• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/226

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

226 Cards in this Set

  • Front
  • Back

System unit

Protects the electronic components. Also known as a case chassis

System Board

Otherwise known as a motherboard. This is where the the CPU, ROM, RAM, and controller chips are located

CPU

Where instructions and overall activity is carried out.

When a CPU is combined with I/O and memory Units it is known as a what?

Microcomputer

The CPU consists of what functions?

Control Unit,


Registers


Arithmetic Logic Unit

Control Unit

Receives and gives commands

Registers

A discrete memory location within the CPU. Designed to hold temporary data and instructions.

The CPU communicates with all devices through...

WeL defined signal paths called busses

Address bus

A unidirectional busy that carries data from the CPU to addressable memory Locations in RAM

Data Bus

Bi-directional device allowing th CPU to function as a transmitter and receiver of data.

Control Bus

Controls thr timing and thr direction of data flow (transfer) to and from storage registers

What allows data to travel to/from the CPU?

Busses

ROM (Read Only Memory)

A class of storage medium used in computer and other electronic devices. ROM can be modified slowly, with difficulty, or not at all

Firmware

Software tied to specific hardware

Non-volatile memory

Memory that retains data when the power is turned off

EPROM

Erasable Programmable read only memory

EPROM is also known as...

Flash memory

What are the two types of flash memory?

NAND and NOR

NAND type flash memory is primarily used in...

Memory cards, USB flash drives, solid state drives

NOR type flash memory does what?

Allows a single machine word (byte) to be written and/or read.

What is used as a replacement for EPROM and as an alternative to certain kinds of ROM applications

NOR gate flash memory

RAM

Random Accesible Memory. Loses information when the system is powered off.

Information stored in RAN is stored in a _____ like pattern

Grid

Input Device

Allows the user to communicate to the computer.

What are some common input devices for the computer?

Keyboard, mouse,

What are some output devices?

Monitors

A keyboard is a series of...

Single pole, single throw switches on a circuit board

An optical mouse uses what to track movement?

LED or infrared laser diode

Two monitor types

LCD and LED

LCD displays we're primarily used in...

Laptops

NIC

Network interface card

Every NIC has a....

MAC address

MAC

Media Access Control

What are four those of computer storage devices?

Hard drives, optical media, magnetic tapes, and flash media

HDD

Hard disk drive

How does a hard disk drive save data?

A magnetic disk that rotates at a high rate of speed with a read/write head

Hard drive discs are known as...

Platters

Data in the HDD is stored in locations formed by concentric rings called..

Tracks

Each track is separated into equal parts called...

Sectors

What represents the basic storage unit of the hard drive?

Sector

The disk controller does what?

Controls the transfer of data, instructions, and information form a disk to the rest of the computer

Optical Media

Compact Disk (CD), Digital Video Disk (DVD), and Blu-ray (BD). Used for permanent, removable storage if data

Optical drives record data by doing...

By etching pits on the surface.

Magnetic Tape

Early form of storage.

What are some problems with magnetic tape storage?

New information can overwrite old, stray magnetic fields may destroy the data, temperature and humidity may also affect the magnetic tape

Data stored in a ______ format

Sequential

Do the read/write heads touch the media on magnetic tape storage?

Yes

Hard drive read/write heads touch the platter? True or false

False

Which input device uses switches that close and generate a code that creates a character or symbol on the display?

Keyboard

Peripherals

Devices that work with a computer system yet are not required to operate

Printers

An output device that produces text and graphics on a physical medium such as paper

Hard copy

Information that has been printed on a physical medium

There are generally what two types of pintters?

Impact and non-impact

Impact printer

Forms characters and graphics on a piece of paper by striking a mechanism against an ink ribbon that physically contacts the paper.

Dot matrix printer

An impact printer that produced printed images when tiny wire pins on a print head mechanism strike an inked ribbon. When the ribbon presses against the paper, it creates dots that form characters and graphics.

Non Impact printer

Forms characters and graphics on a piece of paper without actually striking the paper. Some spray ink, while others use heat and pressure to create images. Much quieter than impact printers

Inkjet printer

Forms characters and graphics by spraying won't ink drops of ink onto a piece of paper.

