Chapter 1.2: Exploring the Network: LANs, WANs, and the Internet (inc) Flashcards

1
Q

In a network infrastructure what are three categories of network components?
1.2.1.1

A
  • Devices
  • Media
  • Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the simplest path that a message can take from a source to a destination?
1.2.1.1

A

The simplest path a message can take is through one cable from one computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the physical elements in a network infrastructure? Give examples.
1.2.1.1

A

Devices and media are the physical elements, or hardware, of the network.

Devices are things like servers, routers switches, wireless access points.

Media are the connections (chords and plugs?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a network infrastructure, what are services?

1.2.1.1

A

Services are software and processes that run on network devices.

Examples include email hosting and webhosting services and processes that provide the functionality that directs and moves the messages through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between a service and a process?

A

http://superuser.com/questions/209654/whats-the-difference-between-an-application-process-and-services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are end devices?

1.2.1.2

A

They are hosts that form the interface between users and the underlying communication network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where does data originate and end?

1.2.1.2

A

Data originates with an end device, flows through the network, and arrives at an end device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List some end devices.

1.2.1.2

A

-Computers (workstations, laptops, file servers, web servers)
-Network Printers
-VoIP phones
-TelePresence endpoint
Security cameras
-Mobile handheld devices (Phones, tablets, PDA, wireless debit/credit card readers and barcode scanners.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do hosts distinguish between one another?

1.2.1.2

A

Each host is identified by an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens when a host wants to communicate with another host?
1.2.1.2

A

The host initiates the communication using the address of the destination host to specify where the message should be sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Intermediary devices?

1.2.1.3

A

Intermediary devices are devices that interconnect end devices.

They provide connectivity and work behind the scenes to ensure that data flows across the network. They connect individual hosts to the network and can connect multiple individual networks to form an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Intermediary devices do?

1.2.1.3

A

They provide connectivity and work behind the scenes to ensure that data flows across the network. They connect individual hosts to the network and can connect multiple individual networks to form an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List examples of intermediary network devices.

1.2.1.3

A
  • Network Access (switches and wireless access points)
  • Internetworking (routers)
  • Security (firewalls)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of intermediary devices?

1.2.1.3

A

The role of an intermediary device is to manage data as it flows through the network. The devices use the destination host address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What functions do the processes running on intermediary network devices perform?
1.2.1.3

A
  • Regenerate and retransmit data signals
  • Maintain information about what pathways exist through the network and internetwork
  • Notify other devices of errors and communication failures
  • Direct data along alternate pathways when there is a link failure
  • Classify and direct messages according to Quality of Service (QoS) priorities
  • Permit or deny the flow of data based on security settings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly