Chapters 1 and 2

navybeansvietnameseNetworking and Communications

Oct 24, 2013 (3 years and 9 months ago)

1,751 views

NW170 Assignment #1

Due Date:
02/05/2010


Chapters 1 and 2


Short Answer



1.

(Chapter 1) Describe the advantages client/server networks offer over peer
-
to
-
peer networks.



2.

(Chapter 1) Describe license tracking in networks.



3.

(Chapter 1) Besides an
aptitude for logical and analytical thinking, describe additional skills
desirable in the networking field.



4.

(Chapter 1) Describe what is meant by soft skills and explain why they are important in networking
projects.



5.

(Chapter 1) Describe four ben
efits of becoming certified.



6.

(Chapter
2
) Describe the OSI model Session layer’s functions.



7.

(Chapter
2
) Describe a network address including its addressing scheme, formats and alternate
names.



8.

(Chapter
2
) Describe the role of Network layer pr
otocols including the formation of packets, routing
and factors considered in routing decisions.



9.

(Chapter
2
) Describe how error checking is handled in the Data Link layer.



10.

(Chapter
2
) Briefly describe IEEE’s Project 802.
NW170 Assignment #
2


Due
Date:
02/12/2010


Chapters
3

and
4


Short Answer



1.

(Chapter 3) Describe two benefits of digital signaling that make it worthwhile even though extra
signaling pulses are involved.



2.

(Chapter 3) Describe what FDM (frequency division multiplexing) is an
d how it works.



3.

(Chapter 3) Explain the makeup of coaxial cable.



4.

(Chapter 3) Explain the makeup of twisted pair wire.



5.

(Chapter 3) Describe the advantages of twisted pair wiring.



6.

(Chapter 4) Describe the Time to Live (TTL) field in an IP

datagram.



7.

(Chapter 4) Describe how ARP improves efficiency of MAC
-
to
-
IP address mappings.



8.

(Chapter 4) Explain one way in which BOOTP and RARP are similar. Then describe two ways in
which they are different.



9.

(Chapter 4) Describe the DHCP lea
sing process.



10.

(Chapter 4) Define and describe Zeroconf (Zero Configuration).
NW170 Assignment #
3


Due Date:
02/19/2010


Chapters
5

and
6


Short Answer



1.

(Chapter 5) Explain why it is important to understand logical topologies.



2.

(Chapter 5) Exp
lain how the distributed backbone is connected. Include a description of its benefits.



3.

(Chapter 5) Briefly explain how CSMA/CD works.



4.

(Chapter 5) Within an Ethernet frame, describe the FCS (Frame Check Sequence) field and explain
how it is used t
o make the header.



5.

(Chapter 5) Briefly describe the Ethernet SNAP frame type. Include an explanation of the drawback
that keeps it from being implemented on networks instead of Ethernet _II frames.



6.

(Chapter 6) Define wireless NICS. Include a desc
ription of disadvantages with their use.



7.

(Chapter 6) Describe how a bridge translates between two segment types.



8.

(Chapter 6) Explain why network engineers value VLANs. Include a discussion on reasons for using
VLANs.



9.

(Chapter 6) Describe a d
istance
-
vector routing protocol suited to WANs.



10.

(Chapter 6) Explain hybrid routing protocols. Describe an example.
NW170 Assignment #
4


Due Date:
02/26/2010


Chapter

7


Short Answer



1.

Describe the fundamental properties WANs and LANs have in commo
n.



2.

Define and describe a PSTN.



3.

Describe an important difference between frame relay and X.25.



4.

Define a fractional T1 and explain why an organization might implement it.



5.

Define the term xDSL and name the better known DSL varieties.



6.

Explain how a cable modem is utilized in broadband cable connections.



7.

Explain how ATM relies on virtual circuits.



8.

Describe the most important advantage of SONET.



9.

Define and describe RRAS.



10.

Describe two important considerations when des
igning a VPN.
NW170 Assignment #
5


Due Date:
03/05/2010


Chapter

8 (part 1)


Completion

Complete each statement.



1.

The use of multiple frequencies to transmit a signal is known as ____________________
technology.



2.

The ______________________________
is a unique character string used to identify an access
point.



3.

A(n) ____________________ assesses client requirements, facility characteristics, and coverage
areas to determine an access point arrangement that will ensure reliable wireless connectivit
y within
a given area.



4.

Places where wireless Internet access is available to the public are called ____________________.



5.

____________________ means that satellites orbit the Earth at the same rate as the Earth turns.


Short Answer



6.

Describe t
he wireless spectrum.



7.

Describe how interference can distort and weaken a wireless signal.



8.

Describe the FHSS and DSSS spread spectrum technologies.



9.

Describe the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to access

a shared medium.



10.

Define and explain the MIMO innovation in the 802.11n standard. Include a description of the
advantages it provides.
NW170 Assignment #
6


Due Date:
03/12/2010


Chapter

8 (part 2)


True/False

Indicate whether the statement is true or

false.


____

1.

Wireless signals experience attenuation.


____

2.

Spread spectrum is a popular way of making wireless transmissions more secure.


____

3.

Wireless networks are laid out using the same topologies as wired networks.


____

4.

If a station det
ects the presence of several access points, it will always choose the closest access
point.


____

5.

WiMAX is defined by the IEEE 802.11 standard.


Short Answer



6.

Define reassociation and provide two examples explaining when it occurs.



7.

Describe the

original design intentions for Bluetooth. Follow this with an explanation of why
Bluetooth proved to be impractical for business LANs and what the technology supports today.



8.

Describe what an administrator can do if during a wireless router configurat
ion, something goes
awry.



9.

Explain how residential WiMAX is installed.



10.

Explain how the satellite Internet access service known as a satellite return arrangement works.
NW170 Assignment #
7


Due Date:
04/02/2010


Chapter

9


Short Answer



1.

Descri
be the two types of definitions in a directory’s schema.



2.

Explain why multitasking does not mean performing more than one operation simultaneously. Be
sure to define preemptive multitasking.



3.

Describe symmetric multiprocessing and asymmetric multip
rocessing.



4.

Describe how the Windows Server 2008, Standard Edition, memory model works.



5.

Identify eight features of NTFS.



6.

Briefly explain Active Directory two
-
way transitive trusts.



7.

Describe three advantages of choosing a proprietary UNIX

system.



8.

Describe the key difference between freely distributable UNIX and proprietary implementations.



9.

Explain how UNIX and Linux handle multiprocessing.



10.

Describe the UNIX memory model in terms of addressing scheme and virtual memory.
NW17
0 Assignment #
8


Due Date:
04/09/2010


Chapter

10 (Part 1)


True/False

Indicate whether the statement is true or false.


____

1.

On a network using TCP/IP, some nodes may use multiple IP addresses.


____

2.

In CIDR, conventional network class distinctions
do not exist.


____

3.

The MIME standard replaces SMTP.


____

4.

POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the
time.


____

5.

IMAP4 servers require less storage space and usually more processing resou
rces than POP servers
do.


Short Answer



6.

Explain how to calculate a host’s network ID given its IPv4 address and subnet mask.



7.

Describe the formula determining how to modify a default subnet mask to create subnets.



8.

If subnetting is used on a L
AN, explain how devices interpret subnetting information.



9.

Explain how hiding IP addresses on private networks allows network managers more flexibility in
assigning addresses.



10.

Explain why SNAT is considered static and describe why it useful.
NW17
0 Assignment #
9


Due Date:
04/16/2010


Chapter

10 (Part 2)


Completion

Complete each statement.



1.

____________________ separates a network into multiple logically defined segments, or subnets.



2.

The gateways that make up the Internet backbone are cal
led ____________________.



3.

The combination of additional bits used for subnet information plus the existing network ID is
known as the _________________________.



4.

________________________________________ is the protocol responsible for moving messa
ges
from one mail server to another over TCP/IP
-
based networks.



5.

_____________________________________________ is a standard for encoding and interpreting
binary files, images, video, and non
-
ASCII character sets within an e
-
mail message.


Short Answer



6.

Describe what PAT is and how it works.



7.

Describe four features of IMAP4.



8.

Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked
node to another, identifying all intermediate hops between the two nodes
.



9.

Explain what happens when an administrator issues the
mtr

command.



10.

Describe the function of the route utility and provide examples of how it is entered on a UNIX or
Linux system, a Windows
-
based system, and a Cisco
-
brand router.
NW170 Assignme
nt #
10


Due Date:
04/23/2010


Chapter

11


Short Answer



1.

How does implementing VoIP assist in centralizing voice and data network management?



2.

Describe five features unique to IP telephones.



3.

Explain the issue regarding the need for electric cur
rent that IP telephones face.



4.

Besides being extremely mobile, describe another advantage to softphones.



5.

Describe six functions performed by signaling protocols.



6.

Describe five capabilities to which SIP is limited.



7.

Explain how gateways on

a converged network exchange and translate signaling and control
information with each other so that voice and video packets are properly routed through the network.



8.

Explain why MGCs are especially advantageous on large VoIP networks.



9.

Explain wh
y UDP is preferred over TCP for real
-
time applications such as telephone conversations
and videoconferences.



10.

Describe the RTCP (Real
-
time Transport Control Protocol), defined in RFC 3550 by the IETF.
NW170 Assignment #
11


Due Date:
04/30/2010


Chapte
rs

12 and 13


Short Answer



1.

(Chapter 12) Define SSH (secure shell) and explain threats it guards against. Include an explanation
of the encryption algorithms that may be used with it.



2.

(Chapter 12) Describe the two phases IPSec use to accomplish au
thentication.



3.

(Chapter 12) Describe one potential flaw in CHAP and MS
-
CHAP authentication and explain how it
is resolved.



4.

(Chapter 12) Describe the three
-
way handshake used in CHAP.



5.

(Chapter 12) Describe what distinguishes 802.1x from other
authentication standards.



6.

(Chapter 13) List eight questions to ask to help identify network problem symptoms that are not
immediately obvious.



7.

(Chapter 13) Describe five causes of unreliable network connectivity.



8.

(Chapter 13) Describe four w
ays a network professional might use a multimeter.



9.

(Chapter 13) Describe how a performance tester compares to a continuity tester.



10.

(Chapter 13) Describe three advantages of using wireless network tools.
NW170 Assignment #
12


Due Date:
05/07/2010


Chapter

14


Short Answer



1.

Explain why it is important to keep backups, boot disks, and emergency repair disks current and
available.



2.

Define and describe a virus.



3.

Describe how an organization implements anti
-
malware software.



4.

Describe a
n alert known as a hoax.



5.

Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.



6.

Define mirroring and server mirroring. Describe the necessary requirement for server mirroring.



7.

Describe clusterin
g and explain why it is more cost
-
effective than mirroring for large networks.



8.

Define disk duplexing and describe how it is related to disk mirroring.



9.

Explain the concept of a backup strategy and provide a list of eight questions the strategy sho
uld
address.



10.

Describe a backup rotation scheme and ex
plain the goal of a good scheme.