MIS 140 Chapter 5 - Chapter 6 Questions
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. 1. broadcast message 2.DNS request packet 3.SNA packet I 4.PX message
2.DNS request packet
According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20
80
turnpike effect
A ____ results when a network is used to a greater extent than was originally anticipated by the network designer
turnpike effect
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.
botleneck
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n)
hardware manufacturers
A client computer is assigned a data link layer address is by:
A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte
192-bit
The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit
192-bit
An access point plays the same role in a wireless network as a router does in a wired Ethernet network.
False
An access point plays the same role in a wireless network as a router does in a wired Ethernet network. T or F
False
Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP
Telnet
Backbone networks typically use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks.
False
Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point. T or F
False
Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver. True False
False
Ethernet is a layer 3 protocol which operates at the network layer.
False
Ethernet is a layer 3 protocol, which operates at the network layer. T or F
False
Fiber optic cable is thicker and heavier than unshielded twisted pair. T or F
False
Frame relay is a reliable packet service
False
IP is responsible for error-free delivery of packets on a TCP/IP network.
False
IP is responsible for error-free delivery of packets on a TCP/IP network. True False
False
IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet. True False
False
LANs that run on radio frequencies use a type of wired media.
False
Maintaining data integrity is not a primary goal of security.
False
Routed backbones use switches that move packets based on data link layer addresses.
False
STP cable is the least costly type of cable used in today's networks and is the most commonly used cable type in connecting computers to switches. T or F
False
Store and forward switching may only be used when the incoming and outgoing data circuit have the same data rate. T or F
False
TCP is the network layer protocol used on the Internet today. True False
False
TCP/IP is a data link protocol that is used on the Internet.
False
TCP/IP is a data link protocol that is used on the Internet. True False
False
TCP/IP operates only as connection-oriented. True False
False
The DCF function of Wi-Fi resolves the hidden node problem. T or F
False
The Internet is flat in structure.
False
The NOS software for the server computer provides the physical, data link, and network layer functions. T or F
False
The Network Interface Card (NIC) permits a computer to be physically connected to a network's cable. T or F
False
The cable to connect BNs is usually twisted pair.
False
The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network.
False
The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. True False
False
The maximum data rate of 802.11b LANs is 12 Mbps. T or F
False
The network layer is responsible for end-to-end delivery of the message.
False
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.
False
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model. T or F
False
The primary goal of the needs analysis step in network design is to develop a physical network design.
False
The primary goal of the needs analysis step in network design is to develop a physical network design. T or F
False
The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.
False
The standard port number for Telnet is 53. True False
False
The standard port number for Telnet is 53. T or F
False
The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps. T or F
False
There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing. True False
False
Today, the most expensive part of the network is the hardware.
False
Today, the most expensive part of the network is the hardware. T or F
False
When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible. T or F
False
When using dynamic routing, routing decisions are always made by a central host or server. T or F
False
Wireless LANs are never connected to a wired network. T or F
False
Wireless LANs do not share the bandwidth capacity of the wireless network. T or F
False
Wireless LANs use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medic access control. T or F
False
The standard port number for Telnet is 53
False - 23
A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a ___________.
Forest
In_____geometric layout for a network, every computer is connected to every other computer often by point to point dedicated circuites/
Full Mesh
baseline
Gaining an understanding of the current application system and messages provides a ____ against which future design requirements can be based on
baseline
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
Benefits of Dynamic Addressing
Greatly simplifies network management in non dial up networks too. Changes need to be made only to the DHCP server not to each individual computer.
A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. T or F
True
An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address of a host whose IP address is known but whose MAC address is unknown. T or F
True
An access point (AP) is required to connect a WLAN to a wired network. T or F
True
An access point ensures that all computers within range of the access point can communicate with each other. T or F
True
An autonomous system is a network operated by one organization. True False
True
Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. True False
True
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
True
Common Carriers sell or lease communication services and facilities to the public.
True
Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point.
True
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
True
Directional antennas produce a stronger signal over longer distances that omnidirectional antennas.
True
Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before transmitting any more packets. T or F
True
Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. True False
True
It takes 802.11a more access points to provide the same coverage as one 802.11b access point. T or F
True
Many network hubs and switches incorporate repeaters to regenerate signals so that attenuation of the signal does not occur. T or F
True
One of the most important functions of a network Operating System is a directory service.
True
Physical topology refers to the geometric layout of the network and describes how the computers are interconnected. T or F
True
Point Coordination Function requires that each station that wishes to transmit on the wireless network sends a request to transmit packet to the access point and waits for a clear to send packet from the AP before it can communicate with other nodes on the network.
True
Quality of Service routing is a special type of routing in which different connections are assigned different priorities. T or F
True
Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. T or F
True
Simulation is a tool that can be used in designing networks. T or F
True
Source port address is the logical address used to identify the application that is sending the data. True False
True
Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. True False
True
Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. T or F
True
TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False
True
The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco. True False
True
The TCP portion of TCP/IP performs linking to the application layer. T or F
True
The campus backbone is usually faster than the backbones used inside buildings.
True
The data link layer address is generally encoded in a network card by the card's manufacturer. True False
True
The data link layer protocols used by wireless LANs are similar to the ones used on Ethernet LANs. T or F
True
The frequency ranges of some access points are the same as some cordless telephones.
True
The frequency ranges of some access points are the same as some cordless telephones. T or F
True
The most common protocol for dynamic addressing in TCP/IP networks is the Dynamic Host Configuration Protocol. True False
True
The most common type of DSL today is ADSL.
True
Tier 1 service providers connect together and exchange data at IXPs.
True
WAN's can connect BNs accross distances that can span up to thousands of miles.
True
When a switch receives an Ethernet frame with a destination address that is not in its forwarding table, the switch will broadcast the frame out all of its other ports. T or F
True
Wired Equivalent Privacy requires that each user have a prefigured key in order to communicate with an access point.
True
The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First
Internet Control Message Protocol
IGMP refers to: 1.Internet Giga Memory Parameters 2.Interchange Group Management Parameters 3.Internet Guided Meta Protocol 4.Internet Group Management Protocol 5.Interchange Guided Meta Protocol
Internet Group Management Protocol
IGMP refers to: a. Internet Giga Memory Parameters b. Interchange Group Management Parameters c. Internet Guided Meta Protocol d. Internet Group Management Protocol e. Interchange Guided Meta Protocol
Internet Group Management Protocol
At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint.
Internet Service Providers
Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough.
Intrusion
Which of the following is not true about CSMA/CD?
It is used in token ring protocol LANs
Which of the following is not a component of a router? a. CPU b. Interface c. Memory d. Keyboard e. Port
Keyboard
The network architecture component which enables users to access the network is the
LAN
The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
LAN
_____________ is the software that controls the network.
Network Operating System
True
Networks requirements can be divided into mandatory, desirable, and wish-list requirements.
__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales
Reviewing the NFL scores
A _____ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point to point dedicated circuits.
Ring Design
A subnetted or hierarchical backbone can also be called.
Routed Backbone
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
Routing
___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing
Routing
RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol
Request for Proposal
__________ is not an important consideration when network designers review old and new applications.
Reviewing the NFL scores
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs.
Technology Design
The most expensive part of any network is the hardware
Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks?
ergonomic chairs for users
Which of the following is not a main item for which network designers estimate costs for the proposed network?
unnecessary requirements
Which of the following is not a way in which network requirements, identified in the needs analysis of the building-block network design process, are organized?
specifications for a particular lighting fixture in the network operating center
Which of the following is not an example of a building block used in technology design?
specifications for a particular lighting fixture in the networking operating center
Which of the following is not an example of a building block used in technology design?
an application will have drop down menu choices
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?
Much of the video processing on computers can be off-loaded from the CPU onto high-end video cards.
Which of the following is not directly contributing to the dramatic increase in network traffic today?
specific routers that have been chosen to implement the proposed network
Which of the following is not included in the key deliverable for the needs assessment stage of the building-block network design process, the set of logical network diagrams?
in designing LAN networks, network designers tend to err on the side of building too small a network
Which of the following is not true about network design
In designing LAN networks, network designers tend to err on the side of providing for less capacity than what is currently necessary
Which of the following is not true about network design?
classes of service
With QoS routing different __________ are defined, each with different priorities.
distance vector
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.
A (n) ______ is a special type of virus that spreads itself without human intervention.
Worm
reviewing the NFL scores
____ is not an important consideration when network designers review old and new applications
simulation
____ is used to model the behavior of the planned communication network once the proposed network map is complete
circuit loading
____ refers to the amount of data transmitted on a circuit
Address Resolution Protocol
_________ is a specially formatted request used to perform IP address to data link address resolution.
Reviewing the NFL scores
__________ is not an important consideration when network designers review old and new applications.
routing
__________ is not an important function of the transport layer.
Server name resolution
___________ is the translation of application layer addresses into IP addresses.
circuit loading
___________ refers to the amount of data transmitted on a circuit.
Static routing
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
Link state
_______________ is a type of dynamic routing.
bottleneck
a circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as
true
a traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. T/F?
80 percent
according to one rule of thumb ____ percent of circuit loading information is easy to gather
Which of the following is not an effective way to reduce LAN network demand:
add hidden nodes
The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented
after the vendor(s) are selected
Static Routing
all computers or routers in the network make their own routing decisions following a formal routing protocol
100Base-T:
all of the answers are correct
centralized routing
all routing decisions are made by one central computer or router
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices
an application will have drop down menu choices
How does dynamic Addressing work?
an approach in which a server is designated to supply a network layer address to a computer each time the computer connects to the network
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet
application layer address
ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes
approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet
How can a set of 802.11b access points be configured to operate without interference?
assigning each access point a different channel to communicate with clients
Gaining an understanding of the current application system and messages provides a ____ against which future design requirements can be based on
baseline
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP
baseline
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n)
bottleneck
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) a. bottleneck b. building backbone c. breakneck d. congested network e. e-commerce edge
bottleneck
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet
broadcast message
The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
building backbone
the network architecture component that is sometimes referred to as the distribution layer is the ____
building backbone
Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network
building-block
The type of logical topology that hub-based Ethernet uses is a:
bus
100 Base-T:
can run at either full- or half-duplex
Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks
can solve many updating headaches for network managers who have large, growing, changing networks
Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs
capacity planning
estimating the size and type of the standard and advanced network circuits is called ____
capacity planning
The three fundamental approaches to routing are:
centralized, static routing, and dynamic routing
The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing
centralized, static routing, and dynamic routing
With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses
classes of service
A(n) _____________ is not a common type of dedicated server.
collision server
Routers:
connect different IP networks or subnetworks.
A TCP connection is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
connection-oriented
A TCP three-way handshake is used to establish a ___________ messaging method.
connection-oriented
A star architecture:
connects all computers to one central computer that routes messages to the appropriate computer.
Media access control refers to:
controlling access to a media by more than one computer in a LAN
In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
cost assessment
in ____ the network designer considers the relative cost of the technologies
cost assessment
true
cost assessment is the step in the network design in which many complex factors related to costs are documented.
Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system
cost of advertising brochures for new products to be offered by an organization
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b.255.255.255.0 c.255.0.0.0 d.255.255.0.0
d.255.255.0.0
The ___________ is where the organization housing its primary servers.
data center
The network architecture component which contains the organization's servers is called the a. LAN b. building backbone c. data center d. enterprise edge e. WAN
data center
The network architecture component which contains the organizations servers is called the ____
data center
QoS (Quality of Service)
different classes of service are defined, each with different priorities.
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
directional
There are some network modeling tools that can ________ the existing network.
discover
There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement
discover
Encryption is the process of:
disguising information by the use of mathematical rules, known as algorithms
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state
distance vector
Which of the following is not a type of hardware device that can be used to interconnect networks.
dumb terminals.
The _____ contains the servers that are designed to serve data to customers and suppliers.
e-commerce edge
The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the a. LAN b. building backbone c. data center d. enterprise edge e. e-commerce edge
e-commerce edge
the network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization.... business with is called the ____
e-commerce edge
connectionless messaging
each packet is treated separately and makes its own way through the network. UDP due to being small
Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers
ergonomic chairs for users
capacity planning
estimating the size and type of the standard and advanced network circuits is called ____
The transport layer routes messages through the network selecting the best path from the source to the destination station. True False
false
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.
file server
Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture
focus on the growth in network use
Which of the following is a mode in which a switch reads in the first 64 bytes of the Ethernet frame and then begins forwarding out the frame on an outgoing port?
fragment-free switching
A client computer is assigned a data link layer address is by:
hardware manufacturers
A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO
hardware manufacturers
The newer form of IP, version 6 (IPv6):
has an increased address size from 32 bits to 128 bits
The newer form of IP, version 6 (Ipv6):
has an increased address size from 32 bits to 128 bits
The newer form of IP, version 6 (Ipv6): a. Is running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header
has an increased address size from 32 bits to 128 bits
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the:
hidden node problem
Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer
implementation
Which of the following is not one of the three major steps used in of the building-block process to network design?
implementation and maintenance
needs analysis
in ____ the network designer attempts to understand the fundamental current and future network needs of the various users
cost assessment
in ____ the network designer considers the relative cost of the technologies
the goal is to understand what users and applications the network will support
in need analysis:
true
in technology design a network designer looks at available technologies to see which options will satisfy users needs.
the decisions for fundamental tech/protocols and circuit capacity are interrelated
in the technology design stage of network design
To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors
issue an RFP to vendors
Wired Ethernet is becoming a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products.
legacy
Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice
list of wish list requirements
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.
logical network design
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design
logical network design
___________ is how the network works conceptually.
logical topology
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.
much more
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more
much more
A special type of message that is used when sending the same message to a specific group of computers is called a:
multicast message
A special type of message that is used when sending the same message to a specific group of computers is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
multicast message
IP addresses from 224 to 239 belong to Class D and are reserved for a. the government b. ISPs c. multicasting d. broadcasting e. private networks
multicasting
The building block design approach is sometimes called:
narrow and deep
The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat
narrow and deep
In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
needs analysis
in ____ the network designer attempts to understand the fundamental current and future network needs of the various users
needs analysis
true
network requirements can be divided into mandatory desirable and wishlist requirements.
Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer
non-necessary requirements
building block
nowadays most organizations use a simpler approach to network design called the ____ approach
__________ antennas transmit the signal in all directions.
omnidirectional
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings
packets
TCP/IP:
performs packetizing, as well as routing and addressing functions
TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures
performs packetizing, as well as routing and addressing functions
IP:
performs routing functions
IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions
performs routing functions
A logical bus topology:
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
point-to-point
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: a. data link layer address b. port address c. application layer address d. network address e. IP address
port address
The server version of the Network Operating System does not:
provide the software that performs the functions associated with the physical layer
The traditional network design approach does not work well for _________ networks.
rapidly growing
The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing
rapidly growing
__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer
routing
Dynamic Routing
routing decisions are made in a decentralized manner by individual computers
An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing
routing decisions are simple
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
routing table
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table
routing table
The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table
routing table
Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?
security (relative to fiber)
Breaking a network into smaller parts is called network:
segmentation
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
sequence numbers
TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value
sequence numbers
true
simulation is a tool that can be used in designing networks.
Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network
specific routers that have been chosen to implement the proposed network
Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center
specifications for a particular lighting fixture in the network operating center
A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network.
storage area network
A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net
subnet
In ____ the network designer examines the available technologies and assesses which options will meet the users needs
tech design
In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design
technology design
narrow and deep
the building block design approach is sometimes called
In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage
the decisions for fundamental technology/protocols and circuit capacity are interrelated
In needs analysis:
the goal is to understand what users and applications the network will suppor
In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue
the goal is to understand what users and applications the network will support
logical network design
the goal of the needs analysis is to produce a ____ or a statement of the network elements necessary to meet the needs of the ....
false
the goal of the needs analysis step in network design is to develop a physical network design.
e-commerce edge
the network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization.... business with is called the ____
building backbone
the network architecture component that is sometimes referred to as the distribution layer is the ____
What does NOS do?
the software that controls the network. Server and Client software (Active directory)
true
the step of understanding current traffic on a network provides a baseline against which future network requirements can be compared.
rapidly growing
the traditional network design approach does not work well for ____ networks
discover
there are some network modeling tools that can ____ the existing network
Which of the following is not a purpose for using hubs in a network?
to act as a communications server
total characters transmitted per day on each circuit or if possible the number of characters transmitted per two second interval
to establish circuit loading the designer usually starts with the
issue an RFP to vendors
to estimate costs for a large network purchases, organizations ofte
Address Resolution
to send a message, the sender must be able to translate the application layer address of the destination into a network layer address and in turn translate that into a data link address.
true
today many organizations design networks using the building block approach.
true
today most network designers use a three to five year planning horizon.
false
today the most expensive part of the network is the hardware.
To establish circuit loading, the designer usually starts with the:
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
transport
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. physical transport session presentation data link
transport
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link
transport
An OC-1 circuit provides a data rate of 155 mbps
true
The TCP portion of TCP/IP performs linking to the application layer. True False
true
A ____ results when a network is used to a greater extent than was originally anticipated by the network designer
turnpike effect
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan
turnpike effect
A type of message that is used when sending a message from one computer to another computer is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
unicast message
To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can:
upgrade to a bigger circuit
Switch-based Ethernet:
usually enables all attached circuits to send or receive packets simultaneously
Fiber to the Home uses
wavelength division multiplexing
The source destination port identifier tells the destination station _____________.
which application layer process the packet is from.
The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer.
which application layer process the packet is from.
cost of advertising brochures for new products to be offered by an organization
which of the following are not costs that are generally considered during the cost assessment stage of the network design process
list of wish list requirements
which of the following is not a key deliverable for the cost assessment step?
an analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the....
which of the following is not a step under the traditional network design approach
implementation
which of the following is not a step used in newer types of network design processes?
non necessary requirements
which of the following is not a way in which network requirements identified in the needs analysis of the network design process are organized?
client computers today can have 2GB of RAM a 300 GB hard drive and 2Ghz processors
which of the following is not contributing to the dramatic increase in network traffic today?
specific routers that have been chosen to implement the proposed network
which of the following is not included in the key deliverable for the needs assessment stage the set of logical network diagrams
ethernet
which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
wireless NIC
A(n) _____________ is used in a computer to connect it to a WLAN.
wireless NIC
An application layer address using TCP/IPv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3
www.cba.uga.edu
A typical TCP packet has a _______ header of control information.
192-bit
The maximum data rate of a an 802.11ad WLAN is
7Gbps
According to one rule of thumb, ______ percent of circuit loading information is easy to gather.
80
True
Capacity planning is used to design circuit capacity.
CSMA/CA is an acronym for:
Carrier Sense Multiple Access with Collision Avoidance
A T1 level of ADSL has a maximum downstream rate of about _________ Mbps.
1.5
The data rate for a T-1 circuit in North America is
1.544Mbps
A type of message that is used when sending a message from one computer to another computer is called a: 1.unicast message 2.multicast message 3.broadcast message 4.guided message 5.radiated message
1.unicast message
________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T.
10/100/1000 Ethernet
The _____ address range is reserved for a computer to communicate with itself and is called the loopback. 121 127 239 254
127
The _____ address range is reserved for a computer to communicate with itself and is called the loopback. a. 121 b. 127 c. 239 d. 254 e. 111
127
An application layer address using TCP/IPv4 looks like:
128.192.78.5
IPv6 is based upon _________ -byte addresses
16
IPv6 is based upon _________ -byte addresses. 32 24 4 16 8
16
IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8
16
The ping command uses the most basic interior routing protocol on the Internet, which is the: 1.Border Gateway Protocol 2.Internet Control Message Protocol 3.Routing Information Protocol 4.Enhanced Interior Gateway Routing Protocol
2.Internet Control Message Protocol
A TCP three-way handshake is used to establish a ___________ messaging method. 1.asynchronous 2.connection-oriented 3.frequency division 4.application net 5.connectionless
2.connection-oriented
A(n) ________ refers to a group of computers that are logically grouped together by IP number. 1.IPv6 group 2.subnet 3.data link group 4.TCP group
2.subnet
broadcasting
255 are reserved for broadcastin
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
255.255.0.0
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255
255.255.0.0
______________ communication is most commonly used when the application data or message can fit into one single packet. 1.Frame-oriented 2Connection-oriented 3.Connectionless 4.Physical-oriented
3.Connectionless
___________ is the translation of application layer addresses into IP addresses. 1.Network interface card reversal 2.IPv6 3.Server name resolution 4.Subnet masking
3.Server name resolution
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. 1.Adaptive routing 2.Dynamic routing 3.Static routing 4.Distance vector routing
3.Static routing
One drawback to dynamic routing is: 1. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages 2. It cannot be used with non-government networks 3.The transmission of status information "wastes" network capacity that could be used to send user messages 4.It is the job of the network manager, not the computers or devices themselves, to maintain the routing table.
3.The transmission of status information "wastes" network capacity that could be used to send user messages
ICANN: 1.developed the IPX/SPX network layer protocol 2.assigns data link layer addresses 3.approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet 4.developed X.25 network layer protocol
3.approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: 1.unicast message 2.multicast message 3.broadcast message 4.guided message
3.broadcast message
IP addresses from 224 to 239 belong to Class D and are reserved for 1. the government 2.ISPs 3.multicasting 4.broadcasting 5.private networks
3.multicasting
IP addresses from 224 to 239 belong to Class D and are reserved for 1.the government 2.ISPs 3.multicasting 4.broadcasting
3.multicasting
An advantage of centralized routing is: 1.routing does reflect changing network conditions, such as computers that are overloaded by many messages 2.if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function 3.routing decisions are simple 4.the routing tables are stored at all computers in the network
3.routing decisions are simple
The source port identifier of the received TCP segment tells the destination station _____________. 1.which computer sent the TCP packet. 2. which application layer program that the packet should be sent 3.which application layer process the packet is from. 4.the IP address of the source computer.
3.which application layer process the packet is from.
