ITS-101: Glossary Flashcards

1
Q

Access Devices

A

Access devices are those that connect directly to field level devices. In most cases, this refers to switches that are in IDFs and connected directly to devices such as panels, DXRs, and workstations. Access devices are usually cheaper and have fewer features than core devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Balance Twisted Pair Cabling

A

Data network cabling, sometimes loosely referred to as “Category 6” or “Copper” cable, is used to provide connectivity between network equipment. Data network cabling typically utilizes metallic conductor cables with a balanced twisted-pair construction. As such, standards typically refer to this cabling as “Balanced Twisted Pair” cable. In this cable, the conductors, most often made of copper, are twisted to minimize crosstalk and noise between the pairs, while improving the overall data transmission performance. Balanced twisted pair cables typically support lower bandwidths than optical fiber cabling. Performance of Balanced twisted-pair cables is directly related to the length of the cable and is therefore limited to shorter distances, most often 90 m (295 ft).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bonding / EtherChannel

A

Bonding, also referred to as EtherChannel, takes the idea of redundancy a step further. Spanning Tree Protocol/Rapid Spanning Tree Protocol provide the ability to add redundancy by disabling secondary links that would cause a loop. Bonding gives the same redundancy, but accomplishes this by combining multiple links, presenting them to the network as one link. Bonding has the major benefit of providing redundancy, as well as increasing the available bandwidth. For example, if we combine two 1 gigabit links, we will have a single logical 2 gigabit link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bounding Device

A

Defines the edge of a network segment. For both layer 2 and layer 3 segments, the bounding device that defines the physical edge of the segment is a router. For layer 2 segments, the router is a bounding device because it does not forward traffic with the MAC address intact, so devices cannot communicate across a router using MAC addresses alone. For layer 3 segments, a router is where traffic is sent when the destination IP address is not on the subnet, so devices cannot communicate across a router directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Broadcast Network Traffic

A

Sent to a special broadcast IP address (the last IP address in a subnet) and every device on a subnet listens for and receives traffic sent to the broadcast address. Switches will always send broadcast traffic out all connected switchports. Routers block broadcasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Building System Network Characteristics

A

Characteristics define key aspects of the network requirements and inform major design decisions. The 8 main network characteristics used by Siemens network designers are: Project: Size, Project: Network Equipment Type, Logical: Externally connected, Logical: Segmentation / VLANs required, Physical: Horizontal topology, Physical: Vertical topology, Physical: IDF topology, Physical: IDF density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIDR

A

A shortcut format for writing subnet masks. CIDR is written right after an IP address (on the same line) and starts with a slash (/) followed by a number between 0 and 32. The larger the number, the smaller the subnet and the fewer IP addresses in the contiguous range. Every subnet mask expressed in dotted-decimal notation has a corresponding CIDR shortcut. For instance, “/24” is a common CIDR subnet mask that corresponds to 255.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collision Domain

A

A network segment where traffic from connected devices will electronically (or optically) collide. Any physical medium that propagates electrical signals sent to all devices and where only one device can send at a time is a collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Console Access

A

A method of accessing a network device (switch, router, firewall, etc.) that works even when the device is not operating properly and usually allows for configuration of all functionality. Misconfiguration or mistakes with low level console access can damage the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Console Cable

A

A physical cable that connects a laptop or workstation to the console port on a network device and allows console access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Core devices

A

Core devices are usually located in the MDF, and connect all the access devices together. Core devices are frequently more expense than access devices and support additional features, such as redundancy and dual power supplies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Name System (DNS)

A

The Domain Name System (DNS) is a system used to convert a computer’s host name into an IP address. A simple example of this is how we interact with the internet every day. When www.siemens.com is entered into a web browser, we are taken to the Siemens website hosted on Siemens servers. In the background, www.siemens.com is translated into an IP address by a DNS server that tells our device how to get there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dotted-Decimal

