Download CCNA4E_CH6_STUDY_GUIDE

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
CCNA EXPLORATION
ACCESSING THE WAN
Study Guide
Chapter 6: Teleworker Services
6.0.1 What is meant by Teleworking?
How is efficient Teleworking made possible?
6.1.1 What are the organizational, social, &
environmental benefits of Teleworking?
6.1.2 What are three remote connection
technologies available to organizations for
supporting teleworker services?
What does the term broadband refer to?
What components are needed for
telecommuting?
What is Quality of Service (QoS)?
6.2.1 What are the main connection methods used
by home and small business users Teleworkers
to connect to an ISP to access the Internet?
6.2.2 Describe accessing the Internet through a cable
network by teleworkers.
What is a drop cable?
What are some of the advanced
telecommunications services offered by Cable
operators?
How do they deploy these services?
What are some of the major components of a
cable system?
What is frequency?
What is wavelength?
What portion of the electromagnetic spectrum
do radio waves, generally called RF, constitute?
Describe frequency scope used by a cable
network.
What is DOCSIS?
How do cable operators employ DOCSIS?
Describe how DOCSIS specifies the OSI Layer 1
and Layer 2 requirements?
What is CDMA?
What is S-CDMA?
Recap the features of DOCSIS.
What are the two types of equipment are
required to send digital modem signals
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
upstream and downstream on a cable system?
What is a CMTS?
What is a CM?
Describe how data is sent over cable.
Discuss access speed on a modern HFC
network.
How do cable operators handle congestion?
6.2.3 What is DSL?
What are the two basic types of DSL
technologies?
Describe how DSL is deployed.
The two key components are the DSL
transceiver and the DSLAM. Describe them.
What is the major advantage DSL has over
cable?
What is the major advantage of ADSL?
How is this deployed?
What are the two ways to separate ADSL from
voice at the customer premises?
Describe a microfilter.
Describe a splitter.
Describe a NID.
What is the advantage(s) of using a microfilter
vs. a splitter?
6.2.4 Describe 802.11 networking standards.
What are the benefits of Wi-Fi?
What is a hotspot?
What are some of the types of Broadband
Wireless Access?
Describe a typical home deployment.
Describe a wireless network uses a mesh
topology.
What is the advantage of mesh vs. single router
deployment?
Describe WiMAX.
What are the two main components if a WiMAX
network?
How does the tower connect to the Internet?
Where are satellite internet services used?
Describe the three ways to connect to the
Internet using satellites.
In two-way connections what is the most
important factor?
Describe IP multicasting technology as used by
two-way satellite Internet
Wireless networking complies with a range of
standards that routers and receivers use to
communicate with each other. What are the
most common standard?
Why are the terms 802.11 and Wi-Fi not really
interchangeable?
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
6.3.1
6.3.2
6.3.3
6.3.4
6.3.5
6.3.6
6.3.7
What is the Wi-Fi Alliance?
Describe the most popular access approaches
to connectivity used by teleworkers.
Describe 802.11n.
Describe 802.16 (or WiMAX).
Describe VPNs.
Describe their basic deployment.
What are some of the benefits of VPNs?
How can they be both virtual & private?
What are the types of VPNs?
Describe site-to-site VPNs.
When are remote access VPNs used?
Describe remote access VPNs.
Remote access VPNs can be terminated at the
central site using the same type of equipment
as site-to-site VPNs with the addition of what
other equipment?
How do VPNs ensure confidentiality and
security?
What are the components required to establish
a VPN?
Describe encapsulating or encrypting the data
within a VPN.
Describe the three characteristics of secure
VPNs.
Describe tunneling.
What are the three classes of protocols that
tunneling uses?
Describe GRE.
Describe encryption.
Describe some of the more common encryption
algorithms and the length of keys used.
Describe Symmetric Encryption.
What is the main disadvantage of symmetric
encryption?
How can you overcome the above
disadvantage?
Describe Asymmetric Encryption.
Describe a hash.
How does a hash work?
What is HMAC?
What are the two parameters of a HMAC?
Describe how a HMAC works.
Describe two common HMAC algorithms.
What are two peer authentication methods
used by VPNs?
Describe IPSec.
Describe the two main IPsec framework
protocols.
What are some of the standard algorithms that
IPSec uses?
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
When configuring IPSec, what are the four IPsec
framework squares that are to be filled?
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009