definitions Flashcards
All computers that are connected to a network and participate directly in network communication are classified as
hosts
can be called end devices. Some are also called clients.
hosts
specifically refers to devices on the network that are assigned a number for communication purposes
hosts
This number identifies the host within a particular network.
Internet Protocol (IP) address
identifies the host and the network to which the host is attached
Internet Protocol (IP) address
are computers with software that allow them to provide information, like email or web pages, to other end devices on the network
Servers
In small businesses and homes, many computers function as the servers and clients on the network.
Peer-to-peer network
is either the source or destination of a message transmitted over the network
end device
connect the individual end devices to the network
intermediary devices
provide connectivity and ensure that data flows across the network
intermediary devices
physically connects the end device to the network
Network Interface Card (NIC)
A connector or outlet on a networking device where the media connects to an end device or another networking device
Physical Port
Specialized ports on a networking device that connect to individual networks.
Interface/Port
illustrate the physical location of intermediary devices and cable installation
You can see that the rooms in which these devices are located
physical topology diagrams
illustrate devices, ports, and the addressing scheme of the network
You can see which end devices are connected to which intermediary devices and what media is being used
logical topology diagrams
means a “network of networks”
internet
the largest network in existence
internet
collection of interconnected private and public networks
internet
connect a few computers to each other and to the internet.
small home networks
allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources
Small Office and Home Office (SOHO) Networks
such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts
medium to large networks
The internet is a network of networks that connects hundreds of millions of computers world-wide.
World Wide Networks
is a network infrastructure that provides access to users and end devices in a small geographical area
LAN (local area networks)
is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider
WAN (wide area networks)
is a term often used to refer to a private connection of LANs and WANs that belongs to an organization
intranet
to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data
extranet
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
cable
also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
DSL (digital subscriber lines)
Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.
cellular
The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
satellite
An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.
dial-up telephone
are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
dedicated leased line
This is sometimes known as Ethernet WAN.
extend LAN access technology into the WAN.
metro ethernet
can provide a connection when a wired solution is not available.
satellite service
is one that limits the number of affected devices during a failure
fault tolerant network
Having multiple paths to a destination is known as
redundancy
occurs when the demand for bandwidth exceeds the amount available
congestion
is measured in the number of bits that can be transmitted in a single second, or bits per second (bps)
network bandwidth
means that only the intended and authorized recipients can access and read data.
data confidentiality
assures users that the information has not been altered in transmission, from origin to destination.
data integrity
assures users of timely and reliable access to data services for authorized users
data availability
is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).
Wireless Internet Service Provider (WISP)
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
video communications
These contain malicious software or code running on a user device
viruses, worms, trojan horses
These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
spyware, adware
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
zero-day attacks
A malicious person attacks user devices or network resources.
threat actor attacks
These attacks slow or crash applications and processes on a network device.
denial of service attacks
This attack captures private information from an organization’s network.
Data interception and theft
This attack steals the login credentials of a user in order to access private data.
identity theft
These applications help to protect end devices from becoming infected with malicious software.
antivirus and antispyware
blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
firewall filtering
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
dedicated firewall systems
These further filter access and traffic forwarding based on IP addresses and applications.
Access control lists (ACL)
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
These provide secure access into an organization for remote workers.
Virtual private networks (VPN)
Used to configure console, SSH, Telnet, or AUX access.
line configuration mode
Used to configure a switch port or router network interface.
interface configuration mode
Cisco IOS software separates management access into the following two command modes:
User EXEC and Privileged EXEC mode