Introduction to NOS Networking

blackstartNetworking and Communications

Oct 26, 2013 (4 years and 15 days ago)

116 views


blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

1
-
7


IT

2 Module
2
:
Introduction to
NOS
Networking



O
nline Study Questions




Name
:

Ger Vang



Curr

Questions

Answers

2.
1

Benefits of Networking

1.

What was the driving force behind the
development of compute
r

networks?

desire to share the valuable information

2.

What is print sharing?

shared access by many systems concurrently

3.

What are the benefits of print sharing?

enabled multiple computers to connect
together in order to share files

4.

What is the single most widely used benefit
of computer networks?

e
-
mails

5.

What type of application is Email?

"storage
-
and
-
retrieval"

6.

What identifying information is includ
ed in
an email?

sender, receiver, and time
-
stamp

7.

Where does the email server send
messages for a user when the user’s email
messages are received?

e
-
mail server

8.

True or false, the storage and retrieval
nature of email systems requires that the
reci
pient be connected when email is
received for them.

False

9.

What are the three advantages of Directory
and name ser
v
ices?



A standardized means of naming and
locating resources on a network



Text names are easier to remember
than numeric addresses



Networ
k resources are not bound to a
physical location


10.

How do private networks connect to the
Internet?

ISPs

11.

What issues are the respons
ibility of a

Network administrator?

User administration

12.

What does it mean for a network
administrat
or to do a

“cost
-
benefit
analysi
s”?

As they evaluate new technologies and
requirements, administrators must measure
their benefits against the issues, costs, and
problems the new features may introduce to
the network

13.

Who is responsible for
setting up new user
a
ccounts and services to the monitoring of
Network administrator


blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

2
-
7

network performance and the repair of
network failures
?

2.2

Types of Networks

14.

What is a LAN designed to do?

connect many computers in a relatively small
geographical area such as a home
, an office,
a building, or a campus

15.

What is a WAN designed to do?

Connect computers in a wide area of
geographical location

16.

What is a Star topology?

When all the computers connect to a central
point, or a hub, the network

17.

What is a
Ring

top
ology?

connects the computers in a closed loop,
where a cable is run from one computer to the
next and then from the second to its neighbor
until the last one is connected back to the first

18.

What is a
Bus

topology?

attaches each computer into a single,

long
cable

19.

What is a Star topology?

When all the computers connect to a central
point, or a hub, the network

20.

What topology do most LAN’s use today?

star

21.

What is the definition of the “Medium”?

It is typically a cable that carries electrical

signals through copper, or it may be a fiber
optic cable that carries light signals through
purified glass or plastic

22.

Name three types of Mediums that
computers use to communicate:


Electric signals, light signal, and
satellite

23.

What are the rule
s for coordinating the use
of the medium called?

Media Access Control (MAC)

24.

How many computers can use the medium
at one time?

One

25.

What type of network is used over long
distances?

WAN

26.

What type of communication is used to
create a WAN?

poin
t
-
to
-
point, serial communications

27.

Why is a serial communication line called
Point to Point?

they connect only two devices, one on each
side of the line

28.

How does a serial communication line
work?

the bits of information are transmitted one
after
another in a series, like cars traveling on
a single lane highway

29.

Who is a “Common Carrier”?

communications facilities put in place by the
utility companies

30.

How is a temporary WAN connection
made?

Using a telephone with a dialup line


blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

3
-
7

31.

How can

a company have an “always on”
connection?

If a company wants to transmit data at any
time without having to connect and disconnect
the line each time, the company can rent a
permanent line or circuit from the common
carrier

32.

Which is typically faster,

a “always on” or
dialup connection?

Always on

33.

What special devices do computers need
to connect over a Wan?

Channel Service Unit/Data Service Unit
(CSU/DSU)

34.

What does a CSU/DSU do?

converted into a form that can be transmitted
on the WAN link, w
hich is analog

35.

Which operates faster a WAN or LAN?

LAN

36.

What protocol do two computers typically
use to communicate in a Peer
-
to
-
Peer
network?

request/response

37.

In the request/response protocol what is
the requestor called?

Client

38.

In the
request/response protocol what is
the responder called?

