CIS 289 Ch. 1
Network Operating System (NOS)
A _____________ controls access to the entire network and is required by client server models.
Material Safety Data Sheet (MSDS)
A _______________ explains how to properly handle substances such as chemical solvents and how to dispose of them
Network interface Card (NIC)
A network port used to attach a device to a network is called a __________
segments (for TCP), datagram (for UDP)
If a message is too large, TCP and UDP divide it into smaller messages called________
NOS; Centralized directory database
Resources of a Client-Server network model are managed by _____, via a ___________
port number
The Transport layer header addresses the receiving application by a number called a __________
payload
The application layer sends data that is passed between applications or utility programs and the OS, called ______
interfacing with physical hardware on the local network. Examples of networking hardware in these layers are Ethernet and Wi-Fi
The data link and physical layers are responsible for:
reformatting, compressing, and/or encrypting data in a way that the receiving application can read, such as into an email message
The presentation layer is responsible for ______
how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
The session layer describes ____
transporting Application layer payloads from one application to another
The transport layer is responsible for:
Encapsulation; header
Through a process called _______, protocols add their own control information in an area at the beginning of the payload known as ________
loss
Voice and video transmission are considered ______ - tolerant.
You don't want to hear or see breaks in transmission
Voice and video transmissions are delay-sensitive, meaning:
IP addresses are assigned addresses to each node on a network, which the network layer uses to uniquely identify each host. They rely on routing protocols such as ICMP and ARP to find the best route for a packet to reach its destination.
What are IP addresses and what routing protocols do they rely on?
User credential assigned from one place Multiple shared resource access centrally controlled Central problem monitoring, diagnostics, correction capabilities More scalable
What are advantages of Client-Server models over P2P?
a server's ability to share data files and disk storage space. A FILE SERVER is a computer that provides file services
What are file services?
the resources a network makes available to its users. Includes applications and the data provided by these applications
What are network services?
ability to share printers across a network. With one printer, less time is spent on maintenance and management
What are print services?
Web service Email services FTP service Telnet service Remote Desktop Remote applications
What are some popular client-server applications?
Advantages include simple configuration and it is less expensive than other network models. Disadvantages is that it is not scalable, not necessarily secure, nor is it practical for large installations
What are the advantages and disadvantages of a P2P?
More memory, processing, storage capacity, and must be equipped with special hardware that provides network management functions
What do servers that have a NOS installed require?
The process in which a user can sign on to the network from any computer on the network and gain access to the resources that AD allows
What does the Active Directory Domain Services (AD DS) manage?
the interface between two applications, on separate computers
What does the application layer describe?
a domain-level account assigned by the network administrator and is kept in the active directory
What is a Global account (a.k.a. global username or network ID)?
a logical group of computers that a Windows Server can control
What is a Windows Domain?
Client computer requests data or a service from a second computer, called the server
What is a client-server application?
A topology that combines topologies
What is a hybrid topology?
the OS of each computer on the network is responsible for controlling access to its resources. They are decentralized. Devices connected to a P2P can share or prevent access to resources and each computer user has a Windows local account
What is a peer-to-peer (P2P) model?
the technical name for a group of bits as it moves from one layer to the next and from one LAN to the next
What is a protocol data unit (PDU)?
Device that manages traffic between multiple networks/ Helps find best path for traffic to get from one network to another
What is a router?
all devices connect to one central device, such as a switch
What is a star topology?
Device that receives incoming data from one of its ports and redirects it to another port or multiple ports. It will send the data to its intended destination
What is a switch?
how parts of a whole work together
What is a topology?
the centralized directory database that contains user account information and security for the entire group of computers
What is an Active Directory (AD)?
the amount of traffic, or data transmission activity, on the network
What is bandwidth?
The NOS is responsible for: Manages client data, resources Ensures authorized user access Controls user file access Restricts user network access Dictates computer communication rules Supplies application to clients Examples of of servers include Windows Server 2012 R2, Ubuntu Server, or Red Hat Linux
What is the NOS responsible for, and what are examples of NOS servers?
The OSI (Open Systems Interconnection), developed by the ISO in the 1980s, categorizes layers of communication from Physical, Data Link, Network, Transport, Session, Presentation, Application
What is the OSI and its layers?
moving messages from one node to another until reaches destination. A network layer message is known as a packet
What is the network layer responsible for? What is a Network layer message known as
Unified communication (UC)
What refers to the centralized management of multiple network-based communications?
the quality of service (QoS) a network provides for voice and video
What should network administrators pay attention to regarding voice and video?
Client-Server File and Print Services Communications Services
What types of applications are found on most networks?
Convergence
___________ is using the same network to deliver multiple types of communications services
node
Each device connected to a P2P is called a ______
does the security system allow access during a failure (fail open) or deny access during the failure (fail close)
Define Fail Open and Fail Close:
Metropolitan area network (MAN) - LANs connected in the same geographical area WAN (wide area network) - group of LANS spread over a wide geographical area (e.g. the Internet) LAN (local area network) - network contained in a small space PAN (personal area network) - network of personal devices
Define MANs, WANs, PANs, and LANs
Catastrophic failure - destroyed beyond use Upset failure - shorten the life of a component
Define catastrophic and upset failure:
TCP (Transmission Control Protocol) - makes a connection with the end host, checks whether data was received; called a connection-oriented protocol UDP (User Datagram Protocol) - does not guarantee delivery by first connecting and checking whether data is received; called a connectionless protocol
Describe TCP and UDP - the two main transport layer protocols
a physical topology mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network. A logical topology has to do with software and describes how access to the network is controlled.
Describe the differences between a physical and logical topology:
No, access is controlled by entries in the centralized domain database
Do clients on a Client-Server model share their resources directly with each other?
Conversational voice - VoIP (Voice over IP) Streaming live audio and video Streaming stored audio and video
Name three types of communication services: