Networks

Ace your homework & exams now with Quizwiz!

Rapid FIRE Q&A Questions (ANSWERS)

1. So their location and data don't leak out to the people of the internet (and government). 2. You can if you have good cloaking technology, oh wait, wrong one. You can use VPN to become virtually invisible online (you'll disguise yourself as some other IP address from overseas). 3. OSI, International Organization for Standardization. 4. If the game supports it, then yeah. 5. In a way, yes. You can connect to other computers and transfer data. 6. Some computers might be slower. Network can be slow too, it all depends on one of the machines. 7. Because latency, if you have good connection, and you host with people from around the world, you'll have an advantage over them. 8. Schools and big corporations. 9. SANs is the antagonist from Undertale. 10. They are a set of rules and procedures the computers use to communicate. If it's not there, data can be all over the place, and essentially be rendered useless.

Draw a diagram of the OSI Model showing how data flows through the seven layers.

Level 7: Application Level 6: Presentation Level 5: Session Level 4: Transport Level 3: Network Level 2: Data Level 1: Physical

What is the purpose of the OSI Model?

To provide interoperability, which is the ability of software and hardware on multiple machines and from multiple commercial vendors to communicate.

Rapid FIRE Q&A Questions

1. Why do people use VPN to pirate stuff? 2. How do I become invisible? 3. Why is it called an OSI model? What is OSI? 4. Can I play games over LAN? 5. Is P2P good? 6. What are some issues with P2P? 7. Why should you never rely on P2P while playing games? 8. Who uses SAN? 9. What is SANs? 10. Why do protocols matter?

Identify the technologies required to provide a VPN.

A NAS (Network Access Server), which is a dedicated server, or it might be one of multiple software applications running on a shared server. And a client software that can access the VPN and establish and maintain a connection to the VPN.

Outline the importance of standards in the construction of networks.

A network protocol is a standard set of rules and procedures for computers to use when communicating with one another.These protocols or standards enable compatibility through a common language.

Describe the following networks: LAN, WAN, VLAN, SAN, VPN, PAN, AND P2P.

GET READY FOR AN ESSAY! LAN (Local-Area Network) - a network connecting a relatively small number of computers in a close geographic area. LANs are usually confined to a single room or building. They may sometimes span a few close buildings. WAN (Wide-Area Network) - a network that connects two or more local-area networks over a potentially large geographic distance. WANs use telephone lines, satellite dishes, or radio waves to span larger geographical areas than can be covered by a LAN. The Internet is an example of a WAN. The Internet is a vast collection of smaller networks that have agreed to communicate using the same protocols and to pass along messages so that they can reach their final destination. VLAN (Virtual LAN) - a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN. VLANs are configured through software rather than hardware, which make them extremely flexible. One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration. SAN (Storage Area Network) - a network of storage devices that can be accessed by multiple computers. Each computer on the network can access hard drives in the SAN as if they were local disks connected directly to the computer. This allows individual hard drives to be used by multiple computers, making it easy to share information between different machines. VPN (Virtual Private Network) - a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. PAN (Personal Area Network) - the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters. For example, a person traveling with a laptop, a personal digital assistant (PDA), and a portable printer could interconnect them without having to plug anything in, using some form of wireless technology. Typically, this kind of personal area network could also be interconnected without wires to the Internet or other networks. P2P (Peer-To-Peer) - In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.

Evaluate the use of a VPN.

It can be used to watch Netflix movies unavailable in your location. Pirate stuff without being found. Become Australian. Basically do anything you can't do in your country. In the U.S, you can use it freely. In other nation, it could be the cause of your disappearance (like, your physical disappearance), making you the gang's next mystery. A VPN is a way for companies to allow their employees to access company resources outside the office.


Related study sets

Management and Organizational Behavior Midterm #1

View Set