MIS 140 Chapter 5 - Chapter 6 Questions

Ace your homework & exams now with Quizwiz!

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. 1. broadcast message 2.DNS request packet 3.SNA packet I 4.PX message

2.DNS request packet

According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20

80

turnpike effect

A ____ results when a network is used to a greater extent than was originally anticipated by the network designer

turnpike effect

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.

botleneck

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n)

hardware manufacturers

A client computer is assigned a data link layer address is by:

A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte

192-bit

The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit

192-bit

An access point plays the same role in a wireless network as a router does in a wired Ethernet network.

False

An access point plays the same role in a wireless network as a router does in a wired Ethernet network. T or F

False

Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP

Telnet

Backbone networks typically use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks.

False

Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point. T or F

False

Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver. True False

False

Ethernet is a layer 3 protocol which operates at the network layer.

False

Ethernet is a layer 3 protocol, which operates at the network layer. T or F

False

Fiber optic cable is thicker and heavier than unshielded twisted pair. T or F

False

Frame relay is a reliable packet service

False

IP is responsible for error-free delivery of packets on a TCP/IP network.

False

IP is responsible for error-free delivery of packets on a TCP/IP network. True False

False

IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet. True False

False

LANs that run on radio frequencies use a type of wired media.

False

Maintaining data integrity is not a primary goal of security.

False

Routed backbones use switches that move packets based on data link layer addresses.

False

STP cable is the least costly type of cable used in today's networks and is the most commonly used cable type in connecting computers to switches. T or F

False

Store and forward switching may only be used when the incoming and outgoing data circuit have the same data rate. T or F

False

TCP is the network layer protocol used on the Internet today. True False

False

TCP/IP is a data link protocol that is used on the Internet.

False

TCP/IP is a data link protocol that is used on the Internet. True False

False

TCP/IP operates only as connection-oriented. True False

False

The DCF function of Wi-Fi resolves the hidden node problem. T or F

False

The Internet is flat in structure.

False

The NOS software for the server computer provides the physical, data link, and network layer functions. T or F

False

The Network Interface Card (NIC) permits a computer to be physically connected to a network's cable. T or F

False

The cable to connect BNs is usually twisted pair.

False

The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network.

False

The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. True False

False

The maximum data rate of 802.11b LANs is 12 Mbps. T or F

False

The network layer is responsible for end-to-end delivery of the message.

False

The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.

False

The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model. T or F

False

The primary goal of the needs analysis step in network design is to develop a physical network design.

False

The primary goal of the needs analysis step in network design is to develop a physical network design. T or F

False

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

False

The standard port number for Telnet is 53. True False

False

The standard port number for Telnet is 53. T or F

False

The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps. T or F

False

There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing. True False

False

Today, the most expensive part of the network is the hardware.

False

Today, the most expensive part of the network is the hardware. T or F

False

When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible. T or F

False

When using dynamic routing, routing decisions are always made by a central host or server. T or F

False

Wireless LANs are never connected to a wired network. T or F

False

Wireless LANs do not share the bandwidth capacity of the wireless network. T or F

False

Wireless LANs use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medic access control. T or F

False

The standard port number for Telnet is 53

False - 23

A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a ___________.

Forest

In_____geometric layout for a network, every computer is connected to every other computer often by point to point dedicated circuites/

Full Mesh

baseline

Gaining an understanding of the current application system and messages provides a ____ against which future design requirements can be based on

baseline

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.

Benefits of Dynamic Addressing

Greatly simplifies network management in non dial up networks too. Changes need to be made only to the DHCP server not to each individual computer.

A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. T or F

True

An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address of a host whose IP address is known but whose MAC address is unknown. T or F

True

An access point (AP) is required to connect a WLAN to a wired network. T or F

True

An access point ensures that all computers within range of the access point can communicate with each other. T or F

True

An autonomous system is a network operated by one organization. True False

True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. True False

True

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

True

Common Carriers sell or lease communication services and facilities to the public.

True

Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point.

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

True

Directional antennas produce a stronger signal over longer distances that omnidirectional antennas.

True

Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before transmitting any more packets. T or F

True

Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. True False

True

It takes 802.11a more access points to provide the same coverage as one 802.11b access point. T or F

True

Many network hubs and switches incorporate repeaters to regenerate signals so that attenuation of the signal does not occur. T or F

True

One of the most important functions of a network Operating System is a directory service.

True

Physical topology refers to the geometric layout of the network and describes how the computers are interconnected. T or F

True

Point Coordination Function requires that each station that wishes to transmit on the wireless network sends a request to transmit packet to the access point and waits for a clear to send packet from the AP before it can communicate with other nodes on the network.

