Cisco Chapter 1.txt

Card Set Information

Author:
CiscoPhil
ID:
100950
Filename:
Cisco Chapter 1.txt
Updated:
2011-09-10 20:54:33
Tags:
Vocab Answers
Folders:

Description:
Vocabulary for 26A Chapter 1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user CiscoPhil on FreezingBlue Flashcards. What would you like to do?


  1. Data Network p3
    A digital network used to send data between computers.
  2. Network p3
    1. A collection of computers, printers, routers, switches, and other devices that can communicate with each other over some transmission medium. 2. Command that assigns a NIC-based address to which the router is directly connected.
  3. Internet p3
    The network that combines enterprise networks, individual users, and ISPs into a single global IP network.
  4. Download p4
    To transfer data from the computer function as a server to the client computer you are using.
  5. Instant messaging p4
    IM: Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the Internet. Files can also be transferred through the IM program to share files. A good example of an IM program is Microsoft Messenger.
  6. Real-time p4
    Events or signals that show the output as fast as possible, or as they happen.
  7. Blogs p4
    A website where entries are made in journal style. A blog is created by the user, who can make changes to the blog through templates or by altering the HTML code of the blog itself. Visitors can leave posts to the blog. Blog is short for weblog.
  8. Podcasts p5
    A digital media file or files that are distributed over the Internet using syndication feeds, for playback on portal media players and personal computers.
  9. Wikis p5
    A website that lets visitors add, edit, and delete content, typically without the need for registration.
  10. Collaboration tool p5
    Something that helps people collaborate. Many people use the term collaboration tool in a software context, for example, collaboration software such as Google Docs and Microsoft Sharepoint Server. Going back in time a collaboration tool was a piece of paper that many used and edited.
  11. Packet Tracer p6
    A drag-and-drop network simulator developed by Cisco to design, configure, and trouble shoot network equipment within a controlled simulated program environment.
  12. Intranet p7
    A corporate system such as a website that is explicitly used by internal employees. Can be accessed internally or remotely.
  13. Extranet p7
    Part of a company�s intranet that is extended to users outside the company (that is, normally ove the Internet).
  14. Wireless technology p7
    Technology that allows communication without needing physical connectivity. Examples of wireless technology include cellular telephones, PDA�s, wireless access points, and wireless NICs.
  15. Standards p11
    An internationally recognized definition of technical specifications that ensure worldwide consistency.
  16. Bits p12
    Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.
  17. Binary p12
    A numbering system characterize by 1s and 0s.
  18. Source p12
    The origin of the PDU. This can be a process, a host, or a node, depending on the layer to which you are referring.
  19. Router p13
    A network device, typically connected to a range of LAN and WAN interfaces, that forwards packets based on their destination IP addresses.
  20. Cloud p13
    In networking, a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.
  21. IP p14
    Internet Protocol: Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing, type-of-service specification, fragmentation and reassembly, and security. Documented in RFC 791.
  22. TCP p14
    Transmission Control Protocol: A Layer 4 protocol of the TCP/IP model, TCP lets applications guarantee delivery of data across a network.
  23. Convergence p15
    Another form of the root word converge in the phrase �converged network.� This kind of network aggregates various forms of traffic such as voice, video, and data on the same network infrastructure. A more common usage represents the process by which routers recognize that something has occurred that changes some router�s routes, reacts to the event, and find the now-currently best routs.
  24. Fault tolerance p17
    The design on networks that can continue to operate without interruption in the case of hardware, software, or communications failures.
  25. Redundancy 17
    A network architecture designed to eliminate network downtime caused by a single point of failure.
  26. Scalability p17
    The ability of a protocol, system, or component to be modified to fit a new need.
  27. Internetwork p17
    A combination of many IP subnets and networks, as created by building a network using routers. The term internetwork is used to avoid confusion with the term network, because an internetwork can include seveal IP networks.
  28. Packet p19
    When used generically, this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically, it is end-user data, along with the network or internet layer headers and any higher-layer headers, but no lower-layer headers or trailers.
  29. QoS p21
    Quality of Service: A control mechanism that can provide different priorities to different users or data flows, or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
  30. Bandwidth 21-22
    In networking, a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth, it is usually expressed in bits per second (bps).
  31. Priority queuing p21
    A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
  32. Authentication p24
    A process used to verify the identity of a person or process.
  33. Firewall p25
    Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious application sand files.
  34. Single point of failure p25
    A system or network design characterized by one or more major components that are required to maintain operation.

What would you like to do?

Home > Flashcards > Print Preview