Professional Documents
Culture Documents
2. Describe the advantages of a peer-to-peer network. Peer-to-peer networks are relatively simple and inexpensive. They require no dedicated servers and no administrators, and are connected by a simple, easily visible cabling system. 3. Describe the advantages of a server-based network. Server-based networks have a number of advantages over peer-to-peer networks. They can accommodate a larger number of users; they have servers which can be specialized to accommodate the expanding needs of users; and they offer greater security. Server-based networks also support e-mail systems along with application and fax servers.
The projected number of users The users' need for access to data Network management The number of computers acting as servers
A server-based network imposes a greater cost than a peer-to-peer network because at least one of the computers on the network is dedicated to serving data, applications, or both. But a server-based network also makes the best use of a centralized, coherent administration of resources. This centralized administration can regulate access to data, making it secure.
If you need an extremely reliable network with redundancy built in, you might want to consider either a ring or a star-wired ring network. There are at least three considerations involved in estimating the cost of implementing a certain topology: Installation Troubleshooting Maintenance Eventually, topology translates into cabling, and the installation phase is where theoretical topology meets the real world of the actual network. If cost is an overriding factor, then perhaps you should choose the topology that you can install at the lowest cost. Ninety percent of the cost of wiring is applied to labor. Anytime cabling has to be permanently installed in any kind of structure, the initial cost multiplies rapidly because of the high cost of labor and expertise. When a network requires installing cable in a structure, a star bus is usually less expensive to install than a bus. To illustrate this, imagine the task of wiring a large building for a bus network. Then, imagine what it would take to reconfigure that network six months later to add eight new computers. Finally, imagine how much more economically and efficiently those same operations could be performed if the installation were a star bus.
For a small network (5-10 users), a bus is usually economical to install initially but may be expensive to maintain because troubleshooting and reconfiguring take time. However, on a larger network (20 or more users), installing a star bus may cost more initially than installing a bus, owing to the cost of the equipment (a hub); but a star bus will be significantly less expensive to maintain in the long run. Finally, if there is installed network cabling that you can reuse, you might choose the existing topology if it meets your needs.
Exercise Summary
Based on the information generated in the three parts of this Network Planning Problem, your network components should be: Type of network: server-based Type of topology: Star
Chapter Review
1. Describe the difference between a LAN and a WAN. A LAN, or local area network, is the basic building block of any computer network. It can consist of a simple network (two computers connected by a cable and sharing information) or up to several hundred computers connected and sharing information and resources. A LAN has geographical limits, but a WAN has no geographical limits. A WAN can connect several departments within the same building or buildings on opposite sides of the world. Today, the ultimate WAN is the World Wide Web. 2. What are the two basic network configurations? The two basic network configurations are peer-to-peer and server-based. 3. A primary reason for implementing a network is to _______ resources. share 4. Name three key resources often shared on a network. There are many resources to be shared on a network; among them are printers, scanners, applications, files, and network access to the World Wide Web.
5. In a peer-to-peer network, each computer can act as a _________ and a ________. server, client 6. What is the function of a server in a server-based network? A server provides services and resources to the network. 7. A peer-to-peer network is adequate if _____________ is not an issue. security 8. Network professionals use the term _________ to refer to the network's physical layout. topology 9. The four basic topologies are the _______, ________, ________, and _________ topologies. bus, star, ring, and mesh 10. In a bus topology, all the computers are connected in a series. To stop the signals from bouncing, it is important that a ________ be connected to each end of the cable. terminator 11. In a ________ topology all segments are connected to a centralized component called a __________. star, hub 12. In a ________ topology, a break anywhere in the cable will cause the entire network to go down. bus 13. The most reliable as well as the most expensive topology to install is the _______ topology. mesh 14. A ring topology passes a ________ from one segment to another. In order for a computer to place data on the network, the computer must be in possession of the _______. token, token
Rough handling during the installation of the new computers might have damaged the existing network cabling. The addition of the new cable required to network the new computers might have made your total network cable length exceed the maximum length specified for the type of network you have. The bus network might be missing a terminator. It might have been removed or fallen off during the installation of the new computers. 2. What could you do to resolve each of the two possible causes you listed above? Find and repair the break or disconnection in the cable. Check the cable type of the existing cable and make sure the new cables are of the same type. If they are of different types, replace the new cables with cables of the correct type. For example, the original cable might be RG-58A/U and the new cables might be RG-62 /U. These two cable types are not compatible. Replace the new cable with RG-58A/U cable. 3. How would each of your solutions repair the problems you identified (assuming that they are able to repair the problems)? Restoring cable connections will reestablish the continuity of the network cable and allow transmissions to reach all connected network devices. With all segments of the same cable type, network transmissions will be able to pass uninterrupted from one cable segment to the next. Replacing a shorted segment of the new cable with a new, tested segment will allow network transmissions to flow correctly.
