...The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and...
Words: 699 - Pages: 3
... 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the different types of reference models 37. Mention the different layers of OSI reference model. 38. Mention the different layers of TCP/IP reference model. 39. List the three concepts that are central to OSI model. 40. List the critiques of OSI model. 41. List the different types of topologies. 42. Mention the variations in reliable connection-oriented service. 43....
Words: 2997 - Pages: 12
...Lesson 3 Answers for Knowledge Assessment Matching 1. e 2. h 3. f 4. a 5. d 6. b 7. g 8. i 9. c 10. j Multiple Choice 1. c When a DHCP-configured computer boots up, it will broadcast a DHCPDISCOVER packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes...
Words: 1569 - Pages: 7
...Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the telephone 1877 Telephone system regulation begins in Canada 1878 Telephone system regulation begins in the United States 1879 Direct dialed long distance service begins 1880 Satellites begin to transmit international telephone calls 1881 Caterfone court decision permits non-Bell telephone equipment to be used 1970 Court permits MCI to provide long distance services 1984 Breakup of AT&T 1985 Cellular phones enter service 1996 Telecommunications Act of 1996 deregulates American telephone system 2. Why are network layers important? Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. 3. Describe the four layers in the network model used in this book and what they do. • The application layer is the application software used by the user. • The network layer takes the message generated...
Words: 29622 - Pages: 119
...Answers for Page 30 (Short Answer Question 1-5) 1. Open standards are openly documented standards, published without restrictions that limit implementations. It’s advantages are (a). it makes for easier maintenance, upgrade, and troubleshooting for technology infrastructures. (b). It also helps in both Software and Hardware in terms of providing data and telecommunications technologies. 2. Layered Architecture can be viewed as a beneficial because they are there to design pattern that structures applications so they can be decomposed into groups of subtasks such that each group of subtasks is assigned a specific set of functionalities and responsibilities. 3. Protocol is a set of rules that determine how something is performed or accomplished. It can be used for our daily routine in our life. Example. (Technological protocol)- Encoding Scheme is a way of transforming one type of data or information into another. Translating English into French. 4. The four different types of Networks are LAN,WAN,MAN, and Area Networks. It’s characteristics of each are; * LAN - Local Area Network * WAN - Wide Area Network * MAN - Metropolitan Area Network * BN – Network in a single building or is used to connect other networks of the enterprise. 5 . OSI and TCP/IP models similar – The main similarities between the two models include the following: - Both of the models share a similar architecture. This can be illustrated by the fact that both of them are constructed...
Words: 301 - Pages: 2
...environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet service providers and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to log in again as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, log on again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see the time remaining in the Final Exam at the top right of the page. 5. Assessments with Multiple Pages * Make sure to click the Save Answers button before advancing to the next page (we also suggest clicking on Save Answers often while you are working). * Complete all of the pages before submitting your Final...
Words: 1361 - Pages: 6
...Subject: Strategic paper - Cisco Category: Business and Money > Economics Asked by: k9queen-ga List Price: $60.00 |Posted: 02 Dec 2003 08:37 PST Expires: 01 Jan 2004 08:37 PST Question ID: 282626 | | |For the company CISCO, PLease give a SWOT analysis. Explain what | |their core competency is, do they have any forward/backward | |integration? What do they or are they trying to do to be competitive | |in the market? Etc. | |[pic] | |Request for Question Clarification by politicalguru-ga on 02 Dec 2003 08:52 PST | |Dear Queen, | | | |I found several ready-made SWOT analyses online. Would you like me to | |refer you to the sites where you could find them? ...
Words: 2725 - Pages: 11
...Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 1 of 16 Annexure No. SCAA Dated BHARATHIAR UNIVERSITY, COIMBATORE – 641 046 M. Sc COMPUTER SCIENCE For School of Distance Education (Effective from the academic Year 2007-2008) Scheme of Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I...
Words: 3613 - Pages: 15
...Final Exam Review 8 to 10 Introducing the Internet Protocol (IP) TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP) TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP) Network Layer protocols IP: Most important protocol defined by Network layer Almost every computing device on planet communicates, and most use IP to do so Network layer also defines other protocols 4 Introducing the Internet Protocol (IP) Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP) Network Layer protocols: Part 2 Name Full Name RIP ...
