CISCO Semester 1 Module 2 Worksheet Ver 3.0.0
1. What are bulletin boards? Computers that are the central point of communication in a dial-up connection
2. What are three drawbacks to bulletin boards? Very little direct communication. Only those who knew about the
bulletin board could use it. Required one modem per connection. Did not scale well.
3. What is the difference between the end user devices and the network devices? End-user devices include
computers, printers, scanners, and other devices that provide services directly to the user. Network devices include all
the devices that connect the end-user devices together to allow them to communicate.
4. What is another name for an end user device? Host
5. What is the name of the unique code that each individual NIC carries? Media Access Control (MAC) address.
6. List five network devices? Repeaters, hubs, bridges, switches, and routers
7. Make sure you look at all the Interactive Media Activities throughout your reading.
8. Name the two categories in the definition of network topology. Physical topology, and logical topology.
9. What do they mean when they talk about physical topology? The actual layout of the wire or media.
10. What do they mean when they talk about logical topology? Defines how the media is accessed by the hosts for
11. List six types of physical topologies? Bus, ring, star, extended star, hierarchical, mesh
12. A hierarchical topology is similar to an extended star. However, instead of linking the hubs and/or switches
together, the system is linked to a computer that controls the traffic on the topology.
13. A star topology connects all cables to a central point of concentration.
14. A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to
15. A ring topology connects one host to the next and the last host to the first. This creates a physical ring of
16. An extended star topology links individual stars together by connecting the hubs and/or switches.
17. A mesh topology is where each host has its own connections to all other hosts. This is implemented to
provide as much protection as possible from interruption of service.
18. What are the two types of logical topologies? Broadcast and token passing
19. How does broadcast topology work? Each host sends its data to all other hosts on the network medium. There is
no order that the stations must follow to use the network. It is first come, first serve
Page 1 of 4 fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
20. How does token passing topology work? By passing an electronic token sequentially to each host. When a host
receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the
next host and the process repeats itself
21. Two examples of networks that use token topologies are? Token ring and Fiber Distributed Data Interface
22. An example of a network that uses broadcast is? Ethernet
23. What is the generic networking term that refers to the control of how the physical network is built, how
computers connect to the network, how the data is formatted for transmission, how that data is sent, and
how to deal with errors? Protocols
24. What does LAN stand for and what six things is it designed to do? Local Area Network
1) Operate within a limited geographical area
2) Allow multi-access to high bandwidth media
3) Control the network privately under local administration
4) Provide full time connectivity to local services
5) Connect physically adjacent devices
25. What interconnects LAN’s? WAN’s
26. What does WAN stand for and what four things is it designed to do? Wide Area Network
1) Operate over a large geographically separated areas
2) Allow users to have real-time communication capabilities with other users
3) Allow access over serial interfaces operating at slower speeds
4) Provide full time and part time connectivity
27. List nine common WAN technologies. Modems, ISDN, DSL, Frame Relay, T1, E1, T3, E3 SONET
28. What does MAN stand for? Metropolitan area network
29. What does SAN stand for and what is it used for? Storage Area Network, a dedicated, high-performance network
used to move data between servers and storage resources
30. What does VPN stand for and what is it used for? Virtual Private Network, it is a private network that is
constructed within a public network infrastructure. It is like your own network over public access lines.
31. List and describe the three main types of VPN’s.
1) Access VPNs –provide remote access to a mobile worker and small office/home office (SOHO) to the
headquarters of the Intranet or Extranet over a shared infrastructure.
2) Intranet VPNs –link regional and remote offices to the headquarters of the internal network over a shared
infrastructure using dedicated connections. Allow access only to the employees of the enterprise
3) Extranet VPNs –link business partners to the headquarters of the network over a shared infrastructure using
dedicated connections. Allow access to users outside the enterprise.
32. Explain the difference between Intranet and Extranet in your own words. Intranet is a network that only people
who are literally on the inside can access, extranet will provide the same services but you have to have permission
setup so that people can access the services from outside the physical location.
