Chapter 1 Flashcards

0
Q

End devices (host devices)

A

Physical thing at the end of a network. Can be a client or server or both. All user devices connected to the network that participate in network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Define “Internet.”

A

A network of networks. Made of an interconnection of private and public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of peer to peer networking.

A
  • Easy to set up
  • less complexity (simpler)
  • lower cost , since network devices and dedicated servers may not be required.
  • can be used for simple takes, transferring files and sharing printers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages to peer to peer networking

A
  • NO Centralized administration
  • not as secure
  • Not scalable
  • all devices may act as both clients AND servers, can slow performance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tell me shit about clients and servers

A

Clients request information from servers.

Clients can be web browsers, email clients, and they access an e-mail server or web server. Got it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three categories of network components?

A
  • Devices
  • Media (physical wires that carry electrical connections)
  • services and processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intermediary Devices.

A
  • Provide connectivity and work behind the scenes to ensure that data flows across the network.
  • connect individual hosts to network, and networks to other networks to make an internetwork
  • manage data in network
  • directs data path, does not change actual data content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of intermediary devices.

A
  • Network Access devices (switches, wireless access points)
  • Internetworking devices (routers)
  • Security devices (firewalls)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “Medium.”

A

The channel over which a message flows from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which form of “media” transfers signals furthest and fastest?

A

Fiber optic.

As opposed to Copper wire and wireless media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Topology?

A

A visual representation of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process running on intermediary devices can:

A
  • regenerate and retransmit data signals.
  • maintain info about what pathways exist through the network/internetwork
  • notify devices of errors/failures
  • direct data along alternate pathways when there’s a link failure
  • Permit or deny the flow of data based on security settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Network Interface Card (NIC)?

A

Provides physical connection to the network at the PC (or other host device). The media (cable) connecting to the PC to the network device plugs directly into the NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical port.

A

Connector or outlet on a networking device where media is connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Interface.

A

Specialized ports on an internetworking device, that connect to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of networks (LAN):

A
  • LAN: Local Area Network- network in a small geographic area.
  • WAN: Wide Area Network- A network over a wide geographic area.
  • MAN: Metropolitan Area Network- larger than LAN, smaller than WAN, city-sized.
  • WLAN: Wireless LAN- wireless network in small area
  • SAN: Storage Area Network- network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
16
Q

What is the Intranet. (Not Internet)

A

A companies set of LANs for employees.

17
Q

What is the extranet?

A

Limited access to the intranet (not Internet) provided to customers and suppliers (etc.) by a company.

18
Q

What is scalability?

A

The ability of a network to grow/shrink with little/no burden on the network.

19
Q

What is fault tolerance?

A

Ability of a network to recover from failure.

20
Q

What is network architecture?

A

The technologies that support the infrastructure and the programmed services and rules or protocols that move passages across the network.

Basically the technologies that support the design of the whole network.

21
Q

Packet-switched networks.

A

Provide many paths for communication.

22
Q

Ways to provide Quality of service. (QoS)

A
  • Using Queues to prioritize communication.
  • increase priority services like telephone/video
  • decrease priority/block unwanted activity
23
Q

Network Infrastructure Security:

A

Physical securing of devices that provide network connectivity, and preventing unauthorized access to the software that resides on the devices.

24
Q

Information Security:

A

Protecting the information contained within the packets being transmitted over the network and stored on network attached devices.

25
Q

BYOD

A

Bring your own device

26
Q

Cloud computing:

A

Use of hardware and software that is delivered as a service over a network.

27
Q

Four types of “clouds.”

A

Public- available to everyone.

Private- intended for organizations, like government. Strict security.

Custom- built to meet the needs of a specific industry, (healthcare, media, etc.). Can be private or public.

Hybrid- made of two or more clouds

28
Q

Data Center:

A

Facility used to house computer systems and associated components.

29
Q

Wireless Internet Service Provider:

A

ISP that connects subscribers to a designated hot spot using wireless devices, such as ones found in WLANs.

30
Q

Wireless broadband:

A

Uses the same cellular technology used to access the Internet with a smart phone or tablet.

31
Q

External network threats:

A

Viruses, spyware, hacking, identity theft, data interception/theft, etc.

32
Q

Network security components/solutions:

A

Antivirus and antispyware

Firewall

Access control lists etc.