Chapter 5 Flashcards

1
Q

PAN

A

Personal area network; Connects personal devices in a very short range with or without cables (Ex. Phone to headset)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LAN

A

Local area network; Connects personal computers within a limited area (Ex. School computer lab)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAN

A

Metropolitan area network; Public high-speed network capable of transmission within 50 mile range (Ex. Local internet service providers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN

A

Wide area network; Covers a large geographical area and several smaller networks (Ex. The Internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shared resources

A

Hardware, software, and data made available for authorized network users to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Node

A

Each connection point on a network containing a computer, peripheral, or other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIC

A

Network interface card; Special circuitry in a system board required to connect to a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Networked peripheral

A

Device that contains network circuitry to directly connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAS

A

Network attached storage; Storage device that directly connects to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network device

A

Any electronic device that broadcasts network data, boosts signals, or routes data to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Router

A

A type of network device that acts as a central distribution point for getting data to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communications channel

A

Physical path or a frequency for signal transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RJ45 connector

A

At the end of a network cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Optical fiber cable

A

Composed of many strands of thin glass tubes that send data at the speed of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bandwidth

A

Transmission capacity of a communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Broadband

A

High-bandwidth communications systems (Ex. Cable TV & DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Narrowband

A

Communications systems with less capacity (Ex. Dial-up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Communications protocol

A

A set of rules for efficiently transmitting data from one network node to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Handshaking

A

The process by which two computers on a network negotiate their communications protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Packet

A

Parcel of data that is sent across a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Circuit switching

A

Establishes a dedicated, private link between two devices, such as a telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Packet switching

A

Divides a message into several packets that can be routed independently to their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MAC address

A

A unique number assigned to a network interface card when it is manufactured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP address

