NETWORK DESIGN ...

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Physical

Actual bits and bytes, packets of data

What is Adaptability?

Adaptability is the ability of the system to support the users' changing needs. Adaptability is one of the primary reasons for success of the Cloud. That and cost savings.

Circuity factor

Added because equations underestimate the actual road distance

When it comes to broadcast traffic what doesnt carry useful data?

Administrative Overhead.

After the network has been installed what does the staff do?

After the network has been installed, the network staff shifts its focus to getting input from the user community and monitoring the network for problems.

Average inventory level =

Annual flow through warehouse/inventory turnover ratio

What are the Transmission Problems and Characteristic?

-Electrical Noise -Crosstalk -Attenuation -Capacitance -DC resistance -Impedance -Continuity and polarity -Cable Length

What are the 3 types of information included on a detailed list of the hardware and software necessary for the new network installation?

-New Items/equipment to be bought -Existing equipment to be reused in the new network -Existing Equipment destined for disposal

All LAN topologies can be supported by what 3 types of cable?

-Shielded twisted pair (STP) -Unshielded twisted pair (UTP) -Optical fiber

Latest evolution of Wi-Fi, particularly good for gaming and HD video streaming

802.11ac

uses MIMO to send up to eight spatial streams vs. 802.11n's max of four.

802.11ac

8b/10b maps what into what?

8b/10b maps eight data bits into a 10 bit symbol, or character

DUN

A component in Windows 95 that enables you to connect your computer to a network via a modem. If your computer is not connected to a LAN and you want to connect to the Internet, you need to configure Dial-Up Networking (DUN) to dial

Database Server

A computer System that processes database queries.

File Server

A computer and storage device dedicated solely towards saving files. Any standard user on a network can store files on a network.

Server

A computer or a device on a network that manages network resources. There are many different types of servers. Just to name a few, here are four common ones:

Computer virus

A computer program that can replicate itself and spread from one computer to another

Network server

A computer that manages network traffic.

Print Server

A computer that manages one or more printers

NIC Delay

A delay while the client NIC processes the request and transmits the data over the physical medium

What is a Deliverable?

A deliverable is what the project is trying to produce in any given phase.

Bridge

A device that connects together two separate LANS, or two different segments of the same LAN that uses the same protocol. (IE/ Token Ring)

Switch

A device that consists of many high-speed ports connecting either LAN segments or individual devices on a port-by-port basis

Router

A device that forwards data packets over a network. Typically, you'll see a router connected to AT LEAST two networks, most commonly two LANS, two WANS, or a LAN and its ISP's network. Routers will typically use headers and forwarding tables to determine where to send a specific data packet. They'll use protocols such as ICMP to configure the best and most efficient route to the correct destination.

Client-Server Architecture

A form of a network architecture in which each computer or process on the internet is either called a client or a server. Client server are widely implemented, and are also sometimes called two tier systems.

What is the sign of a good network?

A good network is scalable; it can expand as the company grows. To know how much scalability a network needs, you have to estimate how much the company plans to grow.

Header

The _________, which lists source and destination email addresses (possibly in text form [e.g., "Pat Smith"]) as well as the address itself (e.g., psmith@ somewhere.com), date, subject, and so on.

Distribution strategy

The allocation of customers to warehouses

Component Latency

The amount of time it takes a network device to analyze and retransmit a received packet

Response Time

The amount of time it takes for the server to respond to a request from a client workstation

Geographic Scope

The area the network will cover and serve

TCP/IP

Transmission Control Protocol/Internet Protocol

c

Type of media usually installed on homes and businesses by the telephone company is called ______. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire

How many users is necessary for one full-time support person?

Typically, one full-time support person is needed for every 75-100 users.

When was USB 3.0 released?

USB 3.0 was released in 2008.

How many devices can USB support on the same Bus?

USB can support 127 devices on the same Bus.

URL

Universal Resource Locator

Universal Wiring System mainly consists of what?

Universal Wiring System mainly consists of the horizontal wiring subsystem and the backbone cabling sub system.

UTP

Unshielded Twisted Pair

With a Infrastructure as a service what does the cloud service manage?

Virtualization, Servers, Storage, Networking and you share O/S between the 2

Logical Topology

Vlan boundaries, protocols used in WAN links, and providing network redundancy is designing what?

What is a WAN?

Wide Area Network, A WAN spans multiple sites that are geographically dispersed, typically using local and long distance carrier facilities.

Multimode fiber

Wide enough to carry more than one light source

Fibre Optic Advantages

Wider bandwidth Security Immunity to Electromagnetic Interference Easy to install Non Conductive Cables

DNA

Windows DNA, which is short for Windows distributed interNet Applications Architecture

False

Wireless LANs are never connected to a wire network. True or False

Wiring Closets may be directly connected to each other using what?

Wiring Closets may be directly connected to each other with backbone cable.

With PAAS, What does the cloud service manage?

With PAAS the cloud service manages Runtime, Middleware, O/S, Virtualization, Servers, Storage, and Networking.

With Platform as a service what do you manage?

With Platform as a service you just manage Applications and Data

What is work area wiring typically

Work area wiring is typically UTP or STP.

cable tv products

offer similar products to enterprises as do other fixed network operators these are mainly man services such as private circuits lan extension atm frame relay wan services

what private circuit incure

one off connection charge related to the speed and monthly rental charge related to both the speed and the distance between A and B ends

WAN

only connects different campus locations

Internet Authentication Service (IAS)

operating systems that provide authentication (for ex. RADIUS, RRAS)

BGP

Border Gateway Protocol, its a form of a EGP that enables groups of routers, (also known as autonomous systems) to share routing information so that efficient, loop-free routes can be established. BGPs are often used between and within ISPs. This protocol is defined in RFC 1771.

What is Disk Caching?

Disk Caching works under the same principle as memory caching, but instead of using high-speed SRAM, a disk cache uses conventional main memory (harddrive).

Full-Duplex

Both directions simultaneously

What is a Major Constraint for both Implementation and Ongoing Maintenance?

Cost, for both Implementation and Ongoing Maintenance, is a Major Constraint in the design of a network.

Truckload, TL

Country sub-divided into zones. Cost structure depends on distance, weight, and volume

Cost Assessment Step 1

Create Request For Proposal

c

Enable multiple connections to exist simultaneously between computers over the same physical circuit, just like LANs and BNs. a. Circuit-switched b. dedicated-circuit c. Packet-switched

What are typical speeds for the LAN, building backbone, and campus backbone and why?

LAN - 1 Gbps Building backbone - 10 Gbps Campus backbone - 40 Gbps In most cases, because network traffic is consolidated onto the broader networks, the building backbone is one speed level above the LAN and the campus backbone speed is one speed level about the building backbone.

Seven Network Architecture Components

LAN, Building Backbone Networks, Campus Backbones, WAN, Internet Access, E-commerce edge, Data centers

First Network Architecture Component

LAN- Local Area Network, enables users to access network, also called the access layer

For what types of networks are network design tools most important? Why?

Large, complex networks require the use of network design tools. The many devices on such systems and the variety of services requested by users requires that network managers organize and manage the process using system management software.

Clapping

Layer of clear glass or plastic with a lower index of refraction

Application Layer

Layer provides an interface between software running on a computer and the network itself

What are the 2 subcategories of Radio-based LANs?

Licensed and Non-Licensed

Transportation rate types

Linear, exponential, fixed

Who was among the 1st to realize the importance of structured wiring systems?

Major vendors were among the 1st to realize the importance of structured wiring systems

What are some tradeoffs?

Minimize Operational Costs, Minimize Installation Costs, Minimize downtime, Maximize performance, Maximize adaptability, Maximize Security and Maximize reliability

Design goals may want to include or achieve what?

Minimize operational costs, Increase overall performance, simplify user-level operation, Increase security and Add adaptability and flexibility.

Reevaluation of infrastructure

Necessary due to changes in: • Demand patterns • Product mix • Production processes • Sourcing strategies • Cost of running facilities

Describe the three major steps in current network design

Needs analysis, technology design and cost assessment.

Design Process

Needs, physical & logical topology, network services, hardware/software setup, and the 3As are part of?

Hub

Operates at layer 1

Nic

Operates at layer 1

Switch

Operates at layer 2 and 3

Traffic Directions

Peer to Peer, Client to Server, Server to Client and Web cloud based are all examples of what?

POP

Post Office Protocol. A protocol used to retrieve e-mail from a mail server. Most email applications use POP, although some use the newer IMAP.

The tool for tracking power levels is what?

Power Budget

The factors that cause optical power loss are

Predictable

PRI

Primary Rate ISDN services that consist of 23 B channels (In the US) or 30 B channels (in Europe) and one D channel

Before you begin to evaluate Physical layer options what must u review?

Prioritized Recommendations List (Requirements Gathering), and Recommended Design Objectives (Analysis of Network).

Proprietary

Privately owned or controlled, basically the opposite of open. It also implies that companies aren't allowed to duplicate the products. Increasingly nowadays proprietary is seen as a major disadvantage, since consumers like to mix and match different products.

What are the 2 types of cross-connect devices?

Punch-down blocks Patch panels

Requirements gathering must consider what needs of the organization?

Requirements gathering must consider the current and the future needs of the organization.

Needs Analysis Step 2

Review the existing and expected applications that will use the network

What is Risk Analysis?

Risk analysis is the process of identifying the financial worth of network systems and data.

Goal of Building block process

Simplicity of design sometimes called narrow and deep because a very narrow range of technologies and devices is used over and over again very deeply throughout the organization, results are a simpler design process and a more easily managed network built with a smaller range of components

Fibre Optic (Most Used Modes)

Single Mode (longer distances) & Multi Mode (shorter distances)

Planning authentication and authorization systems

Sixth step in the design process

What does SCSI stand for and when was it released?

Small Computer System Interface (SCSI - 1986) SCSI is used as a hard disk controller.

MD5

So in 1991, a swaggilicious professor named Ronald Rivest created an algorithm that is used to create digital signatures. It's intended for devices with 32 bits, and is relatively safe. It uses Hash.

What are the cloud services delivery models

Software as a Service, Platform as a service, Infrastructure as a service

What deliverables should the Analysis Phase produce?

The Analysis Phase should produce - Logical diagrams of the current topology - Estimated traffic volumes & patterns - Detailed statistics, baseline measurements - A report of the Quality Of Service (QOS) from the ISP - a list of Design Constraints

Baseband

The OG band of frequencies before it is modulated for transmission at a higher frequency.

What does the Physical Design Show?

The Physical Design shows how to make the logical design work in the real world.

A Life Cycle is:

The Process of creating a new system or changing an existing system.

What is one of the first deliverables provided to the client?

The Requirement Specification Document is one of the first deliverables provided to the client.

What is Connection-oriented protocols?

Take longer to establish each point to point connection.

What are the 2 classes of routing protocols?

The 2 classes of routing protocol are Distance- vector routing Protocols (rip) and Link state routing protocols (ospf).

3B/4B is what?

The 3 most significant bits, are encoded into a four-bit group

5B/6B is what?

The 5 least significant bits are encoded into a 6-bit group then the 2 groups are concatenated, or joined together, and placed on the line

5-4-3-2-1

The 5-4-3 rule is sometimes called what?

True

The Simple Mail Transfer Protocol (SMTP) is the most commonly used email standard simply because it is the email standard used on the Internet True/False

CISCO PDIOO is a variation of what Life Cycle:

The Spiral Cycle

Which Life Cycle can adapt quickly to new requirements?

The Spiral Cycle

Spiral Cycle or Whirlpool Cycle is a variation of:

The Waterfall Cycle

Body

The ______, which is the word DATA, followed by the message itself.

TCP

Transmission Control Protocol

Traditional Network Design Process

Analyis, Design, Implementation

Exterior Gateway Protocol (EGP)

a routing protocol no longer in use

proxy server

a server that is in the middle of two other servers so your server has protection from hackers

static

address will not change

Waterfall Cycle Advantages are:

- All Planning is done in the early stages - Completion date can be determined at an early stage - Coordination is simplified

Backup Software/Systems Automatic backup software makes it simple and painless to perform regular full, incremental, and differential backups of all servers. Some examples are:

- Archserver - Acronis Backup and Restore - Symantec Backup Exec - Carbonite

Recoverability The information stored on servers or key individual's hard drive is the lifeblood of the company. At minimum, a recovery plan should include:

- Backup procedures that copies required files on a regular basis - Secure on-site storage that can protect backup media - Secure off-site storage - Cloud storage

What are some of the immediate payoffs for Requirements Gathering?

- Better View of the Current Network - Objective Decision-making - Ability to plan for network migration - Ability to deliver appropriate resources to all users

What are the factors that cause the estimate to go beyond the immediate cash cost?

- Business exposure to fraud - Loss of competitive advantage - Loss of customer confidence - Direct impact to financial records data - Potential impact to stockholders or officers

Utilization What % of the available resource is being used? What two Utilization metrics are most often discussed?

- CPU utilization - Link utilization - There are many more measures of utilization that are important in Network Design

What is the CIA Triad?

- Confidentiality - Integrity - Availability

Which three attributes can define a secure network?

- Confidentiality - Integrity - Availability

In the Secure Data Life Cycle, Data is created and classified in which step(s):

- Create

Secure Data Life Cycle Steps are:

- Create - Store - Use - Share - Archive - Destroy

To get to the final goal, what kind of support products will be created?

- Design Documents - Estimates - Reports

What policies and procedures should a Change Management process focused on the cloud include?

- Development and acquisition of new infrastructure and software - Quality evaluation of new software and compliance with established security baselines - Changing systems, including testing and deployment - Preventing the unauthorized installation of software and hardware.

What are some examples of midrange applications?

- Engineering - Office Automation - Interactive telecommunications services (Meridian mail) - Information systems

What should a Requirements Specification usually include?

- Executive Overview - Overview of the Requirements Gathering Phase - Summary of Requirements Data - Prioritized Requirements List - Approval Section

Development Process Avoids:

- Failure to meet requirements - Creeping Requirements - Missed Deadlines - Budget Overruns - Dissatisfied end users - Dissatisfied management

What types of Physical Topologies are there?

- Fully Connected Network Topology - Mesh Network Topology - Star Network Topology - Common Bus Topology - Ring Network Topology

What are the two characteristics we discuss applications in?

- Functional Type - Stand-alone versus Shared

What are the unique and inherent capabilites of mainframes?

- High availability - Rigorous backup and recovery - Economies of scale - High bandwidth I/O facilities - Large-scale storage and distribution management - Centralized administration A special component is -Direct Access Storage Device (DASD) Physical storage (harddrives)

What types of applications are consistently popular with the mainframe community?

- IMPORTANT Online Transaction Processing (OLTP) - Finance and payroll - Order processing - Applications requiring worldwide enterprise networking - Central banking operations - Number processing

The interest/growth/acceptance in universal wiring is supported by what three technological trends?

-Convergence on three cable types: STP, UTP & Fiber -Use of a distributed star physical topology -Emergence of industry-wide standards

What are the three main parts of a SNMP network management system?

- Individual network elements (devices or resources) that are managed by an agent - Network Management Station (NMS) - SNMP (protocol) used to exchange management information between the NMS and agent

Where must you gather detailed business requirements for projects from?

- Key Players - Major Milestones - Funding Levels - Type of business activity - Estimated growth - Reliability and availability - Security - Web site and Internet Connectivity - Remote Access

Availability Availability is a big deal in modern networks. The degree/level of availability provided is affected the choice of the following:

- LAN Topology - Server Hardware - Mass Storage - Uninterruptible Power Supply (UPS) - Network operating system (NOS) - Vendors

What Security Concerns are there with Cloud Services/Technology?

- Location Based - Where's my data? - Regulations - Government, industry, PII - Multi-Tenancy - Shared/Pooled resources

If a network goes down, what situations could arise?

- Loss of productivity - Loss of revenue - Complete collapse of the business - The direct expense of support/repair (This is not a factor with the Cloud)

What can Mainframes do?

- Manage huge organization-wide networks - store massive amounts of crucial data - ensure data integrity - drive data across an organization

What do PC's/Workstations Contain?

- Microprocessor - Memory - I/O - Operating Systems - Networking options

What are the 3 main categories of networking software?

- NOS - Network Operating System - Backup - Management

What Cost Categories should be considered when planning for Costs of a project?

- Network Design - Implementation - Ongoing Maintenance - Support

What are the Primary NOS's found in networks?

- Novell's NetWare (very little now) - Microsoft's NT/2000/2003/2008/2012/??? - OS X - UNIX/Linux - FreeBSD

In addition to the physical location of applications, a network designer must also understand how people use those applications. Consider the following factors:

- Number of users per application - How often, on average, each user uses each application - Times (of day, week, month, or year) when an application will most likely be accessed - Average length of each session - Average size of each transaction - Activities that influence the directional characteristics of traffic

When gathering information about an organization's applications, what are the factors you should consider?

- Performance and Capacity - Application types - Application usage - Growth - Reliability and availability needs - Network response needs - Real-Time and Non-Real-Time applications

Spiral Cycle Steps are:

- Plan - Design - Build - Maintain

CISCO PDIOO stands for:

- Plan - Design - Implement - Operate - Optimize - Retire

The Life Cycle of a typical Network Design Project consists of what phases?

- Requirements Gathering - Analysis of the Existing Network - Logical Design - Physical Design - Installation and Maintenance

Waterfall Cycle Deliverables are:

- Requirements Specifications - Traffic Specifications - Logical Design - Physical Design - Implementation Phase

How does the Requirements Gathering Phase complement the Analysis Phase?

- Requirements show you where you need to be - Analysis tells you where you currently are

What are the objectives of Change Management in the Cloud?

- Respond to a customer's changing business - Respond to business and IT requests for change - Ensure that changes are recorded and documented in a Configuration Management System (CMS) - Ensure that authorized changes are done in a controlled manner - Optimize overall business risk

Knowing the strategic nature of a business will help you determine what General Network Requirements?

- Security - Redundancy - Reliability - Availability

Formal Design Process makes the designer's work:

- Simpler - Productive - Satisfying - Understandable

What categories can Software be listed under in terms of the number of users it supports on a LAN?

- Single-User - Multi-User - Network Software Cloud Services have completely changed the focus and license types and requirements. Designers now have cloud-based applications types and a variety of API's to consider.

In the Secure Data Life Cycle, Custodianship takes place in which step(s):

- Store - Archive - Destroy

In the Secure Data Life Cycle, Policies and governance affect data in which step(s):

- Store - Use - Share - Archive

When documenting your requirements for a network management system, what are the two major factors to consider?

- Tasks (type of job you want it to do) - Modes of operations (degree of control over maintained over the system)

In Requirements Gathering, what do you need to gather requirements for?

- The Business or Organization as a whole - Users - Applications - Computing Platforms - The Network itself

What are the four categories for computing platforms?

- Thin Clients - PC's/Workstations - Midrange - Mainframe

What factors do User-Level requirements include?

- Timely delivery of Information - Predictable response times - Reliability and availability - Adaptability - Scalability - Security - Affordable

A good Installation should produce:

- Updated diagrams (Physical and Logical) that include all changes - Cabling, connections, and devices are Clearly Labeled - Any notes or documents that can simplify maintenance or troubleshooting

Good requirements Gathering techniques will:

- help individuals do their work - improve the overall productivity of the organization - provide a competitive edge in the marketpalce

Wireless LANs can interface with the rest of a LAN system in what ways?

-At the physical layer using existing Data Link protocols -At the Data Link Layer using proprietary protocols

Structured wiring systems such as EIA/TIA-568 refer to premises wiring in terms of what 6 modular subsystems?

-Building Entrance -Equipment Room -Vertical backbone -Wiring Closet -Horizontal Wiring -Work area

What parameters must be maintained to preserve accurate data communication?

-Voltage backup must be avoided -Timing circuits must be kept synchronized with the bit stream -The signal must be strong and clear enough for the receiving devices to interpret it accurately

1KB= 1024Bytes (Approximately 1000 Bytes) 1MB= 1024KB (Approximately 1 million Bytes) 10MB = (approximately 10 million Bytes) 1GB= 1024MB (approximately 1 billion Bytes)

...

Bit Length = Propagation speed x Bit Time

...

Graded-index fiber cable has several transparent layers, each with a different refractive index.

...

Data for network design

1. A listing of all products 2. Location of customers, stocking points and sources 3. Demand for each product by customer location 4. Transportation rates 5. Warehousing costs 6. Shipment sizes by product 7. Order patterns by frequency, size, season, content 8. Order processing costs 9. Customer service goals

Three hierarchical steps of network planning

1. Network design 2. Inventory positioning 3. Resource allocation

PDH in north America vs in europ

1.5Mbit/s vs 2Mbot/s

When it comes to Line Speeds and Frequency what immediate step does 100Base-TX use?

100Base-TX uses a Multi-Level Transition that reduces the carrier frequency to only 31.25 MHz

AUI Connector

15 pin connector between network's interface and ethernet

17.7 meters is the size of what? on a what?

17.7 meters for the size of a single bit on a 10BaseT network

Space required for item =

2 * Average inventory level

4B/5B provides what

4B/5B provides some level of error detection

4b/5b refers to what?

4b/5b refers to the fact that every nibble of 4 Bits of data is encoded into 5 Bits of signal

What typically provides a convenient termination point for cables, and allows the interconnection of devices in a clean and systematic way?

A Cross-connect device typically provides a convenient termination point for cables, and allows the interconnection of devices in a clean and systematic way.

DRDA

A Distributed Relational Database Architecture

b

A Gateway operates at the a. Data link layer b. Network layer

What does the Logical Design Diagram Identify?

A Logical Design Diagram Identifies - Services - Equipment - Network Architecture - Address Structure

What does the Logical Design Document include?

A Logical Design Document includes - Logical network diagrams - Address strategy - Security schemes - Specifications of hardware, software, WAN links, and general services - The Initial Cost Estimates

What does the Physical Design Document include?

A Physical Design Document includes To-scale wiring plans among other things.

What is a Real-Time Application?

A Real-Time application/software/system processes information as it is received, typically without user intervention.

What is an RFC

A Request for Comments is a type of publication from the IETF and the ISOC, the standards-setting bodies for the internet.

b

A Router operates at the a. Data link layer b. Network layer

Protocol

A Set of rules and conventions that govern a particular aspect of how devices on a network communicate

What is a User Services Matrix?

A User Services Matrix is an example of one method of gathering and documenting user requirements. A matrix provides a guideline for discussions with management and users of the network. It is used to Record your Findings in an Organized Manner.

c

A ____________ connects all networks within a company, regardless of whether it crosses state, national, or international boundaries? (a) LAN (b) MAN (c) Enterprise network (d) Campus network (e) Core network

d

A _____________ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. (a) Ring design (b) Mesh design (c) Bus design (d) Star design (e) None of the above

40% rule

A arbitrary threshold value. When component latency reaches or is consistently at or above a certain percent. It is time for an upgrade

What is a bottleneck and why do network managers care about them?

A bottleneck is a place where performance of an entire system is limited by capacity at some point in a network. Bottlenecks can exist on physical circuits or networking devices. Managers care about them because these are points that can be fixed or upgraded and after doing so, the network performance becomes improved

What is the difference between a building backbone and a campus backbone, and what are the implications for the design of each?

A building backbone distributes network traffic to and from the LANs. The building backbone typically uses the same basic technology that we use in the LAN (a network switch) but usually we buy faster switches because the building backbone carries more network traffic than a LAN. A campus backbone connects all the buildings on one campus. Some vendors call this the Core Layer. The campus backbone is usually faster than the backbones we use inside buildings because it typically carries more traffic than they do. We use routers or layer 3 switches that do routing when we design the campus. The cost of each can be significant as they each consist of high-speed fiber optic cable and hardware such as switches and routers. In designing each one though, we can provide an infrastructure that provides for efficient movement of data across the entire network.

What is a Bus?

A bus is a collection of wires through which data is transmitted from one part of a computer to another.

Passive Hub

A central connecting device in a network that joins wires from several stations in a star configuration. It does not provide any processing or regeneration of signals

Active Hub

A central connecting device in a network that regenerates signals on the output side to keep the signal strong. Also called a "multiport repeater"

4b/5b is what?

A line coding technique used in 100Base-TX, 100Base-FX and Fiber Distributed Data Interface (FDDI) Lans

Simulation

A mathematical technique used to model the behavior of a network under real conditions

Protocol

A means of communications that networked computers use as a language

Gateway

A medium used as a translator for different networks to communicate

What is a memory cache/cache store/RAM cache?

A memory cache, sometimes referred to as a cache store or RAM cache, is a portion of memory set aside to store frequently used instructions.

Cyclical Redundancy Check

A message is treated as one long binary number, P. Before transmission, the data ling layer (or hardware device) divides P by a fixed binary number, G, resulting in a whole number, Q, and a remainder, R/G. So, P/G = Q + R/G. R is added to the message and the receiving hardware calculates its own R value. If the values do not agree the message is assumed to have an error. This method has a 100% probability of detecting errors for all errors of the same length as the ________or less. If __________-16 and the burst error is longer than 16 there is a 99.998% chance while if ___________-32 there is a 99.9999999998% chance.

Modular Computer

A multi processing computer system where processing, memory, and peripheral units can be added or removed without screwing up the whole system.

Gateway

A node on a network that serves as an entrance to another network. In enterprises, a gateway is the computer that routes information from a workstation to the outside network that is serving the Web Pages. It also acts as a proxy server and firewall. In homes, the gateway is the Internet Service Provider that allows the home to connect to the internet.

A router segments a network with the goal of what?

A router segments a network with the goal of -limiting broadcast traffic, providing security, control, and redundancy between individual broadcast domains.

Proxy Server

A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the main server to first see if it can fulfill the requests on its own. If it cannot perform the functions, it will forward the request to the main server so that the main server can fulfill the duties. Proxy servers have two main purposes: to improve performance and to filter requests. The reason why it's useful to have Proxy Servers to filter requests it could be used for regulation on where you can go on a network. For instance, a company can use a proxy server to help prevent employees from accessing a certain set of web pages. Another useful characteristic of a Proxy Server is that it can greatly increase performance in a network by saving the results of all requests for a certain amount of time. So say that John and Mary are both connected to a proxy server which they use to access the WWW. So say that John wants to search something up on the proxy server. The proxy server will then save the request that John made. So if Mary searches up the same thing as John in a certain time period, instead of forwarding the request to the main server as it would've have previously done, it will send Mary the results that if sent John, which it already held in its memory. A lot of major companies like Yahoo will have a whole bunch of proxy server arrays just for the sole purpose of saving time.

Three-tier architecture

A special type of client/server architecture that consists of three processes. The client, the database server, and the application server. The client is the user interface, the application server is responsible for processing data, and the database management system stores the data acquired by the application server. There are two main advantages to a three-tier system, one being that the extra tier allows any of the tiers to be modify or replace without affecting the rest of the tiers. The second advantage to this is that separating the application function from the server makes it easier to implement load balancing.

Centralized Network

A specific sort of network in which all users of the network connect to a central server. The server then in turns performs all communication actions between all of the users of the network. The server would store both the communications and the user account information. For example, say that our good friend Bufanaquishria wants to message our other good friend Mo'Nique on the instant messaging service KIK. KIK messaging would then in turn be using a sort of centralized network to allow these two to speak to each other.

Computer worm

A standalone malware computer program that replicates itself in order to spread to other computers

A structured wiring approach can solve problems by providing what?

A structured wiring approach can solve problems by providing guidelines for a universal wiring system that can be adapted to almost any network requirements.

A structured wiring system is more efficient to install when what?

A structured wiring system is more efficient to install when a building is constructed or remodeled

What are the 3 reasons why a switch is a better choice than a router when providing raw bandwidth?

A switch is a better choice than a router when providing raw bandwidth because a switch is CHEAPER, FASTER and SIMPLER than a router.

a

A switch operates at the a. Data link layer b. Network layer

A switch segments a network with the goal of providing what?

A switch segments a network with the goal of providing additional bandwidth.

Fiber Optics

A technology that essentially transmits data glass or plastic fibers to transmit data. Each independent fiber is capable of transmitting messages modulated into light waves. There's a lot of enticing advantages to Fiber Optics: Fiber optic cables have a much greater bandwidth than metal cables, which means that they can carry more data. Fiber optic cables are less susceptible than metal cables to interference. Fiber optic cables are much thinner and lighter than metal wires.

What is a thin client?

A thing client is a lightweight computer that is purpose-built for remoting in a server. Does not contain an OS or a Hard Drive or serial access ports Thin clients were and are still the only way to connect to Mainframe systems.

What are the keys to designing a successful data communications network?

A thorough needs analysis, developing one or more physical network designs, designing to operate and maintain with minimal staff intervention.

USENET

A worldwide bulletin board system that can be accessed through the Internet or through many online services. USENET contains over 14000 forums, which are called newsgroups, that cover ever imaginable interest group. Say Mary Beth wants to check out a forum on folding paper airplanes. USENET will undoubtedly have a specific forum just for that.

Waterfall Cycle 5 Steps are:

ADBTD - Analyze - Design - Build - Test - Deploy

What is a unit for expression of power level in decibels, with reference to a power of 1 milliwatt?

Absolute Power

What does Absolute Power mean

Absolute Power is a unit for expression of power level in decibels, with reference to a power of 1 milliwatt.

Domain Controller

According to the Alpha Male Microsoft, in Active Directory server roles, ( BT dubs, in Active Directory terms, there are only two categories, member servers and domain controllers) it's a server that is responsibruh for allowing host access to Windows domain resources. Stores user account information, authenticates users and enforces security policy for a Windows domain.

member server

According to the Big Boy that is Microsoft, in Active Directory server roles, (Active Directory is a directory service that's part of Windows 2000) a member server is a computer that runs an operating system in the Windows 2000 or 2003 server family that is in a domain and is not a domain controller. They usually function as: file servers, application servers, database servers, Web servers, certificate servers, firewalls and remote-access servers.

Destination group (product aggregation)

All SKU's distributed to the same place(s)

Source group (product aggregation)

All SKU's sourced from the same place(s)

application server

Also known as appserver

Some examples of a Infrastructure as a service

Amazon Web Services, FlexiScale

ANSI

American National Standards Institute. It was founded in 1918 and is a volunteer organization that now employs around 1300 people. Its main job is to create computer standards for the computer industry. It sets standards for a wide range of things, including computer programming languages, electrical specifications to communications protocol. For example, FDDI is a ANSI standard.

ASCII

American Standard Code for Information Interchange

Circuit Loading

Amount of data transmitted on a circuit

What is an Application Information Matrix?

An Application Information Matrix is a method of documenting and summarizing application requirements in an organized fashion.

Closed Architecture

An architecture whose specifications are closed to the public, which basically means that it's source code is not available to the public and can't be altered or have new products added to it. You don't have the flexibility that an Open Architecture would have, for instance, you can't connect systems together.

Open Architecture

An architecture whose specifications are public. This includes standards along with privately designed architectures whose specifications are made public by the designers. A big advantage of Open Architecture is that anyone can add new products for it. But a con of this is that a manufacturer is basically allowing others to copy or duplicate the product. Linux, for example, a prominent operating system used by many, is considered open, because it makes its source code available to the public for free.

public key encryption

An encryption protocol that essentially uses "keys" in order to encrypt a message. It consists of two keys, a public key and a private key. For example: take two folks, Ishaniqua and Danieliquan. Say that ishaniqua wants to send a private message to Danieliquan. What Ishaniqua will do is she'll use a public key to encrypt the message that she wants to send to Ishaniquan, and Danieliquan will use the private key in order to decrypt the message that Shaniqua sent to Danieliquan.

False

Analog data is comprised of 0's and 1's

OSI Model

Application Presentation Session Transport Network Data Link Physical

TCP/IP Model

Application Transport Internet Network Access

HTTP

Application Layer Defines how web browsers can pull the contents of a web page from a web server

With a Infrastructure as a service what do you manage?

Applications, Data, Runtime, Middleware and u share O/S between the 2

Hardware and software

Arranging access to support resources, planing future growth, planning for data protection, and confirming system requirements are parts of design?

Where does network design usually begin?

At the access layer, the needs of the users drive the network design

Data Link

At this layer, data is encoded and decoded into bits. It incorporates transmission protocol knowledge and management and handles errors in the physical layer, flow control, and frame synchronization. This layer is divided up into 2 different layers, LLC (Logical Link Control) and and MAC (Media Access Control). The MAC sublayer controls how the computer on the network gains access to the data and transmits it. The LLC controls frame synchronization, flow control, and error checking. Examples include: PPP, ATM

What is Attenuation?

Attenuation is the loss in signal amplitude or strength, that occurs as a signal passes through a transmission medium

What is Availability?

Availability is the amount of time the network is available to users. Expressed as % up-time per year, month, week, day, or hour.

What is backbone cabling usually referred to as?

Backbone Cabling is usually referred to as vertical cabling

BRI

Basic Rate ISDN services consists of two 64 kbps B-channels and one D channel for transmitting control info.

Autonomous Systems

Basically a group of routers.

Repeater

Basically a network device used to regenerate or replicate a specific signal. Repeaters are often used in transmission systems to regenerate analog or digital systems distorted by transmission loss.

Digital Certificate

Basically an attachment to an electronic message used for security purposes. Uses public key encryption to do this.

Tunneling

Basically it allows one network to send the data that it wants to send across another network. Tunneling works by sending a network protocol within separate packets carried by the second network. For example, say King'Kong'Quisha wants to sell crack to her friend Sha'Quonda over the internet, but she doesn't want anyone to see what is going on. King'Kong'Quisha could use PPTP, which is a tunneling protocol created by Microsoft to send the payment information to Sha'Quonda without the pooolice ever finding out. King'Kong'Quisha could use the Internet to send the info via a VPN.

B-ISDN

Basically like ISDN, except it uses broadband transmission. Additionally, it does this over fiber optic cables. Broadband ISDN can support 1.5 milliion BPS. Sadly, this particular ISDN is not widely implemented.

Modular Architecture

Basically the design of any system that consists of separate components that can be put together. The sexy part of this sort of architecture is, say for instance Tyrone is really dumb, and he takes out a component of the system. While, Tyrone is in luck, because since the architecture is modular, he can take out a single part without affecting the whole system.

newsgroup

Basically the same thing as a forum. It's an online discussion group. On the internet, there are literally thousands of newsgroups covering everything imaginable to the human brain. However, to read and post things on newsgroups, you have to first install a newsreader, a program that runs on your computer and connects you to a news server on the Internet.

Why is it important to analyze needs in terms of both application and users?

Because you want to make sure that the network can support the bandwidth and other operational characteristics required by the user applications.

What is an Executive Overview and what should it Include?

Begin any network design document with a brief introduction to remind a busy manager of the highlights of the project. An executive overview should include: - A short description of the project - A list of phases of that design process - The project status

A sequence of bits together is called what?

Bit Stream

What is bit time?

Bit time transmits bit patterns over copper cable, a device such as a NIC varies the voltage level on the line in a precise pattern, or code, to represent binary 1s or 0s.

4b/5b is sometimes referred to as what?

Block Coding

Needs Analysis Step 1

Break down the network into architectural components, Geo Scope

Brouter

Bridge Router, basically its a device that functions as a bridge or a router.

What are 3 characteristics that evaluate technology options?

Broadcast Traffic (background traffic), Connection Type (protocols based), and Scalability.

Second Network Architecture Component

Building Backbone Network some call it the distribution layer, it distributes network traffic to and from the LANs

BBS

Bulletin Board System

Examples of Network Topologies

Bus, Star, Token Ring, Mesh, Tree, Ring

To change permissions of files in Linux via the command line use...

Chmod

Bottleneck

Circuit filled almost to capacity (WAN & The Internet)

What is another name for IEEE 802.3?

CSMA/CD LAN

CSMA/CD Process

CSMA/CD forces computers to "listen" to the Ethernet before sending in order to make sure that no other host on the wire is sending. When the Ethernet segment is not busy, the device that wants to send data can do so. The sender will then continue to listen, to make sure that sending the data didn't cause a collision. If a collision is heard, both of the senders will send a jam signal over the Ethernet. This jam signal indicates to all other devices on the Ethernet segment that there has been a collision, and they should not send data onto the wire. (A second indication of a collision is the noise created by the collision itself.) After sending the jam signal, each of the senders will wait a random amount of time before beginning the entire process over. The random time helps to ensure that the two devices don't transmit simultaneo

Third Network Architecture Component

Campus Backbone sometimes called the core layer, connects all buildings on one campus

CSMA/CD

Carrier Sense Multiple Access with Collision Detection

Needs Analysis Step 4

Categorize network requirements

CHAP

Challenge Handshake Authentication Protocol. So say Qua'Lifriaqui'Sha'Niquia wants to keep to access something that uses CHAP to authenticate something to ensure that Qua'Lifriaqui'Sha'Niquia's friend Watermelondrea cannot access that particular thing. So the authentication agent will send Qua'Lifriaqui'Sha'Niquia a random value that will only be used once and an ID value. IN addition, the authentication agent will also share an additional "secret". Then, the authentication program will join together the random value, the ID value, and the random secret together into a one-way hash using MD5. That particular value is then sent to the authentication agent, who then calculates the value, and compares the result received from Qua'Lifriaqui'Sha'Niquia. If the values match, then Qua'Lifriaqui'Sha'Niquia is authenticated.

What is the guiding principle for the Spiral Cycle?

Change Management

Cloud Services Delivery Models

Cloud Providers, Cloud Service Providers, Cloud Service Broker, and Cloud Consumer

What are some of the Cloud Service Benefits?

Cloud Service Benefits are Off site Data Storage, No IT maintenance costs, Disaster Assistance, Productivity anywhere, easily upgradeable, lower cost of ownership and its always up.

Mainframe VS Cloud Computing When its comes to mainframe, the server is always a single, monolithic host that resides in a centralized location. They are privately owned and controlled granting access to specific customers.

Cloud computing on the other hand, may be scattered across many individual servers, across many different countries in a multi-tenant environment. Cloud computing also offers scalability and remote access from anywhere without Terminal Access Software Mainframes require.

What is the most important principle in designing networks?

Completing a thorough needs analysis that takes into consideration the needs of the organization over the short and long-term. From this analysis then a logical network design can be developed to ensure that the network can satisfy all needs over time.

What is CISC?

Complex Instruction Set Computer (CISC) Intel Processors.

CAD

Computer Aided Design, a combination of hardware and software that enables folks to design a whole lotta Sh%T, ranging from furniture to airplanes. So say that V'Lanta'la'mana'ma'nisha is a designer, and she just designed an airplane, well, CADs make it so that V'Lanta'la'mana'ma'nisha can view all angles and all intricate details of her design, with just a click of a button.

Work Group Network (Peer-to-Peer)

Computers in the same work group share printers, files, internet connection etc.

What are 3 primary categories or considerations when it comes to Network Management?

Configuration/Reconfiguration, Monitoring, and Troubleshooting.

Work area subsystem consists of the cable and other devices doing what ?

Connecting the user station to wall plate

Bridge

Connects a LAN to another LAN with the same protocol

Step-Index Fiber consists of only what 2 transparent layers?

Core and Cladding

Core intelligent switches provide what services that are required to support a large switched environment?

Core intelligent services provide high bandwidth, High Port Density and Bandwidth Management.

DC Resistance is measured in what?

DC Resistance is measured in OHMS and increases with cable length.

What is DC Resistance?

DC Resistance is the property of a conductor that opposes the flow of electrical current.

Fourth Network Architecture Component

Data Center, contains the organization's servers e.g. database servers, email servers. It is essentially a LAN but because so much traffic goes to and from it is typically designed and managed very differently than the LANs intended for user access

Digital Shredding is whose job?

Data Custodian

DSU

Data Service Unit, it is a The dSU is a device that performs protective and diagnostic functions for a telecommunications line.

DTE

Data Terminal Equipment, it's used exchange data with a modem

DTR

Data Transfer Rate, The speed with which data can be transmitted from one device to another

Half Duplex

Data can only travel in one direction at a time

Full Duplex

Data can travel in both directions on a cable

e

Data is physically transmitted from one computer or terminal to another in the ______ layer. a. physical b. transport c. application d. terminal e. data link

DBMS

Database Management System a collection of programs that allow you to store, modify, and extract information from a database.

What do Decision Makers do?

Decision makers will approve the overall network design, or establish funding levels.

DPC

Deep Packet Capture is the process of capturing all of the data packets passing through and from a data medium. It basically captures all of the packets that aren't typically found in standard packet monitoring or filtering systems.

How often do you produce a Deliverable?

Deliverables are ongoing throughout the span of the project.

Size of footprint

Depend on the height of the satellite footprint

CPU Utilization

Describes how busy a processor is as it processes requests and responses to and from a network

Technology Design Step 2

Designing circuits, estimate circuit traffic & network volume

Technology Design Step 1

Designing clients and servers, specify devices

Network Services

Designing the use of DHCP, DNS, Directory, and file servers are part of what design?

The physical design diagram is __________ that serves as the construction blueprint of your network.

Detailed Scale Drawing

DSR

Detailed Seller Ratings, used for EBAY, completely useless

802.11ac

Developed in 2011-2013. Customer Implemented in 2014.

DAT

Digital Audio Tape, a special type of magnetic tape that uses a scheme called a helical scan to record data. Like other tapes, DAT is a sequential access media.

DVM

Digital Volt meter

True

Digital transmission is more efficient. It is possible to send more data through a given circuit using digital rather than analog Transmission. True/False

True

Digital transmission is more secure because it is easier to encrypt. True/False

False

Digital transmission produces more errors than analog transmission

DAS

Direct Attached Storage, storage that isn't connected to the main system. The most common example of this would be a detachable hard drive

DMA

Direct Memory Access, basically a technique to transfer memory straight from the main memory to a device without going through a CPU.

DSM

Direct Sequence Modulation: Basically a transmission protocol used in LANs

What transmits a single wideband signal in a coded bit pattern which the receiver recognizes and extract from the background noise?

Direct sequence

DCE

Distributed Computing Environment, a suite of technology services developed by the Open Group for creating distributed applications that run on different platforms. DCE is a popular choice for very large systems that require robust security and fault tolerance

DCF

Distributed Coordination Function. The fundamental MAC technique of the IEEE 802:11 based WAN standards.

DTD

Document Type Definition. A DTD states what tags and attributes are used to describe what tags and attributes are used to describe content in an SGML, XML, HTML where each tag is located and which tags can appear within other tags.

DDN

Dotted Decimal Notation

802.11ac

Dubbed 5G Wi-Fi, promises ridiculously fast wireless connections,Better range, Improved reliability, improved power consumption.

What is the new name for EIA/TIA-568?

EIA/TIA SP-2840

What does EIA/TIA-568 standard recommend?

EIA/TIA-568 standard recommends typical maximum cabling distances according to the equipment subsystem and type of system.

Mode

Each light signal, or light ray that passes through a cable

Why must you complete a Phase in a Network Design Project?

Each phase includes certain jobs that must be completed to prepare the project to move to the next phase

Serial Connection (advantages)

Easier to implement Greater efficiency Ex. Usb printers, external hardives

What must edge switches offer?

Edge switches must offer control over quality of service and simple connectivity that is economical and flexible enough to support any to any traffic and handle future growth.

FootFootprint have varies size

Either the third of the earth or few kilometer

Encapsulate

In networking, it's the same thing as tunneling.

Integrated Architecture

Essentially, the design of any system that consists of having all of the components together from the get-go, so it can't be taken apart without collateral damage. So say Tyrone the ******* takes out a component of the system. Well, Tyrone is duly f*@cked, because he just screwed up his network.

Network Design is all about what?

Establishing priorities and making tradeoffs.

Security Policy

Even if your network is secure from the outside it is important that all of your employees proactively assist.

Server and client protection

Even with physical security and firewalls, the servers and client computers on a network may not be safe because of security holes.

With SAAS What does the Cloud service manage?

Everything

Needs Assessment

Expected outcomes, schedules, who is providing project funds is part of?

EBCDIC

Extended Binary Coded Decimal Interchange Code

Some examples of a Software as a service

Facebook, Google Apps, Twitter, Office 365

Parallel connection (advantages)

Faster Ex. Old Printers & Processor

What is an essential requirement for mission-critical applications?

Fault tolerance is an essential requirement for mission-critical applications. When configured for resilience, some systems have achieved a 100 percent up-time record.

Building-Block Process

Few standard components throughout the network

FDDI

Fiber Distributed Data Interface, dumbed down, it's a set of ANSI protocol that basically uses fiber optics to send data over networks. Additionally, they're token passing networks and are usually used as backbones to WANS. (Can support data rates of up to 100 Mbps per second)

The sources of power loss include what?

Fiber loss and Connections and Splices

Selecting Hardware and software

Fifth step in the design process

Cost Assessment Deliverables

Finalized RFP, Revised Technology Design, Business Case

Conducting a needs assessment

First step in the design process

The degree of satellite

Focuses the beam of its signals

Planning network services

Fourth step in the design process

What switches rapidly between available frequencies?

Frequency Hopping

What are three of the most common ways to gather requirements from user groups, and two other important methods to get information.?

From Users: - Surveys and questionnaires - Focus Groups - Individual Interviews Other Methods: - Walk Through(s) - Research

How should Funding be Handled in a Network Design Project?

Funding can and should be an on-going process, predetermined, and due upon the completion of major milestones or the receipt of deliverables.

b

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. (a) backplane (b) baseline (c) turnpike document (d) wish list (e) RFP

True

Gateways connect two or more networks that use the same or different data link and the same or different network protocols.

Some examples of a Platform as a service

Google App engine, Red Hat Openshift, Windows Azure

The protocol for Web communication is...

HTTP

How much of the total cost does hardware and software account for in terms of a network.

Hardware and Software account for approx. 15% of the total cost of a network

Single-mode fibers

Have diameters sized to the wavelength they are designed to carry.

True

In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.

HIPPI

High Performance Parallel Interface, a standard technology for physically connecting devices at short distances and high speeds. It became an ANSI protocol in 1990 and is used primarily to connect supercomputers and to provide high-speed backbones to LANs. Basic HIPPI transfers 32 bits in parallel for a data transfer speed of 0.8 GBps.

Horizontal wiring connects the wiring closet to what

Horizontal wiring connects the wiring closet to each wall plate near a user's station.

Horizontal wiring is typically what?

Horizontal wiring is typically UTP or STP.

A web browser issues an HTTP request to the web server that contains the URL and other information about the web page that was requested. The web server then processes this request and sends back a HTTP response which will be the requested page or an error message. If there where images on the webpage the web browser would send a request for these images and receive them from the web server one at a time.

How does the internet work?

Hybrid Hub

Hub that supports multiple cable types and can be used to support client with different cable types

Two bus architectures were developed to replace the Industry Standard Architecture (ISA), also called Advanced Technology (AS) bus.

IBM developed the Micro Channel Architecture (MCA) bus. A consortium of vendors led by Compaq developed the Extended Industry Standard Architecture (EISA) bus.

What is an electronic mail protocol?

IMAP

What are some steps to determine the optimum level of a network's security services?

Identify Systems that need protection, Conduct a risk analysis, determine what to do with the risk, KISS (Keep It Simple).

Needs Analysis Step 3

Identify and assess network users

What is Impedance?

Impedance is the total opposition (including resistance and capacitance) of the flow of electrical current.

In Traditional In-House infrastructure the type of applications the network must support affect what?

In Traditional In-House infrastructure, Network Performance and Capacity requirements are affected by the type of applications the network must support.

b

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. (a) technology design (b) needs analysis (c) narrow and deep analysis (d) cost assessment (e) distribution layering

Building Block Process

In a quickly evolving network, which design method is recommended?

In a reliable system, resources are available for what time?

In a reliable system, resources are available to users for a very high percentage of the time.

d

In the technology design stage of network design, (a) the fundamental technology/protocols to be chosen have no relationship with the circuit capacity (b) the decision for fundamental technology/protocols can be made without considering circuit capacity (c) the decision for circuit capacity can be made without considering fundamental technology/protocols (d) the decisions for fundamental technology/protocols and circuit capacity are interrelated (e) the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage

Physical network parameters

Includes monitoring the operation of the network's modems, multiplexers, circuits linking the various hardware devices, and any other network devices. Monitoring the physical network consists of keeping track of circuits that may be down and tracing malfunctioning devices.

Logical network parameters

Includes performance measurement systems that keep track of user response times, the volume of traffic on a specific circuit, the destination of data routed across various networks, and any other indicators showing the level of service provided by the network.

What do Information Sources do?

Information Sources can explain business strategies, long-term plans, and other general business requirements.

IEEE

Institute of Electrical and Electronic Engineers

ISDN

Integrated Services Digital Network, aight yall, listen up, so BASICALLY, THIS IS HOW ITS GON WORK IN THIS BI@CH. ISDN is an international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. ISDN supports 64 kbps.

IETF

Internet Engineering Task Force, which is the main standards organization for the Internet. Basically the IETF is a large, open, international organization comprised of people concerned with the evolution of Internet architecture and the smooth operation of the Internet.

IMAP

Internet Message Access Protocol, another protocol for receiving messages. Similar to POP, but newer and with additional features.

ISP

Internet Service Provider, basically it's a provider that provides internet services, including internet and business services.

IPX

Internetwork Packet Exchange: Basically a networking protocol used by Novell Netware Operating systems. Its very similar to UDP/IP in that it's a datagram protocol used for connectionless communications. COVERED BY ARVIND.

False

Intranet VPN connects different organizations over the Internet

Key concept of Building Block Process

Is that networks that use a few standard components throughout the network are cheaper in the long run than networks that use a variety of different components on different parts of the network

What does a Phase do in a Network Design Project?

It breaks a large Design Project down into understandable, manageable pieces.

Describe the key parts of the technology design step

It examines the available technologies and assesses which options will meet the users' needs. The designer makes some estimates about the network needs of each category of user and circuits in terms of current technology and matches needs to technologies.

What does the Network Design Process focus upon?

It focuses upon the general tasks that must be accomplished when designing a network.

What has RFC since become

It has since become official documents of Internet specifications, communications, protocols, procedures, and events.

What is included in the EIA/TIA-568 guidelines for premises wiring?

It includes: -Sample Topology -Distance limitations -Cabling types for a given network speed -Connector types to be used with a given cable type -Minimum performance specifications for cables and connectors

Is it important to have the fastest wireless LAN technology in your apartment?

It is not necessarily important to have the fastest wireless LAN technology in your apartment because that technology may be faster than your Internet access to your apartment. For example, if you have 10 Mbps Internet access to your apartment, a 54 Mbps access point in your apartment is still limited to 10 Mbps downloads from the Internet. The 54 Mbps access within the apartment is only good for connections between networking devices within the apartment.

What deliverable does the Logical Design produce?

It produces the Logical Design Diagram, a graphical representation of connectivity.

What does Data Prioritization provide a network manager?

It provides the flexibility to give time-sensitive traffic higher priority in the WAN transmission queue.

What is Connectionless protocols?

It spends no time establishing a virtual circuit. Packets are simply sent across the network.

Physical Topology

Items like amount and location of switches, wire runs, wiring diagrams is about designing what?

Transport Layer

Links the application layer software to the network and establishes end-to-end connections between the sender and receiver when these connections are needed. It is also responsible for breaking large messages into smaller messages to make them easier to transmit and combine these smaller messages back together at the end of the connection. This layer can also detect lost messages and request them to be resent

Load Balancing

Load Balancing is distributing processing and communications activity evenly across a computer network so that no one system is overwhelmed. Load balance is especially important for servers where they're not sure how many requests will be made to the network. For instance, really popular websites will have several servers supporting the website, so if one server gets overwhelmed by the requests that the website is getting, it will forward the requests to the other servers.

Needs Analysis Deliverable

Logical Network Design

Handshaking

Long story short, it's how two devices initiate communication amongst each other. Handshaking begins when one device sends a message to another device telling the other device that they wanted to initiate a communications channel. The two devices in question then send each other messages so that they can then agree on a communications protocol.

When considering costs, what must a designer consider?

Long-term operational costs, and one-time implementation costs.

Categorizing Network Needs

Mandatory requirements, desirable requirements wish list requirements

10Base2 (Thin Ethernet or "Thinnet")

Max distance: 185 feet A type of Ethernet cable that uses coaxial cables terminated with a BNC connector

Why are Memory caches are made of Static RAM (SRAM), instead of Dynamic RAM (DRAM)?

Memory caches are made of high-speed static RAM (SRAM), instead of the slower and cheaper dynamic RAM (DRAM) used for main memory.

Several Performance Metrics should be considered during the Requirements Analysis Process, including:

Metric - things that can be measured quantifiably. If you can't measure it, you can't control it. - Capacity - Response time - Throughput - Utilization - Availability - Recoverability - There are several move, but there are considered key

What is a MAN?

Metropolitan Area Network, A MAN uses public transmission facilities but only covers one city.

Modem

Modulator Demodulator

What is a network baseline, and when is it established?

Most network design projects today are network upgrades, rather than the design of entirely new networks. In this case, there is already a fairly good understanding of the existing traffic in the network, and most importantly, the rate of growth of network traffic. In this case, it is important to gain an understanding of the current operations (application systems and messages). The needs analysis step provides a network baseline against which future design requirements can be gauged. It should provide a clear picture of the present sequence of operations, processing times, work volumes, current communication network (if one exists), existing costs, and user/management needs. Whether the network is a new network or a network upgrade, the primary objective of this stage is to define the geographic scope of the network and the users and applications that will use the network.

MAU

Multistation Access Unit

Switch/Hub NOS NIC Access Point Client Server Wire

Name five components of a LAN?

Technology Design Step 3

Network Design Tools(Modeling, Discovery, Simulation)

What are 2 key network services that designers must consider?

Network Management, and Network Security.

How can a network design tool help in network design

Network design tools can perform a number of functions to help in the technology design process. Other network design tools can discover the existing network; that is, once installed on the network, they will explore the network to draw a network diagram. For example, simulation is used to model the behavior of the communication network. Network modeling and design tools can perform a number of functions to help in the technology design process. With most tools, the first step is to enter a map or model of the existing network or proposed network design. Some modeling tools require the user to create the network map from scratch. That is, the user must enter all of the network components by hand, placing each server, client computer, and circuit on the map and defining what each. Other tools can "discover" the existing network. In this case, the user provides some starting point; the modeling software explores the network and automatically draws the map itself. Once the map is complete, the next step is to add information about the expected network traffic and see if the network can support the level of traffic that is expected. Simulation is used to model the behavior of the communication network. Once the simulation is complete, the user can examine the results to see the estimated response times and throughput. It is important to note that these network design tools only provide estimates, which may vary from the actual results. At this point the user can change the network design in an attempt to eliminate bottlenecks and re-run the simulation. Good modeling tools not only produce simulation results, but also highlight potential trouble spots (e.g., servers, circuits, or devices that experienced long response times). The very best tools offer suggestions on how to overcome the problems that the simulation identified (e.g., network segmentation, increasing from T1 to T3).

Needs Analysis

Network needs, User Applications, Network Components

As the # of users in a workgroup/subnet increases, what concerns can popup when it comes to broadcast traffic?

Network performance, Problem Isolation, Network Security, and effects of broadcast traffic on end station cpu performance.

What is a Non-Real-Time Application?

Non-real-time applications are the ones we normally think of when we think of applications. These applications have a greater need for Network Bandwidth and data-carrying Capacity. They also take User Input/Intervention.

With SAAS What do you manage?

Nothing

a

Nowadays, most organizations use a simpler approach to network design called the ___________ approach. (a) building-block (b) frame definition (c) prototype (d) systems development life cycle (e) guided network

What TCP/IP utility would you use to verify DNS servers are functioning and are providing correct info?

Nslookup

How are Operating Systems classified?

OSs can be classified as follows: - Multitasking - Multithreading - Multiuser - Multiprocessing - Real-time

User Authentication

Once the network perimeter and the network interior have been secured, the next step is to develop a way to ensure that only authorized users are permitted into the network and into specific resources in the interior of the network.

Once we have an idea of specific response time requirements, what can we determine?

Once we have an idea of specific response time requirements, we can determine Device Latency, Link Speeds, and other factors that directly influence the performance of the network.

Server Based Network (Client/Server)

One centralized location contains all data on the server and control access users have to shared resources

Simplex

One direction

Half-Duplex

One direction at a time

Encryption

One of the best ways to prevent intrusion is ___________ which disguises information.

What issues are important to consider in explaining a network design to senior management?

One of the main problems in network design is obtaining the support of senior management. In their mind, the network is simply a cost center, something on which the organization is spending a lot of money with little apparent change. The network keeps on running just as it did the year before. The key to gaining senior management acceptance of the network design lies in speaking their language (cost, network growth, and reliability), not the language of the technology (ethernet, ATM, and DSL). It is pointless to talk about upgrades from 10 Mbps to 100 Mbps on the backbone, because this terminology is meaningless to them. A more compelling argument is to discuss the growth in network use. Likewise, a focus on network reliability is an easily understandable issue. For example, if the network supports a mission critical system such as order processing or moving point-of-sale data from retail stores to corporate offices, it is clear from a business perspective that the network must be available and performing properly, or the organization will lose revenue.

What is one of the most common tradeoffs?

One of the most common tradeoffs is cost versus performance.

True

One perspective of data communications and networking as stated in the textbook examines the management of networking technologies, including security, network design, and managing the network on a day to day basis and long term basis.

OSI

Open Systems Interconnection

OSI Model

Open Systems Interconnections Model: Takes a computer model and layers it into certain components Includes: Physical, Transport, and Network

When it comes to UTP Cable how much cm's per turn and turns per metre are in the orange pair cable colour?

Orange-1.78cm/turn- 56m/turn

What is Packet Switching?

Packet switching, messages are broken into packet each of which includes a header with source, destination and intermediate node address information.

PAP

Password Authentication Protocol. It's the most basic form of authentication in which a user's name and password are transmitted over a network and compared to a table of password user pairs. The main weakness of PAP is that the username and password are transferred in the clear, or unencrypted.

How can Performance and Capacity be purchased now?

Performance and Capacity can now be purchased, with set targets agreed upon in advance between Cloud Provider and Cloud Consumer. Done through carefully negotiated SLA's.

Network Layer

Performs routing by selecting the next computer to send the message. It can also find the address of the computer if it isn't already known.

Technology Design Deliverables

Physical Network Design with circuits, devices, clients and servers

What describes a process of controlling access to wireless media by polling wireless devices in turn to see if the device wants to transmit?

Point Coordinated Function (PCF)

Pop

Point of Presence, basically a physical location that is an access point to the Internet.

PPP

Point to Point Protocol

PPTP

Point to Point Tunneling Protocol. Essentially a new sort of technology for establishing Virtual Private Networks. This was developed jointly by Microsoft, US Robotics, a whole SH$T ton of random remote access vendors. So let's say that our good friend La'Taniana'Bo'Vanashrianiqualiquanice wants to set a VPN. Chances are that La'Taniana'Bo'Vanashrianiqualiquanice will be using PPTP in order to establish such a network.

PPP

Point to Point protocol. Essentially a data-link protocol to establish direct connection to the internet. So let's say that our good friend Guuuuuurrrrrrllllll wants to establish a connection to the internet. Guuuuuurrrrrrllllll just might be using PPP to establish this sort of connection to the internet.

Same-layer interaction

Process through which two computers set and interpret the information in the header used by that layer

What is the speed of a cycle time in a processor?

Processors are becoming faster, many systems have a cycle time of only a few nanoseconds.

Cancellation

Produced by twisting 2 conductors around each other in a pattern that causes the radiated magnetic fields on each wire to largely cancel each other out

PROM

Programmable Read Only Memory

What are typically set in the initial stages of the requirements gathering phase?

Project Funding Levels.

TCP/IP

Protocol used by the internet to give each computer a unique address

Shielding

Provided by wrapping the main conductor with another conductive shield.

RCH and Hubs

RCH FEEDS a number of distribution hubs which can support about 40000 subscriber via switches and fiber nodes the fiber mode will split then th signals and transmit them over coaxial cable which will provide service to 1000 homes using a free topology

a

RFP stands for: (a) Request for Proposal (b) Ring Fault Path (c) Routing File Protocol (d) Record Facsimile Program (e) Redundant File Protocol

What is RISC?

Reduced Instruction Set Computer (RISC) Used my Macs. Processors contain fewer instructions than CISC.

IP Host

Refers to any device, regardless of size or power, that has an IP address and connects to any TCP/IP network

Coating

Reinforced plastic outer jacket to protect the cable from damaging

What is reliability from the user perspective?

Reliability, from the user perspective, is a requirement for consistently available service.

What does Remote Access allow users to do?

Remote Access allows users to function as full network peers from distant locations. Typical private VPN's include IPSec and SSL.

Link segements to extend the overall distance of a network.

Repeaters can be used to attach what?

Latency

Repeaters have no what?

RFC

Request for Comments

Performance and Security=?

Router

Broadcast Domains

Routers =? Domains

what are SIP level 2 based on

SIP level 2 based on the IEEE 802.6 Distributed Queue Dual Bus

what are technologies that can be used by man

SMDS and cable tv technologies

SDMS charging

SMDS charge involve connection charges for access circuits and are speed related plus monthly rental charges that are speed related

what is SIP

SMDS define a subscriber to network interface known as SMDS interface protcol which is layer protcol

switched multi megabit data serices

SMDS is stricktely speaking a service rather than technology

SONET support the same carrier speed as SDH

SONET based on 51.84 carrier that can accommodate a T3CIRCUIT

SDH USE Abbreviation

SYM for naming convention

Satellite networks

Satellites can provide high bandwidth between distant points on the earth's surface by receiving signals from a transmitter and relaying them to a receiver using microwave radio

Design Goals strive to do what?

Satisfy Requirements, and deliver certain levels of service.

What is Scalability?

Scalability is a characteristic of a system to cope and preform under an increased or expanding workload.

What is one of the Cloud's greatest advantages?

Scalability or that elasticity of resource provisioning in the cloud is one of the greatest advantaged of the cloud. It is necessary to expand on the fly, wind up and wind down.

What is one of the positives of using the Cloud?

Scalability or the elasticity of resource provisioning in the Cloud, it eliminates growth issue concerns for it's customers.

Which one of the following is NOT a method of troubleshooting? a. bottom up b. search and destroy c. top down d. divide and conquer

Search and Destroy

Designing the physical topology

Second step in the design process

SSL

Secure Sockets Layer is a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses public key encryption. SSL works like this: When a web browser wants to connect to a website using SSL. This prompts the web server to send the browser a copy of the SSL certificate. The browser then checks to ensure that the certificate is authentic. If it is, the browser will then send a message to the server. The server then responds to the browser by giving a digital signature to the browser. After that a secure session can begin with the web server and the browser. (fun fact, you may notice that instead of http, it now starts with https)

What is Security?

Security is a requirement to guarantee the integrity of the information and physical resources that users need to do their jobs.

Cost Assessment Step 2

Sell Proposal to Management(Business Case)

SEQ

Sequence Number

STP

Shielded Twisted Pair

2 major ways to limit noise and crosstalk in a cable design

Shielding and Cancellation

ArcNet

Short for Attached Resource Computer Network, its one of the oldest, simplest and least expensive types of LANs. ArcNet was introduced by Datapoint Corporation in 1977. It uses token ring architecture, supports data rates of 2.5 Mbps, and can connect up to 255 computers. A big bonus to ArcNet is that it permits various types of transmission media, such as coaxial cable, fiber optics, to be mixed in the same network.

ICMP

Short for Internet Control Message Protocol. It's basically an extension to the internet protocol defined by RFC 792. ICMP can support packets containing error, control, and informational messages.

EGP

Short for exterior Gateway Protocol, a generic term for a routing protocol that is used to exchange routing information between two hosts in a network of autonomous systems. An EGP is typically used between hosts on the Internet to share routing table information.

What have some switch and router vendors have implemented what?

Some Switch and Router Vendors have implemented a Broadcast Throttle feature that limits the # of broadcast frames a switch will forward.

What are some advantages of a collapsed backbone design?

Some advantages of a collapsed backbone device is that it centralizes Complexity, increases performance, reduces cost and supports the server farm model.

Some light rays will travel nearly straight through the core, while others will what

Some light rays will travel nearly straight through the core, while others bounce off the cladding many times before reaching the far end of the fiber

What are some major problems that can cause network designs to fail?

Some major problems that can cause network designs to fail can be categorized by the steps of the building block design approach. Technology design problems • buying the wrong equipment or services; often the right technology but the wrong products or features • vendor misrepresentation; the products and/or services did not work as promised Needs analysis problems • requirements were incomplete or inaccurate • a significant change in business requirements as the network was installed. Overall problems with the design process • lack of network design skills internally; did not use external consultants or systems integrators external network consultants or systems integrators who bungle the project

Discovery

Some tools can automatically create network diagrams by examining existing network

E-commerce Edge

Special LAN with group of servers that allow connection to business partners

What is the Speed of a Bus measured in?

Speed of bus is measured in millions of cycles per second, or Mhz

The primary approach for implementing radio-based LANs that do not require FCC/CRTC licensing is known as what?

Spread Spectrum

2 types of multimode fiber

Step-Index Fiber, and Graded-Index Fiber

Problems in Network Design

Support of senior management

Performance only=?

Switch

Forms Logically single networks

Switch advantages

Creates broadcast traffic that congests the network and Allows Broadcast Frames to flood the network

Switch disadvantages

Collision Domains

Switches =? Domains

What issues are handled well by the Manchester Encoding methodology, for speeds of 10Mbps over traditional coaxial cable or Cat 3 UTP?

Syncronization and Capacity

What gives users and vendors precise guidelines for premises wiring?

The Commercial Building Telecommunications Wiring Standard (EIA/TIA-568) which gives users and vendors precise guidelines for premises wiring.

The EIA/TIA-569 is what?

The EIA/TIA-569 is the Commercial Building Standard for Telecommunications Pathways and Spaces

The EIA/TIA-570 is what?

The EIA/TIA-570 is the Residential and Light Commercial Telecommunications Wiring Standard

What 2 associations have taken the lead in providing and industry-wide open standard for structured wiring?

The Electronic Industries Association (EIA) and the Telecommunications Industry Association (TIA) have taken the lead in providing an industry-wide open standard for structured wiring.

What does the Logical Design describe?

The Logical Design Describes what the network must do, and how it must perform, to meet the requirements.

The Logical design specifies what about the Data in a Network?

The Logical Design specifies how Data Flows through a network, not where particular network elements are physically located.

What benefits does an open standards based structured wiring system offer?

The benefits this structured wiring system offers is -Interoperability of devices regardless of vendor -Long-term cost effectiveness based on installing enough cable for future needs -Scalability supports future upgrades

Client

The client part of a client-server architecture. Usually a client is an application that runs on a personal computer or workstation and relies on a server to perform operations. A good example of this would be a email client, which allows you to send and receive email.

On what should the design plan be based?

The design plan should be based on the geographic scope of the network, the number of users and applications, the current and future network needs of the various network segments, and the costs of the network and maintaining the network.

Bandwidth

The difference (ratio) between the highest and lowest frequencies that can be transmitted across a transmission line or through a network

What is the difference when it comes to distance vector protocols and link state protocols?

The difference between distance vector protocols and link state protocols is that distance vector protocols converge periodically and send out all table info, and Link state protocols converge updates only.

Bandwidth

The difference between the highest and lowest frequencies in a band. In common usage, _______ refers to circuit capacity; when people say they need more ________, they need a higher transmission speed.

e

The fastest growing form of videoconferencing is a. Mainframe b. Outlook c. Telnet d. webcasting e. desktop

Is the finished product a deliverable or a goal?

The finished product is a goal. It is not a deliverable.

what are the key parts of an RFP

The following contains the key parts in an RFP: Background Information • Organizational profile • Overview of current network • Overview of new network • Goals of new network Network Requirements • Choice sets of possible network designs (hardware, software, circuits) • Mandatory, desirable, and wish list items • Security and control requirements • Response time requirements • Guidelines for proposing new network designs Service Requirements • Implementation time plan • Training courses and materials • Support services (e.g., spare parts on site) • Reliability and performance guarantees Bidding Process • Time schedule for the bidding process • Ground rules • Bid evaluation criteria • Availability of additional information Information required from vendor • Vendor corporate profile • Experience with similar networks • Hardware and software benchmarks • Reference list

What is the goal of Network Security?

The goal of network security is resource protection.

e

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. (a) building block (b) access layer (c) core layer (d) cost assessment (e) logical network design

Today your design must consider the impact and potential savings of utilizing what

The impact and potential savings of utilizing cloud services and technologies may provide.

What should be included in your final, overall estimate of the cost of the new network?

The labor and taxes estimates should be included in your final, overall estimate of the cost of the new network.

What type of systems does the Midrange market include?

The midrange market includes: - Minicomputers - Unix Servers - Linux Servers

What is the most common Time Constraint?

The most common Time Constraint is a Completion Deadline or Completion Date.

In what Document does the Network Designer describe what the organization and users need from the network?

The network designer must formally record the requirements in a Requirements Specification Document that describes what the organization and uses need from the network.

Throughput

The overall capacity of a network to perform useful work.

Period and height of satellite relationship

The period of a satellite's orbit is related to the height of the orbit (the higher the orbit, the longer the period).

Position of geo controlled by

The positions in GEO are controlled by the ITU-R21 and virtually all positions are now occupied. Satellites tend to drift from their assigned positions over time and they need to use small rocket motors to adjust their positions from time to time.

Why is the process of gathering user requirements so complicated?

The process of gathering user requirements is complicated by the fact that users rarely state their requirements in a technically precise way.

Convergence

The process of updating and synchronizing all routing tables in a network

a

The protocol that makes it possible for a machintosh web browser to be able to retrieve a web page from a microsoft web server is called a. Hypertext transfer protocol b. file transfer protocol c. simple mail transfer protocol d. internet message access protocol e. hyperlink transfer protocol

What is the Recovery Time Objective?

The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.

Disk Mirroring

The replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability

What do you need to get good results in Requirements gathering?

The requirements must be both user and business center, as well as detailed and specific.

What are the seven network architecture components?

The seven network architecture components are LANs, building backbones, campus backbones, WANs, Internet access, e-commerce edge and data centers.

Checksum

The sum of the decimal value of each character in the message is added and then divided by 255 and the remainder is used as the ________. This number is then calculated by the receiver and compared to the transmitted ____________. If the two values are equal, the message is presumed not to have any errors. This method is effective 95% of the time.

CPU Delay

The time it takes a server CPU to process a request from the network

What is the turnpike effect and why is it important in network design

The turnpike effect results when the network is used to a greater extent than was anticipated because it is available, is very efficient, and provides new services. The growth factor for network use may vary from 5 to 50 percent and, in some cases, exceed 100 percent for high growth organizations. It is important in network design not only because usage is higher than anticipated, which slows response time, but also because the types of messages may be different than those for which the network was originally designed.

What Is The Difference Between T568A & T568B?

The two color orange and green pairs are interchanged.

True

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.

What are the two types of Key Players?

The two types of Key Players are Information Sources and Decision Makers.

a

The users lease connection points (e.g., telephone lines) into the common carrier's network, which is called the cloud. A person (or computer) dials the telephone number of the destination computer and establishes a temporary circuit between the two computers. a. Circuit-switched b. dedicated-circuit c. Packet-switched

Hubs

They are physical layer devices that logically function as a shared bus, or a multiport repeater.

Mainframes are famous for their transaction processing capabilities. They are well suited to handle what operations?

They are well suited to handle: - global electronic money transfers - automated teller machines - airline reservations - hotel reservations

Bridges

They operate at the media access control sublayer of the OSI Data Link Layer

Why do you think some organizations were slow to adopt a building-block approach to network design?

They were slow because this approach requires network managers to speak the language of upper management (cost, network growth, reliability) rather than the language of technology (Ethernet, ATM, and DSL).

Designing the logical topology

Third step in the design process

Routers

This device operates at the network layer of the OSI Model

Repeaters

This device receives a signal on a LAN segment it also regenerates the bit pattern to boost the signal also extends the physical length of the segment, and is rarely used if ever these days.

The three As

This involves designing the systems that will control how users will authenticate to the network and be authorized to use network resources.

Protocol Suites

This is collections of protocols that enable network communication from one host through the network to another host

Link Delay

This is the speed at which data can be transferred across a communications link

Physical Layer

This layer consists of the actual physical connection between sender and receiver. This layer transfers electrical, radio, or light signals through circuits.

Physical

This layer conveys the bit stream throughout the network medium at the electrical and mechanical level. It provides the hardware means of sending and receiving data through a carrier. This layer includes Ethernet, the RJs, FDDI.

Session Layer

This layer establishes, maintains, and terminates sessions. So for instance, this layer also sets up, coordinates, and terminates conversations, exchanges and dialogues between each application at each end.

Data Link Layer

This layer is responsible for moving a message from one computer to another. This layer controls the physical layer by deciding when to transmit messages, formats the message, and detects and corrects transmission errors.

Application Layer

This layer is the user's access to the network.

Communication System

Transmission -> Encoder -> Media -> Decoder -> Receiver ^ ^ | ______________________Feedback_________________________|

Presentation Layer

This layer provides independence from differences in data representation by translating from application to network format and vice versa. The presentation works to transfer the data into a format that the application layer can accept. This layer also formats and encrypts data. This layer is also called the Syntax Layer.

Network Layer

This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this particular layer, along with addressing, internetworking, error handling, congestion control and packet sequencing. Examples include: Appletalk DDP, IP and IPX.

Transfer Layer

This layer provides transparent transfer of data between different hosts and is also responsible for error recovery along with flow control. It ensures complete data transfer. TCP and UDP

Application Layer

This layer supports applications and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are offered, and any constraints on data syntax is identified. Telnet and FTP.

Gateways

This operates at all protocol levels above the data link layer, and is transparent to both ends of the connection

Capacity

This typically describes the max data carrying capacity of a communications channel or link

Enterprise Edge

Three components make up the network architecture, the parts of the network that are at the edge of an enterprise campus and connect that campus to the rest of the world. WANs, Internet access and E-commerce edge

Why are Timelines and Predictability closely related?

Timelines and Predictability are closely related because they both describe the ability to access, transfer, or modify information quickly.

Why must DC voltage not be allowed to build up on the line?

To avoid damage to network devices, excessive direct current voltage must not be allowed to build up on the line.

Some applications are more important to the overall organization than others, because their failure could damage the business or even endanger people's livelihood. To ensure their reliability and availability, what do we do?

To ensure their reliability and availability, mission-critical applications require higher levels of network service (and cost) than less important applications. Referred to at the BCP - Business Continuity Plan

Open

To make the system accessible. Basically allows others to duplicate products, increasingly nowadays we see more and more open sources across the industry

What is the most common Physical Topology today?

Today the most common Physical Topology in place is the Star, using switches and routers and Ethernet Technologies.

How does the traditional approach to network design differ from the building block approach?

Traditional network designs used a very structured approach for the analysis and design. This by default built in limitations to the growth and need to change network designs as the needs of the organization and technology itself changed.

Turnpike Effect

Traffic increases faster than forecast

Satellite networks

Used from 1960

UDP

User Datagram Protocol

What are 4 factors that must be considered?

User Requirements, Design Constraints, Current Network, and Design Goals.

Modeling

Users create diagrams of existing or proposed networks

True

WANs connect BNs and MANs across distances that can span up to thousands of miles?

We use DB to express the amount of what?

We use DB to express the amount of gain or loss that occurs at a point in a transmission path, such as a connector or repeater

Monitor Mode, and Analyzer Mode

What are the 2 modes of traffic capture?

Physical Data link network transport application

What are the five layers of the internet model

Provide segmentation to the network based on type or location to enable a greater way to manage traffic. Often enables traffic to flow faster. Provides an easier way to manage broadcast traffic.

What are the main benefits of Virtual LANs?

Header and body

What are the major parts of an email message

Sniffer and Wireshark

What are the popular tool for measuring Lan Activity?

Network Baseline

What can provide proactive insight about the performance of a network, and shouldn't be taken at any specified regular interval but is also a snapshot of activity and performance

It's the only internetworking device that can change the form of a network transmission from one communications architecture to that of another.

What is a Gateway Advantage?

A Gateway receives forms from one communications architecture, and must convert them to another architecture by building new headers for every layer of the protocol stack

What is a Gateway Disadvantage

To be routable an architecture must have a network layer. Not all do, Those protocols must be bridged.

What is a Router Disadvantage?

Allows it to support redundant network paths

What is a Router advantage?

Logical Broadcasts

What is a common method of segmenting a network

Network Mapping

What is one tool for testing Network Activity?

