Handout 2 Flashcards

1
Q

It is a schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection (Huawei, 2022)

A

network topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this type of topology, the computers are connected to a single hub through a cable. This hub is the central node while all other nodes are connected to it

A

start topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Topology-a network type in which every computer and network device is connected to a single cable.

A

bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when bus topology has exactly 2 endpoints, it is called

A

linear bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

forms a ring as each computer is connected to another computer, with the last one (1) connected to the first-exactly two (2) neighbors for each device.

A

ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

has a root node and all other nodes are connected to it forming a hierarchy.

A

tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tree topology is also called

A

hierarchical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a point-to-point connection to other nodes or devices. All the network nodes are connected.

A

mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in this topology, some systems are connected in the same fashion as mesh topology, but some devices are only connected to two (2) or three (3) devices.

A

partial mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

each node or device is connected.

A

full mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

consists of a mix of two (2) different types of topologies merging as one network.

A

hybrid topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the end-device of the data communication system. It provides the necessary functions required by the user access protocol operations

A

terminal device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

terminal device includes this such as a PC, phone, hansets, printers, and servers

A

data terminal equipment (DTE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a key component that connects directly to a device that allows access to a network such as an internet or a local network.

A

network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

device closest to end-users, used to access the network and switch data frames.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches belonging at the access layer are usually Layer 2 switches, also known as

A

ethernet switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

set of nodes that can receive broadcast packets from a node

A

broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a network-layer device that forwards data packets on the Internet

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

device that connects a network to the Internet. It takes signals from your Internet service provider (ISP) and translates them into signals connected to the local devices.

A

modem

20
Q

term for a router that provides functions such as protocol conversion, route selection, and data exchange when networks using different architectures or protocols communicate with each other.

A

gateway

21
Q

network security device used to ensure secure communication between two networks.

A

firewall

22
Q

It monitors, restricts, and modifies data flows passing through it to shield information, structure, and running status of internal networks from the public network

A

firewall

23
Q

It controls the communication between the two networks and forcibly implements unified security policies to prevent unauthorized access to important information resources.

A

firewall

24
Q

a network that uses radio waves, laser, and infrared signals to replace some or all transmission media in a wired LAN

A

wireless devices

25
Q

applies to homes. It works independently and needs to be configured separately. It has simple functions and low costs.

A

fat access point (fat AP)

26
Q

applies to medium- and large-sized enterprises. It needs to work with the AC and is managed and configured by the AC

A

fit access point (fat AP)

27
Q

generally deployed at the aggregation layer of the entire network. The AC provides wireless data control services featuring large capacity, high performance, high reliability, easy installation, and easy maintenance.

A

access controller (AC)

28
Q

generally covers an area of a few square kilometers The main function is to connect several terminals that are close to each other (within a family, within one or more buildings, within a campus, for example). Technologies used: Ethernet and Wi-Fi

A

local area network (LAN)

29
Q

a large-sized LAN, requiring high costs but can provide a higher transmission rate. improves the transmission media in LANs and expands the access scope of LANs fable to cover a university campus or city) The main function is to connect hosts, databases, and LANs at different locations in the same ty

A

metropolitan area network (MAN)

30
Q

generally covers an area of several kilometers or larger (thousands of kilometers for example). It is mainly used to connect several LANS or MANs that are far from each other for example, actas cities or countries). Telecom operators’ communication lines use HDLC and FFP

A

wide area network (WAN)

31
Q

a descriptive network scheme. The OSI model describes how information or data makes its way from application programs through a network medium to another application program located on another network.

A

open systems interconnection (OSI) model

32
Q

OSI layer that is closest to the user. It provides network services to the user’s applications such as spreadsheet programs, word processing programs, and bank terminal programs. It establishes the availability of intended communication partners, synchronizes, and establishes agreement on procedures for error recovery and control of data integrity.

A

layer 7: application layer

33
Q

ensures that the information that the application layer of one (1) system sends out is readable by the application layer of another system. If necessary, it translates between multiple data formats by using a common format. Provides encryption and compression of data. Examples: JPEG, MPEG, ASCII, HTML

A

layer 6: presentation layer

34
Q

defines how to start, control and end conversations (called sessions) between applications. It also synchronizes dialogue between two (2) hosts’ presentation layers and manages their data exchange

A

layer 5: session layer

35
Q

regulates information flow to ensure end-to-end connectivity between host applications reliably and accurately. This layer segments data from the sending host’s system and reassembles the data into a data stream on the receiving hast’s system

A

layer 4: transport layer

36
Q

defines end-to-end delivery of packets. It defines how routing works (identifying endpoints) and how routes are learned so that the packets can be delivered. it defines how to fragment a packet into smaller packets to accommodate different media. Examples: Routers operate at Layer 3-IP, IPX, AppleTalk

A

layer 3: network layer

37
Q

provides access to the networking media and physical transmission across the media and this enables the data to locate its intended destination on a network. This layer is concerned with network topology, network access, error notification, ordered delivery of frames, and flow control. Examples: Ethernet, Frame Relay, FDDI.

A

layer 2: data link layer

38
Q

deals with the physical characteristics of the transmission medium. It defines the electrical, mechanical, procedural, and functional specifications for achieving, maintaining, and deactivating physical link between end systems

A

layer 1: physical layer

39
Q

It is a networking model with a set of communication protocols for the internet and similar networks. It is commonly known as TCP/IP because its Transmission Control Protocol and Internet Protocol (IP) were the first networking protocols defined in this model.

A

TCP/IP model

40
Q

provides basic communication

A

internet protocol (IP)

41
Q

provides key functions that applications need

A

transmission control protocol (TCP)

42
Q

represents an interface through a variety of protocols that enable services to be applied to end-user application processes. These services include handling high-level protocols, issuing of representation, encoding, and dialog control

A

application layer

43
Q

responsible for reliable end-to-end data delivery from the source host to the destination host

A

transport layer

44
Q

responsible for the delivery of service requests that respond from the transport layer and have them arrive at their destination through the “virtual network” image of the Internet

A

internet layer (network)

45
Q

also called the host-to-network layer, which is concerned with all of the issues that an IP packet requires to make a physical link to the network media. Its functions include mapping the IP addresses to physical hardware addresses and encapsulation of IP packets

A

network access layer