YETI

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 2. Common medium for Ethernet
  2. 6. Continuous checking of devices to see if they want to communicate
  3. 10. Two devices attempting to transmit at exactly the same time
  4. 11. Access method in which th device senses whether the line is idle and therefore available to carry a transmission
  5. 13. Developed by IBM in an effort to improve the True Ring
  6. 16. Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
  7. 18. Generates the message or signal
  8. 19. Protocol used to control which ports of a switch can learn MAC addresses
  9. 20. Physical layout of the network
  10. 21. To send a signal in all directions at the same time.
  11. 23. Data compression technique
  12. 25. Single certificate used to provide encryption to multiple sub domains
  13. 28. Signal represented as a series of sine waves
  14. 29. Each node is connected to a main cable or link
  15. 31. Implementation used to reduced the size of an iBGP inside an AS
  16. 32. In voice, time difference between actual and expected packet arrival
  17. 33. Protocol extension to secure the DNS look up process
  18. 34. Reduction in signal strength
  19. 38. Platform on which virtual machines can run
  20. 40. The medium for wireless communications
  21. 41. Provides highest level of security and speed
  22. 46. Worldwide system of computer networks
  23. 47. Network security attack in which an impersonation of a device or user takes place
  24. 49. Located within 3 geographical miles
  25. 50. Type of topology that depicts how data flows through the network
Down
  1. 1. Accepts data from and sends data to one or more directions on the network
  2. 3. Rule for communication
  3. 4. WiFi is a technology that falls under this category of connection type
  4. 5. Obsolete routing protocol
  5. 7. Microsoft implementation of NetBIOS name service
  6. 8. Multichassis etherchannel solution
  7. 9. Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
  8. 12. Services make use of it to improve data locality to end users
  9. 14. Private network that uses Internet technology to share information with vendors and customers
  10. 15. This protocol's extension allows for traffic engineering
  11. 17. Process of determining if someone or something is who he/it claims to be
  12. 22. Type of network that encapsulate L2 over L3
  13. 24. Regenerates the signal on the next leg of the network medium
  14. 26. Graph algorithm used in routing
  15. 27. The fastest transmission medium cannot avoid it
  16. 30. Network that introduces an abstraction between the forwarding and control planes
  17. 35. Process of coding a message for security purposes
  18. 36. Eighth layer of the OSI model
  19. 37. Telephone system
  20. 39. Creates network standards
  21. 42. Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
  22. 43. Network which uses 3rd party vendors to provide medium
  23. 44. Method used to quantify VoIP quality
  24. 45. used to share company information and resources among employees
  25. 48. Effort to interrupt services of a host connected to a network