Chapter 8
3 Functions of Print Servers
1- Provide client access to print resources. 2- Administer print jobs by storing them in a queue until the print device is ready for them and then feeding or spooling the print information to the printer. 3- Provide feedback to users.
3 Steps of Proxy Servers
1. It intercepts the requests. 2. It checks to see if the website content has changed. 3. If not, the proxy server responds to host with the web page.
Workgroup
A collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another.
UTM (Universal Thread Management)
A generic name for an all-in-one security appliance. They include all the functionality of an IDS/IPS as well as stateful firewall services.
VPN (Virtual Private Network)
A private network that connects remote sites or users together over a public network, like the Internet. The most common type is used to access a corporate private network.
LDAP (Lightweight Directory Access Protocol)
A protocol used to allow computers to access data directories that are distributed throughout the network.
Mapping Network Drive
A secure and convenient way to provide easy access to network resources
HTTP (Hypertext Transfer Protocol)
A set of rules for exchanging text, graphic images, sound, and video on the world wide web. Runs on port 80
Magic Packet
A wake-up message
MIMO (Multiple Input Multiple Output)
Additional antennas can be added to increase the potential throughput.
HTTPS (Secure HTTP)
Adds encryption and authentication services using secure Sockets Layer (SSL) or newer Transport Layer Security (TLS). Runs on port 443
FTP (File Transfer Protocol)
Allow for data transfers between a client and a server. The client is an application that runs on a computer that is used to push and pull data from a server
Quad-Band
Allows a cellular phone to operate on all four GSM frequencies: 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz
Quality of Service
Also called 802.1q is a variety of techniques that control the flow of network traffic, improve transmission speeds, and improve real-time communications traffic.
Hidden Shares
Also called Administrative shares, are identified with a dollar sign ($) at the end of the share name.
SFTP (SSH File Transfer Protocol)
As an extension to Secure Shell (SSH) protocol. This can be used to establish a secure file transfer session.
SSID (Service Set Identifier)
Assigned name to a wireless network that is advertised so hosts can discover it, can also be manually entered
Homegroup
Can only be 1 per workgroup on a network and provides a simple method for file and printer sharing, windows vista does not support
GPRS (General Packet Radio Services)
Data service for users of GSM
SMS (Short Message Service)
Data service used to send and receive text messages
MMS (Multimedia Messaging Service)
Data service used to send and receive text messages and can include multimedia content
Permissions
Defines the type of access a user has to a file or folder
IPSs (Intrusion Prevention Systems)
Does not allow packets to enter the trusted side of the network without first being analyzed. It can detect and immediately address a network problem.
Print Servers
Enable multiple computer users to access a single printer
Cellular Technology
Enables the transfer of voice, video, and data
HSDPA (High Speed Downlink Packet Access)
Enhanced 3G access speed
Domain
Group of computers and electronic devices with a common set of rules and procedures administered as a unit
EV-DO (Evolution-Data Optimized)
Improved upload speeds and QoS
Network Components
Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices, and more.
EDGE (Enhanced Data Rates for GSM Evolution)
Increased data rates and improved data reliability
Network Design
Involves knowing how networks are interconnected to support the needs of a business.
Public Network
Network that provides the most protection, used for connecting directly to the internet without a router, Homegroup is not available.
Work Network
Network used for a small office and does not allow for a homegroup to be created or joined
Home Network
Network used when you can trust the other devices, Network discovery is turned on, which allows you to see other people and devices on the network.
IDSs (Intrusion Detection Systems)
Passively monitor traffic on the network.
GSM (Global System for Mobile Communications)
Standard used by the worldwide cellular network
FTPS (File Transfer Protocol Secure)
The client can request the file transfer session be encrypted using TLS. The file server can accept or deny the request.
Netdom-
The command is used to manage computer accounts, join computers to a domain, and perform other domain-specific tasks.
Net-
The command is used to manage network computers, servers, and resources like drives and printers. Net commands use the NetBIOS protocol in Windows. These commands start, stop, and configure networking services.
nbtstat-
The command is used to show statistics, current connections, and services running on local and remote computers.
nslookup
The command tests and troubleshoots DNS servers. It queries the DNS server to discover IP addresses or host names.
tracert
The command traces the route that packets take from your computer to a destination host
Dialup
The modem uses the telephone line to transmit and receive data.
Uploading
The sending of data from the end user to the server.
Link Lights
These are used to indicate if there are is a link connection and if there is activity.
SCP (Secure Copy)
This also uses SSH to secure file transfers.
POTS (Plain old Telephone Service)
Transmits over standard voice telephone lines, extremely slow but available wherever there is landline telephone.
Data Center
Typically a data storage and processing facility run by an in-house IT department or leased offsite.
Cloud Computing
Typically an off-premise service that offers on-demand access to a shared pool of configurable computing resources. These resources can be rapidly provisioned and released with minimal management effort.
Cellular Networks
Use Cellular WAN
ISDN (Integrated Services Digital Network)
Uses POTS line but is faster and better quality because of its digital technology.
Channel
Wireless devices communicate over specific frequency ranges.
Cellular WAN
a user can access the Internet over the cellular network.
Satellite
an alternative for customers who cannot get cable or DSL connections. Does not require a phone line or cable, but uses a satellite dish for two-way communication.
DSL
an always-on service, which means that there is no need to dial up each time you want to connect to the Internet. Uses the existing copper telephone lines to provide high-speed digital data communication between end users and telephone companies.
Cable Internet Connection
does not use telephone lines. Cable uses coaxial cable lines originally designed to carry cable television.
Proxy Servers
have the authority to act as another computer.
WiMax
is an IP-based wireless 4G broadband technology that offers high-speed mobile Internet access for mobile devices, a standard called IEEE 802.16e.
Line of Sight Wireless
is an always-on service that uses radio signals for transmitting Internet access. A clear path between the transmission tower and customer is required.
NAT (Network Address Translation)
is the process used to convert private addresses to Internet-routable addresses / a private (local) source IP address is translated to a public (global) address
Fiber BroadBand
provides faster connection speeds and bandwidth than cable modems, DSL, and ISDN.
Multipurpose Device
provides router, switch, firewall, and access point capabilities, typically called a wireless router.
Wake on Lan
used to wake up a networked computer from a very low power mode state.