• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/58

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

58 Cards in this Set

  • Front
  • Back
Describe a LAN
Local Area Network refers to a group of interconnected devices that are under the same administrative control
Describe a WAN
Wide Area Network are networks in geographically separated locations.
Explain peep-to-peer networks
There are no dedicated servers or hierarchy among the computers.
Explain Client/Server networks
The client request information or services (printer etc) from the server. Network Admins maintain the servers, and controls user access to the network resources.
Simplex
A single one-way transmission of data. example: Signal that is sent from a TV station to your TV at home
Half-Duplex
Data flows in one direction at a time. It allows alternating transmission in two directions, but not both simultaneously. Ex. two-way radios
Full-Duplex
When data flows in both directions at the same time. Ex: telephone conversation
Bandwidth
The amount of data that can be transmitted within a fixed time period. When data is sent over a computer network, it is broken up into small chunks called packets. Each packet contains headers. A header is information added to each packet that contains the source and destination of the packet. A header also contains information that describes how to put all of the packets back together again at the destination.
TCP/IP Protocol
Transmission Control Protocol/Internet Protocol: Dominant standard for internetworking. Represents a set of public standards that specify how packets of info are exchanged between computers over one or more networks
IPX/SPX
Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite employed originally by Novell corporations newtork OS, NetWare. It delivers funtions similar to those included in TCP/IP. Novell in it's current releases supports the TCP/IP suite. There remains a large installed base or NetWare networks that continue to use IPX/SPX
NetBEUI
NetBios Extended User Interface is a protocol used primarily on small Windows NT networks. It cannot be routed, and is ideal for peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP.
AppleTalk
A protocol suite to network Macintosh computers. It is comprised of a comprehensive set of protocols that span the seven layers of the OSI reference model. It's designed to run over LocalTalk, which is the Apple LAN physical topology.
HTTP
Hypertext Transfer Protocol governs how files such as text, graphics, sounds, and video are exchanged on the World Wide Web (WWW). The internet engineering task force (IETF) developed the standards for HTTP.
FTP
File Transfer Protocol is a protocol that provides services for the file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems.
SSH
Secure Socket Host is used to securely connect to a remote computer
TELNET
An application used to connect to a remote computer, buy lacks security features
POP
Post Office Protocol is used to download e-mail from a remote mail server
IMAP
Internet Message Access Protocol is used to download e-mail from a remote mail server
SMTP
Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server
ICMP
Internet Control Message Protocol is used by devices on a network to send control and error messages to computers and servers.
ping
Packet internet groper is commonly used to test connections between computers. Ping is a simple but highly useful command line utility used to determine whether a specific IP address is accessible
Hub
Extends the range of the network by receiving data on one port and then regenerating the data and sending it out to all the other devices connected to the hub. This process means that all traffic from a device connected to the hub is sent to all the other devices connected to the hub every time the hub transmits data. This causes a great amount of network traffic. This is known as broadcasting. Often causes a lot of collisions on the network.
Bridge
Defines boundaries of segments, and filters network traffic between segments. Bridges keep a record of all the devices on each segment to which the bridge is connected. When the bridge receives a frame, the destination address is examined by the bridge to determine if the frame is to be sent to a different segment, or dropped.
Switch
AKA multiport bridge. A switch has several ports, depending on how many network segments are to be linked. A switch is a more sophisticated device than a bridge. A switch maintains a table of the MAC addresses for computers that are connected to each port. When a frame arrives at a port, the switch compares the address information in the frame to its MAC address table. The switch then determines which port to use to forward the frame.
Router
Routers use IP addresses to forward frames to other networks. A router can be a computer with special network software installed, or a router can be a device built by network equipment manufacturers. Routers contain tables of IP addresses along with optimal destination routes to other networks.
Twisted-Pair
A type of copper cabling that is used for telephone communications and most Ethernet networks. A pair of wires forms a circuit that can transmit data. The pair is twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded plastic insulation and twisted together. An outer jacket protects the bundles of twisted pairs. When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation effect. Without the cancellation effect, your network communications become slow due to the interference caused by the magnetic fields. Range of 328ft (100meters)
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to connect computers in a network.
Fiber-Optic Cable
A glass or plastic conductor that transmits data using light. Because it is made of glass, fiber-optic cable is not affected by electromagnetic interference or radio frequency interference. All signals are converted to light pulses to enter the cable, and converted back into electrical signals when they leave it. This means that fiber-optic cable can deliver signals that are clearer, can go farther, and have greater bandwidth than cable made of copper or other metals.
