* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 10 Exercises
Survey
Document related concepts
Dynamic Host Configuration Protocol wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Internet protocol suite wikipedia , lookup
Wireless security wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Transcript
Chapter 10 Exercises Multiple Choice Select the best answer. 1. When selecting a network card, you should consider all of the following except: a. the speed and type of network to which you are attaching b. the MAC address of the card c. the type of cable or wireless connection used d. the type of expansion slot in which to install the card 2. Which of the following is not a type of cable used for 10-Mbps Ethernet? a. STP b. UTP c. coaxial d. fiber-optic 3. Which of these items is not included in a URL (Uniform Resource Locator)? a. application protocol b. domain name c. NetBIOS name d. host name 4. When troubleshooting an Internet or LAN connection, entering the commands _________ and _________ will lease a new IP address. a. getmac, ping /lease b. nslookup, ipconfig /lease c. ping /all, ipconfig /all d. ipconfig /release, ipconfig /renew 5. Which of the following is not an OS protocol supported by Windows? a. FDDI b. NetBEUI c. IPX/SPX d. TCP/IP Answers 1. b 2. d 3. c 4. d 5. a Fill in the Blank Write the word or phrase to fill in the blank in each of the following questions. 1. A network using a_________ topology has a central hub to which all other computers and devices are connected. 2. In a _______ network architecture, each computer on the network has equal responsibilities and capabilities on the network. Windows refers to this network architecture as a _______. 3. A ______ is a communications device that directs data to the correct network by determining the most efficient available route from the sending computer to the receiving computer. 4. The last segment, or extension, of a domain name (for example, .com or .edu) is called the ________. 5. ________ occurs when an operating system-level protocol such as TCP/IP associates itself with a lower-level hardware protocol such as Ethernet. Answers 1. star 2. peer-to-peer or P2P, workgroup 3. router 4. top-level domain (TLD) 5. binding Matching Terms Match the terms with their definitions. _h_ 1. domain name _f_ 2. port number _a_ 3. SMTP _c_ 4. Web page _e_ 5. 802.11 _i_ 6. POP _g_ 7. TCP/IP _j_ _d_ _b_ 8. MAC address 9. broadband 10. Ethernet a. protocol used to send an e-mail message to its destination b. hardware protocol that allows nodes to contend for access to the network c. a document on the Web identified by a unique URL d. communications medium that carries more than one type of transmission e. group of standards used for wireless LANs f. number added to IP address to identify specific program or service g. protocol suite that is the basis of the Internet; also used on many LANs h. text version of one or more IP addresses i. protocol used to receive e-mail message j. hardware address unique to each NIC Short Answer Questions Write a brief answer to each of the following questions. 1. Briefly explain the differences between the hardware protocols used for LANs: Ethernet, Token Ring, FDDI, and Wi-Fi. 2. What is the difference between a static IP address and a dynamic IP address? What role does the DHCP server play? 3. List and describe the four methods used to provide each device (node) or program on a network with a unique address, so that data packets can be addressed and delivered to the correct device. 4. What options are available for name resolution on networks running Windows? What series of steps is used by a Windows XP computer during the name resolution process? 5. Describe four application protocols supported by the TCP/IP suite of protocols. Answers 1. Ethernet, which often is used in LANs, is a hardware protocol that allows nodes to contend for access to the network. If two computers on an Ethernet network attempt to send data at the same time, a collision occurs and the computers must attempt to send their messages again. The variations of Ethernet primarily are distinguished from one another by speed: 10-Mbps Ethernet, 100-Mbps or Fast Ethernet, and Gigabit and 10-Gigabit Ethernet. Ethernet uses UTP, STP, or coaxial cable. Ethernet networks can be configured using either a bus or a star topology with a hub. Token ring is an older LAN technology, which controls access to the network by requiring that devices on the network pass a special signal, called a token. Each device on the network connects to a type of hub called a controlled-access unit (CAU), a multistation access unit (MSAU or MAU), or a smart multistation access unit (SMAU). Fiber Distributed Data Interface (FDDI) uses a token with a dual-ring approach, in which two rings connect all of the nodes on the network and each ring transmits data in a direction opposite to the other one. Physically, the nodes on a FDDI network can be connected using a ring topology, although most FDDI networks are set up using a physical star topology with a hub as the central device. FDDI provides transfer of digital data over fiber optic cable at 100 Mbps, which is much faster than token ring or regular Ethernet. FDDI often is used as the network technology for a large LAN in a large company. It also is used as a backbone network to connect several LANs in a large building. Wireless LAN (WLAN) technology, as the name implies, uses radio waves or infrared light instead of cables or wires to connect computers or other devices. A computer connects to a wireless LAN using a wireless NIC, which includes an antenna to send and receive signals. A device can communicate directly with another device, or it can connect to a LAN by way of a wireless access point (AP). Most wireless LANs use 802.11 standards (Wi-Fi), which can transmit data at speeds up to 20 Mbps using the 802.11g protocol. Wireless LANs are popular in places where networking cables are difficult to install, such as outdoors or in a historic building with wiring restrictions, or where there are many mobile users, such as on a college campus. 