1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network



Similar documents
Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Local-Area Network -LAN

Telecommunications, Networks, and Wireless Computing

Local Area Networks (LANs) Blueprint (May 2012 Release)

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Network Topologies. Network Topologies

Discovering Computers Chapter 9 Communications and Networks

Computer Networking: A Survey

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

MANAGEMENT INFORMATION SYSTEMS 8/E

Chapter 9 Communications and Networks

NETWORKING TECHNOLOGIES

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

WAN Technology. Heng Sovannarith

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information


Wired & Wireless LAN Connections

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

WAN Data Link Protocols

Chapter 1 Instructor Version

Introduction to Ethernet

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

Telecommunications, the Internet, and Wireless Technology

Introduction to Networking

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Cisco Network Performance Evaluation Using Packet Tracer

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Chapter 5. Data Communication And Internet Technology

Computers Are Your Future Prentice-Hall, Inc.

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Networks. The two main network types are: Peer networks

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Network Design. Yiannos Mylonas

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

SSVP SIP School VoIP Professional Certification

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

CSCI 362 Computer and Network Security

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

By: Mohsen Aminifar Fall 2014

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 4 Connecting to the Internet through an ISP

SSVVP SIP School VVoIP Professional Certification

Introduction to Computer

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Overview of WAN Connections Module 1

Internet Public Network

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Chapter 6 Telecommunications, Networks, and Wireless. Computing

C Information Systems for Managers Fall 1999

Cabling LANs and WANs

November Defining the Value of MPLS VPNs

This course has been retired. View the schedule of current <a href=

Networking Basics. Uses of a network

11/22/

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

COMPUTER NETWORK TECHNOLOGY (300)

Controlled Random Access Methods

Introduction Chapter 1. Uses of Computer Networks

Page 1 of 7. Computer Networking

Introduction To Computer Networks

Appendix A: Basic network architecture

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Networking 4 Voice and Video over IP (VVoIP)

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Ethernet Passive Optical Networks EPON

Introduction to WAN Technologies

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

LECTURE 5: Wide Area Networks (WANs) CIS484. Communications Systems. Summer 2015 Instructor: Dr. Song Xing

Network Topology Comparison

A General Glossary of Telecommunications Terminology

Planeamento e Gestão de Redes. Análise de Requisitos

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Understand Wide Area Networks (WANs)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Based on Computer Networking, 4 th Edition by Kurose and Ross

Network System Design Lesson Objectives

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network

Network Technology CMP-354-TE. TECEP Test Description

Introduction to Computer Networks and Data Communications

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Computer Networks. By Hardeep Singh

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Computer Networks Vs. Distributed Systems

IT4405 Computer Networks (Compulsory)

Computer Networking Networks

ASM Educational Center (ASM) Est. 1992

Networking Devices. Lesson 6

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Transcription:

Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server network D Wide area network 2 In which network type does each host on the LAN has the same authority as other hosts? A Peer-to-peer network B Local area network C Client/server network D Wide area network 3 Which network type requires a network operating system (NOS)? A Peer-to-peer network B Local area network C Client/server network D Wide area network 4 Large networks are frequently broken down into manageable pieces called. segments 5 Which network component is most vulnerable to performance problems caused by poor installation practices? A Clients B Servers C Wiring D Network transmission devices 6 Which network medium carries light-based data through strands of glass or plastic no thicker than a human hair? A Coaxial B Twisted pair C Fiber optic D Wireless

7 Which network medium is composed of four pairs of wires, where the pairs are twisted together and bundled within a covering? A Coaxial B Twisted pair C Fiber optic D Wireless 8 Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer? A Coaxial B Twisted pair C Fiber optic D Wireless 9 Which network medium is a popular choice for outdoors or in an historic building? A Coaxial B Twisted pair C Fiber optic D Wireless 10 Fiber optic cabling is often used as the for networks. backbone 11 cable has the best wiring value and expansion capability. composite 12 Which type of coaxial cable is used for low-power video and RF signal connections? A RG-6 B RG-8 C RG-11 D RG-58 E RG-59

13 Thicknet cables are which type? (Choose all that apply.) A RG-6 B RG-8 C RG-11 D RG-58 E RG-59 14 Security on a WLAN is accomplished by the MAC addresses of wireless NICs that are allowed to use the access point and by encrypting data sent over the wireless LAN. filtering 15 Which wireless protocol is a short-range wireless technology limited to transmission distances of about 100 meters or less? A 802.11a B Bluetooth C Wi-Fi D WiMAX 16 In which network topology is each node connected to a central network transmission device such as a hub or a switch? 17 In which network topology is each node connected to the next by a direct line so that a continuous line is formed? 18 In which network topology is each node connected to a central device by two wires?

