Network Devices and Host Roles

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the role of an intermediary network device?

  • To originate or receive messages.
  • To provide software for end devices.
  • To transmit messages from source to destination.
  • To manage data flow, regenerate signals, and maintain network pathways. (correct)

Bandwidth refers to the physical components of a network, such as cables and connectors.

False (B)

What is the primary function of a network interface card (NIC)?

physically connect an end device to the network

In network diagrams, symbols are used to represent devices, and the arrangement is known as the network ______.

<p>topology</p> Signup and view all the answers

Match the following network types with their descriptions:

<p>LAN = Spans a small geographical area WAN = Spans a wide geographical area Small Office/Home Office = Enables computers within a home or remote office to connect to a corporate network</p> Signup and view all the answers

Which of the following is an example of a WAN?

<p>The Internet (C)</p> Signup and view all the answers

An intranet is accessible to anyone on the internet without authorization.

<p>False (B)</p> Signup and view all the answers

What is the advantage of DSL (Digital Subscriber Line) internet connection?

<p>high bandwidth always on connection</p> Signup and view all the answers

The ability of a network to expand to support new users and applications without impacting the system is known as ______.

<p>scalability</p> Signup and view all the answers

Match the following network security goals with their descriptions:

<p>Confidentiality = Only intended recipients can read the data Integrity = Assurance that data has not been altered during transmission Availability = Assurance of timely and reliable access to data for authorized users</p> Signup and view all the answers

Which of the new networking trends allows users to use their own devices for accessing the network?

<p>Bring Your Own Device (BYOD) (A)</p> Signup and view all the answers

Hybrid clouds are made up of similar custom cloud types.

<p>False (B)</p> Signup and view all the answers

Smart home technology integrates technology into every-day appliances. What does it allow them to do?

<p>interconnect with other devices</p> Signup and view all the answers

Viruses, worms, and trojan horses are examples of ______ threats.

<p>external</p> Signup and view all the answers

Match the following components with their description:

<p>Shell = User interface that allows users to request specific tasks from the computer Kernel = Communicates between the hardware and software of a computer and manages hardware resources Hardware = Physical part of a computer including underlying electronics</p> Signup and view all the answers

Which of the following access methods is recommended for remotely connecting to a device?

<p>Secure Shell (SSH) (B)</p> Signup and view all the answers

User EXEC Mode allows unrestricted access to all commands and features on a networking device.

<p>False (B)</p> Signup and view all the answers

When configuring a device and to move out of any subconfiguration mode to get back to global configuration mode, what command has to be entered?

<p>exit</p> Signup and view all the answers

In IOS command structure, a ______ is specific parameter defined in the OS, while an ______ is not predefined and is defined by the user.

<p>keyword, argument</p> Signup and view all the answers

Match the symbols/words with the description

<p>Boldface = Commands and keywords that you enter literally as shown Italics = Arguments for which you may supply values Square brackets [ ] = An optional element Braces { } = Required element</p> Signup and view all the answers

In the 'show running-config' output, what digit would appear next to password if its encypted?

<p>7 (D)</p> Signup and view all the answers

Data inception and theft involves slowing or crashing processes

<p>False (B)</p> Signup and view all the answers

What command can I use to verify how the router is currently implemented?

<p>show running-config</p> Signup and view all the answers

To remove all the configurations, use the ______ stratup-config command in privilege EXEC mode.

<p>erase</p> Signup and view all the answers

Match the command with the functionality.

<p>CTRL + C = Abort certain processes, displays new line on prompt CTRL + Z = End the configuration mode CTRL + SHIFT + 6 = Interrupt DNS Lookups and pings</p> Signup and view all the answers

Fill in the [blank], IPv[blank] addresses are 128 bits in length and written as a string of [blank] values.

<p>Four, six, Hexadecimal (B)</p> Signup and view all the answers

End devices do not need an IP address to communicate with other devices on a network.

<p>False (B)</p> Signup and view all the answers

If connected to 'Control Panel > Network Sharing Center > Change adapter settings > properties > Internet Protocol Version 4 (TCP/IPv4) Properties', what IPv4 address is specified?

<p>Default gateway</p> Signup and view all the answers

The process of converting information into another acceptable form for transmission is known as message ______.

