Premium Essay

Network+ Chapter 8

In:

Submitted By Joker2099
Words 642
Pages 3
Assignment #8
Review Questions
1: A 2: B 3: C 4: C 5: D 6: B 7: B 8: B 9: C 10: A 11: B 12: C, E
13: D 14: A 15: B 16: B 17: A 18: C 19: C, E 20: A

Case Project 1
Using wireless technology the company will benefit financially and will have an increase in productivity of its employees because there is no need to maintain and/or use wired stations (computers, printers, etc.) By this means all buildings will only have a several wireless routers which will most likely cover the whole building. Present wireless standards and types of connections can cover long distances and have faster speeds than wired connections do. Also the company employees will have an access to the company’s network from almost any location inside & outside the company’s building within the access point’s (router) configured signal range. This way the productivity of the company’s employees will increase. Warehouse employees will have the best use of the company’s wireless connection, for example in case of inventory and/or shipping and receiving products, of course this will mean that all of the warehouse employees have some sort of wireless device on hands. All company employees will benefit from wireless networking in case of communicating with each other and/or having access to the company’s network from anywhere within the company’s wireless signal range.

Case Project 2
First step in planning the pilot network will be determining how many access points the distribution facility will need, to cover most of its area. Also we will need to determine what type of wireless protocol will be the most efficient to cover the area without leaving any dead zones allowing all existing equipment (devices and printers) to use that protocol without being upgraded. Best bet will be to use standard 802.11b/g that is being used by most of the present devices. A theoretical coverage indoors

Similar Documents

Premium Essay

Exploration Network Chapter 8

...OSI Physical Layer Network Fundamentals – Chapter 8 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives  Explain the role of physical layer protocols and services in supporting communication across data networks.  Describe the role of signals used to represent bits as a frame as the frame is transported across the local media.  Describe the purpose of physical layer signaling and encoding as they are used in networks.  Identify the basic characteristics of copper, fiber and wireless network media.  Describe common uses of copper, fiber and wireless network media. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Outline  Physical layer: Communication signals –Purpose of the physical layer –Physical layer standards –Physical layer fundamental principles  Physical signaling and encoding: Representing bits –Signaling bits for the media –Encoding: Grouping bits –Data-carrying capacity  Physical media: Connecting communication –Types of physical media ITE PC v4.0 Chapter 1 –Media connectors © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Purpose of the Physical Layer  The roles of the OSI physical layer: –To encode the binary digits that represent data link layer frames into signals. –To transmit and receive these signals across the physical media.  There are various types of physical media and they carry different types...

Words: 3652 - Pages: 15

Premium Essay

Instruction Plan

...Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand...

Words: 1513 - Pages: 7

Premium Essay

Nt 1210

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Business Networking and Communication

...CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two or more computers that are linked together. D. the use of satellites linking computers together. Answer: C 2. Reference: Basic Network Anatomy Difficulty: Easy The three essential components of every computer system include all of the following EXCEPT: A. software. B. hardware. C. people. D. cables. Answer: D 3. Reference: Basic Network Anatomy Difficulty: Easy All of the following are advantages of using a computer network EXCEPT that it: A. reduces costs when hardware is shared. B. promotes independence so users have exclusive control over their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch...

Words: 3749 - Pages: 15

Premium Essay

Nt1330 Unit 3 Assignment 1.4.1 Answers

...textbook. a. Chapter 1 Test Your Understanding – 1 a and b b. Chapter 1 Test Your Understanding – 2 a c. Chapter 1 Test Your Understanding – 4 a and b d. Chapter 1 Test Your Understanding – 8 a and b e. Chapter 1 Test Your Understanding – 9 f. Chapter 1 Test Your Understanding – 14 a, b and c g. Chapter 1 Test Your Understanding – 16 a h. Chapter 2 Test Your Understanding – 2 a and b i. Chapter 2 Test Your Understanding – 4 a, b, c, d, and e j. Chapter 2 Test Your Understanding – 5 a, b, c, d, and e k. Chapter 2 Test Your Understanding – 8 a and b l. Chapter 2 Test Your Understanding –...

Words: 1518 - Pages: 7

Premium Essay

Anhssysvhdhvhvhdvv

...MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) 9/8/15, 8:37 PM Share your Notes, Comments and more. Join the inGenius Community today. Complete your Profile. MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) Search this book: Assessment Test MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) by William Panek Sybex © 2010 > Assessment Test 1. What filename extension is applied by default to custom consoles that are created for the MMC? A. .mmc B. .msc C. .con D. .mcn 2. You want to create roaming profiles for users in the sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 7 computers? A. The user who uses the profile B. Server operators C. Power users D. Administrators http://mmlviewer.books24x7.com/book/id_41094/viewer.asp?bookid=41094&chunkid=709183989 Page 1 of 13 MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) 9/8/15, 8:37 PM 3. You want to monitor the CPU, memory, and disk usage on your computer to ensure that there are no bottlenecks. Which MMC snap-in would you load to access System Monitor? A. System Monitor B. Reliability Monitor C. ActiveX Control D. Performance Logs and Alerts 4. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user ...