Laser printers

High speed, high quality non-inpact printer. Very high quality images created using a laser beam and powdered ink, called toner, which is packaged in a cartridge. The laser beams create and image on a special drum inside the printer. Toner sticks to the drum by means of static and is transposed to paper when the paper passes under the drum

Optical scanner

Light sensing input device that reads printed text and graphics and translated the result in a form the computer can use

Microphone

an acoustic to electric transducer or sensor that converts sound into an electronic signal

Speakers

A piece of equipment that converts an electric signal back to sound

What are microphones used for?

Recording voice, voice over IP (VoIP), ultrasonic checking

What is the purpose of modem?

To allow digital devices to communicate over analog lines such as telephones.

Modem

Converts digital to analog and analog to digital. Modulator/demodulator

Modems are considered _________ since the signals into the first modem are identical to the demodulated signals.

Transparent

A/D convertor

Changes analog signals to digital (binary) representation.

Digitising

Another word for A/D conversion

D/A convertor

Changes a set of digital binary numbers in specific voltage equal to the binary value.

Network media convertors

Connect various types of cables that exist within a network.

Gateway

Acts as a translator between workstations and networks that use different operating systems, communication protocols, data format structures, or network hardware architectures by enabling the nodes to communicate with different types of networks or devices.

A network node can be....

A connection point, a redistribution point, or an endpoint.

Network gateway

An interworking system capable of joining together two networks that use different base protocols

Default Gafeway

Device that passes traffic from the local summer to devices on another subnet. Often connects local network to the internet

A network gateway can be implemented at any and layer of the ______ model.

OSI

Email gateway

Translates messages from one vendors messaging application to another vendor's application.

What kind of gateway incorporates advanced security features that allow for defense against phishing attacks, malware, and other email born threats such as spam, viruses, bulk emails, directory harvest, and denial of service attacks.

Email gateway

A __________ ___________ is a computer networking device that connects devices together on a network by using packet switching to receive, process and forward data to the destination device.

Network switch

Switch are use in physical ______ and ______ topologies

Star and Tree

Store and forward

Entire packet is received and placed into buffer memory, where an error check (CRC) is performed, and the packet is sent to the proper port for delivery.

Switches can be categorized by what switching techniques?

Store-and-forward


Cut-through


Fragment fee

Cut through

Doesn't store or do a CRC check, just directing the frame to it's destination. This makes this switch fast

Fragment free

The switch checks for first 64 bytes of a frame before forwarding the frame to the proper port for delivery.

Bridge

A device that connects two or more network segments and effectively joining them into one logical network.

A bridge uses a _________ __________ to determine whether a frame should be forwarded or filtered.

Filtering database

Bridges operate at what layer?

2

Routers

A networking device that forwards packets between computer networks.

A router is connect to ___ or more ones from different networks

Two

Network switch connect data ones from ____ one single network

One

Routers can support...

Dynamic path assignment.

Dynamic path assignment

Permits routers to use alternate paths if needed and are able to perform dynamic load balancing of communications when alternative routes are available between networks.

Cryptography

The process of converting the meaning of data rather than it's existence

Plaintext

Data that can be read without any special measures

Encryption

Disguising plaintext in such a way as to hide its meaning.

__________/________ devices are used fk convert plaintext into copper text in order to transmit data and voice signals.

Encryption, comsec

What are the four types of telecommunications that we encrypt?

Wideband Encryption, narrowband encryption, bulk encryption, network encryption

Wideband encryption

Method of sending audio communications that has the ability to transmit more information. The data is encrypted in order to be carried securely over leased lines, satellites, microwaves, or radio signals.

Narrowband encryption

Used for information from voice communications from telephones, but can be used for radio and satellite communications.

Bulk encryption

Simultaneous encryption of all channels of a multichannel telecommunications link.

Network Encryption

Network security process that applies crypto services at the network transfer layer (3 and 4).

New York encryption is invisible to the....

End user

Data is encrypted only while ____ ________

In transit

Network encryption is implemented through

Internet Protocol Security (IPsec)

What are the two types of communication mediums?

