NETWORKING CONCEPTS

  1. Maximum throughput of an ethernet network depends mainly on the number of users on the network, the capabilities of the network hardware, and the frame size.

  2. Standard considerations for utilization levels on an ethernet network are as follows : Light use is anything from 0% to 50% utilization; moderate to heavy use is anything from 50% to 80% utilization, and saturation occurs at 80% or higher consistent use.

  3. In a shared ethernet system, all hosts are connected to the segment and compete with one another for bandwidth.

  4. A switched ethernet system has one or more direct point-to-point connections between hosts or segments. Because of these direct connections, the hosts connected to the switched ethernet segment via a switch do not compete with each other for the available bandwidth.

  5. On ethernet networks, limit your shared ethernets to no more than 50% average utilization and 80% peak utilization. You should remain under 200 hosts per shared LAN segment.

  6. Hubs operate at the Physical layer of the OSI model (Layer 1). They are simple devices (no logic control) that join network segments and are invisible to all hosts on the network.

  7. Most switches operate at the Data Link layer of the OSI model (Layer 2). Layer 2 switches form a border for your collision domains.

  8. Some switches operate at the Network layer of the OSI model (Layer 3). Layer 3 switches form a border for your broadcast domains.

  9. Routers operate at the Network layer of the OSI model (Layer 3), moving IP or IPX packets to their destination addresses. Routers are also used to connect dissimilar physical networks, to connect WANs, and to segment LANs. Routers form a border for your broadcast domains.

  10. Full-duplex network communications effectively double the available bandwidth because the network traffic can be simultaneously transmitted and received at full wire speed on each transmit and receive path .

  11. Half-duplex network communications can transmit and receive only at separate times.

  12. Packet filtering checks all packets on the selected interface and can drop all packets not explicitly allowed.

  13. Packet filter allow and deny settings are called filter actions.

  14. Circuit-level filtering inspects all sessions on a particular interface.

  15. Protocol filtering checks the protocols in use on the selected interface and can drop any protocols that are not explicitly allowed.

  16. Demand-dial connections are point-to-point connections that generally are not active unless intentionally enabled, which makes them less susceptible to packet snooping.

  17. One-way initiated demand connections are normally configured so that one router is always the answering router and the other router is always the calling router.

  18. VPNs are network connections that are formed when a tunneling protocol is used to tunnel data over an existing network, such as the Internet or an intranet.

  19. Dial-up connections are network connections that are formed when a specifically enabled network device, such as a modem or an ISDN device, connects two devices over a Public Switched Telephone Network (PSTN).

  20. The Protected Extensible Authentication Protocol (PEAP) is available as an authentication method for 802.11 wireless clients, but it is not supported for VPN clients or other remote access clients . It can be used as an authentication method only when the Internet Authentication Service (IAS) is used.



MCSE 70-293 Exam Cram. Planning and Maintaining a Windows Server 2003 Network Infrastructure
MCSE 70-293 Exam Cram: Planning and Maintaining a Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736195
EAN: 2147483647
Year: 2004
Pages: 123

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net