Chapter 1 Flashcards
A computer that had resources associated with it, but nothing is shared with another system
Stand-alone
A system of independent computers that are interconnected to share data and resources
Network
Removable media and is walked over to the other system that requires data
Sneaker-net
What are the three basic network configurations ?
Centralized computing
Peer to peer networks
Server based networks
Computers with hard drives that provide shared resources to network users.
Servers
Computers that may or may not have a hard drive that access shared network resources provided by a server
Clients
The wires or signaling that provide a path for communication
Media/Medium
Data provided to clients by servers across the network
Shared data
Any service or device, such as files, printers,or other items, made available for use by members of the network
Shared resources
Used with microcomputers and mainframe computers usually running a Unix-based operating system.
Also have dumb terminals
Centralized computing
Each computer functions as a “client” and a “server”, so there is no need for a powerful central server or for the other components required for a high-capacity network
All the computers all equal
Peer to peer networks
( making computers and data stored on them safe from harm or unauthorized access) consist s of setting a password on a resource, such as a directory that is shared on a network.
Security
Also called a domain- provides centralized control of network services
Client/server based networks
Capable of transmitting data at more that one gigabit per second(Gbps) and is primarily a WAN technology.
For fiber optic technology
SONET
A network that is confined to a single location
Local area network (LAN)
Standard for optical transport
SONET
Equivalent of SONET and defines optical-carrier(OC) levels and electrical-equivalent synchronous transport signal
Synchronous Digital Hierarchy
SDH
It is an advanced implementation of packet switching that provides high-speed data transmission rates to send fixed-size packets over broadband and baseband LANs or WANs.
Standard for cell relay
Asynchronous transfer mode
ATM
The most popular physical network architecture in use today due to its flexibility, ease of setup and inexpensive components.
Works at the physical layer
Ethernet
Used to regulate network access
Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)
Primary differences between the mediums
Distance they can run,
Ease of installation and
Cost
Basic geometric layout of the network-the way in which the computers on the network are interconnected
Topology
The two types of topologies
Physical and logical
If you can touch it - physical
If you can’t see it - logical
All computers in the network are connected to a single cable or a backbone
Bus topology
Made up of a central connection point that is a device such as a hub,router,or even a server, where all the cabling segments meet
Star Topology
Procedures and rules that manage network access so that all nodes have access without conflicting with each other causing collisions and loss of data
Media access, or control methods also called media access techniques
A system of rules and procedures that govern communication between two or more devices on a network
Protocol
Three basic elements of a protocol
- Character set
- A set of rules for the sequence and timing of messages
- Procedures for error detection and correction
A combination of protocols
A protocol stack
This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail
Application Layer
The three protocols used in the application layer
- HTTP-hypertext transport protocol
- SNMP- Simple Network management protocol
- Telnet
An Internet protocol by which World Wide Web pages are transmitted over networks
HTTP
An Internet protocol for monitoring networks and network components
SNMP
An Internet protocol for logging on to remote hosts and processing data locally
Telnet
This layer ensures packets are delivered error free, in sequence, and without loses or duplications.
Transport layer
These protocols establish,maintain and break a connection with the receiving system.
Connection-Oriented
A connection-oriented transport layer protocol that provides reliable full-duplex data transmission
Transmission Control Protocol (TCP)
Grouping bytes in TCP segments, which are passed to IP for transmission to the deletion
Uses a “push” to ensure that all data is passed to the destination
Stream Data Transfer
Requires a recipient to communicate with the source, sending back an acknowledgment message when it receives data.
Positive ACKNOWLEDGEMENT (ACK)
A method used to prevent network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data
Flow control
What flow control method Temporarily stores bursts of excess data in memory until they can be processed
Buffering
A flow control method used by the receiving devices to help prevent their buffers from overflowing
Source-quench Message
A flow control mechanism requiring that the source device receive an acknowledgment from the destination after transmitting a certain amount of data.
Windowing
Determines whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.
One common technique is Cyclic Redundancy Check (CRC)
Error Control
This is A combination of a port number and IP address
Socket
It regulates how much information can be passed over a TCP connection before the receiving host must send an acknowledgement
Sliding window
This 802 standard sets internet working standards related to bridging and network management
802.1
This 802 standard defines the general standard for the logical link control (LLC) which is the upper portion of the data link layer for local area networks
802.2
This 802 standard defines the Media Access Control (MAC) layer for bus networks that use Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)
This is a Ethernet standard
802.3
This 802 standard defines the MAC layer for token ring networks (Token Ring LAN)
802.5
This 802 standard defines wireless network standards. (LAN)
802.11
This 802 standard defines wireless personal area networks (WPAN)
802.15
This 802 standard defines broadband wireless standards.
802.16
This 802 standard does resilient packet ring (RPR)
802.17
This 802 standard works with mobile wireless
802.20
This 802 standard works with media independent handover services
802.21