Networking Devices and Initial Configuration Flashcards
network architecture
refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
fault tolerant network
is one that limits the number of affected devices during a failure.
network congestion
occurs when the demand for bandwidth exceeds the amount available.
The focus of QoS is to
prioritize time-sensitive traffic.
Quality of Service (QoS)
means that a router will manage the flow of data and voice traffic, giving priority to voice communications.
Network Confidentiality
Data confidentiality means that only the intended and authorized recipients can access and read data.
Network Integrity
Data integrity assures users that the information has not been altered in transmission, from origin to destination.
Network Availability
Data availability assures users of timely and reliable access to data services for authorized users.
hierarchical network layer: Core
a high-speed backbone layer with redundant (backup) connections. It is responsible for transporting large amounts of data quickly between multiple end networks.
hierarchical network layer: Distribution
provides a connection point for separate networks and controls the flow of information between the networks.
hierarchical network layer: Access
provides a connection point for end user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a switch.
Type 1 Hypervisor
also called the “bare metal” approach because the hypervisor is installed directly on the hardware.
Type 2 Hypervisor
is software that creates and runs VM instances.
SaaS
Software as a Service
PaaS
Platform as a Service
IaaS
Infrastructure as a Service
Public Clouds (1/4)
Cloud-based applications and services offered in a public cloud are made available to the general population.
Private Cloud (2/4)
Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government.
Hybrid Cloud (3/4)
A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a separate object, but both are connected using a single architecture.
Community Clouds (4/4)
A community cloud is created for exclusive use by a specific community
Hypervisor
a program, firmware, or hardware that adds an abstraction layer on top of the physical hardware.
Ethernet Protocols
define how data is formatted and how it is transmitted over the wired network
Logical Link Control (LLC) Sublayer
This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to use the same network interface and media.
MAC Sublayer
This sublayer (IEEE 802.3, 802.11, or 802.15 for example) is implemented in hardware and is responsible for data encapsulation and media access control. It provides data link layer addressing and is integrated with various physical layer technologies.
IEEE 802.3 data encapsulation includes the following:
Ethernet Frame
Ethernet Addressing
Ethernet Error