A

A format for writing subnet masks composed of 4 groups of numbers separated by periods. For example, 255.255.255.0 is a common subnet mask written in dotted-decimal notation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Downlink or Access Port

A

Downlink or access ports are the physical ports on a switch that are connected directly to field level devices. Downlink/access ports frequently operate at slower speeds than uplink ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Duplex Negotiation

A

The process where a network device and network equipment determine via a mutual exchange of pre-specified traffic whether each device supports Full-Duplex communications or whether Half-Duplex must be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic Host Configuration Protocol (DHCP)

A

Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning IP addresses dynamically to devices on a network. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewall

A

A firewall selectively blocks and allows network traffic based on source / destination IP address and type of traffic. The administrator can configure policies to allow only desired traffic. Firewalls should always be located between trusted and untrusted networks (such as the internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Full-Duplex

A

A physical connection and device functionality that allows for bi-directional communication between two devices without traffic colliding. Full-Duplex devices connected to network equipment (such as switches) that support Full-Duplex have dedicated wire(s) to send and receive, eliminating the possibility of collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Half-Duplex

A

A physical connection and device functionality that only allows one device to communicate at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Horizontal Cabling

A

Connects floor-level devices (controllers, panels, workstations, etc.) to the nearest network equipment (usually in an IDF). Is most frequently balanced twisted pair (copper), but can occasionally be fiber optic cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hub

A

A legacy type of network device that connects devices, but doesn’t prevent traffic from colliding. Hubs are slow and create errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Intermediate Distribution Frame (IDF)

A

Intermediate Distribution Frame (IDF) is a room where network equipment is mounted, and where the cables going to field level devices are terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IP Address

A

Internet Protocol addresses are configured on network devices. When a device sends traffic across the network it uses the IP address of the destination device to ensure that routers know how to get the traffic to the right network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP Subnet

A

A contiguous grouping of IP addresses that can communicated directly. Devices connected to the same subnet receive broadcast traffic sent by any device on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Layer 2 and Layer 3 Segment Overlap

A

There should always be one layer 3 segment (subnet) per layer 2 segment (physically connected group of devices). Overlapping can occur if devices in the same physically connected group (e.g. attached to the same switch) are assigned IP addresses in different subnets. Overlapping layer 3 and layer 2 segments can lead to major performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Layer 2 Segment

A

Any collection of devices that are physically connected where devices can communicate directly with each other using MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Layer 3 Segment

A

A collection of devices that have been assigned IP addresses in a contiguous range (subnet) with a defined starting and ending address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

LC connectors

A

LC Connectors are popular due to their small form factor and high-performance ratings. Two single (simplex) LC connectors can be clipped together to form a duplex connector. Most SFP Optical Transceivers utilize Duplex LC type connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Least Privilege

A

The concept of providing only the minimum privileges to a user account that are required for that account to perform critical job functions. The concept is applicable to applications, operating systems, building system devices, and any other situations where permissions can be configured. One of the most common applications of least privilege is ensuring that a normal user account on a workstation is not an administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Logical Network Topology

A

Show how network traffic flows across the physically connected devices that make up the network. Details such as segmentation, routing, and how firewalls allow or block traffic are included on a logical network topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Loose Tube Optical Fiber

A

Loose tube optical fiber cables are optimized for harsh outdoor environments. They utilize rigid sleeves, or tubes, to protect the fibers, and most often contain a water-resistant gel. The gel-filled cable prevents water and condensation from damaging the fibers and allows the tubes to expand and contract based on temperature changes. Loose tube cables require extra components (fan-out kits) and are more difficult to terminate than tight-buffered cables.

32
Q

MAC Address

A

Media Access Control (MAC) address is a unique identifier assigned by the manufacturer to each piece of network hardware. All Ethernet-based communications assume that there is only one physical network interface card with a particular MAC address on any given network. To ensure that no conflicts ever occur, no matter where a device is plugged in, MAC addresses must be universally unique. This uniqueness is enforced by a central organization.

