CPE109 Module 1: Evolution of Computer Network and Services

¡Supera tus tareas y exámenes ahora con Quizwiz!

local networks, mobile devices, connected home devices, other connected devices

- Enumerate the Four (4) Network Types - (LMCO)

internet

= 1.1 Network Types - Everything is Online - The ________ has become such a part of everyday life that we almost take it for granted. Normally, when people use the term ________, they are not referring to the physical connections in the real world. Rather, they tend to think of it as a formless collection of connections. It is the "place" people go to find or share information.

SOHO

= 1.1 Network Types - Local Networks - Small home networks connect a few computers to each other and to the internet. - The ____ network allows computers in a *home office or a remote office* to connect to a corporate network, or access centralized, shared resources.

small home networks

= 1.1 Network Types - Local Networks - _____ ____ ________ connect a *few computers* to each other and to the internet. - The SOHO network allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

local networks

= 1.1 Network Types - Local Networks (Cont.) - Medium to large networks, such as those used by corporations and schools, can have *many locations with hundreds or thousands of interconnected hosts* - The internet is a network of networks that connects hundreds of millions of computers world-wide.

medium to large networks

= 1.1 Network Types - Local Networks (Cont.) - ______ __ _____ ________, such as those used by corporations and schools, can have *many locations with hundreds or thousands term-12of interconnected hosts* - The internet is a network of networks that connects hundreds of millions of computers world-wide.

internet

= 1.1 Network Types - Who Owns "The Internet"? - The ________ is not owned by any individual or group. The ________ is a worldwide collection of interconnected networks (internetwork or internet for short), cooperating with each other to exchange information using common standards.

local networks

= 1.1 Network Types - _____ ________ - Small home networks connect a *few computers* to each other and to the internet. - The SOHO network allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

other connected devices

= 1.1 Network Types - _____ _________ _______ - *Connected sensors* can provide temperature, humidity, wind speed, barometric pressure, and soil moisture data. Actuators can then be automatically triggered based on current conditions. - *Medical devices* such as pacemakers, insulin pumps, and hospital monitors provide users or medical professionals with direct feedback or alerts when vital signs are at specific levels.

other connected devices

= 1.1 Network Types - _____ _________ _______ - Many modern cars, known as *Smart Cars*, can connect to the internet to access maps, audio and video content, or information about a destination. - *Radio frequency identification (RFIDs)* tags can be placed in or on objects to track them or monitor sensors for many conditions.

mobile devices

= 1.1 Network Types - ______ _______ - A *smartwatch* can connect to a smart phone to provide the user with alerts and messages and other functions, such as heart rate monitoring and counting steps, can help people who are wearing the device to track their health. - A *wearable computer* in the form of glasses, such as Google Glass, contains a tiny screen that displays information to the wearer in a similar fashion to the Head-Up Display (HUD) of a fighter pilot.

Mobile Devices

= 1.1 Network Types - ______ _______ - Smart phones combine the functions of many different products together, such as a telephone, camera, GPS receiver, media player, and touch screen computer. - Tablets come with on-screen keyboards, so users are able to do many of the things they used to do on their laptop computer, such as composing emails or browsing the web.

connected home devices

= 1.1 Network Types - _________ ____ _______ - A *smart TV* can be connected to the internet to access content without the need for TV service provider equipment. - *Gaming consoles* can connect to the internet to download games and play with friends online.

connected home devices

= 1.1 Network Types - _________ ____ _______ - With a *connected security system*, many items in a home, such as lighting and climate controls, can be monitored and configured remotely using a mobile device. - *Household appliances* such as refrigerators, ovens, and dishwashers can be connected to the internet.

coaxial cable

= 1.10 Coaxial and Fiber-Optic Cabling - Cable TV and Satellite Cables - _______ _____ (or coax) carries data in the form of electrical signals. - It provides *improved shielding compared to UTP and can therefore carry more data*. - It is *used by cable television companies* to provide service and for connecting the various components that make up satellite communication systems. - With the addition of a cable modem, the cable television provider can offer data and internet service, as well as television signals and telephone over the same _______ _____ to customers. - Usually terminated with a BNC or F-series connector. - The outer jacket is an insulator to protect against EMI and RFI. - A single center conductor is copper or aluminum. - A metallic braid helps to shield against EMI and RFI.

light

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Fiber-optic cables transmit data using pulses of _____. - Fiber-optic cable is constructed of either glass or plastic and it is immune to EMI and RFI.

