Network Implementations Flashcards
describes a network’s physical wiring layout or shape
Physical Topology
network topology in which the nodes are arranged in a linear format, and a T-connector connects each node directly to the network cable. Signals can reflect off the ends of the cable, so you must install 50 ohm terminators to prevent reflection. Using 10Base-2 coaxial cable (ThinNet) to connect computers is a classic example of a
physical bus topology
network topology in which each node is connected to the two nearest nodes: the upstream and downstream neighbors. The flow of data in is unidirectional to avoid collisions. are potentially unreliable, as the failure of a single node can bring down the entire network.
Physical Ring Topology
A variant of the ring topology which allows the use of two counter-rotating rings, in which each ring carries data in the opposite direction. Faster, as data can be sent through the shortest path between a sender and the receiver.
Dual Ring Topology
a network topology that uses a central connectivity device, such as a switch, with individual physical connections to each node. The individual nodes send data to the connectivity device, and the device then forwards data to the appropriate destination node. Reliable and easy to maintain, as a single failed node does not bring down the whole network. However, if the central connectivity device fails, the entire network fails.
Physical Star Topology
a network topology in which each node is directly connected to every other node.
Physical Mesh Topology
any topology that exhibits the characteristics of more than one standard topology.
Hybrid Topology
Logical topology where one node transmits, all nodes hear it as if they were connected by a bus regardless of the physical topology.
Logical Bus Topology
a network topology in which each node receives data only from its upstream neighbor and re-transmits data only to its downstream neighbor, regardless of the physical layout of the network. In the days of token ring, a central device (multistation access unit or MAU/MSAU) would connect the devices in a star shape, but the wiring was such that the electrical path was actually a never-ending loop, passing from the device to a node, back to the device, to another node, back to the device, and so forth.
Logical Ring Topology
this logical topology only works on a physical bus topology where all nodes are wired onto the same bus cable and a central device polls each node to see if it needs to transmit data. Usually managed by a multiplexer or MUX.
Logical Star Topology
a device that serves as an interface between a network node and the network. To connect to a network, whether wired or wireless, a node must have this installed. Some feature two or more LED indicator lights. These are generally green and amber, indicating connectivity and activity, respectively.
Network Adapters (NICs)
this standard describes Layer 1 and Layer 2 specifications for wireless LANs in the 2.4, 3.6, 5, and 60 GHz frequency bands.
802.11
this standard provides a framework to make wireless networks more secure. It makes use of existing protocols that enable the user to be authenticated by a central authority. Tied to AUTHENTICATION.
802.1x
this standard is used to support Ethernet-based virtual LANs. It specifies how Ethernet frames are tagged for handling over the network. Tied to VLAN TAGGING.
802.1q
this standard describes Power over Ethernet (PoE) technology, which enables networks to deliver electrical power and standard data over Ethernet cabling.
How much power is supplied?
802.3af
Up to 15.4 W of DC power can be supplied to each powered device, with 12.95 W being ensured to the powered device due to power dissipation during delivery.
this standard is an update to 802.3af and describes Power over Ethernet Plus (PoE+) technology, which enables networks to deliver electrical power and standard data over Ethernet cabling.
How much power is supplied?
802.3at
With PoE+, up to 30W of power can be supplied to each powered device, with 25.5 W being assured to the powered device.
Standard for Ethernet
IEEE 802.3
a set of networking technologies and media access methods specified for LANs. IEEE has defined the 802.3 specifications and standards for this type of implementations.
Ethernet
also called a physical address, is a unique, hardware-level address assigned to every networking device by its manufacturer. 6 bytes long.
Media Access Control Address (MAC Address)
The first 3 bytes of a MAC address are defined by
the identity of the manufacturer. referred to as the Organizationally Unique Identifier (OUI)
The last 3 bytes of a MAC address are known as
Universal LAN MAC address.
Describes the media type and speeds at which each type of media operates. The cable standard specification contains three components
Ethernet Deployment Standards
The three parts of an Ethernet Deployment Standard
- A number indicating media speed
- The signal type (baseband or broadband)
- A code for either copper or fiber media
a. ) T for twisted pair
b. ) C or a number for coax or an X by itself
c. ) Anything else is Fiber
Break down the components of 100BaseT
100Mbps, Baseband, Twisted Pair
Uses the IEEE 802.3af standard. This technology allows you to place devices such as network switches, Voice over IP (VOIP) phones, wireless access points, and cameras in locations where it would be inconvenient or impossible to run electrical power for the device.
Power over Ethernet (PoE)
a network device that acts as a common connecting point for various nodes or segments. Working at Layer 2 of the OSI model, makes forwarding decisions based on Layer 2 (MAC) addresses. Listens for the MAC addresses of all the nodes plugged into it.
Switches
a networking device that connects multiple networks. Operating at Layer 3 of the OSI model, it makes forwarding decisions based on Layer 3 addresses, such as Internet Protocol (IP) addresses. When a packet comes in one of the interfaces, it reads the destination IP address and forwards the packet out the appropriate interface.
Routers
a software program or a hardware device (or a combination of both) that protects a device or network from unauthorized access by blocking unsolicited traffic.
Firewall
an older version of a switch. It has the same basic functionality of a switch, but it has fewer ports and is software based, rather than hardware based.
Bridge
Operates at Layer 3 and performs both switching and routing
Multilayer Switch