IST 220 Ch1 try 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

host

1: and computer or device on a network that provides a resource such as an application or data. 2: in the context of virtualization the physical computer on which virtualization software operates and manages guest.

local account

A Windows access account that works only on that one computer.

bus topology

A topology in which a single cable connects all nodes on a network without intervening connectivity devices. This would be the switches in a row only

star topology

A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.). There are 3 of these topologies in this pic.

SFTP, Secure file transfer protocol

An encrypted and secure version of FTP is _____ (___).

Remote Desktop, RDP, Remote desktop protocol

In windows operating systems, the windows _______ application uses ____ (___) to provide secure encrypted transmissions that allow a technician to remote in.

Web, email, FTP, Telnet, Remote Desktop, Remote applications

List 6 popular client server applications used on networks and the internet.

HTTP, SMTP, POP3, IMAP4, FTP, Telnet, RDP

List 7 common protocols used in the application layer.

Network

Loosely defined, a ___________ is a group of computers and other devices(such as printers) that ate connected by some type of transmission media.

application, presentation, session, transport, network, data link, physical

Name the 7 layers of OSI from layer 7 to layer 1

Network layer

The 3rd layer in OSI

3

The Network layer is the ____ layer in the OSI

Session layer

The ___ layer describes how data between applications is synced and recovered if messages dont arrive intact at the recieving application.

Data Link layer

The _____ is layer 2 in OSI

VoIP, Voice over IP, skype, google talk, point to point model, point to multipoint model

___(___________) allows two or more people to have voice conversations over a network. Blank is fast replacing traditional telephone services in homes and businesses. For conversational voice, Blank applications such as ____ and _____, use a _____ rather than client server model which means that each computer involved is ______ of the other computers. Additionally, computers engage in a conference call would use a _______, which involves one transmitter and multiple receivers.

P2P, peer to peer network model

___(_______________) is a network in which every computer can communicate directly with every other computer. by default, no computer on blank network has more authority than another. however, each computer can be configured to share only some of its resources and keep other resources and keep other resources inaccessible to other nodes on the network.

switch

____ is a connectivity device that logically subdivides a network into smaller, individual collision domains. A blank operates at the Data link layer of the OSI model and can interpret MAC address information to determine whether to filter or forward packets

youtube

____ is an example of a streaming stored audio and video service that uses a client server model.

CAN, Campus area network

____(_________) a network of connected LANs within a limited geographical area, such as the buildings on a university campus.

LAN, local area network

____(________________) is a network of computers and other devices that typically is confined to a relatively small space, such as one building or even one office. each node on a Blank can communicate directly with others on the same blank

FTP, FTP, File transfer protocol, encryption, CuteFTP, GlobalSCAPE

_____ is a client server application that transfers files between computers, and it primarily uses _____ (____). It does not provide _____ and is therefor not secure. Web browsers can be clients although dedicated client applications such as _______ by _____ offer more features for file transfer than does a browser.

Application layer

_____ layer of OSI where protocols enable software programs to negotiate formatting, procedural, security, synchronization and other requirements with the network.

MAN, metropolitan area network

_____(_____________) a network of connected LANs within a limited geographical area, such as multiple city government buildings around a city's center.

AD DS, Active directory domain services

_____(______________)The active directory service that manages the process that allows a user to sign on to a network from any computer on the network and get access to the resources that active directory allows

UC, Unified communications

______ (_____________) refers to the centralized management of multiple network based communications. For example a company might use one software to manage intraoffice phone calls, long distance phone calls, cell phone calls bla bla of all the users on the network.

client server

______ network has these benefits. user accounts and passwords to the network are assigned in one place, access to multiple shared resources(such as data files or printers) can be centrally granted to a single user or groups of users, problems on the network can be monitored diagnosed and often fixed from one location, they are more scalable

RTP, Real time transport protocol, UDP, time

______(_____________) is An application layer protocol used with voice and video protocol. Blank operates on top of ____ and provides information about packet sequence to help receiving nodes detect delay and packet loss. It also assigns packets a ____ stamp that corresponds to when the data in the packet was sampled from the voice or video stream

Client server application, client, server

_______ involves two computers. The first, a ____ computer, requests data or a service from the second computer called a _______

ring topology, token

a network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle. Data is transmitted in one direction around the ring. Each workstation accepts and responds to packets addressed to it. then forwards the other packets to the next workstation in the ring. It uses something called a _____ to orderly pass data around.

star topology

a physical topology in which every node on the network is connected through a central device

global account

a users domain level account also called a global username or network ID, which is assigned by the network administrator and is kept in Active directory.

node

any computer or other device on a network that can be addressed on the local network.

NOSs, Network operating systems

client server model requires one or more _______(_______________________). This is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.

operating system

controlling how users and programs get access to the resources on a network is a function of the__________ on the network.

Payload

data that is passed between applications or utility programs and the operating system, and includes control information.

not scalable, not secure, not practicle

disadvantages to a peer to peer network are that they are _____, ______, and ______ for connecting more than a few computers.

combo device

home LANs can use a ____ device to act as both a switch and a router

topology

how the parts of a whole work together

domain

in the context of windows server NOSs, a group of users, servers, and other resources that share account and security policies through a windows server NOS is what?

Physical Layer

layer 1 of the OSI

Transport layer

layer 4 is what in OSI

Session layer

layer 5 of the OSI model is

Presentation layer

layer 6 of the OSI model is what

Application Layer

layer 7 of the OSI is what

7

the Application layer is what layer of the OSI

7

the OSI model has ____ layers

Presentation layer

the _______ layer of the OSI is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

active directory

the centralized directory database that contains user account information and security for the entire group of computers on a network

NIC, Network interface Card

the device that enables a workstation to connect to the network and communicate with other computers

switch, router

the fundamental difference between a switch and a router is that a _____ only belongs to its local network and a _____ belongs to two or more local networks.

Apache, UNIX, Internet information services, IIS, Windows server

the most popular web server is ____ which primarily runs on ____ systems and the second most popular is ____ (____) which is embedded in the _______ operating system

UNIX, Linux, Microsoft windows server

the most populate operating systems for client server model are ?(3)

1

the physical layer is what number in OSI

physical topology

the physical layout of the media, nodes, and devices on a network. A physical topology does not specify device types, connectivity methods, or addressing schemes.

HTTP

the primary protocol used by web servers and browsers is _____

Qos, quality of service

the result of specifications for guaranteeing data delivery within a certain period of time after their transmission. Something a network administrator must pay attention to.

loss tolerant

transmissions that can tolerate occasional loss of data without compromising the user experience

delay sensitive

transmissions that will suffer significantly compromised user experienced if portions of the transmission are delayed, such as with voice and video transmissions.

VTC, Video teleconference, skype, google talk, multicast distribution, Session, RTP, Real time transport protocol

A ______ (________________) application such as ___ or ____ allows people to communicate in video an voice, primarily using the point to multipoint model. on the other hand when you watch a sports event the application is using a client server model called a _____. The ____ layer protocol that is specifically designed to transmit audio and vieo and that works in conjunction with VoIP is ____(__________)

NOS

A ______ (acronym) is responsible for managind data and other resources for a number of clients, ensuring that only authorized users access the network, controlling which types of files a user can access the network, controlling which types of files a user can open and read, restricting when and from where users con access the network, dictating which rules computers will use to communicate, in some situations, supplying applications and data files to clients

Remote application, Remote desktop services, terminal services, RDP, memory, CPU speed, technical

A _______ is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows server 2008 and later included ________ to manage the blank applications, and versions of windows server prior to 2008 provided _____. Both use ___ (hit protocol) to present the remote application and its data to the client. Blank1 are becoming popular because most of the computing power which is (_____ and _____) and the ______ support are focused on the server in a centralized location, which means the client computers require less computing power and desk-side support.

a network of networks

A backbone is sometimes refered to as a ____

logical topology

A characteristic of network transmission that reflects the way in which data is transmitted between nodes.

network adapter

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.

star bus topology

A hybrid topology in which groups of workstations are connected in a star fashion to connectivity devices that are networked via a single bus.

router

A layer 3 dvice that uses logical addressing information to direct data between two or more networks and can help find the best path for traffic to get from one network to another

WAN, Wide area network

A network that spans a long distance and connects two or more LANs.

hybrid topology

A physical topology that combines characteristics of more than one simple physical topology.

onboard network port

A port that is integrated into a computer's motherboard.

Protocols

A set of rules and methods governing the exchange or transmission of data between devices.

