Lesson 1 -- Verified Flashcards
What is a network
Devices that are connected together and share resources
Verified
What are some network resources
servers
printers
scanners
SAN
Verified
Are all networks alike
no
Verified
Name the network componenets
Devices
Physical Media
Network Adapters
Network Operating Systems
Verified
What’s a node
Anything connected to the network that process, generates or transfers data.
Verified
Does a node have addressing information
Yes
Verified
Can a node be an endpoint or redistribution point
Yes
Verified
What is an endpoint
Source or destination point for data
Verified
What is a redistribution point
Nodes that transfer data such as routers or switches
Verified
Name an endpoint
Printer
Verified
Name a redistribution point
Router
Switch
Verified
What is the method or rules for a network called regarding
Protocol
Verified
Name some protocols
HTTP
HTTPs
SMTP
Verified
Segment
Subdivision of a network that links devices or serves as a connection between two nodes
Verified
Is a segment bound by a physical networking device
Yes
Verified
What is a physical devices that bounds a network segment
Switch or
Routers
Verified
Do all nodes on a segment have access to that portion of the network
Yes
Verified
What is a network backbone
Very high speed transmission path that carries the majority of network data
Verified
Backbones connect what
Server nodes or smaller networks together
Verified
What is a typical LAN network backbone
One or more core level switches or several switches connected together by trunk links
Verified
What is a typical WAN backbone
ATM or Frame relay cloud
Frame Relay Cloud
?
ATM
?
What are some typical network backbones
Serial
Distributed/hierarchical
Collapsed
Parallel
Verified
What is a server
Something that shares resources and responds to requests. Provides central access to resources like storage, printing, email, apps and files
Verified
What provides centralized access and storage
Servers
Do servers serve specific or general functions
They can be setup to do either
This device listens for incoming connection requests from clients
Server
ADS
Active Directory Service
DNS
Domain Name Server
DHCP
Dynamic Host Control Protocol
PKI
Public Key Infrastructure
IPSec
Internet Protocol Security
LDAP
Lightweight Directory Access Protocol
What is a client
Computer or process running on a device that initiates a connection to a server
Verified
What initiates a connection with a server
Client
Verified
Do servers have to accept all connection requests
No
Verified
Client have what in them
Processor
storage
memory
Verified
Can any type of device on a network function as a client of another device
Yes
Verified
What are common clients
workstation or desktop employed by an end user
Verified
Thin Client
devices that needs a server to fulfill some of its computational needs
Verified
Do dumb terminals need a server to perform its main functions
Yes
Verified
Host
any device that is connected to a network and other devices have to access its resources
server printer router switch Any device
Verified
Name some typical hosts
Client Server printer router switch
Verified
What is the generally accepted term for Host on a TCP/IP network
any independent system on a TCP/IP network
Verified
Peer device
Any computer that can act as a client or a server on a network
Used on networks with no central server
Verified
Are P2P network safe
Generally, they are not safe
Verified
Mainframe
Powerful centralized computer that does the heavy lifting (computing tasks) on a network on behalf of clients and other networking devices
Does all computing and returns output to end user device
Verified
Terminal
Device on mainframe network that transmit user entered data to the mainframe for processing; also displays the results from the mainframe.
They are typically monitors and keyboard.
Connects to a dedicated port on the mainframe
Verified
Dumb Terminal
device relies on the mainframe for storage and computing
Verified
Terminal emulator
allows standard client devices to interact with main frame computers by acting as a dedicated terminal to the mainframe
Verified
Thin Client
relies on another device to provide processing power.
They have their own processor and ram but no hard drive.
Connects to the network like any other device but boots from its network card by downloading the OS from the network and running it from RAM
Verified
Name the numbering systems
Binary
Hexadecimal
Octal
Decimal aka Base 10
Verified
Name the parts of the OSI model
Physical Data Network Transport Session Presentation Application
Verified
Describe Layer 7
Enables applications on a device to request services such as file transfers, email and database access
Verified
Describe Layer 6
Translates app data into an intermediate format that the client and server can process
Verified
Describe Layer 5
Establishes and controls data communication between apps operating on two different devices
Regulates when a device can send data and how much
Verified
Describe Layer 4
Performs actual establishment, maintenance, and teardown of the connection. Divides long comm into smaller segments. Error recognition and correction and data receipt acknowledgment. TCP and UDP
Verified
Describe Layer 3
Adds logic addressing and chooses the best route for the data
Verified
Describe Layer 2
Structures the data into a format appropriate for the transmission medium. Adds physical addressing such as MAC or Frame Relay data link connection identifier DLCI numbers. Can perform simple error checking
Verified
Describe Layer 1
Transmits bits from one device to another
Verified
Name some Layer 7 Protocols
HTTP
FTP
SMTP
IMAP
Proxies and firewalls work here
Verified
Name some Layer 6 Protocols
Encryption Compression Character Sets Multimedia MIME Codecs
Proxies and firewalls work here
Verified
Name some Layer 5 Protocols
TCP
UDP
Port numbers exist at this layer
Firewalls work here
Verified
Name some Layer 4 Protocols
TCP
UDP
Packet filtering routers, multilayer switches and firewalls work here
Verified
Name some Layer 3 Protocols
ICMP
IGMP
Routers, multilayer switches and firewalls work here
Verified
Name some Layer 2 Activiities
All WAN and LAN protocols exist here Ethernet Token Ring Frame Relay PPP HDLC Wireless Access Protocols ATM X.25
Verified
Firewalls work at which layers
3-7
Verified
Application Proxies work at which layers
6-7
Verified
Routers and multilayer switches work at which layers
3-4
Verified
Switches work at which primary layer
2
Verified
HTTP
HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
FTP
File Transfer Protocol (FTP) is the commonly used protocol for exchanging files over the Internet. FTP uses the Internet’s TCP/IP protocols to enable data transfer. FTP uses a client-server architecture, often secured with SSL/TLS. FTP promotes sharing of files via remote computers with reliable and efficient data transfer
SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.
IMAP
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
MIME
Short for Multipurpose Internet Mail Extensions, a specification for formatting non-ASCII messages so that they can be sent over the Internet. Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system. In addition, MIME supports messages in character sets other than ASCII.
ICMP
Internet Control Message Protocol. It is an extension to the Internet Protocol (IP) defined by RFC 792. ICMP supports packets containing error, control, and informational messages. It is an error reporting protocol and is used by routers, hosts and network devices to generate error messages when there are problems delivering IP packets.
IGMP
Internet Group Management Protocol is defined in RFC 1112 as the standard for IP multicastingin the Internet.
It’s used to establish host memberships in particular multicast groups on a single network. The mechanisms of the protocol allow a host to inform its local router, using Host Membership Reports, that it wants to receive messages addressed to a specific multicast group.
MAC
There are three common technology definitions for MAC:
(1) Short for Media Access Control. See MAC address or MAC layer.
(2) When spelled Mac, the brand name and registered trademark for a line of computers from Apple Inc. See under Macintosh computer.
DLCI
Data link connection identifier (DLCI) is a number of a private or switched virtual circuit in a Frame Relay network that tells the Frame Relay how to route the data. The DLCI field identifies which logical circuit the data travels over.
PPP
Point-to-Point Protocol, a method of connecting a computer to the Internet. PPP is more stable than the older SLIP protocol and provides error checking features. Working in the data link layer of the OSI model, PPP sends the computer’s TCP/IP packets to a serverthat puts them onto the Internet.
Ethernet
A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. It is one of the most widely implemented LAN standards.
HDLC
High-level Data Link Control, a transmission protocol used at the data link layer (layer 2) of the OSI seven layer model for data communications. The HDLC protocol embeds information in a data frame that allows devices to control data flow and correct errors. HDLC is an ISO standard developed from the Synchronous Data Link Control (SDLC)standard proposed by IBM in the 1970’s.
ATM
Asynchronous Transfer Mode, a network technology based on transferring data in cells or packets of a fixed size. The cell used with ATM is relatively small compared to units used with older technologies. The small, constant cell size allows ATM equipment to transmit video, audio, and computer data over the same network, and assure that no single type of data hogs the line.
x.25
X.25 is the name of a popular standard for packet-switching networks. The X.25 standard was approved by the CCITT (now the ITU) in 1976. It defines layers 1, 2, and 3 in the OSI Reference Model.
