Lesson 3 - Network Components Flashcards

1
Q

Typically used for short-distance applications, such as carrying composite video between two nearby devices. This cable type has loss characteristics such that it is not right for long-distance applications. This cable has a characteristic impedance of 75 Ohms

A

RG-59 Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used by local cable companies to connect individual homes to the cable company’s distribution network. Like RG-59 cable, this cable has a characteristic impedance of 75 Ohms.

A

RG-6 Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Has loss characteristics and distance limitations like those of RG-59. However, the characteristic impedance of this cable is 50 ohms, and this type of coax was popular with early 10BASE2 Ethernet networks

A

RG-58 Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BNC

A

A Bayonet Neill-Concelman (BNC) connector (British Naval-Connector in some literature) can be used for a variety of applications, including as a connector in a 10BASE2 Ethernet network. A BNC coupler could be used to connect two coaxial cables together back to back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

F-connector

A

An F-connector is often used for cable TV (including cable modem) connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

where individually insulated copper strands are intertwined

A

TP Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TIA/EIA-568-B

A

TP standard, most common in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TIA/EIA-568-A

A

TP Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Category 3 (Cat 3)

A

Category 3 (Cat 3) cable was used in older Ethernet 10BASE-T networks, which carried data at a rate of 10Mbps (where Mbps stands for megabits per second, meaning millions of bits per second). However, Cat 3 cable can carry data at a maximum rate of 16Mbps, as seen in some older Token Ring networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Category 5 (Cat 5)

A

Category 5 (Cat 5) cable is commonly used in Ethernet 100BASE-TX networks, which carry data at a rate of 100Mbps. However, Cat 5 cable can carry ATM traffic at a rate of 155Mbps. Most Cat 5 cables consist of four pairs of 24-gauge wires. Each pair is twisted, with a different number of twists per meter. However, on average, one pair of wires has a twist every 5 cm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Category 5e (Cat 5e

A

Category 5e (Cat 5e) cable is an updated version of Cat 5 and is commonly used for 1000BASE-T networks, which carry data at a rate of 1Gbps. Cat 5e cable offers reduced crosstalk, as compared to Cat 5 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Category 6 (Cat 6)

A

Like Cat 5e cable, Category 6 (Cat 6) cable is commonly used for 1000BASE-T Ethernet networks. Some Cat 6 cable is made of thicker conductors (for example, 22-gauge or 23-gauge wire), although some Cat 6 cable is made from the same 24-gauge wire used by Cat 5 and Cat 5e. Cat 6 cable has thicker insulation and offers reduced crosstalk, as compared with Cat 5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Category 6a (Cat 6a)

A

Category 6a (Cat 6a), or augmented Cat 6, supports twice as many frequencies as Cat 6 and can be used for 10GBASE-T networks, which can transmit data at a rate of 10 billion bits per second (10 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RJ-45

A

A type 45 registered jack (RJ-45) is an eight-pin connector found in most Ethernet networks. However, most Ethernet implementations only use four of the eight pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RJ-11

A

A type 11 registered jack (RJ-11) has the capacity to be a six-pin connector. However, most RJ-11 connectors have only two or four conductors. An RJ-11 connector is found in most home telephone networks. However, most home phones only use two of the six pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DB-9 (RS-232)

A

A nine-pin D-subminiature (DB-9) connector is an older connector used for low-speed asynchronous serial communications, such as a PC to a serial printer, a PC to a console port of a router or switch, or a PC to an external modem. Do not confuse the DB-9 with a DB-25. The DB-25 connector was also used for the serial or parallel ports of early personal computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ST (Fiber Connector)

A

A straight tip (ST) connector is sometimes referred to as a bayonet connector, because of the long tip extending from the connector. ST connectors are most commonly used with MMF. An ST connector connects to a terminating device by pushing the connector into the terminating equipment and then twisting the connector housing to lock it in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SC (Fiber Connector)

A

Different literature defines an SC connector as subscriber connector, standard connector, or square connector. The SC connector is connected by pushing the connector into the terminating device, and it can be removed by pulling the connector from the terminating device. The connector has slight variants within the industry, with the major types being APC, UPC, and MTRJ. Always consult with the vendor or IT staff member regarding the exact requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LC (Fiber Connector)

A

A Lucent connector (LC) connects to a terminating device by pushing the connector into the terminating device, and it can be removed by pressing the tab on the connector and pulling it out of the terminating device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MTRJ (Fiber Connector)

A

The most unique characteristic of a mechanical transfer registered jack (MTRJ) connector is that two fiber strands (a transmit strand and a receive strand) are included in a single connector. An MTRJ connector is connected by pushing the connector into the terminating device, and it can be removed by pulling the connector from the terminating device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Single-Mode Fiber (SMF)

