You are on page 1of 12

26 Chapter 1 An Introduction to Networking

WAN (wide area network) A network that spans a long distance and connects two or more
LANs.
Web server A computer that manages Web site services, such as supplying a Web page to
multiple users on demand.
wide area network See WAN.
workstation A computer that runs a desktop operating system and connects to a network.

Review Questions
1. Which of the following is an advantage of using a client/server network over using a
peer-to-peer network?
a. A client/server network is simpler to set up. ✗

b. A client/server network allows resources to be managed centrally.


+
c. A client/server network does not require a network operating system.
d. A client/server network is less expensive to set up. ✗
2. What is the primary function of a file server on a client/server network?
a. It monitors how many users are logged on to a WAN.

:
b. It manages access and use of shared applications and data.
c. It prevents unauthorized remote users from connecting to a LAN.
d. It routes traffic between two or more LANs.
3. Suppose you wanted to share documents among several computers in your household in
a peer-to-peer fashion. You could do that by properly configuring which of the
following types of software?
a. Word-processing software
b. Remote authentication software
c. Mail client software
d. Operating system software
4. The first services widely used by networks were:
a. Fax services
b. Network management services
c. Mail services
d. File and print services
5. On a client/server network, clients and servers usually require what to communicate?
a. A connectivity device
b. A Web site
c. A remote access server
d. A mail server
Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Review Questions 27

6. Your colleague, in describing the benefits of a client/server network, mentions


that it’s more scalable than a peer-to-peer network. What does she mean by 1
this?
a. The client/server network can be more easily expanded.
b. The client/server network is simpler to set up.
c. The client/server network can be run on free software.
d. The client/server network allows more users to log on at one time.
7. In which of the following environments would a WAN be most appropriate?
a. A large data center in which each employee’s access is centrally controlled
b. A global hotel chain connecting its reservation desks to a central call center
c. A home office connecting its personal computers between the den, living room, and
bedroom
d. A local newspaper connecting to a global news agency’s Web site
8. Which of the following refers to the combination of voice (such as telephone), video,
and data signals sent over the same network?
a. Switching
b. Remote access
c. Convergence
d. Network management
9. In networking, what does a packet refer to?
a. An electrical signal
b. A unit of data
c. An alarm
d. A way to connect a node with a network
10. How can a server distinguish between many clients on a network?
a. Each client is identified by a unique network address.
b. Each client regularly transmits a signal that indicates its network location and
unique client characteristics.
c. Each client has a different electromagnetic characteristic to its signal, similar to dif-
ferences in human voices.
d. Each client uses uniquely modified versions of the same network protocol.
11. What device connects a client computer to a network’s medium, such as a wire?
a. Network line extender
b. Network terminator
c. Network junction clip
d. Network interface card

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
28 Chapter 1 An Introduction to Networking

12. What elements of a network ensure that data arrive at their intended destination in the
correct sequence?
a. Rings
b. Backbones
c. Protocols
d. File servers
13. The physical layout of nodes on a network is known as the network’s:
a. Topology
b. Schematic
c. Formation
d. Grid
14. Which of the following is an example of a mail service?
a. Preventing unauthorized users from gaining access to the network and, in particu-
lar, to its mail server
b. Ensuring that users are not running more copies of an e-mail client than have been
purchased
c. Exchanging messages between mail servers on different networks
d. Enabling users to print messages from their e-mail client software
15. Which of the following network topologies is most common on today’s networks?
a. Ring
b. Fan
c. Star
d. Bus
16. Security is a concern when using remote access servers on a network because:
a. Access servers enable computers to connect to a network and obtain access to its
resources, thereby exposing the network to the outside world.
b. Access servers have poor password enforcement capabilities and rely on users to
choose good passwords.
c. Access servers cannot accept encoded data transfers, requiring users to transmit
plain text to and from the network.
d. Access servers are difficult to understand and support, and so many networks are
using them incorrectly and perhaps insecurely.
17. Which of the following is an example of asset management on a client/server network?
a. Ensuring that sensitive data is secured from unauthorized access
b. Assessing the peak activity times on a server and ensuring extra processing power is
available at those times
c. Backing up critical data files on a regular basis
d. Determining how many handheld computers are in a company’s warehouse
Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hands-On Projects 29

18. Distributing data transfer activity equally over several devices or components belongs to
which category of network management services? 1
a. Traffic monitoring
b. Load balancing
c. Address management
d. File and print services
19. Apache is a popular example of what type of networking software?
a. License tracking
b. Web server
c. Backup
d. Mail server
20. What organization sponsors the CCNA and CCIE certifications?
a. Cisco
b. CompTIA
c. IEEE
d. WITI

Hands-On Projects
Project 1-1
3.5 During your career in networking, you will frequently need to interpret net-
work drawings, if not create them yourself. Although seasoned networking pro-
fessionals use software to help them depict a network, many designs start with a
simple sketch. To familiarize yourself with network components and layout, in this project
you will draw some simple network diagrams. This project requires only pencil and paper. If
you need help remembering what each network topology looks like, refer to Figure 1-7.
1. On your sheet of paper, draw a basic bus topology with four computers attached to the
backbone, or bus. Label the computers A, B, C, and D.
2. Now imagine that the user at computer A needs to open a file on computer D, in a peer-
to-peer fashion. What path do you think the data will follow from A to D and then
from D to A? Add this path, as a dotted line, to your network diagram.
3. On the opposite side of your paper, using no more than half of a page, draw a star
topology with four computers attached to a central connectivity device. Label the work-
stations E, F, G, and H.
4. Imagine that the user at computer E wants to open a file that is on computer H’s hard
disk, in a peer-to-peer fashion. With a dotted line, draw the path you think data would
take between these two computers.
5. Now add a printer and a server to your star-topology network drawing. With the addition
of a server, you have changed the network from a peer-to-peer network to a client/server
network. The printer has become a resource that all the workstation users can share.
Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Review Questions 67

Review Questions
1. Your supervisor has asked you to correct several cable management problems that
might be slowing down the network. Which = organization’s standards will guide you in 2
assessing your firm’s current cabling situation?
a. ISO
b. ITU


c. TIA/EIA
d. IEEE
2. Which technology does the IEEE 802.11 specification describe?
_

a. Network security
b. Ethernet LANs
c. Logical Link Control

d. Wireless networks
3. You are configuring clients to communicate over an Ethernet LAN. Which of the
following IEEE specifications will identify which frame type your client should use?

÷
a. 801.2
b. 802.3
c. 802.11
d. 801.16
4. Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)?
a. Application layer
b. Data Link layer
c. Network layer


d. Transport layer
5. Suppose your network is connected to another network via a router. Which OSI model
layer provides the information necessary to direct data between the two networks?
a. Data Link layer
b. Physical layer


c. Network layer
d. Session layer
6. In which two layers of the OSI model do NICs belong? 0
a. Presentation and Application layers
b. Transport and Network layers
c. Network and Data Link layers


d. Physical and Data Link layers

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
68 Chapter 2 Networking Standards and the OSI Model

7. Which OSI model layer is responsible for keeping open a communications path between
-
your computer and the server when you dial in to a remote access server?


a. Session layer
b. Data Link layer
c. Presentation layer
d. Physical layer
8. Under what circumstances would the Transport layer use segmentation? •
a. When too many data frames are flooding into a receiving node’s NIC
b. When more than 10 percent of transmitted frames are damaged


c. When the destination node cannot accept the size of the data blocks transmitted by
the source node
d. When the source node requests that data blocks be segmented for faster processing
9. Which OSI model layer generates and detects voltage so as to transmit and receive
-

signals carrying data?


a. Physical layer
b. Data Link layer
c. Network layer
d. Transport layer

-
10. An IP address is an example of what type of address?
a. Physical layer


b. Network layer
c. MAC sublayer
d. Data Link sublayer

-
11. If the TCP protocol did not receive an acknowledgment for data it transmitted, what
would it do?
a. Issue its own acknowledgment, indicating to the recipient that it did not receive the
acknowledgment it expected
b. Issue a warning frame to tell the recipient it would retransmit the data if it did not
receive the acknowledgment within a certain time frame
c. Reestablish the connection with the recipient


d. Retransmit the data to the recipient
12. Which part of a MAC address is unique to each manufacturer?
a. The destination ID


b. The OUI
c. The physical node ID
d. The SYN

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Review Questions 69

13. What is the purpose of the trailer field added to a frame in the Data
Link layer?
a. To indicate the sum of the error-checking algorithm
b. To signal the rate at which a node can receive the data 2
-
c. To mark the end of a frame
d. To represent the frame’s sequence number
14. Which layer of the OSI model encapsulates Network layer packets?
a. Physical layer
b. Session layer


c. Data Link layer
d. Transport layer
15. At what OSI model layer do protocols manage data delivery priorities?
a. Presentation layer
b. Session layer
c. Transport layer
d. Network layer