What is data encapsulation
process of adding delivery information to the actual data at each layer
Verified
Encapsulation takes place as data is passed down or up
down
Verified
What is de capsulation
removing additional delivery information as data is moved up
Verified
What is a data packet
a unit of data transfer between devices that communicate over a network
Verified
What are the parts of a packet
header
data
trailer
Verified
Which part of the packet contain source and destination addresses
header
Verified
Which part of a packet does error checking
trailer
Verified
Name the PDU types from Layer 1-7
1 Packet 2 Frame 3 Packet 4 Segment / Datagram 5 Message 6 Message 7 Message
Verified
At which layer does encryption, compressions, character sets, multimedia, MIME, codecs take place
Layer 6
What is a networking standard
specification and guidelines applied to network components to ensure consistency and interoperability
Verified
What are the organizations responsible for establishing standards
ISO IEEE ANSI TIA / EIA ARIN ICANN ISoc IETF
Verified
Network back bones can take the form of
Bus
Cloud
Mesh
Verified
Serial backbone
multiple switches connected by one backbone cable
Verified
Distributed Backbone
multiple switches connected serial to hubs or routers. These are easily expanded without a significant cost impact. Allows segregation of workgroups; simplifies management
Verified
Collapsed Backbone
Uses router or switch as the nexus of several subnetworks. Router and switch can be a SPOF. Data speeds can be slow.
Verified
Parallel Backbone
Suits enterprise wide applications. Uses central router or switch like the parallel backbone but augments them with multiple cable connections to ensure connectivity.
Verified
Name some types of servers
Printer
Storage
File
Mail
Verified
Are servers for general purposes or specific purposes
They can do either
Verified
Purpose of Network adapters
Hardware that translates data between the network and device
Verified
Why would a server reject a connection request
It does not provide that service
Security settings require it to reject the connection
Verified
Name some operating systems
Windows OS X Linux Android iOS
Verified
Which protocol is ubiquitous to personal computers
TCP/IP
Verified
Peer Computing is used on which network
Small networks with no centralized ser
Verified
Which standard describes Ethernet
802.3
Verified
802.3 describes what
Ethernet
Verified
Name some of the Standard organizations
ISO
IEEE
ANSI
TIA EIA
ARIN
ICANN
ISoc
IETF
Verified
TOPIC C
TOPIC C
What is a LAN
Self contained network that spans a small area (building, floor, room)
Verified
Do LANs require leased lines
NO
Verified
Most common type of LAN is
Ethernet
Verified
What are the different LAN technologies
Ethernet
Token Ring
Token Bus
FDDI
Verified
WLAN
Wireless LAN
Role of LAN administration
Maintaining devices and cabling
Maintaining network software
Performing installation deployment and upgrades …fix actions
Maintain a broad range of skill and knowledge about apps and hardware
Verified
WAN
Network that spans a large area often across multiple geographic locations
Verified
WANs typically connect
multiple LANs
Verified
GAN
WAN that includes sites around the world
Verified
Are WANs public or private
they can be either
Verified
What are the types of networks
LAN WAN GAN MAN CAN PAN
Verified
Every internet node is identifiable by what
IP address
Verified
Intranet
a private network that used to share a companies info with employees
Connected to the Internet
Contains information that is segregated from the Internet for confidentiality and security reasons
Verified
Extranet
Private network that grants controlled access to users outside of the organization (vendors contractors suppliers)
Verified
Enterprise Network
Includes use of LANs and WANs
Expensive
Strong security
Mission Critiical Apps
Verified
`Pg 27
ICS
Industrial Control System
Supports Municipal services and Industrial Processes
Verified
What uses ICS systems
Waste water plants
Power plants
Oil Natural Gas and Chemical plants
Verified
What are the types of ICS systems
SCADA and DCS systems
Verified
SCADA
Supervisory Control Data Acquisition
use for sites at great distances from one another
Verified
DCSs
Distributed Control Systems
used n process-based industries such as electril power generation
Uses PLCs programmable logic controllers
Used for systems in close proximity to one another
Verified
Connects ICS or SCADA system to physical objects
Remote Terminal Unit
Verified
Medianet
Network optimized for rich media such as voice and video
Used for things like VTCs
Verified
Topic D
Topic D
Name the network configurations
Centralized
Client Server
Peer to peer
Verified
What is a mixed mode configuration
combination of networks
Verified
Data Transmission
Exchange of data among different computers or other electronic devices through a network
Verified
Telephony
Transmission of voice
Verified
Characteristics of an analog signal
Amplitude Cycle Frequency Phase Wavelength
Verified
Digital Signals rely on what
State of the voltage
Verified
Purpose of On-off keying or Manchester encoding
converts data into a digital waveform
Verified
Unicast
Data transfer from a source address to a destination address
Some Unicast apps: HTTP, SMTP, FTP
Verified
What is the predominate form of data transmission
Unicast
Verified
Unicast is sometimes called what
Point to point
Verified
Name some protocols that use Unicast
HTTP
SMTP
FTP
Verified
Broadcast
transmission method in which data is sent from a source node to all other nodes on the network.