IPv4 uses ________ bytes per Internet address
4
IPv4 uses ________ bytes per Internet address.
4
IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16
4
IPv4 provides ___________ IP addresses. a. 4.3 billion b. 144 million c. 64 billion d. 3.14 billion e. 1 million
4.3 billion
UDP is not commonly used for: 1.network management control messages 2.RIP messages 3.DHCP addressing messages 4.HTTP requests 5.DNS requests
4.HTTP requests
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. 1.network layer address resolution 2.one way handshake 3.SNA message 4.TCP connection
4.TCP connection
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. 1.physical layer packet 2.multicast message 3.X.25 message 4.broadcast message
4.broadcast message
Server name resolution is done using the: 1.Address Resolution Protocol 2.Border Gateway Protocol 3.Internet Control Message Protocol 4.Routing Information Protocol 5.Domain Name Service
5.Domain Name Service
The three fundamental approaches to routing are: 1.circuitous, flat, and direct routing 2.connectionless, static, and connection-oriented 3.subordinate, master, and insubordinate routing 4.host, client, and client-server routing 5.centralized, static routing, and dynamic routing
5.centralized, static routing, and dynamic routing
The maximum data rate of an 802.11g WLAN is
54 Mbps
SYN
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection
multicast message
A special type of message that is used when sending the same message to a specific group of computers is called a:
broadcast message
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
255.255.0.0
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
True
A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications.
unicast message
A type of message that is used when sending a message from one computer to another computer is called a:
192-bit
A typical TCP packet has a _______ header of control information.
connection-oriented
A virtual circuit is established in the ___________ routing method.
subnet
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.
Answer: True
The ______ defines what type of packets should be routed and what types of packets should be discarded. a. ACL b. AFL c. TCP d. IOS e. OSI
ACL
_________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization. a. TCP/IP b. ARPANET c. ARIN d. AIS e. OSPF
ARIN
________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization. TCP/IP ARPANET ARIN AIS
ARIN
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
ARPANET
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox
ARPANET
80
According to one rule of thumb, ______ percent of circuit loading information is easy to gather.
_________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request
Address Resolution Protocol
Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.
An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.
www.cba.uga.edu
An application layer address using TCP/Ipv4 looks like:
__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer
Answer: C
1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable. T or F
False
An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing
Answer: C
One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.
Answer: C
*___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding
Answer: C
The newer form of IP, version 6 (Ipv6) is: a. running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header
Answer: C
A VLAN network assigns computers to LAN segments by hardware.
False
*___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing
Answer: A
A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO
Answer: A
IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16
Answer: A
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection
Answer: A
The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table
Answer: A
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox
Answer: A
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet
Answer: A
*A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
Answer: B
*A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net
Answer: B
*An application layer address using TCP/Ipv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3
Answer: B
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table
Answer: B
TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value
Answer: B
TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures
Answer: B
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link
Answer: B
The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First
Answer: B
*A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection a. ACK b. NAK c. SYN d. ARQ e. FIN
Answer: C
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing
Answer: C
*The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings
Answer: D
*_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net
Answer: D
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255
Answer: D
IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions
Answer: D
IPv6 will be based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8
Answer: D
_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25
Answer: D
*Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service
Answer: E
*The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing
Answer: E
Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks
Answer: E
IP is responsible for error-free delivery of packets on a TCP/IP network.
Answer: False
IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.
Answer: False
TCP is the network layer protocol used on the Internet today.
Answer: False
TCP/IP is a data link protocol that is used on the Internet.
Answer: False
The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits.
Answer: False
The network layer address for IP is ten bytes long when using IPv4.
Answer: False
The network layer is responsible for end-to-end delivery of the message.
Answer: False
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.
Answer: False
The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.
Answer: False
The transport layer routes messages thought the network selecting the best path from the source to the destination station.
Answer: False
There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing.
Answer: False
When using dynamic routing, routing decisions are always made by a central host or server.
Answer: False
An example of an application layer address is www.indiana.edu
Answer: True
Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller packets.
Answer: True
Domain Name Servers provide the equivalent of directory assistance for application layer addresses.
Answer: True
Part of the function of address resolution is translating the application layer address of the destination into a network layer address.
Answer: True
Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient.
Answer: True
Several different protocols exist that specify how network and/or transport layer packets are organized.
Answer: True
Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet.
Answer: True
TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order.
Answer: True
The TCP portion of TCP/IP performs linking to the application layer.
Answer: True
The data link layer address is generally encoded in a network card by the card's manufacturer.
