Higher Computing Networking 1



Similar documents
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES


NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

CSCI 362 Computer and Network Security

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Local-Area Network -LAN

Networking. Topic 5. Contents

Advanced Higher Computing. Computer Networks. Homework Sheets

NETWORKING TECHNOLOGIES

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

MANAGEMENT INFORMATION SYSTEMS 8/E

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Discovering Computers Chapter 9 Communications and Networks

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

5 Data Communication and Networking

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Computer Networking: A Survey

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

524 Computer Networks

Introduction to computer networks and Cloud Computing

Lesson 24 Network Fundamentals

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Local Area Network. OSI Seven Layer Model. Whole Building Network

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Network Topologies. Network Topologies

Mathatma Gandhi University

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

IT4405 Computer Networks (Compulsory)

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

C Information Systems for Managers Fall 1999

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

Zarządzanie sieciami telekomunikacyjnymi

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

OCR LEVEL 3 CAMBRIDGE TECHNICAL

COMPUTER NETWORK TECHNOLOGY (300)

Computer Networks CCNA Module 1

Network Troubleshooting with the LinkView Classic Network Analyzer

Computer networks, data communication and Internet

Module 15: Network Structures

IT 3202 Internet Working (New)

Computer Networks Vs. Distributed Systems

Design and Implementation of Client Server Network Management System for Ethernet LAN

Understand VLANs, Wired LANs, and Wireless LANs

Post-Class Quiz: Telecommunication & Network Security Domain

Computer Network and Communication

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Client Server Computing

PROFINET the Industrial Ethernet standard. Siemens AG Alle Rechte vorbehalten.

Chapter 14: Distributed Operating Systems

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Machine control going www - Opportunities and risks when connecting a control system to the Internet

Chapter 9 Communications and Networks

CHAPTER - 10 COMPUTER NETWORKING

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Network Structure or Topology

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Introduction Chapter 1. Uses of Computer Networks

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Pearson Education Limited 2003

Computer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Chapter 16: Distributed Operating Systems

Chapter 4: Networking and the Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Networking Basics. Uses of a network

Controlled Random Access Methods

Introduction to Networking

Overview of Computer Networks

Performance Evaluation of Wired and Wireless Local Area Networks

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

Wireless LAN Concepts

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Figure 41-1 IP Filter Rules

Local Area Networks (LANs) Blueprint (May 2012 Release)

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. January 11 CMSC417 Set 1 1

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

EC 301 COMPUTER NETWORKING FUNDAMENTALS

Communication Networks. MAP-TELE 2011/12 José Ruela

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Basic Network Configuration

Virtual Server in SP883

Transcription:

Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star topology with a ring topology in terms of the potential effects of: (i) a single node failure (ii) a single channel failure. Discuss the relative advantages of a star topology over another topology of your own choosing. 5 How is the integrity of a ring network maintained when a node fails? 6 Define the term Local Area Network. Which topologies are most usually associated with LANs? 7 What are the characteristics of a LAN? 8 List the potential benefits and pitfalls of using a LAN. 9 Expand the acronym CSMA/CD. How does CSMA/CD substantially reduce the chance of simultaneous transmissions and collisions? 0 Distinguish between the CSMA/CD Listen Before Talking and the Listen While Talking strategies. How may stations be added to an Ethernet LAN? How can Ethernet LANs be extended? What type of applications are unsuitable for Ethernet and other bus topologies? Give a reason for your answer. What is meant by the term frame or packet with respect to Ethernet? 5 What is the purpose of the padding in an Ethernet frame? Total = 7

Studies The school has a number of stand-alone computers set up in the Open Learning Centre. It has been suggested that this should be changed into a peer-to-peer network. Give two advantages of networking the computers. Give two concerns that the school s IT Manager might have in relation to the operation of the network. The Principal Teacher of Computing has suggested that the computers be connected to his client/server network. List three differences between a peer-to-peer network and a client/server network.. The server must use a network operating system. What additional features must a network operating system have over the operating system on a stand alone computer? 5. Describe three different forms of cabling which could be used for the installation. The IT Manager decides to go ahead with the Principal Teacher s suggestion, but finds that the length of cable required to connect the Open Learning Centre to the file server is greater than the maximum length recommended. To overcome this, he decides to connect the six computers to a hub, half way between the two points. 6. What is the purpose of the hub in this instance? 7. What other hardware device could have been used instead of a hub. Explain your answer. The Computing Department s network is an example of a star topology, as opposed to the Business Studies Department s bus topology. 8. Give one advantage and one disadvantage of a star topology over a bus topology. Total = 7

. What is a local area network?. Give two examples of situations where you might find a local area network.. What functions are likely to be served by a local area network?. What hardware is required for a local area network? 5. Many LANs will use a client server arrangement. Describe the differences between the client and the server. 6. Describe three different forms of cabling often used in LANs. 7. What is the purpose of a repeater? 8. What is a hub? 9. Describe, using diagrams, three network topologies. 0. What functions must a network operating system have that are not required in a stand alone system?. What is the purpose of Ethernet?. Describe how file sharing can be achieved in a LAN.. What is meant by bandwidth and how does this affect the performance of a network?. What security measures are required in a LAN? 5. What is meant by a communications protocol? Total = 6

. Name and describe a method of addressing which is used in a local area network.. Name and describe a method of addressing which is used in a wide area network.. What is data encryption?. Describe the function of each of the following protocols: a. PPP b. SMTP c. HTTP d. POP e. FTP 5. What is the purpose of remote log-in? 6. Describe the function of each of the following data standards: a. RTF b. MPEG c. JPEG d. HTML 7. Describe the standard format of an e-mail address. 8. Explain why computer networks are said by some to cause social isolation of an individual. 9. Describe how each of the following economic factors have influenced the development of computer networks. a. cost of communications technology b. access to expensive equipment c. geographic spread of organisations. 5 Total =

5. Select five rules of network etiquette and write a short note on why you think each is needed.. Describe the advantage associated with each of the following network tasks: a. sending e-mail b. accessing the WWW c. file transfer d. printer sharing. Describe an application of each of the following: a. local area network b. intranet c. wide area network d. Internet. Explain why computer networks are said by some to invade the privacy of an individual. 5. Give a specific example of a development resulting from each of the following technical factors: a. adoption of Internet technology b. adoption of international standards c. development of communication strategy 6. Draw a diagram of the topology of the school local area network. 7. Describe the characteristics of the school local area network in terms of the following: a. hardware b. software c. communications d. functionality e. security 0 5 Total = 0