Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

AP

Access point

Wireless devices communicate to the wired LAN through a base station known as a _________

Access point

ad hoc topology does not use a ____ to connect the devices

Access point

The most popular web server application is ______. Which primarily runs on ______ systems. The second most popular is _________ (_____) which is embedded in the ______ operating system.

Apache, Unix, Internet Information Services, IIS, Windows Server

Network admins must be aware of the applications used on a network including the application protocols they use and the amount of _____ they require

Bandwidth

WPAN commonly uses what technologies

Bluetooth,Infrared,Near field communications

A ____ topology uses a trunk or backbone of coaxial cable to connect all computers. each system connects to the backbone using T connectors. to avoid signal reflection each end must be terminated and one end must be ________. this does not need a ____ or ____ .

Bus, Grounded, hub, switch

MANs still use an ____ or an ____

ISP,Telco provider

ICS

Industrial Control Systems

IEEE stands for

Institute of Electrical and Electronics Engineers

ISDN

Integrated Services Digital Network

_________ is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

Integrated Services Digital Network

IP

Internet Protocol

ISP

Internet Service Provider

List the network infrastructure types

LAN, WAN, MAN, PAN, SCADA/ICS, medianets

Network infrastructure top consist of _____, then Network Model consist of ______, then Network Topology consist of ________

LAN,WAN,MAN,PAN,SCADA/ICS, peer to peer, client/server, decentralized, centralized, star, bus, ring

WANs typically connect multiple _____ and each blank typically has a ____ that connects the blank to the WAN

LANs,router

LAN

Local Area Network

the ____ address is the physical or hardware address burned in to each ______

MAC, network interface card

MAN

Metropolitan Area Network

____is a geographic network that covers a larger geographic area such as a city or community; may be used to connect computers in libraries, government agencies, etc. together - no more than 30 miles in size. This is also considered a type of ______(falls into this category)

Metropolitan Area Network, Wide Area Network

NFC

Near Field Communication

NIC

Network Interface Card

The resources a network makes available to its users include applications and the data provided by these applications. Collectively, these recourses are usually refereed to as _________________

Network Services

Email is a client-server application that involves two servers. the client uses _____(____) to send an email message to the first server, which is sometimes called the _____ server. The first server sends the message on to the receivers mail server, where its stored until the recipient requests delivery. The recipients mail server delivers the message to the receiving client using one of two protocols: ______(____) or ____(____). Using ___ the email is downloaded to the client computer. Using _____ the client application manages the email stored on the server. An example of a popular email server application is _______. _______ is a popular email client application.

SMTP, Simple mail transfer protocol, POP3, Post office protocol version 3, IMAP4, internet message access protocol version 4, Microsoft exchange server, outlook

Telnet service: the ____ protocol is used byt the Telnet client server command line application to allow administration or other user to "______" or control a computer remotely. Telnet is included in many operating systems but transmissions in Telnet are not encrypted which has caused telnet to be largely replaced by more secure programs such as the ____ command in the _____ operating system

Telnet, Remote in, ssh, Linux

Telco

Telecommunications

______ is an unmanaged wireless topology

ad hoc

OSI 7

application

name five common topologies

bus, ring, star, mesh, wireless

the ______ and ____ computing models describe where the processing/storage takes place

centralized, distributed

streaming stored audio and video: when you watch a video on youtube you're using a _______ model.

client server

using the same network to deliver multiple types of communication services such as video voice fax is known as a _______. A similar term ____(__), refers to the centralized management of multiple network based communications.

convergence, unified communications, UC

OSI 2

data link

the ____ layer in OSI is responsible for error detection, error correction, hardware addressing. the term _____ describes the logical grouping of _____ at the _____ layer

data link, frame, data, data link

peer to peer network is a _______ network model and generally should not have more than ____ users

decentralized, ten

Voice and video transmissions are _____ meaning that breaks in transmission impact quality. They are also considered____ as the conversation/video will be able to continue dispite a loss. Network administrators must pay attention to the ______(__) a network provides for voice and video

delay sensitive, loss tolerant, quality of service, QoS

the _____ computing model is more common today where processing and storage is shared

distributed

The term ____ refers to a servers ability to share data files and disk storage space. A computer that provides this is called a ______, and serves up data to users so they don't keep copies on their workstations. This is beneficial because the admin can manage these files rather than each the individuals

file services, file server

Networks are generally classified by their ____ and ___.

geographic coverage,size

protocols and technologies such as HDLC_____,L2TP_____,PPP____,PPTP______,STP_______,VLANs________ all operate at the _____ OSI layer

high level data link control, layer 2 tunneling protocol, point to point protocol, point to point tunneling protocol, spanning tree protocol, virtual local area network, data link

Network models often take these factors into consideration when determining which to use

how the network will be used, how many users, bugets

the _____ topology is the most commonly used in WANs

hybrid mesh

_______ is a managed wireless topology

infrastructure

Wireless topologies generally have two categories _______ and ______

infrastructure and ad hoc

the items that should be considered when setting up a network from scratch

list of requirements, device types/requirements, environmental limitations, equipment limitations, compatibility requirements, wired/wireless considerations, security considerations

