• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/122

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

122 Cards in this Set

  • Front
  • Back

Enables Users to Access the Network (Access Layer)

LAN (Local Area Network)

Distributes traffic to and from the LANS (Distribution Layer)

Building Backbone Network

Connects all buildings on one campus (Core Layer)

Campus backbone

The Traditional design is known as __________ and is not suitable for today's network needs because ___________ (4)

Waterfall Approach


1. Technology is changing quickly. Costly


2. Costly and Time Consuming


3. Escalating network traffic demands


4. Decrease in hardware costs and increase in staff costs

The new design process is known as __________ and its steps include _________ (3)

Building Block Design Proces
1. Needs Analysis (Understand current and future network needs)
2. Technology Design (includes clients, servers, circuits, and networking devices)
3. Cost assessment (financial analysis of various technology designs)


The first step in the Building Block design process is ___________ and includes the following steps ___________ (5)

Needs Analysis


1. Create Baselines (users supported, apps supported, etc)


2. Break network into architectural components (building blocks)


3. Review existing and expected applications that will use the network (identify hardware/software requirements/protocols for applications


4. Identify and assess network users (how many, types, needs)


5. Categorize network requirements (mandatory, desirable, wish-list)

The second step in the building block process is _________ and the steps include _________ (2)

Technology Design


1. Designing clients and servers


2. Designing circuits

The two steps of designing circuits in the Technology Design phase include _________ and _________

1. Capacity Planning


2. Circuit Loading

The estimation of circuit size and type required for each network component is known as ___________

Capacity Planning

An assessment of the amount of data transferred across a circuit (currently or in the future) is known as ______________

Circuit Loading

Designing for ___________ is ideal for LANs. Some reasons for this include ___________ (3)

Peak traffic.


1. Upgrading costs 50-80% more than designing for higher capacity


2. Very few complaints about overcapacity


3. Most networks designed with excess capacity end up using overcapacity within 3 years



__________________ is an expression that means traffic increases much faster than originally forecast. When a new, faster network is built, more people are likely to use it than the old one because it is efficient, available, and provides more capabilities

Turnpike Effect

The third step in the building block design process is known as _________________ and involves _________________

Cost assessment


Financial analysis of the various technology design alternatives

The Cost assessment phase of the building block design process must analyze the following factors: (7)

1. Circuit costs (cabling/installation)


2. Internetworking devices (switches and routers)


3. Hardware costs (clients, servers, power supplies)


4. Software costs (operating systems, app software, middleware)


5. Network management and maintenance costs


6. Operation costs to run network


7. WAN and internet circuits

A detailed specification of equipment, software, and services desired from vendors is known as _______________

Request for Proposal (RFP)

Key Point:


__________ and ___________ are typically built and owned by the organization and often built with excess capacity

LAN and BN

_______s are usually leased from the carrier and often designed at or near capacity

Wide Area Networks (WAN)

____________ usually connect computers on a network so as to communicate with each other.


Key Point: They can send or receive information, but they can't ________________

Hubs


Do both at the same time

____________ function similarly as hubs, but they are different in that _______________

Switches


Send information only to the computers that they are intended for

_______________ are intermediary devices that enable computers to communicate or pass information between two networks

Routers

_____________ or _____________ provide wireless access to a wired Ethernet network

Access Points (AP)


Wireless Access Points (WAP)

The following type of cable is mostly used for LANs and has a low cost, making it useful. The typical distance for this type of cable is ____________

Unshielded Twisted Pair


100 Meters

Shielded Twisted Pair (STP) is only used in _____________________.


Examples of these locations are ______________

Special areas that produce electrical interference


Factories near heavy machinery, Hospitals near MRI scanners

The following cable is even thinner for UTP wire, and takes much more space when cabled throughout a building. Additionally, they are mostly used for ______________

Fiber-Optic cable


Backbone NEtworks

_____________ is the basic geometric layout of a network, and the two types of these are ________________ and _______________

Topology


Logical Topology


Physical Topology

Logical topology defines how networks work _______________. Examples are: (2)

Conceptually


Logical data flow diagram (DFD)


Logical entity relation diagram (ERD)

Physical topology defines how a network is _____________. Examples include: (2)

Physically installed


Physical DFD


Physical ERD

A _______________ is multipoint, so if you talk everybody can here you

Logical Bus

The only place we use logical bus is _______________. Everywhere else we see _____________

Logical hub design.


Star

_______________ Is also called traditional Ethernet. It uses a ___________ topology.

Hub-Based Ethernet


Physical star

In a logical bus topology, all devices receive all messages as if they were connected to a __________ circuit

Multipoint

A _________________ Ethernet uses Logical Star topology and physical star topology

Switch-Based Ethernet

In a Switch-Based Ethernet, only the _________________ receives the message

Intended destination

The two forms of wired Ethernet include ___________ and _____________

Switch-Based Ethernet


Hub-Based Ethernet

______________ is commonly known as Wi-Fi and uses radio frequencies to transmit signals through the air (instead of cables)

Wireless LAN

The benefits of Wireless Lan include: (3)

1. Provide network connections where cabling is impossible or undesirable


2. Allows device and user mobility


3. Potentially more economical than wired networks

The physical topology of wireless LAN is ______________. The logical topology of wireless LAN is ______________. This is the same as _________ based Ethernet

Physical Star


Logical bus (multi-points)


Hub

_____________ is important because WLANs are easy to discover

Security

The three types of WLANs are: (3)


Are they breakable?

