Logo/

Flashcard Deck

0/230

Key Vocabulary

  • BYOD (Bring Your Own Device): A policy allowing employees to use their personal devices (like laptops and smartphones) for work-related tasks, enhancing flexibility in accessing network resources.
  • Cloud Computing: Services delivered over the internet, offering various configurations including Public, Private, Hybrid, and Custom options for users and businesses.
  • Denial of Service (DoS): A malicious attack aimed at making a network service unavailable by overwhelming it with traffic.
  • End Device: Devices that originate or receive data on a network, such as computers, smartphones, and printers.
  • Extranet: A network that allows secure access to external partners, suppliers, or customers, enabling certain data exchanges with outside entities.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  • Fiber-Optic Cable: A medium that transmits data as pulses of light, providing high-speed data communication, particularly over long distances.
  • LAN (Local Area Network): A network infrastructure covering a small geographical area like a home, office, or building, connecting local devices.
  • NIC (Network Interface Card): A hardware component that connects a computer to a network, facilitating communication over wired or wireless connections.
  • QoS (Quality of Service): A networking feature that prioritizes certain types of traffic (like voice) over others to ensure reliable performance, especially under congestion.
  • Router: A device that directs data packets between networks, determining the best path for sending data.
  • Scalability: The ability of a network to grow and handle increased demand without degrading performance.
  • Security: Measures taken to protect data integrity, confidentiality, and availability in network architecture.
  • VPN (Virtual Private Network): A technology that creates a secure and encrypted connection over a less secure network, like the internet, for remote access.
  • WAN (Wide Area Network): A telecommunications network that covers a broad geographic area, typically owned by a service provider, connecting multiple LANs.

Key Points

Network Fundamentals

  • Hosts: All computers that communicate over a network.
  • Intermediary Devices: Routers and switches facilitate communication between hosts.

Network Topologies

  • Logical Topology: Shows how data flows and which devices are in use.
  • Physical Topology: Displays the actual physical layout of network devices and cables.

Network Types

  • LAN: A small geographical area network for local connections.
  • WAN: A large scale network often facilitated by service providers.
  • Extranet: A secure extension of an organization’s intranet to external partners.

Network Architecture Characteristics

  • Scalability: Supports growth without impacting current users.
  • Fault Tolerance: Allows for redundancy, ensuring resilience against failures.
  • QoS: Prioritizes traffic to maintain performance.
  • Security: Protects data and ensures only authorized access.

Access Methods

  • Console Access: Direct configuration access via a physical terminal.
  • In-band Access: Configuration over the network using protocols like SSH or Telnet.
  • Aux Port Access: Use of telephone connections for remote access when network connectivity is unavailable.

Configuration and Commands

  • Specific commands and IOS modes govern access levels and configurations on Cisco devices, such as:
    • Enabling privileged mode (enable).
    • Assigning hostnames (hostname command).
    • Setting up banners for login interfaces.

End Device Functions

  • End devices are responsible for data generation and user interaction with the network.

Important Data

  • IPv4 Addressing:

    • Structure: Represented in a dotted-decimal format (e.g., 192.168.1.1).
    • Components: Four decimal numbers from 0 to 255, separated by periods.
  • Key Commands:

    • hostname Sw-Floor-2: Sets the name of the switch.
    • enable secret class: Secures privileged EXEC mode.
    • service password-encryption: Encrypts plaintext passwords.
    • banner motd $ Keep out $: Displays a message when login is accessed.

Additional Aspects

Theorems and Principles

  • OSI Model: Understanding network communication across various layers is foundational.
  • Security Principles: Confidentiality, integrity, and availability are key to protecting network architecture.

Methodologies

  • Network Design Principles: Include scalability, security, fault tolerance, etc., during network layout plans.
  • Best Practices for Device Configuration: Follow guidelines to ensure reliable and secure device operation.

By summarizing the key vocabulary, essential points, important data, and additional aspects found within the flashcard set, this document provides a comprehensive overview of foundational networking concepts and practices.

Login to Leave a Comment

Give your feedback, or leave a comment on a page to share your thoughts with the community.