98-366:MTA: Networking Fundamentals Lesson 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

network operating systems

Network controller operating systems are also referred to as _______________________________ or NOS.

web server

Web servers are important to share data and provide information about a company. Windows Servers can be web servers, but Internet Information Services (IIS) has to be installed and configured in order for this to work.

star topology

When a ____________________________ is used, each computer is individually wired to a central connecting device with twisted-pair cabling. The central connecting device could be a hub, a switch, or a SOHO router. This is the type of topology usually used when implementing networks.

hub

This is the most basic of central connecting devices (sometimes referred to as CCDs); it connects each of the networked computers, known as hosts, to one another by way of copper-based cables.

RJ-45

an ____________ port (or an 8P8C), is where the _______ plug at the end of the network cable connects. This is the most common type of network adapter port, allowing the adapter to connect to most of today's wired networks.

MDI

two individual star networks can be connected together (by their central connecting devices) to create a star-bus topology. This is done by daisy chaining (or stacking) one or more hubs or switches, usually by a special ________________________) port; this is where the "bus" part of a star-bus topology comes in

Broadcast

when a computer sends data, that data is _________________to every other host on the network by default.

mesh topology

In a ___________________, every computer connects to every other computer; no central connecting device is needed. As you can guess, a true or "full" ___________ requires a lot of connections

switch

The ______________ will most likely be a powerful (and expensive) device, in order to support all of the computers that ultimately connect to it.

subnet mask

The _____________________ is a group of four numbers that define what IP network the computer is a member of. All of the 255s in a _______________ collectively refer to the network portion, whereas the 0s refer to the host portion.

peer-to-peer (P2P)

________________________________ networking first and foremost means that each computer is treated as an equal. This means each computer has an equal ability to serve data and to access data, just like any other computer on the network. Before servers became popular in PC-based computer networks, each PC had the ability to store data.

client-server

A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information.

host

each of the networked computers

print server

A _________________ controls printers that can be connected directly to the server or (and more commonly) are connected to the network. The p__________________ can control the starting and stopping of document printing, as well as concepts such as spooling, printer pooling, ports, and much more. By default, Windows Server 2008, Windows Server 2003, and Windows Server 2000 can be ________________right out of the box.

Wireless LAN

A _______________________ is a network composed of at least one WAP and at least one computer or handheld device that can connect to the WAP.

network topology

A ___________________________ defines the physical connections of hosts in a computer network. There are several types of physical topologies, including bus, ring, star, mesh, and tree. For the exam, you should know the star, ring, and mesh topologies.

centralized computing

A model where all computing for a network is done by a large central device.

distributed computing

Today's computing is known as ________________________________ and is used for both client-server and peer-to-peer networks. This means that every device or workstation has its own processing power.

microsoft ISA server

Back-to-back configuration: This involves a DMZ situated between two firewall devices, which could be black box appliances or _____________________________, or perhaps Microsoft Forefront devices.

IEEE 802.3

Ethernet is a group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices. An open standard, Ethernet is the de facto standard and has the largest share of networks in place today, with Token Ring and FDDI filling in the small gaps where Ethernet does not exist. Ethernet is standardized by the Institute of Electrical and Electronics Engineers (IEEE) as _________.

ring topology

In a LAN environment, each computer is connected to the network using a closed loop; historically, this was done with coaxial cable. When it comes to today's LANs, this is a pretty outdated concept; however, when applied to other types of networks like Token Ring or Fiber Distributed Data Interface (FDDI), it takes on a different meaning: that of a logical topology.

data transfer rate

Network speed, also known as bit rate. This is defined as the maximum bits per second (bps) that can be transmitted over a network.

wireless access point

The __________________________________ acts as the central connecting device for the network. Today, such networks can consist of many types of devices other than traditional PCs, including smart phones, PDAs, tablet computers, and micro computers. Not to mention the fact that PCs and laptops equipped with wireless network adapters can connect to these networks as well.

computer telephony integration (CTI)

When a company's telephone system meets its computer system. Here, special PBXs that used to control phones as a separate entity can now be controlled by servers with powerful software.

frames

A ___________________ is a group of bytes packaged by a network adapter for transmission across the network; these frames are created and reside on Layer 2 of the OSI model

file server

A ___________________ stores files for computers to share. The connection to a ________________ could be made by browsing, by mapping a network drive, by connecting in the command line, or by connecting with an FTP client. The latter would require that special FTP server software is installed and configured on the ______________. By default, Windows Server 2008, Windows Server 2003, and Windows Server 2000 can be ______________ right out of the box.

LAN

A ____________________ is a group of these computers that are confined to a small geographic area, usually one building. Setting up a _______________ requires computers with network adapters, central connecting devices to connect those computers together, and a numbering scheme (such as IP addresses) to differentiate from one computer to the next.

Network adapter

A _______________________, also known as a network interface card or NIC, is the device that enables you to send and receive data to and from your computer. This adapter might be integrated into the motherboard or act as a separate device that connects to a PCI slot, or perhaps a PC card slot or USB port. An adapter can connect to the network by cable (wired) or by air (wireless). It has its own basic CPU to process transmitted data, as well as a ROM chip to store information about itself. _______________________ also have a software component known as a driver, which defines how the card will interact with the operating system; this usually includes a properties page that can be accessed in the operating system, thereby enabling the user to configure the adapter as he or she sees fit.

perimeter network

A _____________________________ (also known as a demilitarized zone or DMZ) is a small network that is set up separately from a company's private LAN and the Internet. It is called a _____________________ because it is usually on the edge of the LAN, but DMZ has become a much more popular term.

database server

A ____________________________houses a relational database made up of one or more files. SQL databases fall into this category. They require special software, such as Microsoft SQL Server. Access databases (which are just one file) do not necessarily require a database server; they are usually stored on a regular file server

network controller

A controlling server, such as a Microsoft domain controller, is in charge of user accounts, computer accounts, network time, and the general well-being of an entire domain of computers and users.

IP address

The most common type of network address is the ___________________ ____________, or more simply, ___ ___________.

demilitarized zone (or DMZ)

A perimeter network (also known as_______________________________) is a small network that is set up separately from a company's private LAN and the Internet. It is called a perimeter network because it is usually on the edge of the LAN, but ___________ has become a much more popular term. A ____________ allows users outside of a company LAN to access specific services located on the __________.

CTI-Based server

This server uses Computer Telephony Integration. This is when a company's telephone system meets its computer system. Here, special PBXs that used to control phones as a separate entity can now be controlled by servers with powerful software.

CSMA/CA

Short for carrier sense multiple access with collision avoidance. It is used as a method for multiple hosts to communicate on a wireless network and AppleTalk.

CSMA/CD

Short for carrier sense multiple access with collision detection. It is the method for multiple hosts to communicate on a Ethernet.

MAU

Token Ring computers are physically connected in a star fashion. Namely, all computers in a Token Ring network are connected to a central connecting device known as a _________________________

full duplex

_______________ means that the network card can send and receive data simultaneously.

ethernet

________________ is a set of rules that govern the transmission of data between network adapters and various central connecting devices.

half duplex

____________________ means that the network adapter will send and receive data but not at the same time.

unicasting

_____________________ describes the situation in which information is sent to one host only. This reduces network traffic greatly, and it also helps with packet loss and duplication.

8P8C

_______________________ - Another name for the RJ45 Port, the most common type of network adapter port.

microsoft visio

__________________________ is a common tool used for network documentation

messaging server

_______________________________ include not just email servers, but also fax, instant messaging, collaborative, and other types of messaging servers. For a Windows Server to control email, special software known as Exchange Server has to be loaded in addition to the operating system.

network documentation

_________________________________ is any information that helps describe, define, and otherwise explain how computers are connected in a physical and logical way. For example, the physical connection could involve cables, and the logical connection could involve the various IP addresses used by the devices on the network.

serial data transfer

__________________________________means the transfer of one bit at a time—in other words, transfer in a single-bit stream. This is the format usually used to send information from one network adapter to another.

Virtual LAN (VLAN)

the ____________________________________ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.

transceive

to transmit and receive, ie: a full duplex connection can _______________ twice as much information per second as a half duplex connection.


संबंधित स्टडी सेट्स

✬4 Software and Platform Services

View Set

Question 6 Briefly discuss three basic causes of accidents in the workplace

View Set

TEAS M.1.4 Solve equations in one variable

View Set

CMA Exam Part 1 Section B: PLanning, Budgeting, and Forecasting

View Set