Chapter 1 Flashcards
A real-time text communication between two or more users.
Instant messaging (IM)
Web pages where people can publish their personal opinions and thoughts about any conceivable topic
Blogs
An audio-based medium that originally enabled people to record audio and convert it for use with iPods
Podcasting
Example of publicly created web content
Wikis
Web-based software that allows people to work together on a project over the web
Collaboration tool
Provides a way to build virtual representations of networks and emulate many of the functions of
networking devices.
Packet Tracer
Allows only internal employee access
Intranet
Allows outside vendors special access to limited information in a company.
Extranet
Rules of communication
Protocols
Some of the protocols required for communication to occur include the presence of:
- An identified sender and receiver
- An agreed-upon method of communicating
- Common language and grammar
- An agreed-upon speed and timing of delivery
- Confirmation or acknowledgment requirements
Four basic elements of a network:
- Rules or agreements
- Messages
- Medium
- Devices
Governs how the messages are sent, directed, received, and interpreted
Rules or agreements
Units of information travel from one device to another
Messages
A means of interconnecting these devices
Medium
A generic term that encompasses web pages, e-mail, instant messages, telephone calls, and other forms of communication enabled by the Internet
Messages
Small pictures arranged to represent a network’s layout, can greatly clarify information about the design of the network
Icons
A common computer used in a home or office
Desktop computer
A portable computer
Laptop
A computer dedicated to providing application services to end users on a network
Server
A digital telephone that carries voice as data over data networks instead of analog phone lines
IP phone
Depicts local-area network wireless access
Wireless media
The most common device for interconnecting local-area networks
LAN switch
A device that provides security to networks
Firewall
A device that helps direct messages between networks
Router
A specific type of router often found in home networks
Wireless router
A symbol used to summarize a group of networking devices out of
local management control,often the Internet itself
Cloud
One form of wide-area network (WAN) interconnection,
represented by the lightning bolt–shaped line
WAN media
The most common protocols are:
IP (Internet Protocol) and TCP (Transmission Control Protocol)
IP (Internet Protocol) and TCP (Transmission Control Protocol) are also known as:
TCP/IP protocol stack
Protocol of World Wide Web:
HTTP (Hypertext Transport Protocol)
Protocol of Email:
SMTP (Simple Mail Transport Protocol) and POP (Post Office Protocol)
Protocol of Instant message:
XMPP (Extensible Messaging and Presence Protocol) and OSCAR (Open System for Communication in Realtime)
Protocol of IP telephony:
SIP (Session Initiation Protocol)
Coming together of technologies onto a digital platform is called
Convergence
Refers to the conceptual plans on which a physical network
is built.
Network architecture
The Internet’s design meets four fundamental expectations:
- fault tolerance
- scalability
- quality of service (QoS)
- security
Means that the Internet will continue to function normally
even when some of the components of the network fail.
Fault tolerance
Duplication of equipment and media, is a key factor in fault tolerance.
Redundancy
How does redundancy work?
If a server fails, a redundant server
performing the same functions should be able to pick up the work until repairs are made.
If a data link fails on a fault-tolerant network, messages will be routed to the destination on a duplicate route.
Describes the network’s ability to grow and react to future changes
Scalability
Indicates the performance level of services offered through the network
Quality of Service (QoS)
On a packet-switched network, a single message is broken into small blocks of data, known as:
Packets
House the largest domain servers that track Internet addresses.
Internet service providers (ISP)
____ refers to the mechanisms that manage congested network traffic.
QoS
______ is caused when the demand on the network resources exceeds the available capacity.
Congestion
Measure of the data-carrying capacity of the network.
Network bandwidth
To provide security, a network manager must address two areas:
- Network infrastructure security
- Content securit
Means having the assurance that the information has not been altered in transmission, from origin to destination.
Data integrity
Routers and servers that are network gatekeepers that analyze traffic entering and exiting a network
Firewalls
Which form of communication is a real-time, text-based communication type used between two or more people who use mostly text to communicate?
A. Weblogs
B. Wikis
C. Instant messaging
D. Podcasting
C. Instant messaging
Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?
A. Intranet
B. Extranet
C. Internetwork
D. Internet
B. Extranet
_______________ are collaborative web pages created and edited by users.
Wikis
What prioritizes traffic and its characteristics to manage data?
A. Network administration
B. Network traffic
C. QoS strategy
D. Network evaluation
C. QoS strategy
Rules that govern the process of network communication are called ______________
Protocols
What network traffic processes must be in place for quality of service strategies to work correctly? (Choose two.)
A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
C. Web traffic is always assigned to a high-priority queue for processing.
D. Digital movies are alway assigned to the high-priority queue for processing.
E. E-mail traffic is always assigned to the low-priority queue
A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
Copper cables and fiber-optic cables are two types of network ___________________.
Media
What are two components of network architecture? (Choose two.)
A. People that comprise the human network
B. Built-in growth potential
C. Data transfer across the network
D. Redundant technologies
E. Corporations that operate and maintain the data network
B. Built-in growth potential
D. Redundant technologies
Symbols that graphically represent network devices and media are called ___________.
Icons
For which three reasons were circuit-switched, connection oriented technologies rejected when the Internet was being developed? (Choose three.)
A. Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information.
B. Early circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure.
C. Circuit-switched technologies required that an open circuit between network endpoints be established even if data was not being actively transferred between locations.
D. The quality and consistency of messages transmitted across a connection-oriented, circuit-switched network cannot be guaranteed.
E. The establishment of simultaneous open circuits for fault tolerance is costly
B, C & E
For which three reasons was a packet-switched, connectionless data communications technology used when developing the Internet? (Choose three.)
A. It can rapidly adapt to the loss of data transmission facilities.
B. It efficiently utilizes the network infrastructure to transfer data.
C. Data packets can travel multiple paths through the network simultaneously.
D. It allows billing of network use by the amount of time a connection is established.
E. It requires that a data circuit between the source and destination be established before data can be transferred
A, B, & C
A _____________ is a device that helps direct messages between networks.
Router
What is the role of QoS in a converged network?
A. Ensures that all traffic above available bandwidth levels is dropped
B. Establishes delivery priorities for different types of communication in a network
C. Determines precise priorities for all types of network communication
D. Allows unused bandwidth to be shared by other organizations within the network
B
Which term describes a common platform for diverse communication types?
A. Scalability
B. Convergence
C. Fault tolerance
D. Quality of service
B
Connectionless messages are broken into __________.
Packets
Which of the following pertains to network infrastructure security?
A. A competitor accesses sensitive information through an unsecured wireless network.
B. Builders accidentally cut a network cable while digging.
C. A disgruntled employee alters information in a customer database.
D. A secretary sends confidential information in a reply to an e-mail that falsely
appears to come from her boss.
B
A worker is assigned to work on a project with another employee from a different city. During online meetings, there are periods of sketchy video and garbled voice communications. Which combination of the following conditions could cause this?
A. Poor scalability in network design
B. Poor security, allowing someone to download music and video files at work
C. Lack of redundant links to the firewall
D. Poor QoS
B and D
Which pair of terms describes a network communication in which a bank has 24-hour exclusive access to an ATM? (Choose one.)
A. Connectionless and packet-switched
B. Packet-switched and connection-oriented
C. Circuit-switched and connection-oriented
D. Circuit-switched and connectionless
C