NET-125 Chapter 1

Ace your homework & exams now with Quizwiz!

MAN (Metropolitan Area Network)

(A) a geographic network that covers a large area like a city or community may be used to connect computers in libraries government agencies etc together no more than 30 miles in size

LAN (Local Area Network)

(B) type of network used to describe computers that are connected in a single physical location

WLAN (Wireless Local Area Network)

(C) A self-contained network of two or more computers connected using a wireless connection.

WAN (Wide area network )

(D) a network infrastructure that provides access to other networks over a large geographic area

fault tolerance

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Which statement describes a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

logical topology

A topology that describes the data-flow patterns in a network.

cellular

Access via the cell phone network

VPN

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

Security

Business and Personal data and network equipment must be protected

end devices

Computers, Network printers, VoIP phones, TelePresence endpoint, Security cameras, Mobile handheld devices

Spyware

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

two characteristics of a scalable network

Grows in size without impacting existing users. Contains modular devices that allow for expansion

Internal

Leaving your username and/or password on a note near your laptop is an example of what type of threat to an organization?

The Internet

Network or Networks. LANs and WANs may be connected to internetwork

network media

Provides a channel for messages to travel from source to destination. The conduit through which signals flow, can be either bounded or unbounded, fiber optic, copper, wireless

End devices

Provides the interface between the human and the network - A device that is either the source or the destination of a packet on a network.

physical topology

The actual layout of network devices, wires, and cables.

Intrusion prevention systems (IPS

These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.

Firewall filtering

This is used to block unauthorized access to the network.

Which three devices are considered end devices in a network?

VoIP phone, security camera, TelePresence endpoint

data center

a facility used to store information originating from users or organizations

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

QoS (quality of service)

a mechanism to manage the flow of traffic based on different requirements to ensure reliable delivery of each type of traffic

fault tolerance

a network characteristic that restricts the impact of a failure on network access and allows a network to recover quickly from the failure

extranet

a network that provides safe and secure access to an organization's data to authorized people who work outside that organization

converged network

a network with the capability of delivering traffic with different requirements but with the use of the same network infrastructure

Intranet

a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

Intranet

a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.

intranet

a private interconnection of LANs and WANs inside an organization that can only be accessed by organization members or by non-members with authorization

podcasting

a technology that allows people to access a website and download an audio recording delivered by someone

peer-to-peer network

a type of network in which computers can perform the role of a server and a client at the same time

wiki

a web page that can be created and edited by a group of people

Cloud Computing

allows us to store personal files, even backup our entire hard disk drive on servers over the Internet.

Hacker attacks

an attack by a knowledgeable person to user devices or network resources

Zero-day attacks, also called zero-hour attacks

an attack that occurs on the first day that a vulnerability becomes known

Data interception and theft

an attack to capture private information from an organization's network

Identity theft

an attack to steal the login credentials of a user in order to access private data

Powerline Networking

an emerging trend for home networking that uses existing electrical wiring to connect devices, as shown in the figure.

ISP

an organization that enables individuals and businesses to connect to the Internet.

Denial of service attacks

attacks designed to slow or crash applications and processes on a network device

SDSL (symmetrical digital subscriber line)

business class service that provides the same uploads and download speeds over telephone lines

How are LANs administered?

by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level.

How are WANs administered?

by multiple service providers.

Human network

centers on the impact of the Internet and networks on people and businesses.

intermediary

connects in the center between packet source and packet destination

network components

devices, media, services

Advantages of a peer to peer network

easy set up, less complexity, lower cost, simple tasks

scalability

expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Ethernet WANs

extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later chapter. The benefits of Ethernet are now being extended into the WAN.

availability

having the assurance of timely and reliable access to data services for authorized users.

Integrity

having the assurance that the information has not been altered in transmission, from origin to destination.

Virtual private networks (VPN)

hese are used to provide secure access to remote workers.

What do LANs provide?

high speed bandwidth to internal end devices and intermediary devices.

Metro Ethernet

high-speed business class copper or fiber connection

BYOD

makes it possible for users to be free to use their personal devices to access a corporate or a campus network

Viruses, worms, and Trojan horses

malicious software and arbitrary code running on a user device

Scalability

networks can grow and expand with minimal impact on performance common network standards allow hardware and software vendors to focus on product improvements and services

fault tolerance

networks should always be available data can travel from more than one route for delivery from a remote source

disadvantages of peer to peer network

no centralized admin, not as secure, not scalable, all devices clients and servers

QoS (quality of service)

priority queues are implemented when demand for network bandwidth exceeds supply Developing a plan for priority queuing is a strategy for quality delivery of service

Extranet

provide secure and safe access to individuals who work for a different organization, but require access to the organization's data.

intermediary network devices

provides connectivity and ensures data flows across the network - switches, wireless access points, routers, firewalls

SDSL (Symmetric Digital Subscriber Line)

provides uploads and downloads at the same speeds - similar to DSL

satelite

requires a Dish and clear line of sight - provides a connection when a wired solution is not available.

Dedicated Leased Line

reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

cable

signal carried over the same copper or fiber medium as the television signal

What do WANs provide?

slower speed links between LANs.

Spyware and adware

software installed on a user device that secretly collects information about the user

Cellular

technology in which a user can get access to the Internet when connecting a cell phone to a cell phone network

cloud computing

technology that allows users and organizations to store data on remotely located servers on the Internet

Smart Home Technology

technology that is integrated into every-day appliances allowing them to interconnect with other devices, making them more 'smart' or automated.

DSL

technology that provides the user with a high-bandwidth connection to the Internet over a telephone line

confidentiality

that only the intended and authorized recipients can access and read data.

Internet

the collection of globally interconnected networks

How can WANs connect

through copper wires, fiber optic cables and wireless transmissions

Access control lists (ACL)

to further filter access and traffic forwarding.

collaboration tools

tools that allow individuals to work together as a team on a project, no matter where they are located

SAN (storage area network)

type of network infrastructure that stores, retrieves, and replicates data

Antivirus and antispyware

used to protect end devices from becoming infected with malicious software.

blog

web pages easily updated and edited by a person who wants to express his or her opinions about any subject

How are WANs interconnected?

with LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.

How are LANs interconnected?

with end devices in a limited area such as a home, school, office building, or campus.


Related study sets

Meeting Nutritional Needs-Chapter 7

View Set

Brunners CH 46 Gastric and Duodenal Disorders, Chapter 45: Caring for Clients with Disorders of the Upper Gastrointestinal Tract, GI Pharm Practice Questions, Med Surg Chapter 23: Nursing Management: Patients With Gastric and Duodenal Disorders: PREP...

View Set

The Great Gatsby Chapter Questions 1-9:

View Set

Chapter 12 - Childhood Development

View Set

CompTIA A+ Core 2 Practice Exam Question Review

View Set

NURS 3311 RN Mental Health Theories & Therapy Assessment

View Set