Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
CCNA EXPLORATION ACCESSING THE WAN Study Guide Chapter 6: Teleworker Services 6.0.1 What is meant by Teleworking? How is efficient Teleworking made possible? 6.1.1 What are the organizational, social, & environmental benefits of Teleworking? 6.1.2 What are three remote connection technologies available to organizations for supporting teleworker services? What does the term broadband refer to? What components are needed for telecommuting? What is Quality of Service (QoS)? 6.2.1 What are the main connection methods used by home and small business users Teleworkers to connect to an ISP to access the Internet? 6.2.2 Describe accessing the Internet through a cable network by teleworkers. What is a drop cable? What are some of the advanced telecommunications services offered by Cable operators? How do they deploy these services? What are some of the major components of a cable system? What is frequency? What is wavelength? What portion of the electromagnetic spectrum do radio waves, generally called RF, constitute? Describe frequency scope used by a cable network. What is DOCSIS? How do cable operators employ DOCSIS? Describe how DOCSIS specifies the OSI Layer 1 and Layer 2 requirements? What is CDMA? What is S-CDMA? Recap the features of DOCSIS. What are the two types of equipment are required to send digital modem signals CCNA EXP 4 CH.6 Teleworker Services APRIL 2009 upstream and downstream on a cable system? What is a CMTS? What is a CM? Describe how data is sent over cable. Discuss access speed on a modern HFC network. How do cable operators handle congestion? 6.2.3 What is DSL? What are the two basic types of DSL technologies? Describe how DSL is deployed. The two key components are the DSL transceiver and the DSLAM. Describe them. What is the major advantage DSL has over cable? What is the major advantage of ADSL? How is this deployed? What are the two ways to separate ADSL from voice at the customer premises? Describe a microfilter. Describe a splitter. Describe a NID. What is the advantage(s) of using a microfilter vs. a splitter? 6.2.4 Describe 802.11 networking standards. What are the benefits of Wi-Fi? What is a hotspot? What are some of the types of Broadband Wireless Access? Describe a typical home deployment. Describe a wireless network uses a mesh topology. What is the advantage of mesh vs. single router deployment? Describe WiMAX. What are the two main components if a WiMAX network? How does the tower connect to the Internet? Where are satellite internet services used? Describe the three ways to connect to the Internet using satellites. In two-way connections what is the most important factor? Describe IP multicasting technology as used by two-way satellite Internet Wireless networking complies with a range of standards that routers and receivers use to communicate with each other. What are the most common standard? Why are the terms 802.11 and Wi-Fi not really interchangeable? CCNA EXP 4 CH.6 Teleworker Services APRIL 2009 6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.3.6 6.3.7 What is the Wi-Fi Alliance? Describe the most popular access approaches to connectivity used by teleworkers. Describe 802.11n. Describe 802.16 (or WiMAX). Describe VPNs. Describe their basic deployment. What are some of the benefits of VPNs? How can they be both virtual & private? What are the types of VPNs? Describe site-to-site VPNs. When are remote access VPNs used? Describe remote access VPNs. Remote access VPNs can be terminated at the central site using the same type of equipment as site-to-site VPNs with the addition of what other equipment? How do VPNs ensure confidentiality and security? What are the components required to establish a VPN? Describe encapsulating or encrypting the data within a VPN. Describe the three characteristics of secure VPNs. Describe tunneling. What are the three classes of protocols that tunneling uses? Describe GRE. Describe encryption. Describe some of the more common encryption algorithms and the length of keys used. Describe Symmetric Encryption. What is the main disadvantage of symmetric encryption? How can you overcome the above disadvantage? Describe Asymmetric Encryption. Describe a hash. How does a hash work? What is HMAC? What are the two parameters of a HMAC? Describe how a HMAC works. Describe two common HMAC algorithms. What are two peer authentication methods used by VPNs? Describe IPSec. Describe the two main IPsec framework protocols. What are some of the standard algorithms that IPSec uses? CCNA EXP 4 CH.6 Teleworker Services APRIL 2009 When configuring IPSec, what are the four IPsec framework squares that are to be filled? CCNA EXP 4 CH.6 Teleworker Services APRIL 2009