MODULO1-3 Flashcards
peer-to-peer
Client and server software usually run on separate computers, but it is also possible for one
computer to be used for both roles at the same time. In small businesses and homes, many
computers function as the servers and clients on the network. This type of network is called
a peer-to-peer network.
end device initiates communication
When an end device initiates communication, it uses the address of the destination end
device to specify where to deliver the message.
Intermediary devices
Intermediary devices connect the individual end devices to the network. They can connect
multiple individual networks to form an internetwork. These intermediary devices provide
connectivity and ensure that data flows across the network.
Intermediary devices use the destination end device address, in conjunction with
information about the network interconnections, to determine the path that messages
should take through the network.
Communication
Communication transmits across a network on media. The media provides the channel
over which the message travels from source to destination.
types of media to interconnect devices
Metal wires within cables - Data is encoded into electrical impulses.
* Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into
pulses of light.
* Wireless transmission - Data is encoded via modulation of specific frequencies of
electromagnetic waves.
, specialized terminology is used to describe how each
of these devices and media connect to each other:
Network Interface Card (NIC) - A NIC physically connects the end device to the
network.
* Physical Port - A connector or outlet on a networking device where the media
connects to an end device or another networking device.
* Interface - Specialized ports on a networking device that connect to individual
networks. Because routers connect networks, the ports on a router are referred to
as network interfaces.
Physical topology
diagrams illustrate the physical location of intermediary devices and
cable installation.
Logical topology
diagrams illustrate devices, ports, and the addressing scheme of the
network.
Intranet
is a term often used to refer to a private connection of LANs and WANs that
belongs to an organization. An intranet is designed to be accessible only by the
organization’s members, employees, or others with authorization.
extranet
An organization may use an extranet to provide secure and safe access to individuals who
work for a different organization but require access to the organization’s data. Here are
some examples of extranets:
* A company that is providing access to outside suppliers and contractors
* A hospital that is providing a booking system to doctors so they can make
appointments for their patients
* A local office of education that is providing budget and personnel information to the
schools in its district
Cable
Typically offered by cable television service providers, the internet data
signal transmits on the same cable that delivers cable television. It provides a high
bandwidth, high availability, and an always-on connection to the internet.
DSL
Digital Subscriber Lines also provide high bandwidth, high availability, and an
always-on connection to the internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL (ADSL), which
means that the download speed is faster than the upload speed.
Cellular
Cellular internet access uses a cell phone network to connect. Wherever
you can get a cellular signal, you can get cellular internet access. Performance is
limited by the capabilities of the phone and the cell tower to which it is connected.
Satellite
The availability of satellite internet access is a benefit in those areas that
would otherwise have no internet connectivity at all. Satellite dishes require a clear
line of sight to the satellite.
Dial-up Telephone
An inexpensive option that uses any phone line and a
modem. The low bandwidth provided by a dial-up modem connection is not
sufficient for large data transfer, although it is useful for mobile access while
traveling.
four basic characteristics that network
architects must address to meet user expectations:
Fault Tolerance
* Scalability
* Quality of Service (QoS)
* Security
A fault tolerant
is one that limits the number of affected devices during a failure. It
is built to allow quick recovery when such a failure occurs. These networks depend on
multiple paths between the source and destination of a message. If one path fails, the
messages are instantly sent over a different link. Having multiple paths to a destination is
known as redundancy.
A scalable
expands quickly to support new users and applications. It does this
without degrading the performance of services that are being accessed by existing users.
The figure shows how a new network is easily added to an existing network. These
networks are scalable because the designers follow accepted standards and protocols.
Quality of Service (QoS)
is an increasing requirement of networks today. New applications
available to users over networks, such as voice and live video transmissions, create higher
expectations for the quality of the delivered services. Have you ever tried to watch a video
with constant breaks and pauses? As data, voice, and video content continue to converge
onto the same network, QoS becomes a primary mechanism for managing congestion and
ensuring reliable delivery of content to all users.
Congestion occurs when the demand for bandwidth exceeds the amount available.
Network administrators must address two types
of network security concerns:
network infrastructure security and information security.
Securing the network infrastructure
includes physically securing devices that provide
network connectivity and preventing unauthorized access to the management software that
resides on them, as shown in the figure.
Network administrators must also protect the information contained within the packets
being transmitted over the network, and the information stored on network attached
devices. In order to achieve the goals of network security, there are three primary
requirements.
Confidentiality - Data confidentiality means that only the intended and authorized
recipients can access and read data.
* Integrity - Data integrity assures users that the information has not been altered in
transmission, from origin to destination.
* Availability - Data availability assures users of timely and reliable access to data
services for authorized users.
As new technologies and end-user devices come to market, businesses and consumers
must continue to adjust to this ever-changing environment. There are several networking
trends that affect organizations and consumers:
Bring Your Own Device (BYOD)
* Online collaboration
* Video communications
* Cloud Computing
Bring Your Own Device (BYOD).
The concept of any device, for any content, in any manner, is a major global trend that
requires significant changes to the way we use devices and safely connect them to
networks. This is called Bring Your Own Device (BYOD).
BYOD enables end users the freedom to use personal tools to access information and
communicate across a business or campus network.