16. What are the sublayers of the Data Link layer as defined in the IEEE 802
standards?


a. Logical Link Control sublayer and Media Access Control sublayer
b. Transport Control sublayer and Media Access Control sublayer
c. Logical Link Control sublayer and Physical Addressing sublayer
d. Transport Control sublayer and Data Link Control sublayer
17. Suppose that, at the receiving node, a frame’s FCS doesn’t match the FCS it was issued
at the transmitting node. What happens as a result?
a. The receiving node’s Transport layer assesses the error and corrects it.
b. The transmitting node’s Data Link layer assesses the error and corrects it.


c. The receiving node’s Data Link layer requests a retransmission.
d. The transmitting node’s Transport layer immediately issues a replacement
frame.
18. In which of the following situations would it be most desirable to use a connectionless
-
Transport layer protocol?
a. When retrieving a spreadsheet from a busy file server


b. When viewing a movie on the Web
c. When connecting to a graphics-intensive Web site
d. When sending an e-mail message to a long list of recipients

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
70 Chapter 2 Networking Standards and the OSI Model

÷
19. Which of the following would be found in a Data Link layer header?
a. The packet’s fragmentation offset
b. The packet’s sequence number
c. The source’s logical address
d. The source’s physical address
20. By default, what is the largest data payload that packets on an Ethernet network can accept?
a. 64 bytes
b. 128 bytes
c. 1500 bytes
d. 2400 bytes

Hands-On Projects
Project 2-1
To better understand the impact IEEE has on networking standards, it is helpful
to read the actual standards and consider how they are used. This project will
guide you through the process of searching for IEEE specifications on the Web.
You will also take a look at the IEEE 802.3 standard for the most popular form of LAN technol-
ogy, Ethernet. To complete this project, you need a computer with access to the Internet
(through a high-speed connection), a Web browser, and Adobe Reader (available for free at
www.adobe.com). This exercise further assumes that your Web browser is configured to
recognize and open Adobe documents automatically when one is selected.
Steps in this project matched the Web sites mentioned at the time this book was published.
If you notice discrepancies, look for similar links and follow the same general steps.
1. Access the Internet and navigate to standards.ieee.org. The IEEE Standards Association
Home page appears.
2. In the text box below the “Find a Standard” heading, type Ethernet. In the select site
area drop-down box, choose Wired & Wireless. Click GO to perform your search.
A list of search results appears.
3. Scroll down the search results page and note the number of matching abstracts found.
For those abstracts that give designation numbers (for example, 802.3az), note the
numbers as well.
4. The filenames for each abstract indicate when that document was last updated. What
was the revision date of the most recent standard beginning with 802.3? Why do you
suppose this standard would be updated frequently?
5. If you were to click on the standards returned by this search, you would need to enter a
logon ID and password to read that standard. However, IEEE’s 802 (LAN/MAN) com-
mittee has made available archived versions of its popular standards at no cost.
To access the free online standards, point your browser to the following Web page:
http://standards.ieee.org/about/get/index.html. The Get IEEE 802 Portfolio of IEEE
Standards Web page appears.

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
132 Chapter 3 Transmission Basics and Networking Media

Review Questions
1. What is different about the method used to boost a digital signal’s strength, compared
with the method of boosting an analog signal’s strength?
a. A digital signal requires an amplifier, which increases the strength of both the noise
and the signal, and an analog signal requires a repeater, which retransmits the
signal in its original form.
b. A digital signal requires a repeater, which increases the strength of both the signal
and the noise it has accumulated, and an analog signal requires an amplifier, which
retransmits the signal in its original form.
c. A digital signal requires a repeater, which retransmits the signal in its original form,
and an analog signal requires an amplifier, which increases the strength of both the
signal and the noise it has accumulated.

d. A digital signal requires an amplifier, which introduces noise into the signal,
and an analog signal requires a repeater, which retransmits the signal in its
original form.
2. Which of the following decimal numbers corresponds to the binary number
00001001?
a. 3
b. 5
c. 7

d. 9
3. A wave with which of the following frequencies would have the longest wavelength?
a. 10 MHz
b. 100 MHz
c. 1 GHz
×
d. 100 GHz
4. Ethernet relies on which of the following transmission types?
a. Simplex
b. Half-simplex
c. Half-duplex

d. Full-duplex
5. In wavelength division multiplexing, two modulated signals are guaranteed to differ in
what characteristic?
a. Throughput

b. Color
c. Amplitude
d. Phase

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Review Questions 133

6. Which of the following can increase latency on a network?


a. An EMI source, such as fluorescent lighting
b. The use of full-duplex transmission
c. The use of multiple protocols

d. Adding 50 meters to the length of the network
3
7. What part of a cable protects it against environmental damage?


