Chapter 1 Flashcards

1
Q

Peer-to-Peer Networks

A

The Advantages:
*Easy to set up
*Less complexity
*Lower cost since network devices and dedicated servers may not be required.
*Can be used for simple tasks such as transferring files and sharing printers.

The Disadvantages:
*No centralized administration
*Not as secure
*Not scalable
*All devices may act as both clients and servers which can slow their performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three categories of network components?

A

*Devices

*Media

*Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Host/end Devices

A

Every computer on a network is called a host or end device:

*Computers (work stations, laptops, file servers, web servers)
*Network printers
*VoIP phones
*TelePresence endpoint
*Security cameras

*Mobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intermediary network devices

A

Examples of intermediary network devices are:

*Network Access Devices (hubs, switches, and wireless access points)
*Internetworking Devices (routers)
*Security Devices (firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Role of the intermediary device

A

*Regenerate and retransmit data signals
*Hold information about available pathways
*Notify other devices of errors
*Direct data along alternate pathways when there is a link failure
*Classify and direct messages according to priorities
*Permit or deny the flow of data, based on security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hub

A

*Limited intelligence. Traffic received is sent out all ports of the hub

*All ports are on the one collision domain. Allow a lot of collisions on the network segment and are often not a good solution

*Also acts as a repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switches

A

*Network devices connect to the switch

*The switch has many ports and refers to a table of MAC addresses to determine which port to use to forward the frame.

*Switches create a different collision domain per switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers

A

Routers are devices that connect different networks to each other.

-Use IP addresses to forward packets to other networks.

-Each interface is on a different network or subnet

-The router determines the path the data takes through the network
Also known as a default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Media

A

Consists of Wireless Media, LAN Media and WAN Media.

Copper- Electrical pulses eg. twisted pair coax.

Fiber Optic - Light pulses

Wireless - Electromagnetic
waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Networks

A

The two most common types of network infrastructures are:

*Local Area Network (LAN)
*Wide Area Network (WAN).

Other types of networks include:

*Metropolitan Area *Network (MAN)
*Wireless LAN (WLAN)
*Storage Area Network (SAN)
*Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wide Area Networks (WAN)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intranet and Extrantranet

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Connecting Remote Users to the Internet

A

Connecting Remote Users to the Internet:
DSL = Digital Subscriber Line

DSL – Digital Subscriber Line, Broadband connection, splits data channel into 3 signals - voice, data upload and data download
Cable – Cable supplier supplies internet access through coax cable
Cellular – used by phones/tablets
Satellite – used in rural areas, although not if wooded as signal could be blocked
Dial up – hardly used, too slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connecting to the InternetConnecting Businesses to the Internet

A

Metro Ethernet- Metro Ethernet is typically available from a provider to the customer premises over a dedicated copper or fiber connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Converging Network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four basic characteristics that underlying architectures need to address in order to meet user expectations?

A

*Fault Tolerance
*Scalability
*Quality of Service (QoS)
*Security

17
Q

Providing QoS

A

Examples of priority decisions might include:
*Increase priority for services like telephony or video distribution.
*Increase priority for production control or business transaction data.

*Decrease priority for web page retrieval or email.
*Decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

When the network is busy or congested, QoS priorities can reduce the likelihood of delay on time sensitive traffic.

18
Q

Questions

A

*What term is used to describe prioritising of network traffic?

*What name is given to a network that incorporates voice, video and data?

*What term is used to describe the capability built into a network that allows users to continue working even if some network components fail?

*What term is used to describe a networks capability to grow and react to future changes?

Answers:
1 Quality of Service (QoS)
2 Converged
3. Fault tolerance
4. Scalability

19
Q

Circuit Switched Networks

A

*Temporary path/circuit is created but is dedicated for the time of the call
*Any failure, have to start again with whole new path, no fault tolerance
*Example of circuit switched is a leased line
*Major advantage – dedicated bandwidth

20
Q

Packet-Switched Networks

A

*Data broken into packets
*Data sent down different paths
*More efficient use of bandwidth
*Can adapt if there is a failure

21
Q
A

1) Which type of switching breaks messages in to multiple blocks?

2) What advantage does circuit switched have over packet switched?

3) Is a leased line packet or circuit switched?

4) Which type of switching will result in denied access if all lines are already being accessed?

Answers:
1.Packet switched
2.Dedicated bandwidth
3.Circuit switched
4.Circuit switched

22
Q

Cloud Computing

A

Businesses:
-Gives organizations flexibility
-Agility and rapid deployment
-Reduced cost of infrastructure
-Refocus of IT resources

-Users can subscribe withproviders to access applications and data in the cloud. Data may be synced across many devices

23
Q

Cloud Computing and Data Centres

A

A data centre is a facility used to house computer systems and associated components including:

-Redundant connections
-High-speed virtual servers
-Redundant storage systems
-Redundant power supplies
-Environmental controls (e.g., air conditioning, fire suppression)
-Security devices

24
Q

Four types of Clouds

A

Public Clouds
Available to the general public through a pay-per-use model or for free.

Private Clouds
Intended for a specific organization or entity such as the government.

Hybrid Clouds
Made up of two or more Cloud types – for example, part custom and part public.
Each part remains a distinctive object but both are connected using the same architecture.

Custom Clouds
Built to meet the needs of a specific industry, such as healthcare or media.
Can be private or public.

25
Q

Network Security

A

Physical network infrastructure
-Protect devices from outside contact – malicious and accidental

Data
-Ensure **confidentiality (who has access) ** through use of
User authentication e.g. login and passwords and permissions
-Maintain integrity (data unchanged) through use of
Data encryption
Digital signatures
Ensure availability through use of:
-Firewalls
-Redundant network
architecture

26
Q

Security Threats

A

*External Threats:**
-Viruses, worms, and Trojan horses
-Spyware and adware
-Zero-day attacks
-Threat Actor attacks
-Denial of service attacks
-Data interception and theft
-Identity theft

Internal Threats:
-Lost or stolen devices
accidental misuse by employees
-Malicious employees

27
Q

Security Solutions

A

Home and Businesses
-Anti-virus and anti-spyware
-Firewall
-Authentication and -Encryption

Business
-Access control lists (ACL)
-Intrusion prevention systems (IPS)
-Virtual Private Networks (VPNs)
-Redundant Devices

28
Q

Fill in the blank:

An is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible by the members and employees of the organization and others with authorization.

A

Extranet

29
Q

Which statement describes a network that supports QoS?

A. The fewest possible devices are affected by a failure.
B. The network should be able to expand to keep up with user demand.
C. The network provides predictable levels of service to different types of traffic.
D. Data sent over the network is not altered in transmission.

A

C

30
Q

Name the protocols mentioned that are used for e-mail.

A

Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Simple Mail Transfer Protocol (SMTP).