1. Introduction to Networking Flashcards
What are the names of computer that send requests to the servers to retrieve information
- Clients
What is the name for every computer on a network? ( 2 )
- Host
- End Device
What are servers?
- Computers that provide information to end devices
- Email Server
Web Server
File Server
What scenario does Pear-to-Pear is recommended for?
- Very Small Networks ( Bluetooth )
- It was decentralized
What are the advantages of using Pear-to-Pear? ( 4 )
- Easy to set up ( no cable / just using some cable )
- Less complex
- Lower cost ( doesn’t need a server )
- Used for single tasks ( transferring files & sharing printers )
What are the disadvantages of using Pear-to-Pear? ( 4 )
- No centralized administration
- Not as secure
- Not scalable
- Slower performance
What are the purpose of Intermediary Network Devices?
- To connect end devices ( computers, receiver ) to server ( sender )
What is end devices?
- Devices where a message originates from or where it is received
- End Devices ( data ) -> Network ( Flow Through ) -> End Device
List out the examples of Intermediary Network Devices ( 5 )
- Switches
- Wireless Access Points
- Routers
- Firewalls
- Cables
What is the role of Intermediary Network Devices in the management of data? ( 3 )
- Regenerate and retransmit data signals
- Maintain information about what pathways exist in the network
- Notify other devices of errors and communication failures
List out the Network Media types and descriptions ( 3 )
- Metal Wires within Cables ( Copper Cable )
- Convert into electrical impulses
- Glass or Plastic Fibers within cables ( fibre-optic cable )
- Convert into light
- Wireless Transmission
- Convert into modulation of specific frequencies of electromagnetic waves
- Communication is carry through a medium which allows a message to travel from source to destination
What is network diagrams often called as?
- Topology Diagrams
What are the important terms we need to learn? ( 3 )
- Network Interface Card ( NIC )
- Physical Port
- Interface
- Note that terms port and interface are used interchangeably
List out end devices ( 6 )
- Desktop Computer
- Laptop Computer
- Printer
- IP Phone
- Wireless Tablet
- TelePresence Endport
What network diagram uses to represent devices within the network?
- Symbols
What is the purpose of physical topology diagrams
- Illustrate the physical location of intemediary device and cable installation
What is the purpose of logical topology diagrams
- Illustrate devices ports, and the addressing scheme of the network
List out the size of networks ( 4 )
- Small Home Network
- SOHO ( Small Office / Home Office )
- Medium to Large Networks
- World Wide Networks
List out the 2 most common types of network
- LAN ( Local Area Network )
- WAN ( Wide Area Network )
How was the network type ( LAN, WAN, MAN ) determined? ( 4 )
- Size of area covered
- Number of users connected
- Number and types of services available
- Area of responsibility
What are the difference between LAN and WAN? ( 3 )
- Area
- Interconnect end deveices in a limited area
- Interconnect LAN over wide geographical areas
- Administration
- By single organization or individual
- By one or more service providers
- Speed
- Provide high-speed bandwidth to internal devices
- Typically provide slower speed between LANs
What is Internet?
- A worldwide collection of interconnected LANs and WANs
LANs are connected to each other using what?
- WAN
WAN may use what for transmissions? ( 3 )
- Copper Wires
- Fiber Optic
- Wireless Transmissions
The internet is not owned by any individual or group, but there are some groups developed to help maintain structure on the internet, list out the group ( 3 )
- IETF (Internet Engineering Task Force)
- ICANN (Internet Corporation for Assigned Names and Numbers )
- IAB (Internet Architecture Board)
What is an intranet?
- A private collection of LANs and WANs internal to an organizations that is meant to be accessible only to the organizations members or others with authorization
What are the difference between intranet, extranet and internet?
- Intranet - company only
- Extranet - suppliers, customers
- Internet - the world
Why does an organization uses extranet?
- To provide secure access to their network for individuals who work for a different organization that need to access to their data on their network
How does home users and small offices connect to the internet? ( 5 )
- Brodband Digital Subscriber Line ( DSL )
- Wireless WANs
- Mobile Services ( Cellular )
- Broadband Cable
- Dial-up Telephone
How does organizations connect to the internet? ( 1 )
- Faster connections to support
- IP phones,
- Video conferencing
- Data center storage
How does business-class connect to the internet? ( 4 )
- Business DSL
- Leased Lines
- Metro Ethernet
- Satellite
What area that satellite provide major benefit ?
- Rural Areas
What connections that fit this description ?
An inexpensive, low bandwidth option using a modem
- Dial-up phone
What device uses cellular to connect to the internet
- Cell phone
Which connections types offers high bandwidth, always on service by ISP?
- Cable ( Offered by cable television service providers )
- DSL ( Internet connection that runs over a telephone line )
Corporate business connection require what ? ( 3 )
- Higher bandwidth
- Dedicated connections
- Managed services
When does businees need to use satellite for connection?