LLC

logical link control

The ____ layer is part of the _____ OSI layer and is responsible for error and flow control mechanisms

logical link control, physical

the OSI physical layer includes what two layers

media access control, logical link control

MAC stans for ______ and is associated with what OSI layer _____

media access control, physical

In a ____ topology there is a _____ connection of every device to every device

mesh, point to point

In a token ring network a _____ will act as a switch/hub

multistation access unit

MSAU

multistation access unit

OSI 3

network

look at TCP/IP model type ok

ok

study electromagnetism series of articles in Wikipedia fool type ok

ok

The two basic wired network models are:

peer to peer, client/server

OSI 1

physical

what layer of OSI is hardware and topology (layer number)

physical 1

Name the OSI models layers in order

physical, data link, network, transport, session, presentation, application

each devise in the star topology uses a ____ connection to the hub/switch

point to point

OSI 6

presentation

using ______ to share printers across a network saves time and money

print services

How does a client know how to make the request in a way the server can understand and respond to? these networked devices use methods and rules for communication known as ____________

protocols

remote applications: a ________ is an application that is installed and executed on a serve and is presented to a user working at a client computer. ________ and later include ________ to manage remote applications, and versions of prior to 2008 used ______. Both use ___ to present the remote application and its data to the client. Remote applications are becoming popular because most of the computing power(memory and CPU speed) are focused on the server in a centralized location rather than bogging down the client.

remote application, windows server 2008, remote desktop services,terminal services, RDP

RI port

ring in

RO port

ring out

OSI 5

session

SOHO stands for

small office/home office

The ____ command in Linux uses the _____(___) protocol, which creates a secure channel or tunnel between two computers

ssh, Secure Shell, SSH

in a ___ topology all devices are connected to a central hub or switch

star

the ___ topology is the easiest to expand without disruption

star

RI and RO ports are a part of a ____ ring network that uses a _____ to act as a hub

token, multistation access unit

a _____ refers to a networks physical and logical layout.

topology

OSI 4

transport

protocols and technologies such as USB _____, ethernet, DSL____, ISDN_____,,Tcarrier links T1 and T3, GSM_____, SONET_____ operate at this OSI layer _______

universal serial bus, digital subscriber line, integrated services digital network, global system for mobile communications, synchronous optical networking, physical

streaming LIVE audio and video: a ______ application such as skype or google talk, allows people to communicate in video and voice, primarily using the point-to-point model. on the other hand, when you watch a live sports event on your computer the application is using a client server model called a _______. the session layer protocol that is specifically designed to transmit audio and video and that works in conjunction with VoIP is _____(___)

video teleconference, VTC, multicast distribution, RTP, Real time transport protocol

WPAN

Wireless Personal Area Network

Medianets

A network that is optimized for high-traffic video.

SOHO networks typically use what kinds of connections

DSL, cable modem, FiOS

DSL

Digital Subscriber Line

DCS

Distributed Control System

FTP service: FTP is a client server application that transfers files between two computers , and it primarily uses ____(___). FTP does not provide encryption and is therefore not secure. Web browsers can be FTP clients, although dedicated FTP client applications, such as ____ by ______ offer more features for file transfer than does a browser.

FTP, File transfer protocol, CuteFTP, GlobalSCAPE

The primary protocol used by web servers and browsers(clients) is ________(______). When this is layered on top of an encryption protocol such as _____(____) or ____(______) the result is ______(_____), which gives a secure transmission.

HTTP, Hypertext Transfer Protocol, SSL, Secure Sockets Layer, TLS, Transport Layer Security, HTTPS, HTTP Secure

To verify a web based transmission is secure look for ______ in the url browser.

HTTPS

SCADA/ICS typically include what

ICS server, distributed control system, remote terminal unit, programmable logic controller.

OSI

Open Systems Interconnect

a conceptual model describing how network architecture allows data to be passed between computer systems

Open Systems Interconnect

PAN

Personal Area Network

Networks can have _______ or ________ layouts AKA Topologies. (_____,_____)

Physical,Logical

PtP ?

Point to point

Remote Desktop: in windows operating system the windows _______ application uses _____(____) to provide secure,encrypted transmissions that allow a technician to remote in>that is, to access a remote computer from the technicians local computer

Remote Desktop, RDP, Remote desktop protocol

_____ systems are used to gather and analyze data from remote systems in real time

SCADA/ICS

An encrypted and secure version of FTP is _____(___)

SFTP, Secure file transfer protocol

SIP

Session Initiation Protocol

VoIP applications such as _____ and _____ use a _____ model rather than a client server model, a conference call would use a _____ model, which involves one transmitter and multiple receivers.

Skype, Google Talk, point to point, point to multipoint,

SCADA

Supervisory Control and Data Acquisition

WAN

Wide Area Network

VTC

Video Teleconferencing

conversational voice: _____(____) allows two or more people to have voice conversations over a network. this is fast, replacing traditional telephone service in homes and business.

VoIP, Voice over IP


Conjuntos de estudio relacionados

Testout Security Pro Chapter 3 - Policies, Procedures & Awareness

View Set

Adaptive Quizzing Foundations of Nursing

View Set

What best describes the Mexican National Era?

View Set

Chapter 3: Describing Data: Numerical Measures

View Set

Chapter 8 -Corporate Strategy Diversification

View Set

Sports and Entertainment Marketing

View Set

Cost Accounting Chapter 1-4 Exam Review

View Set