Networking Today Flashcards
Define Hosts
The term host specifically refers to devices on the network that are assigned an IP address (Internet Protocol).
What is the function of an IP address?
An IP address identifies the host and the network in which the host is attached.
Define Servers and Clients
Servers are computers with server software that allow them to provide information
Clients have software that allow them to request information obtained from servers
Define peer to peer
Computers that function as the client and server at the same time
Advantages and disadvantages of peer to peer
Advantages:
1) East to set up
2) Less complex
3) Can perform single tasks
4) Lower Cost
Disadvantages:
1) Not scalable
2) Not as secure
3) No centralized administration
4) Lower peerformance
How does an end device initiate communication?
It uses the address of the destination end device to determine the path of the message.
Talk about intermediary devices
Intermediary devices connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork.
How do intermediary devices determine the path of the message?
They use the destination end device address + information about network interconnections
Functions of Intermediary devices
1) Regenerate and transmit computer signals
2) Permit or deny the flow of data based on security setting
3) Maintain information about what pathways exist through the network and internetwork.
4) Direct data along alternate pathways in case of a link failure
5) Notify other devices about errors and communication failures.
What are the main types of media that interconnects devices?
What is the form of data in them?
1) Metal wires within cables(electrical impulses)
2) Fiber optic (pulses of light)
3) Wireless (electromagnetic waves)
Criteria for choosing media
1) Maximum distance
2) Environment
3) Speed/Amount
4) Cost
What is the terminology used to describe how media and devices connect?
1)NIC (Network interface card): connect end devices to the network
2)Physical Port: a connector or outlet on a networking device that connects the media to an end device or another networking device
3) Interface: Specialized ports on a networking device that connects to individual networks.
Define physical topology diagrams
Illustrates the physical location of intermediary devices and cable installation (Allows u to see the specific rooms in which these devices are installed)
Define logical topology diagrams
Illustrate the ports, devices, and the addressing scheme of a network (Allows u to see which end devices connect to which intermediary devices and which media is being used)
Define LANs and list its characteristics
a network infrastructure that spans a small geographical area
Characteristics:
1) Interconnect end devices in a limited area
2) Usually administrated by one single person or administration
3) LANs provide high speed bandwidth to internal end devices and intermediary devices
Define WANs and list its characteristics
A network infrastucture that spans a wide geographical area
Characteristics:
1) Interconnect LANs over a wide geographical area
2) Usually administrated by multiple service providers (SP and ISP)
3) Typically provide slower speed links between LANs
Describe cable connection
Typically offered by cable television service providers, the internal data signal transmits on the same cable that delivers the cable television, it provides high speed bandwidth, high availability,and an always on connection to the internet.
Describe DSL connection
Digital Subscriber Line provide high speed bandwidth, high availability, and an always on connection to the internet, it runs over the telephone line. SOHO users use ADSL, it means that the download speed is higher than the upload speed
Describe cellular connection
uses a cell phone network to connect to the internet. It is only limited by the capabilities of the phone and the cell tower to which it is connected
Describe Satellite connection
Benefits area that has no internet connectivity at all, satellite dishes require a clear line of site to the satellite
Describe Dial- up telephone
An inexpensive option that uses any phone line and a modem
the low speed bandwidth provided by the modem connection is not sufficient for large data transfer, although it is useful for traveling
Describe Dedicated Leased Lines
Reserved circuits within the service provider’s network that connect geographically separated offices for private and/or data networking.
Describe Metro Ethernet
Extend LAN access technology into the WAN
Describe Business DSL
SDSL(symmetric digital subscribers line/one form of it) provides uploads and downloads at the same high speed
Describe Satellite(business)
provide connection when other services are not available
Describe the converging network
converging networks are capable of delivering data, video and voice between many different type of devices over the same network infrastructure
What are the four basic characteristics that network architectures must address to meet the user’s expectation?
1) Fault tolerance
2) Scalability
3)Quality of service
4) Network Security
What is fault tolerant network?
A network that limits the number of affected devices during a failure and its built to quickly recover when such a failure occurs. These networks depend on redundancy
Define redundancy. Explain how reliable networks provide it
Redundancy: having multiple paths between the source and destination of the message
Its provided by implementing a packet-switch network ( packet switching is splitting traffic into packets that are routed over a shared network)
Define a scalable network
A scalable network expands quickly to support new users without downgrading the performance of services
Scalability happens when designers follow accepted standards and rules
When does congestion occur?
Congestion occurs when the demand for bandwidth exceeds the amount available.
Network bandwidth is measured by bps.
What are the primary requirements to achieve network security?
*Confidentiality - only the intended and authorized recipients can access and read data.
