IST 220 Ch1 try 2
host
1: and computer or device on a network that provides a resource such as an application or data. 2: in the context of virtualization the physical computer on which virtualization software operates and manages guest.
local account
A Windows access account that works only on that one computer.
bus topology
A topology in which a single cable connects all nodes on a network without intervening connectivity devices. This would be the switches in a row only
star topology
A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.). There are 3 of these topologies in this pic.
SFTP, Secure file transfer protocol
An encrypted and secure version of FTP is _____ (___).
Remote Desktop, RDP, Remote desktop protocol
In windows operating systems, the windows _______ application uses ____ (___) to provide secure encrypted transmissions that allow a technician to remote in.
Web, email, FTP, Telnet, Remote Desktop, Remote applications
List 6 popular client server applications used on networks and the internet.
HTTP, SMTP, POP3, IMAP4, FTP, Telnet, RDP
List 7 common protocols used in the application layer.
Network
Loosely defined, a ___________ is a group of computers and other devices(such as printers) that ate connected by some type of transmission media.
application, presentation, session, transport, network, data link, physical
Name the 7 layers of OSI from layer 7 to layer 1
Network layer
The 3rd layer in OSI
3
The Network layer is the ____ layer in the OSI
Session layer
The ___ layer describes how data between applications is synced and recovered if messages dont arrive intact at the recieving application.
Data Link layer
The _____ is layer 2 in OSI
VoIP, Voice over IP, skype, google talk, point to point model, point to multipoint model
___(___________) allows two or more people to have voice conversations over a network. Blank is fast replacing traditional telephone services in homes and businesses. For conversational voice, Blank applications such as ____ and _____, use a _____ rather than client server model which means that each computer involved is ______ of the other computers. Additionally, computers engage in a conference call would use a _______, which involves one transmitter and multiple receivers.
P2P, peer to peer network model
___(_______________) is a network in which every computer can communicate directly with every other computer. by default, no computer on blank network has more authority than another. however, each computer can be configured to share only some of its resources and keep other resources and keep other resources inaccessible to other nodes on the network.
switch
____ is a connectivity device that logically subdivides a network into smaller, individual collision domains. A blank operates at the Data link layer of the OSI model and can interpret MAC address information to determine whether to filter or forward packets
youtube
____ is an example of a streaming stored audio and video service that uses a client server model.
CAN, Campus area network
____(_________) a network of connected LANs within a limited geographical area, such as the buildings on a university campus.
LAN, local area network
____(________________) is a network of computers and other devices that typically is confined to a relatively small space, such as one building or even one office. each node on a Blank can communicate directly with others on the same blank
FTP, FTP, File transfer protocol, encryption, CuteFTP, GlobalSCAPE
_____ is a client server application that transfers files between computers, and it primarily uses _____ (____). It does not provide _____ and is therefor not secure. Web browsers can be clients although dedicated client applications such as _______ by _____ offer more features for file transfer than does a browser.
Application layer
_____ layer of OSI where protocols enable software programs to negotiate formatting, procedural, security, synchronization and other requirements with the network.
MAN, metropolitan area network
_____(_____________) a network of connected LANs within a limited geographical area, such as multiple city government buildings around a city's center.
AD DS, Active directory domain services
_____(______________)The active directory service that manages the process that allows a user to sign on to a network from any computer on the network and get access to the resources that active directory allows
UC, Unified communications
______ (_____________) refers to the centralized management of multiple network based communications. For example a company might use one software to manage intraoffice phone calls, long distance phone calls, cell phone calls bla bla of all the users on the network.
client server
______ network has these benefits. user accounts and passwords to the network are assigned in one place, access to multiple shared resources(such as data files or printers) can be centrally granted to a single user or groups of users, problems on the network can be monitored diagnosed and often fixed from one location, they are more scalable
RTP, Real time transport protocol, UDP, time
______(_____________) is An application layer protocol used with voice and video protocol. Blank operates on top of ____ and provides information about packet sequence to help receiving nodes detect delay and packet loss. It also assigns packets a ____ stamp that corresponds to when the data in the packet was sampled from the voice or video stream
Client server application, client, server
_______ involves two computers. The first, a ____ computer, requests data or a service from the second computer called a _______
ring topology, token
a network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle. Data is transmitted in one direction around the ring. Each workstation accepts and responds to packets addressed to it. then forwards the other packets to the next workstation in the ring. It uses something called a _____ to orderly pass data around.
star topology
a physical topology in which every node on the network is connected through a central device
global account
a users domain level account also called a global username or network ID, which is assigned by the network administrator and is kept in Active directory.
node
any computer or other device on a network that can be addressed on the local network.
NOSs, Network operating systems
client server model requires one or more _______(_______________________). This is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.
operating system
controlling how users and programs get access to the resources on a network is a function of the__________ on the network.
Payload
data that is passed between applications or utility programs and the operating system, and includes control information.
not scalable, not secure, not practicle
disadvantages to a peer to peer network are that they are _____, ______, and ______ for connecting more than a few computers.
combo device
home LANs can use a ____ device to act as both a switch and a router
topology
how the parts of a whole work together
domain
in the context of windows server NOSs, a group of users, servers, and other resources that share account and security policies through a windows server NOS is what?
Physical Layer
layer 1 of the OSI
Transport layer
layer 4 is what in OSI
Session layer
layer 5 of the OSI model is
Presentation layer
layer 6 of the OSI model is what
Application Layer
layer 7 of the OSI is what
7
the Application layer is what layer of the OSI
7
the OSI model has ____ layers
Presentation layer
the _______ layer of the OSI is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
active directory
the centralized directory database that contains user account information and security for the entire group of computers on a network
NIC, Network interface Card
the device that enables a workstation to connect to the network and communicate with other computers
switch, router
the fundamental difference between a switch and a router is that a _____ only belongs to its local network and a _____ belongs to two or more local networks.
Apache, UNIX, Internet information services, IIS, Windows server
the most popular web server is ____ which primarily runs on ____ systems and the second most popular is ____ (____) which is embedded in the _______ operating system
UNIX, Linux, Microsoft windows server
the most populate operating systems for client server model are ?(3)
1
the physical layer is what number in OSI
physical topology
the physical layout of the media, nodes, and devices on a network. A physical topology does not specify device types, connectivity methods, or addressing schemes.
HTTP
the primary protocol used by web servers and browsers is _____
Qos, quality of service
the result of specifications for guaranteeing data delivery within a certain period of time after their transmission. Something a network administrator must pay attention to.
loss tolerant
transmissions that can tolerate occasional loss of data without compromising the user experience
delay sensitive
transmissions that will suffer significantly compromised user experienced if portions of the transmission are delayed, such as with voice and video transmissions.
VTC, Video teleconference, skype, google talk, multicast distribution, Session, RTP, Real time transport protocol
A ______ (________________) application such as ___ or ____ allows people to communicate in video an voice, primarily using the point to multipoint model. on the other hand when you watch a sports event the application is using a client server model called a _____. The ____ layer protocol that is specifically designed to transmit audio and vieo and that works in conjunction with VoIP is ____(__________)
NOS
A ______ (acronym) is responsible for managind data and other resources for a number of clients, ensuring that only authorized users access the network, controlling which types of files a user can access the network, controlling which types of files a user can open and read, restricting when and from where users con access the network, dictating which rules computers will use to communicate, in some situations, supplying applications and data files to clients
Remote application, Remote desktop services, terminal services, RDP, memory, CPU speed, technical
A _______ is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows server 2008 and later included ________ to manage the blank applications, and versions of windows server prior to 2008 provided _____. Both use ___ (hit protocol) to present the remote application and its data to the client. Blank1 are becoming popular because most of the computing power which is (_____ and _____) and the ______ support are focused on the server in a centralized location, which means the client computers require less computing power and desk-side support.
a network of networks
A backbone is sometimes refered to as a ____
logical topology
A characteristic of network transmission that reflects the way in which data is transmitted between nodes.
network adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.
star bus topology
A hybrid topology in which groups of workstations are connected in a star fashion to connectivity devices that are networked via a single bus.
router
A layer 3 dvice that uses logical addressing information to direct data between two or more networks and can help find the best path for traffic to get from one network to another
WAN, Wide area network
A network that spans a long distance and connects two or more LANs.
hybrid topology
A physical topology that combines characteristics of more than one simple physical topology.
onboard network port
A port that is integrated into a computer's motherboard.