<p>encoding</p> Signup and view all the answers

Associate the terms with the functions.

<p>Addressing = identifies sender and receiver Reliability = provides guaranteed delivery Flow Control = ensures data flows of an efficient rate Sequencing = uniquely labels each transmitted segment of data</p> Signup and view all the answers

Which of the delivery options refers to one to many typically not all?

<p>Multicast (C)</p> Signup and view all the answers

Network communications secures data and ensures authentication, data integrity, and data encryption

<p>False (B)</p> Signup and view all the answers

What is the process where protocols adds their information to the data?

<p>encapsulation</p> Signup and view all the answers

Each stage of process, PDU has a different name to reflect its new functions and is called out by the ______ stack.

<p>tcp/ip</p> Signup and view all the answers

Which of the layer addresses are responsible for destination from source to destination?

<p>Network Layer = deliver the IP packet from original source to the final destination Data link Layer = delivering data link frame from one work network interface card (NIC) to another NIC on the same network Transports = destination and source process number (ports)</p> Signup and view all the answers

The left-most part of the IP Address indicates that the network will have the same?

<p>prefix (C)</p> Signup and view all the answers

NIC and switches operates in Layer 2 and and in the physical layer standards are implemented in coding, hardware or signalling

<p>True (A)</p> Signup and view all the answers

What is always considered the source MAC address?

<p>unicast</p> Signup and view all the answers

If no DGW is available then devices are only capable of ______ with LAN.

<p>communicating</p> Signup and view all the answers

Pair the device with the L2 info.

<p>Unicast MAc = single transmitting to single destination device Broadcast Mac = every device on the Ethernet LAN will receive Multicast Mac = Ethernet switch ports will receive</p> Signup and view all the answers

When configuring devices, it is useful to know that smaller companeis that can't afford own data centers, do what?

<p>lease server and storage services from larger data center organizations. (B)</p> Signup and view all the answers

If there a collision in one device on WLANS, if the medium is deterministic, it will wait a period of time and then retransmit the data.

<p>False (B)</p> Signup and view all the answers

Flashcards

Intermediary Network Device

A device that interconnects end devices.

Bandwidth

The capacity of a medium to carry data.

Network Diagram

A symbol to represent network devices in a network.

The Internet

A global network of interconnected networks.

Signup and view all the flashcards

Extranet

Secure access to a network for external users.

Signup and view all the flashcards

WAN

An interconnection of LANs using WANs.

Signup and view all the flashcards

BYOD

The practice of using personal devices at work.

Signup and view all the flashcards

Custom Clouds

A network built for a specific industry.

Signup and view all the flashcards

Network Security

Protects networks from a variety of threats.

Signup and view all the flashcards

Trojan Horse

A malicious program installed without user consent.

Signup and view all the flashcards

Firewall Filtering

The process of preventing unauthorized network access.

Signup and view all the flashcards

Console Access

A physical interface to manage a network device.

Signup and view all the flashcards

Secure Shell (SSH)

A secure remote connection to a network device.

Signup and view all the flashcards

User EXEC Mode

A command-line interface prompt ending with the > symbol.

Signup and view all the flashcards

Privileged EXEC mode

Enables access to all commands and features.

Signup and view all the flashcards

Hostname Command

The command to change the device name.

Signup and view all the flashcards

Password Encryption

Encryption to hide plaintext passwords.

Signup and view all the flashcards

Banner Message

A message displayed during device login attempts.

Signup and view all the flashcards

Startup-config

A backup of device settings.

Signup and view all the flashcards

Erase startup-config

Clears all configurations from a device

Signup and view all the flashcards

Running-config

The current operating configuration.

Signup and view all the flashcards

Identifying devices on a network using

IP Address

Signup and view all the flashcards

Four decimal numbers between 0 and 255

Dotted Decimal Notation

Signup and view all the flashcards

Subnet mask

To differentiate network vs. host portion.

Signup and view all the flashcards

Default gateway

Access to wide area networks.

Signup and view all the flashcards

Dynamic Host Configuration Protocol (DHCP)

Automatic configuration of IP

Signup and view all the flashcards

Switch Virtual Interface (SVI)

Connects different network segments.

