Networking 2 Midterm Exam

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

flashcard set

Earn XP

Description and Tags

Lessons 4 - 5

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Server

is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.

2
New cards

Web Server, File Server, Database Server, Mail Server, Application Server, Game Server

Types of Server

3
New cards

Web server

is a type of server that stores, processes, and delivers web pages to clients (usually web browsers) over the Internet using the HTTP or HTTPS protocol.

4
New cards

File Server

is a computer or device that stores and manages files so other computers on the same network can access, share, and save files centrally.

5
New cards

Database Server

is a computer system or software that stores, manages, and provides access to databases. It handles requests from client devices or applications that want to read, write, or update data in a structured way.

6
New cards

Mail Server

(also called an email server) is a system that sends, received, and stores email messages. It works behind the scenes to ensure hat emails reach the correct destinations across the internet od within a network.

7
New cards

Application Server

is a software framework or environment that host and runs applications, especially web-based or enterprise-applications. It acts as the middle layer between the user’s devices (client) and the back-end databases or system.

8
New cards

Game Server

is a server which is the authoritative source of events in a multiplayer video game. The server transfer enough data about its internal state to allow its connected clients to maintain their own accurate version of the game world for display to players. They also receive and process each player's input..

9
New cards

Extensibility

the quality of being designed to allow the addition of new capabilities or functionality.

10
New cards

More CPU Performance

Servers often have multiple CPUs and advanced hardware features such as pre-fetch, multi-stage processor checking, and the ability to dynamically allocate resources among CPUs.

11
New cards

High Performance I/O

The quantity of I/O is often proportional to the number of clients, which justifies a faster I/O subsystem.

12
New cards

Upgrade Options

Servers are often upgraded, rather than simply replaced; they are designed for growth.

13
New cards

Rack mountable

Servers are often upgraded, rather than simply re- placed; they are designed for growth. Servers generally have the ability to add CPUs or replace individual CPUs with faster ones, without requiring additional hardware changes.

14
New cards

No side-access needs

A rack mounted host is easier to repair or perform maintenance on if tasks can be done while it remains in the rack.

15
New cards

High-availability options

Many servers include various high-availability options, such as dual power supplies, multiple network connections, and hot-swap components.

16
New cards

Maintenance contracts

vendors offer server hardware service contracts that generally include guaranteed turnaround times on replacement parts.

17
New cards

Management Options

servers should have some capability for remote management, such as serial port access, that can be used to diagnose and fix problems to restore a machine that is down to active service.

18
New cards

KVM switch

is a device that lets many machines share a single keyboard, video screen, and mouse (KVM).

19
New cards

boot disk

disk with the operating system, is often the most difficult one to replace if it gets damaged, so we need special precautions to make recovery faster.

20
New cards

Redundant Power Supplies

a redundant power supply does not simply mean that two such devices are in the chassis.

21
New cards

N +1 Redundancy

the base level of resources required for the system functionality — plus a single backup.

22
New cards

Hot -swap

refers to the ability to remove and replace a component while the system is running.

23
New cards

SERVICES

Deliverables from IT and system administration to users and the business.

24
New cards

Technical Services

The foundational infrastructure (e.g., networks, servers).

25
New cards

Business Services

The value-added functions users see (e.g., email, business apps).

26
New cards

CUSTOMER REQUIREMENTS

Before any service can be designed or implemented, it's essential to understand the customer's requirements.

27
New cards

Functional

These define what the service does. They are the specific actions, behaviors, or data a service must provide.

28
New cards

Non-Functional

These define how the service performs. They are the quality attributes that describe how the service should operate.

29
New cards

OPERATIONAL REQUIREMENTS

While customer requirements define what a service needs to do, operational requirements define what IT administrators need to do to keep the service running smoothly.

30
New cards

Uptime

The service must be available as expected.

31
New cards

Scalability

It must grow with the business.

32
New cards

Security

It must be protected from threats.

33
New cards

Vendor Relation

In many IT environments, vendors play a crucial role in delivering services.

34
New cards

Contracts

These legal agreements define the terms of the relationship, including the scope of the service, costs, and responsibilities.

35
New cards

Service Level Agreements (SLAs)

are often part of a contract and specify the minimum level of service a vendor must provide, such as guaranteed uptime, response times for support tickets, and performance metrics.

36
New cards

Licensing

This ensures the organization has the legal right to use the software and services provided by the vendor.

37
New cards

Support

A good vendor relationship includes access to reliable technical support for troubleshooting and maintenance.

38
New cards

MACHINE INDEPENDENCE

Also known as platform neutrality, it is a critical principle for modern IT services.

39
New cards

Virtualization

allows multiple operating systems to run on a single physical machine, creating a layer of abstraction from the underlying hardware.

40
New cards

Containerization

goes a step further by packaging an application and its dependencies into a single, isolated unit that can run consistently across any environment.

41
New cards

RESTRICTED ACCESS

The principle of Least Privilege (POLP) is a fundamental security concept in IT, stating that a user or process should only be granted the minimum necessary permissions to perform its function.

42
New cards

Role-Based Access Control

This assigns permissions to roles rather than individual users.

43
New cards

Multi-Factor Authentication

This requires users to provide two or more verification factors to gain access, such as a password and a code from a mobile app.

44
New cards

CENTRALIZATION AND STANDARDS

The efficient management of IT services requires centralization.

45
New cards

PERFORMANCE

Measure how a service works using throughput, latency, and availability.

46
New cards

Load Balancing

Distributing network traffic across multiple servers to prevent any single server from becoming overwhelmed.

47
New cards

Caching

Storing frequently accessed data in a temporary location to speed up retrieval.

48
New cards

Resource Allocation

Dynamically assigning computing resources (CPU, RAM, storage) to services as needed.

49
New cards

MONITORING

Monitoring is the continuous process of observing and assessing the health, performance, and security of IT services.

50
New cards

Proactive

This involves using tools to predict potential issues before they cause service disruptions.

51
New cards

Reactive

This is about responding to incidents and failures as they occur.