Guided and unguided

Examples of guided media

Twosted pair and fiber optic

Twisted-Pair Cable

Most common media for network connectivity. Limits signal degradation from EMI and RFI. Precise specifications on number if twists per meter. A copper, wire based cable that can be shielded or unshielded.

RJ-11

Two pair, telephone

RJ-45

Four pair, data

What organization specifies categories of UTP in terms of data rates they can sustain?

The American National Standards Institute (ANSI)

Category 1

Voice grade telephone wire - not suitable for data transmission

Category 5(e)

Rated for data transmission up to 100 Mbps (fast ethernet). --Cat 5(e) enhanced cat 5, minimizing cross talk.

Category 6

Rated for transmission up to 1000 Mbps (Gigabit ethernet)

What is the major benefit of STP

Reduces electrical noise both within the cable (pair to pair cross talk) and outside the cable (EMI and RFI)

Fiber Optic Cabeling

Converts electrical signals in optical signals through a thin glass fiber.

What ground/guided media is immune to EMF monitoring?

Fiber Optic

Multimode Fiber

Corr diameter of 50-100 microns. Allows many modes or paths kf light to propagate down the optic path.

Shat are the two types of multitude fiber?

Graded and stepped.

Mulitmode fiber segment lengths

2000 meters for 10 and 100 Mbps Ethernet


550 meters for 1Gbps Ethernet

Single-Mode Fiber

Used a glass fiber approximately 10 microns in diameter and permits a single mods kf light to be propagated using expensive laser.

Unguided/unbound media

Wireless

What are the most common unguided media.

Light transmissions and radio waves

Light transmissions

Use of lasers to communicates. Require a clear line of sight between devices. Lited area that they can be monitored. Easily interrupted by weather conditions.

Radio Waves

Radio waves for networking are typically microwave 1-20 GHz. Atmospheric conditions can also affect

Radio waves can be ______ or _______ on nature

Fixed frequency signals


Spread spectrum signals

Advantages of unguided medium

Mobility and relocatable.

Disadvantages of unguided media

Security - more susceptible to intervention and monitoring.


Distortion and interference- susceptible to interference and distortions from lights, electronic devices and atmospheric conditions


Speed - slower speed than guided mediums

Multiplexer

A communications device that combines several data or voice signals for transmission over one single medium

The more nodes connected to a multiplexor, the _______ the performance.

Poorer

Wave division Multiplexing

Combines several different data signals onto a fiber optic cable. Optical combiner is used to send and a light splitter to receive.

Time Division Multiplexing

The distribution of multiple signals in the tine domain, involving a digital process. Speech is cut into small time fragments and is scrambled ejfb other segments in an ever changing order.

Each user in TDM is assigned a specific

Time slot

If a user has no data do send using TDM, the used time slot

Stays empty

Network layer

Routing, subnet traffic control, logical-physical address mapping.

Network protocols

IP

Data link layer

Frame sequencing, traffic control, acknowledgement, limiting, error checking, Media Access Control

Data link protocols

802.2, 802.3, 802.5, DLC

Physical layer

Cabling, data encoding, baseband, broadband, bits and volts.

Physical protocols

TIA/EIA-232 V.35, RS-530

Layers 7,6,5 primary data unit

Data

Layers 4 PDU

Segment

Layer 3 PDU

Packet

Layer Two PDU

Frame

Layer One PDU

Bits

Layer 7

Relates to services that directly support user applications

Layer 6

Responsible for the delivery and formatting of information to the application layer for further processing or display

Layer 5

Establishes communication sessions between two processes on different devices.

Layer 4

Responsible for flow control, end to end recovery, and data deliver to the appropriate application process on the host computers.

Layer 3

Responsible for addressing packets and translating logical IP addresses and names into physical addresses.

Layer 2

Sends data frames from the network layer to the physical layer.

Data frame

An organize logical structure where data is pLaced

Layer 1

Transmits the unstructured, raw bit stream over a physical medium.

TCP

Transmission Control ProtocoL - one if the main protocoLs in TCP/IP networks. TCP enables two computers to establish a connection and exchange streams of data in the form of units.

TCP is __________ oriented

Connection

TCP operates at the _______ layer.

Transport/4

TCP/IP protocols

Application Protocols: HTTP, FTP, SMTP, DNS, RIP, SNMP

The application layer of the TCP/IP model is equivalent to what layer(s) of the OSI model?

