Unit 5 Flashcards

(71 cards)

1
Q

Switch

A

connects multiple devices to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Router

A

forwards traffic between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless router

A

connects multiple wireless devices to the network and may include a switch to connect wired hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access point (AP)

A

connects to a wireless router and is used to extend the reach of a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Modem

A

connects a home or small office to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAN

A

A personal area network (PAN) is a network that connects devices, such as mice, keyboards, printers, smartphones, and tablets within the range of an individual person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LAN

A

Traditionally, a local area network (LAN) is defined as a network that connects devices using wire cables in a small geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VLAN

A

Virtual LANs (VLANs) allow an administrator to segment the ports on a single switch as if it were multiple switches. This provides more efficient forwarding of data by isolating traffic to only those ports where it is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WLAN

A

A wireless LAN (WLAN) is similar to a LAN but wirelessly connects users and devices in a small geographical area instead of using a wired connection. A WLAN uses radio waves to transmit data between wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WMN

A

A wireless mesh network (WMN) uses multiple access points to extend the WLAN. The topology shows a wireless router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAN

A

A metropolitan area network (MAN) is a network that spans across a large campus or a city. The network consists of various buildings connected through wireless or fiber optic media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

A wide area network (WAN) connects multiple networks that are in geographically separated locations. Individuals and organizations contract for WAN access from a service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN

A

A virtual private network (VPN) is used to securely connect to another network over an insecure network, such as the internet. The most common type of VPN is used by teleworkers to access a corporate private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Analog Telephone

A

Analog telephone internet access can transmit data over standard voice telephone lines. This type of service uses an analog modem to place a telephone call to another modem at a remote site. This method of connection is known as dialup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integrated Services Digital Network

A

Integrated Services Digital Network (ISDN) uses multiple channels and can carry different types of services; therefore, it is considered a type of broadband. ISDN is a standard that uses multiple channels to send voice, video, and data over normal telephone wires. ISDN bandwidth is larger than traditional dialup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Broadband

A

Broadband uses different frequencies to send multiple signals over the same medium. For example, the coaxial cables used to bring cable television to your home can carry computer network transmissions at the same time as hundreds of TV channels. Your cell phone can receive voice calls while also using a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mobile hotspot

A

A cell phone configured to allow other devices to connect via Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Tethering

A

The process of connecting another device to a cell phone so that the connected device can access the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Broadband

A

Technologies that use different frequencies to send multiple signals over the same medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cellular

A

Uses towers distributed throughout a user’s coverage area to provide seamless access to phone and internet services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cable

A

Uses coaxial cables to deliver a variety of content including TV channels, internet, and voice calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Satellite

A

A popular choice for rural markets that do not have a DSL or cable provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DSL

A

Digital phone service that can also connect to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fiber