2. If a computer such as a Web server is always connected to a network or the Internet, r, an administrator often will assign a static IP address, which is a permanent address that represents that machine on a network. If a computer is not always connected to the network (or if a network administrator does not want to manually assign a unique IP address to each computer on a network), the solution is to have a server automatically assign an IP address to a workstation each time it comes onto the network. Instead of permanently assigning a static IP address to a workstation, the server assigns a temporary IP address, called a dynamic IP address, while the computer is connected to the network. When the session terminates, the IP address is returned to the list of available addresses. When a workstation has a dynamic IP address assigned to it, it is said that the workstation is said to be leasing the IP address. The server that manages these dynamically assigned IP addresses is called a DHCP (Dynamic Host Configuration Protocol) server. When a PC first connects to the network, it attempts to lease an address from the DHCP server. If the attempt fails, it uses a process called IP autoconfiguration and assigns itself an Automatic Private IP Address (APIPA) in the address range 169.254.x.x. 3. Every node on a network has a unique address, so that data packets can be addressed and delivered to the correct device. On a network, four methods are used to identify devices and programs: Using a MAC address. Different networks have different ways of identifying network devices, based on the network interface card. Ethernet, wireless, and token ring cards have MAC addresses permanently embedded on the card by their manufacturers. A MAC address is unique to each NIC, so that no two NICs have the same MAC address. The MAC address is used only by devices inside the local network, and is not used outside the LAN. Using an IP address. An IP address is a 32-bit address consisting of a series of four 8-bit numbers separated by periods. An IP address, such as 109.168.0.104, identifies a computer, printer, or other device on a TCP/IP network such as the Internet or an intranet. Using a port number. A port number is a number that identifies a program or service running on a computer to communicate over the network. When a computer is configured for network or Internet communication, it opens a series of port numbers to send and receive messages (often based on the application). Using character-based names. Character-based names include domain names, host names, and NetBIOS (Network Basic Input/Output System) names used to identify a PC on a network with easy-to-remember letters rather than numbers. 4. Networks using Windows have four options available for name resolution: DNS, WINS, broadcast name resolution, and the Hosts and Lmhosts files. For a computer running Windows XP, the steps to resolve names are as follows: 1. The computer assumes that the network is using DNS instead of WINS, so it checks the file named Hosts stored on the local computer. The Hosts file contains host names and associated IP addresses, and is similar to the information kept by DNS servers. 2. If the computer has the IP address of a DNS server, it queries the DNS server. If those options do not work, the computer tries NetBEUI to resolve the name. 3. The computer checks the NetBIOS name cache. This name cache contains information retained in memory from name resolutions made since the last reboot. 4. If the computer knows the IP address of a WINS server, it queries the server. A WINS server is a Windows NT or Windows 2000 server on the network that maintains a database of NetBIOS names and IP addresses. 5. The computer sends a broadcast message to all computers on the LAN asking for the IP address of the computer with the broadcasted NetBIOS name. 6. The computer checks a file named LMHosts, which is stored on the local computer. The LMHosts file contains the NetBIOS names and associated IP addresses of computers on the LAN, if someone has taken the time to make the entries in the file manually. 5. TCP/IP supports many application protocols, including the following: HTTP (Hypertext Transfer Protocol), the protocol used by Web browsers and Web servers to communicate over the Internet. SMTP (Simple Mail Transfer Protocol), the protocol used to send an e-mail message to its destination. POP or IMAP, two protocols used to receive e-mail messages. FTP (File Transfer Protocol), the protocol used to support file transfer via a TCP/IP network.