33
Q

Main Distribution Frame (MDF)

A

Main Distribution Frame (MDF) is a centrally located room where core network equipment, servers, and other devices that serve the whole building are usually located.

34
Q

Managed Switch

A

Provide functionality to manage switch features, view logs, and optimize network behavior. Managed switches usually support a wide range of protocols and functions. Managed switches are usually higher performance and more robust than unmanaged switches.

35
Q

Management IP Address

A

An IP address that is configured on a network device and allows for laptops or workstations to access the device for management purposes using a web browser.

36
Q

Multicast Network Traffic

A

Sent from one device to a group of many devices, which could be on the same subnet or spread across multiple subnets. Each device must be actively configured to receive specific types of multicast traffic.

37
Q

Multimode Optical Fiber

A

Multimode optical fiber cable is used for connectivity between telecommunication rooms, and is typically cost effective for inside buildings and smaller campus settings. Components required to support multimode are often less expensive than those for single mode.

38
Q

Network Isolation

A

The limiting of what traffic can be exchanged between networks. Isolation is often provided by firewalls between networks or access control lists (ACLs) configured on network equipment. Isolation is usually provided at the boundary between segments of the network.

39
Q

Network Loop

A

A loop occurs when a network configuration includes more than one path between devices without necessary configurations in place. The easiest example of this is if you connect two switches with two patch cables. Without technologies, such as Spanning Tree Protocol (STP) or EtherChannel, this configuration would create a loop. Loops cause network devices to continuously repeat packets, which is referred to as a broadcast storm. This inevitably has the potential to completely take down a network, no matter the size.

40
Q

Open Systems Interconnection (OSI)

A

A conceptual framework designed to promote understanding of complex IT systems and networks by organizing the functions of each device, component, and protocol into distinct layers, depending on what type of activities are performed. Used frequently by IT teams to classify devices without needing to understand all aspects of device functionality.

41
Q

Optical Fiber Cabling

A

Optical fiber is a thin flexible cable with a glass core, through which light signals can be sent with very little loss of signal strength. Typically capable of supporting higher bandwidths at longer distances than that of balanced twisted pair copper cabling.

42
Q

Outer Jacket

A

Balanced twisted pair cabling is manufactured in several outer jacket options. Two predominant options are Plenum and Riser (Non-plenum) rated jackets. Project specifications and environmental factors determine which cable to use. The use of riser rated cabling in a plenum rated space may result in a hazardous condition and must be avoided. It is advised to utilize plenum rated cable to avoid any potential risks. Balanced twisted pair cabling is also available in several colors. While there are no set industry standards that dictate which colors should be used, project specifications should provide this information.

43
Q

Patch cords and Cross-Connect Jumpers

A

Patch cords, or cross-connect jumpers, are used to connect the cabling between patch panels and between the patch panels and network equipment. Patch cords should match the type of cabling installed and must equal the performance levels set by the cabling installation.

44
Q

Patch Panel

A

Patch panels, sometimes referred to as a Cross-connect system, are used for both optical fiber and balanced twisted pair cabling. They are administration points in the cabling system where horizontal and vertical cables are terminated. Patch cords are used to connect the cabling between patch panels and between the patch panel and network equipment.

45
Q

Physical Network Topology

A

Includes all the physical network equipment, where equipment is located, and the physical connections that make up the network.

46
Q

Port

A

A physical connection point, usually on a switch or other network device, where a properly terminated cable is inserted using a terminating connector.

47
Q

Power over Ethernet (PoE)

A

Power over Ethernet (PoE) is a technology that allows both power and data to be transmitted over the same cable. This is beneficial for powering certain network devices as it eliminates the need to provide line voltage and/or separate power infrastructure. There are certain limitations that you need to be aware of. First, not all network devices are capable of being powered via PoE. Second, some devices require additional power that traditional PoE sources are not capable of supporting.