core

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Parts of a fiber-optical cable are: a. Jacket - typically a PVC jacket that protects the fiber against abrasion, moisture, and other contaminants. b. Strengthening Material - Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled. c. Buffer - Used to help shield the core and cladding from damage. d. Cladding - Made from slightly different chemicals than those used to create the core. It tends to act like a mirror. f. ____ - The light transmission element at the center of the optical fiber. *Light pulses travel through the fiber ____*.

cladding

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Parts of a fiber-optical cable are: a. Jacket - typically a PVC jacket that protects the fiber against abrasion, moisture, and other contaminants. b. Strengthening Material - Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled. c. Buffer - Used to help shield the core and cladding from damage. d. ________ - Made from slightly different chemicals than those used to create the core. It tends to *act like a mirror*. f. Core - The light transmission element at the center of the optical fiber. Light pulses travel through the fiber core.

buffer

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Parts of a fiber-optical cable are: a. Jacket - typically a PVC jacket that protects the fiber against abrasion, moisture, and other contaminants. b. Strengthening Material - Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled. c. ______ - Used to help *shield the core and cladding* from damage. d. Cladding - Made from slightly different chemicals than those used to create the core. It tends to act like a mirror. f. Core - The light transmission element at the center of the optical fiber. Light pulses travel through the fiber core.

strengthening material

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Parts of a fiber-optical cable are: a. Jacket - typically a PVC jacket that protects the fiber against abrasion, moisture, and other contaminants. b. _____________ ________ - Surrounds the buffer, *prevents the fiber cable from being stretched when it is being pulled*. c. Buffer - Used to help shield the core and cladding from damage. d. Cladding - Made from slightly different chemicals than those used to create the core. It tends to act like a mirror. f. Core - The light transmission element at the center of the optical fiber. Light pulses travel through the fiber core.

jacket

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - Parts of a fiber-optical cable are: a. ______ - typically a PVC jacket that *protects the fiber against abrasion, moisture, and other contaminants*. b. Strengthening Material - Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled. c. Buffer - Used to help shield the core and cladding from damage. d. Cladding - Made from slightly different chemicals than those used to create the core. It tends to act like a mirror. f. Core - The light transmission element at the center of the optical fiber. Light pulses travel through the fiber core.

fiber-optic cables

= 1.10 Coaxial and Fiber-Optic Cabling - Fiber-Optic Cables - _____-_____ ______ transmit data using *pulses of light*. - _____-_____ ______ is *constructed of either glass or plastic and it is immune to EMI and RFI*.

unlike devices

= 1.11 Twisted-Pair Operation - Twisted-Pair Transmit and Receive Pairs - Ethernet NICs and the ports on networking devices are designed to send data over UTP cables. - Specific pins on the connector are associated with a transmit function and a receive function. - The interfaces on each device are designed to transmit and receive data on designated wires within the cable. - When two ______ _______ are directly connected using an UTP Ethernet cable, it is important that the transmit function and the receive function on each end of the cable are reversed.

T568A, T568B

= 1.11 Twisted-Pair Operation - Twisted-Pair Wiring Schemes - The color coding of the wire pairs in an UTP cable is *determined by the type of standard* that is used to make the cable. - Different standards have different purposes and are closely governed by the standards organizations. - There are *two standards* that are widely implemented for typical Ethernet installations. - The TIA/EIA organization defines two different patterns, or wiring schemes, called _____ and _____. - Each wiring scheme defines the pinout, or order of wire connections, on the end of the cable. - One of the two wiring schemes (_____ or _____) should be chosen for a network installation. - It is important that the same wiring scheme is used for every termination in that project.

traceroute

= 1.12 Verify Connectivity - The traceroute Command - The __________ utility *traces the route a message takes from its source to the destination*. - Each individual network through which the message travels is referred to as a hop. - The __________ command *displays each hop along the way and the time* it takes for the message to get to that network and back. - If a problem occurs, the output of the __________ utility *can help determine where a message was lost or delayed*. The __________ utility is *called tracert in the Windows environment*.

ping

= 1.12 Verify Connectivity - Using the ping Command - A host that sends messages across the internet must have an IP address to identify it to the other devices in the network. - The ____ utility can be used to *test end-to-end connectivity between the IP address of the sending host and the IP address of the destination host*. - It *measures the time that it takes test messages to make a round trip from the source to the destination*, and whether the transmission is successful. - However, if the test message does not reach the destination, or if delays are encountered along the way, ____ cannot determine where the problem is located.

ip address

= 1.12 Verify Connectivity - Using the ping Command - A host that sends messages across the internet must have an __ _______ *to identify it to the other devices in the network*. - The ping utility can be used to test end-to-end connectivity between the IP address of the sending host and the IP address of the destination host. - It measures the time that it takes test messages to make a round trip from the source to the destination, and whether the transmission is successful. - However, if the test message does not reach the destination, or if delays are encountered along the way, ping cannot determine where the problem is located.

ip address, domain name

= 1.12 Verify Connectivity - Using the ping Command - The format of the ping command is ping x.x.x.x, where x.x.x.x is an __ _______ or ______ ____ of the destination host: For example, ping 192.168.30.1, ping www.cisco.com, etc.

copper wire, fiber-optic cable, and electromagnetic waves

= 1.2 Data Transmission - Common Methods of Data Transmission - After the data is transformed into a series of bits, it must be converted into signals that can be sent across the network media to its destination. Media refers to the physical medium on which the signals are transmitted. Examples of media are _______ ____, ____-_____ _____, and _______________ _____ through the air. A signal consists of electrical or optical patterns that are transmitted from one connected device to another.

media

= 1.2 Data Transmission - Common Methods of Data Transmission - After the data is transformed into a series of bits, it must be converted into signals that can be sent across the network media to its destination. _____ refers to the *physical medium on which the signals are transmitted*. Examples of _____ are copper wire, fiber-optic cable, and electromagnetic waves through the air. A signal consists of electrical or optical patterns that are transmitted from one connected device to another.

electrical signals, optical signals, wireless signals

= 1.2 Data Transmission - Common Methods of Data Transmission - Enumerate the Three (3) Common Methods of Data Transmission - (EOW)

wireless signals

= 1.2 Data Transmission - Common Methods of Data Transmission - Three (3) Common Methods of Data Transmission: 1. Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire. 2. Optical signals - Transmission is achieved by converting the electrical signals into light pulses. 3. ________ _______ - Transmission is achieved by using *infrared, microwave, or radio waves* through the air.

optical signals

= 1.2 Data Transmission - Common Methods of Data Transmission - Three (3) Common Methods of Data Transmission: 1. Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire. 2. _______ ______ - Transmission is achieved by converting the electrical signals into *light pulses*. 3. Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air.

electrical signals

= 1.2 Data Transmission - Common Methods of Data Transmission - Three (3) Common Methods of Data Transmission: 1. __________ _______ - Transmission is achieved by representing data as *electrical pulses on copper wire*. 2. Optical signals - Transmission is achieved by converting the electrical signals into light pulses. 3. Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air.

volunteered data, observed data, inferred data

= 1.2 Data Transmission - Enumerate Three (3) Types of Personal Data - (VOI)

byte

= 1.2 Data Transmission - The Bit - Did you know that computers and networks only work with binary digits, zeros and ones? Each bit can only have one of two possible values, 0 or 1. The term bit is an abbreviation of "binary digit" and represents the smallest piece of data. Humans interpret words and pictures, computers interpret only patterns of bits. Each group of *eight bits*, such as the representations of letters and numbers, is known as a ____.

0, 1

= 1.2 Data Transmission - The Bit - Did you know that computers and networks only work with binary digits, zeros and ones? Each bit can only have one of two possible values, _ or _. The term bit is an abbreviation of "binary digit" and represents the smallest piece of data. Humans interpret words and pictures, computers interpret only patterns of bits. Each group of eight bits, such as the representations of letters and numbers, is known as a byte.

american standard code for information exchange (ASCII)

= 1.2 Data Transmission - The Bit - Using the ________ ________ ____ ___ ___________ ________ (_____), each character is represented by eight bits. For example: Capital letter: A = 01000001 Number: 9 = 00111001 Special character: # = 00100011 This page includes an ASCII bit translation engine where you can enter any character and see the 8 bit translation.

bit

= 1.2 Data Transmission - The ___ - Did you know that computers and networks only work with binary digits, zeros and ones? Each bit can only have one of two possible values, 0 or 1. The term bit is an abbreviation of *"binary digit"* and represents the *smallest piece of data*. Humans interpret words and pictures, computers interpret only patterns of bits. Each group of eight bits, such as the representations of letters and numbers, is known as a byte.

inferred data

= 1.2 Data Transmission - Three (3) Types of Personal Data - Volunteered data - This is created and explicitly shared by individuals, such as social network profiles. This type of data might include video files, pictures, text or audio files. - Observed data - This is captured by recording the actions of individuals, such as location data when using cell phones. - ________ ____ - This is data such as a *credit score*, which is *based on analysis of volunteered or observed data*.

observed data

= 1.2 Data Transmission - Three (3) Types of Personal Data - Volunteered data - This is created and explicitly shared by individuals, such as social network profiles. This type of data might include video files, pictures, text or audio files. - ________ ____ - This is captured by *recording the actions of individuals*, such as location data when using cell phones. - Inferred data - This is data such as a credit score, which is based on analysis of volunteered or observed data.

volunteered data

= 1.2 Data Transmission - Three (3) Types of Personal Data - ___________ ____ - This is created and *explicitly shared by individuals*, such as social network profiles. This type of data might include video files, pictures, text or audio files. - Observed data - This is captured by recording the actions of individuals, such as location data when using cell phones. - Inferred data - This is data such as a credit score, which is based on analysis of volunteered or observed data.

throughput

= 1.3 Bandwidth and Throughput - Throughput - Like bandwidth, __________ is the *measure of the transfer of bits across the media over a given period of time*. However, due to a number of factors, __________ *does not usually match the specified bandwidth*. - Many factors influence throughput including: 1. The amount of data being sent and received over the connection. 2. The types of data being transmitted. 3. The latency created by the number of network devices encountered between source and destination. - Latency refers to the amount of time, including delays, for data to travel from one given point to another.

latency

= 1.3 Bandwidth and Throughput - Throughput - Like bandwidth, throughput is the measure of the transfer of bits across the media over a given period of time. However, due to a number of factors, throughput does not usually match the specified bandwidth. - Many factors influence throughput including: 1. The amount of data being sent and received over the connection. 2. The types of data being transmitted. 3. The latency created by the number of network devices encountered between source and destination. - _______ refers to the *amount of time, including delays, for data to travel from one given point to another*.

bandwidth

= 1.3 Bandwidth and Throughput - _________ - _________ is the *capacity of a medium to carry data*. Digital _________ measures the amount of data that can flow from one place to another in a given amount of time. _________ is typically measured in the *number of bits that (theoretically) can be sent across the media in a second*. UNIT OF BANDWIDTH - Bits per second (bps) - Kilobyte: Thousands of bits per second (kbps) - Megabyte: Millions of bits per second (Mbps) - Gigabyte: Billions of bits per second (Gbps) - Terabyte: Trillions of bits per second (Tbps)

servers

= 1.4 Clients and Servers - Clients and Server Roles - Clients are computer hosts that have software installed that enables the hosts to request and display the information obtained from the server. ______ are hosts that have software installed which enable them to *provide information, like email or web pages, to other hosts on the network*. CLIENT-----Internet-----SERVER

email, web,file

= 1.4 Clients and Servers - Clients and Server Roles - Enumerate the Three (3) Types of Servers - (EWF)

file

= 1.4 Clients and Servers - Clients and Server Roles - Three (3) Types of *Servers*: 1. Email - The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server. 2. Web - The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server. 3. ____ - The ____ server stores *corporate and user files in a central location*. The client devices access these files with client software such as the *Windows File Explorer*.

web

= 1.4 Clients and Servers - Clients and Server Roles - Three (3) Types of *Servers*: 1. Email - The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server. 2. ___ - The ___ server runs *web server software*. Clients use browser software, such as *Windows Internet Explorer*, to access web pages on the server. 3. File - The file server stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

email

= 1.4 Clients and Servers - Clients and Server Roles - Three (3) Types of *Servers*: 1. _____ - The _____ server runs *email server software*. Clients use mail client software, such as *Microsoft Outlook*, to access email on the server. 2. Web - The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server. 3. File - The file server stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

clients

= 1.4 Clients and Servers - Clients and Server Roles - _______ are computer hosts that have software installed that enables the hosts to *request and display the information obtained from the server*. Servers are hosts that have software installed which enable them to provide information, like email or web pages, to other hosts on the network. CLIENT-----Internet-----SERVER

email, web, file

= 1.4 Clients and Servers - Multiple Roles in the Network - A computer with server software can provide services simultaneously to one or many clients, as shown in the figure. Additionally, a single computer can run multiple types of server software. In a home or small business, it may be necessary for one computer to act as a _____ server, a ___ server, and an ____ server.

