• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/91

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

91 Cards in this Set

  • Front
  • Back

What are some forms of communication?

-Texting


-Social Media


-Collaboration Tools


-Blogs


-Wikis


-Podcasting


-P2P Filesharing

What are different types of networks?

-Small home networks


-Small office/home office networks


-Medium to large networks


-World wide networks

What is the Internet?

Also known as "network of networks", it is a collection of interconnected private and public networks.

What are hosts?

All the computers connected to a network that participate directly in network communication (a.k.a end devices).

What are servers?

Computers that have software that enable them to provice information to other end devices on the network.

What else is to be noted about server software?

-Can provide info to 1+ hosts at the same time.


-Specific software for specific server


-One comp can act as multiple servers(ideal for home or small business).

What are clients?

Computers with software installed that enable them to request and display the information obtained from the server.


What else is to be noted about clients?

-One comp can have multiple client software.

What is a P2P network?

It is usually a small network where computers act as both the client and server.

What are advantages of P2P networking?

-Easy to set up.


-Not complicated.


-Not too expensive as comps act as both client and server (no need for extra PC dedicated roles).


-Can be used for easy small tasks such as transferring files and sharing printers.

What are disadvantages of P2P networking?

-No hierarchy, everyone is on the same level of power.


-Risk of security.


-Can only be of one size.


-Performance speeds are low due to PCs being both clients and servers.

What are the three categories of network components?

-Devices


-Media


-Services

What are the categories of devices?

-End devices


-Intermediary devices



What are some examples of end devices?

-Desktop computer


-Laptop


-Printer


-IP Phone


-Wireless Tablet


-TelePresence Endpoint

What are some examples of intermediary devices?

-Wireless Router


-LAN Switch


-Router


-Multilayer Switch


-Firewall Appliance

What are some or all of the functions that intermediary devices perform?

-Regenerate and retransmit data signals.


-Maintain info about what pathways exist through the network and internetwork.


-Notify other devices of errors and communication failures.


-Direct data along alternate pathways where there is a link failure.


-Classify and direct messages according to priorities.


-Permit or deny flow of data, based on security settings.

What are the different types of media that modern networks use to interconnect devices?

-Metallic wires within cables (copper).


-Glass or plastic fibers (fiber optic cable).


-Wireless transmission.

What needs to be considered when choosing network media?

-Max distance that media can successfully carry a signal.


-Type of environment media will be installed.


-Amount of data and speed of transmission.


-Cost of media and installation.

What are the symbols for network media?

-Blue spiral = Wireless media


-Black bold line = LAN media


-Zig zag red line = WAN media

Where are symbols usually used?

They are usually used in a topology diagram to help understand potential or currently existing network layout.

What are some important terms?

-NIC.


-Physical Port.


-Interface.

What is a NIC?

LAN adapter - provides the physical connection to the network at the PC or other end devices. The media that are connecting the PC to the networking device plug directly into the NIC (Network Interface Card).

What is a Physical Port?

A connector or outlet on a networking device where the media is connected to an end device or another networking device.

What are Interfaces?

Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.

What two terms are used interchangably?

Port and Interface.

What are two different types of topology diagrams?

-Physical (Physical location of intermediary devices and cable installation, e.g. Room 23, etc.).


-Logical (Devices, ports, and addressing scheme, e.g. IP, etc.).

What are two most common types of network infrastructure?

-LAN


-WAN

How do network infrastructures vary?

-Different sizes


-Number of users


-Number/Types of services


-Area of responsibility

What is a LAN?

A network infrastructure that provides access to users and end devices in a small geographical area.

What is a WAN?

A network infrastructure that provides access to other networks over a wide geographical area.

What are some other types of networks?

-Metropolitan Area Network (MAN)


-Wireless LAN (WLAN)


-Storage Area Network (SAN)

What are some specific features of LANs?

-Interconnect end devices in a limited area.


-Usually administrated by a single organisation or person.


-Provides high-speed bandwidth to internal end devices and intermediary devices.

What are some specific features of WANs?

-WANs interconnect LANs over wide geographical areas such as between cities, etc.


-Usually administrated by multiple service providers.


-Typically provide slower-speed links between LANS.

What are all the ways WANs can connect?

Through copper wires, fibre optic cables, and wireless transmissions.

How is the structure and standardization of Internet protocols and processses maintained?

There are organisations that have been developed for this specific purpose, some include the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others..

What is to be noted about the difference between the terms "internet" and "Internet"?

"internet" is used to describe multiple networks interconnected. "Internet" refers to a global scale or the World Wide Web.

What are two other terms that are similar to the term Internet?

-Intranet


-Extranet

What is an Intranet?

A private collection of LANs and WANs that belongs to an organization and is designed to be accessible only by the organisation's employees, members, or others with authorization.

What is an Extranet?

It provides secure and safe access to individuals who work for a different organisation by require access to the organization's data.

What are examples of Extranets?

-Access provided to outside suppliers and contractors.


-A booking system provided to doctors so they can make appointments for their patients.


-Education offices providing local budgeting and personnel info to the schools in the area.

What is a typical way to connect to the Internet?

Home users, teleworkers (remote workers), and small offices typically require a connection to an Internet Service Provider (ISP) to access the Internet.

What are popular choices of connection options?

-Broadband cables


-Broadband digital subscriber line (DSL)


-Wireless WANs


-Mobile services

What are popular business-class services?

-Business DSL


-Leased lines


-Metro Ethernet

What are common connection options for small office and home office users?

-DSL


-Cable


-Cellular


-Satellite


-Dial-Up Telephone

What are the features of Cable connection?

-Typically offered by cable television service providers.


-Internet data signal carried on the same cable that delivers cable television.


-Provides high bandwidth, always on, connection to the Internet.

What are the features of DSL connection?

-Provides high bandwidth, always on, connection to the Internet.


-Runs over a telephone line.


-Small office/home office users use ADSL


-ADSL = Asymmetrical, meaning download speed is faster than upload speed.

What are the features of Cellular connection?

-Uses cell phone network to connect.


-Wherever you get cellular signal, you have cellular Internet access.


-Performance is limited by capabilities of phone and cell tower to which it is connected.

What are the features of Satellite connection?

-Real benefit to those in area that would otherwise have no Internet connectivity at all.


-Satellite dishes require clear line of sight to the satellite.

What are the features of Dial-Up Telephone connection?

-Inexpensive option that uses any phone line and modem.


-Low bandwidth provided by modem is usually not sufficient for large data transfer.


-Useful for mobile access whilst travelling.

What are the features of Dedicated Leased Line connection for businesses?

-Reserved circuits within the SP's network.


-Circuits connect geographically separated offices for private voice and/or data networking.


-Circuits typically rented at yearly or monthly rate.


-Can be expensive.

What are the features of Ethernet WAN connection for businesses?

-Extends LAN access technology into WAN.


-Ethernet is LAN technology.


-Benefits of Ethernet are now being extended to WAN.

What are the features of Digital Subscriber Line connection for businesses?

-Available in various formats.


-SDSL is a popular choice.


-Symmetric DSL is similar to consumer version but uploads and downloads are at the same speed.

What are the features of Satellite connection for businesses?

-Can provide wireless connection when wired solution is unavailable.


-Similar to small office and home office users.

What is a converged network?

They are capable of delivering data, voice and video between many different types of devices over the same network infrastructure which uses the same set of rules, agreements, and implementation standards.

What is network architecture?

It refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

What are four characterstics that network architectures need in order to meet user expectations?

-Fault tolerance


-Scalability


-Quality of Service (QoS)


-Security

What is a fault tolerant network?

A network that limits the impact of a failure, so that the fewest number of devices are affected. It is also built in a way that allows quick recovery when such a failure occurs.

What does a fault tolerant network depend on?

Multiple paths between the source and destination of a message. If one path fails, the messages can be instantly sent over a different link. Having multiple paths to a destination is known as a redundancy.

What is a packet-switched network?

It is when traffic is split into packets that are routed over a shared network. A single message, such as email, is broken into multiple message blocks called packets, they have the necessary addressing information of the source and destination of the message.

What do routers do to the packets in a packet-switched network?

The routers within the network switch the packets based on the condition of the network at that moment, meaning that all the packets in a single mesage could take very different paths to the destination.

What is a circuit-switched network?

It is traditionally used for voice communications and is one that establishes a dedicated circuit between the source and destination before the users may communicate, if the call is unexpectedly terminated then the users must initiate a new connection.

What is a scalable network?

It can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

How can networks be scalable?

Through the designers following accepted standards and protocols that allows software and hardware vendors to focus on improving products and services without worrying about designing a new set of rules for operating within a network.

What is Quality of Service?

A user expectation on how well a service has been provided. It is managed by the router.

What is congestion?

This occurs when a demand for bandwidth exceeds the amount available. When mutliple communications are attempted across the network, the demand for network bandwidth can exceed it's availability, created network congestion.

How is network bandwidth measured?

In the number of bits that can be transmitted ina single second, or bits per second.

What does a QoS policy allow when it's in place?

It allows the router to manage the flow of data and voice traffic, giving priority to voice commmunications if the network experiences congestion.

What are the two types of network security concerns?

-Network infrastructure security


-Information security

What does securing a network infrastructure include?

The physical securing of dvices that provide network connectivity, and preventing unauthorized access to the management software that resides on them.

What does information security include?

It refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.

What are the three primary requirements of achieving the goals of network security?

-Confidentiality


-Availability


-Integrity

What is Confidentiality?

It means that only the intended and authrozied recipients can access and read data.

What is Integrity?

It means having the assurance that the information has not been altered in transmission, from origin to destination.

What is Availability?

It means having the assurance of timely and reliable access to data services for authorized users.

What are some new networking trends?

-BYOD


-Online collaboration


-Video communication


-Cloud computing

What does the term collaboration mean?

It is defined as the act of working with another or others on a joint project.

What is cloud computing?

It allows us to store personal files, even backup our entire hard disk drive on servers over the Internet.

What are the different types of clouds that cloud computing offers?

-Private clouds = for private entities such as the government.


-Public clouds = for general population.


-Hybrid clouds = two clouds in one, e.g. public/custom.


-Custom clouds = for specific needs of an industry, e.g. healthcare or media, can be private or public.

What is the newest home trend?

Smart home technology - this is technology integrated into everyday appliances, e.g. oven, car, etc.

What is powerline networking?

It is an emerging trend for home networking that uses existing electrical wiring to connect devices, this saves money on extra data cabelling and is useful when wireless access isn't available.

What is a wireless internet service provider?

An ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless LANs. Commonly found in rural areas where DSL or cable services are not available.

What are the most common external threats to networks?

-Viruses, worms and Trojan horses


-Spyware and adware


-Zero-day attacks a.k.a zero-hour attacks


-Hacker attacks


-Denial of service (DoS) attacks


-Data interception and theft


-Identity theft

What are Viruses, worms and Trojan horses?

Malicious software and arbitrary code running on a user device.

What are spyware and adware?

Software installed on a user device that secretly collects information about the user.

What are Zero-day/Zero-hour attacks?

An attack that occues on the first day that a vulnerability becomes known.

What are Hacker attacks?

An attack by a knowledgable person to user devices or network resources.

What are Denial of Service (DoS) attacks?

Attacks designed to slow or crash applications and processes on a network device.

What is Data interception and theft?

An attack to capture private information from an organization's network.

What is Identity theft?

An attack to steal the login credentials of a user in order to access private data.

For home office or small office networks, at minimum, what network security components should be put in place?

-Antivirus or antispyware


-Firewall filtering

For larger and corporate networks, at minimum, what network security components should be put in place?

-Dedicated firewall systems


-Access control lists (ACL)


-Intrusion prevention systems (IPS)


-Virtual private networks (VPN)