Define the term: Internet a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols;Who owns the Internet? No one person, company, organization or government runs or owns the Internet;How large/small can a network be? A network can be as large as the World Wide Net, otherwise known as the Internet, or as small as a Small Home Network;Define: Client a desktop computer or workstation that is capable of obtaining information and applications from a server;Define: Server a computer or computer program which manages access to a centralized resource or service in a network;Define: Peer-to-Peer Network A peer-to-peer network is one in which two or more PCs share files and access to devices without requiring a separate server computer;Define: Medium a channel or system of communication;Define: Topology Diagram a visual representation of a network's devices, connections, and paths;Define: NIC Network Interface Card, a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network;Define: Physical Port where communication begins or ends on a physical device or unit of equipment;Define: Interface a device or program enabling a user to communicate with a computer;Define: Convergence the connecting two or more technologies in a single system;Define: Network Architecture the way network services and devices are structured together to serve the connectivity needs of client devices and applications;Define: Network Bandwidth the maximum possible data transfer rate of a network or internet connection;Define: Cloud Computing on-demand delivery of IT resources over the Internet with pay-as-you-go pricing;Define: Data Center stores and shares applications and data;Define: Powerline Networking A data network that uses a building's electrical system as the transmission medium and regular wall outlets as connecting points;What is the benefit of convergence? helps organizations lower operating costs by optimizing resource utilization, energy, cooling and device management;List some tasks performed by intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network;Give examples of end devices and intermediary devices End device: computer. Intermediary device: router;List the 3 general types of network media Twisted pair, coaxial cables and fiber optic cable;Differentiate between a logical topology and a physical topology A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.;Define LAN, and give an example local area network, small range such as in a home;Define WAN, and give an example wide-area network, businesses with many international branch offices use a WAN to connect office networks together;Define intranet, and give an example predominantly used by employees to search for information, communicate across an organization, and manage workflows. An example is a website that an airline company exclusively uses to deliver updates and information to its workforce;Define extranet, and give an example provides a secure network for an organization to share information with relevant people outside the organization. An example is an e-commerce site exchanges information with its retailers, a supplier's through an extranet network;List and explain the four basic characteristics that the underlying architectures need to address in order to meet user expectations Fault Tolerance, Scalability, Quality of Service (QoS), and Security;Give advantages and disadvantages of both circuit-switched and packet-switched networks circuit switching is a necessity because it is the only setup that delivers a high-quality end call. Packet switching can only provide a voice call experience that results in choppy audio that makes it difficult for the users to understand each other;List and define the 4 primary types of clouds relational databases, NoSQL databases, cloud data warehouses, and HTAP systems;Do companies typically build their own data centers or do they use commercial data centers? It depends on the size of the company, and what their needs are;Identify some of the most common external security threats to networks Keyloggers, trojans, adware, spyware, etc;List methods used to connect homes/businesses to the Internet Dial-Up, Broadband, Cable, satellite, wireless mobile hotspots;List types of memory, whether each is volatile and what is stored there RAM is volatile memory used to hold instructions and data of currently running programs. ROM is nonvolatile: Data stored in ROM maintains integrity after loss of power.;Which ports are used for different types of access to the CLI of routers/switches console port or the Ethernet management port;Differentiate between the different types of access to the CLI Console ports are/were used for any computer based system. Management ports are generally for remote management using an Ethernet port;Differentiate between the startup-config and running-config The startup configuration is the configuration your devices run on when they reboot or power up. The running configuration is the current version of the configuration file the device runs on;Identify what router/switch mode you are working in Exec mode: > Privileged Exec Mode: #;Explain what types of functions can be performed in each mode Exec mode: basic monitoring commands Privileged Exec Mode: allows all monitoring commands, and can execute config/management commands;List the hierarchy of modes global configuration mode, interface configuration mode, subinterface configuration mode, router configuration mode, and line configuration mode;Why are there different router/switch modes? For security/administrative reasons, keeps out people that shouldn't be tampering