Definitions Flashcards

1
Q

Peer-to-Peer

A

In SOHO networks, many computers function as the servers and clients. Advantages: easy to setup, less complex, lower cost.
Disadvantages: Not secure, not scalable, no centralized administration, slower performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intermediary Network Devices

A

Connect the individual end devices to the network and can connect multiple individual networks to form an internetwork; a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Topology

A

A diagram of the network that provides a visual of how the network is connected. Two categories: Physical - Identify the physical location of intermediary devices and cable installation.
Logical - Identify devices, ports, and addressing scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAN

A

Local Area Network (LAN) interconnect end devices in a limited area such as a home. Usually administered by a single person or organization. Provide high speed bandwidth to internal end and intermediary devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAN

A

Wide Area Network (WAN) - interconnect LANs over wide geographical areas such as between countries.
WANs are usually administered by multiple service providers.
WANs typically provide slower speed links between LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAN

A

Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WLAN

A

Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users and end points in a small geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SAN

A

Storage Area Network (SAN) - A network infrastructure designed to support file servers and provide data storage, retrieval, and replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranet

A

Refers to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization’s members, employees, or others with authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extranet

A

Provides secure and safe access to individuals who work for a different organization, but require access to the organization’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Infrastructure

A

Refers to the technologies that support the infrastructure and the protocols that move data across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Redundancy

A

Having multiple paths to a destination to increase fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information Security

A

Protection of the information contained within the packets being transmitted over the network and the information stored on network attached devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Powerline networking

A

Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WISP

A

Wireless ISP that connects subscribers to a designated access point using wireless.
Commonly found in rural areas where DSL or cable aren’t available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IOS

A

Internetwork Operating system - All Cisco network devices use IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Kernel

A

The portion of the OS that interacts directly with computer hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Shell

A

The portion that interfaces with applications and the user is known as the shell. The user can interact with the shell using a command-line interface (CLI) or a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Firmware

A

Permanent software programmed into a read-only memory. The OS on home routers is usually called this.

20
Q

Out-of-Band access

A

Refers to access via a dedicated management channel that is used for device maintenance purposes only.

21
Q

User EXEC Mode

A

This mode has limited capabilities but is useful for basic monitoring operations.

22
Q

Privileged EXEC Mode

A

This mode allows access to all commands and features.

23
Q

Global Configuration Mode

A

Changes in this mode affect the operation of the device as a whole.

24
Q

Startup-config

A

File stored in NVRAM that contains all of the commands that will be used by the device upon startup or reboot.

25
Q

Running-config

A

The files stored in RAM that reflects the current configuration.

26
Q

SVI

A

Switched Virtual Interface - A virtual interface which provides a means to remotely manage a switch. Default SVI is VLAN1.

27
Q

Protocols

A

Define the details of how a message is transmitted across a network.

28
Q

Message encoding

A

The process of converting information into another acceptable form for transmission.

29
Q

Encapsulation

A

The process of placing one message format into another message format

30
Q

TCP

A

A transport protocol that divides a message into smaller pieces called segments. Also responsible for controlling the size and rate at which messages are exchanged.

31
Q

IP

A

Responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and delivering them to the destination.

32
Q

Network Access Protocols

A

Responsible for taking the packets from IP and formatting them to be transmitted over the media. Ethernet is an example.

33
Q

POP3

A

Enables clients to retrieve email from a mail server.

Downloads email from the mail server to the desktop.

34
Q

SMTP

A

Enables clients to send email to a mail server.

Enables servers to send email to other servers

35
Q

IMAP (Internet Message Access Protocol)

A

Enables clients to access email stored on a mail server.

Maintains email on the server.

36
Q

TCP

A

Enables reliable communication between processes running on separate hosts.
Reliable, acknowledged transmissions that confirm successful delivery.

37
Q

UDP

A

Enables a process running on one host to send packets to a process running on another host

38
Q

Flow control

A

source and destination hosts use _______ methods to negotiate correct timing for successful communication

39
Q

IP

A

Receives message segments from the transport layer.
Packages messages into packets.
Addresses packets for end-to-end delivery over a network.

40
Q

Ethernet

A

Defines the rules for wiring and signaling standards of the network access layer. Contention-based. Operates in the data link and the physical layer.

41
Q

Bandwidth

A

The number of bits that are transmitted per second.

42
Q

Throughput

A

The measure of the transfer of bits across the media over a given period of time.

43
Q

LLC

A

One of two data link sublayers. The upper sublayer which communicates with the network layer.
Identifies which network layer protocol is being used for that frame.

44
Q

MAC Sublayer

A

Responsible for the placement and removal of frames from the media.
Provides data link layer addressing.

45
Q

Virtual circuit

A

A logical connection created within a network between two network devices.

46
Q

FCS

A

This provides a method for the receiving node to determine whether the frame experienced transmission errors.