Chapter Review
1. Coaxial cable consists of a core made of solid or stranded ____________ ___________. wire conductor 2. If the coaxial conducting core and wire mesh touch, the cable will experience a ___________. short 3. The core of coaxial cable is surrounded by an _____________ __________ that separates it from the wire mesh.
insulating layer 4. Thicknet cable is sometimes used as a ______________ to connect thinnet segments. Backbone 5. Thinnet cable can carry a signal for a distance of about 185 meters (607 feet) before the signal starts to suffer from _____________________. attenuation 6. The electronic signals that make up the data are actually carried by the ________ in a coaxial cable. core 7. A flexible coaxial cable that is easily routed but that should not go into crawl spaces is ________. PVC 8. Coaxial cable that contains special materials in its insulation and cable jacket is called ____________ cabling. plenum 9. The most popular type of twisted-pair cable is _______ (10BaseT). UTP 10. UTP cable for data transmissions up to 10 Mbps is category ______. 3 11. UTP cable for data transmissions up to 100 Mbps is category _____. 5 12. STP uses a foil wrap for __________________. shielding 13. STP is less susceptible to electrical _______________________ and supports higher transmission rates over longer distances than does UTP. interference
14. Twisted-pair cabling uses _________ telephone connectors to connect to a computer. RJ-45 15. The RJ-45 connection houses _____ cable connections, whereas the RJ-11 houses only ____. 8, 4 16. Optical fibers carry _______________ data signals in the form of light pulses. digital 17. Fiber-optic cable cannot be ____________________, and the data cannot be stolen. tapped 18. Fiber-optic cable is better for very high-speed, high-capacity data transmission than ____________ cable because of the former's lack of attenuation and the purity of the signal it carries. copper 19. Fiber-optic cable transmissions are not subject to electrical ____________________. interference 20. Baseband systems use _______________ signaling over a single frequency. digital 21. Each device on a _____________________ network can transmit and receive at the same time. baseband 22. Broadband systems use _____________ signaling and a range of frequencies. analog 23. With _________________ transmission, the signal flow is unidirectional. broadband 24. Wall-mounted _________________ connected to the wired LAN maintain and manage radio contact between portable devices and the cabled LAN.
transceivers 25. Broadband optical telepoint transmission is a type of _____________ network capable of handling high-quality multimedia requirements. infrared 26. A component called a wireless _______________ offers an easy way to link buildings without using cable. bridge 27. Spread-spectrum radio broadcasts signals over a range of ___________________. frequencies 28. Point-to-point transmission involves wireless ___________ data transfer. serial 29. In LANs, a transceiversometimes called an _____________ ______________ broadcasts and receives signals to and from the surrounding computers. access point 30. Wireless ___________ LANs use telephone carriers and public services to transmit and receive signals. mobile 31. CDPD uses the same technology and some of the same systems as ___________ telephones. cellular 32. Currently, the most widely used long-distance transmission method in the United States is _____________________. microwave 33. The network interface card converts serial data from the computer into parallel data for transmission over the network cable. True False False. The reverse is true. The card converts parallel data to serial data. 34. The 16-bit and 32-bit widths are currently the two most popular bus widths. True False
True 35. To help move data onto the network cable, the computer assigns all of its memory to the NIC. True False False. The computer can assign some of its memory to the card, but not all of it. 36. Data is temporarily held in the NIC's transceiver, which acts as a buffer. True False False. Only RAM acts as a buffer. The transceiver transmits and receives data. 37. Both sending and receiving NICs must agree on transmission speeds. True False True 38. In an 80386 computer, COM1 typically uses IRQ ____ and LPT1 typically uses IRQ _____. 4,7 39. IRQ lines are assigned different levels of _____________ so that the CPU can determine how important the request is. priority 40. The recommended setting for a NIC is IRQ _____. 5 41. Every device on the computer must use a __________________ IRQ line. different or separate 42. Each hardware device needs a default ________ ___/___ ________ number. base I/O port 43. Choosing the appropriate transceiver on a NIC that can use either an external or an onboard transceiver is usually done with ______________. jumpers 44. ISA was the standard bus until Compaq and other manufacturers developed the ______ bus. EISA
