Professional Documents
Culture Documents
Intro To Networking Concepts
Intro To Networking Concepts
Why are networks used? (1) Networks are mechanisms for sharing resources
(2) Allow multiple users and/or applications to share a
common set of data
(3) Networks can also be used to manage resources (install
software, resolve problems, etc.) from a central location.
What is a resource? Devices (ex. printers or disk drives), data and programs
accessed via a network
Remote Computer is the computer or device you are accessing via the network
Understand how an account is On a P2P network. Because each computer manages its own
required on each computer resources, then changes made on one computer (ex.
that a user wishes to access changing passwords) would have to be repeated on every
via the network. other computer if the changes were to effect all of the
computers
Advantages of a P2P network (1) Easy to configure (if the network is small - 5 or less
computers)
(2) Less expensive then Client/Server based networks
What is the role of network to utilize a special operating system known as a Network
server? Operating System or NOS that is capable of managing
networks
What is a Network Operating capable of managing networks. Windows 200x Server, ((ex.
System (NOS)? 2008 Server), UNIX, LINUX, and MAC OS X Server are
examples of network operating system)
Why do network servers only are responsible for network management and utilize a
exist on a server based common network security database that contains security
network? information (accounts, user names, passwords, rights,
permissions, etc. ) for the entire network
Why are network servers NOT because network servers perform the network management
used on a P2P network? functions for all computers on the network and P2P
networks don't function off of a network.
What is the role of client manages the operation of the client (ex. starting programs,
operating system? allocating memory and accessing disk drives on the client)
and interfaces with the network operating system for
network operations
(1) Windows XP and Windows 7 are examples of client O/S in
Windows
(2) Windows Server is also a client operating system when it
is running on a computer that is not a network server (a
server that is not performing network management
functions)
What is a member server? are computers that provide services via a network (ex.
database servers or web servers) but DO NOT perform
network management functions
Disadvantages of a server (1) Cost of the hardware (network server) and software
based network (network operating system)
(2) Complex to install and maintain
(3) Specialized expertise is required to manage client/server
based networks
What is the difference Topic addresses how the data is processed on a network as
between client opposed to topic 5 which dealt with how the network is
processing based application managed
and server
processing based application?
What is the difference LAN is confined to a relatively small area and WAN spans a
between LAN and WAN? large area.
transmission media The means through which data is transmitted and received.
Can be physical (wire or fiber optic) or atmospheric
(microwave or radio)
What is a NIC (also known as Device that enables a computer or other device
Network on a network to connect to the network. NICs can be
Interface Card or Network circuitry on the computers system board, a card or board
Adapter) that is plugged into the computer or an external NIC such a
USB NIC
file services provide the ability to share disk storage (folders, files,
etc.) that are stored and managed on a network file server
1. Network
1. is the computer or device you are accessing via the network
4. is a group of computers and possibly other devices (ex. printers) connected by some type
of transmission media (ex. wire, fiber optic, wireless)
b. What is a peer-to-peer network?
4. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for
the entire network
b. Understand how an account is required on each computer that a user wishes to access via the network.
2. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
3. On a P2P network. Because each computer manages its own resources, then changes made
on one computer (ex. changing passwords) would have to be repeated on every other computer if the
changes were to effect all of the computers
4. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
b. Addressing
2. LAN is confined to a relatively small area and WAN spans a large area.
1. is the computer or device you are accessing via the network
4. is the computer or device you are accessing via the network
b. What is the difference between LAN and WAN?
1. is the computer or device you are accessing via the network
3. LAN is confined to a relatively small area and WAN spans a large area.
4. A single connection between multiple segments of a
network.
b. What is a network client?
3. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
4. Computers that are attached to a client/server based network but DO NOT provide network
management functions
b. Permissions
3. what resources a user can access and what the user can do with these resources
4. is the computer or device you are accessing via the network
b. Remote Computer
3. is the computer or device you are accessing via the network
4. is sometimes used to refer to a network that connects multiple closely located buildings
b. Client
1. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
1. are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions
3. to utilize a special operating system known as a Network Operating System or NOS that is
capable of managing networks
1. is the computer or device you are accessing via the network
3. is the computer or device you are accessing via the network
3. is sometimes used to refer to a network that connects multiple closely located buildings
2. The physical layout of a network. The most commonly used topologies are:
Bus topology and star topology
3. is the computer or device you are accessing via the network
1. The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)
3. Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed
1. The terms client/server application and distributed processing, when used in the context
of applications, refers to a design that combines clients and servers in order to process data
3. LAN is confined to a relatively small area and WAN spans a large area.
4. is the computer or device you are accessing via the network
b. Workgroups
2. is the computer or device you are accessing via the network
3. home and personnel computers or notebook computers. Refers back to peer-to-peer
network.
3. is the computer or device you are accessing via the network
4. is the computer or device you are accessing via the network
b. connectivity device
2. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
2. is the computer or device you are accessing via the network
4. is the computer or device you are accessing via the network
b. what is a client/server network?
2. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
3. Computers that are attached to a client/server based network but DO NOT provide network
management functions
2. LAN is confined to a relatively small area and WAN spans a large area.
3. capable of managing networks. Windows 200x Server, ((ex. 2008 Server), UNIX, LINUX, and
MAC OS X Server are examples of network operating system)
2. manages the operation of the client (ex. starting programs, allocating memory and
accessing disk drives on the client) and interfaces with the network operating system for network
operations
(1) Windows XP and Windows 7 are examples of client O/S in Windows
(2) Windows Server is also a client operating system when it is running on a computer that is not a
network server (a server that is not performing network management functions)
3. Devices (ex. printers or disk drives), data and programs accessed via a network
4. LAN is confined to a relatively small area and WAN spans a large area.
b. What is a packet?
1. is the computer or device you are accessing via the network
2. what resources a user can access and what the user can do with these resources
4. Unit of data that is transmitted across a network. The actual data that is sent across a
network (ex. an entire
file) is usually too big to be transmitted as a single unit and must be broken up into smaller units
known as packets.
b. Advantages of server based network
1. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for the
entire network
2. LAN is confined to a relatively small area and WAN spans a large area.
1. Computers that are attached to a client/server based network but DO NOT provide network
management functions
2. are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions
3. is the computer or device you are accessing via the network
4. is the computer or device you are accessing via the network
b. Why are network servers NOT used on a P2P network?
2. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
4. is sometimes used to refer to a network that connects multiple closely located buildings
b. Backbone
4. is the computer or device you are accessing via the network
b. internet services
1. is the computer or device you are accessing via the network
1. is the computer or device you are accessing via the network
2. Devices (ex. printers or disk drives), data and programs accessed via a network
1. Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed
2. what resources a user can access and what the user can do with these resources
3. LAN is confined to a relatively small area and WAN spans a large area.
4. The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)
b. segment
802.11n wireless standard that specifies a data rate over 100 Mbps
Broadcast Address Address that consist of all 1 bits and is sent across a network
Distance Vector Routing algorithm where each link is assigned a weight and
distance
Forwarding Table A set of values that specify a destination and the next hop
used to reach that destination.
GPS System of satellites that provide accurate time and location
information.
Jitter The changes in delay that occur and the duration of the
changes
Layer 4 of the TCP/IP model Specifies messages and procedures used to reliable transfer
Packet Filter A mechanism that examines fields in each packet header and
decides to allow it to pass or not
Propagation Delay The time required for a signal to travel across a transmission
medium
SSL Fits between the application and socket API and encrypts data
before transmission
Subnet Mask Marks the boundary between the network prefix and host
prefix
WEP Original security for Wi-Fi has weakness such as a short static
key
1. Time to Live
4. Packet Filter
b. WiFi
a. Wiretapping
b. ISM wireless
d. Packet Switching
a. a commonly used Internal Gateway Control.
