Network+ Ch. 1 Terms

¡Supera tus tareas y exámenes ahora con Quizwiz!

Topology All devices connect to one central device, the switch.

Star Topology

An example of this topology would be 3 switches daisy-chained together in a single line. Each switch is also connected to multiple computers.

Star-Bus Topology

This can consist of a foaming chemical, gas, or water that sprays everywhere to put out the fire.

Suppression Agent

Receives incoming data from one of its ports and redirects (switches) it to another port or multiple ports that will send the data to its intended destination(s).

Switch

Protocols that operate at OSI Layer 4.

TCP & UDP

Makes a connection with the end host, checks whether the data is received, and resends it if it is not. Called a connection-oriented protocol. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination.

TCP (Transmission Control Protocol)

The two primary protocols.

TCP (Transmission Control Protocol) & IP (Internet Protocol)

Suite of all the protocols an OS uses for communication on a network.

TCP/IP

A four-layer model similar to the OSI model. Application, Presentation, and Session layers are wrapped together and are called the Application layer. The Physical layer is so simple, it's ignored, which makes for four layers: Application layer, Transport layer, Internet layer (Network layer in OSI), and Link layer (Data Link layer in the OSI).

TCP/IP model

Commandline application to allow an administrator or other user to "remote in" or control a computer remotely. Included in many operating systems, but not encrypted. Replaced by SSH.

Telnet

Does not guarantee delivery by first connecting and checking whether data is received. Called a connectionless protocol or best-effort protocol. Used for broadcasting, such as streaming video or audio over the web, where guaranteed delivery is not as important as fast transmission. Also used to monitor network traffic.

UDP (User Datagram Protocol)

Static electricity can cause two types of damage in an electronic component. This type shortens the life of a component and/or cause intermittent errors.

Upset Failure

Advantages of a Client-Server Networks.

User accounts & passwords stored in one place, access to multiple shared resources, monitoring of problems & fixed from one location, more scalable

Step 6 of the CompTIA troubleshooting steps.

Verify functionality and implement preventive measures

A group of LANs that spread over a wide geographical area.

WAN (wide area network)

The centralized directory database that contains user account information and security for the entire group of computers.

AD (Active Directory)

A user can sign on to the network from any computer on the network and get access to the resources that Active Directory allows.

AD DS (Active Directory Domain Services)

Method an application uses when it makes a request of the OS.

API (application programming interface) call

Seven-Word mnemonic to remember the OSI Model.

All People Seem To Need Data Processing

The most popular web server application.

Apache

OSI Layer 7. Describes the interface between two applications, each on separate computers. This is the layer we see.

Application layer

Is a central conduit that connects the segments of a network and is sometimes referred to as "a network of networks." Might use higher transmission speeds and different cabling than network cables connected to computers because of the heavier traffic and the longer distances it might span.

Backbone

OSI Layer 2. Responsible for interfacing with the physical hardware only on the local network. Simple switches operate on this layer.

Data Link Layer

If the message is too large to transport on the network, UDP divides it into smaller messages called this.

Datagram

Process of removing a header and trailer from a lower layer's PDU.

Decapsulation

Step 7 of the CompTIA troubleshooting steps.

Document findings, actions, and outcomes

In addition, sensitive electronic components (for example, a NIC, motherboard, and memory modules) can be damaged by this. Commonly known as static electricity. Static electricity is an electrical charge at rest.

ESD (electrostatic discharge)

Protective gear you wear on your wrist that you clip to the chassis, or PC case, which eliminates any ESD between you and the chassis and it's components.

ESD strap

These systems vary, but they typically generate loud noise and flashing lights. Some send text and voice message alerts to key personnel, and post alerts by email, network messages, and other means.

Emergency Alert System

The process of adding a header to the data inherited from the layer above.

Encapsulation

Step 4 of the CompTIA troubleshooting steps.

Establish a plan for resolving the problem

Step 2 of the CompTIA troubleshooting steps.

Establish a theory of probable cause

Protocols that operate at OSI Layer 1 and 2.

Ethernet & Wi-Fi

Examples of Data Link layer protocols.

Ethernet & WiFi

A client-server application that transfers files between two computers uses this protocol. It is not secure.

FTP (File Transfer Protocol)

If firewall software protecting access to a database of customer credit card numbers fails, it might be configured to this policy and to deny access to the database until the software is back online.

