BYETI
Across
- 2. Rule for communication
- 4. Continuous checking of devices to see if they want to communicate
- 8. Reduction in signal strength
- 10. Type of topology that depicts how data flows through the network
- 12. Process of coding a message for security purposes
- 16. Single certificate used to provide encryption to multiple sub domains
- 20. Telephone system
- 22. Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
- 24. Protocol used to control which ports of a switch can learn MAC addresses
- 26. Data compression technique
- 29. WiFi is a technology that falls under this category of connection type
- 31. Signal represented as a series of sine waves
- 32. Provides highest level of security and speed
- 33. Creates network standards
- 34. Network that introduces an abstraction between the forwarding and control planes
- 35. Access method in which th device senses whether the line is idle and therefore available to carry a transmission
- 38. Platform on which virtual machines can run
- 39. Physical layout of the network
- 40. Developed by IBM in an effort to improve the True Ring
- 45. Graph algorithm used in routing
- 46. Generates the message or signal
- 47. Multichassis etherchannel solution
- 48. Services make use of it to improve data locality to end users
- 49. Microsoft implementation of NetBIOS name service
- 50. The medium for wireless communications
Down
- 1. In voice, time difference between actual and expected packet arrival
- 3. Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
- 5. Obsolete routing protocol
- 6. Network which uses 3rd party vendors to provide medium
- 7. Implementation used to reduced the size of an iBGP inside an AS
- 9. Worldwide system of computer networks
- 11. Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
- 13. Private network that uses Internet technology to share information with vendors and customers
- 14. Effort to interrupt services of a host connected to a network
- 15. Process of determining if someone or something is who he/it claims to be
- 17. The fastest transmission medium cannot avoid it
- 18. used to share company information and resources among employees
- 19. Regenerates the signal on the next leg of the network medium
- 21. Each node is connected to a main cable or link
- 23. Network security attack in which an impersonation of a device or user takes place
- 25. Accepts data from and sends data to one or more directions on the network
- 27. Located within 3 geographical miles
- 28. Two devices attempting to transmit at exactly the same time
- 30. Common medium for Ethernet
- 36. To send a signal in all directions at the same time.
- 37. Method used to quantify VoIP quality
- 41. Type of network that encapsulate L2 over L3
- 42. This protocol's extension allows for traffic engineering
- 43. Eighth layer of the OSI model
- 44. Protocol extension to secure the DNS look up process