a. QoS
b. OSPF
c. WEP
d. GPS
a. Connects two LAN segments and forward frames
a. Router
b. Bridge
c. RIP
d. ARP
a. Personal area wireless technology for exchanging data over short distances
a. Bluetooth
b. BOOTP
c. Switch
d. Buffer
a. analog device, provides multiple ports to attach computers, handles signals not packets
a. DHCP
b. BGP
c. PAN
d. Hub
a. Used to test network applications
a. Packet Filter
b. Link State
c. MAC Address
d. Loopback Address
a. None of the above
a. PAN
b. ping
c. IGP
d. PGP
a. The time required for a signal to travel across a transmission medium
a. Router
b. Plaintext
c. Repeater
d. Propagation Delay
a. Value decremented by each router that processes a datagram - which is discarded when the value
reaches 0
a. Time to Live
b. access point
c. Firewall
d. IPv6
a. Wireless standard that specifies a data rate of 2.4Ghz
a. 802.11
b. 802.11n
c. 4G
d. 802.11g
a. The changes in delay that occur and the duration of the changes
a. VSAT
b. IPv4
c. Router
d. Jitter
a. Routing algorithm where each link is assigned a weight and distance
a. VLAN Switch
b. Static Routing
c. Distance Vector
d. Link State
a. Packet sent across TCP/IP Internet
1. Datagram
2. Jitter
3. NAT
4. IGP
b. Cellular technology that focuses on real time multimedia
1. BGP
2. NAT
3. 4G
4. EGP
b. Divides computers into separate broadcast domains
1. VLAN Switch
2. Latency
3. Switch
4. LAN
b. Protocol that allows a host to join or leave a multicast group
1. PGP
2. GSM
3. IGMP
4. IGP
b. Pan standards
1. 802.11n
2. PGP
3. MTU
4. 802.15
b. A message after it has been ecrypted
1. Repeater
2. Plaintext
3. InfraRED
4. Cypher Text
b. Uses port 443 to provide authenticated, confidential communication over the web
1. TCP
2. HTTPS
3. MTU
4. GPS
b. MAC
3. Broadcast Address
1. Hashing
2. Queuing Delay
3. ping
4. Link State
b. Line of sight communication between a small device and nearby system
1. ARPANET
2. Anycast
3. InfraRED
4. Repeater
b. OSPF
1. Link State
2. Time to Live
3. Digital Certificates
1. QoS
2. WEP
3. PAN
4. VSAT
b. Provides data integrity
1. ping
2. Hashing
3. Radius
4. PAN
b. Protocol that converts between IP protocol and hardware adddress
1. RIP
2. ARP
3. RTP
4. IGP
b. Uses Store and Forward
1. Phishing
2. Packet Filter
3. VLAN Switch
4. Packet Switching
b. Uses 128 bit addresses
1. GPS
2. RIP
3. IPv6
4. RSVP
b. Digital device, provides multiple ports to attach computer, forward packets
1. Switch
2. RTP
3. DHCP
4. RFID
b. Wireless standard that specifies enhanced security such as WPA2
1. 802.15
2. 802.11i
3. 802.11n
4. IGMP
b. Provides the mechanism to transmit real-time data across the Internet
1. TCP
2. RIP
3. RTP
4. WEP
b. Best effort
1. PGP
2. RIP
3. ARP
4. UDP
b. Layer at which a router functions
2. Zigbee technology
3. ARP Cache
1. SYN Flood
2. Sliding Window
3. Switch
4. Queuing Delay
b. Protocol that is used to report errors in transmission back to the original sender
1. ICMP
2. Echo
3. ICANN
4. IGMP
b. data area of the packet
1. Anycast
2. payload
3. VSAT
4. SYN Flood
b. "Areas of the electromagnetic spectrum that can be used by Industrial, Scientific and Medical groups
and are broadly available for products"
1. Firewall
2. Cypher Text
3. GSM
4. ISM wireless
b. Original security for Wi-Fi has weakness such as a short static key
1. EGP
2. RIP
3. WEP
4. PGP
b. Time required to transfer data across a network
1. TCP
2. Latency
3. NAT
4. LAN
b. An organization established to handle Internet Address assignment
1. PAN
2. ARP
3. ICANN
4. Unicast
b. Helps protect an organization's network from unwanted Internet traffic
1. SSL
2. Jitter
3. ICANN
4. Firewall
b. Provides message authentication
1. MAC Address
2. Digital Signatures
3. Link State
4. Wiretapping
b. Sending a stream of random segments to exhaust a receiver's set of TCP Connections
1. InfraRED
2. RFID
3. payload
4. SYN Flood
b. Placing IP Datagram in the Payload of a frame for transmission across physical network
1. Unicast
2. VSAT
3. LAN
4. Encapsulation
b. Conversion of a binary IP Address to a convention where each octet is expressed in decimal
1. Zigbee technology
1. Router
2. Repeater
3. BOOTP
4. RTP
b. Uses a single key shared by communication entities
2. Packet Switching
4. Packet Filter
Answer Key
Multiple Choice Questions