A

SMF eliminates the issue of multimode delay distortion by having a core with a diameter so small that it only permits one mode (that is, one path)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Multi-Mode Fiber (MMF)

A

The diameter of the core in a multimode fiber is large enough to permit light to enter the core at different angles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

66 block

A

A 66 block, as shown in Figure 3-11, was traditionally used in corporate environments for cross-connecting phone system cabling. As 10Mbps LANs grew in popularity, in the late 1980s and early 1990s, these termination blocks were used to cross-connect Cat 3 UTP cabling. The electrical characteristics (specifically, crosstalk) of a 66 block, however, do not support higher-speed LAN technologies, such as 100Mbps Ethernet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

110 Block

A

Because 66 blocks are subject to too much crosstalk (that is, interference between different pairs of wires) for higher-speed LAN connections, 110 blocks, an example of which is provided in Figure 3-12, can terminate a cable (for example, a Cat 5 cable) being used for those higher-speed LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MDF

A

Main Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Z-Wave

A

A wireless communications protocol used primarily for home automation. It is a mesh network using low-energy radio waves to communicate from appliance to appliance. Z-Wave is found with devices such as lighting control systems, security systems, thermostats, windows, locks, swimming pools, and garage door openers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ant+

A

A wireless protocol for monitoring sensor data such as a person’s heart rate or a car’s tire pressure, as well as for controlling systems such as indoor lighting and entertainment appliances such as televisions. ANT+ is designed and maintained by the ANT+ Alliance, which is owned by Garmin.

29
Q

Bluetooth

A

Bluetooth is a wireless technology that allows devices to communicate over a short distance. In addition to the creation of a personal area network (PAN), Bluetooth also comes into play to enable communications for the IoT

30
Q

NFC

A

Near field communication (NFC) is a set of communication protocols that enables two electronic devices to transfer information. Typically, one of these devices is a portable device such as a smartphone. NFC devices must be close to each other (within 4 cm, or 1.6 in). NFC devices are used in contactless payment systems, similar to those used in credit cards and electronic ticket smartcards, and allow mobile payment to replace/supplement these systems.

31
Q

IR

A

Infrared is another wireless technology that permits data transmission in short-range communication among computer peripherals and personal digital assistants. These devices usually conform to standards published by IrDA, the Infrared Data Association. Remote controls and IrDA devices use infrared light-emitting diodes (LEDs) to emit infrared radiation that is focused by a plastic lens into a narrow beam.

32
Q

RFID

A

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader’s interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object.

33
Q

802.11

A

As detailed in Lesson 8, IEEE 802.11 is a set of Media Access Control and physical layer specifications for implementing wireless local area network (WLAN) computer communication in the 900MHz and 2.4GHz, 3.6GHz, 5GHz, and 60GHz frequency bands. Obviously, these technologies play a great role in the IoT because many appliances and common objects communicate over 802.11 wireless signals to reach a main hub. This is how most smart lights function, for example.

34
Q

Passive Hub

A

Does not amplify (that is, electrically regenerate) received bits.

35
Q

Active Hub

A

Regenerates incoming bits as they are sent out all the ports on a hub, other than the port on which the bits were received.

36
Q

Smart Hub

A

The term smart hub usually implies an active hub with enhanced features, such as Simple Network Management Protocol (SNMP) support

37
Q

Collision Domain

A

a collision domain represents an area on a LAN on which there can be only one transmission at a time

38
Q

Bridge

A

A bridge joins two or more LAN segments, typically two Ethernet LAN segments. Each LAN segment is in a separate collision domain

39
Q

Switch

A

Like a bridge, a switch (specifically, a Layer 2 Ethernet switch in this discussion) can dynamically learn the MAC addresses attached to various ports by looking at the source MAC address on frames coming into a port

40
Q

ARP

A

Address Resolution Protocol

41
Q

Multilayer Switch

A

Whereas a Layer 2 switch, as previously described, makes forwarding decisions based on MAC address information, a multilayer switch can make forwarding decisions based on upper-layer information. For example, a multilayer switch could function as a router and make forwarding decisions based on destination IP address information.

42
Q

Router

A

A router is a Layer 3 device, meaning that it makes forwarding decisions based on logical network address (for example, IP address) information. Although a router is considered to be a Layer 3 device, like a multilayer switch, it has the capability to consider high-layer traffic parameters, such as quality of service (QoS) settings, in making its forwarding decisions.

43
Q

VPN Concentrators

A

A VPN concentrator performs the processor-intensive process required to terminate multiple VPN tunnels.

44
Q

Firewalls

A

A firewall is primarily a network security appliance,

45
Q

DNS Servers

A

A Domain Name System (DNS) server performs the task of taking a domain name (for example, www.ciscopress.com) and resolving that name into a corresponding IP address (for example, 10.1.2.3). Because routers (or multilayer switches) make their forwarding decisions based on Layer 3 information (for example, IP addresses), an IP packet needs to contain IP address information, not DNS names. However, as humans, we more readily recall meaningful names rather than 32-bit numbers.