A

An increasingly popular choice for internet connections to homes and businesses that uses light to transfer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Characteristics of TCP
Reliable, Acknowlodges data, Resends lost data, delievers data in sequenced order
26
Characteristics of UDP
Fast, lower overhead, does not require acknowledgements, does not resend lost data, delievers data as it arrives
27
www protocol 53
Transport Protocol, TCP and UDP. Application Protocol, DNS
28
www protocol 80
Transport Protocol, TCP. Application Protocol, HTTP
29
www protocol 443
Transport Protocol, TCP and UDP. Application Protocol, HTTPS
30
Email and Identify management protocol 25
Transport Protocol, TCP. Application Protocol, Simple Mail Transfer Protocol (SMTP) used to send email from clients to an email server, may also be used to relay email messages from source to destination email servers.
31
Email and Identify management protocol 110
Transport Protocol, TCP. Application Protocol, Post Office Protocol 3 (POP3) is used by email clients to retrieve messages from an email server.
32
Email and Identify management protocol 143
Transport Protocol, TCP. Application Protocol, Internet Message Access Protocol (IMAP) used to retrieve email messages from a server. More advanced that POP3.
33
Email and Identify management protocol 389
Transport Protocol, TCP and UDP. Lightweight Directory Acess Protocol (LDAP) is used to maintain user identity directory information that can be shared across networks and systems. Used to manage information about users and networkresources. Can be used to authenticate users on multiple computers.
34
File Transport and Management Protocol 20
Transport Protocol, File transfer protocol (FTP) used to transfer files between computers. Considered insecure.
35
File Transport and Management Protocol 21
Transport Protocol, File transfer protocol (FTP) uses TCP port 21 to establish a connection between the client and FTP server, in order to start a data transfer session.
36
File Transport and Management Protocol 69
Transport Protocol, Trivial File Transfer Protocol utilizes less overhead than FTP
37
File Transport and Management Protocol 445
Transport Protocol, Server Message Block or Common Internet File System (SMB/CIFS) allows for sharing of files, printers, and other resources between nodes on a network.
38
File Transport and Management Protocol 548
Transport Protocol, Apple Filling Protocol (AFP) is a proprietary protocol develiped by Apple to enable file services for macOS and classic Mac Os
39
Remote Access Protocol 22
Transport Protocol, TCP. Secure Shell or Secure Socket Shell (SSH) provides a strong authentication and encrpte data transport between a client and remote computer. Like Telnet, it provides a command line on the remote computer.
40
Remote Access Protocol 23
Transport Protocol, TCP. Telnet is a insecure remote access protocol that provides a command line on a remote computer.
41
Remote Access Protocol 3389
Transport Protocol, TCP and UDP. Remote desktop protocol (RDP) was developed by Microsoft to provide remote access to the graphical desktop of a remote machine
42
Network Operation Protocol 67/68
Transport Protocol, UDP. Dynamic Host Configuration Protocol (DHCP) Automatically provides IP addresses to network hosts and proovides a way to manage those addresses. The DHCP server uses UDP port 67 and the client host uses UDP port 68.
43
Network Operation Protocol 137-139
Transport Protocol, TCP and UDP. NetBIOS over TCP/IP provides a system through which older computer applications can communicate over large TCP/IP networks.
44
Network Operation Protocol 161/162
Transport Protocol, UDP. Simple Network Management Protocol (SNMP) Enables network administrators to monitor network operations from centralized moniotring stations.
45
Network Operation Protocol 427
Transport Protocol, TCP and UDP. Server Location Protocol (SLP) allows computers and other devices to locate services on a LAN without previous configuratin. Usually uses UDP, but can use TCP
46
Network Operation Protocol 445
Transport Protocol, TCP and UDP. Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resrouces, such aas directoreis, files, printers, and serial ports.
47
IEEE Standard 802. 11a (Wi-Fi 2)
Maximum Speed, 54 Mbps. Maxmum Indoor Range 115 ft. Frequency 5Ghz.
48
IEEE Standard 802. 11b (Wi-Fi 1)
Maximum Speed, 11 Mbps. Maxmum Indoor Range 115 ft. Frequency 2.5 Ghz.
49
IEEE Standard 802. 11g (Wi-Fi 3)
Maximum Speed, 54 Mbps. Maxmum Indoor Range 125 ft. Frequency 2.5 Ghz. Backwards Compatible 802.11b.
50
IEEE Standard 802. 11n (Wi-Fi 4)
Maximum Speed, 600 Mbps. Maxmum Indoor Range 230 ft. 2.4 Ghz, 5 Ghz. Backwards Compatible 802.11a/b/g.
51
IEEE Standard 802. 11ac (Wi-Fi 5)
Maximum Speed, 6.9 Mbps. Maxmum Indoor Range 115 ft. 5 Ghz. Backwards Compatible 802.11a/n.
52
IEEE Standard 802. 11ax (Wi-Fi 6)
Maximum Speed, 9.6 Mbps. Maxmum Indoor Range 150 ft. 2..4 Ghz, 5 Ghz. Backwards Compatible 802.11a/b/g/n/ac.
53
IEEE Standard 802. 11ax (Wi-Fi 6e)
Maximum Speed, 9.6 Mbps. Maxmum Indoor Range 150 ft. 1 Ghz, 6 Ghz. Backwards Compatible 802.11a/b/g/n/ac.
54
Bluetooth
Uses IEEE Standard 802.15..1 can connect up to 7 devices. Operates in 2.4 GHz to 2.485 Ghz. Radio frequencey range typically used for PANs. Incorporates AFH allowing signals to 'hop' around using different frequences within Bluetooth's range, this reduces the interference when multiple Bluetooth devices are present.
55
RFID
used the frequences 125 Mhz to 960 MHz range to uniquely identify items. RFID items can be passive or active. Active RFID tags can broadcast their ID up to 100 meters, passive can broadcast up to 25 meters. Commonly used to detect if items have been purchased at grocery stores or not.
56
Near Field Connection (NFC)
uses frequency 13.56 MHz and is subset of the RFID standards. NFC is designed to be a secure method to complete data transactions.
57
Zigbee
Zigbee uses IEEE 802.15.4 wireless standard for personal area networks. Zigbee uses frequencies from 868 MHz to 2.4 GHz. Zigbee range is 10 to 20 meters. Zigbee has a data rate from 40-250 kb/s and can support approximately 65,000 devices.
58
Z-Wave
Z-Wave is open sourced, it operates in many different frequencies depending upon the country. can transmit data up to 100 meters. Can support up to 232 devices in one wireless mesh network.
59
File Client Server
The File Server stores corporate and user files in a central location. The client devices access these files with client software such as Windows Explorer.
60
Web Client Server
The Web Server runs web server software and clients use their browser software, such as Chrome or FireFox, to access web pages on the server.
61
Email Client Server
The Email Server runs email server software and clients use their mail client software, such as Microsoft Outlook, to access email on the server.
62
Print Server
Enable multiple computer users to access a single printer. Provide client access to print resources. Provide feedback to users. Administer print jobs by storing them in a queue until the print device is ready for them and then feeding or spooling the print information to the printer.
63
File Server
A server that uses FTP, SSH File and Secure Copy commonly and stores large amounts of data.
64
Web Server
A server that provides web resources. The host accesses the web resources via HTTP or HTTPS.
65
Mail Server
A server that mail task is sending, storing, and retrieving electronic messages across a network. Email messages are stored in databases on mail servers.
66
Proxy Server
Proxy servers have the authority to act as another computer.
67
Authentication Server
Provide the framework to set up acess control on a network device.
68
Syslog Server
Syslog has the ability to gather logging information for monitoring and torubleshooting, the ability to select the type of logging information that is captured, and the ability to specify the destinations of captured syslog messages.
69
Load Balancer
A load balancer can be used to distribute the demand of requests.
70
SCADA
A supervisory control and data acqusition (SCADA) is used in an industrial control system. The system that provides automation for servecies like national security, water treatment plants, or power suppliers.
71
Network Interface Card (NIC)
3 Different Types of NICs: Ethernet, Wireless, and USB NICs. NICs connect to 802.11 networks and are commonly used for desktop computers.