chapter 8 - computer networks Flashcards
Two or more computers connected to each other to share resources like:
* Folders and files
* Software
* Hardware
Scanners
Printers
Webcams
computer network
Consider a network made up of three computers (Clients) connected to one computer called
server
The ____ is connected to a printer and a scanner (peripheral devices) enabling all three clients to use them
server
Any device connected to a network is called
node
Plugged into the motherboard to interface and connect with other computers.
network interface controller card (NIC)
controls how data and information is shared between computers.
TCP/IP
Connect servers to clients which can sometimes be replaced through wireless connections.
cables
Typically, the central location of a network (server) that serves to run the network smoothly
hub
Maximum rate of data transfer possible
Data transfer rate (bandwidth)
Maximum rate achieved
throughput
Provides a common language and rules for communication between computers
network protocols
arrive at the receiving computer and must be reassembled correctly to guarantee the receiving computer gets a file that will work (not corrupted).
packets
is a convention or standard that controls or allows communication and data transfer between two computers
protocol
Measured in megabits per second (Mbps) or gigabits per second (Gbps)
throughput
When sending a file from one computer to another, the file is broken down into smaller files called
packets
Break large files into packets, but unlike TCP/IP, allows a user to use the incoming file.
user datagram packets
is similar to a stand-alone platform but responsible for much more:
- Automatic hardware detection. The ____
recognizes it when it becomes part of the network. - Supports multi-processing which allows several processes to occur at one time.
- Recognizes who is using the network.
- Provides security
NOS network operating system
- Responsible for smooth network operations
- Network performance
- Implementation of new nodes and users
- Strong business background
network administrator
Refers to the mapping of a physical network and logical interconnections between nodes. Basically, the way a network is arranged and laid out.
network topology
where the network’s nodes are connected to a common linear backbone with two endpoints. If the backbone fails, the whole network fails.
Bus Topology
Bus Topology is Sometimes called
linear bus topology
One central server in which clients connect in a spoke-like fashion, or star. If the server fails, the network fails. (Most common topology)
star topology
Data is transferred between computers in a circular manner.
ring topology
a network used for communication among devices close to one person, such as smartphones, notebooks, and tablets, using wireless technologies such as Bluetooth and WiFi.
PAN
A small network typically confined by a single building. Often used by smaller businesses.
LAN
Connects two or more LANs which are located on universities or large businesses.
CAN
are assigned to business areas like Accounting.
LAN
A computer network that connects CANS and LANs into a larger network that covers an entire city.
MAN
Connects LANs, CANS, and MANs and can cover an entire country
WAN
Generally connect computers to each other. (Exp. LimeWire, BitTorrent)
P2P
The world’s largest network interconnecting public, private, commercial, and governmental networks.
internet
A secret word or combination of keyboard characters typed in by the user to authenticate their identity to a network and gain appropriate access.
passwords
Same as passwords, but requires a user to use upper case characters, lower case characters, numbers, and special characters
strong passwords
Same as a Strong Password, but a phrase that is memorable.
passphrase
Part of network security includes policies and procedures regarding employee’s web browsing.
web browsing on a network
On a business network, consider that all email and instant message is recorded and saved, therefore, policies and procedures must be in place regarding appropriate usage.
email / instant messaging
Network access is called “______”, which grants and denies access to a network depending on the user.
permissions
Hardware and software on a proxy server that determines who is allowed on a network, and who is not
firewall