Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
122 Cards in this Set
- Front
- Back
Enables Users to Access the Network (Access Layer) |
LAN (Local Area Network) |
|
Distributes traffic to and from the LANS (Distribution Layer) |
Building Backbone Network |
|
Connects all buildings on one campus (Core Layer) |
Campus backbone |
|
The Traditional design is known as __________ and is not suitable for today's network needs because ___________ (4) |
Waterfall Approach 1. Technology is changing quickly. Costly 2. Costly and Time Consuming 3. Escalating network traffic demands 4. Decrease in hardware costs and increase in staff costs |
|
The new design process is known as __________ and its steps include _________ (3) |
Building Block Design Proces
1. Needs Analysis (Understand current and future network needs) 2. Technology Design (includes clients, servers, circuits, and networking devices) 3. Cost assessment (financial analysis of various technology designs) |
|
The first step in the Building Block design process is ___________ and includes the following steps ___________ (5) |
Needs Analysis 1. Create Baselines (users supported, apps supported, etc) 2. Break network into architectural components (building blocks) 3. Review existing and expected applications that will use the network (identify hardware/software requirements/protocols for applications 4. Identify and assess network users (how many, types, needs) 5. Categorize network requirements (mandatory, desirable, wish-list) |
|
The second step in the building block process is _________ and the steps include _________ (2) |
Technology Design 1. Designing clients and servers 2. Designing circuits |
|
The two steps of designing circuits in the Technology Design phase include _________ and _________ |
1. Capacity Planning 2. Circuit Loading |
|
The estimation of circuit size and type required for each network component is known as ___________ |
Capacity Planning |
|
An assessment of the amount of data transferred across a circuit (currently or in the future) is known as ______________ |
Circuit Loading |
|
Designing for ___________ is ideal for LANs. Some reasons for this include ___________ (3) |
Peak traffic. 1. Upgrading costs 50-80% more than designing for higher capacity 2. Very few complaints about overcapacity 3. Most networks designed with excess capacity end up using overcapacity within 3 years |
|
__________________ is an expression that means traffic increases much faster than originally forecast. When a new, faster network is built, more people are likely to use it than the old one because it is efficient, available, and provides more capabilities |
Turnpike Effect |
|
The third step in the building block design process is known as _________________ and involves _________________ |
Cost assessment Financial analysis of the various technology design alternatives |
|
The Cost assessment phase of the building block design process must analyze the following factors: (7) |
1. Circuit costs (cabling/installation) 2. Internetworking devices (switches and routers) 3. Hardware costs (clients, servers, power supplies) 4. Software costs (operating systems, app software, middleware) 5. Network management and maintenance costs 6. Operation costs to run network 7. WAN and internet circuits |
|
A detailed specification of equipment, software, and services desired from vendors is known as _______________ |
Request for Proposal (RFP) |
|
Key Point: __________ and ___________ are typically built and owned by the organization and often built with excess capacity |
LAN and BN |
|
_______s are usually leased from the carrier and often designed at or near capacity |
Wide Area Networks (WAN) |
|
____________ usually connect computers on a network so as to communicate with each other. Key Point: They can send or receive information, but they can't ________________ |
Hubs Do both at the same time |
|
____________ function similarly as hubs, but they are different in that _______________ |
Switches Send information only to the computers that they are intended for |
|
_______________ are intermediary devices that enable computers to communicate or pass information between two networks |
Routers |
|
_____________ or _____________ provide wireless access to a wired Ethernet network |
Access Points (AP) Wireless Access Points (WAP) |
|
The following type of cable is mostly used for LANs and has a low cost, making it useful. The typical distance for this type of cable is ____________ |
Unshielded Twisted Pair 100 Meters |
|
Shielded Twisted Pair (STP) is only used in _____________________. Examples of these locations are ______________ |
Special areas that produce electrical interference Factories near heavy machinery, Hospitals near MRI scanners |
|
The following cable is even thinner for UTP wire, and takes much more space when cabled throughout a building. Additionally, they are mostly used for ______________ |
Fiber-Optic cable Backbone NEtworks |
|
_____________ is the basic geometric layout of a network, and the two types of these are ________________ and _______________ |
Topology Logical Topology Physical Topology |
|
Logical topology defines how networks work _______________. Examples are: (2) |
Conceptually Logical data flow diagram (DFD) Logical entity relation diagram (ERD) |
|
Physical topology defines how a network is _____________. Examples include: (2) |
Physically installed Physical DFD Physical ERD |
|
A _______________ is multipoint, so if you talk everybody can here you |
Logical Bus |
|
The only place we use logical bus is _______________. Everywhere else we see _____________ |
Logical hub design. Star |
|
_______________ Is also called traditional Ethernet. It uses a ___________ topology. |
Hub-Based Ethernet Physical star |
|
In a logical bus topology, all devices receive all messages as if they were connected to a __________ circuit |
Multipoint |
|
A _________________ Ethernet uses Logical Star topology and physical star topology |
Switch-Based Ethernet |
|
In a Switch-Based Ethernet, only the _________________ receives the message |
Intended destination |
|
The two forms of wired Ethernet include ___________ and _____________ |
Switch-Based Ethernet Hub-Based Ethernet |
|
______________ is commonly known as Wi-Fi and uses radio frequencies to transmit signals through the air (instead of cables) |
Wireless LAN |
|
The benefits of Wireless Lan include: (3) |
1. Provide network connections where cabling is impossible or undesirable 2. Allows device and user mobility 3. Potentially more economical than wired networks |
|
The physical topology of wireless LAN is ______________. The logical topology of wireless LAN is ______________. This is the same as _________ based Ethernet |
Physical Star Logical bus (multi-points) Hub |
|
_____________ is important because WLANs are easy to discover |
Security |
|
The three types of WLANs are: (3) Are they breakable? |
WEP (wired equivalent privacy): Easily Breakable WPA (Wi-Fi protected acces): Breakable by brutal force WPA2: Currently recommended, still breakable |
|
LAN performance is usually expressed in terms of ___________ (total amount of user data transmitted in a given time period) or in _____________. |
Throughput Response time |
|
_____________ is the part of the network that is restricting data flow and usually lies in the _________ or the _____________ |
Bottleneck Client Server |
|
The bottleneck is in the server if ______________ |
Server utilization is high (80-100%) |
|
The bottleneck is in the network circuit if _________________, some circuits cannot transmit messages as necessary |
Server utilization is low |
|
A backbone network connects __________ and ________ together |
LAN WAN |
|
The 3 types of backbone architectures are: (3) |
Switched Backbone network Routed Backbone network Virtual LANs (VLANs) |
|
The switched backbone is the most common type of BN in the _________ layer. |
Distribution |
|
The switched backbone uses ____________ switches |
Layer-2 |
|
The ______________ is also called the subnetted or hierarchical backbone and is typically used at the _________ layer |
Routed Backbone Core |
|
Advantages of the routed backbone include: (1) Disadvantages include: (3) |
Advantage: LAN segmentation Disadvantages: 1. Tend to be slower because of IP address 2. More expensive, more overhead 3. Harder to manage |
|
______________ puts devices in different LAN via software, rather than physically moving hardware around |
VLAN |
|
Key Point: VLANs are enabled by ____________ switches. |
High-speed layer-3 |
|
Advantages of VLANs include: (3) |
1. More flexible subnetting (we can put computers on the same subnet in different buildings 2. Better managed traffic flow, leading to faster performance 3. Traffic prioritization |
|
Key Point: VLANs allow us to create subnets based on __________, rather than ______________ |
Who you are Where you are |
|
Disadvantages of VLANs include: (3) |
1. Complex technology 2. Increased management overhead 3. Layer 3 switches are more costly than layer 2 switches |
|
The ____________ works with network layer using IP address to route package |
Router |
|
