Term
|
Definition
Links 2 or more computers together to communicate and share resources. |
|
|
Term
|
Definition
The first software programs that ran on a LAN were not capable of permitting more than one user at a time to use a program (This constraint was known as what?) |
|
|
Term
Servers, Clients or Workstations, and Resources |
|
Definition
When looking at the devices or resources available on a network, there are 3 types of components to be aware of. What are they? |
|
|
Term
A network operating system (NOS) and some kind of shared medium. |
|
Definition
Every network requires 2 or more items to tie the three comenents together. What are they? |
|
|
Term
|
Definition
Servers that provide files to the users on the network are called what? |
|
|
Term
|
Definition
Servers that host printing services for users are called what? |
|
|
Term
A file server and printer server |
|
Definition
If a server is multi-purpose, they can be what at the same time? |
|
|
Term
A file server OR A printer server |
|
Definition
What type of server is a single-purpose server? |
|
|
Term
|
Definition
A _____ server is assigned to provide specific applications or services for the network, and nothing else. |
|
|
Term
|
Definition
_______ servers are assigned to provide one or more network services and local access. |
|
|
Term
|
Definition
Computers on which the network users do their work are called what? |
|
|
Term
|
Definition
Workstations are also known as what? |
|
|
Term
Network Interface Card (NIC) |
|
Definition
A special expansion card that allows the PC to talk on a network. |
|
|
Term
|
Definition
The arrangement allowing multiple users to use a single installation of an application. |
|
|
Term
Network Operating System (NOS) |
|
Definition
Networks use a _____ to control the communication with resources and the flow of data across the network. |
|
|
Term
|
Definition
In a _____ network, the computers act as both service providers and service requestors. |
|
|
Term
|
Definition
Peer-to-peer networks are also referred to as what? |
|
|
Term
Server Based (client-server) |
|
Definition
______ networks use one or more dedicated, centralized servers. |
|
|
Term
|
Definition
Server-based networks are also known as what? |
|
|
Term
|
Definition
When you log into the network, the login request is passed to the server responsible for security, sometimes known as what? |
|
|
Term
|
Definition
A way of laying out a network. |
|
|
Term
|
Definition
Describes how the cables are run. |
|
|
Term
|
Definition
Describes how the network messages travel. |
|
|
Term
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Hybrid (usually physical) |
|
Definition
What are 5 primary topologies? |
|
|
Term
|
Definition
It consists of a single cable that runs to every workstation. |
|
|
Term
|
Definition
Branches each network device off a central device called a hub, making it easy to add a new workstation. |
|
|
Term
|
Definition
Each computer connects to two others , joining them in a circle and creating a unidirectional path where messages move from workstation to workstation. |
|
|
Term
|
Definition
Each device is connected to every other device. |
|
|
Term
|
Definition
Formula to determine number of cables needed in a mesh topology. |
|
|
Term
|
Definition
A simple mix of of the other topologies. |
|
|
Term
|
Definition
A network architecture's performance is usually discussed in terms of what? |
|
|
Term
|
Definition
Only one signal can be passed along a cable at one time. |
|
|
Term
|
Definition
Multiple signals can be transmitted on the medium at one time. |
|
|
Term
|
Definition
Uses a physical star, logical ring topology. |
|
|
Term
|
Definition
To facilitate communication across a network, computers use a common language called _____ |
|
|
Term
Open Systems Interconnection (OSI) |
|
Definition
The ISO introduced the __________ model to provide a common way of describing network protocols |
|
|
Term
|
Definition
Allows access to network services. This is the layer at which file services and print services will operate. |
|
|
Term
|
Definition
Determines the "look," or format, of the data. This layer performs protocol conversion and manages data compression, data translation, and encryption. The character set information is also determined at this level |
|
|
Term
|
Definition
Allows applications on different computers to establish, maintain, and end a session. A session is one virtual conversation. This layer enables network procedures, such as identifying passwords, logons, and network monitoring. |
|
|
Term
|
Definition
Verifies that all packets were recieved by the destination host on a TCP/IP network. This layers most important job is to provide error checking and reliable, end-to-end communications. |
