module 6
bus topology
(also called "linear bus") connects nodes along a network segment, but the ends of the cable are not connected, as they are in a ring topology
mesh topology
(also called "plex" or "interconnected"), every node (which can differ in size and configuration from the others) is connected to every other node.
hierarchal topology
(also called a "tree") combines computers with different processing strengths in different organizational levels.
mobile network
(also called a cellular network) is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter, known as a cell site or base station
Worldwide Interoperability for Microwave Access (WiMAX)
a broadband wireless technology based on the IEEE 802.16 standards. It is designed for wireless metropolitan area networks and usually has a range of about 30 miles for fixed stations and 3-10 miles for mobile stations.
packet
a collection of binary digits- including message data and control characters for formatting and transmitting- sent from computer to computer over a network
digital subscriber line
a common carrier service, is a high-speed service that uses ordinary phone lines
controller
a hardware and software device that controls data transfer from a computer to a peripheral device (examples are a monitor, a printer, or a keyboard) and vice versa.
network interface card
a hardware component that enables computers to communicate over a network
multiplexer
a hardware device that allows several nodes to share one communication channel
A typical data communication system includes all of the following components except: a local area network modems or routers communication medium(channel) sender and receiver devices
a local area network
router
a network connection device containing software that connects network systems and controls traffic flow between them
wireless network
a network that uses wireless instead of wired technology
Open Systems Interconnection (OSI) model
a seven-layer architecture for defining how data is transmitted from computer to computer in a network, from the physical connection to the network to the applications that users run. It also standardizes interactions between network computers exchanging information.
narrowband
a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time
All of the following are true about telepresence except:
a.Telepresence incorporates network convergence and virtual reality *b.Telepresence does not require retrofitting classrooms and equipment* c.Telepresence rooms are environments that offer videoconferencing that allow students to feel like they are in the same room d.Telepresence includes the use of remote-controlled, audio-visual robots with wireless internet connectivity, such as a wheeled tablet
Transmission Control Protocol/Internet Protocol (TCP/IP)
an industry-standard suite of communication protocols that enables interoperability.
Troubleshooting data networks can be more efficient when analyzing what layer of the OSI model is showing problematic symptoms. To apply the OSI model in your troubleshooting efforts, you need to thoroughly understand what tasks are accomplished at each layer. Identify which OSI layer is most relevant to the problem described in each scenario.
application layer Your web browser freezes and is nonresponsive. transport layer A downloaded file is corrupted due to missing data. network layer Your Web browser can't find a particular Web server and reports a routing error. physical layer Rats chew through a critical network cable.
n-tier architecture
attempts to balance the workload between client and server by removing application processing from both the client and server and placing it on a middle-tier server
Effective data communication relies on many components to function collaboratively and reliably. When troubleshooting network problems, you'll need to be able to identify which component is most likely causing the problem based on the symptoms you're observing. Identify the most likely issue causing the problem in each scenario.
attenuation Randy can't get a strong enough Wi-Fi signal to connect to the network. line of sight Tamara is frustrated that her satellite signal gets lost during a thunderstorm. modem Dante's home router reports that it's not connected to the Internet. broadband Karen's Internet connection slows down every evening when her neighbors are home from work and playing online games or streaming movies. bandwidth Casey is downloading a large number of high-resolution images from a file server, and the download process is taking a long time.,
dynamic router
can build tables that identify addresses on each network
wide area network
can span several cities, states, or even countries, and it is usually owned by several different parties
local area network
connects workstations and peripheral devices that are in close proximity
broadband
data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate
metropolitan area network
designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well
decentralized proccessing
each user, department, or division has its own computer (sometimes called an "organizational unit") for performing processing tasks.
To improve the efficiency and quality of digital communications, Time Division Multiple Access (TDMA) divides each channel into two time slots. True or False?
false; six time slots
One of the following has the highest bandwidth of any communication medium: fiber-optic cable twisted pair copper cable coaxial cable microwave
fiber-optic cable
routing table
generated automatically by software, is used to determine the best possible route for a packet
You're setting up a Web site for a new marketing division of your company. It's a small, innovative marketing team that will be experimenting with some new customer relationship building techniques, and the Web site is expected to play a key role in this process. Your company's VP of Marketing is checking in with you for updates on the site's deployment. VP: You mentioned in your email update that the site is fully built and ready for beta testing. How can I access the site? You: We've not yet made the site publicly available, but you can go directly to its____________, which I'll send you in an email. Just enter that information directly in your browser's address bar.
ip address
distributed processing
maintains centralized control and decentralized operations. Processing power is distributed among several locations.
