Introduction to Networking Chapter One- Networking Today

Ace your homework & exams now with Quizwiz!

When data is encoded as pulses of light, which media is being used to transmit the data?

Fiber-optic cable

Which connections are specialized ports on a networking device that connect to individual networks?

Interface

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

LAN

Which connection physically connects the end device to the network?

NIC

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical Topology

Which feature is being used when connecting a device to the network using an electrical outlet?

Powerline

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

QoS

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Antivirus and antispyware

These applications help to protect end devices from becoming infected with malicious software.

Spyware and adware

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

Denial of service attacks

These attacks slow or crash applications and processes on a network device.

Viruses, worms, and Trojan horses

These contain malicious software or code running on a user device.

Access control lists (ACL)

These further filter access and traffic forwarding based on IP addresses and applications.

Intrusion prevention systems (IPS)

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

Dedicated firewall systems

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

These provide secure access into an organization for remote workers.

Data interception and theft

This attack captures private information from an organization's network.

Cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

Extranet

Used to provide secure and safe access to individuals who work for a different organization but require access to the organization's data. Here are some examples of extranets: A company that is providing access to outside suppliers and contractors A hospital that is providing a booking system to doctors so they can make appointments for their patients A local office of education that is providing budget and personnel information to the schools in its district

Which option creates a secure connection for remote workers?

Virtual Private Network (VPN)

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

WAN

Data center

a large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data.

What is an ISP?

an organization that provides access to the Internet for businesses and individuals.

Internet Service Provider (ISP)

an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

Converged networks

apable of delivering data, voice, and video between many different types of devices over the same network infrastructure. This network infrastructure uses the same set of rules, agreements, and implementation standards. Converged data networks carry multiple services on one network.

Medium to large network

can have many locations with hundreds or thousands of interconnected hosts.

Server

computers with software that allow them to provide information, like email or web pages, to other end devices on the network.

Custom clouds

custom cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics, intelligence, and moreover the Internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale.

Collaboration

defined as "the act of working with another or others on a joint project." Collaboration tools, like Cisco WebEx, shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.

End device

either the source or destination of a message transmitted over the network.

Scalable network

expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users. The figure shows how a new network is easily added to an existing network. These networks are scalable because the designers follow accepted standards and protocols. This lets software and hardware vendors focus on improving products and services without having to design a new set of rules for operating within the network.

Client

have software for requesting and displaying the information obtained from the server, as shown in the figure.

Which of the following is the name for all computers connected to a network that participate directly in network communication?

hosts

Logical topology diagram

illustrate devices, ports, and the addressing scheme of the network

Local Area Network (LAN)

A LAN is typically used in a department within an enterprise, a home, or a small business network. a network infrastructure that spans a small geographical area. - LANs have specific characteristics: - LANs interconnect end devices in a limited area such as a home, school, office building, or campus. - A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies. - LANs provide high-speed bandwidth to internal end devices and intermediary devices, as shown in the figure.

Network Interface Card (NIC)

A NIC physically connects the end device to the network.

Community Clouds

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

Physical Port

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Hybrid clouds

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

Threat actor attacks

A malicious person attacks user devices or network resources.

Host

All computers that are connected to a network and participate directly in network communication

Zero-day attacks

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Bring Your Own Device (BYOD)

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

Cellular

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

Which feature contains options such as Public, Private, Custom and Hybrid?

Cloud computing

Private clouds

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

Public clouds

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.

Availability

Data availability assures users of timely and reliable access to data services for authorized users.

Confidentiality

Data confidentiality means that only the intended and authorized recipients can access and read data.

Integrity

Data integrity assures users that the information has not been altered in transmission, from origin to destination.

Metal wires within cables

Data is encoded into electrical impulses.

Glass or plastic fibers within cables (fiber-optic cable)

Data is encoded into pulses of light.

Wireless transmission

Data is encoded via modulation of specific frequencies of electromagnetic waves.