p2p

= 1.4 Clients and Servers - Peer-to-Peer Networks - Advantages of ___: 1. Easy to set up 2. Less complex than other networks 3. Lower cost because network devices and dedicated servers may not be required 4. Can be used for simple tasks such as transferring files and sharing printers - Disadvantages of ___: 1. No central administration 2. Not as secure as other networks 3. Not scalable 4. All devices may act as both clients and server which can slow their performance

peer-to-peer (P2P) network

= 1.4 Clients and Servers - ____-__-____ _______ - In small businesses and homes, *many computers function as the servers and clients on the network*. This type of network is called a ____-__-____ (___) _______. The simplest ___ _______ consists of two directly connected computers using either a wired or wireless connection.

peer-to-peer applications

= 1.4 Clients and Servers - ____-__-____ ___________ - A ___ __________ allows a device to *act as both a client and a server within the same communication*, as shown in the figure. In this model, *every client is a server and every server is a client*. ___ __________ require that each end device provide a user interface and run a background service. In the figure, both clients can simultaneously send and receive messages. CLIENT AND SERVER-----Network-----CLIENT AND SERVER

end devices, intermediate devices, network media

= 1.5 Network Components - Network Infrastructure - The network infrastructure contains three (3) categories of *hardware components*, as shown in the figure: - (EIN) 1. ___ _______ - Desktop Computer - Laptop - Printer - IP Phone - Wireless Tablet - TelePrescence Endpoiint 2. ____________ _______ - Wireless Router - LAN Switch - Router - Multilayer Switch - Firewall Appliance 3. _______ _____ - Wireless Media - LAN Media - WAN Media

end devices

= 1.5 Network Components - ___ _______ - The network devices that people are most familiar with are called ___ _______, or hosts. These devices *form the interface between users and the underlying communication network*. - Some examples of ___ _______ are as follows: • Computers (workstations, laptops, file servers, web servers) • Network printers • Telephones and teleconferencing equipment • Security cameras • Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)

network infrastructure

= 1.5 Network Components - _______ ______________ - The _______ ______________ contains three categories of hardware components, as shown in the figure: 1. End devices 2. Intermediate devices 3. Network media

3g, 4g, 4g-lte, 5g

= 1.6 Wireless Networks - Cell Phone Network - The abbreviations __, __, __-___, and __ are used to describe enhanced cell phone networks that are optimized for the fast transmission of data. The "G" in these designations represents the word "generation," so 5G is the fifth generation of the cell network. The figure shows that 4G will continue to be the dominant source of global mobile traffic in 2022. However, 5G will use an increasingly larger portion.

mobile phones

= 1.6 Wireless Networks - Mobile Telephones - Did you know that most mobile phones can be connected to many different types of networks simultaneously? - ______ ______ use radio waves to transmit voice signals to antennas mounted on towers located in specific geographic areas. ______ ______ are often referred to as "cell phones" because the geographic area in which an individual tower can provide a signal to a phone is called a cell. When a telephone call is made, the voice signal is relayed from one tower to another tower until it is delivered to its destination. It is also used to send text messages directly from the phone.

gps

= 1.6 Wireless Networks - Other Wireless Networks - The ___ *uses satellites to transmit signals that cover the globe*. The smart phone can receive these signals and calculate the *phone's location* to an accuracy of within 10 meters.

wi-fi

= 1.6 Wireless Networks - Other Wireless Networks - __-__ transmitters and receivers located within the smartphone *let the phone connect to local networks and the internet*. To receive and send data on a __-__ network, the phone *needs to be within the range of the signal from a wireless network access point*.

nfc

= 1.6 Wireless Networks - Other Wireless Networks - ___ stands for near field communications. ___ is a wireless communication technology that *enables data to be exchanged by devices that are in very close proximity to each other*, usually less than a few centimeters.

bluetooth

= 1.6 Wireless Networks - Other Wireless Networks - _________ is wireless technology that *allows devices to communicate over short distances*. Because _________ technology can be used to *transmit both data and voice*, it can be used to create small local networks.

default gateway

= 1.7 Local Network Connections - End Device Addressing - There are three (3) parts to the IP configuration which must be correct for the device to send and receive information on the network: - (ISD) 1. IP address - This identifies the host on the network. 2. Subnet Mask - This is used to identify the network on which the host is connected. 3. _______ _______ - This identifies the *networking device that the host uses to access the internet or another remote network*.

subnet mask

= 1.7 Local Network Connections - End Device Addressing - There are three (3) parts to the IP configuration which must be correct for the device to send and receive information on the network: - (ISD) 1. IP address - This identifies the host on the network. 2. ______ ____ - This is used to *identify the network on which the host is connected*. 3. Default gateway - This identifies the networking device that the host uses to access the internet or another remote network.

ip address

= 1.7 Local Network Connections - End Device Addressing - There are three (3) parts to the IP configuration which must be correct for the device to send and receive information on the network: - (ISD) 1. __ _______ - This *identifies the host* on the network. 2. Subnet mask - This is used to identify the network on which the host is connected. 3. Default gateway - This identifies the networking device that the host uses to access the internet or another remote network.

ip address, subnet mask, default gateway

= 1.7 Local Network Connections - End Device Addressing - There are three (3) parts to the IP configuration which must be correct for the device to send and receive information on the network: - (ISD) 1. __ _______ - This identifies the host on the network. 2. ______ ____ - This is used to identify the network on which the host is connected. 3. _______ _______ - This identifies the networking device that the host uses to access the internet or another remote network.

network interface card (NIC)

= 1.7 Local Network Connections - End Device Addressing - To physically connect to a network, an end-user device must have a _______ _________ ____ (___) and some configuration of the operating system so that the device can participate in the network.

hosts, peripherals, network devices, network media

= 1.7 Local Network Connections - LAN Components - Enumerate the Four (4) Main Categories of Network Components - (HPNN)

hosts

= 1.7 Local Network Connections - LAN Components - Four (4) Main Categories of Network Components - (HPNN) 1. _____ - _____ *send and receive* user traffic. A _____ is a *generic name for most end-user devices*. A _____ has an IP address. Examples of _____ are personal computers and network attached printers.

peripherals

= 1.7 Local Network Connections - LAN Components - Four (4) Main Categories of Network Components - (HPNN) 2. ___________ - Shared ___________ devices *do not communicate directly on the network*. Instead, ___________ *rely on their connected host* to perform all network operations. Examples of shared ___________ are cameras, scanners, and locally attached printers.

network devices

= 1.7 Local Network Connections - LAN Components - Four (4) Main Categories of Network Components - (HPNN) 3. _______ _______ - _______ _______ connect other devices, mainly hosts. These devices move and control network traffic. Examples of network devices include hubs, switches, and routers.

network media

= 1.7 Local Network Connections - LAN Components - Four (4) Main Categories of Network Components - (HPNN) 4. _______ _____ - _______ _____ *provides connections between hosts and network devices*. _______ _____ can be wired, such as copper and fiber optic, or use wireless technologies.

local area network (lan)

= 1.7 Local Network Connections - LAN Components - There are many components that can be part of a _____ ____ ________ (___). Some examples of network components are personal computers, servers, networking devices, and cabling. These components can be grouped into four main categories: 1. Hosts 2. Peripherals 3. Network Devices 4. Network Media

dynamic host configuration protocol (DHCP)

= 1.7 Local Network Connections - Manual and Automatic Address Assignment - Dynamic IP Configuration - Most end-user devices can be set up to *receive network configuration information dynamically*. The device requests an address from a pool of addresses assigned by a _______ ____ _____________ ________ (____) server located within the network.

static address

= 1.7 Local Network Connections - Manual and Automatic Address Assignment - Manual IP Configuration - With manual configuration, the required values are entered into the device by a network administrator. The IP address that is entered is referred to as a ______ _______ and *must be unique on the network*.

naming and address conventions

= 1.8 Network Documentation - Device Names and Address Planning - The use of logical device ______ ___ _______ ___________ that are well documented can greatly simplify the task of training and network management and can help as well with troubleshooting when problems arise.

physical topology

= 1.8 Network Documentation - Logical Network Information - A ________ ________ shows *how network devices connect*. - A diagram called a logical topology illustrates the relevant network configuration information.

logical topology

= 1.8 Network Documentation - Logical Network Information - A physical topology shows how network devices connect. - A diagram called a _______ _______ illustrates the *relevant network configuration information*.

