Download Chapter 10 Exercises

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Dynamic Host Configuration Protocol wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Distributed firewall wikipedia , lookup

Internet protocol suite wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

AppleTalk wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Chapter 10 Exercises
Multiple Choice
Select the best answer.
1. When selecting a network card, you should consider all of the following except:
a. the speed and type of network to which you are attaching
b. the MAC address of the card
c. the type of cable or wireless connection used
d. the type of expansion slot in which to install the card
2. Which of the following is not a type of cable used for 10-Mbps Ethernet?
a. STP
b. UTP
c. coaxial
d. fiber-optic
3. Which of these items is not included in a URL (Uniform Resource Locator)?
a. application protocol
b. domain name
c. NetBIOS name
d. host name
4. When troubleshooting an Internet or LAN connection, entering the commands
_________ and _________ will lease a new IP address.
a. getmac, ping /lease
b. nslookup, ipconfig /lease
c. ping /all, ipconfig /all
d. ipconfig /release, ipconfig /renew
5. Which of the following is not an OS protocol supported by Windows?
a. FDDI
b. NetBEUI
c. IPX/SPX
d. TCP/IP
Answers
1. b
2. d
3. c
4. d
5. a
Fill in the Blank
Write the word or phrase to fill in the blank in each of the following
questions.
1. A network using a_________ topology has a central hub to which all other
computers and devices are connected.
2. In a _______ network architecture, each computer on the network has equal
responsibilities and capabilities on the network. Windows refers to this network
architecture as a _______.
3. A ______ is a communications device that directs data to the correct network by
determining the most efficient available route from the sending computer to the
receiving computer.
4. The last segment, or extension, of a domain name (for example, .com or .edu) is
called the ________.
5. ________ occurs when an operating system-level protocol such as TCP/IP
associates itself with a lower-level hardware protocol such as Ethernet.
Answers
1. star
2. peer-to-peer or P2P, workgroup
3. router
4. top-level domain (TLD)
5. binding
Matching Terms
Match the terms with their definitions.
_h_
1. domain name
_f_
2. port number
_a_
3. SMTP
_c_
4. Web page
_e_
5. 802.11
_i_
6. POP
_g_
7. TCP/IP
_j_
_d_
_b_
8. MAC address
9. broadband
10. Ethernet
a. protocol used to send an e-mail message to its
destination
b. hardware protocol that allows nodes to contend for
access to the network
c. a document on the Web identified by a unique URL
d. communications medium that carries more than one
type of transmission
e. group of standards used for wireless LANs
f. number added to IP address to identify specific
program or service
g. protocol suite that is the basis of the Internet; also
used on many LANs
h. text version of one or more IP addresses
i. protocol used to receive e-mail message
j. hardware address unique to each NIC
Short Answer Questions
Write a brief answer to each of the following questions.
1. Briefly explain the differences between the hardware protocols used for LANs:
Ethernet, Token Ring, FDDI, and Wi-Fi.
2. What is the difference between a static IP address and a dynamic IP address?
What role does the DHCP server play?
3. List and describe the four methods used to provide each device (node) or
program on a network with a unique address, so that data packets can be
addressed and delivered to the correct device.
4. What options are available for name resolution on networks running Windows?
What series of steps is used by a Windows XP computer during the name
resolution process?
5. Describe four application protocols supported by the TCP/IP suite of protocols.
Answers
1. Ethernet, which often is used in LANs, is a hardware protocol that allows nodes to
contend for access to the network. If two computers on an Ethernet network attempt
to send data at the same time, a collision occurs and the computers must attempt to
send their messages again. The variations of Ethernet primarily are distinguished
from one another by speed: 10-Mbps Ethernet, 100-Mbps or Fast Ethernet, and
Gigabit and 10-Gigabit Ethernet. Ethernet uses UTP, STP, or coaxial cable. Ethernet
networks can be configured using either a bus or a star topology with a hub.
Token ring is an older LAN technology, which controls access to the network
by requiring that devices on the network pass a special signal, called a token. Each
device on the network connects to a type of hub called a controlled-access unit
(CAU), a multistation access unit (MSAU or MAU), or a smart multistation access unit
(SMAU). Fiber Distributed Data Interface (FDDI) uses a token with a dual-ring
approach, in which two rings connect all of the nodes on the network and each ring
transmits data in a direction opposite to the other one. Physically, the nodes on a
FDDI network can be connected using a ring topology, although most FDDI networks
are set up using a physical star topology with a hub as the central device. FDDI
provides transfer of digital data over fiber optic cable at 100 Mbps, which is much
faster than token ring or regular Ethernet. FDDI often is used as the network
technology for a large LAN in a large company. It also is used as a backbone network to
connect several LANs in a large building.
Wireless LAN (WLAN) technology, as the name implies, uses radio waves or
infrared light instead of cables or wires to connect computers or other devices. A
computer connects to a wireless LAN using a wireless NIC, which includes an
antenna to send and receive signals. A device can communicate directly with another
device, or it can connect to a LAN by way of a wireless access point (AP). Most
wireless LANs use 802.11 standards (Wi-Fi), which can transmit data at speeds up to
20 Mbps using the 802.11g protocol. Wireless LANs are popular in places where
networking cables are difficult to install, such as outdoors or in a historic building
with wiring restrictions, or where there are many mobile users, such as on a college
campus.
2. If a computer such as a Web server is always connected to a network or the
Internet, r, an administrator often will assign a static IP address, which is a
permanent address that represents that machine on a network. If a computer is not
always connected to the network (or if a network administrator does not want to
manually assign a unique IP address to each computer on a network), the solution is
to have a server automatically assign an IP address to a workstation each time it
comes onto the network. Instead of permanently assigning a static IP address to a
workstation, the server assigns a temporary IP address, called a dynamic IP address,
while the computer is connected to the network. When the session terminates, the IP
address is returned to the list of available addresses. When a workstation has a
dynamic IP address assigned to it, it is said that the workstation is said to be leasing
the IP address. The server that manages these dynamically assigned IP addresses is
called a DHCP (Dynamic Host Configuration Protocol) server. When a PC first
connects to the network, it attempts to lease an address from the DHCP server. If
the attempt fails, it uses a process called IP autoconfiguration and assigns itself an
Automatic Private IP Address (APIPA) in the address range 169.254.x.x.
3. Every node on a network has a unique address, so that data packets can be addressed
and delivered to the correct device. On a network, four methods are used to identify
devices and programs:
 Using a MAC address. Different networks have different ways of identifying
network devices, based on the network interface card. Ethernet, wireless, and
token ring cards have MAC addresses permanently embedded on the card by
their manufacturers. A MAC address is unique to each NIC, so that no two