Words: 9644 - Pages: 39
...Note: You can work in groups but each student must submit his/her own answers. You can submit it via Canvas or give the hard copy to the instructor by the due date. 1. Is it important that Industrial Technology students have a working knowledge of computer networks? Why? Yes it important for IT students to know the foundations of computer networks because it’s a key to understand the concepts of what this career consist of. Today, computer networks are part of everyday lives and it is a skill to obtain to succeed the field. 2. What is the difference between a computer and a workstation? Computers perform three simple tasks: input, process, and output while a workstation is a connected computer/s and has an IP address. 3. What is the main purpose of a CPU and a NIC? The central processing unit (CPU) main function is to execute instructions from computer programs. The network interface card (NIC) is an additional card plugged into a motherboard slot which provides a connection between the computer and the network. 4. What is the difference between RAM AND ROM? Storage types, short-term storage (RAM) and the permanent, long term, (ROM). 5. How is data stored? Characters, bits or bytes? It is stored in bits (1, 0). 6. What is the main purpose of a bus in computers? The main purpose of the bus in computers is to carry data from one place to another on the computer. In a computer...
Words: 753 - Pages: 4
...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...
Words: 22727 - Pages: 91
...Instructor’s Edition access-group Wildcard Mask access-list Access-List Numbers IP Standard IP Extended Ethernet Type Code Ethernet Address DECnet and Extended DECnet XNS Extended XNS Appletalk 48-bit MAC Addresses IPX Standard IPX Extended IPX SAP (service advertisement protocol) IPX SAP SPX Extended 48-bit MAC Addresses IPX NLSP IP Standard, expanded range IP Extended, expanded range SS7 (voice) Standard Vines Extended Vines Simple Vines Transparent bridging (protocol type) Transparent bridging (vender type) Extended Transparent bridging Source-route bridging (protocol type) Source-route bridging (vender type) 1 100 200 700 300 400 500 600 700 800 900 1000 1000 1100 1200 1300 2000 2700 1 101 201 200 700 1100 200 700 to to to to to to to to to to to to to to to to to to to to to to to to to to 99 199 299 799 399 499 599 699 799 899 999 1099 1099 1199 1299 1999 2699 2999 100 200 300 299 799 1199 299 799 Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors. Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this your giving everyone else worldwide the answers. Yes, students look for answers this way. It also discourages others; myself included, from posting high quality materials...
Words: 13656 - Pages: 55
...Technology (JET) * h. reservation * i. rogue DHCP server * j. T2 * E 1. This DHCP message type is sent by a DHCP client when it no longer requires the use of an IP address that it has leased from a DHCP server. * H 2. You can configure one of these to ensure that a DHCP client always receives the same IP address from a particular DHCP server. * F 3. This is used to ensure that a particular address or block of addresses within a scope is not assigned to DHCP clients by a DHCP server. * A 4. You must do this to any DHCP server that needs to function within an Active Directory domain. * D 5. A DHCP client will send this message type if it determines that an IP address offered by a DHCP server is already in use. * B 6. This is performed by a DHCP server when corruption is detected within the DHCP database. * G 7. The DHCP database is based on this database technology. * I 8. Authorizing DHCP servers in Active Directory is designed to prevent against these. * C 9. These provide DHCP parameters to DHCP clients based on vendor or user type. * J 10. This defaults to 87.5% of the total DHCP lease. Multiple Choice Select all answers that apply for the following questions. 1. Which of the following DHCP message types is sent first in the process of obtaining an address lease? * a. DHCPOFFER * b. DHCPACK...
Words: 758 - Pages: 4
...Instructor’s Edition access-group Wildcard Mask access-list Access-List Numbers IP Standard IP Extended Ethernet Type Code Ethernet Address DECnet and Extended DECnet XNS Extended XNS Appletalk 48-bit MAC Addresses IPX Standard IPX Extended IPX SAP (service advertisement protocol) IPX SAP SPX Extended 48-bit MAC Addresses IPX NLSP IP Standard, expanded range IP Extended, expanded range SS7 (voice) Standard Vines Extended Vines Simple Vines Transparent bridging (protocol type) Transparent bridging (vender type) Extended Transparent bridging Source-route bridging (protocol type) Source-route bridging (vender type) 1 100 200 700 300 400 500 600 700 800 900 1000 1000 1100 1200 1300 2000 2700 1 101 201 200 700 1100 200 700 to to to to to to to to to to to to to to to to to to to to to to to to to to 99 199 299 799 399 499 599 699 799 899 999 1099 1099 1199 1299 1999 2699 2999 100 200 300 299 799 1199 299 799 Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors. Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this your giving everyone else worldwide the answers. Yes, students look for answers this way. It also discourages others; myself included, from posting high quality materials...
Words: 13898 - Pages: 56
...COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer networking from an historical perspective. 3. Describe the OSI and TCP/IP models and their network impact. 4. Classify networks based on methodology and functional application. © ITT Educational Services, Inc. All Rights Reserved. -2- 05/08/2013 Introduction to Networking SYLLABUS 5. Identify...
Words: 4795 - Pages: 20