48
Q

Remote Desktop Protocol (RDP)

A

RDP is a method of remotely accessing an operating system over the network. In most cases, RDP presents a visual display within a window on the accessing computer, as if a monitor with a very long cable was attached to the destination computer. RDP is not secure and should never be used over an untrusted network (such as the internet).

49
Q

Role Based Access Control (RBAC)

A

The concept of assigning permissions to perform activities based on the role of the user account.

50
Q

Router

A

A router connects segmented areas of the network together and keeps track of where device IP addresses are located.

51
Q

Routing

A

Routing is the process of moving traffic from a source IP address to a destination IP address. Traffic can be routed across many routers (or “hops), with each router deciding which router to send the traffic to in order to get it closer to the destination.

52
Q

SC connectors

A

SC Connectors latch in place using a push-pull motion. Two single (simplex) SC connectors can be converted to a duplex connector utilizing a duplex SC adaptor.

53
Q

Secure Shell (SSH)

A

A secure method (encrypted) of accessing a command-line management interface on network equipment. Usually accessed from a laptop or workstation using a terminal emulator with support for SSH (such as PuTTY).

54
Q

Segmentation

A

Segmentation is the act of grouping a certain number of devices together and making sure that traffic sent between those devices is kept separate from traffic sent between other groups. In most cases, traffic is unrestricted between devices within the same segmented group. While network traffic is frequently exchanged between segmented groups, it usually passes through a single device before making it to any other group, and this device can limit or block certain types of traffic.

55
Q

Server

A

A computer that runs applications or services that are accessed by other computers. Most servers are designed to be robust, reliable, and utilized 24/7.

56
Q

Server Role

A

A function performed by a server. In most cases, server roles are added to servers by installing an application or configuring functionality within the operating system. Common server roles are: Active Directory (AD), Domain Name System (DNS), Dynamic Host Configuration Protocol (DNS), Network Time Protocol (NTP), File Services (FS), Backup

57
Q

Shielding

A

A shield is a metallic covering that surrounds the entire cable or individual pairs. Balanced twisted pair cabling is available in both unshielded and shielded varieties. Unshielded cable, sometimes referred to as “UTP” (Unshielded Twisted Pair) is most common. Shielded cable, sometime referred to “STP” (Shielded Twisted Pair) is often used in environments that contain an abundance of electrical noise or interference. There are several varieties of shielded cable available. Be certain to review project specifications for exact requirements. Installation and termination of shielded cabling requires special attention, and proper bonding/earthing of the cabling and associated components is critical.

58
Q

Single Mode Optical Fiber

A

Single mode optical fiber cable is most commonly used for long distance connectivity and applications that require higher bandwidths. Components required to support single mode are often more expensive than those for multimode.

59
Q

Small Formfactor Pluggable transceiver module (SFP)

A

SFPs are finger-sized modules that slide into special slots on network equipment. SFPs are most frequently seen on switches, but can also be used on firewalls, routers, servers, and other equipment. The main advantage of SFPs is flexibility and the ability to change the types of media supported by a network device, based on the requirements of the environment. For instance, if two switches are located far apart, an SFP optical transceiver can be used to allow the switches to be connected with fiber. However, if the switches are close together, then an SFP providing a normal copper connection can be used instead.

60
Q

Spanning Tree Protocol/Rapid Spanning Tree Protocol

A

Spanning Tree Protocol or Rapid Spanning Tree Protocol are technologies that assist with preventing a loop. The purpose for STP or RSTP is to provide a method to safely add redundant links to a network design. If you enable STP on ports where two patch cables are connected, one link will be disabled and designated as a backup. If the first patch cable is unplugged, the switch will automatically activate the second patch cable. Related to our business, STP and RSTP are common with IP DXR installations to provide redundancy on a DXR chain, while avoiding a network loop.

