Leon Kambani
BIS0133 Networking Systems and Security
Instructor: Gerald Holland
Workshop 1.4
1. Answer the following ten questions from the textbook.
a. Chapter 1 Test Your Understanding – 1 a and b
b. Chapter 1 Test Your Understanding – 2 a
c. Chapter 1 Test Your Understanding – 4 a and b
d. Chapter 1 Test Your Understanding – 8 a and b
e. Chapter 1 Test Your Understanding – 9
f. Chapter 1 Test Your Understanding – 14 a, b and c
g. Chapter 1 Test Your Understanding – 16 a
h. Chapter 2 Test Your Understanding – 2 a and b
i. Chapter 2 Test Your Understanding – 4 a, b, c, d, and e
j. Chapter 2 Test Your Understanding – 5 a, b, c, d, and e
k. Chapter 2 Test Your Understanding – 8 a and b
l. Chapter 2 Test Your Understanding –…show more content… The term we use for a computer connected to the network is known as the Host.
b. There are four physical links in 1-26 and these are:
1. Host A – Switch X1
2. Switch X1 – Switch X3
3. Switch X3 – Switch X4
4. Switch X4 – Host C
c. There is only one link and there is no data links
d. There is only one route which is Host A – Switch X1 – Switch X3 – Switch X4 – Host C
3. Chapter 1 Test Your Understanding – 4 a and b
a. The internet is not defined as a single network. It is a collection of smaller networks and thousands of single networks. The collection of single networks and a big number of smaller internets is connected to create a single transmission system with the goal to allow any type of internet host to reach each other.
b. The role of the ISP (Internet service provider) is used for companies or organization that provides internet for their customers
c. Network X is a switched single network. This uses workgroup switches to connect the client and the router network plus the core switches to connect to different other switches.
d. Network Y is a point to point single network. This network does not use any access points or switches.
4. Chapter 1 Test Your Understanding – 8 a and…show more content… Chapter 2 Test Your Understanding – 2 a and b
a. Network standards allow different machines to interoperate. The software using different platforms can work together and exchange messages. Without these standards no company can exercise ownership by refusing to allow uses on propriety protocols
9. Chapter 2 Test Your Understanding – 4 a, b, c, d, and e
a. Message ordering work in a request response cycle. The client sends a request which is followed by a response from the server. The server doesn’t start the cycle. Only the client starts the cycle.
b. In HTTP message ordering the server fulfills the request of the client after getting the request. The servers do not transmit until and unless it received the request from the client
c. The communication in TCP protocol is via a three step handshake mechanism. The two parties in the TCP protocol establishes a connection before they send packets of data to each other
d. When an error is not received then no message is sent by the destination host. The message is sent by the destination host when the error is there.
e. When the destination host receives a damaged segment, it refuses to send back an acknowledgement signal
10. Chapter 2 Test Your Understanding – 5 a, b, c, d, and