ITN v7 SG SECTION 1 (Modules 1-3)

docx

School

Northampton County Area Community College *

*We aren’t endorsed by this school

Course

CISC180

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by HighnessMeerkat3580

Report
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 1. What are the criteria used to select network media? The distance it can carry a signal, installation environment, amount/size of data, and the speed it must be transmitted. 2. What are the functions of intermediary devices on a network? Connect the individual end devices to the network and They can connect multiple individual networks to form an internetwork. 3. What are the functions of end devices on a network? An end device is either the source or destination of a message transmitted over the network. 4. Which device performs the function of determining the path that messages should take through internetworks? Intermediary devices 5. Professor Kevin Manna Page 1 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) a. Identify the Intermediary devices above A, B, C, D, and G b. Identify the end devices above. E, F, H, and I 6. Explain the difference between a LAN and a WAN. A LAN is a network infrastructure that spans a small geographical area. A WAN is a network infrastructure that spans a wide geographical area. 7. What is a peer-to-peer network? A P2P network is when two or more computers are connected via a network and can share resources (such as printers and files) without having a dedicated server. Every connected end device (known as a peer) can function as both a server and a client. One computer might assume the role of server for one transaction while simultaneously serving as a client for another. The roles of client and server are set on a per-request basis. 8. What is a client/server network? A network that consists of computers connected to one or more servers 9. Which area of the network would IT staff most likely have to redesign as a direct result of many users bringing their own tablets and smartphones to the campus to access campus resources? The wireless LAN 10. Define the following internet connectivity solutions: a. cellular - Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. b. DSL - Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed. Professor Kevin Manna Page 2 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) c. satellite - The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite. d. cable - Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. e. dial-up telephone - An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling. f. leased line - Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate. 11. What is meant by the term “converged network?” It means it can deliver data, voice, and video between many different types of devices over the same network infrastructure. 12. Define QoS. Quality of Service the primary mechanism for managing congestion and ensuring reliable delivery of content to all users. The focus of QoS is to prioritize time-sensitive traffic. 13. Identify characteristics of circuit-switched networks. Each data unit knows the entire path address which is provided by the source. 14. Identify characteristics of packet-switched networks. Each data unit just knows the final destination address intermediate path is decided by the routers. Professor Kevin Manna Page 3 rev. 8/15/2020
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 15. What is “cloud” computing? Cloud computing is one of the ways that we access and store data. Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud. 16. Define the term telepresence. The use of virtual reality technology, especially for remote control of machinery or for apparent participation in distant events. 17. Identify five network security threats. Viruses, worms, and Trojan horses, Spyware, and adware, Identity theft 18. What security solutions are available to network administrators? Describe three. Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious software. Virtual private networks (VPN) - These provide secure access into an organization for remote workers. Dedicated firewall systems - These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. 19. What device provides for best path selection in a network? The Router 20. Explain the following components of a router: a. Flash - Contains the operating system (Cisco IOS) b. RAM - The RAM, or Random Access Memory, is where the router loads the IOS and the configuration file. c. ROM - The ROM is used to start and maintain the router. It contains some code, like the Bootstrap and POST, which helps the router do some basic tests and bootup when it's powered on or reloaded. You cannot alter any of the code in this memory as it has been set from the factory and is Read Only. Professor Kevin Manna Page 4 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) d. NVRAM - The NVRAM is a special memory place where the router holds its configuration. e. Console - This is a physical management port that provides out-of-band access to a Cisco device. f. Interface - The interfaces are the various serial ports or ethernet ports that we use to connect the router 21. What are some considerations before upgrading an IOS on a Cisco device? available memory, backup, compatibility, connection speed, and downtime 22. Explain the terms shell, kernel, and hardware as related to computer systems. Shell – The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. Kernel – Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Hardware – The physical part of a computer including underlying electronics. 23. What connection is required for an initial configuration of Cisco 2960 switch? console, Secure Shell (SSH), or Telnet 24. What terminal parameters are required when connecting to a Cisco device via a rollover cable? PuTTY, Tera Term, or SecureCRT 25. Explain the difference between Telnet and SSH? Which is more secure? SSH is the method for remotely building a secure CLI connection over a network via a virtual interface. Telnet is an insecure, method for remote CLI connection over a network via a virtual interface. Because of its strong encryption and authentication methods, SSH is much safer than Telnet. Professor Kevin Manna Page 5 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 26. What are the different configuration modes (prompts) on a router/switch? User EXCEC, Privileged EXEC, and Global config. 27. Explain what is meant by context-sensitive help on a Cisco device. Context-sensitive help enables you to quickly find answers to these questions: Which commands are available in each command mode? Which commands start with specific characters or group of characters? Which arguments and keywords are available to particular commands? To access context-sensitive help, simply enter a question mark, ?, at the CLI. 28. What are the commands for configuring a proper hostname on a device? From global configuration mode, enter the command hostname followed by the name of the switch and press Enter 29. Why do you configure hostnames? Makes it easier to identify devices on the network for configuration purposes. 30. What command allows you to encrypt the console and vty passwords? service password-encryption 31. What are the 3 methods you can use to verify a banner message on a Cisco device? show banner , show running-config , or show startup-config commands. 32. What interfaces and modes can be password-protected on a Cisco router? User EXEC, Privileged EXEC, and vty lines 0 15 Professor Kevin Manna Page 6 rev. 8/15/2020
