Networking: Connecting to the Internet Flashcards

1
Q

Ad-Hoc network

A

A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Digital Subscriber Line (ADSL)

A

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baud rate

A

A measurement of how many bits could be passed across a phone line in a second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

The most common short range wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Broadband

A

Any connectivity technology that isn’t dial-up Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cable modem

A

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cable modem termination system

A

Connects lots of different cable connections to an ISP’s core network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Channels

A

Individual, smaller sections of the overall frequency band used by a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Collision domain

A

A network segment where only one device can communicate at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data payload section

A

Has all of the data of the protocols further up the stack of a frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dial-up

A

Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DSL

A

Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DSLAM

A

Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Duration field

A

Specifies how long the total frame is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Frame check sequence

A

It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Frame control field

A

16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Frequency band

A

A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

18
Q

FTTB

A

Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

19
Q

FTTH

A

Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

20
Q

FTTN

A

Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

21
Q

FTTP

A

Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

22
Q

FTTX

A

Stands for fiber to the X, where the X can be one of many things

23
Q

HDSL

A

High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

24
Q

MAC filtering

A

Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

25
Mesh networks
Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes
26
Metered connection
An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections
27
Non-metered connection
A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection
28
Optical Network Terminator
Converts data from protocols the fiber network can understand to those that are more traditional twisted pair copper networks can understand
29
Pairing
When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other
30
Point-To-Point VPN
Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don't all have to establish their own connections
31
Receiving address
The MAC address of the access point that should receive the frame
32
Symmetric Digital Subscriber Line (SDSL)
A device that establishes data connections across phone lines and has upload and download speeds that are the same
33
Sequence control field
A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames
34
Short-range wireless network
It is what mobile devices uses to connect to their peripherals
35
T-Carrier technologies
Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle
36
Transmitter address
The MAC address of whatever has just transmitted the frame
37
Wi-Fi Protected Access (WPA)
A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP
38
Wide area network
Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP
39
Wired Equivalence Privacy (WEP)
An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection
40
Wireless access point
A device that bridges the wireless and wired portions of a network
41
Wireless LANS (WLANS)
One or more access points act as a bridge between a wireless and a wired network
42
Wireless networking
Networks you connect to through radios and antennas