Signup and view all the flashcards

A Graphical interface

GUI

Signup and view all the flashcards

Context-Sensitive Help

Enables to find answers quickly.

Signup and view all the flashcards

Hot Keys

Enables use of shortcuts

Signup and view all the flashcards

Study Notes

Data Communications

  • Communication rivals air, water, food, and shelter in importance.
  • Communication enables a world without boundaries, fostering global and human networks.

Intermediary Network Devices

  • These devices interconnect end devices and manage data flow.
  • Examples include switches, wireless access points, routers, and firewalls.
  • Intermediary responsibilities include:
    • Regenerating and retransmitting data signals.
    • Maintaining network pathway information.
    • Notifying devices of communication errors.
    • Directing data flow along alternate paths if links fail.
    • Classifying and prioritizing messages.
    • Permitting or denying data flow based on security settings.

Host Roles

  • Hosts participate directly in network communication.
  • Servers provide information using software to end devices, common types are:
    • Email servers.
    • Web servers.
    • File servers.
  • Clients send requests to servers to retrieve information. Example common types are:
    • Web browsers.
    • Email.

Server Types

  • Email servers run email software, clients access using appropriate clients.
  • Web servers run web server software, clients access using web browsers.
  • File servers store files, client devices access these files.

Types of Connection

  • Peer-to-peer networks suit very small networks for end-to-end communication.
  • Peer-to-peer advantages include ease of setup, simplicity, low cost, and usefulness for tasks such as transferring files and sharing printers.
  • Peer-to-peer disadvantages are lack of centralized administration, security issues, scalability limitations, and slower performance.

End Devices

  • An end device is the source or destination of a message.
  • Data originates within the end device.

Network Media

  • Network communication occurs across a medium from source to destination.
  • Bandwidth indicates a medium's data-carrying capacity.

Media Types

  • Metal wires use electrical impulses. Examples:
    • Ethernet cables (Cat5e, Cat6, Cat7).
    • Coaxial cables.
    • Telephone cables.
  • Glass or plastic fiber use light pulses for longer range connections. Example:
    • Fiber-optic cables.

Network Diagrams

  • Network diagrams (topologies) use symbols to represent devices.
  • Important terms:
    • Network Interface Card (NIC): connects the end device to the network.
    • Physical port: where the media connects on a networking device.
    • Interface: specialized ports for media connection.

Physical and Logical Topologies

  • Physical topology illustrates physical locations, used for troubleshooting.
  • Logical topology shows logical grouping of related devices via IP addresses. Useful for connecting devices

Common Network Types

  • Simple home networks share resources like printers, documents, and media.
  • Small home networks connect computers to each other and the Internet.
  • Small Office/Home Office (SOHO) networks connect remote offices to a corporate network.
  • Medium to Large Networks: connect many locations with numerous interconnected computers.
  • World Wide Networks: connects millions of computers, Ex. The Internet.

LANs and WANs

  • Network infrastructures vary in size, user count, services, and area of responsibility.
  • LAN - Local Area Network:
    • Spans small geographical areas.
    • Interconnect end devices in a limited area.
    • Administered by a single entity.
    • Provides high bandwidth.
  • WAN - Wide Area Network:
    • Spans wide geographical areas.
    • Interconnects LANs over wide distances.
    • Administered by one or more service providers.
    • Typically provides slower speed links between LANs.

The Internet

  • A worldwide collection of interconnected LANs and WANs using copper wires, fiber optic cables, and wireless transmissions.
  • Largest network in existence, not owned by any one entity.
  • Groups like the IETF and ICANN help maintain structure.

Private Networks

  • Intranets are private LANs and WANs accessible only to members of an organization.
  • Extranets grant secure network access to individuals from other organizations.
  • Examples:
    • Company providing data access to suppliers/contractors.
    • Hospital providing a system for doctor appointments.
    • Local office providing budget and personnel information to schools.

Connection Types

  • Cable: high bandwidth, always on internet.
  • DSL: high bandwidth, always on over telephone lines.
  • Cellular: uses cellular connection.
  • Satellite: rural areas, require clear line of sight.
  • Dial-up telephone: inexpensive.