with the system;Which modes can have passwords set on them? user EXEC and privileged EXEC;Which passwords are encrypted by default? User passwords;What does it mean to encrypt a password? scrambles your password so it's unreadable and/or unusable by hackers;What command do you use to get into privileged exec mode? Enable;What command do you use to save a running configuration? copy run start;What commands do you use to configure priv exec, console line and telnet passwords? enable secret;What command do you use to view the running configuration? show running-config;What command do you use to display information about the IOS, such as the name of IOS file and its version? show version;Are commands case sensitive? no;What command do you use to access help on the router/switch? help;What command do you use to enter global configuration mode? configure terminal;What command do you use to name a router/switch? hostname;List and explain the different types of Cisco IOS help that are available ;What information needs to be configured on a pc in order for it to have connectivity to remote networks IP address;How do you remove a command that you have given to the router/switch no;Differentiate between static and dynamic IP addressing. When would you want to use each? What are advantages of each? A static IP address is better for businesses, DNS servers, and VoIP protocols, while dynamic IP addresses are better for consumers and anyone who doesn't want to pay for an IP address;What is DHCP? Dynamic Host Configuration Protocol, a network protocol that is used to configure network devices to communicate on an IP network;List the 3 elements that all communication methods have in common. transmitter, receiver, transmission medium - these are the basic elements that make up a communication system;Differentiate between encoding and decoding by defining each encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage. Decoding is the opposite process -- the conversion of an encoded format back into the original sequence of characters;Define the terms encapsulation and de-encapsulation Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data;Why are messages broken into segments before travelling a network? Packets are used for efficient and reliable transmission of data;Define: Unicast (and give an example) a single, direct request sent from one host to another, and only the two hosts interact over the established route. For example, when you click a hyperlink in a Web browser, you are requesting HTTP data from the host defined in the link, which, in turn, delivers the data to your browser;Define: Multicast (and give an example) a single source of communication with simultaneous multiple receivers. Most popular distributed multimedia applications require multicasting. For example, multiparty audio/video conferencing is one of the most widely used services in Internet telephony;Define: Broadcast (and give an example) to transmit (programs) from a radio or television station;Define: Protocol Suite a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria;Define: Proprietary relating to an owner or ownership;Define: Open Standard a standard that is openly accessible and usable by anyone;Define: Segmenting simplifies the provisioning and management of network access control through the use of groups to classify network traffic and enforce policies;Define: Default Gateway a device, such as a DSL router or cable router, that connects the local network to the Internet;Define: Protocol a communication standard for network/host devices that facilitates messaging between entities;Define: Multiplexing a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal;List the layers of the OSI model (From top to bottom) Application Layer. ... Presentation Layer. ... Session Layer. ... Transport Layer. ... Network Layer. ... Data Link Layer. ... Physical Layer;List the layers of the TCP/IP model (from top to bottom) Application Layer, Transport Layer, Network Layer, Network Interface Layer, and Hardware;Relate the layers of the OSI model to the TCP/IP model (Application Layer, Presentation Layer, Session Layer = Application Layer) (Transport Layer = Transport Layer) (Network Layer = Network Layer) (Data Link Layer, Physical Layer = Network Access Layer);Know the non-layer names of a PDU at each layer of the OSI model In Layer 1, PDU is a bit, in Layer 2 it is a frame, in Layer 3 it is a packet and in Layer 4 it is a segment. In Layer 5 and above, PDU is referred to as data;Know the non-layer names of a PDU at each layer of the TCP/IP model ;Why do we use a layered model when studying networking? What are the benefits? it helps simplify networking protocols by breaking them into smaller, more manageable units, but also offers greater flexibility. By dividing protocols into layers, protocols can be designed for interoperability;Give advantages of segmenting reduces network congestion;Give a disadvantage of segmenting increased complexity;Differentiate between an IP address and a physical (MAC) address MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network;How many IP addresses get placed on a packet that is travelling over the Internet? Unknown;Which of the addresses change during their journey from source to destination on a remote network, IP or MAC? MAC;

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards
Define the term: Internet
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
2
New cards
Who owns the Internet?
No one person, company, organization or government runs or owns the Internet
3
New cards
How large/small can a network be?
