Chapter 1
AP
Access point
Wireless devices communicate to the wired LAN through a base station known as a _________
Access point
ad hoc topology does not use a ____ to connect the devices
Access point
The most popular web server application is ______. Which primarily runs on ______ systems. The second most popular is _________ (_____) which is embedded in the ______ operating system.
Apache, Unix, Internet Information Services, IIS, Windows Server
Network admins must be aware of the applications used on a network including the application protocols they use and the amount of _____ they require
Bandwidth
WPAN commonly uses what technologies
Bluetooth,Infrared,Near field communications
A ____ topology uses a trunk or backbone of coaxial cable to connect all computers. each system connects to the backbone using T connectors. to avoid signal reflection each end must be terminated and one end must be ________. this does not need a ____ or ____ .
Bus, Grounded, hub, switch
MANs still use an ____ or an ____
ISP,Telco provider
ICS
Industrial Control Systems
IEEE stands for
Institute of Electrical and Electronics Engineers
ISDN
Integrated Services Digital Network
_________ is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
Integrated Services Digital Network
IP
Internet Protocol
ISP
Internet Service Provider
List the network infrastructure types
LAN, WAN, MAN, PAN, SCADA/ICS, medianets
Network infrastructure top consist of _____, then Network Model consist of ______, then Network Topology consist of ________
LAN,WAN,MAN,PAN,SCADA/ICS, peer to peer, client/server, decentralized, centralized, star, bus, ring
WANs typically connect multiple _____ and each blank typically has a ____ that connects the blank to the WAN
LANs,router
LAN
Local Area Network
the ____ address is the physical or hardware address burned in to each ______
MAC, network interface card
MAN
Metropolitan Area Network
____is a geographic network that covers a larger geographic area such as a city or community; may be used to connect computers in libraries, government agencies, etc. together - no more than 30 miles in size. This is also considered a type of ______(falls into this category)
Metropolitan Area Network, Wide Area Network
NFC
Near Field Communication
NIC
Network Interface Card
The resources a network makes available to its users include applications and the data provided by these applications. Collectively, these recourses are usually refereed to as _________________
Network Services
Email is a client-server application that involves two servers. the client uses _____(____) to send an email message to the first server, which is sometimes called the _____ server. The first server sends the message on to the receivers mail server, where its stored until the recipient requests delivery. The recipients mail server delivers the message to the receiving client using one of two protocols: ______(____) or ____(____). Using ___ the email is downloaded to the client computer. Using _____ the client application manages the email stored on the server. An example of a popular email server application is _______. _______ is a popular email client application.
SMTP, Simple mail transfer protocol, POP3, Post office protocol version 3, IMAP4, internet message access protocol version 4, Microsoft exchange server, outlook
Telnet service: the ____ protocol is used byt the Telnet client server command line application to allow administration or other user to "______" or control a computer remotely. Telnet is included in many operating systems but transmissions in Telnet are not encrypted which has caused telnet to be largely replaced by more secure programs such as the ____ command in the _____ operating system
Telnet, Remote in, ssh, Linux
Telco
Telecommunications
______ is an unmanaged wireless topology
ad hoc
OSI 7
application
name five common topologies
bus, ring, star, mesh, wireless
the ______ and ____ computing models describe where the processing/storage takes place
centralized, distributed
streaming stored audio and video: when you watch a video on youtube you're using a _______ model.
client server
using the same network to deliver multiple types of communication services such as video voice fax is known as a _______. A similar term ____(__), refers to the centralized management of multiple network based communications.
convergence, unified communications, UC
OSI 2
data link
the ____ layer in OSI is responsible for error detection, error correction, hardware addressing. the term _____ describes the logical grouping of _____ at the _____ layer
data link, frame, data, data link
peer to peer network is a _______ network model and generally should not have more than ____ users
decentralized, ten
Voice and video transmissions are _____ meaning that breaks in transmission impact quality. They are also considered____ as the conversation/video will be able to continue dispite a loss. Network administrators must pay attention to the ______(__) a network provides for voice and video
delay sensitive, loss tolerant, quality of service, QoS
the _____ computing model is more common today where processing and storage is shared
distributed
The term ____ refers to a servers ability to share data files and disk storage space. A computer that provides this is called a ______, and serves up data to users so they don't keep copies on their workstations. This is beneficial because the admin can manage these files rather than each the individuals
file services, file server
Networks are generally classified by their ____ and ___.
