You are on page 1of 14

Quiz 1 for Data Communication

1. Computer Networking/ Networking / Network


Interconnected devices that can exchange data and share resources with each other.

2. Data Communication
Refers to the exchange of data between a source and a receiver via form of transmission media.

3. Client-Server networks
Computer networks that use a dedicated computer/server to store data, manage resources and
control user access.

4. Intermediary Devices
A device that interconnects end devices.

5. End Devices
The source or destination of data transmitted over the network.

6. Logical Network Topology


Illustrates how data flows within a network.

7. Wide Area Network/WAN


The largest and most expansive forms of computer networks.

8. Converged Network
Capable of Delivering voice, video streams, text and Graphics over the same communication
channel.

9. Confidentiality, Availability and Integrity


Three Primary requirements to achieve the goals of network security

10. Identity Theft


An attack to steal the login credentials of a user in order to access private data.

11. An attack designed to slow or crash applications and processes on a network device.

12. VPN/Virtual Private Networks


Used to provide secure access to remote workers.

13. Cloud Computing


Global trend that changes the way we access and store data.

14. Network Operating System


An operating system designed for the sole purpose of supporting workstations, database,
application, file and printer sharing among multiple computers in a network.
15. Command Line Interface
CLI Stands for

16. Internetwork Operating System


IOS Stands for

17. Kernel/ OS Kernel


Communicates directly with the hardware and manages how hardware resources are used to
meet software requirements.

18. SSH (Secure Shell)


In-band method for remotely and securely establishing a CLI session over a network.

19. User exec


Referred to as “View-Only” mode.

20. Privileged Exec


Command mode that allows the execution of configuration and management commands.

21. Interface Mode


Command mode to configure one of the network interfaces.

22. Enable
A command that is use to enter privileged mode.

23. Keyword
A specific parameter defined in the operating system.

24. ?/Question Mark


A symbol to access the context-sensitive help at any prompt.

25. Ctrl Z/Ctrl + Z


A hotkey to exits the configuration mode and returns to Privileged Exec Mode.

26. Local area network


a group of computers in a peripheral device that share a common line specific in one location

27. Metropolitan area network


Bigger than LAN but not larger than wan, wireless LAN connected

28. Network architecture


refers to the technology that moves data across, it is the way your network devices are
structured
29. Fault Tolerance
Redundant connections allow for alternative paths if a device or a link fails the user experience
is unaffected

30. Scalability
Additional users and whole networks can be connected to the internet without degrading
performance for existing users

31. Quality Of Service


Managed by the router, ensures that priorities are matched with type of communication
and its importance to the organization

32. Security
Administrator can protect with the software and hardware security and by preventing physical
access to network devices

33. OS Shell
is either a command-line interface (CLI) or a graphical user interface (GUI) and enables a user to
interface with applications

34. Hardware
The physical part of a computer including underlying electronics.

35. Console port


Out-of-band serial port used primarily for management purposes such as the initial
configuration of the router

36. Telnet
In band interfaces remotely establishing a CLI session through a virtual interface, over a
network. User authentication, passwords, and commands are sent over the network in plaintext

37. Terminal Emulation


a terminal emulation program will be required. Popular terminal emulation programs include
PuTTY, Tera Term, SecureCRT, and OS X Terminal.

38. global configuration


primary configuration mode

39. configure terminal


command to access primary configuration mode
40. Line mode
to configure the console, AUX, Telnet, or SSH access
41. Exit
Used to move from a specific mode to the previous more general mode, such as from interface
mode to global config

42. End
Can be used to exit out of global configuration mode regardless of which configuration mode
you are in

43. Argument
not predefined; a value or variable defined by the user

44. description string


The command is used to add a description to an interface. The string argument is text entered
by the administrator such as description Connects to the main headquarter office switch.

45. ping ip-address


The command is ping and the user-defined argument is the ip-address of the destination
device such as in ping 10.10.10.5

46. command line interpreter


checks an entered command from left to right to determine what action is being requested

47. Down Arrow


Allows the user to scroll through command history

48. Up Arrow
Allows the user to scroll backward through commands

49. Tab
Completes the remainder of a partially entered command

50. Ctrl-A
Moves to the beginning of the line

51. Ctrl-E
Moves to the end of the line

52. Ctrl-R
Redisplays a line.

53. Ctrl-C
Exits the configuration mode or aborts the current command
54. Ctrl-Shift-6
Allows the user to interrupt an IOS process

====================================================================================

55. Transmission Control Protocol


Set of communication protocols used to connect network devices on the internet

56. Domain Name System


Translates human Readable Domain names to machine readable Ip addresses

57. Dynamic Host Configuration Protocol


is a client/server protocol that automatically assigns an IP address and other configuration
information to an Internet Protocol (IP) host

58. Internet Message Access Protocol


messages are stored in a remote server. Users can log in via multiple email clients on computers
or mobile device and read the same messages.