Server

39.

In a peer to peer network, the networked
computers act as ______ partners.

Equal

40.

As peers, what roles or functions can a
computer take on?

take on the client function or the server
fu
nction

41.

What determines if a computer is a client or
a server in a peer to peer network?

The sender is the server and the
receiver is the client

42.

In a peer to peer network, who controls the
resources on the network?

Individual users

43.

Who is res
ponsible for backing up the data
on a peer to peer network?

Individual users

44.

Peer to peer networks work well with how
many computers?

10 or fewer

45.

What are some advantages of Peer to peer
networks?

-
less expensive, does not require NOS server
soft
ware, and does not required dedicate
network administrator

46.

What are some disadvantages of Peer to
peer networks?

Administrations becomes un manageable, less
secure, machines using the resources impact
the performance

47.

What are some advantages of
C
lient/Server networks?

Better security, easier to manage
when network is large, and data can
be backed up on one central location

48.

What is a disadvantages of Client/Server
networks?



Require expensive NOS, require more
powerful and expensive hardware,

require professional administration




2.3

Networking Protocols


blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

4
-
7

49.

What is a Protocol Suite?

Protocol layers

50.

What is a Protocol?

A protocol is a controlled sequence of
messages exchanged between two or more
systems to accomplish a given task

51
.

What is the most popular internet protocol?

TCP/IP

5
2
.

Who defined the TCP/IP suite of protocols?

researchers in the United States Department
of Defense

53.

Name four application protocols:

telnet,
File Transfer Protocol (FTP)
,
Simple
Mail Transport Pr
otocol (SMTP)
,
Domain
Name System (DNS)

54.

What does the Telnet protocol allow you to
do?

enables terminal access to local or remote
systems

and
access remote devices for
configuration, control, and troubleshooting

55.

What does the SMTP protocol allow
you to
do?

provides messaging services over TCP/IP and
supports most Internet e
-
mail programs

56.

What does the DNSP protocol allow you to
do?

provides access to name servers where
network names are translated to the
addresses used by Layer 3 network prot
ocols

57.

Name two Transport protocols:

Transmission Control Protocol (TCP)

and

User
Datagram Protocol (UDP)

58.

What facilities does the TCP protocol
provide?

end
-
to
-
end connection establishment, error
detection and recovery, and metering the rate
of fl
ow of data into the network

59.

What applications use the TCP protocol?

e
-
mail, web browsing, file transfer and Telnet

60.

How does TCP
identify the

application
using it?

"port" number

61.

Which Transport Protocol is connection
oriented?

Transmission Co
ntrol Protocol (TCP)

62.

Which Transport Protocol is connectionless
oriented?

User Datagram Protocol (UDP)

63.

What applications use the UDP protocol?

network management, network file system,
and simple file transport

64.

Which Transport Protocol can to
lerate a
level of data loss?

UDP

65.

Which Internet Protocol provides source
and destination addressing?

Internet Protocol (IP)

66.

Which Internet Protocol is used for network
testing and troubleshooting?

Internet Control Message Protocol (ICMP)

67.

The

Ping application uses what messages
to test remote devices?

Echo

68.

Which Internet Protocol uses hop count to

choose routes?

Routing Information Protocol (RIP)

69.

Which Internet Protocol uses
Open Shortest Path First (OSPF)


blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

5
-
7

characteristics of the links between
networks like bandwidt
h and delay?

70.

Which Internet Protocol is used to discover
the local MAC address of a station when its
IP address is known.

Address Resolution Protocol (ARP)

71.

What is Open Source software?

free and users are not bound

to the copyright
laws that might be broken when using
proprietary software

72.

Who is the leader in the open source
arena?

Linux

73.

What are the advantages of Open Source
software?

Free to public in price and usage, and
it has a faster widespread of
ac
ceptance and growth

74.

What are the disadvantages of Open
Source software?

Lack funding and development, and
more effort required by independent
sources to ensure standardized
progress

75.

What are the advantages of Proprietary
software?

More organized
funding and
development

76.

What are the disadvantages of Proprietary
software?

Copyrighted, slower and more limited
technology growth

77.

