Unit 5: Networking Fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

edge router

(also known as a boundary router) transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network.

Which of the following is NOT a computer network hardware device?

1.Hub 2.Switch 3.Sniffer correct 4.Router

Large business enterprises require core routers in their telecommunications computer network to support multiple telecommunications interfaces of the highest speed. What else does a core router do?

A core router operates in the Internet backbone.A core router is very powerful (and expensive), and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.

Why do home office or small business computer networks sometimes use a peer-to-peer topology?

A peer-to-peer topology allows file sharing between computers.Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.

A network protocol designed to handle broadband integrated services such as voice and video is

ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.

TELNET

An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure, and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP).

What is the difference between an analog signal and a digital signal?

Analog signals are continuous while digital signals are not continuous. Correct! Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms.

The Internet has become a valuable tool for businesses. Which of the following is NOT a business benefit of the Internet?

Conduct personal matters. Although access to the Internet allows employees to save time and potentially improve productivity, using the Internet for personal matters can cause employees to waste time and the business may lose productivity to personal aims. For this reason, many businesses restrict employees from accessing part of or the entire Internet.

What is the purpose of the Domain Name System?

Converts domain names to IP addresses Correct! Every host connected to the Internet has a unique IP address that is difficult to use and remember. Therefore, the Domain Name System (DNS) converts unique IP addresses to domain names, such as Google.com to its IP address (i.e., 216.58.217.206).

What information is enclosed in transmission packets? Select the most accurate statement.

Data packets include destination address, relay information, and error detection.Correct! Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.

multiplexer

Data signals and data packets travelling over computer networks from multiple devices are combined together into a single signal, or aggregated by this device

DNS

Domain Name Service. Server-based service that translates human language web address or URL into an IP address, which is used.

DHCP

Dynamic Host Configuration Protocol. A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network.

PPP stands for Point-to-Point protocol.

Encryption is used to ensure the privacy of the content being communicated.

Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?

Ethernet replaced token rings as a data communications standard in LAN applications.

If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application is used?

Extranet. ! Internet, intranet, and extranet are excellent means of communications for businesses, customers, and suppliers, but typically the extranet is used to communicate with suppliers and vendors to manage their inventories.

The part-time employees used this old and unsecured technology to transfer files between the bookstore's server and their home computers.

FTP

True or False. You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?

False Correct! Large business might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.

True or False. The telecommunications innovation is nothing new; it started 30 years ago with the founder of the telephone, Mr. Samuel Morse.

False Correct! Mr. Samuel Morse and others invented the telegraph in the 1820s. Mr. Alexander Graham Bell was the inventor of the telephone more than 130 years ago, which evolved from the telegraph.

True or False. The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), is also known as the Internet standard.

False Correct! The TCP/IP, which defines how data are relayed between networks, is the Internet standard. 802.3 is an Ethernet standard and defines local area network (LAN) connections.

Which of the following is a governing agency that determines what is and is not acceptable on the Internet?

Federal Communications Commission (FCC)The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.

FTP

File Transfer Protocol is an insecure method used to transfer files from one computer to another.

The bookstore customers use this method to visit the website to order books and check on their order status.

HTTPS

HTTPS

Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server.

HTTP

Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the world wide web.

In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network?

IP address Correct! IP stands for Internet Protocol. An IP address is a unique address assigned to a computer or device connected to the Internet.

Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to which of the following?

ISP Correct! ISP stands for Internet Service Provider. It is a paid service, whereby individuals and organizations can subscribe to the provider to have access to the Internet services.

Walmart utilizes SCM to order its inventories.

Interact with suppliers Correct! Supply chain management (SCM) allows retailers to order their inventories directly from the manufacturers.

Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below ______ in real time, with their clients using online chat or instant messaging applications.

Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below synchronously in real time, with their clients using online chat or instant messaging applications. Synchronously refers to happening at the same time.

A communication protocol is defined as a set of rules that does what?

Rules that allow communication systems to interact. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.

Employees and the business owner communicate via emails using this protocol.

SMTP

SFTP

Secure File Transfer Protocol. Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.

Students can buy e-books and access codes directly from the textbook publishers' websites.

Sell digital goods-Correct! Textbook publishers such as Pearson and McGraw-Hill yield a bigger profit margin from selling digital goods to students.

SMTP

Simple Mail Transfer Protocol. One of several popular email protocols in use today (others include IMAP and POP3).

SNMP

Simple Network Management Protocol. Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.

Because of limited funding, the bookstore employees are still using this very old and unsecure method to log on to the company's server from home.

Telnet

Corporations have used private branch exchanges (PBX) for many years to manage their own internal phone systems. Which of the following statements about private branch exchanges (PBX) is false?

The Internet is the backbone for PBX. Correct! The PBX system is based on the telephone technology and does not require the Internet to function.

Convergence

The ability for a telecommunication network to carry voice, data, and video is called

convergence

The ability for a telecommunication network to carry voice, data, and video is called .

The application layer

The application layer is where applications create and communicate user data to other applications on the same or another host

Computer networks enable circuit switching. What does this mean?

They create a point-to-point packet digital circuit in circuit switching. Correct! Computer networks create a point-to-point packet digital circuit in circuit switching, which allows point-to-point communication.

True or False. Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.

True Correct! Data packet switching can be broken up and sent throughout the entire network to be reassembled at the destination.

True or False. If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a multiplexer.

True Correct! Data signals travelling over computer networks are combined together by the use of a multiplexer.

organizations can communicate Hint, displayed below ______ with their clients via bulletin boards, blogs, and streaming videos.

organizations can communicate Hint, displayed below asynchronously with their clients via bulletin boards, blogs, and streaming videos. Asynchronously refers to events happening at different times

Repeaters

receive and retransmit data at higher power so it can travel over long distances. They strengthen or amplify signals for long transmissions, but do not serve a broadcast function in a network and do not store data.

The term Internet of Things (IoT)

refers to a future trend in which all devices—including appliances, cars, networks, and systems—will be connected to the Internet, which will facilitate servicing automation and e-commerce.

File storage and hosting

refers to repositories of information, storage for retrieval, or archival of documents.

TCP/IP stands for Transmission Control Protocol/Internet Protocol,

shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.

A hub is a networking device

that connects computer devices together in a LAN, sending data traffic to all networked components.

Why do communications networks use defined rules or standards called protocols?

to ensure communication between packets is accurate and understood. n communications networks, data are transmitted by devices, travel over a medium, and are received by other devices. Protocols are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.

WAN stands for wide area network

typically connects business campuses consisting of computer systems across large distances. transmitted through the "cloud,"

LAN stands for local area network,

typically connects computer systems of an organization or a floor of a building

Large organizations leverage _____ network management applications to better handle changes and moves.

virtual

he most common protocol is TCP/IP

which establishes the connection, and data packet quality transmission.

Electronic communication consists of

emails, instant messaging, audio clips, video communications, and unified communications.

The Internet layer

exchanges data sequences (known as datagrams) across network boundaries, providing a uniform network interface concealing the layout of the actual network connections.

Core routers

gather, link, or route data from a business campus and aggregate it to optimize high bandwidth transmission.

Bridges

in network topologies are used to connect or link separate networks together, but do not have data switching capability.

POP stands for Post Office Protocol

in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.

The network layer

includes the protocols used to describe the network layout and the interfaces necessary for data transmission.

computer network

is a collection of interlinked computers that can exchange information over links in the form of digital packets.

An intranet

is a network connection meant for internal use only, not to communicate with customers.

A router

is a networking device used to pass packets to the next network node until the packets reach the ultimate destination. _______ are used to connect multiple networks together and forward data packets between those separate networks to the destination host.

What is a network host? This is also known as data terminal equipment in computer networking hardware.

is a physical node with an IP address.

A network protocol

is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception.

Wireless communication

is a type of telecommunication network that uses radio waves to send and receive signals.

A standard

is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate.

A hypervisor

is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network.Although hypervisors have no routing capability, they enable network management through virtual design and operations.

The modern communication system

is digital (whereas earlier systems were analog), and relies on various technologies to perform fast and reliably.

packet

is simply a unit of data forwarded by a network

Telecommunications

is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

public switch telephone network (PSTN)

is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell.is a wired infrastructure, composed of wires, cables, switches, repeaters, and other telecommunication components.

category 5 (Cat5) cable

is typically made of copper but is much smaller than copper building wire that is used to carry electricity.

Quality of Service (QoS)

is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.

A packet analyzer or sniffer

is used to monitor or log traffic on a network for troubleshooting or analysis. can be used by hackers to obtain authentication information needed to hack a network

Voice over Internet Protocol (VoIP)

modern telecommunications technology that offers convergence between voice and data networks

A Converged

network is able to carry data, voice, and multimedia information.

A network host is a _______ in a data communications network and is assigned an IP address.

node Correct! A network host or data terminal equipment is a node in a network.

Host-to-host communications

occur on the transport layer on the same or different hosts, as well as on the local network or any network remotely connected through a router.

You are managing a small business network. They have a web or database server so you will need to design their network as a _____ topology, while a large enterprise would best benefit from a ______ network to manage network moves and changes.

client-server virtual

A bus enables

computer components to communicate with one another.

Portals and connections

consist of applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.

Small office or home office routers enable computers to access the _______. Connection to the web is enabled by service providers called _______> .

Interntet ISP

Small networks are usually _____ networks and are managed physically.

LAN

LDAP

Lightweight Directory Access Protocol. Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlook's global address list and Microsoft Active Directory.

Which of the following statements are true regarding Voice over Internet Protocol (VoIP)? (Select all that apply.)

No 1.It uses the standard public switched telephone network (PSTN) connection. *2.It is based on a high-speed Internet connection to *deliver voice communications. 3.It results in lower phone charges for businesses because long-distance calls are toll free. Check My Answer Correct! To use the VoIP effectively, a high-speed Internet connection must be in place. VoIP uses the Internet connection. It does not require a landline to make phone calls; therefore, all long-distance calls are toll-free, resulting in lower operating costs.

What are two fundamental elements that are used in modern networking infrastructure?

One is packet transmission and the other is the TCP/IP protocol.

If you want to visit the Barnes & Noble website, you will type the _____ of barnesandnoble.com in the ______ of your web browser. The DNS will convert barnesandnoble.com into _______, and you will use the _____ protocol to communicate with the world wide web.

domain name URL IP address HTTP

URL

Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.

How is voice or video information carried on digital networks?

Voice and video data are transmitted using circuit switching methods.Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.

Larger networks consist of a ____ network, or multiple LANs and WANs, and can be managed more productively through virtual network capability.

WAN

FTP stands for File Transfer Protocol

and is a protocol used to transfer files from one computer to another.

OSI stands for Open System Interconnection

and is the foundation for data communication protocols

older Open System Interconnection (OSI) protocol that consisted of seven layers:

application, presentation, session, transport, network, data link, and physical. Before OSI became the standard protocol, computer networks used proprietary protocols.

Transmission Control Protocol, or TCP protocol, consists of four abstraction layers

application, transport, Internet, and network access

Protocols

are used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device.

Satellite communications

are used to link telecommunications networks over long distances.

Firewalls

are used to prevent intrusion into a network and are not related to data communication protocols. It can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion.


संबंधित स्टडी सेट्स

89: both / both of neither / neither of either / either of

View Set

HM Manual CH 22 Poisoning and Drug Abuse

View Set

Medical Terminology - Chapter 1, 2, 3

View Set

HESI: Management of a Medical Unit and Rationale

View Set