NETW311 Flashcards
Every computer on a network is called a ____ or ___ ______.
host, end device
Servers are computers that provide information to end devices:
email, web, and file servers
Email server runs ______ ______ ______.
email server software
Clients use ______ ______ to access email.
client software
Web server runs ___ server software.
web
Clients use _______ _______ to access web pages.
browser software
File server stores _____ and ____ files.
corporate and user
It is possible to have a device be a client and a server. This type of network design is only recommended for very small networks.
peer-to-peer network
An ___ ______ is where a message originates from or where it is received.
end device
____ originates with an end device, flows through the network, and arrives at an end device.
data
An _______ _______ interconnects end devices.
intermediary device
Examples of intermediary devices are: switches, wireless access points, routers, and ________.
firewalls
Communication across a network is carried through a medium which allows a message to travel from _____ to ________.
source to destination
Metal wires within cables uses ________ __________.
electrical impulses
Glass or plastic fibers within cables (fiber-optic cable)
uses ______ __ ______
pulses of light
Wireless transmission uses modulation of specific frequencies of __________ ______.
electromagnetic waves
Network diagrams, often called _______ ________, use symbols to represent devices within the network.
topology diagrams
NIC stands for ____________
Network Interface Card
_______ topology diagrams illustrate the physical location of intermediary devices and cable installation.
physical
________ topology diagrams illustrate devices, ports, and the addressing scheme of the network.
logical
It connect a few computers to each other and the Internet.
Small Home Networks
It enables computer within a home or remote office to connect to a corporate network.
Small Office/Home Office
It has many locations with hundreds or thousands of interconnected computers
Medium to Large Networks
It connects hundreds of millions of computers world-wide – such as the internet
World Wide Networks
The two most common types of network are ___ and ___
LAN and WAN
It is a network infrastructure that spans a small geographical area.
Local Area Network (LAN)
It is a network infrastructure that spans a wide geographical area.
Wide Area Network (WAN)
It is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
Intranet
_____ has high bandwidth, always on, internet offered by cable television service providers.
cable
___ has high bandwidth, always on, internet connection that runs over a telephone line.
DSL
It uses a cell phone network to connect to the internet.
cellular
A major benefit to rural areas without Internet Service Providers.
satellite
An inexpensive, low bandwidth option using a modem.
dial-up telephone
This extends LAN access technology into the WAN.
Ethernet WAN
These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Dedicated Leased Line
Converged data networks carry multiple services on one link including:
data, voice, video
It refers to the technologies that support the infrastructure that moves data across the network.
Network Architecture
It limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance.
fault tolerant network
It splits traffic into packets that are routed over a network.
packet switching
It can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.
scalable network
It is the primary mechanism used to ensure reliable delivery of content for all users.
Quality of Service
It allows us to store personal files or backup our data on servers over the internet.
Cloud Computing
Available to the general public through a pay-per-use model or for free.
public clouds
Intended for a specific organization or entity such as the government.
private cloud
Made up of two or more Cloud types – for example, part custom and part public.
hybrid clouds
Built to meet the needs of a specific industry, such as healthcare or media.
custom clouds
A growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.
Smart Home Technology
It allow devices to connect to a LAN where data network cables or wireless communications
Powerline Networking
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
Shell
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Kernel
Allows the user to interact with the system using an environment of graphical icons, menus, and windows.
GUI
A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.
console
Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)
Telnet
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
Secure Shell
Used to connect to a network device by either a console port or by an SSH/Telnet connection.
Terminal emulation programs
Allows access to only a limited number of basic monitoring commands using (>) symbol
user EXEC mode
Allows access to all commands and features using (#) symbol
privileged EXEC mode
Used to access configuration options on the device
Global Configuration Mode
Used to configure console, SSH, Telnet or AUX access
Line Configuration Mode
Used to configure a switch port or router interface
Interface Configuration Mode
This is a specific parameter defined in the operating system (in the figure,ip protocols).
Keyword
This is not predefined; it is a value or variable defined by the user
Argument
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot.
startup-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately.
running-config
The use of ___________ is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.
IP addresses
A 32-bit value that differentiates the network portion of the address from the host portion.
IPv4 subnet mask
128 bits in length and written as a string of hexadecimal values. They are not case-sensitive and can be written in either lowercase or uppercase.
IPv6 addresses
The process of converting information into another acceptable form for transmission.
Encoding
Reverses encoding process to interpret the information.
Decoding
Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
Flow Control
Manages how long a device waits when it does not hear a reply from the destination.
Response Timeout
Determines when someone can send a message.
Access method
one to one communication
unicast
one to many, typically not all
multicast
one to all
broadcast
Governs the way a web server and a web client interact
Hypertext transfer protocol (HTTP)
Manages the individual conversations
Transmission Control Protocol (TCP)
Delivers messages globally from the sender to the receiver
Internet Protocol (IP)
Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
Ethernet
The most common protocol suite and maintained
Internet Protocol Suite or TCP/IP-
Developed by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU)
Open Systems Interconnection (OSI) protocols-
Proprietary suite release by Apple Inc.
AppleTalk
Proprietary suite developed by Novell Inc.
Novell NetWare
Develops, updates, and maintains internet and TCP/IP technologies
Internet Engineering Task Force (IETF)
Focused on long-term research related to internet and TCP/IP protocols
Internet Research Task Force (IRTF)
Responsible for management and development of internet standards
Internet Architecture Board (IAB)
Promotes the open development and evolution of internet
Internet Society (ISOC)
The capacity at which a medium can carry data.
bandwidth
Amount of time, including delays, for data to travel from one given point to another
Latency
The measure of the transfer of bits across the media over a given period of time
throughput
The measure of usable data transferred over a given period of time
goodput
The most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
Copper cabling
UTP stands for
Unshielded Twisted Pair
STP stands for
Shielded Twisted Pair