Protocols
A set of rules and methods governing the exchange or transmission of data between devices.
PAN, personal area network
A small network consisting of personal devices at close range; the devices can include cell phones, PDAs, and notebook computers.
2
Data link layer is what layer number in OSI
Two, SMTP, Simple Mail Transfer Protocol, SMTP, SMTP, POP3, post office protocol version 3, IMAP4, internet message access protocol version 4, POP3, IMAP4, Microsoft exchange server, outlook
Email is a client server application that involves ___ servers. The client uses ____ (___) to send an email message to the first server, which sometimes is called the ______ server. the first server then sends the message on to the receiver's mail server using ______ (hint protocol). The reciepient's mail server delivers the message using one of two protocols the _____ (____) or ______ (____). Using ______, email is downloaded to the client computer. Using ______, the client application manages the email stored on the server. A popular email server application is _____. And a popular client application is called _____
Windows server 2012 R2, Ubuntu server, Red Hat, linux
Examples of NOSs are ______, _____ and ____. The last two are versions of _____.
15, simple, less expensive
Generally if the network supports fewer than ____ computers, a peer to peer network is the way to go. the following are advantages. They are ______ to configure. They are often ____ to set up and maintain.
Hypertext Transfer Protocol
HTTP
HTTP secure
HTTPS stands for ____
ISO, International Organization for Standardizations
OSI model was first developed by ____(___________________)
Open systems interconnection
OSI stands for?
6
Presentation layer is what layer of the OSI
Redundant array of independent disks
Raid stands for
Telnet, remote in, ssh
The ______ protocol is used by the telnet client server command line application to allow an administrator or other user to "______" or control a computer remotely. Telnet is included in many operating systems, but transmissions in Telnet are not encrypted, which has caused Telnet to be largely replaced by other more secure programs, such as the ____ command in the Linux system.
Bandwidth
The amount of traffic, or data transmission activity on a network. Also a measure of the difference between the highest and lowest frequencies that a medium can transmit
Internet
The largest network of all is the _____ and is made up of millions of computers
scalable
The property of a network that allows you to add nodes or increase its size easily.
Network Services
The resources a network makes available to its users, including applications and the data provided by these applications.
5
The session layer is what layer of the OSI
Secure Shell, SSH, tunnel
The ssh command in Linux uses the ________ (____hint abbreviation) protocol, which creates a secure channel or ____ between two computers.
TCP/IP
The suite of networking protocols that includes TCP, IP, UDP and many others. it provides the foundation for data exchange across the internet
file services, file server
The term _____ refers to a servers ability to share data files and disk storage space. A computer that provides this is called a ______, and serves up data to users. Data stored at a central location is typically more secure because a network administrator can take charge of backing up this data, rather than relying on the individual users to make their own backups
4
The transport layer is what layer in OSI
daisy chained, backbone
These switches are ______ together and for the _____ of this network
conversational voice, streaming live audio and video, streaming stored audio and video,
Three types of communication services your network might support are ?
SSL (Secure sockets layer), TLS(transport layer security)
Two examples of encryption protocol used by HTTPS are ? hint XXX(bla bla bal)
TCP, Transmission control protocol, IP, Internet protocol
Two primary protocols used on a network are _____(_____________), _____(_____________)
print services
Using _______ to share printers across a network saves time and money.
homegroup
Using a _________, each computer shares files, folders, libraries and printers with other computers in the Blank. A Blain limits how sharing can be controlled for individual users because any user of any computer in the Blank can access Blank resources
convergence
Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as _______.
folder and file sharing
Using windows _________, each computer maintains a list of users and their rights on that particular PC. Windows allows a user on the network to access local resources based on these assigned rights.
HTTPS
When you layer HTTP on top of an encryption protocol you get _____