Chapter 1 Flashcards

0
Q

A computer that had resources associated with it, but nothing is shared with another system

A

Stand-alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A system of independent computers that are interconnected to share data and resources

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Removable media and is walked over to the other system that requires data

A

Sneaker-net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three basic network configurations ?

A

Centralized computing

Peer to peer networks

Server based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computers with hard drives that provide shared resources to network users.

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computers that may or may not have a hard drive that access shared network resources provided by a server

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The wires or signaling that provide a path for communication

A

Media/Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data provided to clients by servers across the network

A

Shared data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any service or device, such as files, printers,or other items, made available for use by members of the network

A

Shared resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used with microcomputers and mainframe computers usually running a Unix-based operating system.

Also have dumb terminals

A

Centralized computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Each computer functions as a “client” and a “server”, so there is no need for a powerful central server or for the other components required for a high-capacity network

All the computers all equal

A

Peer to peer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

( making computers and data stored on them safe from harm or unauthorized access) consist s of setting a password on a resource, such as a directory that is shared on a network.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Also called a domain- provides centralized control of network services

A

Client/server based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Capable of transmitting data at more that one gigabit per second(Gbps) and is primarily a WAN technology.

For fiber optic technology

A

SONET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network that is confined to a single location

A

Local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standard for optical transport

A

SONET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Equivalent of SONET and defines optical-carrier(OC) levels and electrical-equivalent synchronous transport signal

A

Synchronous Digital Hierarchy

SDH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is an advanced implementation of packet switching that provides high-speed data transmission rates to send fixed-size packets over broadband and baseband LANs or WANs.

Standard for cell relay

A

Asynchronous transfer mode

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The most popular physical network architecture in use today due to its flexibility, ease of setup and inexpensive components.

Works at the physical layer

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Used to regulate network access

A

Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Primary differences between the mediums

A

Distance they can run,
Ease of installation and
Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Basic geometric layout of the network-the way in which the computers on the network are interconnected

A

Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The two types of topologies

A

Physical and logical

If you can touch it - physical
If you can’t see it - logical

23
Q

All computers in the network are connected to a single cable or a backbone

A

Bus topology

24
Q

Made up of a central connection point that is a device such as a hub,router,or even a server, where all the cabling segments meet

A

Star Topology

25
Q

Procedures and rules that manage network access so that all nodes have access without conflicting with each other causing collisions and loss of data

A

Media access, or control methods also called media access techniques

26
Q

A system of rules and procedures that govern communication between two or more devices on a network

A

Protocol

27
Q

Three basic elements of a protocol

A
  • Character set
  • A set of rules for the sequence and timing of messages
  • Procedures for error detection and correction
28
Q

A combination of protocols

A

A protocol stack

29
Q

This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail

A

Application Layer

30
Q

The three protocols used in the application layer

A
  • HTTP-hypertext transport protocol
  • SNMP- Simple Network management protocol
  • Telnet
31
Q

An Internet protocol by which World Wide Web pages are transmitted over networks

A

HTTP

32
Q

An Internet protocol for monitoring networks and network components

A

SNMP

33
Q

An Internet protocol for logging on to remote hosts and processing data locally

A

Telnet

34
Q

This layer ensures packets are delivered error free, in sequence, and without loses or duplications.

A

Transport layer

35
Q

These protocols establish,maintain and break a connection with the receiving system.

A

Connection-Oriented

36
Q

A connection-oriented transport layer protocol that provides reliable full-duplex data transmission

A

Transmission Control Protocol (TCP)

37
Q

Grouping bytes in TCP segments, which are passed to IP for transmission to the deletion

Uses a “push” to ensure that all data is passed to the destination

A

Stream Data Transfer

38
Q

Requires a recipient to communicate with the source, sending back an acknowledgment message when it receives data.

A

Positive ACKNOWLEDGEMENT (ACK)

39
Q

A method used to prevent network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data

A

Flow control

40
Q

What flow control method Temporarily stores bursts of excess data in memory until they can be processed

A

Buffering

41
Q

A flow control method used by the receiving devices to help prevent their buffers from overflowing

A

Source-quench Message

42
Q

A flow control mechanism requiring that the source device receive an acknowledgment from the destination after transmitting a certain amount of data.

A

Windowing

43
Q

Determines whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.

One common technique is Cyclic Redundancy Check (CRC)

A

Error Control

44
Q

This is A combination of a port number and IP address

A

Socket

45
Q

It regulates how much information can be passed over a TCP connection before the receiving host must send an acknowledgement

A

Sliding window

46
Q

This 802 standard sets internet working standards related to bridging and network management

A

802.1

47
Q

This 802 standard defines the general standard for the logical link control (LLC) which is the upper portion of the data link layer for local area networks

A

802.2

48
Q

This 802 standard defines the Media Access Control (MAC) layer for bus networks that use Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)

This is a Ethernet standard

A

802.3

49
Q

This 802 standard defines the MAC layer for token ring networks (Token Ring LAN)

A

802.5

50
Q

This 802 standard defines wireless network standards. (LAN)

A

802.11

51
Q

This 802 standard defines wireless personal area networks (WPAN)

A

802.15

52
Q

This 802 standard defines broadband wireless standards.

A

802.16

53
Q

This 802 standard does resilient packet ring (RPR)

A

802.17

54
Q

This 802 standard works with mobile wireless

A

802.20

55
Q

This 802 standard works with media independent handover services

A

802.21