Chapter 1: Internal and External factors affecting successful communication Flashcards
CHAPTER 1 PG. 37
A common computer used in a home or office
Desktop Computer
A portable computer
Laptop
A computer dedicated to providing application services to end
users on a network
Server
A digital telephone that carries voice as data over data networks instead of analog phone lines
IP phone
Local-area network media, usually copper cable
LAN media
Depicts local-area network wireless access
Wireless Media
The most common device for interconnecting local-area networks
LAN Switch
A device that provides security to networks
Firewall
A device that helps direct messages between networks
Router
A specific type of router often found in home networks
Wireless Router
A symbol used to summarize a group of networking devices out of local management control, often the Internet itself
Cloud
One form of wide-area network (WAN) interconnection, represented by the lightning bolt–shaped line
WAN Media
TCP/IP
IP (Internet Protocol) and TCP (Transmission Control Protocol).
HTTP
What service is this protocol for?
Hypertext Transport Protocol
WWW
SMTP
What service is this protocol for?
Simple Mail Transport Protocol
POP
What service is this protocol for?
Post Office Protocol
XMPP
What service is this protocol for?
Extensible Messaging and Presence Protocol
Instant Message
OSCAR
What service is this protocol for?
Open System for Communication in Realtime
iNSTANT MESSAGE
SIP
What service is this protocol for?
Session Initiation Protocol
IP telephony
Elements of a Network
[BLANK] govern how the messages are sent, directed, received, and interpreted.
Rules or agreements (protocols)
Elements of a Network
[BLANK] or units of information travel from one device to another.
Messages
Elements of a Network
[BLANK] is a means of interconnecting these devices that can transport the messages from one device to another.
Medium
Elements of a Network
[BLANK] on the network exchange messages with each other.
Devices
These software programs that support communication functions are called [BLANK]
services
VoIP
Voice Over Internet Protocol
Examples of priority decisions for an organization might include
Increase priority for services like telephony or video distribution.
Time-sensitive communication
Examples of priority decisions for an organization might include
Decrease priority for web page retrieval or e-mail.
Non-time-sensitive communication:
Examples of priority decisions for an organization might include
Increase priority for production control or business transaction data.
High importance to organization
Examples of priority decisions for an organization might include
Decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.
Undesirable communication
A network security breach can lead to a variety of serious consequences, including what?
NLTE
- Network outage, causing a loss of communication and business transactions
- Loss of personal or business funds
- Theft of intellectual property such as project bids, patents, and strategic plans
- Exposure of confidential customer data
To provide security, a network manager must address two areas which are?
Network infrastructure security and Content security
Network Security
[BLANK] means protection of data stored on network devices and the protection of packets carrying data into or out of the network. Meaning, this means ensures confidentiality, maintaining communication integrity, and ensuring network availability.
Content Security
Network Security
[BLANK] means protecting the devices from outside contact. Locking computer room doors and using quality password protection on network equipment and software.
Network infrastructure security
[BLANK] is maintained by allowing only the intended and authorized recipients—individuals, processes, or devices—to read the data.
Data Privacy
[BLANK] means having the assurance that the information has not been altered in transmission, from origin to destination.
It can be compromised when information
has been corrupted—willfully or accidentally—before the intended recipient receives it.
Data Integrity
[BLANK] is the assurance that the identity of the sender has been validated.
It is compromised when a user or device fakes its identity and supplies incorrect
information to a recipient.
Source Integrity