for wireless networks that use the TKIP encryption method and the encryption keys are changed at set intervals while the wireless LAN is in use
WPA (WiFi Protected Access)