A network can be as large as the World Wide Net, otherwise known as the Internet, or as small as a Small Home Network
4
New cards
Define: Client
a desktop computer or workstation that is capable of obtaining information and applications from a server
5
New cards
Define: Server
a computer or computer program which manages access to a centralized resource or service in a network
6
New cards
Define: Peer-to-Peer Network
A peer-to-peer network is one in which two or more PCs share files and access to devices without requiring a separate server computer
7
New cards
Define: Medium
a channel or system of communication
8
New cards
Define: Topology Diagram
a visual representation of a network's devices, connections, and paths
9
New cards
Define: NIC
Network Interface Card, a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network
10
New cards
Define: Physical Port
where communication begins or ends on a physical device or unit of equipment
11
New cards
Define: Interface
a device or program enabling a user to communicate with a computer
12
New cards
Define: Convergence
the connecting two or more technologies in a single system
13
New cards
Define: Network Architecture
the way network services and devices are structured together to serve the connectivity needs of client devices and applications
14
New cards
Define: Network Bandwidth
the maximum possible data transfer rate of a network or internet connection
15
New cards
Define: Cloud Computing
on-demand delivery of IT resources over the Internet with pay-as-you-go pricing
16
New cards
Define: Data Center
stores and shares applications and data
17
New cards
Define: Powerline Networking
A data network that uses a building's electrical system as the transmission medium and regular wall outlets as connecting points
18
New cards
What is the benefit of convergence?
helps organizations lower operating costs by optimizing resource utilization, energy, cooling and device management
19
New cards
List some tasks performed by intermediary devices
provide connectivity and work behind the scenes to ensure that data flows across the network
20
New cards
Give examples of end devices and intermediary devices
End device: computer. Intermediary device: router
21
New cards
List the 3 general types of network media
Twisted pair, coaxial cables and fiber optic cable
22
New cards
Differentiate between a logical topology and a physical topology
A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.
23
New cards
Define LAN, and give an example
local area network, small range such as in a home
24
New cards
Define WAN, and give an example
wide-area network, businesses with many international branch offices use a WAN to connect office networks together
25
New cards
Define intranet, and give an example
predominantly used by employees to search for information, communicate across an organization, and manage workflows. An example is a website that an airline company exclusively uses to deliver updates and information to its workforce
26
New cards
Define extranet, and give an example
provides a secure network for an organization to share information with relevant people outside the organization. An example is an e-commerce site exchanges information with its retailers, a supplier's through an extranet network
27
New cards
List and explain the four basic characteristics that the underlying architectures need to address in order to meet user expectations
Fault Tolerance, Scalability, Quality of Service (QoS), and Security
28
New cards
Give advantages and disadvantages of both circuit-switched and packet-switched networks
circuit switching is a necessity because it is the only setup that delivers a high-quality end call. Packet switching can only provide a voice call experience that results in choppy audio that makes it difficult for the users to understand each other
29
New cards
List and define the 4 primary types of clouds
relational databases, NoSQL databases, cloud data warehouses, and HTAP systems
30
New cards
Do companies typically build their own data centers or do they use commercial data centers?
It depends on the size of the company, and what their needs are
31
New cards
Identify some of the most common external security threats to networks
Keyloggers, trojans, adware, spyware, etc
32
New cards
List methods used to connect homes/businesses to the Internet
Dial-Up, Broadband, Cable, satellite, wireless mobile hotspots
33
New cards
List types of memory, whether each is volatile and what is stored there
RAM is volatile memory used to hold instructions and data of currently running programs. ROM is nonvolatile: Data stored in ROM maintains integrity after loss of power.
34
New cards
Which ports are used for different types of access to the CLI of routers/switches
console port or the Ethernet management port
35
New cards
Differentiate between the different types of access to the CLI
Console ports are/were used for any computer based system. Management ports are generally for remote management using an Ethernet port
36
New cards
Differentiate between the startup-config and running-config
The startup configuration is the configuration your devices run on when they reboot or power up. The running configuration is the current version of the configuration file the device runs on
37
New cards
Identify what router/switch mode you are working in
Exec mode: \>
Privileged Exec Mode: \#
38
New cards
Explain what types of functions can be performed in each mode
Exec mode: basic monitoring commands
Privileged Exec Mode: allows all monitoring commands, and can execute config/management commands
39
New cards
List the hierarchy of modes
global configuration mode, interface configuration mode, subinterface configuration mode, router configuration mode, and line configuration mode
40
New cards
Why are there different router/switch modes?
For security/administrative reasons, keeps out people that shouldn't be tampering with the system
41
New cards
Which modes can have passwords set on them?
user EXEC and privileged EXEC
42
New cards
Which passwords are encrypted by default?
User passwords
43
New cards
What does it mean to encrypt a password?
scrambles your password so it's unreadable and/or unusable by hackers
44
New cards
What command do you use to get into privileged exec mode?
Enable
45
New cards
What command do you use to save a running configuration?
copy run start
46
New cards
What commands do you use to configure priv exec, console line and telnet passwords?
enable secret
47
New cards
What command do you use to view the running configuration?
show running-config
48
New cards
What command do you use to display information about the IOS, such as the name of IOS file and its version?
show version
49
New cards
Are commands case sensitive?
no
50
New cards
What command do you use to access help on the router/switch?
help
51
New cards
What command do you use to enter global configuration mode?
configure terminal
52
New cards
What command do you use to name a router/switch?
hostname
53
New cards
List and explain the different types of Cisco IOS help that are available
54
New cards
What information needs to be configured on a pc in order for it to have connectivity to remote networks
IP address
55
New cards
How do you remove a command that you have given to the router/switch
no
56
New cards
Differentiate between static and dynamic IP addressing. When would you want to use each? What are advantages of each?
A static IP address is better for businesses, DNS servers, and VoIP protocols, while dynamic IP addresses are better for consumers and anyone who doesn't want to pay for an IP address
57
New cards
What is DHCP?
Dynamic Host Configuration Protocol, a network protocol that is used to configure network devices to communicate on an IP network
58
New cards
List the 3 elements that all communication methods have in common.
transmitter, receiver, transmission medium - these are the basic elements that make up a communication system
59
New cards
Differentiate between encoding and decoding by defining each
encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage. Decoding is the opposite process \-- the conversion of an encoded format back into the original sequence of characters
60
New cards
Define the terms encapsulation and de-encapsulation
Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data
61
New cards
Why are messages broken into segments before travelling a network?
Packets are used for efficient and reliable transmission of data
62
New cards
Define: Unicast (and give an example)
a single, direct request sent from one host to another, and only the two hosts interact over the established route. For example, when you click a hyperlink in a Web browser, you are requesting HTTP data from the host defined in the link, which, in turn, delivers the data to your browser
63
New cards
Define: Multicast (and give an example)
a single source of communication with simultaneous multiple receivers. Most popular distributed multimedia applications require multicasting. For example, multiparty audio/video conferencing is one of the most widely used services in Internet telephony
64
New cards
Define: Broadcast (and give an example)
to transmit (programs) from a radio or television station
65
New cards
Define: Protocol Suite
a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria
66
New cards
Define: Proprietary
relating to an owner or ownership
67
New cards
Define: Open Standard
a standard that is openly accessible and usable by anyone
68
New cards
Define: Segmenting
simplifies the provisioning and management of network access control through the use of groups to classify network traffic and enforce policies
69
New cards
Define: Default Gateway
a device, such as a DSL router or cable router, that connects the local network to the Internet
70
New cards
Define: Protocol
a communication standard for network/host devices that facilitates messaging between entities
71
New cards
Define: Multiplexing
a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal
72
New cards
List the layers of the OSI model
(From top to bottom)
Application Layer. ...
Presentation Layer. ...
Session Layer. ...
Transport Layer. ...
Network Layer. ...
Data Link Layer. ...
Physical Layer
73
New cards
List the layers of the TCP/IP model
(from top to bottom)
Application Layer, Transport Layer, Network Layer, Network Interface Layer, and Hardware
74
New cards
Relate the layers of the OSI model to the TCP/IP model
(Application Layer, Presentation Layer, Session Layer \= Application Layer)

(Transport Layer \= Transport Layer)

(Network Layer \= Network Layer)

(Data Link Layer, Physical Layer \= Network Access Layer)
75
New cards
Know the non-layer names of a PDU at each layer of the OSI model
In Layer 1, PDU is a bit, in Layer 2 it is a frame, in Layer 3 it is a packet and in Layer 4 it is a segment. In Layer 5 and above, PDU is referred to as data
76
New cards
Know the non-layer names of a PDU at each layer of the TCP/IP model
77
New cards
Why do we use a layered model when studying networking? What are the benefits?
it helps simplify networking protocols by breaking them into smaller, more manageable units, but also offers greater flexibility. By dividing protocols into layers, protocols can be designed for interoperability
78
New cards
Give advantages of segmenting
reduces network congestion
79
New cards
Give a disadvantage of segmenting
increased complexity
80
New cards
Differentiate between an IP address and a physical (MAC) address
MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network
81
New cards
How many IP addresses get placed on a packet that is travelling over the Internet?
Unknown
82
New cards
Which of the addresses change during their journey from source to destination on a remote network, IP or MAC?
MAC