Chapter One Flashcards
Server
computer hardware or software that is used by multiple concurrent issuers or provides services to many users
Client
a network device that remotely accesses a service on another computer through a network.
End Device
either the source or destination of a message transmitted over a network
Intermediary Device
a device that connects end devices to the network and can connect multiple individual networks to form an internetwork.
Topology
the arrangement networking components or nodes. Examples include star, extended star, ring, and mesh
Local-Area Networks (LAN’s)
a network infrastructure that provides access to users and end devices in a small geographic area, which is typically an enterprise, a home, or a small business network owned and managed by an individual or an IT department
Small Office and Home Office (SOHO) Networks
a network in which computers can connect to a corporate network or access centralized, shared resources
Wide-Area Networks (WAN’s)
a network infrastructure that provides access to other networks over a wide geographic area, which is typically owned and managed by a telecommunications service provider
Internet
a network that combines enterprise networks, individual users, and ISP’s into a single global network
Intranet
a private connection of LANs and WANs that belongs to an organization and that is designed to be accessible only by the organization’s members, employees, or others with authorization
Extranet
part of a network that provides secure and safe access to individuals who work for a different organization but require access to the organization’s data
Internet Service Provider (ISP)
a company that helps create the internet by providing connectivity to enterprises and individuals as well as interconnecting to other ISPs to create connectivity to all other ISPs
Digital Subscriber Line (DSL)
an always-on internet service that provides high bandwidth and high availability. Voice and data signals are carried on different frequencies on the copper telephone wires. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed
Cellular Connection
cellular internet access uses a cell phone network to connect. Wherever a user can get a cellular signal, the user can get cellular internet access
Satellite Connection
internet access is provided using satellites and satellite dishes to serve areas that would otherwise have no Internet connectivity at all. A satellite dish requires a clear line of sight to the satellite
Dialup Telephone Connection
an inexpensive communications option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling
Fault Tolerant Network
a term for limiting the impact of a failure so that the fewest number of devices are affected and for the shortest time
Converged Data Network
a network that aggregates various forms of traffic, such as voice, video, and data, on the same network infrastructure
Scalable Network
a network that can expand quickly to support new users and applications
Confidentiality
the state of ensuring that only intended and authorized recipients – individuals, processes, or devices – can access and read data. Confidentiality is accomplished by having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change passwords frequently. Encrypting data so that only the intended recipient can read is also part of confidentiality
Quality of Service (QoS)
a control mechanism that can provide different priorities to different users or data flows or guarantee a certain level of performance to a data flow in accordance with requests from the application program
Integrity
the assurance that information has not been altered in transmission from origin to destination. Data integrity can be compromised when information has been corrupted – willfully or accidentally. Data integrity is made possible by requiring validation of the sender as well as using mechanisms to validate that the packet has not changed during transmission
Availability
the assurance of timely and reliable access to data services for authorized users. Network firewall devices, along with desktop and server anti-virus software, can ensure system reliability and robustness in detecting, repelling, and coping with breaches of network security. Building fully redundant network infrastructures with few single points of failure can reduce the impact of these threats
Bring Your Own Device (BYOD)
a policy that allows end users to use personal tools to access information and communicate within the network or on another network