Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

star topology

A physical topology in which every node on the network is connected through a central device, such as a switch. Any single physical wire on a star network connects only two devices, so a cabling problem will affect only two nodes. Nodes transmit data to the hub, which then retransmits the data to the rest of the network segment where the destination node can pick it up.

IP

A protocol that routes a packet to its correct destination address on the Internet.

system

A set of connected things or parts forming a complex whole

backdoor

An account that is secretly set up without the administrator's knowledge or permission, that cannot be detected, and that allows for remote access to the device.

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Network interface card

An interface fitted inside a personal computer or network terminal which allows it to communicate with other machines over a network.

IPv6

IPv6 An extended scheme of IP addresses, using 128-bit IP addresses, that allows for more IP addresses than current system, IPv4, which uses 32-bit IP addresses. IPv6 is expressed as eight groups of four hexadecimal characters (numbers and letters),

IPv4

Internet Protocol version 4. Identifies hosts using a 32-bit IP address. IPv4 is expressed in dotted decimal format with decimal numbers separated by dots or periods like this: 192.168.1.1. IPv6 - Internet Protocol version 6. Identifies hosts using a 128-bit address. IPv6 is expressed as eight groups of four hexadecimal characters (numbers and letters), such as this: FE80: 0000: 0000: 0000: 20D4: 3FF7: 003F:DE62.

IP

Internet Protocol, protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of data packets

LAN

Local Area Network, Computer network covering a small area. Connects computers in small groups as well as peripherals such as printers to those computers.

PAN

Personal Area Network, just your own little network, it will have multiple devices, but generally for a single user.

POP

Post Office Protocol - Email protocol.

802.11

Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.

1-1

Simplest network, only connecting 2 computers via ethernet cables.

System Admin

The administrator of a (usually) business network and related servers.

Bandwidth

The amount of data that can be transmitted over a network in a given amount of time.

client-server

The model assigns one of two roles to the computers in a network: Client or server. A server is a computer system that selectively shares its resources; a client is a computer or computer program that initiates contact with a server in order to make use of a resource.

TCP

Transmission Control Protocol, a protocol developed for the internet to get data from one network device to another

TCP

Transmission Control Protocol. Provides guaranteed delivery of IP traffic over a network

TCP/IP

Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.

WPA

Wi-Fi Protected Access

WAN

Wide Area Network, Covers a broad area and allows for data transfers over long distances.

WEP

Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks

backup

a copy of a file or directory on a separate storage device

decimal

a familiar numeral system that uses ten digits

packet

a fragment of a message sent via a network

WLAN

a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

CSMA/CD

a method of data collision detection in which a node connected to the network listens (that is, has carrier sense) to determine that no other nodes are currently transmitting data signals; short for Carrier Sense Multiple Access with Collision Detection.

binary

a numeral system that only uses two digits

trojan

a program that appears desirable but actually contains something harmful

Help Desk

a service that provides information and assistance to the users of a computer network

switch

a smart hub, it joins multiple computers together, but will direct traffic only to the port that needs it

virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

0

absence of a voltage, "Off", "No", "False"

networking

communicating with and within a group

node

connection along a route, any computer/device that is hooked up to a computer network

hub

contains multiple ports to connect nodes to network. DO NOT USE IF A SWITCH IS AVAILABLE

router

enable computers to communicate and they can pass information between two networks

network topology

how different nodes in a network are connected together and how they communicate

cat5

is a type of UTP Cabling that is rated up to 100 Mbps.

Cat6

is a type of UTP Cabling that is rated up to 1000 Mbps and uses RJ-45 connectors.

1

presence of a voltage, "On", "Yes", "True"

protocol

rules determining the format and transmission of data

bits

single digit pieces of information, placeholder for a binary digit

Network Admin

someone who has training in computer and peripheral maintenance and repair, network design, and installation of network software, installs new equipment, configured computers for users, repairs equipment, and assigns network access to users.

Default Gateway

the IP address of a computer that's able to access the next level of a network.

wireless

transmission of data and information through airwaves using radio frequency, specified by the 802.11 standard ( eg a,b,g,n)

UTP

unshielded twisted pair

FTP

use the File Transfer Protocol to transfer data from one computer to another

Ethernet

A network communications protocol that specifies how machines will exchange data. It uses a broadcast system in which one machine transmits its message on the communication medium. The other machines listen for messages directed to them.

ring topology

A network configuration in which the computers and peripherals are laid out in a configuration resembling a circle. Data flows around the circle from device to device in one direction only.

computer network

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, and allow electronic communications.

Port

(1) As applied to services running on a computer, a number assigned to a process on a computer so that the process can be found by TCP/IP. Also called a port address or port number. EG Web Servers are port 80.

MAC Address

(Media Access Control) A unique identifier similar to a serial number assigned to networking equipment at time of manufacture.

byte

8 bits

Fibre Optic

Cabling used for networking that uses fine strands of glass. The medium can carry a great deal of data and it gives a fast transfer rate.

bridge

Connectors commonly used for connection between 2 LANs, like switches, but with fewer ports.

router

Connects all points together within network or between networks

resource

Data, CPUs, printers, and data storage devices are some examples of resources.

DNS

Domain Name System, hierarchical distributed naming system for computers, services, or any resource connected to the Internet

DHCP

Dynamic Host Configuration Protocol, gives out IP addresses to computers on a network

192.168.0.1

Free IP Address (IPv4) designated for private use to establish default gateway


Ensembles d'études connexes

REAL ESTATE PRINCIPLES: CHAPTER 3: ENCUMBRANCES. TERMS AND CHAPTER QUIZ.

View Set

Fundamentals Chapter 5 مهمممم

View Set

Chapter 11 Efficient Market Hypothesis

View Set

AP World History: About 1750 to 1914

View Set

DOCTRINE OF PIERCING THE CORPORATE VEIL; INCORPORATION AND ORGANIZATION OF A DOMESTIC CORPORATION

View Set

Real Estate Chapter 14 - Effects of Times and Risk on Value

View Set

APUSH Test- Period 3- 1754- 1787

View Set