Business Internet Connections

  • Dedicated Leased Line: connects distant offices with private voice/data networking.
  • Ethernet WAN (Metro Ethernet): extends LAN into the WAN.
  • Business DSL: symmetric uploads and downloads.
  • Satellite: provides solutions when wired connections are unavailable.

Converging Networks

  • Before conversion, different lines and technologies were required to carry and transfer signal.
  • Converged Data Networks carry multiple services on a single link.

Network Architecture

  • Underlies data transfer by needing to address user expectations for:
    • Fault Tolerance: provides continued operation despite component failures.
    • Scalability: supports growth.
    • Quality of Service: prioritizes traffic.
    • Security: physically secures devices and prevents unauthorized access.

Fault Tolerance

  • Limits impact of failure, needs multiple paths.
  • Packet switching splits traffic into packets, with each packet taking different paths.

Scalable Network

  • A scalable network easily expands to support more users and applications.

Quality of Service

  • Voice and video transmissions often need higher quality of service.
  • The primary mechanism to ensure content delivery.

Network Security

  • Two main types:
    • Network Infrastructure Security: physical setup that prevents unauthorized access.
    • Information Security: protects transmitted data.
  • Three goals:
    • Confidentiality: keeps data viewable only by intended recipients.
    • Integrity: prevents data alteration during transmission.
    • Availability: ensures reliable data access for authorized users.
  • Trends impacting organizations/consumers:
    • Bring Your Own Device (BYOD).
    • Online Collaboration.
    • Video Communications.
    • Cloud Computing.

Bring Your Own Device (BYOD)

  • BYOD allows users to use their own devices.
  • Gives opportunities and more flexibility for users.

Online Collaboration

  • Working with others over a network on joint projects.
  • Many tools such as Cisco WebEx give users ways to connect.

Video Communication

  • Can make video calls anywhere, used for communication.
  • Video is critical so there is effective collaboration.

Cloud Computing

  • Allows you to store data, backup onto server.
  • Accessed by using this Cloud.
  • Smaller companies with no data centers, lease server and storage services.

Types of Cloud Computing

  • Public Clouds: available through pay basis.
  • Private Clouds: Specific to only the government.
  • Hybrid Clouds: Made up of two cloud types with the same architecture.
  • Custom Clouds: Built to meet specific needs of industry such as health and media.
  • Smart home technology: Integrates appliances for interconnectivity throughout the house.
  • Powerline Networking Enables devices to connect to LANs, using connections where network wireless is not available. Useful when there are many users.
  • Wireless Broadband: Wireless system used to connect in homes and smaller businesses.

Security Threats

  • Network security: integral in all networks, must balance environment and expected QoS. It is through different technologies and securing data threats, and internal actions.
  • External Threats:
    • Viruses, worms, trojan horses: malicious software.
    • Spyware and adware: Collects information.
    • Zero-day attacks: Vulnerability occurs when first discovered.
    • Threat actor attacks: malicious attacks.

Computer Basics

  • Denial of service attacks: slowdowns or crash's data.
  • Data inception and theft: captures personal data.
  • Identity theft: accesses private data.
  • Losing or stealing devices.

Security

  • Important with multple layers.
  • Network security like firewalls need to protect from software, and unauthorized access.

CCNA

  • Ensure with next gen technologies
  • New foundation of IP and security
  • Wireless, virtulization of a network

IOS-Shell

  • Allows use to request specific tasks from the computer like the GUI or CLI

Kernel

  • Communicates how resources are being used to meet requirements

###Hardware

  • Physical parts that help with understanding electronic

###Access Methods

  • Console :Physical management, helps with connections and maintenence
  • Secure Shell (SSH): Establishes secure remote connection

###TELNET

  • Insecure remote CLI connection

###User EXC Modes

  • Allows access to only limited numbers of the commands

###Privileged Exec code

  • Allows access to codes, which identified by hash symbol
  • Use for access features

###Global Configurations

  • Need to use configurations options
  • identified when configs are shown

###Types of codes

  • Sub configuration mods, line configurations, and interface configurations

###IOS Modes

  • Use"the configure terminal" command, followed with a line and exit commands. Allows to change the device names.

###Commands

  • IOS commands check, with multiple arguments and syntaxes, and can be shortened. Ex the configure code.

###Hot Keys

  • IOS helps make configuring more easier
  • Device Names.

###Switch

  • First is set to a certain host name
  • Uses the enable code

Securing

  • Use the secure codes to access lines VTU and VTI, to allow connection codes.

###Encrypts

  • Encrypts all codes with"service password encryption global config command"

###Banner messages Note that are used to warm about what is about to happen

###Router show start up confit

  • Uses to erase start-up configurations commands

Captureing

  • Captures the configuration to a text file (helps if any code is wrong)

###Ethernet When IP is being transferred. (Means for connecting devices)

###IP Adress

  • A system for use to tell any devices and enable systems, It's called a dotted decmial which is a system made up of 4 decimals.
  • Default Gateway address: IP for the router

###Configure End devices

  • Have to manually configure device, to know what the device is
  • Click properties and IPv4

###End Network

  • Device need a IP to communicate

###End LAN.

  • Use what the DHCP allows

###Virtual interface config

  • Use the configurations for the virtual switch

###SVI on a switch

  • Enter the interface vlan code- the interface uses 1 command mode.
  • Has the IP adress-uses a sub code

Summery

  • All devices have an operating system
  • Basic device configurations: Hosts, passcode
  • All device has needs IPl-helps get each communication

###Packet Tracer tools

  • Use 3 menus to make things easier
  • Add Device
  • Select device, to inspect it

Network Managment

  • Open exiting network
  • Save current user for files
  • Helps modify the user setting

###Files types

  • PKA. Packet tracer activity: can be used to score and contain codes
  • PKT File Types: saved in Packet, not instructions
  • PK2 files: used to help embed images •Use PkSZ when needing files

###Packer tracer

  • Show model and questions, to help access information.

###CLI tab

  • Access command line
  • Code enters will show on CLI Tab

###Services Tab

  • All hosts have to help get info, has add ons with additional codes

###TCP\IP

###Physical\ Config Tab

  • Graphic tab that has functions for the internet

###Protocols •The best rules that will follow

  • Individuals must use established rules for conversations. Ex: code style

###Protocols account

  • Identification and grammar, grammar and construction, and timing

###Requirements

  • Message can be sent and delivers quickly because device can read and response

###Message delivery

  • One and One Communication and One to Many
  • One the all is not any for the 1Piv6 but with other options Networking will have different rules

###Networks Protocols over code.

###Protocol function •Address code, data rate, and date labels

###Protocols Types.

  • Networks Communucations
  • Networking Security
  • Rotuing
  • Services Discory

###TCP •Devices and processes to show them where and how to send traffic •This helps with the data and transfer in many ways

###Data link. Creates links to the network. It then can be broken up into little things

###Transport

  • This has a list and helps keep each segment of data going in an orderly path.

Protocols

###Application

  • Contains information
    ###Network.

Protocols

OSI

  • Used to support communication and how they link with data

###TCP\IP

  • Allows for network acess and application code

OSI\TCP

•Important

Encapsulation

  • Data is being sent then it goes through a certain process

De encapsulation

###A bit Stream, helps read the stack.

Addresses

  • Aide data deliver souce to destination at all.
  • Help distribute data to devices with a specific address There is data deliver to the Ethernet

###Layer Codes •Different

###Data access •Network Data link layer are going to provides data

Chapter 4

  • Physical layers

###Data Links

•The link can be Ethernet and transfer between local media to different things

###Properties.

"Metal

###Physical Components "Metal #Encoding #Signaling

Encoding

  • Converts stream of bits, helps with data Ex(10 MB Ethernet)

Cable

  • Data transports through cable\wireless -Accept Data and make them read it into signal
  • This is last set in Encaptilation Code, tells the device where and what to do (helps it take control)

###Types

  • ISO -EIA\TIA -ITU-T -ANSI -1EEE
  • Electrical -Cable. Data travel weaker because of resistance.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Devices: Bridges and Switches
10 questions
Types of Network Devices Quiz
10 questions

Types of Network Devices Quiz

SustainableInspiration avatar
SustainableInspiration
Use Quizgecko on...
Browser
Browser