The __________ switch works with data link layer using _________ to send the package |
Layer 2 MAC address |
|
The ____________ switch can work like a router, so it can work with both data link and network layer |
Layer 3 |
|
True or False: All switches are two layers |
False |
|
True or false: all switches are data link switches |
False |
|
True or false: HUB uses IP address |
False, hub has no intelligence, just a physical object |
|
_______________ BN is most commonly used in the distribution layer. _____________ BN is most commonly used in the core layer |
Switch Routed |
|
________________ are networks that run long distances connecting different buildings (LAN, BN) or campuses (BN) |
Wide area networks |
|
WAN Service Types include: (3) |
1. Dedicated-Circuit Networks 2. Packet-switched networks 3. Virtual private Networks |
|
A ___________________ network uses full-duplex circuits from common carriers called leased lines or private lines to create ________________ links between organizational locations |
Dedicated-Circuit Point-to-point |
|
A dedicated-circuit network is billed at ___________ with ______________ use of the circuit |
A flat fee per month Unlimited |
|
One of the downfalls of a dedicated-circuit network is that: |
Adding/removing lines or increasing/decreasing capacity may be difficult, time consuming, and expensive |
|
True or false: Dedicated-circuit networks are shared by multiple organizations |
False |
|
True or false: A dedicated circuit may have different speeds for the sender and receiver |
False
|
|
A dedicated-circuit usually requires 1 device on each end, usually a _____________ |
Modem |
|
The three architectures of a Dedicated-Circuit Network include: (3) |
1. Ring 2. Star 3. Mesh |
|
Advantages of a ring architecture include(1): Disadvantages include(1): |
Advantages: Resilient to loss of any one circuit Disadvantages: Long routes may increase latency |
|
Advantages of a star architecture include(3): Disadvantages include(2): |
Advantages: 1. Simpler management 2. Messages require 1 or 2 hops 3. Circuit failure primarily affects a single site Disadvantages: 1. Susceptible to traffic problems 2. Failure of central site will cause complete network failure |
|
Advantages of a mesh architecture include (2): Disadvantages include (1): |
Advantages: 1. Generally short routes 2. Resilient to circuit loss or overloaded circuits Disadvantages: 1. Expensive |
|
If there are 4 sites, how many wires are needed for a: 1. Ring architecture 2. Star architecture 3. Mesh architecture |
1. 4 wires 2. 3 wires 3. 6 wires |
|
There are _________ types of dedicated-circuit networks. These include: |
1. Two types 2. T-Carrier and SONET |
|
The ____________ is the most common form of dedicated-circuit service. Data rates range from ________ to _________ |
T-Carrier 64kbps, 45 mbps |
|
The ___________ is the American Standard for high-speed dedicated-circuit services. Data rates range from _________ to _________ |
SONET (Synchronous Optical Network) 50 mbps, 10gbps |
|
This type of WAN operates more like LANs and BNs than dedicated-circuit networks |
Packet-Switched Network |
|
Unlike a dedicated-circuit, a packet-switch service enables ______________ to exist ______________ between computers over the same physical circuit, like LANs and BNs. Nobody owns ____________ |
Multiple connections Simultaneously 100% Capacity |
|
Customers pay _________________ for a connection to the carrier and then _______________ for data transmitted |
Fixed Price Variable fees |
|
Each site in a Packet-Switched network must have a device, usually known as a ______________ |
PAD - Packet assembly device |
|
___________________ packets from separate messages maximizes efficiency. They can deliver anybody's messages, like UPS |
Interleaving
|
|
Key Point: One of the major advantages of packet-switched networks over dedicated-circuit networks is that ___________________ |
Different locations may have different transmission speeds to the carrier network |
|
The 3 types of packet-switched services you can buy are: (3) |
1. Frame Relay 2. Ethernet 3. Multiprotocol Label Switching (MPLS) |
|
Frame Relay packet-switched services are designed for high performance and efficiency, but their major downfall is that: |
They do not provide error control |
|
Frame Relay uses ___________ standard for encapsulation and packet-switching in WANs |
Layer 2 |
|
Ethernet packet-switched services use ____________ address and _________ protocol. Its major advantage is that it is _____________ |
IP, TCP/IP Less expensive than other alternatives |
|