Answer: True
The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host Control Protocol.
Answer: True
The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer
Answer: True
To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application layer port addresses to distinguish among many open applications on a computer
Answer: True
A multicast message can be used to send a message to a maximum of two other computers. True False
False
port address
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:
Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
Building Block
In a quickly evolving network, which design method is recommended?
Building block approach
A _______ is a device that permits a customer to connect to a digital T Carrier service.
CSU/DSU
___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation
Circuit loading
A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System
Cisco Internetwork Operating System
Multicasting
Class D (224 to 239) is used for multicasting transmitting data to multiple computers
Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common.
Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors.
______are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANS and MANS.
Common Carriers
_____________ routing is a method of routing in which each packet makes its own way through the network.
Connectionless
_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net
Connectionless
______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented
Connectionless
In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technologies.
Cost Assesment
True
Cost assessment is the step in the network design in which many complex factors related to costs are documented.
True
Cost assessment is used to look at the relative cost of technologies used in a network design.
true
Cost assessment is used to look at the relative cost of technologies used in a network design.
A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers.
DMZ
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet
DNS request packet
Data traffic from the DSL customer premises is sent to a __________ which is located at the local carrier's end office.
DSLAM
A multicast message can be used to send a message to a maximum of two other computers. T or F
False
A routing protocol used inside an autonomous system is called an exterior routing protocol. True False
False
Which of the following is not a technology layer that is considered when designing backbone networks.
Decntralized layer
__________ provide authentication which can legally prove who sent a message over a network.
Digital Signatures
A routing protocol used inside an autonomous system is called an exterior routing protocol. T or F
False
A switch always broadcasts all the packets it receives to all the computers that are connected to the switch. T or F
False
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
Directory Services
Server name resolution is done using the:
Domain Name Service
Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service
Domain Name Service
can solve many updating headaches for network managers who have large, growing, changing networks
Dynamic addressing:
much more
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.
Capacity Planning
Estimating the size and type of the "standard" and "advanced" network circuits is called _________.
Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA
Ethernet
Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps
Ethernet
What is a subnet? What is a subnet mask?
Group of computers on the same LAN with IP numbers using the same prefix Assigned addresses that are 8 bits in length Used to make it easier to separate the subnet part of the address from the host part.
UDP is not commonly used for: a. network management control messages b. RIP messages c. DHCP addressing messages d. HTTP requests e. routing control messages
HTTP requests
Internet Group Management Protocol
IGMP refers to:
performs routing functions
IP:
Describe the difference between an IPv4 and IPv6 packet
IPv4 is 32 bits (4 bytes) and IPv6 is 128 bits (16 bytes) hexadecimal
4
IPv4 uses ________ bytes per Internet address. Answer
16
IPv6 will be based upon _________ -byte addresses.
the decisions for fundamental technology/protocols and circuit capacity are interrelated
In the technology design stage of network design,
tech design
In ____ the network designer examines the available technologies and assesses which options will meet the users needs
transport
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network
In designing LAN networks, network designers tend to err on the side of building too small a network
routing table
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
the goal is to understand what users and applications the network will support
In needs analysis:
True
In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.
needs analysis
In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.
technology design
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs
technology design
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs.
seven network architecture components.
LANs (wired and wireless) provide users access to the network (access layer). Building backbones (distribution layer) connect the LANs inside one building. Campus backbones (core layer) connect the different buildings. The data center houses the organization's main servers. At the enterprise edge, we have WAN access that connects to other campuses operated by the organization, Internet access, and the e-commerce edge, which enables a business to support its customers and/or suppliers.
_______________ is a type of dynamic routing.
Link state
_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing
Link state
Associated with a switched backbone, MDF is an acronym for:
Main Distribution Facility.
In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.
Needs analysis
False
Needs analysis is the final step in the building block approach to network design.
false
Needs analysis is the final step in the building block approach to network design.
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
The transmission of status information "wastes" network capacity that could be used to send user messages
One drawback to dynamic routing is:
A(n) ____________ examines the source and destination address of every network packet that passes through it.
Packet Level Firewall
__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer
Peak circuit traffic
__________ has led to the belief that the Internet is "free".
Peering
A _________ is the place at which the ISP provides services to its customers.