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 33. A problem occurs when making a change to the configuration file on a router. If the config changes were not saved, what can be done to reverse the changes made? Remove the changed commands individually, or reload the device using the reload privileged EXEC mode command to restore the startup-config. 34. What is a virtual interface on Cisco Switch? Explain. Cisco Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore, switches have one or more switch virtual interfaces (SVIs). These are virtual interfaces because there is no hardware on the device associated with them. An SVI is created in software. The virtual interface lets you remotely manage a switch over a network using IPv4 and IPv6. 35. Why would you place an IP address and gateway address on a Layer 2 switch? To remotely access the switch. 36. Explain DHCP. How does it benefit a network? DHCP is a type of network protocol that lets devices in a TCP/IP-based network automatically get IP addresses and other network configuration settings. DHCP makes managing networks easier by automatically assigning IP addresses and related configuration settings. 37. What command enables an interface (makes it active)? the no shutdown interface configuration command. 38. What is the ping command? Why do we use it? The ping command is a troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply. Professor Kevin Manna Page 7 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 39. Explain the different hotkeys and shortcuts used when configuring a Cisco router or switch. Tab - Completes a partial command name entry. Backspace - Erases the character to the left of the cursor. Left Arrow or Ctrl+B - Moves the cursor one character to the left. Right Arrow or Ctrl+F - Moves the cursor one character to the right. Up Arrow or Ctrl+P - Recalls the previous command in the history buffer, beginning with the most recent command. Down Arrow or Ctrl+N - Goes to the next line in the history buffer. 40. Describe the following communication types: a. Unicast – when one device transmits to a single device within the network or on another network. b. Multicast – when one device transmits to a selected group of devices within the network or on another network. c. Broadcast – When one device transmits to all devices within the network or on another network. d. Anycast - any IPv6 unicast address that can be assigned to multiple devices. A packet sent to an anycast address is routed to the nearest device having that address. Anycast addresses are beyond the scope of this course. 41. What is the purpose of “flow control?” The purpose of flow control is to decide how much data can be sent and how fast it can be sent. Professor Kevin Manna Page 8 rev. 8/15/2020
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 42. Explain the seven layers of the OSI Model. 7 - Application - The application layer contains protocols used for process-to-process communications. 6 - Presentation- The presentation layer provides for common representation of the data transferred between application layer services. 5 - Session - The session layer provides services to the presentation layer to organize its dialogue and manage data exchange. 4 - Transport - The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices. 3 - Network - The network layer provides services to exchange the individual pieces of data over the network between identified end devices. 2 - Data Link - The data link layer protocols describe methods for exchanging data frames between devices over a common media 1 - Physical - The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device. 43. Explain the encapsulation process from Application layer to Physical Layer. Application Layer - Data is segmented. Transport layer - receives data from the application layer and adds information about the source and destination so that the data can be sent to the right application. Network Layer - Receives the Transport Layer segment and puts together a packet with IP addresses for both the source and destination. Data Link Layer - Adds information about the hardware, like MAC addresses, to the packet and makes the frame. Physical Layer - takes the frame and turns it into electrical or optical signals that can be sent over the physical medium. This could be copper cables, fiber optics, or wireless signals. The frame is broken up into bits that are then sent as radio waves, light pulses, or electrical impulses. 44. Identify three primary standards organizations used in Networking. Institute of Electrical and Electronics Engineers (IEEE), Electronic Industries Alliance (EIA), and American National Standards Institute (ANSI) Professor Kevin Manna Page 9 rev. 8/15/2020
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Name: ________ Date: _21 September 2023 _ Northampton Community CISC 131 – Data Communications and LANs STUDY GUIDE FOR SECTION 1 (Modules 1-3) 45. Briefly describe the following standards (to be discussed in more detail later): a. IEEE 802.3 - Ethernet b. IEEE 802.5 - Token Ring c. IEEE 802.11 - WLAN d. EIA/TIA 568a - Wire Color Code: White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown 46. What is the difference between an open standards and a proprietary standard? What are the benefits of using open standards? Proprietary standards are owned and controlled by specific groups, while open standards are open, accessible, and developed by a group of people working together. Accessibility, interoperability, innovation, and possibly lower costs are some of the benefits of open standards that make them a popular choice in many fields, especially those that depend on a lot of people working together and being able to use the same tools. 47. What are the differences and similarities between the OSI and the TCP/IP models? the similarities are in the transport and network layers; however, the two models differ in how they relate to the layers above and below. 48. What is a PDU? What are the names of the PDUs for each layer of the OSI model? PDU or Protocol Data Unit is the form that a piece of data takes at any layer. the names of the PDUs for each layer are Bit, Frame, Packet, Segment, and Data 49. What is the benefit of using a layered model? Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below Fostering competition because products from different vendors can work together Preventing technology or capability changes in one layer from affecting other layers above and below Providing a common language to describe networking functions and capabilities Professor Kevin Manna Page 10 rev. 8/15/2020