PRELIM COMMS 3 Flashcards
The process or study of sending and/or receiving transmissible and storable computer information.
DATA COMMUNICATION
the interconnection of multiple networks.
internet
the biggest example of an internetwork. (World Wide Web)
The Internet
Covers and connects different devices in a single office, building, or campus.
Local Area Network (LAN)
Can span a town, a state, a country, or even the world.
Wide Area Network (WAN)
TWO MOST COMMON TYPE OF SWITCHED NETWORKS
- CIRCUIT-SWITCHED NETWORK
- PUBLIC SWITCHED TELEPHONE NETWORK (PSTN)
Type of switched network that is Ideal for communications that require data to be transmitted in real-time.
CIRCUIT-SWITCHED NETWORK
Type of switched network that is more flexible and more efficient if some amount of delay is acceptable.
PUBLIC SWITCHED TELEPHONE NETWORK (PSTN
The Philippines was connected to the internet on March 29, 1994, by
Benjie Tan
Three companies filled a void by forming a nonprofit organization
, IBM, Verizon, and Merit
Each node is connected with each other.
MESH TOPOLOGY
End devices are connected centrally on a hub.
STAR TOPOLOGY
Backbone links all the devices in a network.
BUS TOPOLOGY
Each device has a dedicated point-to-point connection with only two devices on either side of it.
RING TOPOLOGY
ELEMENTS OF A GOOD NETWORK DESIGN
- Cost
- Speed
- Availability
- Reliability
- Scalability
- Security
A device used to convert signals.
MODEM/MEDIA CONVERTER
o Layer 1 and passive device
o No security
o 1 big collision domain
ETHERNET HUB
o Layer 2 and active device
o Uses MAC addressing.
o Traffic Filtering: Software Based
o 1 broadcast domain
o Every port is a collision domain.
BRIDGE
o Layer 2 and active device.
o Uses Mac addressing.
o Traffic filtering: hardware functions (ASICS)
o 1 broadcast domain
o Every port is a collision domain.
SWITCH
o Layer 3 and active device.
o Uses IP addressing.
o Routes packets from one network to another
o Every port is a broadcast domain.
ROUTER
Security tool to filter and block unauthorized traffic.
FIREWALL
o IDS is a security tool used to monitor traffic for malicious activity or policy violations.
o IPS is a security tool used to inspect, detect, and classify network traffic.
IDS/IPS
Manage the flow of information between server and endpoint devices.
LOAD BALANCER
o Acts as another gateway
o Provides varying levels of functionality, security, and privacy.
PROXY SERVER
o Acts as a point of communication wirelessly
o IEEE 802.11 standards
WIRELESS ACCESS POINT
- Formerly: Groupe Speciale Mobile
- Founded 1982
- Pan-European Standard
- More than 130 countries use GSM.
- More than 100 million subscribers.
- The most popular wireless communication system
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)