61
Q

ST connectors

A

ST Connectors use a bayonet mount and a long cylindrical ferrule to hold the fiber. ST connectors are only available in a single (simplex) version.

62
Q

Subnet Masks

A

Used by devices to calculate the range of contiguous IP addresses included on the subnet. The subnet mask is mathematically applied to the configured IP address and the device can determine starting IP address of the subnet, ending IP address, and any special addresses (such as the broadcast address).

63
Q

Switch

A

Connects devices via terminated cabling with the appropriate connector, keeps traffic from colliding, and optimizes traffic flow within the network. Switches accept traffic from connected devices and send it to other devices.

64
Q

Switch Forwarding Logic

A

The process that switches use to optimize the flow of traffic within a network and minimize unneeded traffic. Switches remember the location of every device connected to one of its switchports the first time it sees traffic from or to that device. This information is recorded in a MAC Address Table. When traffic is sent to a remember device later, the switch will only send that traffic out of the switchport where the destination device is connected.

65
Q

Telecommunications Transmission Channel

A

Within the cabling infrastructure, the end-to-end transmission path between two points which network equipment is connected is referred to as a “Transmission Channel.” A channel is only as good as its weakest link. As such, a poor or faulty termination or connection can result in network failures which, at times, can be intermittent, creating very challenging troubleshooting scenarios.

66
Q

Telnet

A

An unsecure method of accessing a command-line management interface on network equipment. Usually accessed from a laptop or workstation using a terminal emulator with support for Telnet (such as PuTTY).

67
Q

Terminations

A

Attaches the cable (either balanced twisted pair or optical fiber) to a connector that can be connected to network equipment, patch panels, outlets, or other devices. Many different types of connectors are available. Proper terminations and testing prior to use is critical to avoid significant impact to the project.

68
Q

Tight-buffered Optical Fiber

A

Tight-buffered optical fiber cables are optimized for indoor use. They utilize multiple coatings to protect the fiber and are somewhat easier to terminate than loose tube cable.

69
Q

Traffic Flooding

A

Refers to a switch sending traffic out all of its connected switchports when the switch doesn’t know which switchport a destination MAC address is connected to, or if the traffic type is a broadcast.

70
Q

Trust Boundary

A

The connection point where two networks exchange traffic where one of the networks is trusted and the other is untrusted. The definition of trusted and untrusted will vary, but the most common example of an untrusted network is the Internet.

71
Q

Unicast Network Traffic

A

Network traffic sent to a specific destination. Unicast is the most common type of network traffic and is used for most communication between two devices.

72
Q

Uninterruptable Power Supply (UPS)

A

An Uninterruptable Power Supply (UPS) is an electrical device that provides emergency power to a load when the input power source fails. UPS units keep computer systems and IT equipment safe and operational. There are multiple types and sizes of UPS units available. Three common types of UPS units include Standby, Line Interactive, and Online.

73
Q

Unmanaged Switch

A

Connects devices and passes traffic, but usually supports a limited set of protocols and features. Unmanaged switches cannot be customized or configured and do not have logs available for troubleshooting purposes.

74
Q

Uplink Port

A

An uplink port refers to a physical port on a switch that is used to connect that switch to another switch, usually the core switches in the MDF. Uplink ports are often faster than other ports on the switch.

75
Q

Vertical Cabling

A

Forms the backbone of a network and connects access network equipment on each floor (IDF) to core network equipment in a central location (MDF) and/or to network equipment on other floors. Can be either fiber optic or balanced twisted pair (copper) cabling. Often referred to as a “building riser.”

76
Q

Virtualization

A

Virtualization is the creation of virtual versions of IT devices rather than dedicated physical versions. The most common example of this is virtual servers. This is accomplished by using a single physical server to host multiple virtual servers.

77
Q

VLAN

A

Virtual Local Area Networks are the main tool used to perform segmentation. VLANs are configured on switches to group some physical ports together and keep devices connected to those ports from communicating with devices on other ports.