Application, Presentation, Session

What TCP/IP protocols operate at the Host-Host layer?

TCP, UDP

The Host to Host layer of the TCP/IP model is equivalent to what layer(s) of the OSI model?

Transport layer

What protocols operate at the Internet layer of the TCP/IP model?

IP, IGMP, ICMP, ARP

The internet layer of the TCP/IP model is equivalent to what layer(s) of the OSI model?

Network layer

What protocols operate at the network Interface layer of the TCP/IP model?

Ethernet, Frame Relay, ATM

The network layer of the tcp/ip model is equivalent to what layer(s) of the osi model?

Data link


Physical

HTTP

Hyper Text Transfer Protocol - a protocol that allows you to use browse websites using a browse. It defines how data is formated, transmitted, and what actions web servers and browsers should take in response to various commands.

File Transfer Protocol

A method of transferring data files from one computer to another over a network. FTP divides files into several segments and assigns a reference number to each one. Transmitted in sequence which the receiving computer reassembled to an exact copy.

SMTP

Simple Mail Transfer Protocol - Used to transfer email and attachments. Built into mail client and email server software.

DNS

Domain Name System - provides a friendly name for IP address on the internet.

RIP

Routing Information Protocol- distance-vector routing protocol. A distance vector router communicates all the routes it knows to the other routers directly attached to it so they can make routing tables. Original RIP had a max hop count of 15. RIPv2 added authentication to it's firmware capabilities, thereby allowing secure transmissions and reducing it's vulnerabilities.

SNMP

Simple Network Management Protocol

SNMP

A set of network protocols created to permit remote monitoring and management of devices and hosts.

UDP

User Data Protocol - a connection less protocol, the UDP, is not responsible for end to end transmission of data.

Address Resolution Protocol

ARP operates at the network later of the OSI model and is a telecommunications protocols for "resolving" (converting)

Local Area Network (LAN)

A small network usually confined to a single building, or group of buildings (usually doesn't exceed two kilometers.

Metropolitan Area Network (MAN)

Designed to cover the geographic area the size of a town or city. A MAN can interconnect several LANs by bridging them with a backbone. Also called a Campus Area Network (CAN) and Base Area Network (BAN)

Wide Area Network (WAN)

Geographically dispersed network that can cover across the country or worldwide. It may be privately owned or rented, but usually denotes inclusion of public (open) networks.

A directly connected wireless network is called...

Ad hoc network

Wireless networks provide what advantages?

Flexibility of movement and spares the expense of a lot of cables

A wireless network can be an extension kf the LAN through...

A wireless transceiver known at an Access Point (AP)

WPAN

Wireless Personal Area Network - blue tooth devices.

What are some advantages of a wired network?

Faster and more secure connection but can only support cabling distances shorter than 2000 ft.

What are some disadvantages of a wireless network?

Less secure and transmissions speeds suffer from outside interference

The range of a wireless network is usually ______ ft. Indoors and up to ________ft outdoors depending on the terrain.

150-300, 1000

TCP has shown to work poorly over...

A wireless link

What are the two types if access Points used to bridge wireless networks?

APs


Autonomous APsLightweight APs


Lightweight APs

Autonomous AP

Thick or fat - have all the software required to manage WLAN processes with no need for additional controllers or switches.

Lightweight AP

Thin AP or access port, have limited software and require WLAN controllers and switches.

Some access points include:

Detachable or Fixed antenna


Replaceable radio cards


Support IEEE standards


Filtering (Protocol or MAX)


Ethernet or other wired connectivity

Protocol filetering

Limits access at the packet frame layer. Blocks access from certain packet types based on programming settings

MAC filtering

Devices are authorized access to the AP based on the MAC address of each device being registered on the AP.

VPN

Virtual Private Network - secure, resilient, scalable voice and/or data network created over public lines using tunneling techniques. Usually deployed as a backup or extension of existing networks.

In addition to video conferencing transmitting audio and visual of meeting activities, they can be used to.

Share documents, computer-displayed information, and whiteboards

Network topology

Refers to the way a network is connected and how it communicates.

What are the two types of topologies?

