Professional Documents
Culture Documents
TRUE/FALSE
1. In a star topology, a single connection failure will halt all traffic between all sites.
2. Dial-up ISDN does not convert a computer’s digital signals to analog before transmitting them over
the PSTN.
MULTIPLE CHOICE
3. Because WAN connections require routers or other Layer 3 devices to connect locations, their links are
not capable of carrying ____ protocols.
a. open c. routable
b. standard d. nonroutable
ANS: D PTS: 1 REF: 301
4. On most modern WANs, a ring topology relies on ____ rings to carry data.
a. flexible c. serial
b. open d. redundant
ANS: D PTS: 1 REF: 302
5. The portion of the PSTN that connects any residence or business to the nearest CO is known as the
____.
a. demarcation point c. local loop
b. NIU (Network Interface Unit) d. central office
ANS: C PTS: 1 REF: 308
7. ____ is an updated, digital version of X.25 that also relies on packet switching.
a. DSL c. Frame relay
b. ISDN d. ATM
ANS: C PTS: 1 REF: 309
8. In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective
throughput of 128 Kbps.
a. slicing c. merging
b. linking d. bonding
ANS: D PTS: 1 REF: 311
9. A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
a. terminal adapter c. smart jack
b. DSLAM d. terminator
ANS: A PTS: 1 REF: 311
10. ISDN PRI uses ____ B channels and one 64-Kbps D channel.
a. 10 c. 23
b. 12 d. 32
ANS: C PTS: 1 REF: 312
12. At the customer’s demarcation point, either inside or outside the building, T-carrier wire pairs
terminate with a ____.
a. terminal adapter c. CSU/DSU
b. smart jack d. switch
ANS: B PTS: 1 REF: 315
13. A ____ aggregates multiple DSL subscriber lines and connects them to the carrier’s CO.
a. terminal adapter c. smart jack
b. DSLAM d. terminator
ANS: B PTS: 1 REF: 320
14. Broadband cable requires many subscribers to share the same local line, thus raising concerns about
____ and actual (versus theoretical) throughput.
a. access c. noise
b. costs d. security
ANS: D PTS: 1 REF: 322
15. What sets ATM apart from Ethernet is its ____ size.
a. channel c. variable packet
b. frame d. fixed packet
ANS: D PTS: 1 REF: 324
16. SONET’s extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
a. throughput c. fault tolerance
b. low cost d. latency
ANS: C PTS: 1 REF: 325
17. The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally
recognized by networking professionals and standards organizations.
a. OC (Optical Carrier) level c. BRI (Basic Rate Interface)
b. CIR (committed information rate) d. DS0 (digital signal, level 0)
ANS: A PTS: 1 REF: 326
18. ____ networking refers to dialing directly into a private network’s or ISP’s remote access server to log
on to a network.
a. Remote c. Dial-up
b. Direct d. Virtual
ANS: C PTS: 1 REF: 329
19. ____ is the preferred communications protocol for remote access communications.
a. SLIP c. PPP
b. IP d. TCP/IP
ANS: C PTS: 1 REF: 332
20. ____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
a. SLIP c. PPP
b. SLIPoE d. PPPoE
ANS: D PTS: 1 REF: 332
21. ____ virtual computing allows a user on one computer, called the client, to control another computer,
called the host or server, across a network connection.
a. Random c. Open
b. Network d. Remote
ANS: D PTS: 1 REF: 333
COMPLETION
1. ____________________ are connections between network nodes that, although based on potentially
disparate physical links, logically appear to be direct, dedicated links between those nodes.
ANS: Virtual circuits
2. A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single
channel into multiple channels.
ANS: T-carrier
3. ____________________ encapsulates incoming Ethernet or token ring frames, then converts them into
ATM cells for transmission over an ATM network.
ANS:
LANE (LAN Emulation)
LAN Emulation
LANE
4. ____________________ is the remote virtual computing software that comes with Windows client
and server operating systems.
