network security

1234567891011121314151617181920
Across
  1. 4. provides multiple ports for connecting nodes
  2. 7. can be used to share some of a company’s intranet resources with people outside the organization.
  3. 8. is used to prevent attenuation when packets are traveling long distances
  4. 11. are rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy, is guaranteed
  5. 13. This contains the actual data being transmitted
  6. 14. is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
  7. 17. consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath
  8. 19. normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the network cable.
  9. 20. most nodes connect directly to each other
Down
  1. 1. is a node on a network that serves as an entrance to another network
  2. 2. is a complex device that stores the routing information for networks. Determines the best route for packets
  3. 3. a thin strand of glass that transmits pulsating beams of light rather than electric current.
  4. 5. it is used to communicate and share information between computers and various devices.
  5. 6. all nodes are connected to a hub or switch and communicate through it.
  6. 9. The device at each node that performs translation and transmission
  7. 10. is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.
  8. 12. the logical layout of the cables and devices that connect the nodes of the network
  9. 15. is the connection of two or more central computers or LANs, generally across a wide geographical area.
  10. 16. This contains information needed by the network, such as the address of the destination node
  11. 18. Some organizations offer an internal version of the internet, which contains only the company’s private information.