WEP (wired equivalent privacy): Easily Breakable


WPA (Wi-Fi protected acces): Breakable by brutal force


WPA2: Currently recommended, still breakable

LAN performance is usually expressed in terms of ___________ (total amount of user data transmitted in a given time period) or in _____________.

Throughput


Response time

_____________ is the part of the network that is restricting data flow and usually lies in the _________ or the _____________

Bottleneck


Client


Server

The bottleneck is in the server if ______________

Server utilization is high (80-100%)

The bottleneck is in the network circuit if _________________, some circuits cannot transmit messages as necessary

Server utilization is low

A backbone network connects __________ and ________ together

LAN


WAN

The 3 types of backbone architectures are: (3)

Switched Backbone network


Routed Backbone network


Virtual LANs (VLANs)

The switched backbone is the most common type of BN in the _________ layer.

Distribution

The switched backbone uses ____________ switches

Layer-2

The ______________ is also called the subnetted or hierarchical backbone and is typically used at the _________ layer

Routed Backbone


Core

Advantages of the routed backbone include: (1)


Disadvantages include: (3)

Advantage: LAN segmentation


Disadvantages:


1. Tend to be slower because of IP address


2. More expensive, more overhead


3. Harder to manage

______________ puts devices in different LAN via software, rather than physically moving hardware around

VLAN

Key Point:


VLANs are enabled by ____________ switches.

High-speed layer-3

Advantages of VLANs include: (3)

1. More flexible subnetting (we can put computers on the same subnet in different buildings


2. Better managed traffic flow, leading to faster performance


3. Traffic prioritization

Key Point:


VLANs allow us to create subnets based on __________, rather than ______________

Who you are


Where you are

Disadvantages of VLANs include: (3)

1. Complex technology


2. Increased management overhead


3. Layer 3 switches are more costly than layer 2 switches



The ____________ works with network layer using IP address to route package

Router

The __________ switch works with data link layer using _________ to send the package

Layer 2


MAC address

The ____________ switch can work like a router, so it can work with both data link and network layer

Layer 3

True or False: All switches are two layers

False

True or false: all switches are data link switches

False

True or false: HUB uses IP address

False, hub has no intelligence, just a physical object

_______________ BN is most commonly used in the distribution layer. _____________ BN is most commonly used in the core layer

Switch


Routed

________________ are networks that run long distances connecting different buildings (LAN, BN) or campuses (BN)

Wide area networks

WAN Service Types include: (3)

1. Dedicated-Circuit Networks


2. Packet-switched networks


3. Virtual private Networks

A ___________________ network uses full-duplex circuits from common carriers called leased lines or private lines to create ________________ links between organizational locations

Dedicated-Circuit


Point-to-point

A dedicated-circuit network is billed at ___________ with ______________ use of the circuit

A flat fee per month


Unlimited

One of the downfalls of a dedicated-circuit network is that:

Adding/removing lines or increasing/decreasing capacity may be difficult, time consuming, and expensive

True or false:


Dedicated-circuit networks are shared by multiple organizations

False

True or false:


A dedicated circuit may have different speeds for the sender and receiver

False

A dedicated-circuit usually requires 1 device on each end, usually a _____________

Modem

The three architectures of a Dedicated-Circuit Network include: (3)

1. Ring


2. Star


3. Mesh

Advantages of a ring architecture include(1):


Disadvantages include(1):

Advantages: Resilient to loss of any one circuit


Disadvantages: Long routes may increase latency

Advantages of a star architecture include(3):


Disadvantages include(2):

Advantages:


1. Simpler management


2. Messages require 1 or 2 hops


3. Circuit failure primarily affects a single site


Disadvantages:


1. Susceptible to traffic problems


2. Failure of central site will cause complete network failure

Advantages of a mesh architecture include (2):


Disadvantages include (1):

Advantages:


1. Generally short routes


2. Resilient to circuit loss or overloaded circuits


Disadvantages:


1. Expensive

If there are 4 sites, how many wires are needed for a:


1. Ring architecture


2. Star architecture


3. Mesh architecture

1. 4 wires


2. 3 wires


3. 6 wires

There are _________ types of dedicated-circuit networks. These include:

1. Two types


2. T-Carrier and SONET

The ____________ is the most common form of dedicated-circuit service.


Data rates range from ________ to _________

T-Carrier


64kbps, 45 mbps

The ___________ is the American Standard for high-speed dedicated-circuit services.