Words: 3377 - Pages: 14

Free Essay

Expected Value of a Uniform Distribution

...All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A A PPENDIX Mapping to the CompTIA A+ Objectives A CompTIA A+ Essentials Objectives Map Topic Chapter(s) Domain 1.0 Hardware 1.1 Categorize storage devices and backup media FDD 3 HDD 3, 11 Solid state vs. magnetic Optical drives CD / DVD / RW / Blu-Ray Removable storage 11 3, 13 3, 13 11, 13, 17 Tape drive 17 Solid state (e.g. thumb drive, flash, SD cards, USB) 13 External CD-RW and hard drive 13, 11 Hot swappable devices and non-hot swappable devices 13 1.2 Explain motherboard components, types and features Form Factor 9 ATX / BTX, 9 micro ATX 9 NLX 9 I/O interfaces 3, 18, 20, 22, 23, 25 Sound 3, 20 Video 3 1219 AppA.indd 1219 12/9/09 5:58:26 PM All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A CompTIA A+Certification All-in-One Exam Guide 1220 Topic Chapter(s) USB 1.1 and 2.0 3, 18 Serial 3, 18 IEEE 1394 / Firewire 3, 18 Parallel 3, 22 NIC 3, 23 Modem 3, 25 PS/2 18 Memory slots 3, 6 RIMM 6 DIMM 3, 6 SODIMM 6 SIMM 6 Processor sockets 3, 5, 9 Bus architecture 5, 8 Bus slots 8, 9, 21 PCI 8, 9 AGP 8, 9 PCIe 8, 9 AMR 9 CNR 9 PCMCIA 21 PATA 11 IDE 11 EIDE 11 SATA, eSATA ...

Words: 4550 - Pages: 19

Free Essay

Student

...permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access points. a. 802.11G b. 802.11A c. 802.16 d. 802.1x 4. Each object that is referenced in an NTFS system is marked by ________ that limits who can and cannot access a resource. a. an access control entry b. a share-level restriction c. an encrypted key d. an access identity limit © ITT Educational Services, Inc. Date: 10/10/07...

Words: 3277 - Pages: 14

Free Essay

Case Writing a Textbook

...Unit 4 Homework Solutions Chapter 16 Writing a Textbook Case 1. Add any additional activities that you think are necessary to the project. No correct answer. 2. Draw the network diagram for this project. First, let us create a table of the information: Task # | Description | Follows: | Time (wks) | 1 | Write prospectus | - | 4 | 2 | Discuss with publisher | 1 | 1 | 3 | Conduct focus groups | 1 | 1 | 4 | Select publisher | 2 | 2 | 5 | Update prospectus | 3,4 | 4 | 6 | Negotiate with publisher | 5 | 3 | 7 | Write Chaps 1 – 8 | 6 | 4 wks per chapter | 8 | Write Chaps 9 – 16 | 6 | 4 wks per chapter | 9 | Review chapters | As chapters are avail | 4 wks per chapter | 10 | Revise 1 - 8 | As reviews avail | 2 wks per chapter | 11 | Revise 9 – 16 | As reviews avail | 2 wks per chapter | 12 | Photo list | As chapters avail | 24 weeks | 13 | Select other writers | 6 | 4 | 14 | Define CD | 6 | 2 | 15 | Write IM | As soon as ½ revise | 12 | 16 | Write TB | As soon as ½ revise | 12 | 17 | Write Soln Manual | As soon as ½ revise | 12 | 18 | Write PowerPoint | As soon as ½ revise | 12 | 19 | Design cover | 6 | 8 | 20 | Design Mktg | 6 | 6 | 21 | Produce galley proofs | 10, 11 | 6 | 22 | Proofread galley proofs | 21 | 4 | 23 | Produce CD | 15, 17, 18 | 4 | 24 | Print texts | 20, 21 | 16 | 3. Determine how long it should take to complete the project. The network on the next page shows the order of operations. However, it...

Words: 696 - Pages: 3

Premium Essay

Os and Utilities

...systems Explain the purpose of several utility programs See Page 397 for Detailed Objectives Discovering Computers 2012: Chapter 8 2 System Software • System software consists of the programs that control or maintain the operations of the computer and its devices Operating systems Page 398 Utility Programs Discovering Computers 2012: Chapter 8 3 Operating Systems • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources Start and shut down a computer Coordinate tasks Provide a user interface Manage programs Establish an Internet connection Control a network Manage memory Configure devices Monitor performance Provide utilities Pages 398 - 399 Automatically update Administer security 4 Discovering Computers 2012: Chapter 8 Operating Systems Pages 398 – 399 Figure 8-1 Discovering Computers 2012: Chapter 8 5 Operating System Functions • The process of starting or restarting a computer is called booting Cold boot • Turning on a computer that has been powered off completely Page 400 Figure 8-2 Warm boot • Using the operating system to restart a computer Discovering Computers 2012: Chapter 8 6 Operating System Functions Page 401 Figure 8-3 Discovering Computers 2012: Chapter 8 7 Operating System Functions A boot drive is the drive from which your...

Words: 1834 - Pages: 8

Premium Essay

Advance Issue in Ict

...ADVANCED ISSUES IN ICT | | | Semester | : | June 2013 | Course Leader | : | Iznora Aini Zolkifly | Office Location | : | Faculty of Business and Information Technology, Block B1-3A, Leisure Commerce Square | Consultation Hours | : | Tuesday : 2.30 pm – 4.30p.m Thursday : 2.30 pm – 4.30p.m jk | Telephone | : | 03-76277373 | E-mail | : | iznora@unitar.my | Tutors (Optional) | : | | | | | | | Course Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from...

Words: 832 - Pages: 4

Premium Essay

Module 3 Essay

...coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer networking from an historical perspective. 3. Describe the OSI and TCP/IP models and their network impact. 4. Classify networks based on methodology and functional application. © ITT Educational Services, Inc. All Rights Reserved. -2- 05/08/2013 Introduction to Networking SYLLABUS 5. Identify the necessary components of a network from both...

Words: 4795 - Pages: 20

Premium Essay

Notes of Unit 1. Chapter 1. Nt1230

...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...

Words: 22727 - Pages: 91

Premium Essay

Vulnerability-Assessment

...285_NSS_01.qxd 8/10/04 10:40 AM Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today...

Words: 9203 - Pages: 37