Week 8 : Final Exam - Final Exam
Question 1. 1. (TCO A) A backbone network is (Points : 10)
Question 2. 2. (TCO B) With a client-based
... [Show More] network, one fundamental problem is that (Points : 10)
.
Question 3. 3. (TCO B) What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? (Points : 10)
Question 4. 4. (TCO C) Which of the following would be considered a type of wireless media? (Points : 10)
Question 5. 5. (TCO D) The network architecture component that contains the organization’s servers is called the (Points : 10)
Question 6. 6. (TCO D) A is used by ISPs to authenticate its customers. (Points : 10)
Question 7. 7. (TCO E) Threat of intrusion comes from (Points : 10)
.
Question 8. 8. (TCO F) Which of the following is false about staff costs for a network? (Points : 10)
Question 9. 9. (TCO F) Two fundamentally different types of data are (Points : 10)
Question 10. 10. (TCO G) refers to managing and documenting the network’s hardware and software configuration. (Points : 10)
Question 11. 11. (TCO A) Describe the seven layers in the OSI network model and what they do. (Points : 25)
Layer 1, the bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers.
Layer 2, the data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. The electrical representation of the data (bit patterns, encoding methods, and tokens) is known to this layer only
Transport (Layer 4)
Layer 4, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level.
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition.
Question 12. 12. (TCO B) Which is less expensive: host-based networks or client-server networks? Explain. (Points : 25)
•In general, the hardware for a client-server network is less expensive than that required for a host- based network.
•It is also less expensive to expand a client-server network to handle increased loads.
•Expanding host-based networks is extremely expensive.
•However, the application software and management of a client-server network can be more expensive than a host-based network.
•Competition among vendors makes host-based more expensive
•Overall, client server networks are less expensive
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition.
Question 13. 13. (TCO C) Which is better, controlled access or contention? Explain. (Points : 25)
The key consideration for which is better is throughput -- which approach will permit the largest amount of user data to be transmitted through the network. In most of the 1990s, contention approaches worked better than controlled approaches for small networks that have low usage. In this case, each computer can transmit when necessary, without waiting for permission. In high volume networks, where many computers want to transmit at the same time, the well-controlled circuit originally prevented collisions and delivered better throughput in such networks. Today contention- based systems have been improved to the point where they deliver substantially better throughput and are competitive because of hardware cost considerations.
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition.
Question 14. 14. (TCO D) What is an RFP, and why do companies use them? (Points : 25)
While some network components can be purchased "off-the-shelf," most organizations develop a request for proposal (RFP) before making large network purchases. RFPs specify what equipment, software, and services are desired and ask vendors to provide their best prices. Some RFPs are very specific about what items are to be provided in what time frame. In other cases, items are defined as mandatory, important, or desirable, or several scenarios are provided and the vendor is asked to propose the best solution. In a few cases, RFPs specify generally what is required and the vendors are asked to propose their own network designs. Once the vendors have submitted their proposals, the organization evaluates them against specified criteria and selects the winner(s). Depending upon the scope and complexity of the network, it is sometimes necessary to redesign the network based on the information in the vendor’s proposals.
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition..
Question 15. 15. (TCO F) Explain how routed backbones work. (Points : 25)
A routed backbone uses a collection of routers or layer-3 switches to link LANs and transfer messages using layer-3 addresses. One switch sits at the center. It serves each LAN connected to it at the distribution layer.
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition..
Question 16. 16. (TCO G) What do network management software systems do, and why are they important? (Points : 25)
Network management software is designed to provide automated support for some or all of the network management functions. Network management software systems are used to perform some of the functions of monitors and analyzers, identify errors, run diagnostic tests, monitor entire an network,
compile statistics, and prepare real-time management reports. Network management software systems are important because they signify improved or deteriorating conditions.
There are dozens of network management tools available. Some software tools support configuration management, some support performance and fault management, while some attempt to do both. Some tools have modules to support the help desk providing end user support.
FitzGerald, Jerry, Alan Dennis, Alexandra Durcikova. Business Data Communications and Networking, 12th Edition.
Time Remaining: [Show Less]