Your office manager has come to you with a problem getting a new employee's tablet connected to the network. Your company maintains a BYOD policy, and employees frequently choose to use their own devices to maximize their mobility during the workday and availability in their off hours. Office manager: Regina's tablet won't connect to the company network. I can't figure out how to make it find the right login page. You: It looks like her tablet is connected to her cell phone provider's __________ . We need to switch this over to our local Wi-Fi.
mobile network
ring topology
no host computer is required because each computer manages its own connectivity
centralized routing
one node is in charge of selecting the path for all packets. This node, considered the network routing manager, stores the routing table, and any changes to a route must be made at this node.
communication media
or channels, connect sender and receiver devices. They can be conducted or radiated.
Which of the following layer of the OSI model is responsible for formatting message packets: presentation transport session application
presentation
conducted media
provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics
distributed routing
relies on each node to calculate its own best possible route. Each node contains its own routing table with current information on the status of adjacent nodes so packets can follow the best possible route.
network topology
represents a network's physical layout, including the arrangement of computers and cables
static router
requires the network routing manager to give it information about which addresses are on which network
Trevor is setting up a Wi-Fi network in a small office for access by staff and customers. Customer access needs to be separate from staff access, and all network access needs to be secured. What setting should Trevor change to ensure no one else can make changes to the network configuration?
router password
VP: I didn't know you could go directly to a Web site like that. How does that work? You: Normally, of course, you'd enter the Web site name, and the router would have to figure out how to find the Web server's address. This way, the router just has to check its ___________for information on what to do with that address.
routing table
protocols
rules that govern data communication, including error detection, message length, and transmission speed
VP: If that address is all the information needed for Internet users to find our servers, how can we protect other servers in our network, especially those that hold sensitive company information? You: There are many layers of security in place to prevent that from happening. One of the most important is ____________ , where we can isolate portions of our network for privacy.
segmentation
throughput
similar to bandwidth. It is the amount of data transferred or processed in a specified time, usually one second.
client/server model
software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client requests.
Trevor can set a separate _______for the customer Wi-Fi network that requires a different, less secure password.
ssid
centralized processing
system, all processing is done at one central computer
bandwidth
the amount of data that can be transferred from one point to another in a certain time period, usually one second
data communication
the electronic transfer of data from one location to another
Attenuation
the loss of power in a signal as it travels from the sending device to the receiving device
routing
the process of deciding which path to take on a network. This is determined by the type of network and the software used to transmit data.
Office provider: But her cellular provider gives Internet access. So how does switching to Wi-Fi help us? You: First of all, our Wi-Fi will almost definitely give her better ____________ than the cell network. But also, connecting to our Wi-Fi is the easiest way to access our authentication server so she can sign into our network and access our company resources.
throughput
In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False?
true
In the two-tier architecture of the client/server model, a client (tier one) communicates directly with the server (tier two). True or False?
true
radiated media
use an antenna for transmitting data through air or water
star topology
usually consists of a central computer (host computer, often a server) and a series of nodes (typically, workstations or peripheral devices).
bluetooth
which can be used to create a personal area network (PAN), is a wireless technology for transferring data over short distances (usually within 30 feet) for fixed and mobile devices.
What kind of security technology should Trevor configure for both networks to provide optimal data protection?
wpa2
modem
(short for "modulator-demodulator") is a device that connects a user to the Internet.
two-tier architecture
(the most common type), a client (tier one) communicates directly with the server (tier two)
Office manager: That makes sense about accessing the network authentication server—I didn't even think about that. But Regina's tablet is ____________ capable, so it might actually be a step down for her on performance. You: That's a good point—at least until we update our Wi-Fi to the latest speeds. Until then, we'll set her up for remote access so she can use her cell network whenever she wants.
5g
Wireless Fidelity (Wi-Fi)
A broadband wireless technology. Information can be transmitted over short distances - typically 120 feet indoors and 300 feet outdoors - in the form of radio waves
convergence
In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making.
time division multiple access
To improve the efficiency and quality of digital 45. communications, Time Division Multiple Access (TDMA) divides each channel into six time slots. Each user is allocated two slots: one for transmission and one for reception. This method increases efficiency by 300 percent, as it allows carrying three calls on one channel.
Code Division Multiple Access (CDMA)
To improve the efficiency and quality of digital communications, Code Division Multiple Access (CDMA) transmits multiple encoded messages over a wide frequency and then decodes them at the receiving end.