module 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

bus topology

(also called "linear bus") connects nodes along a network segment, but the ends of the cable are not connected, as they are in a ring topology

mesh topology

(also called "plex" or "interconnected"), every node (which can differ in size and configuration from the others) is connected to every other node.

hierarchal topology

(also called a "tree") combines computers with different processing strengths in different organizational levels.

mobile network

(also called a cellular network) is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter, known as a cell site or base station

Worldwide Interoperability for Microwave Access (WiMAX)

a broadband wireless technology based on the IEEE 802.16 standards. It is designed for wireless metropolitan area networks and usually has a range of about 30 miles for fixed stations and 3-10 miles for mobile stations.

packet

a collection of binary digits- including message data and control characters for formatting and transmitting- sent from computer to computer over a network

digital subscriber line

a common carrier service, is a high-speed service that uses ordinary phone lines

controller

a hardware and software device that controls data transfer from a computer to a peripheral device (examples are a monitor, a printer, or a keyboard) and vice versa.

network interface card

a hardware component that enables computers to communicate over a network

multiplexer

a hardware device that allows several nodes to share one communication channel

A typical data communication system includes all of the following components except: a local area network modems or routers communication medium(channel) sender and receiver devices

a local area network

router

a network connection device containing software that connects network systems and controls traffic flow between them

wireless network

a network that uses wireless instead of wired technology

Open Systems Interconnection (OSI) model

a seven-layer architecture for defining how data is transmitted from computer to computer in a network, from the physical connection to the network to the applications that users run. It also standardizes interactions between network computers exchanging information.

narrowband

a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time

All of the following are true about telepresence except:

a.Telepresence incorporates network convergence and virtual reality *b.Telepresence does not require retrofitting classrooms and equipment* c.Telepresence rooms are environments that offer videoconferencing that allow students to feel like they are in the same room d.Telepresence includes the use of remote-controlled, audio-visual robots with wireless internet connectivity, such as a wheeled tablet

Transmission Control Protocol/Internet Protocol (TCP/IP)

an industry-standard suite of communication protocols that enables interoperability.

Troubleshooting data networks can be more efficient when analyzing what layer of the OSI model is showing problematic symptoms. To apply the OSI model in your troubleshooting efforts, you need to thoroughly understand what tasks are accomplished at each layer. Identify which OSI layer is most relevant to the problem described in each scenario.

application layer Your web browser freezes and is nonresponsive. transport layer A downloaded file is corrupted due to missing data. network layer Your Web browser can't find a particular Web server and reports a routing error. physical layer Rats chew through a critical network cable.

n-tier architecture

attempts to balance the workload between client and server by removing application processing from both the client and server and placing it on a middle-tier server

Effective data communication relies on many components to function collaboratively and reliably. When troubleshooting network problems, you'll need to be able to identify which component is most likely causing the problem based on the symptoms you're observing. Identify the most likely issue causing the problem in each scenario.

attenuation Randy can't get a strong enough Wi-Fi signal to connect to the network. line of sight Tamara is frustrated that her satellite signal gets lost during a thunderstorm. modem Dante's home router reports that it's not connected to the Internet. broadband Karen's Internet connection slows down every evening when her neighbors are home from work and playing online games or streaming movies. bandwidth Casey is downloading a large number of high-resolution images from a file server, and the download process is taking a long time.,

dynamic router

can build tables that identify addresses on each network

wide area network

can span several cities, states, or even countries, and it is usually owned by several different parties

local area network

connects workstations and peripheral devices that are in close proximity

broadband

data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate

metropolitan area network

designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well

decentralized proccessing

each user, department, or division has its own computer (sometimes called an "organizational unit") for performing processing tasks.

To improve the efficiency and quality of digital communications, Time Division Multiple Access (TDMA) divides each channel into two time slots. True or False?

false; six time slots

One of the following has the highest bandwidth of any communication medium: fiber-optic cable twisted pair copper cable coaxial cable microwave

fiber-optic cable

routing table

generated automatically by software, is used to determine the best possible route for a packet

You're setting up a Web site for a new marketing division of your company. It's a small, innovative marketing team that will be experimenting with some new customer relationship building techniques, and the Web site is expected to play a key role in this process. Your company's VP of Marketing is checking in with you for updates on the site's deployment. VP: You mentioned in your email update that the site is fully built and ready for beta testing. How can I access the site? You: We've not yet made the site publicly available, but you can go directly to its____________, which I'll send you in an email. Just enter that information directly in your browser's address bar.

ip address

distributed processing

maintains centralized control and decentralized operations. Processing power is distributed among several locations.

