Compare Internet connection types Flashcards

1
Q

IXPs

A

The Internet is a global network of networks. The core of the Internet consists of high bandwidth fiber optic links connecting Internet exchange points (IXPs). These trunk links and IXPs are mostly created by telecommunications companies and academic institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISPs

A

Internet service providers (ISPs) establish high-speed links between their networks, using transit and peering arrangements to carry traffic to and from parts of the Internet they do not physically own.
Customers connect to the Internet via an ISP’s network. The connection to the ISP’s network uses its nearest point of presence (PoP), such as a local telephone exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet connection type

A

An Internet connection type is the media, hardware, and protocols used to link the local network at a domestic residence or small office to the ISP’s PoP.
This WAN interface is typically point-to-point. This means that there are only two devices connected to the media (unlike Ethernet). Where Ethernet connections are made using NICs and switches, the connection to a WAN interface is typically made by a type of digital modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The roll of router and IP

A

The modem establishes the physical connection to the WAN interface, but when interconnecting networks, there must also be a means of identifying each network and forwarding data between them. This function is performed by a router that implements the Internet Protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Subscriber Line (DSL)

A

Digital subscriber line (DSL) uses the higher frequencies available in these copper telephone lines as a communications channel. The use of advanced modulation and echo cancelling techniques enable high bandwidth, full duplex transmissions.

There are various “flavors” of DSL, notably asymmetrical and symmetrical types:

Asymmetrical DSL (ADSL) provides a fast downlink but a slow uplink. There are various iterations of ADSL, with the latest (ADSL2+) offering downlink rates up to about 24 Mbps and uplink rates of 1.25 Mbps or 2.5 Mbps.

Symmetric versions of DSL offer the same uplink and downlink speeds. These are of more use to businesses and for branch office links, where more data is transferred upstream than with normal Internet use.
The customer network is connected to the telephone cabling via a DSL modem. A filter (splitter) must be installed to each phone socket to separate voice and data signals.

RJ11 DSL (left) and RJ45 LAN (right) ports on a DSL modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cable Modems

A

A cable Internet connection is usually available as part of a cable access TV (CATV) service. A CATV network is often described as hybrid fiber coax (HFC), as it combines a fiber optic core network with copper coaxial cable links to customer premises equipment.
Cable based on the Data Over Cable Service Interface Specification (DOCSIS) supports downlink speeds of up to 38 Mbps (North America) or 50 Mbps (Europe) and uplinks of up to 27 Mbps. DOCSIS version 3 allows the use of multiplexed channels to achieve higher bandwidth.
The cable modem is interfaced to the local router via an RJ45 port and with the access provider’s network by a short segment of coax terminated using threaded F-type connectors.

The RJ45 port connects to the local network router, while the coax port connects to the service provider network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fiber to the Curb and VDSL

A

Very-high-bit-rate Digital Subscriber Line(VDSL) is a type of DSL (Digital Subscriber Line) technology that provides faster data transmission speeds compared to older DSL technologies like ADSL.

A fiber to the curb (FTTC) solution retains some sort of copper wiring to the customer premises while extending the fiber link from the point of presence to a communications cabinet servicing multiple subscribers.

VDSL achieves higher bit rates than other DSL types at the expense of range. It allows for both symmetric and asymmetric modes. Over 300 m (1,000 feet), an asymmetric link supports 52 Mbps downstream and 6 Mbps upstream, while a symmetric link supports 26 Mbps in both directions. VDSL2 specifies a very short range (100 m/300 feet) rate of 100 Mbps (bi-directional).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fiber to the Premises and Optical Network Terminals

A

A fiber to the premises (FTTP) Internet connection means that the service provider’s fiber optic cable is run all the way to the customer’s building. This full fiber connection type is implemented as a passive optical network (PON). In a PON, a single fiber cable is run from an optical line terminal (OLT) to a splitter. The splitter directs each subscriber’s traffic over a shorter length of fiber to an optical network terminal (ONT) installed at the customer’s premises. The ONT converts the optical signal to an electrical one. The ONT is connected to the customer’s router using an RJ45 copper wire patch cord.

Optical network terminal—the PON port terminates the external fiber cable and the LAN ports connect to local routers or computers over RJ45 patch cords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Geostationary Orbital Satellite Internet Access

A

A satellite -based microwave radio system provides far bigger areas of coverage than can be achieved using other technologies. The transfer rates available vary between providers and access packages, but 2 or 6 Mbps up and 30 Mbps down would be typical.
One drawback of satellites placed in a high geostationary orbit is increased latency.

To create a satellite internet connection, the ISP installs a very small aperture terminal (VSAT) satellite dish antenna at the customer’s premises and aligns it with the orbital satellite.
Because the satellite does not move relative to the dish, there should be no need for any realignment. The antenna is connected via coaxial cabling to a Digital Video Broadcast Satellite (DVB-S) modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Round Trip Time (RTT)

A

RTT is the two-way latency, or the time taken for a probe to be sent and a response to be received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Low Earth Orbital Satellite Internet Access

A

Uses an array of satellites positioned in low Earth orbit (LEO). LEO satellites support bandwidth (around 70–100 Mbps at the time of writing) and latency (100–200 ms RTT). The drawback is that the satellites move relative to the surface of the Earth. The customer’s premises antenna must be provisioned with a motor so that it can periodically realign with the array. The dish construction uses a technology called “phased array” to connect to different satellites as they pass overhead and minimize the amount of mechanical realignment required. The antenna must have a clear view of the whole sky.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fixed Wireless Internet Access

A

A wireless internet service provider (WISP) uses ground-based long-range fixed access wireless technology. The WISP installs and maintains a directional antenna to work as a bridge between the customer’s network and the service provider. A WISP might use Wi-Fi type networking or proprietary equipment and licensed or unlicensed frequency bands.

A fixed access wireless link is often low latency, or at least, lower latency than satellite. A disadvantage of fixed access wireless is that the actual unobstructed line of sight between the two antennas can be difficult to maintain. If the provider uses unlicensed frequencies, there are risks of interference from other wireless networks and devices.

All types of microwave radio link can be adversely affected by snow, rain, and high winds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3G

A

A 3G cellular radio makes a connection to the closest base station. The area served by each base station is referred to as a “cell.” Cells can have an effective range of up to 5 miles (8 km), though signals can be obstructed by building materials. A 3G cellular radio typically works in the 850 and 1,900 MHz frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System for Mobile Communication (GSM)

A

Global System for Mobile Communication (GSM)-based phones. GSM allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Code Division Multiple Access (CDMA)

A

Code Division Multiple Access (CDMA)-based handsets. With CDMA, the handset is directly managed by the provider and there is no removable SIM card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4G

A

Long-Term Evolution (LTE) is a series of converged 4G standards supported by both the GSM and CDMA network providers. LTE devices must have a SIM card issued by the network provider installed.

17
Q

5G

A

The 5G standard uses different spectrum bands from low (sub-6 GHz) to medium/high (20–60 GHz).

Low bands have greater range and penetrating power; high bands, also referred to as millimeter wave (mmWave), require close range (a few hundred feet) and cannot penetrate walls or windows.
Consequently, design and rollout of 5G services is relatively complex. Rather than a single large antenna serving a wide area wireless cell, 5G involves installing many smaller antennas to form an array that can take advantage of multipath and beamforming to overcome the propagation limitations of the spectrum.

This technology is referred to as massive multiple input multiple output (MIMO).
As well as faster speeds for mobile device internet connections, 4G and 5G can be used as a fixed-access wireless broadband solution for homes and businesses and to support IoT networks.

18
Q

Routers

A

When you want to connect a local network to the internet, you need to use a protocol that can distinguish between the private LAN and public WAN and an intermediate system with interfaces in both networks. The protocol used to implement this is the Internet Protocol (IP), and the intermediate system is a router.

Whereas a switch forwards frames using MAC (hardware) addresses, a router forwards packets through the internet using IP addresses. A MAC address only identifies a hardware port. An IP address contains the identity of both the network and a single host within that network. A SOHO router often simply routes between its local network interface and its WAN/Internet interface.

19
Q

LAN Router

A

A LAN router divides a single physical network into multiple logical subnetworks. Each logical network becomes a separate broadcast domain. Having too many hosts in the same broadcast domain reduces performance. There is also a security benefit because traffic passing from one logical network to another can be subject to filtering rules. This type of router generally has only Ethernet interfaces.

20
Q

WAN Router

A

A WAN or border router forwards traffic to and from the Internet or over a private WAN link. This type of router has an Ethernet interface for the local network and a digital modem interface for the WAN.

21
Q

Firewalls

A

Once you have joined public and private networks using a router, you then need to control which computers are allowed to connect to them and which types of traffic you will accept. The role of filtering allowed and denied hosts and protocols is performed by a network firewall. A basic firewall is configured with rules, referred to as a network access control list (ACL). Each entry in the ACL lists source and/or destination network addresses and protocol types and whether to allow or block traffic that matches the rule.

Most routers can implement some level of firewall functionality. A firewall can be implemented as a standalone appliance. These dedicated appliances can perform deeper analysis of application protocol data and use more sophisticated rules to determine what traffic is allowed. They are often implemented as unified threat management (UTM) appliances to perform multiple other security functions.

There are also personal or software firewalls. These are installed on a single computer rather than working to protect a network segment.