Which attack slows down or crashes equipment and programs?

Denial of Service (DoS)

DSL

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

Extranet

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Extranet

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

Fault Tolerance

Which option blocks unauthorized access to your network?

Firewall

Firewall filtering

Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

Redundancy

Having multiple paths to a destination.

Dedicated Lease Line

Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical Topology

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

Network Infrastructure varies greatly based on...

Size of the area covered Number of users connected Number and types of services available Area of responsibility

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

Spyware

Satellite

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite. Satellite service can provide a connection when a wired solution is not available.

Identity Theft

This attack steals the login credentials of a user in order to access private data.

Metro Ethernet

This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Video communications

Which option describes malicious code running on user devices?

Virus, worm, or trojan horse

Which feature uses the same cellular technology as a smartphone?

Wireless broadband

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero-day or zero hour

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access. Wireless Internet Service Providers (WISPs) are typically found in rural areas where DSL or cable access is not available. A dish or antenna on the property of the subscriber connects wirelessly to a WISP transmitter, eliminating the need for physical cabling outside the buildin

Packet-switched network

a method of grouping data into packets that are transmitted over a digital network. Packets are made of a header and a payload.

Circuit-switched network

a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel through the network before the nodes may communicate.

Wide Area Network (WAN)

a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider. - WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs). - WANs have specific characteristics: - WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. - WANs are usually administered by multiple service providers. - WANs typically provide slower speed links between LANs.

Quality of Service (QoS)

a primary mechanism for managing congestion and ensuring reliable delivery of content to all users. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.The focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.

Intranet

a term often used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization's members, employees, or others with authorization.

Internet

a worldwide collection of interconnected networks (internetworks, or internet for short). A "network of networks".

small office/home office (SOHO)

allows computers in a home office or a remote office to connect to a corporate network, or access centralized, shared resources.

Cloud computing

allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud.

Wireless Internet Service Provider (WISP)

an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.

Physical topology diagram

illustrate the physical location of intermediary devices and cable installation.

Powerline networking

uses existing electrical wiring to connect devices.

Smart home technology

integrates into every-day appliances, which can then connect with other devices to make the appliances more 'smart' or automated. For example, you could prepare food and place it in the oven for cooking prior to leaving the house for the day. You program your smart oven for the food you want it to cook. It would also be connected to your 'calendar of events' so that it could determine what time you should be available to eat and adjust start times and length of cooking accordingly. It could even adjust cooking times and temperatures based on changes in schedule. Additionally, a smart phone or tablet connection lets you connect to the oven directly, to make any desired adjustments. When the food is ready, the oven sends an alert message to you (or someone you specify) that the food is done and warming.

Bring Your Own Device (BYOD)

means any device, with any ownership, used anywhere.

Network bandwidth

measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.

peer-to-peer network

one computer to be used for both roles at the same time. In small businesses and homes, many computers function as the servers and clients on the network.

Fault tolerant network

one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message.

Media

provides the channel over which the message travels from source to destination.

Which two devices are intermediary devices?

routers and switches

Network Architecture

the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used.

Network architecture

the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used.

Peer to peer file sharing

the distribution and sharing of digital media using peer-to-peer networking technology.

Intermediary device

use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.


Related study sets

Diabetes - Part 2 Medications and stuff

View Set

Chem lab 2 Heat of Vaporization of Water

View Set

Mesopotamia, Egypt, Indus, China, Paleolithic/Neolithic

View Set

Chapter 8 Intelligence and Academic Achievement (2400)

View Set

Gaines-Osmosis Practical Practice

View Set

Chapter 20- Acc for leases multiple choice

View Set

Test#1 Ch 57 Peritonitis, Ulcerative colitis, crohn's

View Set

The Nucleus & Cytoplasm (A Histological Perspective)

View Set

Chapter 5 The Structure and Function of Large Biological Molecules

View Set