BYETI

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 2. Rule for communication
  2. 4. Continuous checking of devices to see if they want to communicate
  3. 8. Reduction in signal strength
  4. 10. Type of topology that depicts how data flows through the network
  5. 12. Process of coding a message for security purposes
  6. 16. Single certificate used to provide encryption to multiple sub domains
  7. 20. Telephone system
  8. 22. Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
  9. 24. Protocol used to control which ports of a switch can learn MAC addresses
  10. 26. Data compression technique
  11. 29. WiFi is a technology that falls under this category of connection type
  12. 31. Signal represented as a series of sine waves
  13. 32. Provides highest level of security and speed
  14. 33. Creates network standards
  15. 34. Network that introduces an abstraction between the forwarding and control planes
  16. 35. Access method in which th device senses whether the line is idle and therefore available to carry a transmission
  17. 38. Platform on which virtual machines can run
  18. 39. Physical layout of the network
  19. 40. Developed by IBM in an effort to improve the True Ring
  20. 45. Graph algorithm used in routing
  21. 46. Generates the message or signal
  22. 47. Multichassis etherchannel solution
  23. 48. Services make use of it to improve data locality to end users
  24. 49. Microsoft implementation of NetBIOS name service
  25. 50. The medium for wireless communications
Down
  1. 1. In voice, time difference between actual and expected packet arrival
  2. 3. Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
  3. 5. Obsolete routing protocol
  4. 6. Network which uses 3rd party vendors to provide medium
  5. 7. Implementation used to reduced the size of an iBGP inside an AS
  6. 9. Worldwide system of computer networks
  7. 11. Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
  8. 13. Private network that uses Internet technology to share information with vendors and customers
  9. 14. Effort to interrupt services of a host connected to a network
  10. 15. Process of determining if someone or something is who he/it claims to be
  11. 17. The fastest transmission medium cannot avoid it
  12. 18. used to share company information and resources among employees
  13. 19. Regenerates the signal on the next leg of the network medium
  14. 21. Each node is connected to a main cable or link
  15. 23. Network security attack in which an impersonation of a device or user takes place
  16. 25. Accepts data from and sends data to one or more directions on the network
  17. 27. Located within 3 geographical miles
  18. 28. Two devices attempting to transmit at exactly the same time
  19. 30. Common medium for Ethernet
  20. 36. To send a signal in all directions at the same time.
  21. 37. Method used to quantify VoIP quality
  22. 41. Type of network that encapsulate L2 over L3
  23. 42. This protocol's extension allows for traffic engineering
  24. 43. Eighth layer of the OSI model
  25. 44. Protocol extension to secure the DNS look up process