*Integrity - assures users that the information has not been altered in transmission, from origin to destination.
*Availability - assures users of timely and reliable access to data services for authorized users.
What are the cloud types?
1) Public cloud
2) Private cloud
3) Hybrid cloud
4) Community cloud
Define a public cloud
Services in it are available to the general population, may be free or on a pay per use model, it uses internet to provide services.
Define a private cloud
Services are intended for a specific organization. A private cloud can be set up using the organization’s private network. It can also be managed by an outside organization with strict access security.
Define a hybrid cloud
A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.
Define a community cloud
A community cloud is created for exclusive use by specific organizations. They are used by multiple organizations that have similar needs and concerns. They are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.
What is QOS for?
QOS is a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.
What is the function of cloud computing?
Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet.
In buisness, it extends the capabilities of IT without requiring investment in a new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered to any device without compromising security
Explain power line networking
Using the same wiring that delivers electricity, power line networking sends information by sending data on certain frequencies
Explain WISPs
A Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).
Commonly found in rural areas where DSL or cable aren’t available.
Although a separate transmission tower may be installed for the antenna, typically the antenna is attached to an existing elevated structure, such as a water tower or a radio tower. A small dish or antenna is installed on the subscriber’s roof in the range of the WISP transmitter. The subscriber’s access unit is connected to the wired network inside the home. From the perspective of the home user, the setup is not much different than DSL or cable service. The main difference is that the connection from the home to the ISP is wireless instead of a physical cable.
Explain Wireless Broadband Service
uses the same cellular technology as a smart phone. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home
What are the external security threats? Explain them
- Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
- Spyware and adware: software which are installed on a user’s device. The software then secretly collects information about the user.
- Zero-day attacks: occur on the first day that a vulnerability becomes known
- Threat actor attacks: A malicious person attacks user devices or network resources.
- Denial of service attacks: These attacks slow or crash applications and processes on a network device.
- Data interception and theft: This attack captures private information from an organization’s network
- Identity theft: This attack steals the login credentials of a user in order to access private data.
what are the basic security components for a home or small office network?
- Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious software.
- Firewall filtering - Firewall filtering blocks unauthorized access into and out of the network ( host based firewall system that prevents unauthorized access to an end device, or basic filtering service in the home router to prevent unauthorized access from outside)
What are the security components for larger networks and corporate networks?
- Dedicated firewall systems - These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
- Access control lists (ACL) - These further filter access and traffic forwarding based on IP addresses and applications.
- Intrusion prevention systems (IPS) - These identify fast-spreading threats, such as zero-day or zero-hour attacks.
- Virtual private networks (VPN) - These provide secure access into an organization for remote workers.
What are topology diagrams?
Mandatory documentation that provide visual maps of how the network is connected
What are the types of networks?
1) Simple Home Networks: shares resources such as documentation, pics…
2) SOHO: Small office and home networks allows people to work from home or a remote office
3) Buisness and large organizations uses networks to provide storage, access to info, provide products to customers, emails…
4) Internet is the largest network
Define intranet
A private connection of LANs and WANs that belongs to an organization. It’s designed to be accessible by only organization employees
Define extranet
Provides secure and safe access to individuals who work for a different organization but require access to the organization’s data.
What happens when the volume of traffic is greater than what can be transported across the network?
Devices will hold packets in memory until sources are available to transmit them.
What happens if congestion occurs?
The router manages the flow of data and voice traffic, giving priority to voice communications if the network experience congestion.
What is the focus of QoS?
To prioritize time-sensitive traffic, the type of traffic, not the content is what is important
What type of network security concerns do network administrators address?
1) Network infrastructure security: physically securing devices (passwords) to prevent unauthorized access
2) Information security: NIC, physical port, interface
How is cloud computing possible?
Data centers, facilities used to house computer signals and associated components, they are very expensive, so, only large organizations use privately build data centers to provide services to users and to house data
How can small organizations that can’t afford data centers get them?
can reduce the cost of ownership by leasing server and storage services
Why does the cloud store data in distributed data centers?
Security
Reliability
Fault tolerance
What are the network trends that affect organization?
1) BYOD: Bring your own device, enables users the freedom to use personal tools to access information
2) Online Collaboration: for access to data application and to collaborate w each other
3) Video Communications
4) Cloud Computing
Where do u implement home network security? What about buisness security?
Home: on end devices and point of connection to the internet
Buisness: components built into networks to monitor and filter traffic
Define ISP
An organization that enables individuals and buisness to connect to the internet
What is the internet
Provides connection through interconnected global networks
What’s the functions of an end device?
1) Interface between humans and communication network
2) Originate the data that flows through the network