Final Exam Study Guide - definitions Flashcards
SMF
Single-mode fiber (SMF) cables
In the context of fiber optic cables, a mode defines the method in which a wave travels through space. A SMF optic cable is constructed to transmit only one mode of light through the fiber (in a direction parallel to the fiber). Thus, these cables consist of a core with a diameter that is quite small in relation to the diameter of the cladding, since it only needs to accommodate a single mode of light. For example, one type of SMF cable is called 9/125 fiber, which means that the core is 9 μm in diameter, while the cladding is 125 μm. Light through SMF can consist of multiple frequencies, but all of these frequencies follow a single path through the fiber.
MMF
MMF cables are constructed with much larger diameters than their SMF counterparts. For example, one common type of MMF is 62.5/125, meaning that the cable has a diameter of 62.5 μm, compared to the 9 μm of some SMF cables.
This wider core allows multiple modes of light to propagate through the fiber, giving rise to additional losses due to phenomenon such as modal dispersion, and limiting the maximum link length to much lower distances than SMF. However, because of the wider core diameter, less precise transceivers can be used, allowing the cost of MMF systems to be generally lower than equivalent SMF systems. For example, MMF transceivers may be constructed using cheaper LEDs instead of lasers as light sources. Therefore, engineers …
CSMA/CD
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control (MAC) method used most notably in early Ethernet technology for local area networking.
It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.[1]
Ipv4 loopback
The Internet Protocol (IP) specifies a loopback network with the (IPv4) address 127.0. 0.0/8. Most IP implementations support a loopback interface (lo0) to represent the loopback facility. … The most commonly used IP address on the loopback network is 127.0. 0.1 for IPv4 and ::1 for IPv6.
HOP
The address of the next router in a path
Gateway
A default gateway is a device that forwards data from one network to another
TCP
Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
UDP
UDP (User Datagram Protocol) is a long standing protocol used together with IP for sending data when transmission speed and efficiency matter more than security and reliability. … UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram
Connection-oriented protocol
Connection-oriented service involves the creation and termination of the connection for sending the data between two or more devices. In contrast, connectionless service does not require establishing any connection and termination process for transferring the data over a network.
Connectionless protocol
A connectionless protocol refers to the communication between two network endpoints without a prior arrangement in which one network endpoint simply sends a message to the other. At the sending end, the device transmits the unit of data before ensuring that the receiving end’s device is ready.
HTTP
HyperText Transfer Protocol) The communications protocol used to connect to Web servers on the Internet or on a local network (intranet).
https
HTTPS stands for Hypertext Transfer Protocol Secure. It is the protocol where encrypted HTTP data is transferred over a secure connection.
SSH
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
Encrypted
Telnet
a network protocol that allows a user on one computer to log into another computer
no encryption
Nslookup
NsLookup is a tool included in many operating systems that can look up IP addresses and perform other searches on DNS domains and servers
Traceroute
Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet…
VPN
an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
Access port on switch
one vlan per port. used for pc, printer, etc…
truck port on switch
more than one vlan per port
Promiscuous mode
Promiscuous mode is a type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode. It is a network security, monitoring and administration technique that enables access to entire network data packets by any configured network adapter on a host system.
Promiscuous mode is used to monitor traffic
CRC
Cyclic redundancy check
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
Tunneling
Tunneling is a protocol that allows for the secure movement of data from one network to another
Ipconfig
show ip information
Internet Protocol CONFIGuration) A Windows command line utility that is used to manage the IP address assigned to the machine it is running in.
(Linux) ip
ifconfig or ip a
redundancy
Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.
modem
modulate / demodulate
converts digital to analog signals to send data of a phone line.
Session Initial Protocol (SIP)
The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.[1] SIP is used for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, in instant messaging over Internet Protocol (IP) networks as well as mobile phone calling over LTE (VoLTE).