A

Series of numbers used to identify a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DHCP
Dynamic Host Configuration Protocol; Protocol designed to automatically distribute IP addresses
26
Advantages of LAN
- LANs enable people to work together - Sharing networked software can reduce costs - Sharing data on a LAN can increase productivity - Sharing networked hardware can reduce costs - Sharing an Internet connection can be cost-effective and convenient - Sharing networked hardware can provide access to a wide range of services and specialized peripheral devices
27
Disadvantages of LANs
- Malfunctions limit access to data - LANs are vulnerable to unauthorized access - LANs are vulnerable to malicious code
28
What can communications protocols do?
- Divide messages into packets - Affix addresses to packets - Initiate transmission - Regulate the flow of data - Check for transmission errors - Acknowledge receipt of transmitted data
29
How does data travel over a network?
1. Source --> (Encoded data) --> 2. Transmitter --> (Signal) --> 3. Communications channel --> 4. Receiver --> (Decoded data) --> 5. Destination
30
What kind of signals can travel over computer networks?
Electromagnetic signals - Digital signals: limited set of frequencies - Analog signals: any value in a range of frequencies
31
How can a network detect if a signal has been corrupted?
Detects and reestablishes voltages that have errors | Ex. +3 volts corrected to +5 volts when the only options are -5 volts and +5 volts
32
Ethernet
A wired network technology that is defined by IEEE 802.3 standards; standard for wired connections in local area networks
33
Ethernet adapter
Can be installed if a computer has no Ethernet port
34
RF signals
Radio waves
35
Transceiver
A combination of a transmitter and a receiver that sends and receives radio waves
36
Microwaves
Electromagnetic signals that behave differently than radio waves - Can be aimed in a single direction - More carrying capacity - Cannot penetrate metal objects
37
Infrared light
Carry data signals for short distances with a clear line of sight
38
Bluetooth
A short-range wireless network technology that is designed to make connections between two devices
39
Pairing
Creates a persistent link between two devices, usually through the exchange of an authentication code called a passkey
40
Discovery mode
Allows devices with Bluetooth capability to be open for pairing
41
Wi-Fi
Refers to a set of wireless networking technologies defined by IEEE 802.11 standards that transmits data as radio waves and is compatible with Ethernet
42
Wireless ad-hoc protocol
Devices broadcast directly to each other
43
Wireless infrastructure protocol
Centralized broadcasting device coordinates communication among network devices (more security than ad-hoc)
44
Wi-Fi adapter
Plugs into a USB port of an internal expansion slot to allow equipment to be Wi-Fi compatible
45
Dual-band
When a router uses two frequencies
46
MIMO
(Multiple-input multiple-output) Technology to boost signals and spread them more evenly over the signal range
47
What is wired technology?
Uses cables to connect network devices
48
What are the advantages of wired technology?
- Fast - Secure - Simple to configure
49
What are the disadvantages of wired technology?
- Limited mobility - Unsightly - Cables get tangled and collect dust
50
Why is Ethernet so popular?
- Easy to understand, implement, manage, and maintain - Available from many vendors for low prices - Flexibility in network design - Compatible with Wi-Fi technology
51
How does Ethernet work?
Simultaneously broadcasts data packets to all network devices, but is only accepted to the one it is addressed to
52
What is wireless technology?
Transports data from one device to another without the use of cables or wires
53
What are the advantages of wireless connections?
-Mobility
54
What are the disadvantages of wireless connections?
- Speed - Range - Licensing - Security
55
What is wireless slower than wired?
Susceptibility to interference, which takes extra time
56
What limits the range of a wireless network?
- Type of signal - Transmitter strength - Physical environment
57
What are the issues with wireless security?
Signals float through the air and penetrate walls, so that anyone can surreptitiously join your network
58
SSID
(Service set identifier) The name of a wireless network
59
Wireless encryption
Scrambles the data transmitted between wireless devices and then unscrambles the data only one devices that have a valid encryption key
60
WEP
(Wired Equivalent Privacy) Original wireless encryption protocol that had a level of confidentiality similar to that of a wired network
61
WPA
(Wi-Fi Protected Access) Offer stronger protection that WEP by making sure that packets have not been intercepted or tampered in any way
62
PSK
(Pre-shared key) A personal type of WPA used on most home networks
63
Wireless encryption key
Basis for scrambling and unscrambling the data transmitted between wireless devices
64
Hub
Extends a wired network by adding additional ports
65
Switch
Intelligently facilitates communication among multiple devices on a network
66
Gateway
Joins two different types of networks, such as your home network and the Internet
67
Bridge
Connects two similar networks
68
Repeater
Extends the range of a network by restoring signals to maximum strength and retransmitting them
69
Wireless access point (WAP)
Allows wireless devices to connect to a wired network
70
File sharing
Allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored
71
Network discovery
Setting that affects whether your computer can see other computers on a network, and whether your computer can be seen by others
72
Public folder
Designed to hold files and folders that you want to share with other people on your network
73
Homegroup
Collection of trusted Windows computers that automatically share files and folders
74
File server
Computer whose primary purpose is to be a repository for files that can be accessed by network workstations
75
Are there restrictions on file sharing?
- Which devices your computer can discover - Which files you allow others to access - What others are allowed to do with the files they can access
76
Specific files
Can be designated as shared, which is versatile, but not secure. Public folders are a better option.
77
Read and write permission
Allows access for opening, viewing, modifying, or deleting files
78
Read permission
Allows authorized people to open a file and view it, but they cannot modify or delete it
79
Write only permission
Works like a drop box, allowing people to put files in one of your folders, but not open, copy, or change any files that you have stored there
80
Encryption
Transforms a message in such a way that its contents are hidden from unauthorized readers. Plaintext to ciphertext.
81
Paintext
An original message that has not yet been encrypted
82
Ciphertext
Encrypted message
83
Decryption
Ciphertext to plaintext. The reverse process of encryption.
84
Cryptographic algorithm
Procedure for encrypting or decrypting a message
85
Cryptographic key
Word, number, or phrase that must be known to encrypt or decrypt a message
86
Weak encryption
Easy to decrypt without the algorithm and key
87
Strong encryption
Very difficult to break
88
AES
Advanced Encryption Standard; technology used for WPA2; One of the strongest cryptographic algorithms
89
Symmetric key encryption
Key used to encrypt a message is also used to decrypt the message
90
PKE
Public key encryption; eliminate the key-distribution process by using one key to encrypt a message, but another key to decrypt the message