True

Quality of Service routing is a special type of routing in which different connections are assigned different priorities. T or F

True

Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. T or F

True

Simulation is a tool that can be used in designing networks. T or F

True

Source port address is the logical address used to identify the application that is sending the data. True False

True

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. True False

True

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. T or F

True

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False

True

The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco. True False

True

The TCP portion of TCP/IP performs linking to the application layer. T or F

True

The campus backbone is usually faster than the backbones used inside buildings.

True

The data link layer address is generally encoded in a network card by the card's manufacturer. True False

True

The data link layer protocols used by wireless LANs are similar to the ones used on Ethernet LANs. T or F

True

The frequency ranges of some access points are the same as some cordless telephones.

True

The frequency ranges of some access points are the same as some cordless telephones. T or F

True

The most common protocol for dynamic addressing in TCP/IP networks is the Dynamic Host Configuration Protocol. True False

True

The most common type of DSL today is ADSL.

True

Tier 1 service providers connect together and exchange data at IXPs.

True

WAN's can connect BNs accross distances that can span up to thousands of miles.

True

When a switch receives an Ethernet frame with a destination address that is not in its forwarding table, the switch will broadcast the frame out all of its other ports. T or F

True

Wired Equivalent Privacy requires that each user have a prefigured key in order to communicate with an access point.

True

The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First

Internet Control Message Protocol

IGMP refers to: 1.Internet Giga Memory Parameters 2.Interchange Group Management Parameters 3.Internet Guided Meta Protocol 4.Internet Group Management Protocol 5.Interchange Guided Meta Protocol

Internet Group Management Protocol

IGMP refers to: a. Internet Giga Memory Parameters b. Interchange Group Management Parameters c. Internet Guided Meta Protocol d. Internet Group Management Protocol e. Interchange Guided Meta Protocol

Internet Group Management Protocol

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint.

Internet Service Providers

Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough.

Intrusion

Which of the following is not true about CSMA/CD?

It is used in token ring protocol LANs

Which of the following is not a component of a router? a. CPU b. Interface c. Memory d. Keyboard e. Port

Keyboard

The network architecture component which enables users to access the network is the

LAN

The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN

LAN

_____________ is the software that controls the network.

Network Operating System

True

Networks requirements can be divided into mandatory, desirable, and wish-list requirements.

__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales

Reviewing the NFL scores

A _____ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point to point dedicated circuits.

Ring Design

A subnetted or hierarchical backbone can also be called.

Routed Backbone

___________ is the process of determining the path that a message will travel from sending computer to receiving computer.

Routing

___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing

Routing

RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol

Request for Proposal

__________ is not an important consideration when network designers review old and new applications.

Reviewing the NFL scores

In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs.

Technology Design

The most expensive part of any network is the hardware

Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks?

ergonomic chairs for users

Which of the following is not a main item for which network designers estimate costs for the proposed network?

unnecessary requirements

Which of the following is not a way in which network requirements, identified in the needs analysis of the building-block network design process, are organized?

specifications for a particular lighting fixture in the network operating center

Which of the following is not an example of a building block used in technology design?

specifications for a particular lighting fixture in the networking operating center

Which of the following is not an example of a building block used in technology design?

an application will have drop down menu choices

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?

Much of the video processing on computers can be off-loaded from the CPU onto high-end video cards.

Which of the following is not directly contributing to the dramatic increase in network traffic today?

specific routers that have been chosen to implement the proposed network

Which of the following is not included in the key deliverable for the needs assessment stage of the building-block network design process, the set of logical network diagrams?

in designing LAN networks, network designers tend to err on the side of building too small a network

Which of the following is not true about network design

In designing LAN networks, network designers tend to err on the side of providing for less capacity than what is currently necessary

Which of the following is not true about network design?

classes of service

With QoS routing different __________ are defined, each with different priorities.

distance vector

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.

A (n) ______ is a special type of virus that spreads itself without human intervention.

Worm

reviewing the NFL scores

____ is not an important consideration when network designers review old and new applications

simulation

____ is used to model the behavior of the planned communication network once the proposed network map is complete

circuit loading

____ refers to the amount of data transmitted on a circuit

Address Resolution Protocol

_________ is a specially formatted request used to perform IP address to data link address resolution.

Reviewing the NFL scores

__________ is not an important consideration when network designers review old and new applications.

routing

__________ is not an important function of the transport layer.

Server name resolution

___________ is the translation of application layer addresses into IP addresses.

circuit loading

___________ refers to the amount of data transmitted on a circuit.

Static routing

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.

