Computer Networking
HSLU
HSLU
Kartei Details
Karten | 74 |
---|---|
Sprache | English |
Kategorie | Informatik |
Stufe | Universität |
Erstellt / Aktualisiert | 12.10.2023 / 17.10.2023 |
Weblink |
https://card2brain.ch/box/20231012_computer_networking
|
Einbinden |
<iframe src="https://card2brain.ch/box/20231012_computer_networking/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Lernkarteien erstellen oder kopieren
Mit einem Upgrade kannst du unlimitiert Lernkarteien erstellen oder kopieren und viele Zusatzfunktionen mehr nutzen.
Melde dich an, um alle Karten zu sehen.
What are some recent networking trends that have an impact on both organizations and consumers?
Recent networking trends include Bring Your Own Device (BYOD), online collaboration, video communications, and cloud computing.
What is the main concept of Bring Your Own Device (BYOD), and what types of devices can end users employ in this approach?
BYOD allows users to utilize their own devices, providing them with increased opportunities and flexibility. End users can use devices like laptops, netbooks, tablets, smartphones, and e-readers as part of BYOD.
What is online collaboration's role in network trends, and how does Cisco WebEx assist in this process?
Online collaboration enables joint projects over the network, and tools like Cisco WebEx support collaboration by allowing users to instantly connect and interact, including features such as sending instant messages, sharing images, posting videos, and sharing links. Collaboration is a high priority in business and education.
In the context of network trends, why is video communication considered crucial, and what is Cisco TelePresence?
Video communication is vital for connecting with anyone, regardless of their location, and it plays a crucial role in effective collaboration. Cisco TelePresence is a method that enables collaboration with people from everywhere.
What is the primary purpose of cloud computing, and how does it enable access to applications and data? Additionally, how do smaller companies benefit from cloud computing?
Cloud computing primarily allows for storing personal files and data backup on internet servers and provides access to applications. Smaller companies benefit by leasing server and storage services from larger data center organizations in the Cloud, which they might not afford to build themselves.
What are the four types of Clouds, and can you provide brief descriptions of each?
The four types of Clouds are Public Clouds (available to the general public), Private Clouds (intended for specific organizations), Hybrid Clouds (combinations of two or more Cloud types), and Custom Clouds (built to meet specific industry needs and can be private or public).
What is the growing trend in technology for homes, and how does it enable appliances to function?
Smart home technology is a growing trend that integrates technology into everyday appliances, allowing them to interconnect with other devices. For example, ovens can communicate with your calendar to know when to start cooking a meal based on your schedule.
In what situations is powerline networking particularly useful, and how does it work?
Powerline networking is useful when data network cables or wireless communication is not feasible. It works by allowing devices to connect to a LAN via electrical outlets using standard powerline adapters that transmit data on specific frequencies. This is especially handy when wireless access points cannot reach all devices in the home.
What is wireless broadband, and how does it work for homes and small businesses?
Wireless broadband is an internet connection option, especially in rural areas, provided by Wireless Internet Service Providers (WISPs). It uses cellular technology and an outside antenna to connect devices in the home.
Why is network security important, and what does securing a network entail?
Network security is essential, and securing a network involves various methods, considering both data protection and quality of service. Threat vectors can be external or internal.
What are some examples of external security threats?
External threats include viruses, worms, Trojan horses, spyware, adware, zero-day attacks, threat actor attacks, denial of service attacks, data interception and theft, and identity theft.
What are examples of internal security threats?
Internal threats consist of lost or stolen devices, accidental misuse by employees, malicious employees, and the fact that internal users of the network are responsible for most security breaches.
Why is it essential to implement security in multiple layers, and what are the key network security components for a home or small office network?
Security must be implemented in multiple layers to enhance protection. Key components for a home or small office network include antivirus and antispyware software on end devices and firewall filtering to block unauthorized access.
What are the additional security requirements for larger networks?
Larger networks require a dedicated firewall system, access control lists (ACL) for filtering, intrusion prevention systems (IPS) to detect threats like zero-day attacks, and virtual private networks (VPN) for secure remote access.
What is the initial step in studying network security?
The study of network security starts with understanding the switching and routing infrastructure.
What is the term used to refer to every computer on a network?
Every computer on a network is referred to as a "host" or "end device."
Can you provide examples of servers that provide information to end devices?
Servers are computers that provide information to end devices. Examples of servers include email servers, web servers, and file servers.
Can you provide examples of server types and their functions in a network?
Servers include email servers (for email services), web servers (for hosting websites), and file servers (for storing and serving files).
How do clients interact with servers, and what software do they use?
Clients send requests to servers for information or services. They use specific client software, such as email clients, web browsers, or file access tools
: What is the role of an email server, and how do clients access email?
An email server manages and stores email messages. Clients access emails using email client software to send, receive, and manage messages.
What is a web server, and how do clients access web pages hosted on it?
A web server hosts websites and web applications. Clients access web pages by using web browsers to request and receive web content.
What is a file server, and what kind of data does it typically store and serve to client devices?
A file server stores corporate and user files, providing clients with access to documents, images, videos, and other file types.
Are there other common server types in networks not mentioned?
Yes, additional server types include database servers (managing databases), DNS servers (resolving domain names), print servers (managing printing tasks), and application servers (running specific applications and services for clients).
What are the advantages of Peer-to-Peer networks?
- Easy to set up
- Less complex
- Lower cost
- And its used for simple tasks: transferring files and sharing printers
What are the disadvantages of Peer-to-Peer networks?
- No centralized administration
- Not as secure
- Not scalable
- Slower performance
What is Intermediary Network Devices?
An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary device, including:
Regenerate and retransmit data signals.
Maintain information about what pathways exist in the network.
Notify other devices of errors and communication failures.
Network Media is?
Communication across a network is carried through a medium which allows a message to travel from source to destination.
Media Types Description
Metal wires within cables Uses electrical impulses
Glass or plastic fibers within cables (fiber-optic cable) Uses pulses of light.
Wireless transmission Uses modulation of specific frequencies of electromagnetic waves.
-
- 1 / 74
-