46
Q

FQDN

A

A FQDN, a fully qualified domain name, is a series of strings, delimited by a period (as in the example, www.ciscopress.com). The rightmost part is the top-level domain. Examples of top-level domains include .com, .mil, and .edu, as shown in Figure 3-32. Although there are many other top-level domains, these are among some of the more common top-level domains seen in the United States.

47
Q

DHCP Exchange

A
  1. DHCPDISCOVER (C>S)
  2. DHCPOFFER (CS)
  3. DHCPACK (C
48
Q

Proxy Server

A

ome clients are configured to forward their packets, which are seemingly destined for the Internet, to a proxy server. This proxy server receives the client’s request, and on behalf of that client (that is, as that client’s proxy), the proxy server sends the request out to the Internet. When a reply is received from the Internet, the proxy server forwards the response on to the client. Figure 3-34 illustrates the operation of a proxy server.

49
Q

Content Engine

A

As previously described, many proxy servers are capable of performing content caching; however, some networks used dedicated appliances to perform this content caching. These appliances are commonly referred to as caching engines or content engines.

50
Q

Content Switch

A

For companies with a large Internet presence (for example, a search engine company, an online book store, or a social networking site), a single server could be overwhelmed with the glut of requests flooding in from the Internet. To alleviate the burden placed on a single server, a content switch (also known as a load balancer) distributes incoming requests across the various servers in the server farm, each of which maintains an identical copy of data and applications.

51
Q

Wireless range extender

A

Since all 802.11 wireless technologies have distance limitations, a wireless range extender can amplify the signal and extend the reachability of a wireless cell.

52
Q

Next-generation firewall (NGFW)

A

Newer firewalls of today not only can perform stateless and stateful filtering of traffic, but they can also deeply inspect the contents of packets to find and prevent attacks. These devices also can connect to the cloud for the latest updates in global threats.

53
Q

Software-defined networking (SDN) controller

A

This appliance-based device is responsible for distributing control plane instructions to network devices downstream for their configuration and management

54
Q

IaaS

A

infrastructure as a service (IaaS), where the company rents virtualized servers (which are hosted by a service provider) and then runs specific applications on those servers.

55
Q

SaaS

A

s software as a service (SaaS), where the details of the servers are hidden from the customer and the customer’s experience is similar to using a web-based application.

56
Q

PaaS

A

platform as a service (PaaS), which can provide a development platform for companies that are developing applications and want to focus on creating the software and not have to worry about the servers and infrastructure that are being used for that development.

57
Q

Community Cloud

A

community cloud, which is a term referring to cloud services used by individuals, companies, or entities with similar interests. In cloud computing, it is likely that virtualized switches, routers, servers, and firewalls will be used as part of cloud-based services.

58
Q

application service provider (ASP)

A

An application service provider (ASP) provides application software access to subscribers. This service is sometimes called software as a service (SaaS).

59
Q

NaaS

A

Specifically, if a service provider’s customer did not want to house and maintain its own data center, these virtualization technologies could be located at a service provider’s data center, and the customer could be billed based on usage patterns. Such a service provider offering is called network as a service (NaaS), implying that network features can be provided by a service provider, just as a telephony service provider offers access to the Public Switched Telephone Network (PSTN), and an ISP offers access to the public Internet.

60
Q

private branch exchange (PBX)

A

virtual PBX is usually a Voice over IP (VoIP) solution, where voice is encapsulated inside data packets for transmission across a data network. Typically, a service provider provides all necessary IP telephony gateways to convert between a customer’s existing telephony system and the service provider’s virtual PBX.

A virtual PBX is different from a hosted PBX, which is usually a traditional (that is, not VoIP) PBX hosted by a service provider.

61
Q

Software-Defined Networking (SDN)

A

An approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and provide abstraction of lower-level functionality.

62
Q

onsite

A

The term onsite in the context of virtualization technologies refers to hosting virtual devices on hardware physically located in a corporate data center.

63
Q

offsite

A

The term offsite in the context of virtualization technologies refers to hosting virtual devices on hardware physically located in a service provider’s data center.

64
Q

Session Initiation Protocol (SIP)

A

A VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls.

65
Q

Real-time Transport Protocol (RTP)

A

A Layer 4 protocol that carries voice (and interactive video)

66
Q

IP Address Management

A

The software and processes for managing the IP addresses used in an organization.

67
Q

software-defined networking (SDN) controller

A

Often referred to as the “brains” of the SDN network, this device sends commands to the network devices to have configurations made.

68
Q

Fibre Channel over Ethernet (FCoE)

A

Technology that permits SAN traffic of FC over the Ethernet media.