Beruflich Dokumente
Kultur Dokumente
Study Guide
Chapter 1: Living in a network-centric world
Objectives
1. Describe how networks impact our daily lives
Networks present a platform on which to run business, address emergencies,
form individual opinions and support education, science and government.
2. Describe the role of data networking in the human network
Data networks and human networks use similar procedures to ensure that
their communication gets to the destination accurately and on time.
3. Identify the key components of any data network
A. Four Elements of a Network:
1. Rules
2. Medium
3. Messages
4. Devices
B. Common Network intermediary Devices:
Switch - the most common device for interconnecting local area networks
Firewall - provides security to networks
Router - helps direct messages as they travel across a network
Wireless Router - a specific type of router often found in home networks
Cloud - used to summarize a group of networking devices, the details of
which may be unimportant to the discussion at hand
Serial Link - one form of WAN interconnection, represented by the lightning
bolt-shaped line
C. Networks are either wired or wireless. All wireless networks are
connected to a wired network at some point.
a. In wired connections, the medium is either copper, which
carries electrical signals, or optical fiber, which carries light
signals. Copper medium includes cables, such as twisted pair
telephone wire, coaxial cable, or most commonly, what is
known as Category 5 Unshielded Twisted Pair (UTP) cable.
Optical fibers, thin strands of glass or plastic that carry light
signals, are another form of networking media.
b. In wireless connections, the medium is the Earth's
atmosphere, or space, and the signals are microwaves.
Wireless media may include the home wireless connection
between a wireless router and a computer with a wireless
IP Telephony
Protocol (rule)
HTTP (Hypertext transport protocol)
SMTP (Simple mail Transport Protocol)
POP (Post Office Protocol)
XMPP (Extensible Messaging and
Presence Protocol)
OSCAR (Open System for
Communication in Realtime
SIP (Session Initiation Protocol)
Vocabulary
1.
2.
3.
4.
22.Internet: a publicly accessible network of interconnected computer networks that transmit data
by using IP, the internet protocol.
23.Internetwork: The interconnection of two or more different networks.
24.Media: Plural form of medium
25.Medium: a physical medium in which data in transferred. For example UTP is a form of
networking media.
26.Network: A network is multiple computers connected together using a communications system.
The purpose of a network is for computers to communicate and share files.
27.Packet: Logical grouping of information that includes a header containing control information
and (usually) user data. Packets are most often used to refer to network layer units of data. The
terms datagram, frame, message, and segment are also used to describe logical information
groupings at various layers of the OSI reference model and in various technology circles.
28.Podcasting: Podcast is a digital media file or files that are distributed over the Internet using
syndication feeds, for playback on portable media players and personal computers.
29.Point of failure: Describes any part of the system that can, if it fails, cause an interruption of
required service.
30.Process: A series of progressive and interdependent steps which an end is attained.
31.QOS: a control mechanism that can provide different priority to different users or data flows, or
guarantee a certain level of performance to a data flow in accordance with requests from the
application program.
32.Real-Time: Events of signals that show output as fast as possible or as they happen.
33.Router: Network layer device that uses one of more metrics to determine the optimal path along
which network traffic should be forwarded. Routers forward packets from one network to
another based on network later information.
34.Routing: Processes of finding a path to a destination host. Routing is very complex in large
networks because of many potential intermediate destinations a packet might traverse before
reaching its destination host.
35.Server: A computer that provides services to clients. Servers are the central point in
client/server model networks. There exist many services that a server can provide to network
clients. For example: DNS, DHCP. File storage, Application hosting and website hosting.
36.Software: Program or codes used by computer to carry out certain functions.
37.Source: The origin of the message
38.Standard: An internationally recognized definition of technical specifications that ensure
worldwide consistency
39.Stream: The continuous transmission of data from on location to another. For example a
streaming video is a continuous real-time flow of the video being downloaded as you watch the
video.
40.TCP/IP: Transmission Control Protocol/Internet Protocol. Common name for the suite of protocols
developed by the US DOD in the 1970s to support the construction of worldwide internetworks.
TCP and IP are the 2 best known protocol in the suite.
41.UTP: A four-pair wire medium used in a variety of networks. UTP does not require the fixed
spacing between connections that is necessary with coaxial-type connections. There are 5 types
of UTP cabling commonly used: Category 1, Category 2, Category 3, Category 4, and Category
5.
42.Wiki: a website that lets visitors add, edit and delete content, typically without the need of
registration. A good example of this is a site called Wikipedia where visitors can access the
website and add their commentaries to already written articles or create a new article.
43.Wireless Technology: Technology that allows for communication without needing physically
connectivity. Examples of wireless technology include cellular phones, personal digital
Quiz
1. Which form of communication is a real time text-based communication type
used between two or more people who use mostly text to communicate with
each other?
a. Weblogs
b. Wikis
c. Instant Messaging
d. Podcasting
e. Collaboration Tools
2. Which type of network provides customers limited access to corporate data
such as inventory, part lists and order?
a. Intranet
b. Extranet
c. Internetwork
d. Internet
3. What balances the importance of traffic and its characteristics in order to
manage data?
a. Network administration
b. Network traffic
c. QOS Strategy
d. Network evaluation
4. Which processes occur to network traffic so that quality of service strategies
work correctly? (choose two)
a. Traffic is classified on quality of service requirements
b. Priorities are assigned to each classification of application data
c. Web traffic is always assigned to a high priority queue for processing
d. Digital movies are always assigned to the high priority queue for
processing
e. Email traffic is always assigned to the low priority queue
5. What are two components of network architecture? (Choose two)
a. People that comprise the human network
b. Programmed services and protocols that move the messages across
the network
c. Data transferred across the network
d. Technologies that support network communications
e. Corporations that operate and maintain the data network
6. For which 3 reasons were circuit-switched, connection-oriented technologies
rejected when the Internet was being developed? (Choose three)
a. Circuit-switched technologies required that a single message be broken
up into multiple message blocks that contain addressing information
b. Early circuit-switched networks did not automatically establish
alternative circuits in the event of circuit failure.
c. Circuit-Switched technologies required that an open circuit between
network endpoints to be established, even if data was not actively
being transferred between locations.
Network infrastructure
Security
a hacker connects to a
network device and
changes settings in its
management software
builders accidental cut
a network cable while
digging
a custodian unplugs an
essential network
device
Content Security
a secretary sends
confidential information
in reply to an e-mail
that falsely appears to
come from her boss
a disgruntled employee
alters information in a
customer database
a competitor accesses
sensitive information
through an unsecured
wireless network