Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

3 Functions of Print Servers

1- Provide client access to print resources. 2- Administer print jobs by storing them in a queue until the print device is ready for them and then feeding or spooling the print information to the printer. 3- Provide feedback to users.

3 Steps of Proxy Servers

1. It intercepts the requests. 2. It checks to see if the website content has changed. 3. If not, the proxy server responds to host with the web page.

Workgroup

A collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another.

UTM (Universal Thread Management)

A generic name for an all-in-one security appliance. They include all the functionality of an IDS/IPS as well as stateful firewall services.

VPN (Virtual Private Network)

A private network that connects remote sites or users together over a public network, like the Internet. The most common type is used to access a corporate private network.

LDAP (Lightweight Directory Access Protocol)

A protocol used to allow computers to access data directories that are distributed throughout the network.

Mapping Network Drive

A secure and convenient way to provide easy access to network resources

HTTP (Hypertext Transfer Protocol)

A set of rules for exchanging text, graphic images, sound, and video on the world wide web. Runs on port 80

Magic Packet

A wake-up message

MIMO (Multiple Input Multiple Output)

Additional antennas can be added to increase the potential throughput.

HTTPS (Secure HTTP)

Adds encryption and authentication services using secure Sockets Layer (SSL) or newer Transport Layer Security (TLS). Runs on port 443

FTP (File Transfer Protocol)

Allow for data transfers between a client and a server. The client is an application that runs on a computer that is used to push and pull data from a server

Quad-Band

Allows a cellular phone to operate on all four GSM frequencies: 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz

Quality of Service

Also called 802.1q is a variety of techniques that control the flow of network traffic, improve transmission speeds, and improve real-time communications traffic.

Hidden Shares

Also called Administrative shares, are identified with a dollar sign ($) at the end of the share name.

SFTP (SSH File Transfer Protocol)

As an extension to Secure Shell (SSH) protocol. This can be used to establish a secure file transfer session.

SSID (Service Set Identifier)

Assigned name to a wireless network that is advertised so hosts can discover it, can also be manually entered

Homegroup

Can only be 1 per workgroup on a network and provides a simple method for file and printer sharing, windows vista does not support

GPRS (General Packet Radio Services)

Data service for users of GSM

SMS (Short Message Service)

Data service used to send and receive text messages

MMS (Multimedia Messaging Service)

Data service used to send and receive text messages and can include multimedia content

Permissions

Defines the type of access a user has to a file or folder

IPSs (Intrusion Prevention Systems)

Does not allow packets to enter the trusted side of the network without first being analyzed. It can detect and immediately address a network problem.

Print Servers

Enable multiple computer users to access a single printer

Cellular Technology

Enables the transfer of voice, video, and data

HSDPA (High Speed Downlink Packet Access)

Enhanced 3G access speed

Domain

Group of computers and electronic devices with a common set of rules and procedures administered as a unit

EV-DO (Evolution-Data Optimized)

Improved upload speeds and QoS

Network Components

Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices, and more.

EDGE (Enhanced Data Rates for GSM Evolution)

Increased data rates and improved data reliability

Network Design

Involves knowing how networks are interconnected to support the needs of a business.

Public Network

Network that provides the most protection, used for connecting directly to the internet without a router, Homegroup is not available.

Work Network

Network used for a small office and does not allow for a homegroup to be created or joined

Home Network

Network used when you can trust the other devices, Network discovery is turned on, which allows you to see other people and devices on the network.

IDSs (Intrusion Detection Systems)

Passively monitor traffic on the network.

GSM (Global System for Mobile Communications)

Standard used by the worldwide cellular network

FTPS (File Transfer Protocol Secure)

The client can request the file transfer session be encrypted using TLS. The file server can accept or deny the request.

Netdom-

The command is used to manage computer accounts, join computers to a domain, and perform other domain-specific tasks.

Net-

The command is used to manage network computers, servers, and resources like drives and printers. Net commands use the NetBIOS protocol in Windows. These commands start, stop, and configure networking services.

nbtstat-

The command is used to show statistics, current connections, and services running on local and remote computers.

nslookup

The command tests and troubleshoots DNS servers. It queries the DNS server to discover IP addresses or host names.

tracert

The command traces the route that packets take from your computer to a destination host

Dialup

The modem uses the telephone line to transmit and receive data.

Uploading

The sending of data from the end user to the server.

Link Lights

These are used to indicate if there are is a link connection and if there is activity.

SCP (Secure Copy)

This also uses SSH to secure file transfers.

POTS (Plain old Telephone Service)

Transmits over standard voice telephone lines, extremely slow but available wherever there is landline telephone.

Data Center

Typically a data storage and processing facility run by an in-house IT department or leased offsite.

Cloud Computing

Typically an off-premise service that offers on-demand access to a shared pool of configurable computing resources. These resources can be rapidly provisioned and released with minimal management effort.

Cellular Networks

Use Cellular WAN

ISDN (Integrated Services Digital Network)

Uses POTS line but is faster and better quality because of its digital technology.

Channel

Wireless devices communicate over specific frequency ranges.

Cellular WAN

a user can access the Internet over the cellular network.

Satellite

an alternative for customers who cannot get cable or DSL connections. Does not require a phone line or cable, but uses a satellite dish for two-way communication.

DSL

an always-on service, which means that there is no need to dial up each time you want to connect to the Internet. Uses the existing copper telephone lines to provide high-speed digital data communication between end users and telephone companies.

Cable Internet Connection

does not use telephone lines. Cable uses coaxial cable lines originally designed to carry cable television.

Proxy Servers

have the authority to act as another computer.

WiMax

is an IP-based wireless 4G broadband technology that offers high-speed mobile Internet access for mobile devices, a standard called IEEE 802.16e.

Line of Sight Wireless

is an always-on service that uses radio signals for transmitting Internet access. A clear path between the transmission tower and customer is required.

NAT (Network Address Translation)

is the process used to convert private addresses to Internet-routable addresses / a private (local) source IP address is translated to a public (global) address

Fiber BroadBand

provides faster connection speeds and bandwidth than cable modems, DSL, and ISDN.

Multipurpose Device

provides router, switch, firewall, and access point capabilities, typically called a wireless router.

Wake on Lan

used to wake up a networked computer from a very low power mode state.


Set pelajaran terkait

PSYCH TEST #2: Sensation and Perception

View Set

Wei Intro to Microbiology Exam 5

View Set

Chapter 6: Values, Ethics, and Advocacy

View Set

Exam 1 - Lecture 05 Human Physiology:Skeletal Muscle Contraction

View Set

35. Forms and consequences of paroxysmal tachycardia

View Set

Introduction to Communication - Monroe's Motivated Sequence

View Set