ITNW 1325 Exam 1 - Chapter 1

Ace your homework & exams now with Quizwiz!

Cloud Computing

Allows users to store personal data, even backup entire hard disk drives on servers over the internet. (Types of clouds can be found on page 38 of the textbook.)

BYOD

Bring Your Own Device; End users having the freedom to use personal tools to access information and communicate across a business or campus network.

Scalability

Can expand quickly to support new users and applications without impacting the performance of the service being delivered to end users.

Converged network

Capable of delivering data, voice & video between many different types of devices over the same network infrastructure.

End devices

Computers, Printer, IP Phone, Wireless Tablet, TelePresence Endpoint

Primary goals of network Security - maintaining Confidentiality, Integrity, Availability (CIA)

Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.

Home options for connecting to the Internet

DSL, Cable, Cellular, Satellite, Dial-Up Telephone.

Corporate options for connecting to the Internet

Dedicated Leased Lines, Metro Ethernet, DSL, Satellite.

Circuit switched networks

Establishes a dedicated circuit between the source and destination before the users may communicate. Traditionally used for voice communications.

4 basic requirements of a reliable network

Fault Tolerance, Scalability, QoS, Security

Logical topology

Identify devices, ports, and addressing scheme.

Physical topology

Identify the physical location of intermediary devices and cable installation.

LAN

Local Area Network - A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.

MAN

Metropolitan Area Network - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.

Peer-to-Peer networks

Not as reliable, good for home/small business

Packet switched networks

Packet switching splits traffic into packets that are routed over a shared network.

Intranet

Private connection of LANs and WANs that often belong to an organization and is designed to be accessible only by the organization's members, employees, or others with authorization.

Extranet

Provides secure and safe access to individuals who work for a different organization, but require access to the organizations data.

QoS

Quality of Service; With a QoS policy in place, the router can manage the flow of data and traffic, giving priority to certain communications if the network experiences congestion.

Intermediary network devices

Router, Firewall, Switch

SAN

Storage Area Network - A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

Types of attacks

Virus, worms and Trojan horses - Malicious software and arbitrary code running on a user device. Spyware and adware - Software installed on a user device that secretly collects information about a user. Zero-day attacks AKA Zero hour attacks - An attack that occurs on the first day that a vulnerability becomes known. Hacker Attacks - An attack by a knowledgeable person to user devices or network resources. Denial of service - Attacks designed to slow or crash applications and processed on a network device. Data interception and theft - An attack to capture private information from an organization's network. Identity theft - An attack to steal the login credentials of a user in order to access private data.

Client/server networks

Web Client & Server, Email Client & Server, File Client & Server.

WAN

Wide Area Network - A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.

WLAN

Wireless LAN - Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.

Be able to use the following commands as necessary in a scenario • Ping • Tracert • ipconfig

ping - Test connectivity to a switch tracert - Used to trace the path that an Internet Protocol (IP) packet takes to its destination. ipconfig - displays the current configuration of the installed IP stack on a networked computer. When used with the /all switch, it displays a detailed configuration report for all interfaces


Related study sets

Intermediate Financial Accounting 2 Exam 2 Review File

View Set

Data Modeling Chapter 2: Data Models

View Set

Big-O Algorithms Time Complexity

View Set

Public Speaking Final Review UNWSP

View Set