HSLU


Kartei Details

Karten 74
Sprache English
Kategorie Informatik
Stufe Universität
Erstellt / Aktualisiert 12.10.2023 / 17.10.2023
Weblink
https://card2brain.ch/box/20231012_computer_networking
Einbinden
<iframe src="https://card2brain.ch/box/20231012_computer_networking/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

In what situations is a Satellite internet connection particularly beneficial?

Satellite internet is a major benefit for rural areas without Internet Service Providers.

What is a notable feature of Dial-up telephone internet?

Dial-up telephone internet is inexpensive but has low bandwidth and uses a modem

What are some requirements for corporate business internet connections?

Corporate business connections may require higher bandwidth, dedicated connections, and managed services.

What does a Dedicated Leased Line provide?

Dedicated Leased Lines are reserved circuits within the service provider's network that connect distant offices with private voice and/or data networking.

How does an Ethernet WAN extend network access?

An Ethernet WAN extends LAN access technology into the WAN

What are the different formats of Business DSL, and what's one example?

Business DSL is available in various formats, including Symmetric Digital Subscriber Lines (SDSL).

When is Satellite internet a suitable option?

Satellite internet is suitable when a wired solution is not available.

What was the situation before converged networks in organizations?

Before converged networks, organizations had separate cabling for telephone, video, and data, each using different technologies to carry signals.

What services can converged data networks carry on one link, and how do they deliver them?

Converged data networks can carry data, voice, and video on one link, and they deliver these services over the same network infrastructure that uses the same set of rules and standards.

Network Architecture refers to?

The technologies that support the infrastructure that moves data across the network.

What are the four fundamental characteristics that network architectures must address to meet user expectations?

Network architectures must address Fault Tolerance, Scalability, Quality of Service (QoS), and Security to meet user expectations.

What is the primary goal of a fault-tolerant network?

The primary goal of a fault-tolerant network is to limit the impact of failures on the network

How do reliable networks achieve redundancy, and why is it challenging in circuit-switched networks?

Reliable networks achieve redundancy through packet switching, enabling different paths for packets. Circuit-switched networks, on the other hand, establish dedicated circuits, making redundancy difficult.

What defines a scalable network, and what methods do network designers use to achieve scalability?

A scalable network is one that can quickly and easily expand to accommodate new users and applications without impacting the performance of existing services. Network designers achieve scalability by adhering to accepted standards and protocols.

What are the higher expectations for services like voice and live video transmissions?

 

Voice and live video transmissions require higher expectations for reliable delivery of these services.

 

What is Quality of Service (QoS), and what role does it play in network management?

Quality of Service (QoS) is the primary mechanism used to ensure the reliable delivery of content for all users, allowing routers to better manage the flow of data and voice traffic.

What are the two main types of network security that need to be addressed?

The two main types of network security are network infrastructure security and physical security of network devices.

 

What are the three primary goals of network security?

The three primary goals of network security are confidentiality, integrity, and availability.

Why is it essential for the network to continuously adjust and evolve?

The network needs to keep pace with the constant emergence of new technologies and end-user devices in the market.

What are some recent networking trends that have an impact on both organizations and consumers?

Recent networking trends include Bring Your Own Device (BYOD), online collaboration, video communications, and cloud computing.

What is the main concept of Bring Your Own Device (BYOD), and what types of devices can end users employ in this approach?

BYOD allows users to utilize their own devices, providing them with increased opportunities and flexibility. End users can use devices like laptops, netbooks, tablets, smartphones, and e-readers as part of BYOD.

What is online collaboration's role in network trends, and how does Cisco WebEx assist in this process?

Online collaboration enables joint projects over the network, and tools like Cisco WebEx support collaboration by allowing users to instantly connect and interact, including features such as sending instant messages, sharing images, posting videos, and sharing links. Collaboration is a high priority in business and education.

In the context of network trends, why is video communication considered crucial, and what is Cisco TelePresence?

 

Video communication is vital for connecting with anyone, regardless of their location, and it plays a crucial role in effective collaboration. Cisco TelePresence is a method that enables collaboration with people from everywhere.

What is the primary purpose of cloud computing, and how does it enable access to applications and data? Additionally, how do smaller companies benefit from cloud computing?

Cloud computing primarily allows for storing personal files and data backup on internet servers and provides access to applications. Smaller companies benefit by leasing server and storage services from larger data center organizations in the Cloud, which they might not afford to build themselves.

What are the four types of Clouds, and can you provide brief descriptions of each?

The four types of Clouds are Public Clouds (available to the general public), Private Clouds (intended for specific organizations), Hybrid Clouds (combinations of two or more Cloud types), and Custom Clouds (built to meet specific industry needs and can be private or public).

What is the growing trend in technology for homes, and how does it enable appliances to function?

Smart home technology is a growing trend that integrates technology into everyday appliances, allowing them to interconnect with other devices. For example, ovens can communicate with your calendar to know when to start cooking a meal based on your schedule.

In what situations is powerline networking particularly useful, and how does it work?

Powerline networking is useful when data network cables or wireless communication is not feasible. It works by allowing devices to connect to a LAN via electrical outlets using standard powerline adapters that transmit data on specific frequencies. This is especially handy when wireless access points cannot reach all devices in the home.

What is wireless broadband, and how does it work for homes and small businesses?

Wireless broadband is an internet connection option, especially in rural areas, provided by Wireless Internet Service Providers (WISPs). It uses cellular technology and an outside antenna to connect devices in the home.

Why is network security important, and what does securing a network entail?

Network security is essential, and securing a network involves various methods, considering both data protection and quality of service. Threat vectors can be external or internal.

What are some examples of external security threats?

External threats include viruses, worms, Trojan horses, spyware, adware, zero-day attacks, threat actor attacks, denial of service attacks, data interception and theft, and identity theft.

 

What are examples of internal security threats?

Internal threats consist of lost or stolen devices, accidental misuse by employees, malicious employees, and the fact that internal users of the network are responsible for most security breaches.

Why is it essential to implement security in multiple layers, and what are the key network security components for a home or small office network?

 

Security must be implemented in multiple layers to enhance protection. Key components for a home or small office network include antivirus and antispyware software on end devices and firewall filtering to block unauthorized access.

What are the additional security requirements for larger networks?

Larger networks require a dedicated firewall system, access control lists (ACL) for filtering, intrusion prevention systems (IPS) to detect threats like zero-day attacks, and virtual private networks (VPN) for secure remote access.

What is the initial step in studying network security?

The study of network security starts with understanding the switching and routing infrastructure.