- When wired solution is not possible
Which type of connection that connect distant offices with private voice and/or data networking
- Dedicated Leased Line
What does Ethernet WAN do ? ( Business )
- Access technology into the WAN
What can converging network do?
- Deliver data, voice and video over the same network infrastructure
- Before converging network, people cabled for telephone, send videos, data using different network
What is Network architecture?
- Refers to the technologies that support the infrastructure that moves data across the network
What are the four basic characteristics for a reliable network?
- Fault Tolerance ( Stability )
- Scalability
- Quality of Service ( QoS )
- Security
What can fault tolerance do ? ( 2 )
- Limits the impact of a failure by limiting the number of affected deveices
- Continue operating despite failures or malfunctions
What are required for fault tolerance?
- Multiple paths
What does reliable network provide when implementing a packet switched network
- redundancy
How does reliable network provide redundancy by implementing a packet switched network ? ( 2 )
- Packet switching splits traffic into packets that are routed over a network
- Each packet could theoretically take a different path to the destination
Packet Switched Network vs Circult Switched Network in Notion
Which network is not possible for using fault tolerance?
- Circuit-switched networks
What can a scalable network do? ( 2 )
- Expand quickly
- Expand easily
What activities consume more bandwidth
- Voice Transmissions
- Video Trnasmissions
- Real-Time Application
What is Quality of Service ( QoS ) ?
- Is the primary mechanism used to ensure reliable delivery of content for all users
What can QoS policy do to improve network quality?
- Manage the flow of data and voice traffic through priority
Which network components that manages the quality of service?
- Router
How does router manages the quality of services?
- Deciding on the priority
- Web-pages receive lower priority
Video-conference receive higher priority
What are the main types of network security must be addressed? ( 5 )
- Network infrastructure security
- Physical security of network devices
- Preventing unauthorized access to the devices
- Information Security
- Protection of the information or data transmitted over the network
What are the 3 main goals of network security?
- Confidentially
- Only intended recipients can read the data
- Integrity ( Quality )
- Assure that the data won’t altered during transmission
- Availability
- Assure timely and reliable access to data for authorized users
List out new network trends
- Bring Your Own Device ( BYOD )
- Online Collaboration
- Video Communications ( Video Calls, Conferencing )
- Cloud Computing
What does cloud computing allow us? ( 2 )
- Store personal files
- Backup data on servers over the internet
How is cloud computing possible?
- It was possible by using data centers
List out the four types of cloud
- Public Clouds
- Available to the public through payment or free
- Private Clouds
- For specific organization or entity ( government )
- Hybrid Clouds
- Made up of 2 or more cloud types
- Combination of public and private clouds
- Custom Clouds
- Built to meet the needs for a specific industry ( healthcare )
- It can be private or public
What is smart home technology?
- Allows technology to be integrated into every-day appliances which allows them to interconnect with other devices
* Examples : Ovens might know what time to cook a meal
List out the example for a smart home
- Ovens might know what time to cook a meal for you by communicating with your calendar on what time you are scheduled to be home
What does powerline networking allow devices do?
- Connect to a LAN where data network cables or wireless communications are not a viable option
What is Wireless Internet Service Provider ( WISP )
- An ISP that connects subscribers to designated access points or hotspots
What condition is best for using wireless broadband? ( 2 )
- Home
- Small Business
What are the technologies used in wireless broadband ?
- Cellular technology used by smart phone
List out the external threats ( 7 )
- Viruses, worms, and trojan horses
- Spyware and adware
- Zero-day attacks ( Exploit unknown software vulnerabilities )
- Threat Actor attacks ( Malicious actions by various entities (e.g., hackers, nation-states) )
- Denial of service attacks ( Overwhelm a system to make it unavailable )
- Data interception and theft ( Unauthorized access and theft of data during transmission )
- Identity theft ( Stealing personal information to impersonate the victim )
List out all the internal threats
- Lost or Stolen devices
- Accidental Misuse by Employees
- Malicious Employees
What can home or small office network do to prevent security threads? ( 2 )
- Install antivirus and antispyware software on end devices
- Use firewall to block unauthorized access to the network
What can larger network do to prevent security threads? ( 2 )
- Dedicated firewall system
- Access Control Lists ( ACL )
- Intrusion Prevention System ( IPS )
- Virtual Private Networks ( VPN )
What does the study of network security starts
- A clear understanding of the underlying switching and routing infrastructure
What does the Cisco Certified Network Associatate ( CCNA ) certification provides? ( 2 )
- Demonstrates that you have a knowledge of foundational technologies
- Ensure you stay relevant with skills needed for the adoption of next-generation technologies
What does the new CCNA focus on? ( 2 )
- IP foundation and security topics
- Wireless virtualization automation, and network programmability