twisted-pair cable, coaxial cable, fiber-optic cable

= 1.8 Network Documentation - Network Media Types - Enumerate the Three (3) Most Common Network Cable - (TCF)

fiber-optic cable

= 1.8 Network Documentation - Network Media Types - Three (3) Most Common Network Cable - (TCF) - _____-_____ _____ - It can be *either glass or plastic* and it can carry digital information at very *high speeds over long distances*.

twisted-pair cable

= 1.8 Network Documentation - Network Media Types - Three (3) Most Common Network Cable - (TCF) 1. _______-____ _____ - *Ethernet technology* generally uses _______-____ _____ to interconnect devices.

coaxial cable

= 1.8 Network Documentation - Network Media Types - Three (3) Most Common Network Cable - (TCF) 2. ________ _____ - It was *one of the earliest network cabling types developed*. - It is used as a *high-frequency transmission line* to carry high-frequency or broadband signals.

physical topology

= 1.8 Network Documentation - Network Topologies and Representations - The ________ ________ shows *where the wiring is installed and the locations of the networking devices that connect the hosts*. These diagrams use symbols or icons to represent the different devices and connections that make up a network.

ethernet patch cables

= 1.9 Ethernet Cabling - Twisted-Pair Cables - The ________ _____ ______ are an example of *copper twisted-pair cable*. - Twisted-pair cables consist of one or more pairs of insulated *copper wires that are twisted together and housed in a protective jacket*.

twisted-pair copper cable

= 1.9 Ethernet Cabling - Twisted-Pair Cables - The networks in most *homes and schools* are wired with ______-____ ______ _____. - This type of cable is *inexpensive and readily available*.

electricity

= 1.9 Ethernet Cabling - Twisted-Pair Cables - Twisted-pair cable uses pulses of ___________ to transmit data. - Data transmission over copper cable is sensitive to electromagnetic interference (EMI). - Another source of interference, called crosstalk, occurs when cables are bundled together for long lengths.

electromagnetic interference (EMI)

= 1.9 Ethernet Cabling - Twisted-Pair Cables - Twisted-pair cable uses pulses of electricity to transmit data. - Data transmission over copper cable is sensitive to _______________ ____________ (___). - Another source of interference, called crosstalk, occurs when cables are bundled together for long lengths.

crosstalk

= 1.9 Ethernet Cabling - Twisted-Pair Cables - Twisted-pair cable uses pulses of electricity to transmit data. - Data transmission over copper cable is sensitive to electromagnetic interference (EMI). - Another source of interference, called _________, occurs *when cables are bundled together for long lengths*.

interference

= 1.9 Ethernet Cabling - Twisted-Pair Cables - ____________ can cause problems with data being transmitted on the cable. 1. A pure digital signal is transmitted. 2. On the medium, there is an interference signal. 3. The digital signal is corrupted by the interference signal. 4. The receiving computer reads a changed signal. Notice that a 0 bit is now interpreted as a 1 bit.

unshielded twisted-pair (UTP), shielded cables (STP)

= 1.9 Ethernet Cabling - Types of Twisted-Pair Cables - Enumerate the Two (2) Commonly Installed Types of Twisted-Pair Cable - (US)

shielded cables (STP)

= 1.9 Ethernet Cabling - Types of Twisted-Pair Cables - Two (2) Commonly Installed Types of Twisted-Pair Cable - (US) - Unshielded twisted pair (UTP) - This is the most common type of network cable in North America and many other areas. - ________ ______ (__) - These are *used almost exclusively in European countries*. - STP cables are *immune to EMI and RFI interference*. - STP cables are *expensive, not as flexible, and have additional requirements because of the shielding*.

unshielded twisted-pair (UTP)

= 1.9 Ethernet Cabling - Types of Twisted-Pair Cables - Two (2) Commonly Installed Types of Twisted-Pair Cable - (US) - __________ _______-____ (___) - This is the *most common type of network cable in North America and many other areas*. - Shielded cables (STP) - These are used almost exclusively in European countries. - UTP cables are used to connect *workstations, hosts and network devices*. - Ethernet UTP cables consists of 4 pairs of twisted cables. - Each pair is identified by a specific color code.


Conjuntos de estudio relacionados

Professionalism and Ethics for RBTs

View Set

Chapter 7 Study Questions- Assessment and Intervention for Emerging Language

View Set

Conceptual Physics Ch 22 Electric Current

View Set

NURS 3: Module 2: Intro to Women's Health

View Set

Introduction to Construction EXAM 2

View Set

intermediate macroeconomics exam 1

View Set