59. Trivial File Transfer Protocol


is a simple protocol for exchanging files between two TCP/IP machines

60. Hypertext Transfer Protocol


It was created to facilitate communication between web browsers and web servers

61. User Datagram Protocol


is a communications protocol that is primarily used to establish low-latency and loss-tolerating
connections

62. Standards Organizations


are important in maintaining an open Internet with freely accessible specifications and protocols
that can be implemented by any vendor

63. Open standards


guarantee that no single company’s product can monopolize the market, or have an unfair
advantage over its competition

64. HTTP
an application protocol that governs the way a web server and a web client interact.

65. TCP
transport protocol that manages the individual conversations
66. IP
encapsulates the TCP segments into packets, assigns addresses, and delivers to the destination
host

67. Ethernet
allows communication over a data link and the physical transmission of data on the network
media

====================================================================================

68. Physical Connection


Can be wired connection using a cable or a wireless connection using radio waves
69. Network Interface Cards (NIC)
connect a device to a network, used for wired connection

70. Wireless Local Area Network Interface Cards WLANIC


are used for wireless connections

71. Physical Layer


Provides means to transport bits that make up a date link layer frame across the network media,
accepts a complete frame from the date link layer and encodes it as a series of signals that are
transmitted onto the local media,

72. Transition
Occurs at the middle of each bit period

73. Modulation
Is the process by which characteristics of one wave modifies another wave

74. Encoding
Converts a stream of data bits into a predefined code

75. Signaling method


Method of representing the bits, Physical Layer standards must define what type of signal
represents an “1” and what type of signal represents “0”

76. Bandwidth
Capacity of a medium to carry data, Measures the amount of data that can flow from one place
to another in a given amount of time, The speed that bit travel, the number of bits that are
transmitted per second

77. Throughput
Measure of the transfer of bits across the media over a given period of time, Usually does not
match the specified bandwidth in physical layer implementations due to many factors

78. Goodput
Is throughput minus traffic overhead for establishing sessions, acknowledgments, and
encapsulation

79. Data link Layer


layer prepares network data for the physical network

80. Logical Link Control


Communicates with the network layer, Identifies which network layer protocol is being used for
the frame, Allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network
interface and media
81. Media Access Control
Defines the media access processes performed by the hardware, provides data link layer
addressing and access to various network technologies, communicates with Ethernet to send
and receive frames over copper or fiber-optic cable, communicates with wireless technologies
such as Wi-Fi and Bluetooth.

equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway, the
absence of any media access control would be the equivalent of vehicles ignoring all other traffic
and entering the road without regard to the other vehicles

82. Router
Accepts a frame from a medium, de-encapsulates the frame, re-encapsulates the packet into a
new frame, forwards the new frame appropriate to the medium of the segment

83. Physical Topology


Refers to the physical connections and identifies how end devices and infrastructure devices
such as routers, switches, and wireless access points are interconnected

84. Logical Topology


Refers to the way a network transfers frames from one node to the next. These logical signal
paths are defined by data link layer protocols

85. Point to point


Permanent link between two endpoints.

86. Hub and spoke


A central site interconnects branch sites using point-to-point links

87. Mesh
Provides high availability, but requires that every end system be interconnected to every other
system. Administrative and physical costs can be significant

88. Frame start and stop indicator Flags


Frame field that Identifies the beginning and end limits of the frame

89. Addressing
Frame field that Indicates the source and destination nodes.

90. Type
Frame field that Identifies the Layer 3 protocol in the data field.

91. Control
Frame field that Identifies special flow control services such as QoS

92. Data
Frame field that, contains the frame payload (i.e., packet header, segment header, and the
data).

93. Copper cabling


Transmitted on copper cables as electrical pulses.

94. Attenuation
The longer the signal travels, the more it deteriorates. All copper media must follow strict
distance limitations.

95. EMI and RFI


distorts and corrupts the data signals being carried by copper media. To counter copper cables
wrapped in shielding.

96. Crosstalk
disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an
adjacent wire. To cancel crosstalk opposing circuit wire pairs twisted together

97. UTP
is the most common networking media, terminated with rj-45 connectors, used for
interconnecting network hosts with networking devices such as switches, consists of four pairs
of color-coded wires that have been twisted together to help protect against signal interference
from other wires, color codes aid in cable termination.

98. STP
provides better noise protection than UTP, is significantly more expensive and difficult to install,
uses an rj-45 connector, combines the techniques of shielding to counter emi and rfi, and wire
twisting to counter crosstalk, uses four pairs of wires, each wrapped in a foil shield, which are
then wrapped in an overall metallic braid or foil.

99. Coaxial
a copper conductor used to transmit the electronic signals, a layer of flexible plastic insulation
surrounding a copper conductor, the insulating material is surrounded in a woven copper braid,
or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor,
the entire cable is covered with a cable jacket to prevent minor physical damage, UTP cable has
essentially replaced coaxial cable in modern ethernet installations but is used in:, wireless
installations: coaxial cables attach antennas to wireless devices, cable internet installations

100. Cat 3 Cable


Used for voice communication, Most often used for phone lines

101. Cat 5 Cable


Used for data transmission, supports 100 Mb/s and can support 1000Mb/s, but it is not
recommended, supports 1000 Mb/s

102. Cat 6 Cable


Used for data transmission, An added separator is between each pair of wires, allowing it to
function at higher speeds, support 1000 Mb/s – 10 Gb/s, though 10 Gb/s is not, UTP Cabling
Standards

103. Fiber optic cabling


transmits data over longer distances and at higher bandwidths, transmit signals with less
attenuation and is completely immune to EMI and RFI, used to interconnect network devices,
flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a
human hair, bits are encoded on the fiber as light pulses

104. Jacket
Protects the fiber against abrasion, moisture, and other contaminants. Composition can vary
depending on the cable usage

105. Strengthening material


Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled.
Often the same material used to produce bulletproof vests.

106. Buffer
Used to help shield the core and cladding from damage
107. Cladding
Tends to act like a mirror by reflecting light back in the core of the fiber. Keeps light in the core
as it travels down the fiber.

108. Core
Light transmission element at the center of the optical fiber. Core is typically silica or glass. Light
pulses travel through the fiber core

109. Straight-tip Connectors


One of the first connector types used, Locks securely with a “twist-on/twist-off”.

110. Subscriber Connectors


Referred to as square or standard connector, uses a push-pull mechanism to ensure positive
insertion, Used with multimode and single-mode fiber.

111. Lucent Connectors (Simplex Connectors)


Smaller version of SC and popular due to size.

112. Duplex Multimode Lc Connectors


Similar to LC but using a duplex connector

113. Misalignment
The fiber-optic media are not precisely aligned to one another when joined

114. Endgap
The media does not completely touch at the splice or connection

115. Endfinish
The media ends are not well polished, or dirt is present at the termination

116. Coverage area


Construction materials used in buildings and structures, and the local terrain, will limit the
coverage

117. Interference
Disrupted by such common devices as fluorescent lights, microwave ovens, and other wireless
communications

118. Security
Devices and users, not authorized for access to the network, can gain access to the transmission.

119. Shared medium


Only one device can send or receive at a time and the wireless medium is shared amongst all
wireless users
120. Wi-fi
Uses Carrier/Sense Multiple Access/Collision Avoidance (CSMA/CA), wireless NIC must wait till
channel is clear

121. Bluetooth
Wireless Personal Area Network (WPAN), uses a device pairing process for distances 1 to 100
meters

122. WiMAX
Worldwide Interoperability for Microwave Access, wireless broadband access.

123. Wireless access point


Concentrates the wireless signals from users and connects to the existing copper-based
network infrastructure, such as Ethernet

124. Wireless NIC Adapters


Provide wireless communication capability to each network host

6 TCP PROTOCOLS
1. DNS
2. DHCP
3. IMAP
4. TFTP
5. HTTP
6. UDP

PHYSICAL LAYER STANDARDS


1. IOS
2. TIA
3. EIA
4. ITU
5. ANSI
6. IEEE

DATA LINK LAYER STANDARDS


1. IEEE
2. ITU
3. ISO
4. ANS
LISTS OF ACRONYMS

TCP Transmission Control Protocol

DNS Domain Name System

DHCP Dynamic Host Configuration Protocol

IMAP Internet Message Access Protocol

TFTP Trivial File Transfer Protocol

HTTP Hyper Text Transfer Protocol

UDP User Datagram Protocol

ECSO Electronic and Communications Standards Organization

ISOC Internet Society

IAB Internet Architecture Board

IETF Internet Engineering Task Force

IEEE Institute of Electrical and Electronic Engineers

ISO International Organization for Standardization

IRTF International Research task Force

IANA Internet Assigned Names Authority

ICANN Internet Corporation for Assigned Names and Numbers

STD Standard

TIA Telecommunication Industry Association

EIA Electronic Industry Association

ITU International Telecommunication Union

ANSI American National Standards Institute


True

Straight through

Straight through

8 wired

True

UTP Cable

True

Crimping

Registered

You might also like