Physical Topology and logical topology

Physical topology

Refers to the physical interconnection of network devices.

Logical Topology

How information is passed through the network

What are the different types of physical topologies?

Bus, star, mesh, tree, hybrid

Bus topology

The simplest form of physical bus topology consists of a trunk/main cable with only two endpoints. Also known as a linear bus.

The trunk cable is also known as the...

Backbone

What are the two types of bus topologies?

Regular bus


Local bus

Regular bus

Uses one long cable as the central backbone. Short cable (drop cables) are attached to the backbone via cable tabs to split the electrical signal. Drop cables are then connected to the NIC of each device.

Local bus

Uses a backbone made of short cable lengths attached to T connectors at regular intervals. Each T-connectkr is then directly connected attached to the NIC of each device like a daisy chain. Both ends kf the back bond mist be terminated with resistive end connectors called terminators.

Resistive end connector

Prevents signal bounce.

Local bus uses a __________ topology meaning the signal get weaker as it travels down the length of the wires.

Passive

Advantages of bus topology

* Requires less total cabling than other topologies


* Typically the cheapest topologh to implement.


* easy to connects computer or peripheral to a linear bus


* well suited for temporary networks


* relatively easy to install, extend, and maintain for small networks


Disadvantages of a bus topology

* limited cable length and number of stations


* performance degrades as additional computers are added.


* difficult to troubleshoot if the entire network shuts down.


* Terminators are required at both ends of the bus (backbone cable)


* A break in the central backbone cable (bus) shuts down the entire network

Star topology

Uses a central node called a switch to connect peripheral nodes. Simultaneously connects all devices on the network.

Advantages of star topology

* Easy to expand (i.e. more devices, switches, etc


* more suited for larger networks


* can accommodate different types of cabling


* allows nodes to communicate with any.all other nodes.


* central switches as easy to maintain

Disadvantages of a Star Topology

* requires a large amount of cabling


* can be expensive depending on size of the network


* Failure of the switch will isolate all attached to the nodes


* bottlenecks can occur because all data must pass through the switch.

Mesh topilogy

Offers superior redundancy and reliability. Eac device is connected to every other device by separate cabling. This provides redundant paths throughout the network is that if one cable fails, another will take the traffic

Advantages of mesh topology

* Greater fault tolerance


* maintains stability, privacy, and safety.


* point to point links make fault identification and fault isolation easy

Disadvantages of mesh topology

* very hard to administer


* very expensive.

Tree topology

Combines attribute of bus and star topology. Comprised of groups of star configured workstations connected to a linear bus/backbone

Tree topology

Combines attribute of bus and star topology. Comprised of groups of star configured workstations connected to a linear bus/backbone

Advantages of Tree Topology

*Allows for later expansion


* Point to point wiring for individual segments


* supported by sever hardware and software vendors


* can lose one or more segment without affecting the rest of the network.

Disadvantages of a tree topology

*If the backbone breaks, network shut down


* difficult to configure


* overall length to each segment is limited by the type of cabling use.


* Syncronization must he maintained before and during transmission

Ethernet uses an access protocol known as...

CSMA/CD



Carrier Sense Multiple Access with collision detection.

CSMA/CD

All computer on the network (Multiple Access) check the cable for traffic (carrier seems) before attempting to transmit a frame of data.

Protocol

A standard or an agreed upon format for transmitting data between two network devices.

Connection Oriented

Delivery of information is guaranteed by protocols employed to transmit it. If any data is not received it is resent. They use a preliminary protocol to establish an end-to-end connection

Connectionless Oriented Comminication

Aka datagram communication. Data is sent from one end-point to another without prior arrangement and no guarantees that the data will actually reach the recipient.

Application Layer

End user Layer

Application Protocols

Telnet, TFTP, FTP, HTTP

Presentation Layer

Defines how data is presented (syntax layer) encrypt, decrypt

Presentation Layer protocols

ASCII, JPEG, WAV, BMP

Session Layers

Keeps different applications data separate. Places checkpoints in large data streams to determine depression.

Session protocols

Operating System and Application Access Scheduling

Transport layer

Data segmentation, traffic control, session multiplexing

Transport protocols

TCP, UDP