NETI 109 chap 1

Ace your homework & exams now with Quizwiz!

What are the advantages of peer-to-peer networking?

Easy to set up less complex lower cost because networking devices and dedicated servers may not be required can be used for simple tasks such as transferring files and sharing printers

list three common types of server software

Email, Web, File

Metro Ethernet

This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

fault tolerance

an end device

it is either the source or destination of a message transmitted over the network.

LAN

network infrastructure that provides access to users and end devices in a small geographical area.

Fault tolerant network

one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link.

reduncancy

Having multiple paths to a destination.

Logical Topology Diagrams

Identify devices, ports, and addressing scheme.

Internet Protocol (IP) address

It identifies the host and the network to which the host is attached.

congestion

It occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.

The email server

It runs email server software. Clients use mail client software, such as Microsoft Outlook, to access email on the server.

The web server

It runs web server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server.

file

It stores corporate and user files in a central location. The client devices access these files with client software such as the Windows File Explorer.

Topology diagrams

They are mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.

characteristics of WANs

-They interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. -They are usually administered by multiple service providers. -They typically provide slower speed links between LANs.

characteristics of LANs

-They interconnect end devices in a limited area such as a home, school, office building, or campus. -They usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies. -LANs provide high-speed bandwidth to internal end devices and intermediary devices.

functions of intermediary devices

-regenerate and retransmit communication signals -maintain information about what pathways exit through the network and internetwork -notify other devices of error and communication failures -direct data along alternate pathways where there is a link failure -classify and direct messages according to priorities -permit or deny the flow of data, based on security settings

Hybrid clouds

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

converged network

A network that can carry voice, video, and data over the same network

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

Metal wires within cables

Data is encoded into electrical impulses.

Glass or plastic fibers within cables (fiber-optic cable)

Data is encoded into pulses of light.

Wireless transmission

Data is encoded via modulation of specific frequencies of electromagnetic waves.

Which attack slows down or crashes equipment and programs?

Denial of Service (DoS)

DSL

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

what are the four basic characteristics that network architects must address to meet user expectations?

Fault Tolerance Scalability Quality of Service (QoS) Security

Which option blocks unauthorized access to your network?

Firewall

What is an ISP?

Internet Service Provider. It is an organization that provides access to the Internet for businesses and individuals.

Dedicated Leased Line

Leased lines are reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.

what are the disadvantages of peer-to-peer networking

No centralized administration Not as secure Not scalable All devices may act as both clients and servers which can show their performance

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

Qos

Interface

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

satellite

The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite. It can provide a connection when a wired solution is not available.

cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero-day or Zero-hour

WAN

a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider

Spyware

a software that is installed on a network device and that collects information.

Intranet

a term often used to refer to a private connection of LANs and WANs that belongs to an organization. It is designed to be accessible only by the organization's members, employees, or others with authorization.

Which feature contains options such as Public, Private, Custom and Hybrid?

cloud computing

Hosts

computers that are connected to a network and participate directly in network communication

Intermediary Devices

connect the individual end devices to the network and can connect multiple individual networks to form an internetwork

Network Interface Card (NIC)

physically connects the end device to the network.

Which feature is being used when connecting a device to the network using an electrical outlet?

powerline

Quality of Service (QoS)

primary mechanism for managing congestion and ensuring reliable delivery of content to all users.

What are two functions of end devices on a network?

they are the interface between humans and the communication network they originate the data that flows through the network

Community clouds

A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

video communications

example of a client server

web browser(Chrome, FireFox...)

peer-to-peer network

when computers function as the servers and clients on a network.

Which feature uses the same cellular technology as a smart phone?

wireless broadband

example of intermediary devices

wireless router router LAN switch router multilayer switch firewall appliance

Physical Port

A connector or outlet on a networking device where the media connects to an end device or another networking device.

Scalability

A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.

Business DSL

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.

cellular

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.

Private clouds

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

Public clouds

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.

what are the three primary requirements to achieve the goals of network security?

Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity assures users that the information has not been altered in transmission, from origin to destination. Availability - Data availability assures users of timely and reliable access to data services for authorized users.

Physical topology diagrams

They illustrate the physical location of intermediary devices and cable installation, as shown in the figure. You can see that the rooms in which these devices are located are labeled in this physical topology.

Which option creates a secure connection for remote workers?

Virtual Private Network (VPN)

Which option describes malicious code running on user devices?

Virus, worm, or Trojan horse

When data is encoded as pulses of light, which media is being used to transmit the data?

fiber-optic cable

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

scalability

Extranet

used by organization to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.


Related study sets

money, banking, & Monetary Policy econ 111

View Set

Implications of Fluid Imbalances

View Set

Federal Govt Unit 1 Exam-Chapter 4

View Set

Foods 2 Safe Plates Module 3 Storing Food

View Set

bridge and practice problems exam 3

View Set

Osseous Tissue and Skeletal Structure

View Set

root words - claud,clus,caus,close

View Set

Polygon Interior and Exterior Angles

View Set

Python Part 1 of 4 parts - Unit 1

View Set