Chapter 1 Flashcards

(56 cards)

0
Q

A computer that had resources associated with it, but nothing is shared with another system

A

Stand-alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A system of independent computers that are interconnected to share data and resources

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Removable media and is walked over to the other system that requires data

A

Sneaker-net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three basic network configurations ?

A

Centralized computing

Peer to peer networks

Server based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computers with hard drives that provide shared resources to network users.

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computers that may or may not have a hard drive that access shared network resources provided by a server

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The wires or signaling that provide a path for communication

A

Media/Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data provided to clients by servers across the network

A

Shared data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any service or device, such as files, printers,or other items, made available for use by members of the network

A

Shared resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used with microcomputers and mainframe computers usually running a Unix-based operating system.

Also have dumb terminals

A

Centralized computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Each computer functions as a “client” and a “server”, so there is no need for a powerful central server or for the other components required for a high-capacity network

All the computers all equal

A

Peer to peer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

( making computers and data stored on them safe from harm or unauthorized access) consist s of setting a password on a resource, such as a directory that is shared on a network.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Also called a domain- provides centralized control of network services

A

Client/server based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Capable of transmitting data at more that one gigabit per second(Gbps) and is primarily a WAN technology.

For fiber optic technology

A

SONET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network that is confined to a single location

A

Local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standard for optical transport

A

SONET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Equivalent of SONET and defines optical-carrier(OC) levels and electrical-equivalent synchronous transport signal

A

Synchronous Digital Hierarchy

SDH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is an advanced implementation of packet switching that provides high-speed data transmission rates to send fixed-size packets over broadband and baseband LANs or WANs.

Standard for cell relay

A

Asynchronous transfer mode

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The most popular physical network architecture in use today due to its flexibility, ease of setup and inexpensive components.

Works at the physical layer

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Used to regulate network access

A

Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Primary differences between the mediums

A

Distance they can run,
Ease of installation and
Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Basic geometric layout of the network-the way in which the computers on the network are interconnected

A

Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The two types of topologies

A

Physical and logical

If you can touch it - physical
If you can’t see it - logical

23
Q

All computers in the network are connected to a single cable or a backbone

24
Made up of a central connection point that is a device such as a hub,router,or even a server, where all the cabling segments meet
Star Topology
25
Procedures and rules that manage network access so that all nodes have access without conflicting with each other causing collisions and loss of data
Media access, or control methods also called media access techniques
26
A system of rules and procedures that govern communication between two or more devices on a network
Protocol
27
Three basic elements of a protocol
* Character set * A set of rules for the sequence and timing of messages * Procedures for error detection and correction
28
A combination of protocols
A protocol stack
29
This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail
Application Layer
30
The three protocols used in the application layer
* HTTP-hypertext transport protocol * SNMP- Simple Network management protocol * Telnet
31
An Internet protocol by which World Wide Web pages are transmitted over networks
HTTP
32
An Internet protocol for monitoring networks and network components
SNMP
33
An Internet protocol for logging on to remote hosts and processing data locally
Telnet
34
This layer ensures packets are delivered error free, in sequence, and without loses or duplications.
Transport layer
35
These protocols establish,maintain and break a connection with the receiving system.
Connection-Oriented
36
A connection-oriented transport layer protocol that provides reliable full-duplex data transmission
Transmission Control Protocol (TCP)
37
Grouping bytes in TCP segments, which are passed to IP for transmission to the deletion Uses a "push" to ensure that all data is passed to the destination
Stream Data Transfer
38
Requires a recipient to communicate with the source, sending back an acknowledgment message when it receives data.
Positive ACKNOWLEDGEMENT (ACK)
39
A method used to prevent network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data
Flow control
40
What flow control method Temporarily stores bursts of excess data in memory until they can be processed
Buffering
41
A flow control method used by the receiving devices to help prevent their buffers from overflowing
Source-quench Message
42
A flow control mechanism requiring that the source device receive an acknowledgment from the destination after transmitting a certain amount of data.
Windowing
43
Determines whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination. One common technique is Cyclic Redundancy Check (CRC)
Error Control
44
This is A combination of a port number and IP address
Socket
45
It regulates how much information can be passed over a TCP connection before the receiving host must send an acknowledgement
Sliding window
46
This 802 standard sets internet working standards related to bridging and network management
802.1
47
This 802 standard defines the general standard for the logical link control (LLC) which is the upper portion of the data link layer for local area networks
802.2
48
This 802 standard defines the Media Access Control (MAC) layer for bus networks that use Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) This is a Ethernet standard
802.3
49
This 802 standard defines the MAC layer for token ring networks (Token Ring LAN)
802.5
50
This 802 standard defines wireless network standards. (LAN)
802.11
51
This 802 standard defines wireless personal area networks (WPAN)
802.15
52
This 802 standard defines broadband wireless standards.
802.16
53
This 802 standard does resilient packet ring (RPR)
802.17
54
This 802 standard works with mobile wireless
802.20
55
This 802 standard works with media independent handover services
802.21