Physical Topologies
A physical topology defines the way in which computers, printers, and other devices are connected to a network
Bus Topology
In the bus topology, each computer connects to a common cable. The cable connects one computer to the next, like a bus line going through a city. The cable has a small cap installed at the end, called a terminator. The terminator prevents signals from bouncing back and causing network errors.
Ring Topology
In a ring topology, hosts are connected in a physical ring or circle. Because the ring topology has no beginning or end, the cable does not need to be terminated. A specially-formatted frame, called a token, travels around the ring, stopping at each host. If a host wants to transmit data, the host adds the data and the destination address to the frame. The frame then continues around the ring until the frame stops at the host with the destination address. The destination host takes the data out of the frame.
Star Topology
The star topology has a central connection point, which is normally a device such as a hub, switch, or router. Each host on a network has a cable segment that attaches the host directly to the central connection point. The advantage of a star topology is that it is easy to troubleshoot. Each host is connected to the central device with its own wire. If there is a problem with that cable, only that host is affected. The rest of the network remains operational.
Hierarchical or Extended Star Topology
A hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device. Typically, a network cable connects to one hub, and then several other hubs connect to the first hub
Mesh Topology
The mesh topology connects all devices to each other. When every device is connected to every other device, a failure of any cable will not affect the network. The mesh topology is used in WANs that interconnect LANs.
Broadcast Logical Topology
each host addresses either data to a particular host or to all hosts connected on a network. There is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network.
Token Logical Topology
Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.
Class A network
255.0.0.0
Class B network
255.255.0.0
Class C Network
255.255.255.0
DHCP
Dynamic Host Configuration Protocol is a software utility used to dynamically assign IP addresses to network devices. Including IP address, subnet mask, default gateway, and DNS server addresses.
APIPA
Automatic Private IP Addressing is 169.254.0.0-169.254.255.255 and it will continually request an IP address from a DHCP server.
IP Address
A unique number that is used to identify a network device. An IP address consists of a series of 32 binary bits (ones and zeros). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets
Cat 3
Telephone connections
Cat 5 and 5e
Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps.
Cat 6
Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents interference. The pairs also have more twists than Category 5e cable.
Thicknet 10BASE5
Coax cable that was used in networks and operated and 10mbps with a max length of 500 meters
Thinnet 10BASE2
Coax cable that was used in networks and operated at 10 mbps with a max length of 185 Meters
RG-59
most commonly used for cable television in the US
RG-6
Higher quality than RG-59, with more bandwidth and less susceptibility to interference
Multimode (fiber optics)
Cable that has a thicker core than single-core cable. It is easier to make, can use simpler light sources (LEDs), and works well over distances of a few KMs or less
Single-Mode
Cable that has a very thin core. It is harder to make, uses lasers as a light source, and can transmit signals dozens of kilometers with ease.
Ethernet
Based on the IEEE 802.3 standard, which specifies that a network use the Carrier Sense Multiple Access with the Collision Detection (CSMA/CD) access control method.
10Base-T
10mbps Ethernet T=Twisted Pair
100Base-T
100 mbps(FastEthernet)
1000Base-t
1Gbps Gigabit Ethernet
FDDI
Fiber distributed data interface (FDDI) is a type of Token Ring network. The implementation and topology of FDDI differs from the IBM Token Ring LAN architecture. FDDI is often used to connect several buildings in an office complex or on a university campus. Runs on fiber-optic cable. Runs at 100mbps with a primary and secondary ring topology. FDDI combines high-speed performance with the advantages of the token-passing ring topology. FDDI runs at 100 Mbps on a dual-ring topology. The outer ring is called the primary ring and the inner ring is called the secondary ring. Normally, traffic flows only on the primary ring. If the primary ring fails, the data automatically flows onto the secondary ring in the opposite direction.

An FDDI dual ring supports a maximum of 500 computers per ring. The total distance of each length of the cable ring is 62 miles (100 km).
OSI Model
An industry standard framework that is used to divide network communications into seven distinct layers.
1. Physical: Defines all the electrical and physical specs for devices
2. Data Link: Provides physical addressing and media access procedures
3. Network: Responsible for logical addressing and the domain of routing
4. Transport: Provides reliable transport and flow control across a network
5. Session: Establishes, manages, and terminates the connections between the local and remote application
6. Presentation: Transforms data formats to provide a standard interface for the Application layer
7. Application: Responsible for network services to applications
Please Do Not Throw Sausage Pizza Away.
Token ring
IBM originally developed Token Ring as a reliable network architecture based on the token-passing access control method. Token Ring is often integrated with IBM mainframe systems. Token Ring is used with computers and mainframes.