PAN, personal area network

A small network consisting of personal devices at close range; the devices can include cell phones, PDAs, and notebook computers.

2

Data link layer is what layer number in OSI

Two, SMTP, Simple Mail Transfer Protocol, SMTP, SMTP, POP3, post office protocol version 3, IMAP4, internet message access protocol version 4, POP3, IMAP4, Microsoft exchange server, outlook

Email is a client server application that involves ___ servers. The client uses ____ (___) to send an email message to the first server, which sometimes is called the ______ server. the first server then sends the message on to the receiver's mail server using ______ (hint protocol). The reciepient's mail server delivers the message using one of two protocols the _____ (____) or ______ (____). Using ______, email is downloaded to the client computer. Using ______, the client application manages the email stored on the server. A popular email server application is _____. And a popular client application is called _____

Windows server 2012 R2, Ubuntu server, Red Hat, linux

Examples of NOSs are ______, _____ and ____. The last two are versions of _____.

15, simple, less expensive

Generally if the network supports fewer than ____ computers, a peer to peer network is the way to go. the following are advantages. They are ______ to configure. They are often ____ to set up and maintain.

Hypertext Transfer Protocol

HTTP

HTTP secure

HTTPS stands for ____

ISO, International Organization for Standardizations

OSI model was first developed by ____(___________________)

Open systems interconnection

OSI stands for?

6

Presentation layer is what layer of the OSI

Redundant array of independent disks

Raid stands for

Telnet, remote in, ssh

The ______ protocol is used by the telnet client server command line application to allow an administrator or other user to "______" or control a computer remotely. Telnet is included in many operating systems, but transmissions in Telnet are not encrypted, which has caused Telnet to be largely replaced by other more secure programs, such as the ____ command in the Linux system.

Bandwidth

The amount of traffic, or data transmission activity on a network. Also a measure of the difference between the highest and lowest frequencies that a medium can transmit

Internet

The largest network of all is the _____ and is made up of millions of computers

scalable

The property of a network that allows you to add nodes or increase its size easily.

Network Services

The resources a network makes available to its users, including applications and the data provided by these applications.

5

The session layer is what layer of the OSI

Secure Shell, SSH, tunnel

The ssh command in Linux uses the ________ (____hint abbreviation) protocol, which creates a secure channel or ____ between two computers.

TCP/IP

The suite of networking protocols that includes TCP, IP, UDP and many others. it provides the foundation for data exchange across the internet

file services, file server

The term _____ refers to a servers ability to share data files and disk storage space. A computer that provides this is called a ______, and serves up data to users. Data stored at a central location is typically more secure because a network administrator can take charge of backing up this data, rather than relying on the individual users to make their own backups

4

The transport layer is what layer in OSI

daisy chained, backbone

These switches are ______ together and for the _____ of this network

conversational voice, streaming live audio and video, streaming stored audio and video,

Three types of communication services your network might support are ?

SSL (Secure sockets layer), TLS(transport layer security)

Two examples of encryption protocol used by HTTPS are ? hint XXX(bla bla bal)

TCP, Transmission control protocol, IP, Internet protocol

Two primary protocols used on a network are _____(_____________), _____(_____________)

print services

Using _______ to share printers across a network saves time and money.

homegroup

Using a _________, each computer shares files, folders, libraries and printers with other computers in the Blank. A Blain limits how sharing can be controlled for individual users because any user of any computer in the Blank can access Blank resources

convergence

Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as _______.

folder and file sharing

Using windows _________, each computer maintains a list of users and their rights on that particular PC. Windows allows a user on the network to access local resources based on these assigned rights.

HTTPS

When you layer HTTP on top of an encryption protocol you get _____


Set pelajaran terkait

AP Enviro 15.3-15.4: what are the advantages and disadvantages of natural gas, what are the advantages and disadvantages of coal

View Set

Ch. 9: WONG: Health Promotion of the Infant and Family

View Set

Principles of Business Admin. PI: Operations

View Set

MAOR102 definitions + more, Te Koparapara Chapter 7, Te Koparapara Chapter 4, Te Koparapara Chapter 8, MAOR102 Lecture 1, MAOR102 Lecture 2, MAOR102 Lecture 3, MAOR102 Lecture 4, MAOR102 Lecture 5, MAOR102 Lecture 6, MAOR102 Lecture 7, MAOR102 Lectur...

View Set