a. Sheath
b. Braiding
c. Plenum
d. Cladding
8. You are helping to install a cable broadband system in your friend’s home. She wants to
bring the signal from where the service provider’s cable enters the house to a room on
another floor, which means you have to attach a new cable to the existing one. What
type of cable should this be?


a. RG-6
b. RG-8
c. RG-58
d. RG-59
9. With everything else being equal, a network using which of the following UTP types will
suffer the most cross talk?

a. Cat 3
b. Cat 5
c. Cat 6a
d. Cat 7
10. Which of the following is not a source of EMI?
a. Power line
b. Megaphone

c. Microwave oven
d. Fluorescent lights
11. Which of the following network transmission media offers the highest potential
throughput over the longest distances?
a. MMF

b. SMF
c. UTP
d. STP

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
134 Chapter 3 Transmission Basics and Networking Media

12. In which of the following network links might you use MT-RJ connectors?
a. A coaxial connection between a cable modem and a server
b. A UTP connection between a workstation and a hub
c. A wireless connection between a handheld computer and a desktop computer

d. A fiber-optic connection between a server and router
13. Fiber-optic cable networks can span much longer distances than copper-based networks
before requiring repeaters because:
a. They use wavelength division multiplexing.

b. Their signals never require amplification.
c. They are resistant to noise such as EMI.
d. Their signals do not suffer degradation no matter how small the cable’s bend
radius.
14. What is the purpose of cladding in a fiber-optic cable?
a. It reflects the signal back to the core.

b. It protects the inner core from damage.
c. It shields the signal from EMI.
d. It concentrates the signal and helps keep it from fading.
15. Which of the following is a potential drawback to using fiber-optic cable for LANs?
a. It is expensive.

b. It cannot handle high-bandwidth transmissions.
c. It can carry transmissions using only TCP/IP.
d. It is not yet an accepted standard for high-speed networking.
16. In what part of a structured cabling system would you find users’ desktop computers?
a. Telco room
b. MDF
c. IDF

d. Work area
17. Every user at one location on your company’s WAN is unable to reach the Internet.
Your colleague on the network management team suspects a critical router is unable to
connect to the network. Because you’re in the building affected by the outage, she asks
you to troubleshoot the router. You confirm that the router is not responding to any
requests over the network. Which of the following do you use to connect directly from
your laptop to the router to diagnose it?
a. An RG-6 cable
b. An RG-58 cable

c. A serial cable
d. An SMF cable
Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hands-On Projects 135

18. What is the maximum distance specified in the structured cabling standard for a
horizontal wiring subsystem?
a. 10 m
b. 90 m


c. 100 m
d. 200 m 3
19. How many wire pairs can a single 110 block terminate?
a. 55
b. 110
c. 200

d. It depends on the type of 110 block.
20. Your campuswide WAN is experiencing slow Internet response times. When you
call your Internet service provider to ask if they can troubleshoot the problem from
their end, they warn you that their responsibilities end at the demarc. What do they
mean?
a. They will not diagnose problems beyond your organization’s MDF.


b. They will not diagnose problems beyond your organization’s entrance
facilities.
c. They will not diagnose problems beyond your organization’s IDF.
d. They will not diagnose problems beyond your organization’s telco rooms.

Hands-On Projects
Project 3-1
Sometimes Network layer addresses are expressed in binary, rather than
decimal form. As you will learn in Chapter 4, certain addresses have reserved
uses, and as a networking professional, you will quickly become familiar with
them. Although you might have access to a calculator that will convert binary numbers to
their decimal equivalents, it is valuable to be able to do this on your own, too, and to
know the reserved addresses by heart. Also, CompTIA’s Network+ exam will likely ask
you to translate binary and decimal numbers. In this project, you will gain practice convert-
ing numbers found in some of the most frequently used Network layer addresses. Do not
use a calculator for this exercise.
1. On a blank piece of paper, draw a translation key for yourself. Label one row “Bit posi-
tion,” then in that row write the numbers 7 through 0 in descending order, as shown in the
top row of Figure 3-4.
2. Beneath the row you created in Step 1, create a row labeled “Value” and write the
numbers 128, 64, 32, 16, 8, 4, 2, and 1 beneath the bit position numbers in row 1, as
shown in the bottom row of Figure 3-4.

Copyright 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

You might also like