19 In which network topology do all nodes have independent connections to all other nodes? 20 True or false? The network topology shown in the graphic is an example of the mesh topology. False. It s an example of a hybrid network topology. 21 True or false? In a star topology, when a single connection fails, it doesn t affect the communication ability of other computers. True. In the star topology, when a single connection fails, it doesn t affect the communication ability of other computers connected to the same network transmission device. 22 The benefit of a topology is that it s simple and inexpensive to set up. bus 23 True or false? The star topology uses a central networking device called a multistation access unit (MSAU). False. Token Ring networks use a multistation access unit (MSAU). 24 The topology is extremely fault tolerant, but expensive to implement. mesh 25 An example of a connection is the dial-up connection from a computer to an ISP. point-to-point

26 In which type of network is data is broken up into packets before it s sent over the network? A Point-to-point B Point-to-multipoint C Packet-switching D Circuit-switching 27 Which Ethernet standard is the fastest? A Twisted Pair Ethernet B Fast Ethernet C Gigabyte Ethernet D 10GbE 28 Which Ethernet standard designates fiber optic cabling as its required medium? (Choose all that apply.) A BASE-CX B BASE-R C BASE-T D BASE-W E BASE-X 29 Ethernet combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers. bonding 30 True or false? A star Ethernet might be faster than a bus Ethernet, especially if there are many nodes on the network. False. A star Ethernet might be slower than a bus Ethernet, because the hub generates a lot of data traffic that isn t used. It replicates all the data it receives from any source and sends it to every node. 31 Which network topologies can you use with Ethernet networks? (Choose all that apply.) 32 is an acronym for the channel access method that avoids collisions rather than detecting them. CSMA/CD

33 In order to transmit data on a Token Ring network, a node must have possession of the. token 34 In a WLAN, the wireless NIC allows nodes to communicate over distances using radio waves, which it sends to, and receives, from the hub. short 35 True or false? A LAN becomes a WAN when you expand the network configuration beyond your own premises and must lease data communication lines from a public carrier. True 36 Which is WAN connection technology that uses encryption and security protocols to create a private network over a public network? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless 37 Which is WAN connection technology that uses high-speed connections made over regular analog phone lines? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

38 Which WAN connection technology is shown in the following graphic? A Cellular B DSL C ISDN D POTS/PSTN 39 Which WAN connection technology currently uses Enhanced Data rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), or High-Speed Downlink Packet Access (HSDPA)? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless 40 Which WAN technology that s used to connect a small ISP or large business to a regional ISP, and a regional ISP to an Internet backbone, uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic? A ATM B E1/E3 C Frame relay D T1/T3 E X.25

41 Which OSI layer provides security, encryption, and compression for the data? A Layer 1 Physical B Layer 2 Data Link C Layer 3 Network D Layer 4 Transport E Layer 5 Session F Layer 6 Presentation G Layer 7 Application 42 Which OSI layer divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data? A Layer 1 Physical B Layer 2 Data Link C Layer 3 Network D Layer 4 Transport E Layer 5 Session F Layer 6 Presentation G Layer 7 Application 43 Which OSI layer addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network? A Layer 1 Physical B Layer 2 Data Link C Layer 3 Network D Layer 4 Transport E Layer 5 Session F Layer 6 Presentation G Layer 7 Application

44 Which OSI layer transmits bits from one computer to another and regulates the transmission stream over a medium? A Layer 1 Physical B Layer 2 Data Link C Layer 3 Network D Layer 4 Transport E Layer 5 Session F Layer 6 Presentation G Layer 7 Application