This type of packet-switched service is sometimes called a layer 2.5 protocol because a a label is applied when entering carrier network between layer 2 and 3 headers |
Multiprotocol Label Switching (MPLS) |
|
The major advantage of MPLS packet-switching is that: |
Packets can be switched using labels faster than using complete IP addresses and routing tables |
|
This type of WAN service provides the equivalent of a private packet-switched network over the public internet as if you owned a dedicated circuit |
Virtual Private Network |
|
VPNs create virtual circuits often called: |
Tunnels |
|
The advantages of VPNs include (2): The disadvantages include (3): |
Advantages: 1. Inexpensive 2. Flexible Disadvantages: 1. Internet traffic unpredictable 2. Multiple incompatible implementations 3. No control over speed and security over internet |
|
The three types of VPNs include: |
1. Intranet VPN: Provides virtual circuits between organization locations over internet 2. Extranet VPN: Same as intranet except that VPN connects different organizations over the internet (customers and suppliers) 3. Access VPN: Enables employees to access and organization's networks from remote locations over the internet |
|
Key Point: VPN means that there is no ______________ network or _______________. We just create _____________ on the internet. |
Dedicated, Packet-switch Private Tunnels |
|
With low to moderate traffic (1.5mbps or less), and if reliability is less important, we should use: |
VPN |
|
With low to moderate traffic (1.5mbps or less), and predictable and stable traffic, we should use: |
T1 (T-carrier) |
|
With low to moderate traffic (1.5mbps or less), and flexibility as an issue, we should use: |
Frame Relay |
|
With high traffic (1.5 mbps-1Gbps), and if reliability is less important, we should use: |
VPN
|
|
With high traffic (1.5 mbps-1Gbps), and if traffic is predictable and stable, we should use:
|
T3 or OC1/OC3 (T-Carrier/Sonet)
|
|
With high traffic (1.5 mbps-1Gbps), and flexibility as an issue, we should use: |
Ethernet
|
|
With very high traffic (1 Gbps and up), and predictable and stable traffic, we should use: |
OC/Sonet |
|
With very high traffic (1 Gbps and up) and flexibility as an issue, we should use: |
Ethernet, MPLS |
|
__________________ is known as the network of networks |
Internet |
|
These connect networks of their customers to the internet. They used to be managed by government, but are now managed by free market. |
Internet Service Providers (ISP) |
|
The three tiers of ISPs include: |
Tier 1: National ISPs Tier 2: Regional ISPs Tier 3: Local ISPs (city/company level) |
|
The location where data is exchanged by ISPs is known as
|
Internet Exchange Point (IXP) |
|
The _________________ is the location where an ISP provides service to its customers |
Point of Presence (POP) |
|
Authentication is performed at which of the following locations: 1. IXP 2. ISP 3. POP |
POP |
|
When is exchanging information over the internet free? |
When info is exchanged between same tier |
|
When does exchanging information over the internet cost money? |
When lower tier ISPs purchase connections to higher-tier ISPs |
|
The four types of internet access technologies include: (4) |
1. DSL 2. Cable 3. FttH (Fixed to the Home) 4. Wireless |
|
A ___________________ is a family of point-to-point full duplex technologies offered by telephone companies |
Digital Subscriber Line (DSL) |
|
DSL uses ______________ technology to communicate: |
Point-to-point full duplex |
|
Which of the following utilizes point-to-point full duplex technology to communicate: 1. DSL 2. Cable 3. FttH 4. Wireless |
DSL |
|
An alternative to DSL offered by TV companies that use fiber coaxial (HFC) networks with coaxial cables in customer premises is known as: |
Cable |
|
Which of the following internet access technologies utilizes multipoint full duplex wiring? 1. DSL 2. Cable 3. FttH 4. Wireless |
Cable |
|
Disadvantages of Cable networks include: (3) |
1. Shared bandwidth 2. Potential security issues 3. Cable configured to "cap" bandwidth at a maximum rate specified by contract |
|
The following internet access provider utilizes a dedicated point-to-point fiber optic service |
FttH (fixed to the home) |
|
The major downfall of FttH is that: |
It is highly expensive |
|
The following internet access provider is characterized by worldwide interoperability for microwave access (WiMax) |
Wireless |
|
The newest and latest technology in internet access providers is: |
Wireless |
|
True or false: WWW = Internet |
False, Internet is delivery method, WWW is the content delivered |