chapter 1, 2 & 5 questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

CIDR BLOCK Example 10.0.0.0.0/16 Lowest and highest range 10.0.0.0 10.0.255.255

00001010 - 00000000 - 00000000 - 00000000 00001010 - 00000000 - 11111111 - 11111111

How do data communications networks support the four core capabilities of MIS?

1.Computers, printers, projection and sound systems, etc. The devices that communicate. 2.Transmission media - UTP, coaxial cable, wireless. Connects the devices and processors. 3.Communication processorsSwitches - send packets across a single network using the same protocolRouters - send packets between different networks and translates between different protocolsModems - convert analog to digital and digital to analog 4.Software to implement communication protocols - TCP/IP Storing and Retrieving Data—Just like humans live in houses, data created by businesses and societies must live somewhere. The "house" for data is a database. There are many different kinds of databases, just like many different kinds of houses. The most frequently used database in organizations is an SQL database. 2. Analyzing and Visualizing Data—Managers need to able to make decisions regarding their business, such as: What is our bestselling product? Which regions bring in the most revenue? Which regions are losing money? These decisions are made using the data stored in databases. Data is retrieved from a database and imported to a software like Excel, Tableau, or PowerBI so that these business questions can be answered using a variety of techniques (e.g., aggregation, conditional aggregation, and charting). 3. Automating Data Operations—Many business operations are repeated over and over again, such as calculating the total amount of a items bought at a local store or an e-commerce web site, applying any discounts, and determining appropriate taxes. To automate these kinds of every day transactions on data, we have a wide variety of IT we can buy or build using a variety of programming languages. 4. Protecting Data—The first three core capabilities are designed to make it easy to store and access data. However, this means that an intruder or malicious employee could also access the data. Therefore, organizations must spend resources to protect their data and ensuring the confidentiality, integrity, and availability of the data.

How do LANs differ from MANs, WANs, and BNs?

A Local Area Network (LAN) is a group of microcomputers or terminals located in the same general area. A Backbone Network (BN) is a large central network that connects most everything on a single company site. A Metropolitan Area Network (MAN) encompasses a city or county area. A Wide Area Network (WAN) spans cities, states, or national boundaries. Typically, MANs and WANs used leased facilities, while LANs and BNs are often located internally in an organization and used owned facilities.

What is a subnet and why do networks need them?

A subnet is what assigns IP addresses to networks, and specifies one LAN from another.

Decimal Notation 10.0.0.0 - 10.0.0.255 Binary subnet mask-255.255.255.000 what is my CIDR range?

CIDR Range

Which is less expensive: host-based networks or client-server networks? Explain

Client-server networks, since Host-based networks have high costs in mainframe upgrades where as client-server networks only have the costs of the software and menial costs of the server.

Why are network layers important?

Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. These layers enable simplicity in development and also in the comprehension of complex networks. In the end, the strategy of using more simplistic network layers allows vastly different kinds of equipment to be able to have connectivity over a common platform or network, using protocols and standards that are applicable to each narrow slice of the network.

How can data communications networks affect businesses?

Data communication networks facilitate more efficient use of computers and improve the day-to-day control of a business by providing faster information flow, aiding strategic competitive advantage. They also provide message transfer services to allow computer users to talk to one another via electronic mail.

What are the advantages and disadvantages of host-based networks versus client-server networks?

Host-based Pros 1. Centralized security 2. Integrated architecture from single vendor 3. Simpler 4. Centralized installation Host-based cons 1. Having all processing on host may lead to overload 2. Cost of software and upgrades 3. Expensive infrastructure 4. Terminal totally dependent on server

How is TCP different from UDP?

TCP is a connection-dependent protocol, where UDP is a connection-less protocol. TCP has the network layer creates a routing decision, and all packets flow through that connection. UDP treats all packets separately, and each packet may travel different routes to get to the destination.

What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP?

TCP is like the transport layer, IP is like the network layer. Sender uses TCP, both parties use IP 1. Its IP address 2. A subnet mask, so it can determine what addresses are part of its subnet 3. The IP address of a DNS server, so it can translate application layer addresses into IP addresses 4. The IP address of an IP gateway (commonly called a router) leading outside of its subnet, so it can route messages addressed to computers outside of its subnet (this presumes the computer is using static routing and there is only one connection from it to the outside world through which all messages must flow; if it used dynamic routing, some routing software would be needed instead)

How does TCP establish a session?

TCP uses the transport layer and sends out a SYN to the receiver. Once connected, the sender and receiver determine packet size, and the data is sent.

Describe the seven layers in the OSI network model and what they do.

The application layer is the application software used by the network user. The presentation layer formats the data for presentation to the user by accommodating different interfaces on different terminals or computers so the application program need not worry about them. The session layer is responsible for initiating, maintaining, and terminating each logical session between end users. The transport layer deals with end-to-end issues, such as procedures for entering and departing from the network, by establishing, maintaining, and terminating logical connections for the transfer of data between the original sender and the final destination of the message. The network layer takes the message generated by the application layer and if necessary, breaks it into several smaller messages. It then addresses the message(s) and determines their route through the network, and records message accounting information before passing it to the data link layer. The data link layer formats the message to indicate where it starts and ends, decides when to transmit it over the physical media, and detects and corrects any errors that occur in transmission. The physical layer is the physical connection between the sender and receiver.. and so on

What is a circuit?

The circuit is the pathway through which the messages travel. It can be made up of a copper wire, although fiber optic cable and wireless transmission are becoming more common. A circuit can also pass across many types of physical facilities such as copper wire or fiber optic cable, but the single end-to-end connection, no matter what the equipment, is referred to as the circuit. There are many devices along the circuit's path that perform special functions such as hubs, switches, routers, and gateways.

What is a client?

The client is the input or output hardware device at the other end of a communication circuit. It typically provides remote users with access to the network and the data and software on the server.

What does the network layer do

The network layer performs routing. It determines the next computer to which the message should be sent, so it can follow the best route through the network and finds the full address for that computer if needed.

Why are network layers important and describe what do they do?

The physical layer is responsible for encoding bits onto a transmission medium. The data link layer is responsible for delivery of information across a single link. The network layer is responsible for delivery of information between different machines on the internet. The transport layer is responsible for delivery of information between processes on different machines on the internet. The application layer is responsible for governing communication between client and server processes or between peer processes providing services to each other. When data is being transmitted across the internet the data is chopped up into small blocks. Each layer can add headers to these blocks. These headers are removed by the peer layer on the receive side. The headers, in effect, allow communication between the peers so that they may coordinate to achieve the objectives of their layer. Addresses are a common kind of information included in headers.

What is a server?

The server stores data or software that can be accessed by the clients, or remote users of a hardware input or output device. In client-server computing, several servers may work together over the network to support the business application

What does the transport layer do?

The transport layer deals with end-to-end issues, such as procedures for entering and departing from the network. It establishes, maintains, and terminates logical connections for the transfer of data between the original sender and the final destination of the message. It is responsible for breaking a large data transmission into smaller packets (if needed), ensuring that all the packets have been received, eliminating duplicate packets, and performing flow control to ensure that no computer is overwhelmed by the number of messages it receives. Although error control is performed by the data link layer, the transport layer can also perform error checking. Therefore, transport layer has a global responsibility.

What are the different types of application architectures?

There are many ways in which these five functions can be allocated between the client computers and the servers in a network. There are four fundamental application architectures in use today. In host-based architectures, the server (or host computer) performs virtually all of the work. In client-based architectures, the client computers perform most of the work. In client-server architectures, the work is shared between the servers and clients. In cloud-based architectures, the cloud provides services (software, platform, and/or infrastructure) to the client. Although the client-server architecture is the dominant application architecture, cloud-based architecture is becoming the runner-up because it offers rapid scalability and deployability of computer resources.

There are three computers that make the Internet work. Name them and describe their similarities and differences.

These are the client, the server, and the router. The client initiates a communication with the server by sending a request to the server. Once the server receives the request, it processes it, and responds with a response. The router makes this connection possible.

Discuss three important applications of data communications networks in business and personal use?

Three important applications of data communication networks in business and personal use include email, videoconferencing, and the Internet.

What is a router?

any computer or device which sends packets from one network to another, such as from your home network to the Internet. Most routers are small devices with Ethernet ports and wireless antennae, but any computer with two network interfaces (and the right software) can also serve as a router.

CIDR Ranges /16 /17 /18 /19 /20 ... /28 Remember to cut in half each time Always take out 5 because they are reserved for the subnet

available Ranges of IP 65,536 32,768 16,382 4,096 16

How does a thin client differ from a thick client

thin-client places little or no application logic on the client (easier to manage) fat-client approach places all or almost all of the application logic on the client


Set pelajaran terkait

Accounting 2: Chapter 5 (exam 2)

View Set

First Aid p. 232, Serum tumor markers and psammoma bodies

View Set

Ambush Marketing and Sponsorship

View Set