YETI
Across
- 2. Common medium for Ethernet
- 6. Continuous checking of devices to see if they want to communicate
- 10. Two devices attempting to transmit at exactly the same time
- 11. Access method in which th device senses whether the line is idle and therefore available to carry a transmission
- 13. Developed by IBM in an effort to improve the True Ring
- 16. Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
- 18. Generates the message or signal
- 19. Protocol used to control which ports of a switch can learn MAC addresses
- 20. Physical layout of the network
- 21. To send a signal in all directions at the same time.
- 23. Data compression technique
- 25. Single certificate used to provide encryption to multiple sub domains
- 28. Signal represented as a series of sine waves
- 29. Each node is connected to a main cable or link
- 31. Implementation used to reduced the size of an iBGP inside an AS
- 32. In voice, time difference between actual and expected packet arrival
- 33. Protocol extension to secure the DNS look up process
- 34. Reduction in signal strength
- 38. Platform on which virtual machines can run
- 40. The medium for wireless communications
- 41. Provides highest level of security and speed
- 46. Worldwide system of computer networks
- 47. Network security attack in which an impersonation of a device or user takes place
- 49. Located within 3 geographical miles
- 50. Type of topology that depicts how data flows through the network
Down
- 1. Accepts data from and sends data to one or more directions on the network
- 3. Rule for communication
- 4. WiFi is a technology that falls under this category of connection type
- 5. Obsolete routing protocol
- 7. Microsoft implementation of NetBIOS name service
- 8. Multichassis etherchannel solution
- 9. Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
- 12. Services make use of it to improve data locality to end users
- 14. Private network that uses Internet technology to share information with vendors and customers
- 15. This protocol's extension allows for traffic engineering
- 17. Process of determining if someone or something is who he/it claims to be
- 22. Type of network that encapsulate L2 over L3
- 24. Regenerates the signal on the next leg of the network medium
- 26. Graph algorithm used in routing
- 27. The fastest transmission medium cannot avoid it
- 30. Network that introduces an abstraction between the forwarding and control planes
- 35. Process of coding a message for security purposes
- 36. Eighth layer of the OSI model
- 37. Telephone system
- 39. Creates network standards
- 42. Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
- 43. Network which uses 3rd party vendors to provide medium
- 44. Method used to quantify VoIP quality
- 45. used to share company information and resources among employees
- 48. Effort to interrupt services of a host connected to a network