Semester 1 Module 2 Worksheet -- Networking Fundamentals Answer Key

Document Sample
Semester 1 Module 2 Worksheet -- Networking Fundamentals Answer Key Powered By Docstoc
					             Networking Fundamentals
     CISCO Semester 1 Module 2 Worksheet                                                                          Ver 3.0.0

1.   What are bulletin boards? Computers that are the central point of communication in a dial-up connection

2.   What are three drawbacks to bulletin boards? Very little direct communication. Only those who knew about the
     bulletin board could use it. Required one modem per connection. Did not scale well.

3.   What is the difference between the end user devices and the network devices? End-user devices include
     computers, printers, scanners, and other devices that provide services directly to the user. Network devices include all
     the devices that connect the end-user devices together to allow them to communicate.

4.   What is another name for an end user device? Host

5.   What is the name of the unique code that each individual NIC carries? Media Access Control (MAC) address.

6.   List five network devices? Repeaters, hubs, bridges, switches, and routers

7.   Make sure you look at all the Interactive Media Activities throughout your reading.

8.   Name the two categories in the definition of network topology. Physical topology, and logical topology.

9.   What do they mean when they talk about physical topology? The actual layout of the wire or media.

10. What do they mean when they talk about logical topology? Defines how the media is accessed by the hosts for
     sending data.

11. List six types of physical topologies? Bus, ring, star, extended star, hierarchical, mesh

12. A hierarchical topology is similar to an extended star. However, instead of linking the hubs and/or switches
    together, the system is linked to a computer that controls the traffic on the topology.

13. A star topology connects all cables to a central point of concentration.

14. A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to
    this backbone.

15. A ring topology connects one host to the next and the last host to the first. This creates a physical ring of

16. An extended star topology links individual stars together by connecting the hubs and/or switches.

17. A mesh topology is where each host has its own connections to all other hosts. This is implemented to
    provide as much protection as possible from interruption of service.

18. What are the two types of logical topologies? Broadcast and token passing

19. How does broadcast topology work? Each host sends its data to all other hosts on the network medium. There is
     no order that the stations must follow to use the network. It is first come, first serve

                                  Page 1 of 4       fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
20. How does token passing topology work? By passing an electronic token sequentially to each host. When a host
    receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the
    next host and the process repeats itself

21. Two examples of networks that use token topologies are? Token ring and Fiber Distributed Data Interface

22. An example of a network that uses broadcast is? Ethernet

23. What is the generic networking term that refers to the control of how the physical network is built, how
    computers connect to the network, how the data is formatted for transmission, how that data is sent, and
    how to deal with errors? Protocols

24. What does LAN stand for and what six things is it designed to do? Local Area Network
    1) Operate within a limited geographical area
    2) Allow multi-access to high bandwidth media
    3) Control the network privately under local administration
    4) Provide full time connectivity to local services
    5) Connect physically adjacent devices

25. What interconnects LAN’s? WAN’s

26. What does WAN stand for and what four things is it designed to do? Wide Area Network
    1) Operate over a large geographically separated areas
    2) Allow users to have real-time communication capabilities with other users
    3) Allow access over serial interfaces operating at slower speeds
    4) Provide full time and part time connectivity

27. List nine common WAN technologies. Modems, ISDN, DSL, Frame Relay, T1, E1, T3, E3 SONET

28. What does MAN stand for? Metropolitan area network

29. What does SAN stand for and what is it used for? Storage Area Network, a dedicated, high-performance network
    used to move data between servers and storage resources

30. What does VPN stand for and what is it used for? Virtual Private Network, it is a private network that is
    constructed within a public network infrastructure. It is like your own network over public access lines.

31. List and describe the three main types of VPN’s.
     1) Access VPNs –provide remote access to a mobile worker and small office/home office (SOHO) to the
          headquarters of the Intranet or Extranet over a shared infrastructure.
     2)   Intranet VPNs –link regional and remote offices to the headquarters of the internal network over a shared
          infrastructure using dedicated connections. Allow access only to the employees of the enterprise
     3)   Extranet VPNs –link business partners to the headquarters of the network over a shared infrastructure using
          dedicated connections. Allow access to users outside the enterprise.

32. Explain the difference between Intranet and Extranet in your own words. Intranet is a network that only people
    who are literally on the inside can access, extranet will provide the same services but you have to have permission
    setup so that people can access the services from outside the physical location.

33. Define bandwidth. The amount of information that can flow through a network connection in a given period of time.

                                 Page 2 of 4     fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
34. List four important considerations of bandwidth and give a short explanation of each.
     1) Bandwidth is finite – there is a physical limit as to how much information we can send at one time.
     2) Bandwidth is not free – As a net worker you will be responsible for buying services, you have to weigh out your
          needs, cost and expected growth.
     3)   Bandwidth is a key factor in analyzing network performance, designing new networks – One of the key
          tests you can make on your network is to calculate how much bandwidth is being used.
     4)   The demand for bandwidth is ever increasing – As soon as you think you have enough bandwidth a new
          program or application will come out that will eat up your extra bandwidth.

35. Using the pipe and highway analogies for bandwidth fill in the blanks. Bandwidth is like width of pipes that
    carries water and the number of lanes on a highway. The packets or information that flows across each is like
    water and cars.

36. What unit of measurement do we use to define bandwidth? bits per second

37. True or False – kbps is  1,000 bps, Mbps is  1,000,000 bps and Gbps is  1,000,000,000 bps.

38. The most common media used is unshielded twisted-pair (UTP), what determines the bandwidth of this type
    of media? It depends on what type of NIC is used.

39. What is the speed of a T1 line? 1.544 Mbps Reduces complexity, Standardized interfaces, Facilitaties modular
    engineering, Ensure interoperable technology, Accelerate evolution, Simplifies teching and learning

40. What is throughput? Actual measured bandwidth, at a specific time of day, using specific Internet routes, and while
    a specific set of data is transmitted on the network.

41. What are seven factors that determine throughput? Internetworking devices, Type of data being transferred,
    Network topology, Number of users on the network, User computer, Server computer, and Power conditions

42. How much time would it take to send the contents of a floppy disk full of data (1.44 MB) over an ISDN
    line? ISDN = 128 kbps, therefore (1.44 MB * 8)/128 kbps = 90 seconds

43. How much time would it take to send the contents of a ten GB hard drive full of data over an OC-48 line?
    OC-48 = 2.488320 Gbps, therefore (10 GB * 8)/2.488320Gbps = 32.15 seconds

44. What is information that travels on a network is generally referred to as? Data or a packet

45. What is a more precise definition of a packet? A logically grouped unit of information that moves between
    computer systems

46. What are six benefits of using the OSI model? Reduces complexity, Standardizes interfaces, Facilitates modular
    engineering, Ensures interoperable technology, Accelerates evolution, Simplifies teaching and learning

47. Starting with layer seven, list in order the seven layers of the OSI model. Application, Presentation, Session,
    Transport, Network, Data link, Physical

48. A good mnemonic for remembering the seven layers of the OSI model is All People Studying This Need
    Daily Prayer.

49. Not a question but important. Dividing the network into seven layers provides the following advantages:
    1) It breaks network communication into smaller, more manageable parts.
    2) It standardizes network components to allow multiple vendor development and support.

                                 Page 3 of 4      fd5c7ae6-aa6f-49d0-89bb-698321675047.doc
    3) It allows different types of network hardware and software to communicate with each other.
    4) It prevents changes in one layer from affecting other layers.
    5) It divides network communication into smaller parts to make learning it easier to understand

50. Each layer of the OSI model depends on the service function of what? OSI layer below it

51. Fill out the following table of the OSI model. (Sorry but it is very important)
   OSI Model                   Layer’s function, and list some protocols                  Data Encapsulation
                      Programs you use, FTP, HTTP, TFTP, DNS, SMTP, SNMP
   Application                                                                                   Data
                                            Data Representation,
   Presentation                                                                                  Data
                   Establish, Maintain, and Terminate sessions between applications
     Session                                                                                     Data
                  End to End connections, Reliability, flow control, error correction.
    Transport                                                                                  Segments
                                            TCP, UDP
                           Best path determination, logical addressing, IP
     Network                                                                                    Packets
                      Access to the media, physical addressing, logical network
    Data Link                                                                                   Frames
                  topology, flow control, error correction. Ethernet, Token R, FIDDI
                   Binary Transmission, wires, connectors, voltage rates, data rates,             Bits
                                      physical network topology

52. Fill out the following table (This table is for the TCP/IP Model)
   Layers of the TCP/IP Model Corresponding Layers of the OSI Model                   Protocols for Each Layer
                                                                                      FTP, HTTP, TFTP, DNS,
            Application                     Application, Presentation, Session
                                                                                           SMTP, SNMP
             Transport                                  Transport                            UDP, TCP
              Internet                                  Network                                   IP
             Network                               Data Link, Physical                      Leave Blank

53. Know and understand this data encapsulation well.

                              Page 4 of 4      fd5c7ae6-aa6f-49d0-89bb-698321675047.doc

Shared By: