Term
|
Definition
Local Area Network: not a lot of distance between the systems on the network |
|
|
Term
|
Definition
Wide area network: involves to or more LANs. Companies will link multiple offices LANs to each other, creating WAN. |
|
|
Term
|
Definition
Metropoilitan-area network: covers a small metropolitan area
not as big as WAN |
|
|
Term
|
Definition
personal-area network: created by personal devices typically using bluetooth |
|
|
Term
|
Definition
any break in the wire creates a 'nonterminated end'
as a result the entire network collapses |
|
|
Term
|
Definition
most popular types of cabling used
contains 4 pairs of wires twisted around each other inside the cable's jacket.
max length of 100meters |
|
|
Term
Unprotected Twisted Pair: Category 1 (CAT1)speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 2 (CAT2)speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 3 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 4 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 5 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 5e speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 6 speed |
|
Definition
|
|
Term
|
Definition
carries data through pulses of light along its glass core and can reach distances of 2km
Transmits info at speeds ranging: 100Mbps-10Gbps |
|
|
Term
Fiber Optic Connectors: Straight Tip (ST) |
|
Definition
derived from BNC-style connector but uses fiber optic cable |
|
|
Term
Fiber Optic Connectors: Subscriber Connector (SC) |
|
Definition
rectangular and somewhat similar to an RJ-45 connector |
|
|
Term
Fiber Optic Connectors: Fiber local connector (LC) and mechanical transfer-registered jack (MT-RJ) |
|
Definition
|
|
Term
All Ethernet environments |
|
Definition
use CSMA/CD (Carrier Sense Multiple Access/Collision Detection) as an access method. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Network Interface Card (NIC) and its benefits |
|
Definition
responsible for connecting computer to a network.
contains unique address burned onto the ROM chip (hardware address) or Media Access Control address (MAC)
2 lights: - Activity: on when connected - Link: blinks when sending/receiving data |
|
|
Term
Repeater and its benefits |
|
Definition
Regenerates a signal in a network so it can travel the extra distance. |
|
|
Term
|
Definition
Prevents buildup of network traffic.
Connects network segments and also regenerates the signal (like a repeater).
Filters data so it is sent only to the proper portion of the network |
|
|
Term
|
Definition
Responsible for sending info from one network to another. |
|
|
Term
|
Definition
unique network device (or piece of software) responsible for converting info from one format to another.
aka a translator |
|
|
Term
|
Definition
central device that acts as a connection point for all hosts on the network. basic device that send info to every connected port.
can cascade one hub to another |
|
|
Term
|
Definition
Similar to a hub but only sends data specifically to where it needs to go. |
|
|
Term
|
Definition
- three types of cables used on networks are twisted pair, coax, and fiber optic
- 3 basic network layouts (topologies) are bus, star, and ring
- An acesss method determines how a system places data on the wire. 2 popular access methods are CSMA/CD and token passing
- Ethernet is the most popular network architecture used today. Other examples of network archs are token ring and FDDI
- Some of the most popular networking devices are hubs, switches, and routers
- Switches filter network traffic by sending data only to the port used by the destination system. Routers are responsible for sending data from one network to another. |
|
|
Term
What is the max distance of Thinnet segment? 1. 100 meters 2. 500 meters 3. 250 meters 4. 185 meters |
|
Definition
|
|
Term
What is the recommended number for a Peer-to-Peer network? 1. less than 100 2. more than 100 3. less than 10 4. more than 10 |
|
Definition
|
|
Term
What access method is used for Ethernet? 1. Token passing 2. CSMA/CA 3. Twisted Pair 4. CSMA/CD |
|
Definition
4. CSMA/CD
CSMA/CA has been used in AppleTalk networks |
|
|
Term
Which of the following defines 'half-duplex' communication? 1. allows info to be both sent and received, but not at the same time 2. allows info only to be sent 3. allows info to be sent and received at the same time 4. allows info to be sent, but only after dependent info is received |
|
Definition
1. Both sent and received but not same time |
|
|
Term
What access method best describes CSMA/CA? 1. Data is placed out on the wire; sending workstation detects whether there is an error and retransmits if there is. 2. A token runs around the network; when a computer wishes to send data out on the network, it fills the token with information
3. Dummy data is placed on the wire; if the dummy data collides with other information, then the real info is not transmitted. If dummy data does not collide, real data is delivered 4. Dummy data is placed on the wire; if the dummy data collides with other information, then the real info is not transmitted. If dummy data does not collide, real data is withheld. |
|
Definition
3. You comp avoids a collision with the real data by placing dummy data on the wire first. |
|
|
Term
What is the max length of 10Base5 cabling? 1. 100m 2. 185m 3. 250m 4. 500m |
|
Definition
4. 10Base5 is Thicknet that has a max distance of 500m |
|
|
Term
What ethernet architecture transfer information at 1Gbps over short distances and uses fiber optic cabling? 1. 1000BaseSX 2. 1000BaseLX 3. 1000BaseTX 4. 100BaseTX |
|
Definition
|
|
Term
WPA and WPA 2 encyrptions |
|
Definition
most common security method used on wireless networks. |
|
|
Term
Wireless Security Best Practices: Change default usernames and passwords |
|
Definition
ensure you connect to the wireless router and change default usernames and passwords |
|
|
Term
Wireless Security Best Practices: Change the SSID |
|
Definition
to something that has no relevance to your physical location or company name |
|
|
Term
Wireless Security Best Practices: Set encryption |
|
Definition
ensure that you enable wireless encryption to the highest possible level. |
|
|
Term
Wireless Security Best Practices: Disable SSID broadcast |
|
Definition
after setting the SSID value, ensure that you disable SSID broadcasting.
Known as the visibility setting on some routers |
|
|
Term
Wireless Security Best Practices: Enable MAC filtering |
|
Definition
Enable to limit which devices can connect to your wireless network by MAC address |
|
|
Term
Wireless Security Best Practices: Place the access point |
|
Definition
in the middle of the building to get equal coverage |
|
|
Term
Wireless Security Best Practices: Set radio power levels |
|
Definition
reduce power level on the router so that the signal weakens after a short distance.
Someone sitting out on the street cannot connect to your wireless network |
|
|
Term
Wireless Security Best Practices: Assign static IP addresses |
|
Definition
Although this is an admin nightmare, in high-secure environments, you may want to disable DHCP on the router and require static addresses to be configured on any system connecting to the network |
|
|
Term
Wireless Security Best Practices: Disable ports |
|
Definition
the SOHO network will have wired ports on the switch. Disable any ports on the switch that are not being used to prevent unauthorized systems from connecting to the port |
|
|
Term
Wireless Security Best Practices: provide phsyical security |
|
Definition
Ensure that routers and switches are in a central roo that is locked down to prevent unauthorized personnel from gaining physical access to the router and switches |
|
|
Term
|
Definition
- Infrared technology depends on line-of-sight and tends to be used for low-bandwidth solutions
- a number of factors affect wireless signal quality and strength, like interference, range, and number of connected clients
- 102.11a/b/g networks all range 30m (100ft), and 802.11n has rang of 50m (165ft). 802.11a network operates in the 5GHz spectrum, and 802.11b/g operate in 2.4 GHz spectrum; 802.11n can operate in both 5GHz and 2.4 GHz spectrums
- WEP and WPA are the most common methods to secure wireless networks, but other options include disabling SSID broadcasting, MAC filtering, placing wireless APs in a DMZ, and changing default passwords.
- Bluetooth is used only for short-range communication |
|
|
Term
Which of the following is not a technology that can be used to connect to a printer? 1. Bluetooth 2. WWAN 3. 802.11b 4. Infrared |
|
Definition
2. WWAN Printers from different manufacturers support some or all of the listed wireless techs, and WWAN is a tech used to connect to your network while out of the office. |
|
|
Term
Typical client Bluetooth implementations have what ranges? (pick 2) 1. 1m 2. 5m 3. 10m 4. 25m |
|
Definition
1,3. Has ranges of 1, 10, and 100m depending on the class of devices that are being used. |
|
|
Term
What is the standard range of 802.11z/b/g networks? 1. 10m 2. 30m 3. 50m 4. 100m |
|
Definition
2. most have a range of 30m in open air |
|
|
Term
802.11g networks are backward compatible with which other 802.11 tech? 1. 802.11a 2. 802.11b 3. 802.11i 4. 802.11n |
|
Definition
2. 802.11b they both use 2.4 GHz spectrum and were designed to be backward compatible. |
|
|
Term
|
Definition
physical network card inserted into a computer's expansion bus slot, usb device, or integrated into the system board.
after installation of the card, you install the driver for that card within the OS. (allows OS to communicate with hardware via driver). |
|
|
Term
|
Definition
there are client specific networks that you must have the correct 'client' in order to access it.
to install a network client: 1. locate network connections 2. Right-click your local area connection and choose Properties 3. General tab 4. Verify that Client for Microsoft Networks appears in the list of components and has a check mark beside it. |
|
|
Term
|
Definition
Are languages used to hold conversation on a network.
All computers on the same network must have the same protocol installed. |
|
|
Term
|
Definition
example: File sharing - allows the server to share files with other users on the network
Printer sharing - allow a printer to be used by multiple users on the network. You don't need to purchase a separate printer for each user on the network. |
|
|
Term
|
Definition
NetBIOS Extended User Interface
dev'd by IBM for small networks (fewer than 10 comps)
impractical because information cannot leave the network and is nonroutable.
Benefit: there is no configuration |
|
|
Term
|
Definition
Transmission Control Protocol/Internet Protocol
Is a routable protocol |
|
|
Term
|
Definition
First octet value: 1-127 n.h.h.h subnet mask: 255.0.0.0 |
|
|
Term
|
Definition
First octet value: 128-191 n.n.h.h Subnet mask: 255.255.0.0 |
|
|
Term
|
Definition
First octet value: 192-223 n.n.n.h Subnet mask: 255.255.255.0 |
|
|
Term
|
Definition
made up of 4 sets of numbers seperated by periods.
each number represents an octet (each octet represents 8 bits of data)
to decipher which Class IP address look at the first octet |
|
|
Term
|
Definition
what your computer uses to determine whether the network device it is truing to comm with is on the same network.
determines network ID portion of the IP address by comparing the subnet mask against the IP address |
|
|
Term
|
Definition
TCP/IP option configured on each workstation. typically all comps on the same network point to the same router. |
|
|
Term
Communicating with systems off the network |
|
Definition
need: IP address subnet mask default gateway |
|
|
Term
Communicating with systems on the network |
|
Definition
need: IP address subnet mask |
|
|
Term
Troubleshooting network connectivity |
|
Definition
use 'ipconfig' command to view the TCP/IP settings
if the IP is 169.254.x.y, client cannot communicate with the DHCP server
make sure client is connected to network correctly and then verify the DHCP server is functioning |
|
|
Term
What resolves FQDNs to IP addresses? |
|
Definition
|
|
Term
What resolves computer names to IP addresses? |
|
Definition
|
|
Term
Troubleshooting network issues: No connectivity |
|
Definition
check the physical connections first and verify your network configuration, like the IP configuration |
|
|
Term
Troubleshooting network issues: APIPA address |
|
Definition
If you have an IP address of 169.254.x.y, you are having trouble obtaining an IP address from the DHCP server. you need to verify that the client is connected to the network properly and check the DHCP server |
|
|
Term
Troubleshooting network issues: Limited connectivity |
|
Definition
If connected to a network and experiencing limited connectivity, verify the IP settings such as the default gateway and the DNS server setting/
Verify router is connected to the internet |
|
|
Term
Troubleshooting network issues: Local connectivity |
|
Definition
double-check that the system has a default gateway configured and that the router has a connection to the internet. |
|
|
Term
Troubleshooting network issues: Intermittent connectivity |
|
Definition
difficult to troubleshoot.
verify there is not a problem with the cable, check for devices that could be causing interference |
|
|
Term
Troubleshooting network issues: IP conflict |
|
Definition
If duplicate IP address, you will be unable to join network.
Make sure IP addresses are unique |
|
|
Term
Troubleshooting network issues: Slow transfer speeds |
|
Definition
check the card settings and the settings on the router to see if there is an explanation that the network devices would be using a slow transfer rate |
|
|
Term
Troubleshooting network issues: Low RF signal |
|
Definition
you may need to go into the router and increase the power level of the signal |
|
|
Term
|
Definition
- 4 major networking components are required in Windows networks: # A network client # A network adapter # A common protocol # A service
- TCP/IP is the most popular network protocol used today. When installing TCP/IP, you need to configure the following: # An IP address # A subnet mask # A default gateway
- The NetBEUI protocol is a nonroutable protocol used on small networks
- In Microsoft networking environments, to allow users to connect to your hard drive or printer, you must install the File and Printer Sharing service
- You may use the 'ipconfig' comand in Windows to view your TCP/IP configuration
- The 'ping' command is used to send test messages to a remote system to verify that the communication can take place on that system |
|
|
Term
Which resolution technique is used to resolve the IP address to a MAC address? 1. DNS 2. WINS 3. ARP 4. ipconfig.exe |
|
Definition
3. Address Resolution Protocol (ARP) converts the IP address to the network card address (MAC).
DNS and WINS convert different types of names to an IP address |
|
|
Term
Which service is responsible for converting 'www.wiley.com' to an IP address? 1. DHCP 2. DNS 3. WINS 4. ARP |
|
Definition
|
|
Term
You want to share the data folder as a resource to be used only by network administrators. How should you do this? 1. Hide the sahre by naming it data$ and then set up permissions so that only admins have access. Tell the admins the UNC path 2. Don't share the folder; tell the admins to go to the local computer to access the resource 3. Set up the share permissions so that only admins have access to the share 4. Share the resource and don't set any permissions |
|
Definition
1. it may be best to hide it from the network by making it a hidden share to no one tries to sneak into it. |
|
|