|
|
Term
|
Definition
Responsible for logical addressing of messages. At this layer, the data is organized into chunks called packets. |
|
|
Term
|
Definition
Arranges data into chunks called frames. This layer is very important because it makes transmission easier and more manageable and allows for error checking within the data frames. This layer also describes the unique physical address (also known as the MAC address) for each NIC. |
|
|
Term
|
Definition
Describes how the data gets transmitted over a physical medium. This layer defines how each long piece of data is and the translation of each into the electrical pulses that are sent over the wires. |
|
|
Term
|
Definition
Carrier Sense Multiple Access with Collision Detection |
|
|
Term
|
Definition
Institute of Electrical and Electronics Engineers |
|
|
Term
|
Definition
Based on the IEEE 802.3 CSMA/CD standard, what is the most well known example of a protocol? |
|
|
Term
|
Definition
A special chunk of data called a token circulates through the ring from computer to computer. Any computer that has data to transmit must wait for the token. |
|
|
Term
Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
The _______ suite is the most popular network protocol in use today, thanks mostly to the rise of the internet. |
|
|
Term
|
Definition
Any device with an IP address is referred to as a what? |
|
|
Term
Hypertext Transfer Protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
Simple Mail Transfer Protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
Transfer Control Protocol (TCP) and User Datagram Protocol (UDP) |
|
Definition
At the Host-to-Host layer of the DoD model there are only 2 protocols, _____ and _______ . |
|
|
Term
Internet Control Message Protocol |
|
Definition
|
|
Term
Address Resolution Protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Each IP address is made up of 2 components. What are they? |
|
|
Term
|
Definition
Computers are able to differentiate where the network address ends and the host address begins through the use of what? |
|
|
Term
|
Definition
The IP address of the device that will take you outside your network. |
|
|
Term
|
Definition
What class of IP address is used for large networks |
|
|
Term
|
Definition
Class of IP address used for medium-sized networks |
|
|
Term
|
Definition
Class of IP address for smaller networks with few hosts |
|
|
Term
|
Definition
Class of IP address reserved for multicasts (sending messages to multiple systems) |
|
|
Term
|
Definition
IP address class reserved for testing. |
|
|
Term
Network basic input/output system |
|
Definition
|
|
Term
NetBIOS Extended User Interface |
|
Definition
|
|
Term
Internetwork Packet Exchange/Sequenced Packet Exchange |
|
Definition
|
|
Term
|
Definition
A communication protocol similar to TCP/IP, but it's used primarily in LAN's |
|
|
Term
|
Definition
Not just a protocol, its a proprietary network architecture for Macintosh computers |
|
|
Term
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) |
|
Definition
Appletalk uses _____ technology to put data on the cable. |
|
|
Term
|
Definition
The default networking protocol on Macs |
|
|
Term
Network Interface Card (NIC) |
|
Definition
Provides the physical interface between computer and cabling. |
|
|
Term
Coaxial Cable, Twisted Pair Cable, Fibre Optic Cable, and Wireless. |
|
Definition
What are the 4 main types of cabling methods? |
|
|
Term
|
Definition
__________ is immune to electromagnetic or radio-frequency interference. |
|
|
Term
|
Definition
Which IEEE 802 standard defines a bus topology using coaxial baseband cable and is able to transmit at 10 Mbps? |
|
|
Term
|
Definition
Which OSI layer signals "all clear" by making sure the data segments are error free? |
|
|
Term
|
Definition
Which TCP/IP protocol uses port 80? |
|
|
Term
A type of password used to help secure a wireless connection |
|
Definition
What is the primary function of the SSID? |
|
|
Term
|
Definition
What is the most secure wireless encryption standard for the 802.11x networks? |
|
|
Term
|
Definition
If you are going to run a network cable in the space above the drop ceiling in your office, which type of cable should you use? |
|
|
Term
|
Definition
Which wireless communication standard is often described in terms of a wireless personal area network? |
|
|
Term
Global System for Mobile Communications (GSM), and Code Division Multiple Access(CDMA) |
|
Definition
The 2 major cell standards in the US are? |
|
|
Term
|
Definition
A ______ is a point-to-point network between 2 devices. |
|
|
Term
Secure and Fast Encryption Routine (Safer+) |
|
Definition
For security, Bluetooth uses the __________ encryption routine, a 128-bit algorithm. |
|
|