Module 1 (NetAcad)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Host / End Device

Any computer or device connected to a network that is the source or destination of a message (e.g., PC, smartphone, server).

2
New cards

Client

A host that requests information or services from a server (e.g., your computer running a web browser).

3
New cards

Server

A host that provides information or services to clients (e.g., a web server hosting a website).

4
New cards

Peer-to-Peer (P2P) Network

A network where devices can act as both a client and a server simultaneously. Common in small homes and offices.

5
New cards

Intermediary Devices

Devices that connect end devices and ensure data flows across the network (e.g., Routers, Switches, Firewalls).

6
New cards

Network Media

The physical channel through which data travels.

7
New cards

Copper Wires

Data as electrical impulses.

8
New cards

Fiber-Optic Cable

Data as pulses of light.

9
New cards

Wireless

Data as electromagnetic waves.

10
New cards

Topology Diagram

A visual map of a network.

11
New cards

Physical Topology

Shows the physical location of devices and cables.

12
New cards

Logical Topology

Shows the IP addressing scheme, ports, and how data logically flows.

13
New cards

LAN (Local Area Network)

A network in a small geographical area (e.g., a single home, office, or campus).

14
New cards

WAN (Wide Area Network)

A network that spans a large geographical area, connecting multiple LANs.

15
New cards

The Internet

A global "network of networks".

16
New cards

Intranet

A private collection of LANs and WANs belonging to a single organization, accessible only internally.

17
New cards

Extranet

A secure extension of an intranet that allows external partners (like suppliers or customers) to access specific resources.

18
New cards

Home/SOHO Options

Cable, DSL (Digital Subscriber Line), Cellular, Satellite, Dial-up.

19
New cards

Business Options

Dedicated Leased Lines, Metro Ethernet, Business DSL.

20
New cards

Converged Network

A single network infrastructure that carries multiple types of traffic (data, voice, and video).

21
New cards

Fault Tolerance

The ability of a network to continue operating despite the failure of a link or device, often through redundancy (multiple paths).

22
New cards

Scalability

The ability of a network to expand and support new users and applications without degrading performance for existing users.

23
New cards

Quality of Service (QoS)

A mechanism to manage network traffic and prioritize certain types of data (like video calls) over less time-sensitive data (like email) to ensure a quality user experience.

24
New cards

Security

The protection of network infrastructure and the information transmitted over it. It is based on three principles

25
New cards

Confidentiality

Only authorized users can read the data.

26
New cards

Integrity

The data has not been altered in transit.

27
New cards

Availability

Authorized users have timely and reliable access to data.

28
New cards

BYOD (Bring Your Own Device)

The practice of employees using their personal devices to access corporate networks and data.

29
New cards

Cloud Computing

Accessing software, storage, and computing power over the internet instead of from a local server or computer. Types include Public, Private, Hybrid, and Community clouds.

30
New cards

Online Collaboration

Tools that allow people to work together remotely (e.g., Cisco WebEx).

31
New cards

Powerline Networking

Using existing electrical wiring in a home to transmit network data.

32
New cards

Threats

Viruses/Worms, Spyware/Adware, Zero-Day Attacks, Denial of Service (DoS) attacks, Data Interception.

33
New cards

Solutions

Antivirus/Antispyware, Firewall, Access Control Lists (ACL), Intrusion Prevention Systems (IPS), and Virtual Private Networks (VPN).