Your office manager has come to you with a problem getting a new employee's tablet connected to the network. Your company maintains a BYOD policy, and employees frequently choose to use their own devices to maximize their mobility during the workday and availability in their off hours. Office manager: Regina's tablet won't connect to the company network. I can't figure out how to make it find the right login page. You: It looks like her tablet is connected to her cell phone provider's __________ . We need to switch this over to our local Wi-Fi.

mobile network

ring topology

no host computer is required because each computer manages its own connectivity

centralized routing

one node is in charge of selecting the path for all packets. This node, considered the network routing manager, stores the routing table, and any changes to a route must be made at this node.

communication media

or channels, connect sender and receiver devices. They can be conducted or radiated.

Which of the following layer of the OSI model is responsible for formatting message packets: presentation transport session application

presentation

conducted media

provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics

distributed routing

relies on each node to calculate its own best possible route. Each node contains its own routing table with current information on the status of adjacent nodes so packets can follow the best possible route.

network topology

represents a network's physical layout, including the arrangement of computers and cables

static router

requires the network routing manager to give it information about which addresses are on which network

Trevor is setting up a Wi-Fi network in a small office for access by staff and customers. Customer access needs to be separate from staff access, and all network access needs to be secured. What setting should Trevor change to ensure no one else can make changes to the network configuration?

router password

VP: I didn't know you could go directly to a Web site like that. How does that work? You: Normally, of course, you'd enter the Web site name, and the router would have to figure out how to find the Web server's address. This way, the router just has to check its ___________for information on what to do with that address.

routing table

protocols

rules that govern data communication, including error detection, message length, and transmission speed

VP: If that address is all the information needed for Internet users to find our servers, how can we protect other servers in our network, especially those that hold sensitive company information? You: There are many layers of security in place to prevent that from happening. One of the most important is ____________ , where we can isolate portions of our network for privacy.

segmentation

throughput

similar to bandwidth. It is the amount of data transferred or processed in a specified time, usually one second.

client/server model

software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client requests.

Trevor can set a separate _______for the customer Wi-Fi network that requires a different, less secure password.

ssid

centralized processing

system, all processing is done at one central computer

bandwidth

the amount of data that can be transferred from one point to another in a certain time period, usually one second

data communication

the electronic transfer of data from one location to another

Attenuation

the loss of power in a signal as it travels from the sending device to the receiving device

routing

the process of deciding which path to take on a network. This is determined by the type of network and the software used to transmit data.

Office provider: But her cellular provider gives Internet access. So how does switching to Wi-Fi help us? You: First of all, our Wi-Fi will almost definitely give her better ____________ than the cell network. But also, connecting to our Wi-Fi is the easiest way to access our authentication server so she can sign into our network and access our company resources.

throughput

In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False?

true

In the two-tier architecture of the client/server model, a client (tier one) communicates directly with the server (tier two). True or False?

true

radiated media

use an antenna for transmitting data through air or water

star topology

usually consists of a central computer (host computer, often a server) and a series of nodes (typically, workstations or peripheral devices).

bluetooth

which can be used to create a personal area network (PAN), is a wireless technology for transferring data over short distances (usually within 30 feet) for fixed and mobile devices.

What kind of security technology should Trevor configure for both networks to provide optimal data protection?

wpa2

modem

(short for "modulator-demodulator") is a device that connects a user to the Internet.

two-tier architecture

(the most common type), a client (tier one) communicates directly with the server (tier two)

Office manager: That makes sense about accessing the network authentication server—I didn't even think about that. But Regina's tablet is ____________ capable, so it might actually be a step down for her on performance. You: That's a good point—at least until we update our Wi-Fi to the latest speeds. Until then, we'll set her up for remote access so she can use her cell network whenever she wants.

5g

Wireless Fidelity (Wi-Fi)

A broadband wireless technology. Information can be transmitted over short distances - typically 120 feet indoors and 300 feet outdoors - in the form of radio waves

convergence

In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making.

time division multiple access

To improve the efficiency and quality of digital 45. communications, Time Division Multiple Access (TDMA) divides each channel into six time slots. Each user is allocated two slots: one for transmission and one for reception. This method increases efficiency by 300 percent, as it allows carrying three calls on one channel.

Code Division Multiple Access (CDMA)

To improve the efficiency and quality of digital communications, Code Division Multiple Access (CDMA) transmits multiple encoded messages over a wide frequency and then decodes them at the receiving end.


Conjuntos de estudio relacionados

Chapter 17 Neurologic Emergencies

View Set

Test 1 (Chapters 10, 11, 12, 13)

View Set

Chapter 34: Acute Kidney Injury and Chronic Kidney Disease

View Set

Failed test questions 3 up to ? 190

View Set

Unit 2 Module 1 Enlightened Ideas in the Founding Documents Quiz 2 of 2

View Set

Musician's Guide to Fundamentals: Chapter 1 - 6 Review

View Set