Module 1 (NetAcad) Flashcards
_____ is almost as important to us as our reliance on air, water, food, and shelter. In today’s world, through the use of networks, we are connected like never before.
Communication
Every computer on a network is called a ____ or end device.
host
____ are computers that send requests to the servers to retrieve information.
Clients
(T or F) Is it possible to have a device be a client and a server in a Peer-to-Peer Network?
True
Peer-to-Peer Network is a network design only recommended for _____ networks
Very small
Advantages of Peer-to-Peer
Easy to set up
Less Complex
Lower Cost
Used for simple tasks: transferring files and sharing printers
Disadvantages of Peer-to-Peer
No centralized administration
Not as secure
Not scalable
Slower performance
An ____ is where a message originates from or where it is received.
end device
____ originates with an end device, flows through the network, and arrives at an end device
Data
An _____ interconnects end devices. Examples include switches, wireless access points, routers, and firewalls
intermediary device
What are the roles of an intermediary device?
- Regenerate and retransmit data signals
- Maintain information about what pathways exist in the network
- Notify other devices of errors and communication failures
Communication across a network is carried through a medium which allows a message to
travel from source to destination.
Network Media
What are Media Types
- Metals wires within cables - Uses electrical impulses
- Glass or plastic fibers within cable (fiber-optic cable) - Uses pulses of light
- Wireless transmission - Uses modulation of specific frequencies of electromagnetic waves.
This uses electrical impulses
Metal wires within cables
This uses modulation of specific frequencies of electromagnetic waves
Wireless transmission
This uses pulses of light
Glass or plastic fibers within cable (fiber-optic-cable)
Network diagrams, often called ___ diagrams, use symbols to represent devices within the network
topology
Give some End Devices
- Desktop Computer
- Laptop
- Printer
- IP phone
- Wireless tablet
- Telepresence Endpoint
Give some intermediary devices
- Wireless router
- LAN switch
- Router
- Multilayer switch
- Firewall appliances
Give some network media
- Wireless Media
- LAN Media
- WAN Media
___ topology diagrams illustrate the physical location of intermediary devices and cable installation.
Physical
____ topology diagrams illustrate devices, ports, and the addressing scheme of the network.
Logical
_____ – connect a few computers to each other and the Internet
Small Home Networks
____ – enables computer within a home or remote office to connect to a corporate network
Small Office/Home Office
_____ – many locations with hundreds or thousands of interconnected computers
Medium to Large Networks
____ – connects hundreds of millions of computers worldwide – such as the internet
World Wide Networks
Network infrastructures vary greatly in
terms of:
- Size of the area covered
- Number of users connected
- Number and types of services available
- Area of responsibility
Two most common types of networks:
- Local Area Network (LAN)
- Wide Area Network (WAN)
A ___ is a network infrastructure that spans a small geographical area.
LAN
A ___ is a network infrastructure that spans a wide geographical area.
WAN
- Interconnect end devices in a limited area
- Administered by a single organization or individual
- Provide high-speed bandwidth to internal devices
LAN Network
- Interconnect LANs over wide goegraphical areas
- Typically administered by one or more service provides
- Typically provide slower speed links between LANs
WAN Network
The ___ is a worldwide collection of interconnected LANs and WANs.
internet
____may use copper wires, fiber optic cables, and wireless transmissions.
WANs
____ are connected to each other using WANs.
LANs
The internet is not owned by any individual or group. The following groups were developed to help maintain structure on the internet
- IETF
- ICANN
- IAB
An ____ is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
intranet
An organization might use an ____ to provide secure access to their network for individuals who work for a different organization that need access to their data on their network.
extranet
Popular services for home users and small offices include _____
broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
Organizations need faster connections to support____-
IP phones, video conferencing and data center storage.
Business-class interconnections are usually provided by service providers (SP) and may include:
business DSL, leased lines, and Metro Ethernet.
