CCNA 1 Chapter 1: Exploring the Network Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

what is Quality of Service?

any technology that manages data traffic to reduce packet loss, latency and jitter on the network. QoS controls and manages network resources by setting priorities for specific types of data on the network.

What is fault tolerance?

A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

What is cloud computing?

A concept of computing where processing and storage are performed elsewhere over a network connection rather than locally

what are Hybrid clouds?

A hybrid cloud is made up of two or more clouds (for example, part custom and part public), where each part remains a distinctive object but both parts are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

What is a peer-to-peer network?

A network in which each computer has both server and client capabilities.

whatare the Security Solutions to security threats?

Antivirus and antispyware - These are used to protect end devices from becoming infected with malicious software. Firewall filtering - This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network. Dedicated firewall systems - These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. Access control lists (ACL) - These are used to further filter access and traffic forwarding. Intrusion prevention systems (IPS) - These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks. Virtual private networks (VPN) - These are used to provide secure access to remote workers.

what Connecting Remote Users to the Internet?

Cable: Typically offered by cable television service providers, the Internet data signal is carried on the same coaxial cable that delivers cable television. It provides a high-bandwidth, always-on connection to the Internet. A special cable modem separates the Internet data signal from the other signals carried on the cable and provides an Ethernet connection to a host computer or LAN. DSL: Provides a high-bandwidth, always-on connection to the Internet. It requires a special high-speed modem that separates the DSL signal from the telephone signal and provides an Ethernet connection to a host computer or LAN. DSL runs over a telephone line, with the line split into three channels. One channel is used for voice telephone calls. This channel allows an individual to receive phone calls without disconnecting from the Internet. A second channel is a faster download channel, used to receive information from the Internet. The third channel is used for sending or uploading information. This channel is usually slightly slower than the download channel. The quality and speed of the DSL connection depends mainly on the quality of the phone line and the distance from your phone company's central office. The farther you are from the central office, the slower the connection. Cellular: Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected. The availability of cellular Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all, and for people who are constantly on the go. Satellite: Satellite service is a good option for homes or offices that do not have access to DSL or cable. Satellite dishes require a clear line of sight to the satellite, so satellite service might not be an option in heavily wooded areas or places with other overhead obstructions. Speeds will vary depending on the contract, though they are generally good. Equipment and installation costs can be high (although check the provider for special deals), with a moderate monthly fee thereafter. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Dial-up telephone: An inexpensive option that uses any phone line and a modem. To connect to the ISP, a user calls the ISP access phone number. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling. A modem dial-up connection should only be considered when higher-speed connection options are not available.

what are Private Clouds?

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

what are public Public Clouds?

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or may be offered on a pay-per-use model, such as paying for online storage. A public cloud uses the Internet to provide services.

what are Intermediary Network Devices?

Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones TelePresence endpoints Security cameras Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)

What are end devices?

Computers (work stations, laptops, file servers, web servers) Network printers. VoIP phones. TelePresence endpoints. Security cameras. Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)

characteristics of Information security

Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.

what is network media?

Copper Metallic wires within cables Fiber optic Glass or plastic fibers (fiber-optic cable) Wireless Wireless transmission

what are the components of a network infrastructure?

Devices Media Services

Components of a Network?

End devices Intermediary devices Network media

what are the network architecture requirements?

Fault Tolerance network should always be available. data can travel though more then one route for delivery source. Scalability networks can grow and expand with minimal impact on performance. common network standards allow network hardware and software vectors to focus on products improvements and services. Quality of Service (QoS) priority queues are implemented when demand for network and bandwidth exceeds supply. developing a plan for priority queuing is a strategy for quality delivery of information. Security business and personal network must be protected. business and personal data must be protected.

what are the characteristics of a Network Architecture?

Fault Tolerance Scalability Quality of Service (QoS) Security

what are the two most common networks?

Local-area network (LAN): A network infrastructure that provides access to users and end devices in a small geographical area. Wide-area network (WAN): A network infrastructure that provides access to other networks over a wide geographical area.

name are another type of networks?

Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization. Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users and end points in a small geographical area. Storage Area Network (SAN) - A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

Disadvantages of Peer to Peer network?

No centralized administration not as secure no scalable all devices act as clients and servers which can slow performance

what are the two types of topology diagrams?

Physical topology diagrams - Identify the physical location of intermediary devices and cable installation. Logical topology diagrams - Identify devices, ports, and addressing scheme.

what functions does intermediary network devices perform?

Processes running on the intermediary network devices perform these functions: Regenerate and retransmit data signals Maintain information about which pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings

Why is QoS important in networking?

Providing sufficient Quality of Service (QoS) across IP networks is becoming an increasingly important aspect of today's enterprise IT infrastructure. Not only is QoS necessary for voice and video streaming over the network, it's also an important factor in supporting the growing Internet of Things (IoT).

what are the four primary types of Cloud computing?

Public Clouds Private Clouds Hybrid Clouds Custom Clouds

What is the basic purpose of QoS?

QoS refers to the ability of a network to provide better service to selected network traffic over various underlying technologies including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP-routed networks.

What is scalability?

Scalability is the measure to which a system can adapt to a change in demand for resources, without negatively impacting performance.

Network infrastructures can vary greatly in terms of what?

Size of the area covered Number of users connected Number and types of services available

What is a local area network (LAN)?

Specific features of LANs include LANs interconnect end devices in a limited area such as a home, school, office building, or campus. A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies is enforced on the network level. LANs provide high-speed bandwidth to internal end devices and intermediary devices.

What is a wide area network (WAN)?

Specific features of WANs include: WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. WANs are usually administered by multiple service providers. WANs typically provide slower speed links between LANs.

what do Data Center Architecture do?

The Cisco Unified Data Center incorporates three main data center technologies: Cisco Unified Computing: Integrates computing, networking, and storage resources to provide a unique, open, managed system that can scale to hundreds of server blades and thousands of desktops on virtual machines. Cisco Unified Computing reduces infrastructure costs, and can be deployed nearly 90 percent more quickly than traditional server platforms. Cisco Unified Fabric: Flexible network solutions deliver network services to servers, storage, and applications, providing transparent convergence, scalability, and sophisticated intelligence using Cisco Nexus and Catalyst switches. Cisco Unified Management: Provides the framework for IT service-creation and self-service capabilities, enabling IT to operate more efficiently and to more quickly offer new services to the business.

Network Architecture security

There are two types of network security concerns that must be addressed: network infrastructure security and information security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them. Information security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices. In order to achieve the goals of network security, there are three primary requirements

what are custom clouds?

These are clouds built to meet the needs of a specific industry, such as healthcare or media. Custom clouds can be private or public.

what does a Topology Diagram do?

They provide a visual map of how the network is connected.

what does Cisco Borderless Network do?

This architecture separates the network functions into four areas of responsibility: Cisco Borderless End Point/User Services: Connects the various devices to provide access to network services. Devices that can connect to the borderless network can range from PCs to tablets and smartphones. Cisco Borderless Network Services: Optimizes the network connection and includes wireless access, secure access to corporate assets, and video performance optimization. Cisco Borderless Network Systems: Spans an organization from initial device network access to connecting devices to the cloud. Cisco Borderless Infrastructure: Supports services and systems with an infrastructure of scalable and resilient hardware and software.

what security threats do networks have?

Viruses, worms, and Trojan horses: Malicious software and arbitrary code running on a user device Spyware and adware: Software installed on a user device that secretly collects information about the user Zero-day attack, also called zero-hour attack: An attack that occurs on the first day that a vulnerability becomes known Hacker attack: An attack by a knowledgeable person using software or network vulnerabilities to exploit devices or network resources Denial of service attack: An attack designed to slow or crash applications and processes on a network device Data interception and theft: An attack to capture private information from an organization's network Identity theft: An attack to steal the login credentials of a user in order to access private data

what does Collaboration Architecture do?

a collaboration architecture consisting of four categories of collaboration products: TelePresence: Provides next-generation video conferencing, where everyone, everywhere can be face-to-face and more effective through the most natural and lifelike communications experience available. Collaboration Applications: Stay connected and productive with voice, video, and web conferencing; messaging; mobile applications; and enterprise social software. For example, Cisco WebEx Meetings enables users to create and attend web conference calls. Users can meet to present ideas, share desktops, work on files together, and collaborate with others. Callers can see one another using webcams, and meetings can be recorded for people who are unable to attend. Customer Collaboration: Creates the foundation for positive customer service, a primary factor in building a stronger business. An example of this is the Cisco SocialMiner social media customer care solution. It can help companies proactively respond to customers and prospects communicating through public social media networks such as Twitter, Facebook, and other public forums or blogging sites. Unified Communications: View, optimize, and manage the entire communications system from one screen. With Cisco Unified Communications, organizations can seamlessly manage voice, video, mobility, and presence services between IP endpoints, media-processing devices, Voice over IP (VoIP) gateways, mobile devices, and multimedia applications.

what is Intranets?

a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others who have authorization. An intranet is basically an internet that is usually only accessible from within the organization.

what is network Network Architecture?

a wide range of applications and services, as well as operate over many different types of cables and devices, which make up the physical infrastructure. The term network architecture, in this context, refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

how is cloud computing possible?

because of data centers. A data center is a facility used to house computer systems and associated components, including Redundant data communications connections High-speed virtual servers (sometimes referred to as server farms or server clusters) Redundant storage systems (typically use SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices

what Connects Businesses to the Internet?

common connection options for businesses: Dedicated Leased Line - Leased lines are actually reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive. Ethernet WAN - Ethernet WANs extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later chapter. The benefits of Ethernet are now being extended into the WAN. DSL - Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds. Satellite - Similar to small office and home office users, satellite service can provide a connection when a wired solution is not available.

Network Security Terminology

dental of service An attack slows down or crashes equipment or software VPN creates a secure connection for remote workers. firewall blacks unauthorised to your network. Zero days (-hours) network attack that occurs the first day vulnerability becomes known. virus, worm or Trojan house arbitrary code running on users device.

Advantages of a peer to peer network

easy to set up Less complexity Lower Cost Can be used for simple tasks such as transferring files and sharing printers

what is Network Representations?

end devices Intermediary network media

what are the advantages of a converged network?

improved costs and IT resource productivity shifts the focus from reactive case management to proactive innovation delivery, By managing one network and converging data, voice and video applications over that network

What is a characteristic of a converged network?

it delivers data, voice, and video over the same network infrastructure

what is Extranets

provides secure and safe access to individuals who work for different organizations but require company data. Examples of extranets include A company providing access to outside suppliers/contractors A hospital providing a booking system to doctors so they can make appointments for their patients A local office of education providing budget and personnel information to the schools in its district

what is Converging Network?

the separate data, telephone, and video networks are converging. Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure.


Conjuntos de estudio relacionados

World Culture: set 19B; Aswan Dam

View Set

Freud and the Psychodynamic Perspective

View Set