Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the
Words: 29622 - Pages: 119
Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and contrast WANs and LANs layer by layer. 3. Routers and the modern PC have many hardware
Words: 23437 - Pages: 94
THEORY The correct answer(s): D What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP Novell-ether is the default LAN encapsulation. Novell-ether is 802.3. The correct answer(s): A What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they
Words: 23850 - Pages: 96
Midterm Project Ugo E Obasi MICS 455 09-07-2015 Professor Dennis Herman University of the Potomac Implement a LAN, CAN and WAN for a university with three campuses. Wireless communications allows us to live and work in ways never before possible, offering us flexibility, mobility and a link to our environment that is almost magical. Telecommunications and computer networking have vastly increased our options on how and what we communicate, they have physically constrained us by leashing us with
Words: 1685 - Pages: 7
Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily
Words: 7339 - Pages: 30
Chapter 4 Review Questions 1. A network-layer packet is a datagram. A router forwards a packet based on the packet’s IP (layer 3) address. A link-layer switch forwards a packet based on the packet’s MAC (layer 2) address. 2. Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. 3. Forwarding is about moving a packet from a router’s input link to the appropriate output link. Routing is about determining the end-to-routes between sources and destinations
Words: 7315 - Pages: 30
EDWIN ADJEI BOATENG C/O MR. WILLIAM OHENE - ADU P. O. BOX 1294 KUMASI MOBILE: 0245009355 / 0268978260 E-MAIL ADDRESS: eboatengadjei@yahoo.com , eboatengadjei@hotmail.com CAREER OBJECTIVE A computer science graduate, who is keen to find a position as an IT Manager. I am very reliable, industrious, trustworthy, respectful young man and receptive to new but brilliant ideas. I can work with little or without supervision and also work as part of a team. EDUCATIONAL BACKROUND •
Words: 649 - Pages: 3
address is used mostly for identifying and sending information to hosts that are on the same network, or Ethernet. If you need to connect to a device on a network outside of your home or business network, however, you will need the logical address (or TCP/IP address). The example that was given in a book excerpt on informit.com was extremely helpful for me to understand the concept of network addressing. In Barry Press’ book, “Networking by Example”, he uses the example of finding a specific house
Words: 622 - Pages: 3
PRESENCIAL ESCUELA DE CIENCIAS DE LA COMPUTACIÓN Análisis de Vulnerabilidades de la Red LAN de la UTPL Trabajo de fin de carrera previa a la obtención del título de Ingeniera en Sistemas Informáticos y Computación. AUTOR. Srta. Angélica del Cisne Espinosa Otavalo. DIRECTOR. Ing. Carlos Gabriel Córdova E. CO-DIRECTOR Mgs. María Paula Espinosa V. LOJA – ECUADOR 2010 Análisis de Vulnerabilidades de la Red LAN de la UTPL Angélica Espinosa CERTIFICACIÓN Ingeniero. Carlos Gabriel Córdova E. DOCENTE
Words: 22543 - Pages: 91
Volume 1 FACULTY OF INFORMATION TECHNOLOGY Computer Network Systems Department Computer Networks 1 Lab Manual V 2.0 P R E P A R E D D R . A S U B Y H I J J A W I M O H A M M A D 2 0 1 2 R E V I E W E D B Y D R . M O H A M M A D H I J J A W I Applied Science Private University – Jordan http://FIT.asu.edu.jo Table of Contents Lab 1: Network Components ....................................................................................... 7 Introduction ..
Words: 20902 - Pages: 84