Point of Presence
Unicasting
Point-to-point transmission with exactly one sender and exactly one receiver
Request for Proposal
RFP stands for:
___________ is the translation of application layer addresses into IP addresses.
Server name resolution
___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding
Server name resolution
Domain Name Service
Server name resolution is done using the:
____ is the process of creating several logically separate servers on the same physical computer.
Server virtualization
connection-oriented messaging
Sets up a TCP connection (also called session) between the sender and receiver. 3 Way and 4 way handshake
________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users
Simulation
True
Simulation is a tool that can be used in designing networks.
false
The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing
Static routing
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.
Subscriber
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request
TCP connection
sequence numbers
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world.
TCP/IP
_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. SDLC SNA IPX/SPX TCP/IP
TCP/IP
_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25
TCP/IP
performs packetizing, as well as routing and addressing functions
TCP/IP:
A hop in a routing calculation is defined as one link or circuit. True False
True
A hop in a routing calculation is defined as one link or circuit. T or F
True
transport
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
routing table
The _____________ is used by a computer to determine how messages will travel through the network.
False
The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network.
True
The campus backbone is usually faster than the backbones used inside buildings.
false
The goals in the needs analysis step of network design are exactly the same when designing LANs vs when designing WANs.
False
The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs.
after the vendor(s) are selected
The large network purchases are done:
A switch can send and receive on all circuits simultaneously.
True
A switch can send and receive on all circuits simultaneously. T or F
True
Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks?
The most expensive part of any network is the hardware
Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware
The most expensive part of any network is the hardware
building backbone
The network architecture component that is sometimes referred to as the distribution layer is the
data center
The network architecture component which contains the organizations servers is called the ____
LAN
The network architecture component which enables users to access the network is the
has an increased address size from 32 bits to 128 bits
The newer form of IP, version 6 (Ipv6) is:
Internet Control Message Protocol
The ping command uses the most basic interior routing protocol on the Internet, which is the:
False
The primary goal of the needs analysis step in network design is to develop a physical network design
which application layer process the packet is from.
The source destination port identifier tells the destination station _____________.
True
The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared
Compare and contrast the three types of addresses used in a network.
The three types of addresses used in a network are the application layer, network layer and the Data link layer. When users work with application software, they typically use the application layer address. Application software that used Internet addresses (e.g., ). This is an application layer address. When a user types an Internet address into a Web browser, the request is passed to the network layer as part of an application layer packet formatted using the HTTP protocol. The network layer software, in turn, uses a network layer address. The network layer protocol used on the Internet is IP, so this Web address ( ) is translated into an IP address that is 4 bytes long when using IPv4 (e.g., 129.79.127.4). This process is similar to using a phone book to go from someone's name to his or her phone number. The network layer then determines the best route to transmit the data. Now the data link layer protocol is used which attaches an Ethernet address frame to the packet which contains the MAC address of the receiver computer. This Mac address is examined with many computers over the network until it reaches its target Ethernet address or Computer.
rapidly growing
The traditional network design approach does not work well for _________ networks.
One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.
The transmission of status information "wastes" network capacity that could be used to send user messages
Explain how linking occurs between the Transport layer of the OSI model and the Application layer
The transport layer accepts outgoing messages from application layer and segments them for transmission.
packets
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
False
The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.
discover
There are some network modeling tools that can ________ the existing network.
Why is it important to "sell" a proposal to management?
To Discuss growth in network and focus on network reliability.
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
To establish circuit loading, the designer usually starts with the:
issue an RFP to vendors
To estimate costs for large network purchases, organizations often:
False
Today, all network traffic is due to traffic from internal application systems.
True
Today, many organizations design networks using the building-block approach.
True
Today, most network designers use a three to five year planning horizon.
False
Today, the most expensive part of the network is the hardware.
What is TCP and describe the fields of a TCP packet?
Transmission Control Protocol. It consists of Source Port and Destination Port fields (16 bits each)
ARPANET
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
802.11a LANs provide more channels than 802.11b LANs. T or F
True
802.11a provides for speeds of up to 54 Mbps under perfect conditions. T or F
True
802.11n LANs operate at speeds up to 600 Mbps. T or F
True
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.
True
A backbone network is a high speed network that connects many networks.
True
A collision on a bus circuit means that two computers on that circuit have transmitted at the same time. T or F
True
A forwarding table tells a switch which port it should send out a packet to get to the destination computer. T or F
True
HTTP requests
UDP is not commonly used for:
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
DNS request packet
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities
When a variety of devices are used in a network, it takes less time to perform network management activities
false
When obtaining the support of senior management for a proposed network, it is important to use as much technical jargon as possible.
False
When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.
When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities
Which of the following is false about staff costs for a network?
UDP
Which of the following is not a protocol used at the application layer.