Link state

_______________ is a type of dynamic routing.

bottleneck

a circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as

true

a traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. T/F?

80 percent

according to one rule of thumb ____ percent of circuit loading information is easy to gather

Which of the following is not an effective way to reduce LAN network demand:

add hidden nodes

The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented

after the vendor(s) are selected

Static Routing

all computers or routers in the network make their own routing decisions following a formal routing protocol

100Base-T:

all of the answers are correct

centralized routing

all routing decisions are made by one central computer or router

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices

an application will have drop down menu choices

How does dynamic Addressing work?

an approach in which a server is designated to supply a network layer address to a computer each time the computer connects to the network

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet

application layer address

ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes

approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet

How can a set of 802.11b access points be configured to operate without interference?

assigning each access point a different channel to communicate with clients

Gaining an understanding of the current application system and messages provides a ____ against which future design requirements can be based on

baseline

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP

baseline

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n)

bottleneck

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) a. bottleneck b. building backbone c. breakneck d. congested network e. e-commerce edge

bottleneck

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet

broadcast message

The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN

building backbone

the network architecture component that is sometimes referred to as the distribution layer is the ____

building backbone

Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network

building-block

The type of logical topology that hub-based Ethernet uses is a:

bus

100 Base-T:

can run at either full- or half-duplex

Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks

can solve many updating headaches for network managers who have large, growing, changing networks

Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs

capacity planning

estimating the size and type of the standard and advanced network circuits is called ____

capacity planning

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing

centralized, static routing, and dynamic routing

With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses

classes of service

A(n) _____________ is not a common type of dedicated server.

collision server

Routers:

connect different IP networks or subnetworks.

A TCP connection is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless

connection-oriented

A TCP three-way handshake is used to establish a ___________ messaging method.

connection-oriented

A star architecture:

connects all computers to one central computer that routes messages to the appropriate computer.

Media access control refers to:

controlling access to a media by more than one computer in a LAN

In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

cost assessment

in ____ the network designer considers the relative cost of the technologies

cost assessment

true

cost assessment is the step in the network design in which many complex factors related to costs are documented.

Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system

cost of advertising brochures for new products to be offered by an organization

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b.255.255.255.0 c.255.0.0.0 d.255.255.0.0

d.255.255.0.0

The ___________ is where the organization housing its primary servers.

data center

The network architecture component which contains the organization's servers is called the a. LAN b. building backbone c. data center d. enterprise edge e. WAN

data center

The network architecture component which contains the organizations servers is called the ____

data center

QoS (Quality of Service)

different classes of service are defined, each with different priorities.

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.

directional

There are some network modeling tools that can ________ the existing network.

discover

There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement

discover

Encryption is the process of:

disguising information by the use of mathematical rules, known as algorithms

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state

distance vector

Which of the following is not a type of hardware device that can be used to interconnect networks.

dumb terminals.

The _____ contains the servers that are designed to serve data to customers and suppliers.

e-commerce edge

The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the a. LAN b. building backbone c. data center d. enterprise edge e. e-commerce edge

e-commerce edge

the network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization.... business with is called the ____

e-commerce edge

connectionless messaging

each packet is treated separately and makes its own way through the network. UDP due to being small

Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers

ergonomic chairs for users

capacity planning

estimating the size and type of the standard and advanced network circuits is called ____

The transport layer routes messages through the network selecting the best path from the source to the destination station. True False

false

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.

file server

Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture

focus on the growth in network use

Which of the following is a mode in which a switch reads in the first 64 bytes of the Ethernet frame and then begins forwarding out the frame on an outgoing port?

fragment-free switching

A client computer is assigned a data link layer address is by:

hardware manufacturers

A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO

hardware manufacturers

The newer form of IP, version 6 (IPv6):

has an increased address size from 32 bits to 128 bits

The newer form of IP, version 6 (Ipv6):

has an increased address size from 32 bits to 128 bits

The newer form of IP, version 6 (Ipv6): a. Is running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header

has an increased address size from 32 bits to 128 bits

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the:

hidden node problem

Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer

implementation

Which of the following is not one of the three major steps used in of the building-block process to network design?

implementation and maintenance

needs analysis

in ____ the network designer attempts to understand the fundamental current and future network needs of the various users

cost assessment

in ____ the network designer considers the relative cost of the technologies

the goal is to understand what users and applications the network will support

in need analysis:

true

in technology design a network designer looks at available technologies to see which options will satisfy users needs.

the decisions for fundamental tech/protocols and circuit capacity are interrelated

in the technology design stage of network design

To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors

issue an RFP to vendors

Wired Ethernet is becoming a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products.

legacy

Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice

list of wish list requirements

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.

logical network design

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design

logical network design

___________ is how the network works conceptually.

logical topology

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

much more

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more

much more

A special type of message that is used when sending the same message to a specific group of computers is called a:

multicast message

A special type of message that is used when sending the same message to a specific group of computers is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message

multicast message

IP addresses from 224 to 239 belong to Class D and are reserved for a. the government b. ISPs c. multicasting d. broadcasting e. private networks

multicasting

The building block design approach is sometimes called:

narrow and deep

The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat

narrow and deep

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

needs analysis

in ____ the network designer attempts to understand the fundamental current and future network needs of the various users

needs analysis

true

network requirements can be divided into mandatory desirable and wishlist requirements.

Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer

non-necessary requirements

building block

nowadays most organizations use a simpler approach to network design called the ____ approach

__________ antennas transmit the signal in all directions.

omnidirectional

The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings

packets

TCP/IP:

performs packetizing, as well as routing and addressing functions

TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures

performs packetizing, as well as routing and addressing functions

IP:

performs routing functions

IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions

performs routing functions

A logical bus topology:

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.

point-to-point

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: a. data link layer address b. port address c. application layer address d. network address e. IP address

port address

The server version of the Network Operating System does not:

provide the software that performs the functions associated with the physical layer

The traditional network design approach does not work well for _________ networks.

rapidly growing

The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing

rapidly growing

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer

routing

Dynamic Routing

routing decisions are made in a decentralized manner by individual computers

An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing

routing decisions are simple

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

routing table

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table

routing table

The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table

routing table

Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?

security (relative to fiber)

Breaking a network into smaller parts is called network:

segmentation

TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

sequence numbers

TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value

sequence numbers

true

simulation is a tool that can be used in designing networks.

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network

specific routers that have been chosen to implement the proposed network

Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center

specifications for a particular lighting fixture in the network operating center

A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network.

storage area network

A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net

subnet

In ____ the network designer examines the available technologies and assesses which options will meet the users needs

tech design

In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design

technology design

narrow and deep

the building block design approach is sometimes called

In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage

the decisions for fundamental technology/protocols and circuit capacity are interrelated

In needs analysis:

the goal is to understand what users and applications the network will suppor

In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue

the goal is to understand what users and applications the network will support

logical network design

the goal of the needs analysis is to produce a ____ or a statement of the network elements necessary to meet the needs of the ....

false

the goal of the needs analysis step in network design is to develop a physical network design.

e-commerce edge

the network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization.... business with is called the ____

building backbone

the network architecture component that is sometimes referred to as the distribution layer is the ____

What does NOS do?

the software that controls the network. Server and Client software (Active directory)

true

the step of understanding current traffic on a network provides a baseline against which future network requirements can be compared.

rapidly growing

the traditional network design approach does not work well for ____ networks

discover

there are some network modeling tools that can ____ the existing network

Which of the following is not a purpose for using hubs in a network?

to act as a communications server

total characters transmitted per day on each circuit or if possible the number of characters transmitted per two second interval

to establish circuit loading the designer usually starts with the

issue an RFP to vendors

to estimate costs for a large network purchases, organizations ofte

Address Resolution

to send a message, the sender must be able to translate the application layer address of the destination into a network layer address and in turn translate that into a data link address.

true

today many organizations design networks using the building block approach.

true

today most network designers use a three to five year planning horizon.

false

today the most expensive part of the network is the hardware.

To establish circuit loading, the designer usually starts with the:

total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

transport

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. physical transport session presentation data link

transport

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link

transport

An OC-1 circuit provides a data rate of 155 mbps

true

The TCP portion of TCP/IP performs linking to the application layer. True False

true

A ____ results when a network is used to a greater extent than was originally anticipated by the network designer

turnpike effect

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan

turnpike effect

A type of message that is used when sending a message from one computer to another computer is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message

unicast message

To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can:

upgrade to a bigger circuit

Switch-based Ethernet:

usually enables all attached circuits to send or receive packets simultaneously

Fiber to the Home uses

wavelength division multiplexing

The source destination port identifier tells the destination station _____________.

which application layer process the packet is from.

The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer.

which application layer process the packet is from.

cost of advertising brochures for new products to be offered by an organization

which of the following are not costs that are generally considered during the cost assessment stage of the network design process

list of wish list requirements

which of the following is not a key deliverable for the cost assessment step?

an analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the....

which of the following is not a step under the traditional network design approach

implementation

which of the following is not a step used in newer types of network design processes?

non necessary requirements

which of the following is not a way in which network requirements identified in the needs analysis of the network design process are organized?

client computers today can have 2GB of RAM a 300 GB hard drive and 2Ghz processors

which of the following is not contributing to the dramatic increase in network traffic today?

specific routers that have been chosen to implement the proposed network

which of the following is not included in the key deliverable for the needs assessment stage the set of logical network diagrams

ethernet

which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.

wireless NIC

A(n) _____________ is used in a computer to connect it to a WLAN.

wireless NIC

An application layer address using TCP/IPv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3

www.cba.uga.edu

A typical TCP packet has a _______ header of control information.

192-bit

The maximum data rate of a an 802.11ad WLAN is

7Gbps

According to one rule of thumb, ______ percent of circuit loading information is easy to gather.

80

True

Capacity planning is used to design circuit capacity.

CSMA/CA is an acronym for:

Carrier Sense Multiple Access with Collision Avoidance

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps.

1.5

The data rate for a T-1 circuit in North America is

1.544Mbps

A type of message that is used when sending a message from one computer to another computer is called a: 1.unicast message 2.multicast message 3.broadcast message 4.guided message 5.radiated message

1.unicast message

________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T.

10/100/1000 Ethernet

The _____ address range is reserved for a computer to communicate with itself and is called the loopback. 121 127 239 254

127

The _____ address range is reserved for a computer to communicate with itself and is called the loopback. a. 121 b. 127 c. 239 d. 254 e. 111

127

An application layer address using TCP/IPv4 looks like:

128.192.78.5

IPv6 is based upon _________ -byte addresses

16

IPv6 is based upon _________ -byte addresses. 32 24 4 16 8

16

IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8

16

The ping command uses the most basic interior routing protocol on the Internet, which is the: 1.Border Gateway Protocol 2.Internet Control Message Protocol 3.Routing Information Protocol 4.Enhanced Interior Gateway Routing Protocol

2.Internet Control Message Protocol

A TCP three-way handshake is used to establish a ___________ messaging method. 1.asynchronous 2.connection-oriented 3.frequency division 4.application net 5.connectionless

2.connection-oriented

A(n) ________ refers to a group of computers that are logically grouped together by IP number. 1.IPv6 group 2.subnet 3.data link group 4.TCP group

2.subnet

broadcasting

255 are reserved for broadcastin

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

255.255.0.0

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255

255.255.0.0

______________ communication is most commonly used when the application data or message can fit into one single packet. 1.Frame-oriented 2Connection-oriented 3.Connectionless 4.Physical-oriented

3.Connectionless

___________ is the translation of application layer addresses into IP addresses. 1.Network interface card reversal 2.IPv6 3.Server name resolution 4.Subnet masking

3.Server name resolution

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. 1.Adaptive routing 2.Dynamic routing 3.Static routing 4.Distance vector routing

3.Static routing

One drawback to dynamic routing is: 1. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages 2. It cannot be used with non-government networks 3.The transmission of status information "wastes" network capacity that could be used to send user messages 4.It is the job of the network manager, not the computers or devices themselves, to maintain the routing table.

3.The transmission of status information "wastes" network capacity that could be used to send user messages

ICANN: 1.developed the IPX/SPX network layer protocol 2.assigns data link layer addresses 3.approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet 4.developed X.25 network layer protocol

3.approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: 1.unicast message 2.multicast message 3.broadcast message 4.guided message

3.broadcast message

IP addresses from 224 to 239 belong to Class D and are reserved for 1. the government 2.ISPs 3.multicasting 4.broadcasting 5.private networks

3.multicasting

IP addresses from 224 to 239 belong to Class D and are reserved for 1.the government 2.ISPs 3.multicasting 4.broadcasting

3.multicasting

An advantage of centralized routing is: 1.routing does reflect changing network conditions, such as computers that are overloaded by many messages 2.if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function 3.routing decisions are simple 4.the routing tables are stored at all computers in the network

3.routing decisions are simple

The source port identifier of the received TCP segment tells the destination station _____________. 1.which computer sent the TCP packet. 2. which application layer program that the packet should be sent 3.which application layer process the packet is from. 4.the IP address of the source computer.

3.which application layer process the packet is from.

IPv4 uses ________ bytes per Internet address

4

IPv4 uses ________ bytes per Internet address.

4

IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16

4

IPv4 provides ___________ IP addresses. a. 4.3 billion b. 144 million c. 64 billion d. 3.14 billion e. 1 million

4.3 billion

UDP is not commonly used for: 1.network management control messages 2.RIP messages 3.DHCP addressing messages 4.HTTP requests 5.DNS requests

4.HTTP requests

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. 1.network layer address resolution 2.one way handshake 3.SNA message 4.TCP connection

4.TCP connection

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. 1.physical layer packet 2.multicast message 3.X.25 message 4.broadcast message

4.broadcast message

Server name resolution is done using the: 1.Address Resolution Protocol 2.Border Gateway Protocol 3.Internet Control Message Protocol 4.Routing Information Protocol 5.Domain Name Service

5.Domain Name Service

The three fundamental approaches to routing are: 1.circuitous, flat, and direct routing 2.connectionless, static, and connection-oriented 3.subordinate, master, and insubordinate routing 4.host, client, and client-server routing 5.centralized, static routing, and dynamic routing

5.centralized, static routing, and dynamic routing

The maximum data rate of an 802.11g WLAN is

54 Mbps

SYN

A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection

multicast message

A special type of message that is used when sending the same message to a specific group of computers is called a:

broadcast message

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:

255.255.0.0

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

True

A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications.

unicast message

A type of message that is used when sending a message from one computer to another computer is called a:

192-bit

A typical TCP packet has a _______ header of control information.

connection-oriented

A virtual circuit is established in the ___________ routing method.

subnet

A(n) ________ refers to a group of computers that are logically grouped together by IP number.

Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.

Answer: True

The ______ defines what type of packets should be routed and what types of packets should be discarded. a. ACL b. AFL c. TCP d. IOS e. OSI

ACL

_________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization. a. TCP/IP b. ARPANET c. ARIN d. AIS e. OSPF

ARIN

________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization. TCP/IP ARPANET ARIN AIS

ARIN

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.

ARPANET

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox

ARPANET

80

According to one rule of thumb, ______ percent of circuit loading information is easy to gather.

_________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request

Address Resolution Protocol

Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.

www.cba.uga.edu

An application layer address using TCP/Ipv4 looks like:

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer

Answer: C

1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable. T or F

False

An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing

Answer: C

One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.

Answer: C

*___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding

Answer: C

The newer form of IP, version 6 (Ipv6) is: a. running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header

Answer: C

A VLAN network assigns computers to LAN segments by hardware.

False

*___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing

Answer: A

A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO

Answer: A

IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16

Answer: A

In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection

Answer: A

The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table

Answer: A

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox

Answer: A

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet

Answer: A

*A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless

Answer: B

*A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net

Answer: B

*An application layer address using TCP/Ipv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3

Answer: B

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table

Answer: B

TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value

Answer: B

TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures

Answer: B

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link

Answer: B

The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First

Answer: B

*A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection a. ACK b. NAK c. SYN d. ARQ e. FIN

Answer: C

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing

Answer: C

*The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings

Answer: D

*_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net

Answer: D

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255

Answer: D

IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions

Answer: D

IPv6 will be based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8

Answer: D

_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25

Answer: D

*Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service

Answer: E

*The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing

Answer: E

Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks

Answer: E

IP is responsible for error-free delivery of packets on a TCP/IP network.

Answer: False

IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.

Answer: False

TCP is the network layer protocol used on the Internet today.

Answer: False

TCP/IP is a data link protocol that is used on the Internet.

Answer: False

The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits.

Answer: False

The network layer address for IP is ten bytes long when using IPv4.

Answer: False

The network layer is responsible for end-to-end delivery of the message.

Answer: False

The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.

Answer: False

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

Answer: False

The transport layer routes messages thought the network selecting the best path from the source to the destination station.

Answer: False

There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing.

Answer: False

When using dynamic routing, routing decisions are always made by a central host or server.

Answer: False

An example of an application layer address is www.indiana.edu

Answer: True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller packets.

Answer: True

Domain Name Servers provide the equivalent of directory assistance for application layer addresses.

Answer: True

Part of the function of address resolution is translating the application layer address of the destination into a network layer address.

Answer: True

Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient.

Answer: True

Several different protocols exist that specify how network and/or transport layer packets are organized.

Answer: True

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet.

Answer: True

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order.

Answer: True

The TCP portion of TCP/IP performs linking to the application layer.

Answer: True

The data link layer address is generally encoded in a network card by the card's manufacturer.

Answer: True

The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host Control Protocol.

Answer: True

The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer

Answer: True

To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application layer port addresses to distinguish among many open applications on a computer

Answer: True

A multicast message can be used to send a message to a maximum of two other computers. True False

False

port address

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:

Nowadays, most organizations use a simpler approach to network design called the ___________ approach.

Building Block

In a quickly evolving network, which design method is recommended?

Building block approach

A _______ is a device that permits a customer to connect to a digital T Carrier service.

CSU/DSU

___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation

Circuit loading

A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System

Cisco Internetwork Operating System

Multicasting

Class D (224 to 239) is used for multicasting transmitting data to multiple computers

Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common.

Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors.

______are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANS and MANS.

Common Carriers

_____________ routing is a method of routing in which each packet makes its own way through the network.

Connectionless

_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net

Connectionless

______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented

Connectionless

In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technologies.

Cost Assesment

True

Cost assessment is the step in the network design in which many complex factors related to costs are documented.

True

Cost assessment is used to look at the relative cost of technologies used in a network design.

true

Cost assessment is used to look at the relative cost of technologies used in a network design.

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers.

DMZ

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet

DNS request packet

Data traffic from the DSL customer premises is sent to a __________ which is located at the local carrier's end office.

DSLAM

A multicast message can be used to send a message to a maximum of two other computers. T or F

False

A routing protocol used inside an autonomous system is called an exterior routing protocol. True False

False

Which of the following is not a technology layer that is considered when designing backbone networks.

Decntralized layer

__________ provide authentication which can legally prove who sent a message over a network.

Digital Signatures

A routing protocol used inside an autonomous system is called an exterior routing protocol. T or F

False

A switch always broadcasts all the packets it receives to all the computers that are connected to the switch. T or F

False

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.

Directory Services

Server name resolution is done using the:

Domain Name Service

Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service

Domain Name Service

can solve many updating headaches for network managers who have large, growing, changing networks

Dynamic addressing:

much more

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

Capacity Planning

Estimating the size and type of the "standard" and "advanced" network circuits is called _________.

Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA

Ethernet

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps

Ethernet

What is a subnet? What is a subnet mask?

Group of computers on the same LAN with IP numbers using the same prefix Assigned addresses that are 8 bits in length Used to make it easier to separate the subnet part of the address from the host part.

UDP is not commonly used for: a. network management control messages b. RIP messages c. DHCP addressing messages d. HTTP requests e. routing control messages

HTTP requests

Internet Group Management Protocol

IGMP refers to:

performs routing functions

IP:

Describe the difference between an IPv4 and IPv6 packet

IPv4 is 32 bits (4 bytes) and IPv6 is 128 bits (16 bytes) hexadecimal

4

IPv4 uses ________ bytes per Internet address. Answer

16

IPv6 will be based upon _________ -byte addresses.

the decisions for fundamental technology/protocols and circuit capacity are interrelated

In the technology design stage of network design,

tech design

In ____ the network designer examines the available technologies and assesses which options will meet the users needs

transport

In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.

Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network

In designing LAN networks, network designers tend to err on the side of building too small a network

routing table

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

the goal is to understand what users and applications the network will support

In needs analysis:

True

In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.

needs analysis

In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

technology design

In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs

technology design

In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs.

seven network architecture components.

LANs (wired and wireless) provide users access to the network (access layer). Building backbones (distribution layer) connect the LANs inside one building. Campus backbones (core layer) connect the different buildings. The data center houses the organization's main servers. At the enterprise edge, we have WAN access that connects to other campuses operated by the organization, Internet access, and the e-commerce edge, which enables a business to support its customers and/or suppliers.

_______________ is a type of dynamic routing.

Link state

_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing

Link state

Associated with a switched backbone, MDF is an acronym for:

Main Distribution Facility.

In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

Needs analysis

False

Needs analysis is the final step in the building block approach to network design.

false

Needs analysis is the final step in the building block approach to network design.

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.

The transmission of status information "wastes" network capacity that could be used to send user messages

One drawback to dynamic routing is:

A(n) ____________ examines the source and destination address of every network packet that passes through it.

Packet Level Firewall

__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer

Peak circuit traffic

__________ has led to the belief that the Internet is "free".

Peering

A _________ is the place at which the ISP provides services to its customers.

Point of Presence

Unicasting

Point-to-point transmission with exactly one sender and exactly one receiver

Request for Proposal

RFP stands for:

___________ is the translation of application layer addresses into IP addresses.

Server name resolution

___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding

Server name resolution

Domain Name Service

Server name resolution is done using the:

____ is the process of creating several logically separate servers on the same physical computer.

Server virtualization

connection-oriented messaging

Sets up a TCP connection (also called session) between the sender and receiver. 3 Way and 4 way handshake

________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users

Simulation

True

Simulation is a tool that can be used in designing networks.

false

The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing

Static routing

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

Subscriber

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request

TCP connection

sequence numbers

TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world.

TCP/IP

_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. SDLC SNA IPX/SPX TCP/IP

TCP/IP

_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25

TCP/IP

performs packetizing, as well as routing and addressing functions

TCP/IP:

A hop in a routing calculation is defined as one link or circuit. True False

True

A hop in a routing calculation is defined as one link or circuit. T or F

True

transport

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

routing table

The _____________ is used by a computer to determine how messages will travel through the network.

False

The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network.

True

The campus backbone is usually faster than the backbones used inside buildings.

false

The goals in the needs analysis step of network design are exactly the same when designing LANs vs when designing WANs.

False

The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs.

after the vendor(s) are selected

The large network purchases are done:

A switch can send and receive on all circuits simultaneously.

True

A switch can send and receive on all circuits simultaneously. T or F

True

Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks?

The most expensive part of any network is the hardware

Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware

The most expensive part of any network is the hardware

building backbone

The network architecture component that is sometimes referred to as the distribution layer is the

data center

The network architecture component which contains the organizations servers is called the ____

LAN

The network architecture component which enables users to access the network is the

has an increased address size from 32 bits to 128 bits

The newer form of IP, version 6 (Ipv6) is:

Internet Control Message Protocol

The ping command uses the most basic interior routing protocol on the Internet, which is the:

False

The primary goal of the needs analysis step in network design is to develop a physical network design

which application layer process the packet is from.

The source destination port identifier tells the destination station _____________.

True

The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared

Compare and contrast the three types of addresses used in a network.

The three types of addresses used in a network are the application layer, network layer and the Data link layer. When users work with application software, they typically use the application layer address. Application software that used Internet addresses (e.g., ). This is an application layer address. When a user types an Internet address into a Web browser, the request is passed to the network layer as part of an application layer packet formatted using the HTTP protocol. The network layer software, in turn, uses a network layer address. The network layer protocol used on the Internet is IP, so this Web address ( ) is translated into an IP address that is 4 bytes long when using IPv4 (e.g., 129.79.127.4). This process is similar to using a phone book to go from someone's name to his or her phone number. The network layer then determines the best route to transmit the data. Now the data link layer protocol is used which attaches an Ethernet address frame to the packet which contains the MAC address of the receiver computer. This Mac address is examined with many computers over the network until it reaches its target Ethernet address or Computer.

rapidly growing

The traditional network design approach does not work well for _________ networks.

One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.

The transmission of status information "wastes" network capacity that could be used to send user messages

Explain how linking occurs between the Transport layer of the OSI model and the Application layer

The transport layer accepts outgoing messages from application layer and segments them for transmission.

packets

The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.

False

The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.

discover

There are some network modeling tools that can ________ the existing network.

Why is it important to "sell" a proposal to management?

To Discuss growth in network and focus on network reliability.

total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

To establish circuit loading, the designer usually starts with the:

issue an RFP to vendors

To estimate costs for large network purchases, organizations often:

False

Today, all network traffic is due to traffic from internal application systems.

True

Today, many organizations design networks using the building-block approach.

True

Today, most network designers use a three to five year planning horizon.

False

Today, the most expensive part of the network is the hardware.

What is TCP and describe the fields of a TCP packet?

Transmission Control Protocol. It consists of Source Port and Destination Port fields (16 bits each)

ARPANET

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.

802.11a LANs provide more channels than 802.11b LANs. T or F

True

802.11a provides for speeds of up to 54 Mbps under perfect conditions. T or F

True

802.11n LANs operate at speeds up to 600 Mbps. T or F

True

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.

True

A backbone network is a high speed network that connects many networks.

True

A collision on a bus circuit means that two computers on that circuit have transmitted at the same time. T or F

True

A forwarding table tells a switch which port it should send out a packet to get to the destination computer. T or F

True

HTTP requests

UDP is not commonly used for:

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.

DNS request packet

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.

Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities

When a variety of devices are used in a network, it takes less time to perform network management activities

false

When obtaining the support of senior management for a proposed network, it is important to use as much technical jargon as possible.

False

When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.

When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities

Which of the following is false about staff costs for a network?

UDP

Which of the following is not a protocol used at the application layer.


Related study sets

BUSMHR 4490 Quiz 2 (Chapters 6-9)

View Set