45. The ____________ ____________ bus functions as either a 16-bit or a 32-bit bus and can be driven independently by multiple bus master processors. Micro Channel 46. Telephone wire uses an __________ connector. RJ 11 47. Plug and Play refers to both a design philosophy and a set of personal-computer _______________________ specifications. architecture
Presentation Translation of data Session Transport Network Data Link Physical Maintains a session between nodes on a network Makes sure that transmissions are received Manages addressing and routing of the packets Physical addressing of packets and error correction Manages the connection to the media
In the second part of Exercise 1 that follows, a device or standard is listed in the left column. In the space provided in the right column, write in the applicable OSI layer(s) for each device or standard. Device Gateway NIC Hub Router IEEE 802.x OSI layer Application-transport layer Physical layer Physical layer Network layer Physical and data-link layers
2. Printer manufacturers are responsible for writing _______________ for their printer products. drivers 3. Drivers described in an operating system manufacturer's ________ have been tested and included with their operating system. HCL 4. NIC drivers reside on the computer's _________ _________. hard disk 5. Protocol drivers use an _________ interface to communicate with the NICs. NDIS 6. Translation software is required to _____________ ________________ NDIS and ODI. bridge between
Chapter Review
1. The OSI reference model divides network activity into ____________ layers. seven 2. The purpose of each layer is to provide services to the next _____________ layer and shield the upper layer from the details of how the services are actually implemented. higher 3. At each layer, the software adds some additional formatting or _________________ to the packet. addressing 4. Each layer on one computer appears to communicate directly with the ___________ layer on another computer. same 5. The top, or ___________________, layer handles general network access, flow control, and error recovery.
application 6. At the sending computer, the _____________________ layer translates data from a format sent down from the application layer. presentation 7. The ________________ layer determines the route from the source to the destination computer. network 8. The data-link layer is responsible for sending __________ ___________ from the network layer to the physical layer. data frames 9. The ________________ information in a data frame is used for frame type, routing, and segmentation information. control 10. The __________________ layer defines how the cable is attached to the NIC. physical 11. Windows NT groups the seven OSI layers into three. The three NT layers are ________ ____________ ___________, ____________ _______________, and ________ _____________. file system drivers, transport protocols, and NIC drivers. 12. An _________ provides the interface between the Windows NT applications and file system drivers layer. API 13. A _________ provides the interface between the Windows NT file system drivers layer and the transport protocols. TDI 14. An _________ provides the interface between the Windows NT, the transport protocols layer, and the NIC drivers. NDIS
15. The Project 802 specifications define the way __________ access and transfer data over physical media. NICs 16. The 802 project divided the __________ - __________ layer of the OSI reference model into two sublayers, the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. data-link 17. The _________ sublayer communicates directly with the NIC and is responsible for delivering error-free data between two computers on the network. MAC 18. The IEEE category __________ covers LAN standards for Ethernet. 802.3 19. The IEEE category __________ covers LAN standards for Token Ring. 802.5 20. A driver is _______________ that enables a computer to work with a device. software 21. NICs work in the _________ sublayer of the __________ -_________ layer of the OSI model. MAC, data-link 22. NDIS defines an interface for communication between the __________ sublayer and the protocol drivers. MAC 23. NDIS was jointly developed by ___________________ and ____________. Microsoft, 3Com 24. ODI works just like NDIS but was developed by ______________ and ________________ for interfacing hardware to their protocols. Apple, Novell
Transport layer Adds error-handling information to the packet Network layer Data-link layer Physical layer Adds sequencing and address information to the packet Adds error-checking information and prepares packet for sending out over the physical connection Sends packet as a bit stream
Exercise 6.1 (b): Matching the OSI Model Layers with Communication Tasks
Because many protocols were written before the OSI reference model was developed, some protocol stacks developed earlier don't match the OSI reference model; in those stacks, tasks are often grouped together. Communication tasks can be classified into three groups. In this part of the exercise, the seven layers of the OSI reference model are again listed in the left column. In the right column, write in the name of one of the three groups in the following list. Your task is to identify which of these three groups maps to each of the OSI layers in the left column. The three groups are:
Matching OSI Reference Model with Communication Tasks OSI Layers Application layer Presentation layer Session layer Transport layer Network layer Data-link layer Physical layer Communication Task Application-level network service users Application-level network service users Application-level network service users Transport services Network services Network services Network services
Lesson 2: TCP/IP
Exercise 6.2: Comparing OSI and TCP/IP Layers
Exercise 6.2 is designed to help you understand the relationship between the OSI model and Transmission Control Protocol/Internet Protocol (TCP/IP). Because TCP/IP was developed before the OSI reference model was developed, it does not exactly match the seven OSI model layers. In this exercise, you will be mapping the four layers of TCP/IP to the seven layers of the OSI reference model. The four layers of TCP/IP are the:
The left column lists the seven layers of the OSI reference model. In the right column, fill in the name of the corresponding TCP/IP layer. Comparison of OSI and TCP/IP Layers OSI Layers Application layer Presentation layer Session layer Transport layer TCP/IP Layers Application layer Application layer Application layer Transport layer
IPX/SPX Media Access Protocol NetWare Core Protocol Routing Information Protocol Service Advertising Protocol
Comparison of OSI Reference Model with NetWare Protocols OSI Layers Application layer Presentation layer Session layer Transport layer Network layer Data-link layer Physical layer IPX/SPX Media Access Protocols NetWare Core Protocol NetWare Protocols Service Advertising Protocol Routing Information Protocol
In each blank space on the left, fill in the letter of the protocol that uses the feature listed on the right. Note that more than one protocol can be matched to a particular feature. _____C, D_____ A protocol that is commonly used for Microsoft-based, peer-to-peer networks _______E______ A protocol used for packet switching _______A______ A protocol that is commonly used for Macintosh networks _______B______ A protocol designed by Digital Equipment Corporation (DEC) _______D______ A protocol originally offered by IBM _______C______ A small, fast, transport-layer protocol _____C, D_____ A protocol that is nonroutable
Chapter Review
1. A sending computer breaks the data into smaller sections, called _______________, that the protocol can handle. packets 2. Several protocols can work together in what is known as a protocol ____________. stack 3. A receiving computer copies the data from the packets to a ______________ for reassembly.
buffer 4. Protocols that support multipath LAN-to-LAN communications are known as _______________ protocols. routable 5. The receiving computer passes the reassembled data to the ____________________ in a usable form. application 6. To avoid conflicts or incomplete operations, protocols are _______________ in an orderly manner. layered 7. The _______________ order indicates where the protocol sits in the protocol stack. binding 8. Three protocol types that map roughly to the OSI reference model are application, __________________, and network. transport 9. Application protocols work at the upper layer of the OSI reference model and provide __________ _________________ between applications. data exchange 10. A NIC-driver protocol resides in the ______________ _______________ ________________ ( _________ ) sublayer of the OSI reference model. Media Access Control (MAC) 11. Rules for communicating in a particular LAN environment such as Ethernet or Token Ring are called _________________ protocols. network 12. To help the network administrator install a protocol after the initial system installation, a ______________ is included with the operating system. utility
13. TCP/IP supports routing and is commonly used as an __________________________ protocol. internetworking 14. NetBIOS is an IBM session-layer LAN interface that acts as an _____________________ interface to the network. application 15. APPC (advanced program-to-program communication) is IBM's ___________________ protocol. transport 16. NetBEUI is not a good choice for large networks because it is not _________________. routable 17. X.25 is a protocol used for a ______________ - ________________ network. packet switching 18. X.25 works in the ________________, ___________ - __________, and _________________ layers of the OSI reference model. physical, data-link, and network 19. AppleTalk is a proprietary protocol stack designed for _________________ computers. Macintosh 20. EtherTalk allows a Macintosh computer to communicate on an ___________________ network. Ethernet