Performance Monitor, Task Manager, and Network Monitor

Which are the measurement tools?

d

Which is a stage of network design. a. Needs analysis b. Technology design c. Cost assessment d. All of the above

c

Which is not a function of the physical layer: a. Transmission of bits b. defining the rules by which one and zeroes are transmitted. c. providing error free transmission of data d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass through it

a

Which of the following is a fundamental backbone network architecture? (a) Bridged backbone (b) Virtual LAN (c) Hub backbone (d) Gateway backbone (e) Virtual backbone

b

Which of the following is not a key deliverable for the cost assessment step? (a) RFP (b) list of wish list requirements (c) revised physical network diagram (d) business case, defined in business objectives and business language, that supports the network design (e) none of the above is an appropriate choice

b

Which of the following is not a user agent (SMTP) package a. Outlook Express b. Microsoft word c. Fedora d. Netscape messenger e. Microsoft Outlook

a

Which of the following is not an important factor to consider when selecting media to be used in a network? a. prestige value of the type of media b. type of network c. cost d. transmission distance e. security

d

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? (a) applications of the proposed network (b) servers in the proposed network (c) circuits in the proposed network (d) specific routers that have been chosen to implement the proposed network (e) clients in the proposed network

c

Which of the following statements is true? a. the longer the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire b. the shorter the distance of a telephone wire between sender and recipient the lower the bandwidth across that wire c. bandwidth is constant across any wire, therefore distance is not relevant to its capacity d. the longer the distance of a telephone wire between sender and recipient, the higher the bandwidth across that wire e. bandwidth is not a term that can be used when discussing telephone transmissions

c

Which wireless standard will become the dominant standard of all the current standards? (a) 802.11a (b) 802.11b (c) 802.11n (d) 802.15 (e) none of the above

What is an RFP and why do companies use them?

While some network components can be purchased "off-the-shelf," most organizations develop a request for proposal (RFP) before making large network purchases. RFPs specify what equipment, software, and services are desired and ask vendors to provide their best prices. Some RFPs are very specific about what items are to be provided in what time frame. In other cases, items are defined as mandatory, important, or desirable, or several scenarios are provided and the vendor is asked to propose the best solution. In a few cases, RFPs specify generally what is required and the vendors are asked to propose their own network designs. Once the vendors have submitted their proposals, the organization evaluates them against specified criteria and selects the winner(s). Depending upon the scope and complexity of the network, it is sometimes necessary to redesign the network based on the information in the vendor's proposals. The RFP process helps the company to refine and determine what to purchase. It establishes a formal process that becomes well-documented and as a result leaves the company with not only a rationale for what has been purchased but documented proof of how the company arrived at its conclusions as to what vendors would be awarded contract(s) from the company.

99.70% or 30 minutes of downtime per week works out to 10.70 seconds per hour, this may be OK therefore, identifying the time-frame and unit is CRITICAL. ->

Why? Cost! Increasing the up-time increases the cost.

What is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL?

WiMAX (Worldwide Interoperability for Microwave Access)

How can you identify key players and key groups?

You can identify Key Players and key Groups with an Organization Chart.

b

You lease circuits from common carriers. All connections are point to point, from one building in one city to another building in the same or a different city. The carrier installs the circuit connections at the two end points of the circuit and makes the connection between them. The circuits still run through the common carrier's cloud, but the network behaves as if you have your own physical circuits running from one point to another. a. Circuit-switched b. dedicated-circuit c. Packet-switched

What decision must you make first before you make technology choices?

You must 1st decide what to do, then decide how to do it.

What must you do first before you can Gather Business Requirements for a Network?

You must understand the nature of the business that will use it. Each network is a unique and customized solution.

Why do you need to do create a New Project in each new Network Design Project?

You need to create a different process because each network has it's own unique needs with different tasks.

b

______ enables users to send and receive files over the Internet. There are two types of sites: closed (which require users to have an account and a password) and anonymous (which permit anyone to use them). a. Hypertext transfer protocol b. file transfer protocol c. simple mail transfer protocol d. internet message access protocol e. hyperlink transfer protocol

a

______ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM

Digital

______ transmission permits higher maximum transmission rates. Fiber-optic cable, for example, is designed for _____ transmission.

SMTP

_______ packets defines how message transfer agents operate and how they format messages sent to other message transfer agents.

b

________ in which many, but not all, computers are connected. Most WANs use this topologies (a) Ring design (b) Mesh design (c) Bus design (d) Star design (e) None of the above

Parity Checking

__________ 1 Bit is added to each byte in the message. This bit setes the total number of 1's in the byte either an even number or an odd number. If one bit is switched you will be able to see that there is an error (although not where it is). But if two are switched this method will not show any error. The probability of detecting an error, given that one has occurred, is about 50%.

a

__________ is not an important consideration when network designers review old and new applications. (a) Reviewing the NFL scores (b) Reviewing the organization's possible changes in product mix (c) Understanding the organization's strategic plans (d) Understanding development plans for new uses of electronic commerce (e) Reviewing the organization's projections of sales

Impulse noise

__________ is the primary source of errors in data communication and is heard as a click or a crackling noise that can last as long as 1/100 of a second. Some sources of this error are voltage changes due to lightning flashes, fluorescent lights, and poor connection in circuits.

White noise

_____________ is caused by the thermal agitation of electrons and therefore is inescapable.

newsreader

a Newsreader is a client application that enables someone to read messages posted to Internet newsgroups, and to post your own messages. For instance, Internet Explorer, a popular web browser, has built in newsreaders, but there are plenty of free and fast newsreaders on the internet just waiting to be downloaded.

On the Manchester Encoding Diagram what is binary 0 represented by?

a binary 0 is represented by a transition from a negative voltage to a positive voltage.

On the Manchester Encoding Diagram what is binary 1 represented by?

a binary 1 is represented by a transition from a positive voltage to a negative voltage.

What is a bit stream?

a bit stream is transmitted on a line, several parameters must be maintained to preserve accurate data communication.

bottleneck

a circuit that is filled almost to capacity and this is the critical point that determines whether users get good or bad response times

Baseline

a clear picture of the present sequence of operations, processing times, work volumes, the current communication network, existing costs and user/management needs

Internet Group Management Protocol (IGMP)

a communications protocol used by hosts and adjacent routers to establish group memberships. can be used for online streaming video and gaming

Virtual Circuits

a connection between two devices that poses as a direct connection even though it can be physically linked to each other. Another swaggalicious fact is that it's often used to describe the connections between two hosts in a packet-switching network. So they have a connection to each other, even though they may not be directly linked to each other. They could go through multiple destinations before reaching each other.

Packet filtering

a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination of the IP address

peer-to-peer architecture

a form of an architecture where each workstation has equivalent capabilities. This is direct contrast to client server architectures, where some computers are dedicated to serving other computers. P2Ps tend to be more simpler than other networks, but they don't perform as well under heavy loads.

At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?

at a POP

Network

a group of two or more computer systems linked together.

Simulation

a mathematical technique in which the network comes to life and behaves as it would under real conditions, is used to model the behavior of the communication network

Multiplexing

a method by which multiple analog message signals or digital data streams are combined into one signal over a shared medium

Internetwork Packet Exchange (IPX)

a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers. IPX is a datagram or packet protocol.

Remote Authentication Dial-In User Service (RADIUS)

a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect. for larger networks

Datagram

a packet of data sent over an IP network

Address Resolution Protocol (ARP)

a protocol for mapping an IP address to a mac address that is recognized in the local network.

DB

a relative measure of the difference in power of 2 signals

Open Shortest Path First (OSPF)

a routing protocol

Building-Block Process

a simpler approach to network design,

E-Commerce edge

a special LAN with a group of servers that enables electronic data exchange between the organization and the external entities with which it does business such as its customers and suppliers

d

a special type of one-directional videoconferencing in which content is sent from the server to the user. The developer creates content that is downloaded as needed by the users and played by a plug-in to a Web browser. At present, there are no standards for _______. a. Mainframe b. Outlook c. Telnet d. webcasting e. desktop

Windows Internet Naming Service (WINS)

a system that determines the IP address associated with a particular network computer. called name resolution. specifically for windows users

Traditional Network Design Process

a very structured system analysis and design process similar to that used to build application systems. Network analysts identify user needs and the application system planned for the network, then the network analyst develops a precise estimate of the amount of data that each user will send and receive and uses this to estimate the total amount of traffic on each part of the network. third the circuits needed to support this traffic plus a modest increase in traffic are designed and cost estimates are obtained from vendors.

Professional hackers

a. Break into corporate or government computers for specific purposes, such as espionage, fraud, or intentional destruction.

Organization employees

a. Have legitimate access to the network, but who gain access to information they are not authorized to use.

Casual Intruders

a. Limited knowledge of computer security. b. They simply cruise along the Internet trying to access any computer they come across. c. Their unsophisticated techniques are the equivalent of trying doorknobs, and, until recently, only those networks that left their front doors unlocked were at risk.

Experts in security

a. Motivation is the thrill of the hunt b. They break into computer networks because they enjoy the challenge and enjoy showing off for friends or embarrassing the network owners.

Baselining

adding location of apps that will use the network

dynamic

address will change

Routing and Remote Access Service (RRAS)

allows remote users to dial in and establish temporary connections to a network. specifically for smaller networks

what is new with SDH

am network operators are migrating their PHD networks to SDH/SONET and these are used to carry PSTN day a network's and private circuits but with SDH operators can also offer very speed private circuit at some of the rates network operators usually configure their SDH/SONET in rings called shared protection rings for resilience

Extensible Authentication Protocol (EAP)

an authentication framework frequently used in wireless networks and point-to-point connections

Challenge-Handshake Authentication Protocol (CHAP)

authenticates a user or network host to an authenticating entity

What parts of the network need more bandwidth than others?

backbone, and high-performance workgroup

SDH standardised by ITUT

based on 155 Mbit /s carrier which can accommodate an E4circuit

B channels

bearer channels are in layman's terms the primary data carrying channels to an ISDN connection.

cable tv networks

cable tv companies laid networks across metropolitan areas to carry analogue or digital tv signals from the cable head to end to individual homes

what type of cable used in th technologies

cable tv networks used coacsil cables from the RCH via a series of splitter and amplifiers to the homes but modern networks 're engineered to use optical fiber cables

Frequency division multiplexing

can be described as dividing the circuit "horizontally" so that many signals can travel a single communication circuit simultaneously. All signals exist in the media at the same time but do not interfere with each other because they are on different frequencies.

sDH and speed

can support even higher speeds which can now be achieved on optical filers to change from plesiochronous to synchronous working

Network address translation (NAT)

changing the network address information in the IP packet headers while transferring the packet across a traffic routing device; remaps a given address space into another address space

what is wide area network

communication are required between sites which are separated by at least one public road

Point-to-Point Protocol (PPP)

communications connection between two nodes or endpoints. An example is a telephone call. protocol used to establish a direct connection between two nodes.

NTU characteristics

connected over 4 wire circuit to the network operator primary multiplexer at local exchange

a

connects all computers in a closed loop with each computer linked to the next (Figure 8.3). The circuits are full-duplex or half-duplex circuits, meaning that messages flow in both directions around the ring. Computers in the ring may send data in one direction or the other, depending on which direction is the shortest to the destination. (a) Ring design (b) Mesh design (c) Bus design (d) Star design (e) None of the above

Which type of backup process archives all selected files but does NOT se the archive bit?

copy

D channels

delta channels are in layman's terms the channel in an ISDN connection that carries control and signalling information.

tv technologies networks designation

designed as cascades star networks with the head and as the central hub and transmitting simplex broadcast tv channels using FDM and TDM

virtual private network (VPN)

extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Need analysis

during which the designer attempts to understand the fundamental current and future network needs of the various users, departments and applications, this is likely to be an educated guess at best. Needs are classified as typically or high volume and specific technology needs are identified

Internet Access

enables the organization to connect to the internet

c

enables users to log in to servers (or other clients). a. Mainframe b. Outlook c. Telnet d. webcasting e. desktop

Capacity Planning

estimating size and type of network circuits for each network type

Capacity planning

estimating the size and type of standard and advanced network circuits for each type of network

Technology Design

examines the available technologies and assess which option will meet users' needs. The designer makes some estimates about the network needs of each category of users and circuits in terms of current technology and matches needs to technologies

the plesiochronous digital hierarchy

network operators support private circuit in their own large TDM networks called transmission networks

Satellite footprint

h satellite is able to transmit and receive signals from an area of the earth's surface known as the satellite's footprint.

what are compsition of SIp

have three layer protocol SIP layer level 3 is a network layer protocol that carry data gram up to 9188byte

network operator and network terminating unit

network operators tend to implement and install networking terminal unit that support physical interface such as x.21 or v. 35

False

integrating voice, video, and data on the same circuit is far simpler with analog transmission. True/False

Logical network design

is a statement of the network elements needed to meet the needs of the organization, it does not specify specific technologies or products to be used although any specific requirements are noted. Instead it focuses on the fundamental functionality needed, such as high speed access network

a

is a very large general-purpose computer (usually costing millions of dollars) that is capable of performing an immense number of simultaneous functions, supporting an enormous number of simultaneous users, and storing huge amounts of data a. Mainframe b. Outlook c. Telnet d. webcasting e. desktop

turnpike effect

is an expression that means that traffic increases much faster that originally forecast

smds

is comnectionless specially designed for man and used by wans

what is DQDB

is data link Lauer protocol that segment level 3 frames into 53bytes cells

Cost assessment purpose

is to assess the costs of various physical network design alternatives produced

First step in needs analysis

is to break the network into the seven network architecture components, not all layers are present in all networks

Goal of needs analysis

is to produce a logical network design

Goal of need analysis

is to understand why the network is being built and what users and applications it will support

Voice over Internet Protocol (VoIP)

is used to transmit phone conversations over digital networks. The codec is built into the telephone and therefore the telephone transmits digital data that can be connected directly into a local area network, in much the same manner as a typical computer.

SMDS CARRY datagrams of variable length up to 9188 bytes

it encapsulate frames from virtually all lans data rates usually support range from 200kbit second to 45 kbit

What is a collapsed Backbone environment

it is a switch or router with large amounts of data that are transmitted across the backplane of a central high-performance backbone device.

why private circuit network is most cost effective for enterprises

it is true for voice communication where network operators charge each telephone call on per minute basis

There is a special orbit where the orbital period is the same as the earth's rotational period. In this orbit

known as geo-stationary orbit or Geosynchronous Earth Orbit (GEO), the satellite will always be in the same position above the earth's surface

smds have a number of different data link protocols as well as DQDB

level 2 SIP can replace by data exchange interface based onnHDLC OR frame relay or ATM

main advantage of SMDS

like Lan it support both connection less networking and multicasting wan support connection less but not support multicasting so SMDS is ideal solution for lan interconnection at speeds from 1to 45 Mbits and bry compatible with ATM and network operators can carry SMDS traffic over their ATM networks main disadvantages is that does not support delay sensitive traffic such as voice and video although DqDb can support traffic

8b/10b is what?

line coding used in 10 gb ethernet

subnet

logically dividing an IP address

Router

networking devices that connect the parts of the TCP/IP network together for the purpose of routing (forwarding) IP packets to the correct destination

what is metropolitan networks

networks whose size is between that of lan and that of wan and cover distance between about 1km to 80 km implemented across city or a part of acity or large campus

Dynamic Host Configuration Protocol (DHCP)

made so that computers could connect to other computers (on a network) automatically. To be able to access the Internet (or any computer network), an IP address is needed. DHCP allows for this IP address to be obtained automatically

man and technologies

man can be implemented used in lan such as ethernet or wans such as synchronous digital hierarchy

main function of QDQB

manage distributed queue fairly because devices are able to indicate that they require a place in the queue by sending a request in the opposite direction on which they wish to send data

private circuit networks

many enterprises implement their own private circuit networks to carry both voice and data traffic and sometime video conferencing

Continuity

means that all necessary connections have been made.

Polarity

means that the connections allow electrical current to flow in the proper direction

Baseline

metric against with future design requirements are measured

Building block process involves three steps

need analysis, technology design and cost assessment

earlier transmission networks depend on

plesiochronous digital hierarchy

Routing Information Protocol (RIP)

prevents routing loops by implementing limit on the number of hops allowed in a path from source to destination

Internet Protocol (IP)

principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

what are path in private circuit network

private circuit network follow a route through the TDN network known as path path made up of a line's in series these lines are physical circuits between multiplexer the line then split into a number of sections in series between repeaters

how private circuit networks carried

private circuit networks carried by time division multiplexing over the network operators transmission network and provide a dedicated data rate between two points known as A end and B end

Common Carriers

private companies such as AT&T, Bell Canada, Sprint, and BellSouth that provide communication services to the public

network operator provide

provate circuit at lower speed and data rate of these circuits are 64kbit/s or Multiple of 64

wan

provided by licensed network operators who are allowed to dig up roads to lay cables or pipes

disadvanges of PDH

reliability problems occurs because the way low speed circuit are touted through many multiplexes up to high speed carrier it is difficult to connect new private circuit network to existing one

Statistical time division multiplexing

selects transmission speed for the multiplexed circuit based on a statistical analysis of the usage requirements of the circuits to be multiplexed.

Physical Network Design

set of possible designs includes circuits and devices

Time division multiplexing

shares a communication circuit among two or more computers by having them take turns, dividing the circuit vertically.

BCP

short for Business Continuity Planning, BCP covers both DRP and also business resumption planning. It's the preparation and testing of measures that protect business operations and also provides the means for the recovery of technologies in the event of any loss, damage or failure of facilities.

DRP

short for Disaster Recovery Planning, DRP is a plan for business continuity in the event of a disaster that destroys all or part of a business's resources, including IT technology, data records, and the physical space of an organization. The goal of a DRP is to resume original operations in as little time as humanly possible. There are several stages to a DRP, including:

RFC

short for Request For Comments. It's a series of notes about the Internet, starting from 1969, back when the now modern day internet was known as the ARPANET. RFC's can added, the process goes as follows. So essentially anyone can propose something to become a RFC. Say our good friend Unidastazovamerikaaliqua wants to propose an Internet Document, and she's hoping that that particular internet document will become a RFC. So Unidastazovamerikaaliqua will first forward the internet document to the IETF, but from there, it's up the IETF's discretion on whether or not Unidastazovamerikaaliqua's Internet Document will become a RFC. So let's just say that Unidastazovamerikaaliqua's document gets approved. Well, if that particular (now) RFC gains enough traction, it could end up becoming an Internet Standard. (Notes, each individual RFC is designated a specific RFC number. Once published, a RFC will never change. But it can be modified, so if it becomes modified, the RFC will be given a new RFC number.

2Mbit /s private circuit between two offices carry 30 telephone calls

so it's cheaper to use private circuit network

Core

solid fiber of highly refractive clear glass or plastic, that serves as the central conduit for light.

Protocol

special set of rules that end points in a telecommunication connection use when they communicate

routing protocol

specifies how routers communicate with each other

Request for Proposal

specify equipment,software and desired services and ask vendor prices

request for proposal (RFP)

specify what equipment, software, and services are desired and asks vendors to provide their best prices

Physical Network Design

starts with the client and server computers needed to support the users and applications.

cable tv support

support about 400000 subscribers from global cable head

cables tv characteristics

support voice services by separate UTP cable which is carried by the outer sheath of coaxial cable

SMTP

swaggiliciously put, it's a protocol for sending email messages between servers. Most email services use SMTP to send messages. Then POP or IMAP can be used to receive those messages. So say that Sha'Nay Nay wants to send a message to Ka'Likatifrianiqua. She'll use SMTP to send out the message to Ka'Likatifrianiqua, and Ka'Likatifrianiqua will receive it and read it using POP and IMAP

Asynchronous transmissions

synchronized by special signals along the transmission medium

SDH IN north America is called

synchronous optical network SONET defined by ANSI

Life Cycle for data information in the Cloud is called:

the Secure Data Life Cycle.

Two Life Cycle Patterns for network development are:

the Waterfall Cycle and the Spiral Cycle.

Circuit loading

the amount of data transmitted on a circuit

Network topology

the arrangement of a network, including its nodes and connecting lines

transmission networks support

the circuit that the operator uses to carry its PSTN traffic and data networks as well as private circuits

a

the designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. This is likely to be an educated guess at best. Users and applications are classified as typical or high volume. Specific technology needs are identified (e.g., the ability to dial in with current modem technologies). a. Needs analysis b. Technology design c. Cost assessment d. All of the above

Baselining

the designers must review the list of applications that will use the network and identify the locateion of each, this information is added to the emerging network documentation

SDH PROTOCOL have four sublayers

the photonic layer define the physical properties of the fiber and signals the section sub layer define how SDH operate between repeaters the line sublayer define how SDH operate between repeaters the path sublayer define how SDH operates on an end to end channel at specific data rate

Dynamic Name Systemm (DNS)

used by everyone using the Internet to resolve commonly known domain names

Tracert/traceroute

used to after ping to determine more information about the path to the destination host and the response time

Cost assessment

the relative costs of technologies are considered, this process then cycles back to need analysis which is refined using technology and cost information to produce a new assessment of users' needs.

c

the relative costs of the technologies are considered. The process then cycles back to the needs analysis, which is refined using the technology and cost information to produce a new assessment of users' needs. a. Needs analysis b. Technology design c. Cost assessment d. All of the above

`what does the traditional process work well for?

the traditional process , although expensive and time consuming works well for static or slowly evolving networks

WAN

wide area network, a private network that connects its different campus locations, usually leased from a common carrier. WANs are for private use of the organization and only carries its network traffic from one campus to another

Single-mode fiber

thin and can carry only one light source

Enterprise Edge

three components that connect campus to the rest of the world

Synchronous transmissions

transmissions are synchronized by an external clock

The equipment on the satellite that relays the signal is known as a

transponderThe transponder merely relays the signal it receives at a different frequency.

ping

troubleshooting mechanism that is used to determine basic connectivity

what are characteristics of DQDB

uce two unidirectional buses carrying data on opposite sirections and each device are connected to both buses and can view all data passing in no th direction frames are generated by a frame generators at both ends of buses those buses are configured in loop but one station has to be the head of both buses

SMDS and addressing

use ITUT E.164 TElephone numbering scheme and use those address to validate authorised users and to ensure that data from.one customer in the public network can not be received by any other customer

Ipconfig/ifconfig

used to find out the specific IP configuration variously affected hosts

Nslookup

used to lookup the specific IP address(es) associated with a domain name for DNS

the synchronous digital hierarchy

used to solve problems that appear with PHD

To use a power budget, 1st we determine the starting power at the transmitter then we subtract all power losses in the transmission system to determine whether the remaining signal power will what?

will be above the minimum power level required at the receiver

Which communications medium is most susceptible to RFI?

wireless

TDM network are hierarchical

with low speed circuit carried by higher speed circuit

Wavelength division multiplexing

works by using lasers to transmit different frequencies of light through the same fiber-optic cable. As with FDM, each logical circuit is assigned a different frequency, and the devices attached to the circuit don't "know" they are multiplexed over the same physical circuit.

General rules of aggregation

• Aggregate demand points inte representative areas • Each zone should have an equal amount of total demand • Place aggregated points at the center of the zone

Internal transportation rates require...

• Annual costs per truck • Annual km per truck • Annual amount delivered • Truck's effective capacity

Key Strategic Decisions

• Appropriate number of facilities • Location of each facility • Size of each facility • Allocating space for products in each facility • Sourcing requirements • Distribution strategies

Less-than-truckload, LTL

• Class rates (standard rates + classification tariff system) • Factors that are involved: product density, difficulty in handling and transportation. liability for damage

Data aggregation

• Customer zone - grid network or clustering technique • Product groups - distribution pattern (picked up at the same spot and destined to the same customer or by logistics characteristics) or product type

Resource allocation

• Determine whether production and packaging is done at the right facility • Plants' sourcing strategies • How much capacity does each plant need to meet seasonal demand

Why network planning?

• Find the right balance between inventory, transportation and manufacturing costs • Match supply and demand under uncertainty by positioning and managing inventory • Utilize resources effectively by sourcing products from the most appropriate manufacturing facility

Potential locations

• Geographical and infrastructure conditions • Natural resources and labor availability • Local interest and tax regulations • Public interest • Resource characteristics • Cost of infrastructure

Warehouse costs depend on...

• Handling costs - labor and utility costs, proportional to annual flow through the warehouse • Fixed costs - typically proportional to warehouse size (capacity) • Storage costs - proportional to average positive inventory levels

Few warehouses

• High margin product • Service not important (or easy to ship express) • Inventory expensive relative to transportation

Inventory positioning

• Identifying stocking points • Selecting facilities that will produce to stock (keep inventory) • Selecting facilities that will produce to order (no inventory)

Many warehouses

• Low margin product • Service very important • Outbound transportation expensive relative to inbound

Network design tools

• Mapping of current supply chain • Data - specifies the cost of your supply chain • Engine tools to solve the problem (optimisation techniques)

Network design

• Number, locations, and sizes of manufacturing plants and warehouses • Assignment of retail outlets to warehouses • Sourcing decisions • Planning horizon is a few years (strategic decision) • Physical configuration and infrastructure of the supply chain • The objective is to balance service level against costs of production/purchasing, inventory carrying, facility, and transportation

Network depends on...

• Potential locations • Service levels • Future demands • Costs

Service level requirements

• Specify a maximum distance between each customer and the warehouse serving it OR • Proportion of customers whose distance to their assigned warehouse is not more than a given distance

Why aggregate?

• The cost of obtaining and processing data • The form in which data is available • The size of the resulting location model • The accuracy of forecast demand (increases)

Complexity of network design problems increase with...

• The number of customers • The number of products • The number of potential locations for warehouses • The number of warehouses located


Set pelajaran terkait

AP Euro Exam Protestant Reformation

View Set

Chapter 11 Mediterranean Society: The Roman Phase

View Set

Stress Management - HES 351 Final

View Set

Selling/Negotiation Exam 1 Review: Ch.5

View Set