Is Microsoft software, open source or
proprietary software?

Proprietary source

2.4

LAN Architectures

78.

What acc
ess control method does the
802.3 standard use?

Ethernet

79.

What does the CD stand for in CSMA/CD?

Collision detection

80.

How does CSMA/CD work?

use a baseband transmission over coaxial or
twisted
-
pair cable that is laid out in a bus
topology (that is,

a linear or star bus
)

81.

What type of topology does 10Base
-
T use?

Star bus

82.

What type of cable is generally used in
10Base
-
T architecture?

unshielded twisted
-
pair (UTP)

and
Shielded
Twisted
-
Pair (STP)

83.

What type of cable is used to connect two
c
omputers directly without a hub?

UTP

84.

What is the most commonly used twisted
pair cabling?

UTP

85.

What are the advantages of UTP cabling?

thin, flexible, and easier to work with than
coax. It uses modular RJ
-
45 plugs and jacks,
so it is easy to conne
ct the cable to the NIC or
hub

86.

What are two disadvantages of UTP
cabling?

maximum length for a 10BASE
-
T segment
(without repeaters) is only 100 meters (about
328 feet). Also, the UTP used is more
vulnerable to electromagnetic interference

blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

6
-
7

(EMI) and at
tenuation than other cable types

87.

What is the transfer rate of 100Base
-
X?

100 Mbps

88.

What three types of cable can be used to
i
m
ple
m
ent
100Base
-
X?

UTP,STP, and fiber optic

89.

What are the advantages of 100Base
-
X?

High speed,
low cost, flexibility,

and ease of
implementation and expansion

90.

What are the disadvantages of 100Base
-

X?

susceptibility to EMI and attenuation. 100
-
Mbps NICs and hubs are generally somewhat
more expensive than those designed for 10
-
Mbps networks

91.

What is another name
for 1000Base
-
T?

Gigabit Ethernet

92.

What are the advantages of 1000Base
-
X?

Performance and
implement bandwidth
-
intensive applications, such as live video,
throughout an intranet

93.

What are the disadvantages of 1000Base
-

X?

those common to all UTP netw
orks

94.

Explain how half duplex works:

Half duplex allows for only one direction that
can be used at a time when data is being
transmitted over the lines. This means that
data can only be sent and received at
separate times

95.

Explain how full duplex w
orks:

allows for two simultaneous directions of data
flow. From Figure

a telephone conversa
tion
between two people is a good example of how
full
-
duplex transmission occurs. In this case,
both people are able to talk and communicate
at the same time, sending signals in both
directions simultaneously

96.

Can hubs support full duplex?

No

97.

Can
switches support full duplex?

Yes

98.

What does “DSL is an always
-
on
technology”?

This means that there is no need to dial up
each time when connecting to the Internet

99.

List five types of DSL service:

Asymmetric DSL (ADSL)
,
High Data Rate DSL
(HDSL)
,
Symmetric DSL (SDSL)
,
Very High
Data Rate DSL (VDSL)
,and
ISDN DSL (IDSL)

100.

What is the most commonly used type of
DSL?

ADSL

101.

What does Upstream refer to?

the process of transferring data from the end
user to the server

102.

What does Downstream r
efer to?

the process of transferring data from the

blackstart_42ac96ce
-
0305
-
4500
-
84af
-
072233265211.doc

Study Guide

7
-
7

server to the end user

103.

What does ADSL use to create multiple
channels?

frequency
-
division multiplexing (FDM)

104.

What is a benefit of ADSL’s ability to
support multiple channels?

can be surfing the

Internet while at the same
time using the telephone to call a friend

105.

What is a cable modem used for?

connects a computer to the cable company
network through the same coaxial cabling that
feeds Cable TV (CATV) signals to a television
set

106.

What
are some disadvantages of DSL?

DSL suffers from distance limitations since
most DSL services currently require the
customer to be within 18,000 feet of the
provider's central office location. Additionally,
the longer and older loops present problems
.

The

u
pstream (upload) speed is usually
considerably slower than the downstream
(download) speed.

107.

Which service has the fastest upload
speed? ISDN, DSL or Cable modem
service?

Cable