CNT 125 Chapter 11

Ace your homework & exams now with Quizwiz!

traffic shaping

-Delaying less-important traffic -Increasing the priority of more-important traffic

traffic policing

-Limiting the volume of traffic flowing in to or out of an interface during a specified time period -Limiting the momentary throughput rate for an interface

Generator

A _________ serves as a backup power source, providing power redundancy in the event of a total blackout. ____________ can be powered by diesel, liquid propane gas, natural gas, or steam.

standby

A __________ UPS provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power from the wall outlet. Upon restoration of power, the ___________ UPS switches the device back to AC power. The problem with a _________ UPS is that, in the brief amount of time it takes the UPS to discover that power from the wall outlet has faltered, a device may have already detected the power loss and shut down or restarted.

protocol analyzer

A _________________, can monitor traffic at a specific interface between a server or client and the network.

network monitor

A __________________ is a tool that continually monitors network traffic.

blackout

A complete power loss.

jabber

A device that handles electrical signals improperly - device always re-transmitting (bad NIC or electrical interference)

DC

A flashlight, uses ______. The batteries in a flashlight have positive and negative poles, and the current always flows at a steady rate in the same direction between those poles,

brownout

A momentary decrease in voltage; also known as a sag. An overtaxed electrical system can be the cause.

surge

A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

FCoE

A newer technology that allows FC to travel over Ethernet hardware and connections. FC frame is encapsulated inside an ______ frame, which is then encapsulated inside an Ethernet frame

online

An __________ UPS uses the AC power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. In other words, a server connected to an __________ UPS always relies on the UPS battery for its electricity.

disaster

An extreme type of incident, involving a network outage that affects more than a single system or limited group of users.

incident

Any event, large or small, that has adverse effects on a network's availability or resources. This could be a security breach, such as a hacker gaining access to a user's account, an infection, such as a worm or virus, or an environmental issue, such as a fire or flood.

managed device

Any network node monitored by the NMS- each object is assigned an OID

SNMP

Application layer protocol that communicates data between the managed device (the agent) and the management console (NMS)

differential backup

Backs up data that has changed since the last full backup

full backup

Backs up everything every time a backup is done

incremental backup

Backs up only data that has changed since the last backup

HSRP

CARP is a free alternative to VRRP (Virtual Router Redundancy Protocol), or Cisco's propriety version called _________. Although VRRP and _______ function somewhat differently than CARP and are used solely for routers, the general idea is the same.

Hot Site

Computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.

Cold Site

Computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.

Warm Site

Computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected.

RAID 1

Data is mirrored—or duplicated—on multiple disks to provide fault tolerance. If one copy is lost, the other copy is still available.

RAID 5

Data is striped across three or more drives, and parity information is added to the data. Parity checking can be used to recreate data from any one drive if that drive fails, even though only one copy of the data is stored.

RAID 0

Data is striped—or written across—multiple disks to improve performance. Provides no real redundancy, in that only one copy of data is stored.

noise

Fluctuation in voltage levels caused by other devices on the network or EMI.

LACP

For multiple NICs or ports to use link aggregation, they must be properly configured in each device's operating system. _______ dynamically coordinates communications between hosts on aggregated connections, kind of like what DHCP does for IP addressing.

promiscuous

In __________ mode, also called monitoring mode, a device driver directs the NIC to pass all frames to the operating system and on to the monitoring software, not just those broadcast or intended for the host.

availability

In the world of networking, the term _____________ refers to how consistently and reliably a connection, system, or other network resource can be accessed by authorized personnel. It's often expressed as a percentage, such as 98% or 99.5%.

in-line monitoring

Install a device, called a network TAP (test access point) or packet sniffer, in line with network traffic.

IB

Like FC, requires specialized network hardware. It's very fast, _____ tends to serve a few niche markets rather than being widely available. ________ falls on the difficult end of the installation and configuration spectrum, and runs on the expensive side as well.

port mirroring

Program a switch to use ________, whereby all traffic sent to any port on the switch is copied to this specified port

wireless monitoring

Run monitoring software on a computer connected wirelessly to the network

trap

SNMP agents can be programmed to detect certain abnormal conditions (port goes down) that prompt the generation of SNMP ________ messages, where the agent sends the NMS unsolicited data once the specified condition (port goes down) on the managed device are met.

error rate

The calculated percentage of how often Bits are damaged in transit due to EMI or other interference

business continuity

The goal of a disaster recovery plan is to ensure ____________, which is the ability of the company to continue doing business with the least amount of interruption possible.

packet drops

The quantity of packets that are dropped due to .... being damaged beyond use, arrive after their expiration, or are not allowed through an interface

CoS

The term QoS refers to techniques that are performed at various OSI layers via several protocols. By contrast, the term ______________ refers only to techniques performed at Layer 2, on Ethernet frames, and is one method of implementing QoS.

baseline

To identify when there's a problem on the network, you must first know what is normal for that network. A(n) ____________ is a report of the network's normal state of operation and might include a range of acceptable measurements.

QoS

To support voice and video traffic on a network, network administrators must pay attention to a network's _________, which is a group of techniques for adjusting the priority a network assigns to various types of transmissions

iSCSI

Transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. It can work on a twisted-pair Ethernet network with ordinary Ethernet NICs. ______ is an evolution of SCSI (Small Computer System Interface), which is a fast transmission standard used by internal hard drives and operating systems in file servers.

syslog

UNIX or Linux based computer log containing monitored device information

RAID 10

Using four or more disks, data is mirrored within each pair of disks, and then striped to multiple pairs of disks.

jitter

When successive packets experience varying amounts of latency, resulting in their arriving out of order

event log

Windows-based computer log containing monitored device information

UPS

_____ is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that prevents undesired fluctuations of the wall outlet's AC power from harming the device or interrupting its services.

AC

_____ power comes from the power station through the wall outlet to a device for it's use.

NAS

________ is a specialized storage device or group of storage devices that provides centralized, fault-tolerant data storage for a network. You can think of _______ as a unique type of server dedicated to data sharing.

SAN

_________ is a distinct network of storage devices that communicate directly with each other and with other networks.

CARP

____________ allows a pool of computers or interfaces to share one or more IP addresses. This pool is known as a group of redundancy or redundancy group. When using _______, one device, acting as the group master, receives requests for an IP address, then parcels out the requests to one of several devices in the group.

DiffServ

____________ is a simple technique that addresses QoS issues by prioritizing traffic at Layer 3. _______ takes into account all types of network traffic, not just the time-sensitive services such as voice and video. That way, it can assign voice streams a high priority and at the same time assign unessential data streams (for example, an employee surfing the Internet on his lunch hour) a low priority.

Network Management

_____________ refers to the assessment, monitoring and maintenance of all aspects of a network.

Spiceworks

______________ is a type of network monitoring software because it can be configured to monitor multiple devices on a network at one time.

Wireshark

______________ is a type of protocol analyzer because it monitors traffic on the interface between a single device and the network.

Clustering

______________ refers to the technique of grouping multiple devices so they appear as a single device to the rest of the network. ____________ can be configured with groups of servers, routers, or applications.

Incident response policy

______________ specifically define the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result. Qualifying incidents take into account the full spectrum of possible events, which might include a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale, environmental disaster that shuts down businesses throughout the city or state. The policy is written with the intent of keeping people safe; protecting sensitive data; ensuring network availability and integrity; and collecting data to determine what went wrong, who is responsible, and what actions should be taken in the future to prevent similar damage.

fault tolerance

___________________ is the capacity for a system to continue performing despite an unexpected hardware or software malfunction.

disaster recovery

____________________ is the process of restoring your critical functionality and data after an outage that affects more than a single system or a limited group of users.

automatic failover

a component that is able to automatically assume the responsibilities of an identical component that fails - example: a backup router automatically assumes the role of a failed router

load balancing

automatic distribution of traffic over multiple connections to optimize performance and fault tolerance

MTTR

average amount of time required to repair the failed device

MTBF

average amount of time that will pass before the next failure is expected to occur

polling

collecting data from multiple network devices on regular intervals

fault management

detection and signaling of device, link, or component failures

failure

deviation from a specified level of system performance for a given period of time

ghosts

frames that are not actually frames - caused by device misinterpreting stray voltage on wire

MIB

list of objects managed by the NMS, as well as the descriptions of these objects - contains data about an object's performance in a database format that can be mined and analyzed

fault

malfunction of one component of a system

utilization

metric refers to the actual throughput used as a percentage of available bandwidth

performance management

monitoring how well links and devices are keeping up with the demands placed on them

giants

packets larger than maximum packet size (more than 1518 bytes)

packet loss

packets lost due to unknown protocol, unrecognized port, network noise - never arrive at destination

runts

packets smaller than minimum packet size (less than 64 bytes)

discarded packets

packets that arrive at destination but are discarded due to buffer overflow, latency, bottlenecks or congestion

interface resets

repeated resets of the connection (interface misconfiguration)

network management agent

software routine that collects information about the device's operation and provides it to the NMS

Fibre Channel

storage networking architecture that runs separately from Ethernet networks to maximize speed of data storage and access. Fiber-optic cable is much more commonly used. Requires special hardware, which makes it an expensive storage connection technology.

NMS

the central collection point .... the management console - the software installed on the management console that collects and displays the data gathered from the managed devices

link aggregation -or- port aggregation

the combination of multiple network interfaces or ports to act as one logical interface


Related study sets

NCOA Managerial Communicator - 1 Managerial Communication

View Set

Final Review Part 2 (intro to vet tech)

View Set

Chapter 4 Section 1 & 2 (History)

View Set

ACT study guide Math: Parallel and Perpendicular Lines

View Set

Ch 8, 9, 10 Career, On the Job, Business

View Set

Modernizing Data lakes and Data Warehouses with GCP

View Set

20.3 The acid dissociation constant Ka

View Set