Data rates range from _________ to _________

SONET (Synchronous Optical Network)


50 mbps, 10gbps

This type of WAN operates more like LANs and BNs than dedicated-circuit networks

Packet-Switched Network

Unlike a dedicated-circuit, a packet-switch service enables ______________ to exist ______________ between computers over the same physical circuit, like LANs and BNs. Nobody owns ____________

Multiple connections


Simultaneously


100% Capacity

Customers pay _________________ for a connection to the carrier and then _______________ for data transmitted

Fixed Price


Variable fees

Each site in a Packet-Switched network must have a device, usually known as a ______________

PAD - Packet assembly device

___________________ packets from separate messages maximizes efficiency. They can deliver anybody's messages, like UPS

Interleaving

Key Point: One of the major advantages of packet-switched networks over dedicated-circuit networks is that ___________________

Different locations may have different transmission speeds to the carrier network

The 3 types of packet-switched services you can buy are: (3)

1. Frame Relay


2. Ethernet


3. Multiprotocol Label Switching (MPLS)

Frame Relay packet-switched services are designed for high performance and efficiency, but their major downfall is that:

They do not provide error control

Frame Relay uses ___________ standard for encapsulation and packet-switching in WANs

Layer 2

Ethernet packet-switched services use ____________ address and _________ protocol. Its major advantage is that it is _____________

IP, TCP/IP


Less expensive than other alternatives

This type of packet-switched service is sometimes called a layer 2.5 protocol because a a label is applied when entering carrier network between layer 2 and 3 headers

Multiprotocol Label Switching (MPLS)

The major advantage of MPLS packet-switching is that:

Packets can be switched using labels faster than using complete IP addresses and routing tables

This type of WAN service provides the equivalent of a private packet-switched network over the public internet as if you owned a dedicated circuit

Virtual Private Network

VPNs create virtual circuits often called:

Tunnels

The advantages of VPNs include (2):


The disadvantages include (3):

Advantages:


1. Inexpensive


2. Flexible


Disadvantages:


1. Internet traffic unpredictable


2. Multiple incompatible implementations


3. No control over speed and security over internet

The three types of VPNs include:

1. Intranet VPN: Provides virtual circuits between organization locations over internet


2. Extranet VPN: Same as intranet except that VPN connects different organizations over the internet (customers and suppliers)


3. Access VPN: Enables employees to access and organization's networks from remote locations over the internet

Key Point: VPN means that there is no ______________ network or _______________. We just create _____________ on the internet.

Dedicated, Packet-switch


Private Tunnels

With low to moderate traffic (1.5mbps or less), and if reliability is less important, we should use:

VPN

With low to moderate traffic (1.5mbps or less), and predictable and stable traffic, we should use:

T1 (T-carrier)

With low to moderate traffic (1.5mbps or less), and flexibility as an issue, we should use:

Frame Relay

With high traffic (1.5 mbps-1Gbps), and if reliability is less important, we should use:

VPN

With high traffic (1.5 mbps-1Gbps), and if traffic is predictable and stable, we should use:

T3 or OC1/OC3 (T-Carrier/Sonet)

With high traffic (1.5 mbps-1Gbps), and flexibility as an issue, we should use:

Ethernet

With very high traffic (1 Gbps and up), and predictable and stable traffic, we should use:

OC/Sonet

With very high traffic (1 Gbps and up) and flexibility as an issue, we should use:

Ethernet, MPLS

__________________ is known as the network of networks

Internet

These connect networks of their customers to the internet. They used to be managed by government, but are now managed by free market.

Internet Service Providers (ISP)

The three tiers of ISPs include:

Tier 1: National ISPs


Tier 2: Regional ISPs


Tier 3: Local ISPs (city/company level)

The location where data is exchanged by ISPs is known as

Internet Exchange Point (IXP)

The _________________ is the location where an ISP provides service to its customers

Point of Presence (POP)

Authentication is performed at which of the following locations:


1. IXP


2. ISP


3. POP

POP

When is exchanging information over the internet free?

When info is exchanged between same tier

When does exchanging information over the internet cost money?

When lower tier ISPs purchase connections to higher-tier ISPs

The four types of internet access technologies include: (4)

1. DSL


2. Cable


3. FttH (Fixed to the Home)


4. Wireless

A ___________________ is a family of point-to-point full duplex technologies offered by telephone companies

Digital Subscriber Line (DSL)

DSL uses ______________ technology to communicate:

Point-to-point full duplex

Which of the following utilizes point-to-point full duplex technology to communicate:


1. DSL


2. Cable


3. FttH


4. Wireless

DSL

An alternative to DSL offered by TV companies that use fiber coaxial (HFC) networks with coaxial cables in customer premises is known as:

Cable

Which of the following internet access technologies utilizes multipoint full duplex wiring?


1. DSL


2. Cable


3. FttH


4. Wireless

Cable

Disadvantages of Cable networks include: (3)

1. Shared bandwidth


2. Potential security issues


3. Cable configured to "cap" bandwidth at a maximum rate specified by contract

The following internet access provider utilizes a dedicated point-to-point fiber optic service

FttH (fixed to the home)

The major downfall of FttH is that:

It is highly expensive

The following internet access provider is characterized by worldwide interoperability for microwave access (WiMax)

Wireless

The newest and latest technology in internet access providers is:

Wireless

True or false: WWW = Internet

False, Internet is delivery method, WWW is the content delivered