Chapter 1: Networking today

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Disadvantages of a peer to peer network

-No centralized administration -Not as secure -Not scalable -All devices may act as both clients and servers which can slow their performance

Advantages of a peer to peer network

-easy to set up -less complex -lower cost -can be used for simple tasks such as transferring files and sharing printers

Network Security

3 primary requirements: -Confidentiality- Only the intended & authorized recipients can access data -Integrity- assures users the info has not been altered in transmission from orgin to destination. -Availability- assures users of timely and relaible access to data service for authorized users.

LAN (Local Area Network)

A Network Infrastructure that spans a small geographical area. -Interconnect end devices in a limited area -Administeres by a single organization or individual -Provide high-speed bandwith to internal devices.

WAN (Wide Area Network)

A Network infrastructure that spans a wide geographical area. -Interconnect LANs over wide geographical areas. -Typically administered by one or more service providers -Typically provide slower speed links between LANs

Physical Port

A connector or outlet on a networking device where the media connects to an end device or another networking device

End device

A device such as a desktop or mobile device that is used by an end user

Threat actor attacks

A malicious person attacks user devices or network resources

Poweline Networking

Allow decvices to connect to a LAN where data network cables or wireless communications are not a viable option. -using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies. -useful when wifi cant reach

Cloud Computing

Allows us to store personal files or backup our data on servers over the internet. -Applications can also be accessed using the cloud. -Allows businesses to deliver to any device anywhere in the world. -Made possible by data centers -Contains options sucha as private, public, custom and hybrid.

Dial-up telephone Connection

An inexpensive, low bandwith option using a modem.

Scalability

Can expand quickly and easily to support new users and applications without impacting the performance. Designers follow accepted standars and protocols.

Online Collaborations

Collaborate and work w/ others over the network on joint projects. Is a very high priority for business and education Ex:: Cisco WebEx

Network Media

Communication across a network is acarried through a medium which allows a message to travel from source to destination. Metal wires within cables- Uses Electrical impulses Glass or plastic fibers within cables (Fiber optic)- Uses pulses of light Wireless transmission- Uses modulation of specific frequencies of electromagnetic waves.

Quality of service

Focus is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what's important. ex: phone calls is prioritzed over a video

Cable Connection

High bandwith,always on, internet offered by cable television service providers.

Logical Topology Diagram

Illustarates devices, ports and the addressing scheme of the networking. (Like IP address and allows you to see which end devies are connected to whice intermediary device & what media is playing)

Physical Topology Diagram

Illustarates the physical location of intermediary devices and cable installation

Intermediary Device

Interconnet end devices. Management of data as it flows through a networks also the role, including: -notify of failure -regenerate and retransmit data signals -Maintain info about what pathway exist in the network EX: switches, wireless access points, routers and firewalls

Fault Tolerance

Limits the impactof failure by limiting the number of affected devices. Multiple paths are required. Reliable networks provide REDUNDANCY by implementing a packet switched network: -Packet switching splits traffic into packets that are routed over a network -Each packet could theoretically take a different path to the destination

Satellite Connection

Major benefit to rural areas without Internet Service Providers. Require a clear line of sight to the satellite.

Wireless Broadand

More commonly found in rural environments, a Wireless Internet Service Provider (WISP) is a ISP that connects subscribers to designated access points or hotspots. -Uses the same cellular tech used by smart phone

NIC(Network Interface Card)

Physically connects the end device to the network (Connectes to wifi)

Network Architecture

Refers to the technologies that support the infrastructure that move data across the network. 4 Basic characteristics that are needed to meet user expectations: -Fault tolerance -Scalability -QoS (Quality of Service) -Security

Interface

Specialized ports on a networking device that connect to individual network.Because routers connect networks the ports on a router our networking interface

Dedciated Leased Line (For business)

These are reserved circuits within the service providers network that connect distant offices with private vocie and/or data networking.

Denial of service attacks

These attacks slow or crash applications and processes on a network device

Ethernet WAN (for business)

This extends LAN access technology into the WAN

Cellular Connection

Uses a cell phone network to connect to the internet.

Video Communication

Video calls are made to anyone regardless of where they are located. Powerful took for communicating w/ others.

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization.ONLY accessible by organization members, employees, or others w/ authoriztaion.

BYOD (Bring your own Device)

allows users to use their own devices giving them more opportunities and greater flexibility. ex: laptop, netbook, tablet,phone

Converging Network

capable of delivering data, voice, and video between many different types of devices over the same network infrastructure w/ same set of rules and standards

DSL Connection (Digital Subscriber lines)

high bandwith, always on, internet connection that runs over a telephone line.

Viruses, worms, and Trojan horses

malicious software and arbitrary code running on a user device

Extranets

networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, web-based access to authorized parts of a company's information system -EX: a company that is providing access to outside suppliers and contractors

zero-day attacks

occurs on the 1st day that vulnerability is known

Peer-to-peer network

one computer to be used for both roles of client and server.

Spyware/Adware

software installed on a user device that secretly collects information about the user

Data interception and theft

this attack captures private information from an organization's network

identity theft

this attack steals the login credentials of a user in order to access private data.

Security Solutions

• Antivirus and antispyware - These are used to protect end devices from becoming infected with malicious software. • Firewall filtering - This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network. • Dedicated firewall systems - These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. • Access control lists (ACL) - These are used to further filter access and traffic forwarding. • Intrusion prevention systems (IPS) - These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks. • Virtual private networks (VPN) - These are used to provide secure access to remote workers.


Kaugnay na mga set ng pag-aaral

Lecture 12 - Exam 2 - Thoracic Spine Evaluation and Treatment

View Set

Biochemistry I Exam 3 (hunterschaff)

View Set

Transcultural Module 5.01: Globalization and Transcultural nursing

View Set

History 110 Final Study Guide (Chapters 14-27)

View Set

Professional Use of Electronic Media

View Set

Phoenix Fire Paramedic Test Study Guide

View Set