NICs have the same MAC address. The MAC address is used only by devices
inside the local network, and is not used outside the LAN.
Using an IP address. An IP address is a 32-bit address consisting of
a series of four 8-bit numbers separated by periods. An IP
address, such as 109.168.0.104, identifies a computer, printer, or
other device on a TCP/IP network such as the Internet or an
intranet.


Using a port number. A port number is a number that identifies a program or
service running on a computer to communicate over the network. When a
computer is configured for network or Internet communication, it opens a
series of port numbers to send and receive messages (often based on the
application).
Using character-based names. Character-based names include domain
names, host names, and NetBIOS (Network Basic Input/Output System)
names used to identify a PC on a network with easy-to-remember letters
rather than numbers.
4. Networks using Windows have four options available for name resolution: DNS,
WINS, broadcast name resolution, and the Hosts and Lmhosts files. For a computer
running Windows XP, the steps to resolve names are as follows:
1. The computer assumes that the network is using DNS instead of WINS, so it
checks the file named Hosts stored on the local computer. The Hosts file
contains host names and associated IP addresses, and is similar to the
information kept by DNS servers.
2. If the computer has the IP address of a DNS server, it queries the DNS
server.
If those options do not work, the computer tries NetBEUI to resolve the name.
3. The computer checks the NetBIOS name cache. This name cache contains
information retained in memory from name resolutions made since the last
reboot.
4. If the computer knows the IP address of a WINS server, it queries the server.
A WINS server is a Windows NT or Windows 2000 server on the network that
maintains a database of NetBIOS names and IP addresses.
5. The computer sends a broadcast message to all computers on the LAN asking
for the IP address of the computer with the broadcasted NetBIOS name.
6. The computer checks a file named LMHosts, which is stored on the local
computer. The LMHosts file contains the NetBIOS names and associated IP
addresses of computers on the LAN, if someone has taken the time to make
the entries in the file manually.
5. TCP/IP supports many application protocols, including the following:
 HTTP (Hypertext Transfer Protocol), the protocol used by Web browsers and
Web servers to communicate over the Internet.
 SMTP (Simple Mail Transfer Protocol), the protocol used to send an e-mail
message to its destination.
 POP or IMAP, two protocols used to receive e-mail messages.
 FTP (File Transfer Protocol), the protocol used to support file transfer via a
TCP/IP network.