Fail-Close

During a fire alert, using this policy, all exit doors stay unlocked so that people can safely leave the building and firefighters can enter the building, even though this might present a security risk for thieves entering the building.

Fail-Open

Examples of dedicated FTP clients.

FileZilla and CuteFTP

A company is likely to have this in it's data center.

Fire Suppression System

Programs embedded into hardware devices. This software does not change unless an upgrade is performed.

Firmware

If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in this process.

Fragmentation

A switch belongs only to its local network and a router belongs to two or more local networks.

Fundamental difference between a switch and a router.

A device is connected directly to the earth, so that, in the event of a short circuit, the electricity flows into the earth, rather than out of control through the device and back to the power station, which can cause an electrical fire.

Grounding

The primary protocol used by web servers and browsers (clients).

HTTP (Hypertext Transfer Protocol)

9 examples of protocols that operate at OSI Layer 5, 6 & 7.

HTTP, HTTPS, SMTP, POP3, IMAP4, FTP, FTPS, RDP, Telnet

Used by web servers and browsers (Clients) and gives a secure transmission.

HTTPS (HTTP Secure)

The TCP & UDP protocols add their own control information in an area at the beginning of the payload.

Header

Any computer on a network that hosts a resource such as an application or data.

Host

Legacy technology, switches replaced this. Accepted signals from a transmitting node and repeated those signals to all other connected nodes in a broadcast fashion.

Hub

A topology that combines topologies.

Hybrid Topology

IP relies on several supporting protocols to find the best route for a packet when traversing several networks on its way to its destination. These are two of them.

ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol)

Second most popular web server application, which is embedded in the Windows Server OS.

IIS

The principal protocol used by the Network layer.

IP (Internet Protocol)

An address assigned to each node on a network, which the Network layer uses to uniquely identify them on the network.

IP Address

Protocols that operate at OSI Layer 3.

IP, ICMP & ARP

Each node on the network can communicate directly with others on the network. Usually contained in a small space, such as an office or building.

LAN (local area network)

This printer connects directly to a computer on the network.

Local Printer

Has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases, are shared on the network.

Logical Topology

The frame header contains the hardware address of the source and destination NICs. This address is embedded on every network adapter on the globe. The physical addresses are short-range addresses that can only find nodes on the local network.

MAC (Media Access Control) Address

A group of connected LANs in the same geographical area—for example, a handful of government offices surrounding a state capitol building

MAN (metropolitan area network) or CAN (campus area network)

Also called an SDS (safety data sheet), explains how to properly handle substances such as chemical solvents and how to dispose of them.

MSDS (Material Safety Data Sheet)

Topology where each device connects to multiple other devices.

Mesh Topology

Where you plug a network cable. This adapter is installed in an expansion slot on the motherboard. Uses the PCIe x1 slot.

NIC (network interface card)

Client-server model requires one or more of these. They control access to the entire network. Examples are Windows Server 2016, Ubuntu Server, and Red Hat Enterprise Linux.

NOSes (network operating systems)

A group of computers and other devices (such as printers) that are connected by some type of transmission media.

Network

OSI Layer 3. Responsible for moving messages from one node to another until they reach the destination host.

Network Layer

This Printer has a network port and connects directly to the switch.

Network Printer

The resources a network makes available to its users include applications and the data provided by these applications.

Network Services

Any computer or device on a network that can be addressed on the local network. Routers and Switches can only be these.

Node

Disadvantages of using traditional peer-to-peer networks.

Not scalable, not as secure & not practical for more than a few PCs

Main federal agency charged with safety and health in the workplace.

OSHA (Occupational Safety and Health Administration)

Made Early in the evolution of networking, a 7-layer model was developed to categorize the layers of communication. It was first developed by the International Organization for Standardization, also called the ISO.

OSI (Open Systems Interconnection)

If the network supports fewer than 15 computers this network model is the way to go.

P2P (peer-to-peer)

No computer has more authority than another; each computer controls its own resources, and communicates directly with other computers.

P2P (peer-to-peer) network model

The smallest network. Network of personal devices, such as the network you use when you sync your smartphone and your computer.

PAN (personal area network)

There are several different names for a group of bits as it moves from one layer to the next and from one LAN to the next. Although technicians loosely call this group of bits a message or a transmission this is the technical name.

PDU (protocol data unit)

The recipient's mail server delivers the message to the receiving client using these two protocols.

