NETI 109 chap 1
What are the advantages of peer-to-peer networking?
Easy to set up less complex lower cost because networking devices and dedicated servers may not be required can be used for simple tasks such as transferring files and sharing printers
list three common types of server software
Email, Web, File
Metro Ethernet
This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
fault tolerance
an end device
it is either the source or destination of a message transmitted over the network.
LAN
network infrastructure that provides access to users and end devices in a small geographical area.
Fault tolerant network
one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link.
reduncancy
Having multiple paths to a destination.
Logical Topology Diagrams
Identify devices, ports, and addressing scheme.
Internet Protocol (IP) address
It identifies the host and the network to which the host is attached.
congestion
It occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.
The email server
It runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server.
The web server
It runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server.
file
It stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.
Topology diagrams
They are mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.
characteristics of WANs
-They interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. -They are usually administered by multiple service providers. -They typically provide slower speed links between LANs.
characteristics of LANs
-They interconnect end devices in a limited area such as a home, school, office building, or campus. -They usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies. -LANs provide high-speed bandwidth to internal end devices and intermediary devices.
functions of intermediary devices
-regenerate and retransmit communication signals -maintain information about what pathways exit through the network and internetwork -notify other devices of error and communication failures -direct data along alternate pathways where there is a link failure -classify and direct messages according to priorities -permit or deny the flow of data, based on security settings
Hybrid clouds
A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.
converged network
A network that can carry voice, video, and data over the same network
Dial-up Telephone
An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.
Which feature describes using personal tools to access information and communicate across a business or campus network?
BYOD
Metal wires within cables
Data is encoded into electrical impulses.
Glass or plastic fibers within cables (fiber-optic cable)
Data is encoded into pulses of light.
Wireless transmission
Data is encoded via modulation of specific frequencies of electromagnetic waves.
Which attack slows down or crashes equipment and programs?
Denial of Service (DoS)
DSL
Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
what are the four basic characteristics that network architects must address to meet user expectations?
Fault Tolerance Scalability Quality of Service (QoS) Security
Which option blocks unauthorized access to your network?
Firewall
What is an ISP?
Internet Service Provider. It is an organization that provides access to the Internet for businesses and individuals.
Dedicated Leased Line
Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
what are the disadvantages of peer-to-peer networking
No centralized administration Not as secure Not scalable All devices may act as both clients and servers which can show their performance
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
Qos
Interface
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
satellite
The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite. It can provide a connection when a wired solution is not available.
cable
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
VPN
Which option describes a network attack that occurs on the first day that a vulnerability becomes known?
Zero-day or Zero-hour
WAN
a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider
Spyware
a software that is installed on a network device and that collects information.
Intranet
a term often used to refer to a private connection of LANs and WANs that belongs to an organization. It is designed to be accessible only by the organization's members, employees, or others with authorization.
Which feature contains options such as Public, Private, Custom and Hybrid?
cloud computing
Hosts
computers that are connected to a network and participate directly in network communication
Intermediary Devices
connect the individual end devices to the network and can connect multiple individual networks to form an internetwork
Network Interface Card (NIC)
physically connects the end device to the network.
Which feature is being used when connecting a device to the network using an electrical outlet?
powerline
Quality of Service (QoS)
primary mechanism for managing congestion and ensuring reliable delivery of content to all users.
What are two functions of end devices on a network?
they are the interface between humans and the communication network they originate the data that flows through the network
Community clouds
A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
video communications
example of a client server
web browser(Chrome, FireFox...)
peer-to-peer network
when computers function as the servers and clients on a network.
Which feature uses the same cellular technology as a smart phone?
wireless broadband
example of intermediary devices
wireless router router LAN switch router multilayer switch firewall appliance
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Scalability
A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.
Business DSL
Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.
cellular
Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.
Private clouds
Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.
Public clouds
Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.
what are the three primary requirements to achieve the goals of network security?
Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity assures users that the information has not been altered in transmission, from origin to destination. Availability - Data availability assures users of timely and reliable access to data services for authorized users.
Physical topology diagrams
They illustrate the physical location of intermediary devices and cable installation, as shown in the figure. You can see that the rooms in which these devices are located are labeled in this physical topology.
Which option creates a secure connection for remote workers?
Virtual Private Network (VPN)
Which option describes malicious code running on user devices?
Virus, worm, or Trojan horse
When data is encoded as pulses of light, which media is being used to transmit the data?
fiber-optic cable
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
scalability
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
scalability
Extranet
used by organization to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.