What are the connections used in Home and Small Office Internet
- Cable - high bandwidth, always on, internet offered by cable television service providers
- DSL - high bandwidth, always on, internet connection that runs over a telephone line
- Cellular - uses a cell phone network to connect to the internet
- Satellite - major benefit to rural areas without Internet Service Providers
- Dial-up Telephone - an inexpensive, low bandwidth option using a modem
Corporate business connections may require:
- Higher bandwidth
- dedicated connections
- managed services
What are the types of connections used in Businesses Internet
- Dedicated Leased Line - these are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
- Ethernet WAN - this extend LAN access technology into the WAN
- DSL - Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL)
- Satellite - This can provide a connection when a wired solution is not available
Converged data networks carry multiple services on one link including:
- data
- voice
- video
____ can deliver data, voice, and video over the same network infrastructure. The network infrastructure uses the same set of rules and standards
Converged networks
_____ refers to the technologies that support the infrastructure that moves data across the network
Network Architecture
There are four basic characteristics that the underlying architectures need to address to meet user expectations
- Fault Tolerance
- Scalability
- Quality of Service (QoS)
- Security
A _____ network limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance
fault tolerant
Reliable networks provide ____ by implementing a packet switched network:
* Packet switching splits traffic into packets that are routed over a network.
* Each packet could theoretically take a different path to the destination.
redundancy
A ____ network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.
scalable
Network designers follow accepted standards and
protocols in order to make the networks _____.
scalable
Voice and live video transmissions require _____ for those services being delivered.
higher expectations
Have you ever watched a live video with constant breaks and pauses? This is caused when there is a ____ for bandwidth than available – and QoS isn’t configured
higher demand
____ is the primary mechanism used to ensure reliable delivery of content for all users.
Quality of Service (QoS)
There are two main types of network security that must be addressed:
- Network infrastructure security
- Physical security of network devices
- Preventing unauthorized access to the device - Information Security
- Protection of the information or data transmitted over the network
What are the three goals of network security:
- Confidentiality – only intended recipients can read the data
- Integrity – assurance that the data has not be altered with during transmission
- Availability – assurance of timely and reliable access to data for authorized users
allows users to use their own devices giving them more opportunities and greater flexibility.
Bring Your Own Device (BYOD)
___ means any device, with any ownership, used anywhere.
BYOD
- Collaborate and work with others over the network on joint projects.
- Collaboration tools including Cisco WebEx (shown in the figure) gives users a way to instantly connect and interact.
- Collaboration is a very high priority for businesses and in education.
- Cisco Webex Teams is a multifunctional collaboration tool.
Online Collaboration
- Video calls are made to anyone, regardless of where they are located.
- Video conferencing is a powerful tool for communicating with others.
- Video is becoming a critical requirement for effective collaboration.
- Cisco TelePresence powers is one way of working where everyone, everywhere.
Video Communication
_____ allows us to store personal files or backup our data on servers over the internet.
* Applications can also be accessed using the Cloud.
* Allows businesses to deliver to any device anywhere in the world
Cloud computing
Four types of Clouds
- Public Clouds
* Available to the general public through a pay per-use model or for free. - Private Clouds
* Intended for a specific organization or entity such as the government. - Hybrid Clouds
* Made up of two or more Cloud types – for example, part custom and part public.
* Each part remains a distinctive object but both are connected using the same architecture. - Custom Clouds
* Built to meet the needs of a specific industry, such as healthcare or media.
* Can be private or public
_____ is a growing trend that allows
technology to be integrated into every-day appliances which allows them to interconnect with other devices
Smart home technology
____ can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
_____ is especially useful when wireless access points cannot reach all the devices in the home.
Powerline networking
More commonly found in rural environments, a ____ is an ISP that connects subscribers to designated access points or hotspots.
Wireless Internet Service Provider (WISP)
____ is another solution for the home and small businesses
Wireless broadband
An ____ is installed outside the house providing wireless or wired connectivity for devices in the home.
antenna
- Network security is an integral part of networking regardless of the size of the network.
- The network security that is implemented must take into account the environment while securing the data, but still allowing for quality of service that is expected of the network.
- Securing a network involves many protocols, technologies, devices, tools, and techniques in order to secure data and mitigate threats.
- Threat vectors might be external or internal
Security Threats
What are some External Threats
- Viruses, worms, and Trojan horses
- Spyware and adware
- Zero-day attacks
- Threat Actor attacks
- Denial of service attacks
- Data interception and theft
- Identity theft
What are some Internal Threats
- lost or stolen devices
- accidental misuse by employees
- malicious employees
____must be implemented in multiple layers using more than one security solution
Security
Network security components for home or small office network
- Antivirus and antispyware software should be installed on end devices.
- Firewall filtering used to block unauthorized access to the network.
Larger networks have additional security requirements:
- Dedicated firewall system
- Access control lists (ACL)
- Intrusion prevention systems (IPS)
- Virtual private networks (VPN)
A ____ provides an easy way to understand how devices connect in a large network.
diagram
All computers that are connected to a network and participate directly in network communication are classified as ___.
hosts