POP3 (Post Office Protocol, version 3) & IMAP4 (Internet Message Access Protocol, version 4)

Wear this to protect yourself as you work. For example, wear eye protection where dust or fumes are generated by power tools.

PPE (personal protective equipment)

IP adds its own Network layer header to the segment or datagram, and the entire Network layer message is called this.

Packet

PDU name that operates at layers 5, 6 & 7. Data that is passed between applications or utility programs and the operating system and includes control information.

Payload

OSI Layer 1. Simplest layer of all and is responsible only for sending bits via a wired or wireless transmission. These bits can be transmitted as wavelengths in the air, voltage on a copper wire (for example, Ethernet on twisted-pair cabling), or light (for example, Ethernet on fiber-optic cabling).

Physical Layer

Mostly refers to a network's hardware and how computers, other devices, and cables fit together to form the physical network.

Physical Topology

The Transport layer header addresses the receiving application by a number.

Port

OSI Layer 6. Responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

Presentation Layer

Networked devices use these methods and rules for communication.

Protocols

Windows Server 2008 and later versions include this to manage remote applications, and versions of Windows Server prior to 2008 provided Terminal Services.

RDP (Remote Desktop Protocol)

An application that is installed and executed on a server and is presented to a user working at a client computer.

Remote Application

Nodes are connected in a ring, with one node connecting only to its two neighboring nodes. A node can put data on the ring only when it holds a token, which is a small group of bits passed around the ring. This is similar to saying "I hold the token, so I get to talk now." This topology is rarely used today, because of its slow speed.

Ring Topology

A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

Router

Encrypted and secure file transfer protocol.

SFTP (Secure File Transfer Protocol)

The client uses this protocol to send an email message to the first server.

SMTP (Simple Mail Transfer Protocol)

Utility programs that provide services to the system. Monitors and gathers information about network traffic and can alert network administrators about adverse conditions that need attention

SNMP (Simple Network Management Protocol)

Acronym for a smaller network used in small office and home networks.

SOHO (Small office-home office)

This command in Linux creates a secure channel or tunnel between two computers. Replaced Telnet.

SSH (Secure Shell)

HTTP is layered on top of these encryption protocols and the result is HTTPS (HTTP Secure)

SSL (Secure Sockets Layer) & TLS (Transport Layer Security)

If the message is too large to transport on the network, TCP divides it into smaller messages called this.

Segments

Any computer or program that provides a service, such as data or other resources, to other devices

Server

OSI Layer 5. Describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

Session Layer

Advantages of using peer-to-peer networks.

Simple to configure & Less expensive and maintain

When your body and a component have different static charges and you touch the component, you can discharge up to 1,500 volts of static electricity without seeing a spark or feeling the discharge. However, it only takes this ammount to damage the component.

10 volts

Static electricity can cause two types of damage in an electronic component. This type destroys the component beyond use.

Catastrophic Failure

Fire extinguishers need to be this class to put out electrical fires.

Class C

A computer making a request from another.

Client

These applications, which involve two computers. The first computer, a client computer, requests data or a service from the second computer, which is the server.

Client-Server Applications

Resources are managed by the NOS via a centralized directory database. The database can be managed by one or more servers, so long as they each have a similar NOS installed.

Client-Server Network Model

Both a router and a switch, and maybe a wireless access point. The home router belongs to the home's local network on one side and the ISP's local network on the other. Not to be confused with a dedicated router.

Combo Device

Step 1 of the CompTIA troubleshooting steps.

Identify the problem and its symptoms

Step 5 of the CompTIA troubleshooting steps.

Implement the solution or escalate the problem

Step 3 of the CompTIA troubleshooting steps.

Test your theory to determine the cause

Describes how the parts of a whole network work together.

Topology

The Data Link layer puts its own control information in a Data Link layer header and also attaches control information to the end of the packet called this.

Trailer

OSI Layer 4. Responsible for transporting Application layer payloads from one application to another. The two main protocols are TCP & UDP.

Transport Layer

When Windows Server controls network access to a group of computers, this logical group is called this.

Windows Domain

If all computers in a peer-to-peer network are running a Windows operating system, resources can be shared in these ways:

Workgroup & Windows folder and file sharing & homegroups


Conjuntos de estudio relacionados

COB 202 Final Exam (Only Chapter 9+10) (Henderson)

View Set

NCLEX: Pulmonary Embolism (PE), HF, DVT, CVD, HTN, CAD & Angina Pectoris,

View Set

Taylor's 4 Principles of Scientific Management

View Set