Module 8
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Networking Technologies Common types | LAN, WLAN, AND WAN
🗑
|
||||
LAN | term often used to describe wired local area networks (Ethernet Network)
🗑
|
||||
WLAN | describes a wireless LAN (WiFi 802.11)
🗑
|
||||
WAN | describes a wide area network, technologies that connect separate LANs
🗑
|
||||
What is a data segment? | Data transmitted on a network that has been broken up
🗑
|
||||
Baseband Technologies | Ethernet
🗑
|
||||
Broadband Technologies | Cable, DSL, Satellite, Fiber-based
🗑
|
||||
Cable | uses cable TV infrastructure
🗑
|
||||
DSL | uses Public Switch Telenetwork (PSTN) infrastructure
🗑
|
||||
Satellite | uses GEO synchronous satellites, connecting devices may be stationary or mobile
🗑
|
||||
Fiber-based | uses a fiber-optic network
🗑
|
||||
This company runs fiber all the way to the house or business: | Verizon
🗑
|
||||
802.11 Wi-Fi | oVarious IEEE standards (802.11b/g/n) oLess secure than wired networks oPublic Wi-Fi access: Hot Spots
🗑
|
||||
The name of the wireless access point is called: | Service Set Identifier (SSID)
🗑
|
||||
802.16 Wi-Max | oVarious IEEE standards (802.16d/e) oUses base stations (cell towers)
🗑
|
||||
Cellular | oVarious Technologies (TDMA, GSM, CDMA, 3G, 4G) oUses base stations (cell towers) oPC accessible with an Internet Card (Air Card)
🗑
|
||||
Bluetooth | oShort range technology often used for device to device connections
🗑
|
||||
Dialup Technology | •Mature technology that uses PSTN infrastructure, often follows V.92 standard •Maximum theoretical throughput: 56K
🗑
|
||||
Network Adapters (NIC) | oOn-board or discrete components (including USB) oIdentified by technology (Ethernet, 100BaseT, etc.)
🗑
|
||||
The NIC number used to identify the adapter on the network is called | MAC address
🗑
|
||||
Cables/Connectors (fiber and copper) | oVarious cable and connector types oMost common copper-based cabling in use today: UTP oFinished cables types: straight-through (patch cords) and crossover
🗑
|
||||
Devices | oHubs – repeat all packets received to all connected nodes oSwitches – direct packets to addressed device oWAP – bridges WLAN to LAN, connects hotspots together
🗑
|
||||
This device manages traffic between two (different) networks: | Routers
🗑
|
||||
Windows on a Network | •Client/Server Applications •Network communications can be broken into layers •Service Identifications
🗑
|
||||
Client/Server Applications | oWeb Browser/Web Server oEmail Client/Exchange Server oFTP Client/FTP Server
🗑
|
||||
Service Identifications | oPort/Port Address/Port Number – identifying numbers oSocket Address – combination of IP Address and port number (192.168.0.10:23)
🗑
|
||||
The port number used by SMTP is: | 25
🗑
|
||||
IP Addresses | Identify the PC (node) on the network
🗑
|
||||
IP Addresses two current versions | IPv4 and IPv6
🗑
|
||||
IPv4 | 32-bits, dotted decimal notation, three classes (A, B & C), uses a subnet mask Example: Class C, ip address:192.168.0.1, subnet mask: 255.255.255.0
🗑
|
||||
IPv6 | 128-bits, written in hexadecimal, various types, no subnet mask Example: 12:34:56:AB:10::37:55:12:B5:DC:FF:18
🗑
|
||||
IP Address Assignments | oPublic and private addresses oDynamically and statically assigned oReserved addresses: broadcasts, loopback, and network identifiers
🗑
|
||||
A computer set to obtain a DHCP address fails to lease an address, what address will it use? | Automatic Private IP Address (APIPA)
🗑
|
||||
Hostname/computer name | identifies the PC on the network
🗑
|
||||
Domain Name/Workgroup Name | identifies the network FQDN: consists of hostname and domain name
🗑
|
||||
DNS | resolves the FQDN to an IP Address
🗑
|
||||
TCP/IP | oIndividual Protocols working together to mange communication
🗑
|
||||
Application Protocols | http, https, smtp, pop, imap, ftp, etc.
🗑
|
||||
Communication Protocols | tcp, udp, ip, arp, icmp, igmp, etc
🗑
|
||||
Network Protocols | Ethernet, ATM, token ring, etc
🗑
|
||||
Virtual Private Networks (VPN) | oMethod of securing data traveling across a public telecommunications network oTechnique is called tunneling; uses encrypted data packets
🗑
|
||||
Which VPN tunneling protocol is considered the weakest? | Point to Point Tunneling Protocol (PPTP)
🗑
|
||||
TCP/IP Utilities | Command line troubleshooting tools
🗑
|
||||
Tools and Utilities for Troubleshooting Networks | ping, ipconfig, telnet, nslookup, tracert, net, netstat
🗑
|
||||
ping | connectivity test, uses echo requests, has various switches
🗑
|
||||
ipconfig | configuration data, limited control over dynamic data (renew IP address)
🗑
|
||||
telnet | remote node communication, unsecure
🗑
|
||||
nslookup | provides access to namespace information
🗑
|
||||
tracert | hop-by-hop connectivity test, uses echo requests
🗑
|
||||
net | several commands in one, all focused on network connections
🗑
|
||||
netstat | network activity statistics
🗑
|
||||
Remote Desktop | oAccess to another PC across the network oAvailable on certain versions of Windows
🗑
|
||||
Remote Assistance | oAccess to another PC across the network oAvailable on certain versions of Windows
🗑
|
||||
What is a technician performing when he enters the command: nslookup 170.10.0.1? | Reverse Lookup
🗑
|
||||
Identify the port number used by Remote Desktop. | 3389
🗑
|
||||
Hubs | repeat all packets received to all connected nodes
🗑
|
||||
Switches | direct packets to addressed device
🗑
|
||||
WAP | bridges WLAN to LAN, connects hotspots together
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
booaphi
Popular Computers sets