Cisco CCNA Introduction to Networks v7 (ITN)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Network Inference Card

A NIC physically connects the end device to the network.

extranets

A company that is providing access to outside suppliers and contractors

Physical Port

A connector or outlet on a networking device where the media is connected to an end device or another networking device.

End Devices

A device that is either the source or the destination of a packet on a network.

Network Media

A general term for all forms of pathways that support network communication.

example of extranets #2

A hospital that is providing a booking system to doctors so they can make appointments for their patients

example of extranets #3

A local office of education that is providing budget and personnel information to the schools in its district

Hosts

All computers that are connected to a network and participate directly in network communication are classified as

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

advantages of peer-to-peer networking

Easy to set up Less complexity Lower cost since network devices and dedicated servers may not be required Can be used for simple tasks such as transferring files and sharing printers

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

Extranet

End Devices & Clients

Hosts can be called

peer-to-peer network

In small businesses and homes, many computers function as the servers and clients on the network.

Which connections are specialized ports on a networking device that connect to individual networks?

Interface

Wireless Router, Lan Switch, Router, Multilayer Switch, Firewall Appliance

Intermediary devices

organizations that were developed to help maintain the structure and standardization of internet protocols and processes are:

Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.

Dedicated Leased Line

Leased lines are actually reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

two most common types of network infrastructures are

Local Area Networks (LANs), and Wide Area Networks (WANs)

Modern networks primarily use three types of media to interconnect devices

Metal wires within cables - Data is encoded into electrical impulses. Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of light. Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.

Metro Ethernet

Metro ethernets extend LAN access technology into the WAN.

Which connection physically connects the end device to the network?

NIC (Network Interface Card)

disadvantages of peer-to-peer networking

No centralized administration Not as secure Not scalable All devices may act as both clients and servers which can slow their performance

Topology diagram

Provides a visual reference that indicates the physical connectivity and logical Layer 3 addressing.

Network Infrastructure vary greatly in terms of:

Size of the area covered Number of users connected Number and types of services available Area of responsibility

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

World Wide Networks

The Internet is a network of networks that connects hundreds of millions of computers world-wide.

Email

The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server.

File

The file server stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

levels of access that different groups have to a company

The internet: The World Extranet: Suppliers, Customers, Collaborators Intranet: Company Only

Web

The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server.

Internet Protocol (IP) address

This number identifies the host within a particular network.

Cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

WANS specific characteristics

WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. WANs are usually administered by multiple service providers. WANs typically provide slower speed links between LANs.

Email, Web & File

What are the three common types of server software?

What are the four main criteria for choosing network media?

What is the maximum distance that the media can successfully carry a signal? What is the environment in which the media will be installed? What is the amount of data and at what speed must it be transmitted? What is the cost of the media and installation?

Fiber-optic cable

When data is encoded as pulses of light, which media is being used to transmit the data?

WAN

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

Routers and Switches

Which two devices are intermediary devices?

example of a client software

a web browser, like Chrome or FireFox.

small office/home office (SOHO)

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources

Satellite

can provide a connection when a wired solution is not available.

Servers

computers with software that allow them to provide information, like email or web pages, to other end devices on the network

Small Home Networks

connect a few computers to each other and the internet

Intermediary Devices

connect the individual end devices to the network and can connect multiple individual networks to form an internetwork

WANs can connect through

copper wires, fiber-optic cables, and wireless transmissions

A LAN is typically used in

department within an enterprise, a home, or a small business network

Hosts

devices on the network that are assigned a number for communication purposes

BYOD (bring your own device)

enables end users the freedom to use personal tools to access information and communicate across a business or campus network.

An IP address

identifies the host and the network to which the host is attached.

Logical topology diagrams

illustrate devices, ports, and the addressing scheme of the network (see which end devices are connected to which intermediary devices and what media is being used )

Physical Topology Diagrams

illustrate the physical location of intermediary devices and cable installation (lets you see the actual location of intermediary devices and cable installation?.)

LANs specific characteristics

interconnect end devices in a limited area such as a home, school, office building, or campus. administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies. provide high-speed bandwidth to internal end devices and intermediary devices.

What two security concerns must network administrators address?

network infrastructure security and information security.

WAN

network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider.

LAN

network infrastructure that provides access to users and end devices in a small geographical area

Fault tolerant network

one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs.

how do you actually connect users and organizations to the internet?

popular choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

Quality of Service

prioritize time-sensitive traffic.

Intranets

private company networks that allow employees to easily access, share, and publish information using internet software

DSL

provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Extranet

provide secure and safe access to individuals who work for a different organization but require access to the organization's data.

Intermediary Network Devices perform some or all of these functions

regenerate and retransmit communication signals maintain information about what pathways exist through the network and internetwork. notify other devices of errors and communication failures. direct data along alternate pathways when there is a link failure. classify and direct messages according to priorities. permit or deny the flow of data, based on security settings.

WANs are typically managed by

service providers (SPs) or Internet Service Providers (ISPs).

Medium to Large Networks

used by corporations and schools, can have many locations with hundreds or thousands of interconnected computers

Cellular

uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.


Set pelajaran terkait

Spleen Ultrasound Review -Steven Penny

View Set

RHEL - CHAPTER 6 | Managing Local Users and Groups

View Set

Chapter 30, Engine Starting Systems

View Set

Chapter 20: Genes Within Populations

View Set