• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Intranets
private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations
Extranet
extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists.
Internal factors affecting the successful communication across the network include:
The size of the message

The complexity of the message

The importance of the message
These data or information networks vary in size and capabilities, but all networks have four basic elements in common:
Rules or agreements to govern how the messages are sent, directed, received and interpreted.

The messages or units of information that travel from one device to another

A means of interconnecting these devices - a medium that can transport the messages from one device to another

Devices on the network that exchange messages with each other
Four elements of a Network
Rules
Medium
Message
Devices
Switch
the most common device for interconnecting local area networks
Firewall
provides security to networks
Router
helps direct messages as they travel across a network
Wireless Router - a specific type of router often found in home networks
Cloud
used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand
Wireless Router
a specific type of router often found in home networks
Serial Link
one form of WAN interconnection, represented by the lightning bolt-shaped line
wired connections
the medium is either copper, which carries electrical signals, or optical fiber, which carries light signals.
wireless connections
, the medium is the Earth's atmosphere, or space, and the signals are microwaves. Copper medium includes cables, such as twisted pair telephone wire, coaxial cable, or most commonly, what is known as Category 5 Unshielded Twisted Pair (UTP) cable. Optical fibers, thin strands of glass or plastic that carry light signals, are another form of networking media.
Protocols
are the rules that the networked devices use to communicate with each other.
Converged Network
The flow of voice, video, and data traveling over the same network
Fault Tolerance
A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure occurs. These networks depend on redundant links, or paths, between the source and destination of a message. If one link or path fails, processes ensure that messages can be instantly routed over a different link transparent to the users on either end. Both the physical infrastructures and the logical processes that direct the messages through the network are designed to accommodate this redundancy. This is a basic premise of the architecture of current networks.
Scalability
scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. k. The ability of the network to support these new interconnections depends on a hierarchical layered design for the underlying physical infrastructure and logical architecture. The operation at each layer enables users or service providers to be inserted without causing disruption to the entire network.
Quality of Service (QoS)
new applications available to users over internetworks create higher expectations for the quality of the delivered services. Voice and live video transmissions require a level of consistent quality and uninterrupted delivery that was not necessary for traditional computer applications. Quality of these services is measured against the quality of experiencing the same audio or video presentation in person. Traditional voice and video networks are designed to support a single type of transmission, and are therefore able to produce an acceptable level of quality. New requirements to support this quality of service over a converged network are changing the way network architectures are designed and implemented.
Security
many tools and procedures implemented to combat inherent security flaws in the network architecture.
Network bandwidth
is the measure of the data carrying capacity of the network.
QoS mechanisms
s enable the establishment of queue management strategies that enforce priorities for different classifications of application data. Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority.
Consequences of a network security breach could include:
Network outage that prevents communications and transactions occurring, with consequent loss of business

Misdirection and loss of personal or business funds
Company intellectual property (research ideas, patents or designs) that is stolen and used by a competitor

Customer contract details that become known to competitors or made public, resulting in a loss of market confidence in the business
Security measures taken in a network should:
Prevent unauthorized disclosure or theft of information

Prevent unauthorized modification of information

Prevent Denial of Service
There are three major trends that are contributing to the future shape of complex information networks:
Increasing number of mobile users

Proliferation of network capable devices

Expanding range of services
Describe Internal Factors that impact network communication
The size of the message
The complexity of the message
the importance of the message
Describe External Fatcors that Impact network communication
whether a confirmation of the message was returned to the sender
the number of times the message has to change form
the number of messages in the communication network
the number of times the message is reformatted
the amount of time allotted for successfull communication