ANS:
VNC (virtual network computing)
Virtual network computing
VNC
MATCHING
SHORT ANSWER
ANS:
WANs and LANs have several fundamental properties in common. Both are designed to enable
communication between clients and hosts for resource sharing. In general, both use the same protocols
from Layers 3 and higher of the OSI model. And both networks typically carry digitized data via
packet-switched connections.
ANS:
PSTN, which stands for Public Switched Telephone Network, refers to the network of lines and carrier
equipment that provides telephone service to most homes and businesses. PSTN may also be called
POTS (plain old telephone service). The PSTN encompasses the entire telephone system, from the
wires that enter homes and businesses to the network centers that connect different regions of a
country.
ANS:
An important difference between frame relay and X.25 is that frame relay does not guarantee reliable
delivery of data. X.25 checks for errors and, in the case of an error, either corrects the damaged data or
retransmits the original data. Frame relay, on the other hand, simply checks for errors. It leaves the
error correction up to higher-layer protocols.
5. Define the term xDSL and name the better known DSL varieties.
ANS:
The term xDSL refers to all DSL varieties, of which at least eight currently exist. The better known
DSL varieties include ADSL (Asymmetric DSL), G.Lite (a version of ADSL), HDSL (High Bit-Rate
DSL), SDSL (Symmetric or Single-Line DSL), VDSL (Very High Bit-Rate DSL), and SHDSL
(Single-Line High Bit-Rate DSL) - the x in xDSL is replaced by the variety name.
ANS:
Broadband cable connections require that the customer use a special cable modem, a device that
modulates and demodulates signals for transmission and reception via cable wiring. Cable modems
operate at the Physical and Data Link layer of the OSI model, and, therefore, do not manipulate
higher-layer protocols, such as IP. The cable modem then connects to a customer’s PC via an RJ-45,
USB, or wireless interface to a NIC. Alternately, the cable modem could connect to a connectivity
device, such as a hub, switch, or router, thereby supplying bandwidth to a LAN rather than to just one
computer. It’s also possible to use a device that combines cable modem functionality with a router; this
single device can then provide both the broadband cable connection and the capability of sharing the
bandwidth between multiple nodes.
ANS:
Like X.25 and frame relay, ATM relies on virtual circuits. On an ATM network, switches determine
the optimal path between the sender and receiver, then establish this path before the network transmits
data. Because ATM packages data into cells before transmission, each of which travels separately to
its destination, ATM is typically considered a packet-switching technology. At the same time, the use
of virtual circuits means that ATM provides the main advantage of circuit switching - that is, a
point-to-point connection that remains reliably available to the transmission until it completes, making
ATM a connection-oriented technology.
ANS:
Perhaps the most important SONET advantage is that it provides interoperability. Before SONET,
telecommunications carriers that used different signaling techniques (or even the same technique but
different equipment) could not be assured that their networks could communicate. Now, SONET is
often used to aggregate multiple T1s, T3s, or ISDN lines. SONET is also used as the underlying
technology for ATM transmission. Furthermore, because it can work directly with the different
standards used in different countries, SONET has emerged as the best choice for linking WANs
between North America, Europe, and Asia. Internationally, SONET is known as SDH (Synchronous
Digital Hierarchy).
ANS:
RRAS (Routing and Remote Access Service) is Microsoft’s remote access software available with the
Windows Server 2003 and Server 2008 network operating systems and the Windows XP and Vista
client operating systems. RRAS enables a computer to accept multiple remote client connections over
any type of transmission path. It also enables the server to act as a router, determining where to direct
incoming packets across the network. Further, RRAS incorporates multiple security provisions to
ensure that data cannot be intercepted and interpreted by anyone other than the intended recipient and
to ensure that only authorized clients can connect to the remote access server.
ANS:
Two important considerations when designing a VPN are interoperability and security. To ensure a
VPN can carry all types of data in a private manner over any kind of connection, special VPN
protocols encapsulate higher-layer protocols in a process known as tunneling. You can say that these
protocols create the virtual connection, or tunnel, between two VPN nodes. One endpoint of the tunnel
is the client. The other endpoint may be a connectivity device (for example, a router, firewall, or
gateway) or a remote access server that allows clients to log on to the network.