NET-125 Chapter 1
MAN (Metropolitan Area Network)
(A) a geographic network that covers a large area like a city or community may be used to connect computers in libraries government agencies etc together no more than 30 miles in size
LAN (Local Area Network)
(B) type of network used to describe computers that are connected in a single physical location
WLAN (Wireless Local Area Network)
(C) A self-contained network of two or more computers connected using a wireless connection.
WAN (Wide area network )
(D) a network infrastructure that provides access to other networks over a large geographic area
fault tolerance
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
Which statement describes a characteristic of a converged network?
A single network that delivers voice, video, and data to a variety of devices.
logical topology
A topology that describes the data-flow patterns in a network.
cellular
Access via the cell phone network
VPN
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
How does BYOD change the way in which businesses implement networks?
BYOD provides flexibility in where and how users can access network resources.
Security
Business and Personal data and network equipment must be protected
end devices
Computers, Network printers, VoIP phones, TelePresence endpoint, Security cameras, Mobile handheld devices
Spyware
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
two characteristics of a scalable network
Grows in size without impacting existing users. Contains modular devices that allow for expansion
Internal
Leaving your username and/or password on a note near your laptop is an example of what type of threat to an organization?
The Internet
Network or Networks. LANs and WANs may be connected to internetwork
network media
Provides a channel for messages to travel from source to destination. The conduit through which signals flow, can be either bounded or unbounded, fiber optic, copper, wireless
End devices
Provides the interface between the human and the network - A device that is either the source or the destination of a packet on a network.
physical topology
The actual layout of network devices, wires, and cables.
Intrusion prevention systems (IPS
These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Firewall filtering
This is used to block unauthorized access to the network.
Which three devices are considered end devices in a network?
VoIP phone, security camera, TelePresence endpoint
data center
a facility used to store information originating from users or organizations
In which scenario would the use of a WISP be recommended?
a farm in a rural area without wired broadband access
QoS (quality of service)
a mechanism to manage the flow of traffic based on different requirements to ensure reliable delivery of each type of traffic
fault tolerance
a network characteristic that restricts the impact of a failure on network access and allows a network to recover quickly from the failure
extranet
a network that provides safe and secure access to an organization's data to authorized people who work outside that organization
converged network
a network with the capability of delivering traffic with different requirements but with the use of the same network infrastructure
Intranet
a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.
Intranet
a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
intranet
a private interconnection of LANs and WANs inside an organization that can only be accessed by organization members or by non-members with authorization
podcasting
a technology that allows people to access a website and download an audio recording delivered by someone
peer-to-peer network
a type of network in which computers can perform the role of a server and a client at the same time
wiki
a web page that can be created and edited by a group of people
Cloud Computing
allows us to store personal files, even backup our entire hard disk drive on servers over the Internet.
Hacker attacks
an attack by a knowledgeable person to user devices or network resources
Zero-day attacks, also called zero-hour attacks
an attack that occurs on the first day that a vulnerability becomes known
Data interception and theft
an attack to capture private information from an organization's network
Identity theft
an attack to steal the login credentials of a user in order to access private data
Powerline Networking
an emerging trend for home networking that uses existing electrical wiring to connect devices, as shown in the figure.
ISP
an organization that enables individuals and businesses to connect to the Internet.
Denial of service attacks
attacks designed to slow or crash applications and processes on a network device
SDSL (symmetrical digital subscriber line)
business class service that provides the same uploads and download speeds over telephone lines
How are LANs administered?
by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level.
How are WANs administered?
by multiple service providers.
Human network
centers on the impact of the Internet and networks on people and businesses.
intermediary
connects in the center between packet source and packet destination
network components
devices, media, services
Advantages of a peer to peer network
easy set up, less complexity, lower cost, simple tasks
scalability
expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
Ethernet WANs
extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later chapter. The benefits of Ethernet are now being extended into the WAN.
availability
having the assurance of timely and reliable access to data services for authorized users.
Integrity
having the assurance that the information has not been altered in transmission, from origin to destination.
Virtual private networks (VPN)
hese are used to provide secure access to remote workers.
What do LANs provide?
high speed bandwidth to internal end devices and intermediary devices.
Metro Ethernet
high-speed business class copper or fiber connection
BYOD
makes it possible for users to be free to use their personal devices to access a corporate or a campus network
Viruses, worms, and Trojan horses
malicious software and arbitrary code running on a user device
Scalability
networks can grow and expand with minimal impact on performance common network standards allow hardware and software vendors to focus on product improvements and services
fault tolerance
networks should always be available data can travel from more than one route for delivery from a remote source
disadvantages of peer to peer network
no centralized admin, not as secure, not scalable, all devices clients and servers
QoS (quality of service)
priority queues are implemented when demand for network bandwidth exceeds supply Developing a plan for priority queuing is a strategy for quality delivery of service
Extranet
provide secure and safe access to individuals who work for a different organization, but require access to the organization's data.
intermediary network devices
provides connectivity and ensures data flows across the network - switches, wireless access points, routers, firewalls
SDSL (Symmetric Digital Subscriber Line)
provides uploads and downloads at the same speeds - similar to DSL
satelite
requires a Dish and clear line of sight - provides a connection when a wired solution is not available.
Dedicated Leased Line
reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
cable
signal carried over the same copper or fiber medium as the television signal
What do WANs provide?
slower speed links between LANs.
Spyware and adware
software installed on a user device that secretly collects information about the user
Cellular
technology in which a user can get access to the Internet when connecting a cell phone to a cell phone network
cloud computing
technology that allows users and organizations to store data on remotely located servers on the Internet
Smart Home Technology
technology that is integrated into every-day appliances allowing them to interconnect with other devices, making them more 'smart' or automated.
DSL
technology that provides the user with a high-bandwidth connection to the Internet over a telephone line
confidentiality
that only the intended and authorized recipients can access and read data.
Internet
the collection of globally interconnected networks
How can WANs connect
through copper wires, fiber optic cables and wireless transmissions
Access control lists (ACL)
to further filter access and traffic forwarding.
collaboration tools
tools that allow individuals to work together as a team on a project, no matter where they are located
SAN (storage area network)
type of network infrastructure that stores, retrieves, and replicates data
Antivirus and antispyware
used to protect end devices from becoming infected with malicious software.
blog
web pages easily updated and edited by a person who wants to express his or her opinions about any subject
How are WANs interconnected?
with LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
How are LANs interconnected?
with end devices in a limited area such as a home, school, office building, or campus.