Definitions Flashcards
Peer-to-Peer
In SOHO networks, many computers function as the servers and clients. Advantages: easy to setup, less complex, lower cost.
Disadvantages: Not secure, not scalable, no centralized administration, slower performance.
Intermediary Network Devices
Connect the individual end devices to the network and can connect multiple individual networks to form an internetwork; a router.
Topology
A diagram of the network that provides a visual of how the network is connected. Two categories: Physical - Identify the physical location of intermediary devices and cable installation.
Logical - Identify devices, ports, and addressing scheme.
LAN
Local Area Network (LAN) interconnect end devices in a limited area such as a home. Usually administered by a single person or organization. Provide high speed bandwidth to internal end and intermediary devices.
WAN
Wide Area Network (WAN) - interconnect LANs over wide geographical areas such as between countries.
WANs are usually administered by multiple service providers.
WANs typically provide slower speed links between LANs.
MAN
Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization
WLAN
Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users and end points in a small geographical area
SAN
Storage Area Network (SAN) - A network infrastructure designed to support file servers and provide data storage, retrieval, and replication
Intranet
Refers to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization’s members, employees, or others with authorization
Extranet
Provides secure and safe access to individuals who work for a different organization, but require access to the organization’s data.
Network Infrastructure
Refers to the technologies that support the infrastructure and the protocols that move data across the network
Redundancy
Having multiple paths to a destination to increase fault tolerance.
Information Security
Protection of the information contained within the packets being transmitted over the network and the information stored on network attached devices.
Powerline networking
Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet.
WISP
Wireless ISP that connects subscribers to a designated access point using wireless.
Commonly found in rural areas where DSL or cable aren’t available.
IOS
Internetwork Operating system - All Cisco network devices use IOS
Kernel
The portion of the OS that interacts directly with computer hardware.
Shell
The portion that interfaces with applications and the user is known as the shell. The user can interact with the shell using a command-line interface (CLI) or a graphical user interface (GUI).
Firmware
Permanent software programmed into a read-only memory. The OS on home routers is usually called this.
Out-of-Band access
Refers to access via a dedicated management channel that is used for device maintenance purposes only.
User EXEC Mode
This mode has limited capabilities but is useful for basic monitoring operations.
Privileged EXEC Mode
This mode allows access to all commands and features.
Global Configuration Mode
Changes in this mode affect the operation of the device as a whole.
Startup-config
File stored in NVRAM that contains all of the commands that will be used by the device upon startup or reboot.
Running-config
The files stored in RAM that reflects the current configuration.
SVI
Switched Virtual Interface - A virtual interface which provides a means to remotely manage a switch. Default SVI is VLAN1.
Protocols
Define the details of how a message is transmitted across a network.
Message encoding
The process of converting information into another acceptable form for transmission.
Encapsulation
The process of placing one message format into another message format
TCP
A transport protocol that divides a message into smaller pieces called segments. Also responsible for controlling the size and rate at which messages are exchanged.
IP
Responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and delivering them to the destination.
Network Access Protocols
Responsible for taking the packets from IP and formatting them to be transmitted over the media. Ethernet is an example.
POP3
Enables clients to retrieve email from a mail server.
Downloads email from the mail server to the desktop.
SMTP
Enables clients to send email to a mail server.
Enables servers to send email to other servers
IMAP (Internet Message Access Protocol)
Enables clients to access email stored on a mail server.
Maintains email on the server.
TCP
Enables reliable communication between processes running on separate hosts.
Reliable, acknowledged transmissions that confirm successful delivery.
UDP
Enables a process running on one host to send packets to a process running on another host
Flow control
source and destination hosts use _______ methods to negotiate correct timing for successful communication
IP
Receives message segments from the transport layer.
Packages messages into packets.
Addresses packets for end-to-end delivery over a network.
Ethernet
Defines the rules for wiring and signaling standards of the network access layer. Contention-based. Operates in the data link and the physical layer.
Bandwidth
The number of bits that are transmitted per second.
Throughput
The measure of the transfer of bits across the media over a given period of time.
LLC
One of two data link sublayers. The upper sublayer which communicates with the network layer.
Identifies which network layer protocol is being used for that frame.
MAC Sublayer
Responsible for the placement and removal of frames from the media.
Provides data link layer addressing.
Virtual circuit
A logical connection created within a network between two network devices.
FCS
This provides a method for the receiving node to determine whether the frame experienced transmission errors.