geographic coverage,size
protocols and technologies such as HDLC_____,L2TP_____,PPP____,PPTP______,STP_______,VLANs________ all operate at the _____ OSI layer
high level data link control, layer 2 tunneling protocol, point to point protocol, point to point tunneling protocol, spanning tree protocol, virtual local area network, data link
Network models often take these factors into consideration when determining which to use
how the network will be used, how many users, bugets
the _____ topology is the most commonly used in WANs
hybrid mesh
_______ is a managed wireless topology
infrastructure
Wireless topologies generally have two categories _______ and ______
infrastructure and ad hoc
the items that should be considered when setting up a network from scratch
list of requirements, device types/requirements, environmental limitations, equipment limitations, compatibility requirements, wired/wireless considerations, security considerations
LLC
logical link control
The ____ layer is part of the _____ OSI layer and is responsible for error and flow control mechanisms
logical link control, physical
the OSI physical layer includes what two layers
media access control, logical link control
MAC stans for ______ and is associated with what OSI layer _____
media access control, physical
In a ____ topology there is a _____ connection of every device to every device
mesh, point to point
In a token ring network a _____ will act as a switch/hub
multistation access unit
MSAU
multistation access unit
OSI 3
network
look at TCP/IP model type ok
ok
study electromagnetism series of articles in Wikipedia fool type ok
ok
The two basic wired network models are:
peer to peer, client/server
OSI 1
physical
what layer of OSI is hardware and topology (layer number)
physical 1
Name the OSI models layers in order
physical, data link, network, transport, session, presentation, application
each devise in the star topology uses a ____ connection to the hub/switch
point to point
OSI 6
presentation
using ______ to share printers across a network saves time and money
print services
How does a client know how to make the request in a way the server can understand and respond to? these networked devices use methods and rules for communication known as ____________
protocols
remote applications: a ________ is an application that is installed and executed on a serve and is presented to a user working at a client computer. ________ and later include ________ to manage remote applications, and versions of prior to 2008 used ______. Both use ___ to present the remote application and its data to the client. Remote applications are becoming popular because most of the computing power(memory and CPU speed) are focused on the server in a centralized location rather than bogging down the client.
remote application, windows server 2008, remote desktop services,terminal services, RDP
RI port
ring in
RO port
ring out
OSI 5
session
SOHO stands for
small office/home office
The ____ command in Linux uses the _____(___) protocol, which creates a secure channel or tunnel between two computers
ssh, Secure Shell, SSH
in a ___ topology all devices are connected to a central hub or switch
star
the ___ topology is the easiest to expand without disruption
star
RI and RO ports are a part of a ____ ring network that uses a _____ to act as a hub
token, multistation access unit
a _____ refers to a networks physical and logical layout.
topology
OSI 4
transport
protocols and technologies such as USB _____, ethernet, DSL____, ISDN_____,,Tcarrier links T1 and T3, GSM_____, SONET_____ operate at this OSI layer _______
universal serial bus, digital subscriber line, integrated services digital network, global system for mobile communications, synchronous optical networking, physical
streaming LIVE audio and video: a ______ application such as skype or google talk, allows people to communicate in video and voice, primarily using the point-to-point model. on the other hand, when you watch a live sports event on your computer the application is using a client server model called a _______. the session layer protocol that is specifically designed to transmit audio and video and that works in conjunction with VoIP is _____(___)
video teleconference, VTC, multicast distribution, RTP, Real time transport protocol
WPAN
Wireless Personal Area Network
Medianets
A network that is optimized for high-traffic video.
SOHO networks typically use what kinds of connections
DSL, cable modem, FiOS
DSL
Digital Subscriber Line
DCS
Distributed Control System
FTP service: FTP is a client server application that transfers files between two computers , and it primarily uses ____(___). FTP does not provide encryption and is therefore not secure. Web browsers can be FTP clients, although dedicated FTP client applications, such as ____ by ______ offer more features for file transfer than does a browser.
FTP, File transfer protocol, CuteFTP, GlobalSCAPE
The primary protocol used by web servers and browsers(clients) is ________(______). When this is layered on top of an encryption protocol such as _____(____) or ____(______) the result is ______(_____), which gives a secure transmission.
HTTP, Hypertext Transfer Protocol, SSL, Secure Sockets Layer, TLS, Transport Layer Security, HTTPS, HTTP Secure
To verify a web based transmission is secure look for ______ in the url browser.
HTTPS
SCADA/ICS typically include what
ICS server, distributed control system, remote terminal unit, programmable logic controller.
OSI
Open Systems Interconnect
a conceptual model describing how network architecture allows data to be passed between computer systems
Open Systems Interconnect
PAN
Personal Area Network
Networks can have _______ or ________ layouts AKA Topologies. (_____,_____)
Physical,Logical
PtP ?
Point to point
Remote Desktop: in windows operating system the windows _______ application uses _____(____) to provide secure,encrypted transmissions that allow a technician to remote in>that is, to access a remote computer from the technicians local computer
Remote Desktop, RDP, Remote desktop protocol
_____ systems are used to gather and analyze data from remote systems in real time
SCADA/ICS
An encrypted and secure version of FTP is _____(___)
SFTP, Secure file transfer protocol
SIP
Session Initiation Protocol
VoIP applications such as _____ and _____ use a _____ model rather than a client server model, a conference call would use a _____ model, which involves one transmitter and multiple receivers.
Skype, Google Talk, point to point, point to multipoint,
SCADA
Supervisory Control and Data Acquisition
WAN
Wide Area Network
VTC
Video Teleconferencing
conversational voice: _____(____) allows two or more people to have voice conversations over a network. this is fast, replacing traditional telephone service in homes and business.
VoIP, Voice over IP