33. Define bandwidth. The amount of information that can flow through a network connection in a given period of time.
Page 2 of 4 fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
34. List four important considerations of bandwidth and give a short explanation of each.
1) Bandwidth is finite – there is a physical limit as to how much information we can send at one time.
2) Bandwidth is not free – As a net worker you will be responsible for buying services, you have to weigh out your
needs, cost and expected growth.
3) Bandwidth is a key factor in analyzing network performance, designing new networks – One of the key
tests you can make on your network is to calculate how much bandwidth is being used.
4) The demand for bandwidth is ever increasing – As soon as you think you have enough bandwidth a new
program or application will come out that will eat up your extra bandwidth.
35. Using the pipe and highway analogies for bandwidth fill in the blanks. Bandwidth is like width of pipes that
carries water and the number of lanes on a highway. The packets or information that flows across each is like
water and cars.
36. What unit of measurement do we use to define bandwidth? bits per second
37. True or False – kbps is 1,000 bps, Mbps is 1,000,000 bps and Gbps is 1,000,000,000 bps.
38. The most common media used is unshielded twisted-pair (UTP), what determines the bandwidth of this type
of media? It depends on what type of NIC is used.
39. What is the speed of a T1 line? 1.544 Mbps Reduces complexity, Standardized interfaces, Facilitaties modular
engineering, Ensure interoperable technology, Accelerate evolution, Simplifies teching and learning
40. What is throughput? Actual measured bandwidth, at a specific time of day, using specific Internet routes, and while
a specific set of data is transmitted on the network.
41. What are seven factors that determine throughput? Internetworking devices, Type of data being transferred,
Network topology, Number of users on the network, User computer, Server computer, and Power conditions
42. How much time would it take to send the contents of a floppy disk full of data (1.44 MB) over an ISDN
line? ISDN = 128 kbps, therefore (1.44 MB * 8)/128 kbps = 90 seconds
43. How much time would it take to send the contents of a ten GB hard drive full of data over an OC-48 line?
OC-48 = 2.488320 Gbps, therefore (10 GB * 8)/2.488320Gbps = 32.15 seconds
44. What is information that travels on a network is generally referred to as? Data or a packet
45. What is a more precise definition of a packet? A logically grouped unit of information that moves between
46. What are six benefits of using the OSI model? Reduces complexity, Standardizes interfaces, Facilitates modular
engineering, Ensures interoperable technology, Accelerates evolution, Simplifies teaching and learning
47. Starting with layer seven, list in order the seven layers of the OSI model. Application, Presentation, Session,
Transport, Network, Data link, Physical
48. A good mnemonic for remembering the seven layers of the OSI model is All People Studying This Need
49. Not a question but important. Dividing the network into seven layers provides the following advantages:
1) It breaks network communication into smaller, more manageable parts.
2) It standardizes network components to allow multiple vendor development and support.
Page 3 of 4 fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
3) It allows different types of network hardware and software to communicate with each other.
4) It prevents changes in one layer from affecting other layers.
5) It divides network communication into smaller parts to make learning it easier to understand
50. Each layer of the OSI model depends on the service function of what? OSI layer below it
51. Fill out the following table of the OSI model. (Sorry but it is very important)
OSI Model Layer’s function, and list some protocols Data Encapsulation
Programs you use, FTP, HTTP, TFTP, DNS, SMTP, SNMP
Establish, Maintain, and Terminate sessions between applications
End to End connections, Reliability, flow control, error correction.
Best path determination, logical addressing, IP
Access to the media, physical addressing, logical network
Data Link Frames
topology, flow control, error correction. Ethernet, Token R, FIDDI
Binary Transmission, wires, connectors, voltage rates, data rates, Bits
physical network topology
52. Fill out the following table (This table is for the TCP/IP Model)
Layers of the TCP/IP Model Corresponding Layers of the OSI Model Protocols for Each Layer
FTP, HTTP, TFTP, DNS,
Application Application, Presentation, Session
Transport Transport UDP, TCP
Internet Network IP
Network Data Link, Physical Leave Blank
53. Know and understand this data encapsulation well.
Page 4 of 4 fd5c7ae6-aa6f-49d0-89bb-698321675047.doc