Verified
Which transmission method does many network services use
Broadcast
Verified
Multicast
Transmission method in which data is sent from a server to a specific node that are predefined in a multicast group.
Verified
Does every node listen to multicast
No – Non members of the multicast group do not listen to the transmission
Communications with nodes outside the group must be done via unicast or broadcast
Verified
A video server transmitting television signals uses which transmission
multicast
Verified
Anycast
transmission method in which data is sent from a server to the nearest nod within a group
Verified
Do network nodes not in the group listen to an Anycast transmission
No
Verified
Serial Data Transmission
Transmission of bits one per clock cycle
Verified
Name some devices that use serial transmission
Keyboards
mice
modems
Verified
Asynchronous Communications
Sender inserts start and stop bit patterns between each byte of data
Verified
Synchronous Communications
a byte is sent after a standardized time interval
Verified
Asynchronous communications must negotiate what
speed
Verified
Synchronous communications utilize the clock speed of the sender or receiver
True
Verified
Parallel Data Transmissions
Transmission of multiple bits takes place by using multiple transmission lines
Verified
Parallel Data Transmission
transmission of multiple bits takes place by using multiple transmission lines
Verified
Which network components use parallel communications
printers and scanners
Verified
Baseband Transmissions
digital signals sent via DC pulses over a single unmultiplexed signal channel
Cannot send and receive simultaneously
Verified
Broadband Transmission
Uses single medium to carry multiple channels of data through the use of modulations. Using different frequencies on the same cable
Cable access via cable modem
Verified
DOCSIS
Data Over Cable Service Interface Specification
using standard cable to provide high speed data communications
Verified
Bit Rate
Measure of the number of bits that are transmitted per unit of time
Measured in bits per seconds
Verified
Baud Rate
Measures the number of symbols that are transmitted per unit of time
Baud rate should be less than the bit rate
Verified
Media access method
whether or not a particular node can transmit data on the network at a given time
Verified
Media access categories
contention based controlled
Verified
Contention based
Nodes themselves negotiate for media access time
Verified
Controlled based
Central device or system controls when and for how long each node can transmit
Verified
Benefits of controlled based
Ensures that a single node cannot saturate the media
All nodes get a chance to transmit data
Drawback is that this costs more
Verified
Contention based benefits
Simple to set up
Drawback is that every node may not be able to access the media
Verified
Polling
Controlled access method which a central device contacts each node to check whether it has data to transmit
Verified
Demand Priority
Polling technique in which nodes signal their state –either ready to transmit or idle to an intelligent hub
Safeguards prevent nodes from assigning every transmission request as a high priority
Verified
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance
Contentoion based
802.11 bsed wireless LANs
Nodes can transmit whenever they have data to send
See Steps pg 57
Verified
CSMA/CA Steps
Data to transmit
Check Network
RTS signal sent
Wait
Transmit
Monitor for RTS signal
Verified
CSMA/CD
Carrier Sense Mulitple Access/Collision Detection
Contention-based method for Ethernet LANs
Nodes can transmit whenever they have data to send
Verified
CSMA/CD Steps
Data to transmit
Check network
Transmit
Collision
Wait
Retransmit
Verified
Multiplexing
Controlled media access method in which a central device combines signals from multiple nodes and transmits the combined signal across a medium
Verified
Types of multiplexing
Time Division
Frequency Division
Verified
Where is multiplexed data sent
Application layer
Verified
Time Division Multiplexing
Communication channel is divided into discrete time slots
Verified
Frequency Division Multiplexing
data from multiple nodes is sent over multiple frequencies or channels using a network medium
Verified
Types of multiplexing
Simplex - one-way transmission of information
Half Duplex - two-way transmission but only one direction at a time
Full Duplex - simultaneous two-way communication
Verified
Network backbones can be
Bus
Cloud
Mesh
Verified
What comprises a network backbone
One or more core level switches or several switches connected together by trunk links
Verified
Describe a serial backbone
Several switches connected together by one backbone cable
Verified
Describe a hierarchial or Disributed backbone
Several switches connected together serial to hubs or routers
Verified
Which network backbone can be expanded easily without much cost
Hierarchical or Distributed backbone
Verified
Which network backbone can be easily segregated by geography or function
Hierarchical or Distributed
Verified
Which network backbone uses routers or switches as te nexus for the network
Collapsed backbone
Verified
Described the parrel backbone
Similar to the collapsed backbone but uses several connections to the core level device
Verified
What can a server be
A computer or a process running on a computer that listens for incoming connection requests
Verified
What is a client
A computer or a process running on a computer that initiates a connection request to a server