Chapter 1 – Exploring the Network Study Guide Tips for success: While answering the questions read Chapter 1, review the summary, and complete the practice Quiz. All answers should be in RED type After completion of this chapter, you should be able to: Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic characteristics of a network that supports communication in a small to medium-sized business. Explain trends in networking that will affect the use of networks in small to medium-sized businesses. 1. What communication forms on the Internet do you use on a daily basis? Texting, Social Media 2. How has the internet changed the way we work and play? Made it easier than ever to connect with others and to find the information we need. 3. Why is the Internet considered a “network of networks”? It connects networks from around the world so all can be able to access the internet itself. 4. What is an end device? Give examples and their function. The source or destination of a message transmitted over the network. PC, Server, Phone, Laptop 5. What is an intermediary network device? Give examples and their function. Connect the individual end devices to the network and can connect multiple individual networks to form an internetwork. Wireless Router, LAN Switch, Router, Firewall Appliance 6. List some examples of the types of intermediary devices you must pass through to access the internet. Firewall Appliance, Switch 7. What is a server? Explain the Client – Server relationship. Computers with software that enable them to provide information to other devices on the network. Partitions tasks between the provider, servers, and service requesters, clients. 8. What are the characteristics of a peer-to-peer network? Many computers function as the servers and clients on the same network. 9. 4What are the criteria for choosing network media? Whether you want it in metallic wires, fiber optic cables, or wireless. IST 166 – Introduction to Networks Page 1 Luse – Spring 2018 10. Compare and Contrast: Physical Topology Shows the layout of an area with all the wires and devices running. Logical Topology Shows how the network is setup as if every device is connected to a common device that runs between them. 11. Define the following Network Infrastructures: a. Local Area Network (LAN) –A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department. b. Wide Area Network (WAN) –A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider. c. Metropolitan Area Network (MAN) –A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization. d. Wireless LAN (WLAN) – Similar to a LAN but wirelessly interconnects users and end points in a small geographical area. e. Storage Area Network (SAN) –A network infrastructure designed to support file servers and provide data storage, retrieval, and replication. 12. Explain the difference between an Intranet, Extranet and Internet: Intranet – shared content accessed by members within a single organization. Extranet – shared content accessed by groups through cross-enterprise boundaries. Internet – global communication accessed through the Web. 13. Explain the difference between a traditional dedicated network and a converged network. Dedicated networks for voice, video and computer data communications require a different type of device in order to access the network while converged networks are capable of all of that over the same communication channel or network structure. 14. Give some key characteristics of each type of Internet connection: a. Cable –Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet. b. DSL –Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed. c. Cellular –Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected. d. Satellite –The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite. IST 166 – Introduction to Networks Page 2 Luse – Spring 2018 e. Dial-up Telephone –An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling. f. Dedicated Leased Line –Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive. g. Metro Ethernet –Metro Ethernet is used for connectivity to the public Internet, and is also used for connectivity between corporate sites that are separated geographically. 15. Explain the following: a. Fault Tolerant Network One that limits the impact of failure, so that the fewest number of devices are affected. b. Converged Network Network convergence is the efficient coexistence of telephone, video and data communication within a single network. The use of multiple communication modes on a single network offers convenience and flexibility that are not possible with separate infrastructures. c. Scalable Network A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. 16. Compare and Contrast: Circuit Switched Networks Circuit switching is a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet Switched Networks Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. 17. How can you make a network scalable? Being able to keep up with the traffic you have now and then allowing room to expand for larger traffic later on. 18. How is QoS used to make congested networks more efficient? Ensures that priorities are matched with the type of communication and its importance to the organization. 19. What are some consequences of having a network that is not secure? IST 166 – Introduction to Networks Page 3 Luse – Spring 2018 Protects network from unauthorized access and threats to the network such as viruses, and malware. 20. Explain the three goals of network security: a. Ensuring Confidentiality –Data confidentiality means that only the intended and authorized recipients can access and read data. b. Maintaining Communication Integrity –Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. c. Ensuring Availability –Data availability means having the assurance of timely and reliable access to data services for authorized users. 21. Explain Quality of Service (QoS). QoS allows the network to not get backed up and congested. 22. List some Advantages and Disadvantages of the BYOD trend: Advantages – Use your own device, comfortable with your own device. Disadvantages – Some may not have as good of a device as others. 23. What are some things that have led to the need for an increase in Video Communication? Organizations need it to collab with others who may work at different offices. Students need it to assist each other to help each other learn and to build team skills. 24. What is Cloud Computing? Cloud computing allows us to store personal files, even backup our entire hard disk drive on servers over the Internet. 25. What are some benefits of Cloud Computing? For businesses, Cloud computing extends IT's capabilities without requiring investment in new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered economically to any device anywhere in the world without compromising security or function. 26. What is a data center, and what are some of its common components? a large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data. Computers and servers 27. Explain Powerline Networking: Powerline networking is an emerging trend for home networking that uses existing electrical wiring to connect devices 28. Explain the following Wireless Technologies: a. WISP –Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). IST 166 – Introduction to Networks Page 4 Luse – Spring 2018 b. Wireless Broadband –This uses the same cellular technology used to access the Internet with a smart phone or tablet. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home. 29. What does network security mean to a company? (Explain comprehensively ) Allows the company to stay safe from malicious attacks and keep them up and running. Allows them to not have unauthorized users entering into the system. If there were attacks and they had no security that means money would be lost from down time. 30. What are the requirements to achieve the goal of network security? To address both external and internal security threats. 31. Give examples of security solutions in a home or small office network: Antivirus and antispyware, firewall filtering 32. Give examples of security solutions in a large corporate network: Dedicated firewall systems, access control lists, intrusion prevention systems, and virtual private networks 33. What is the CCNA certification and what are some benefits of obtaining the CCNA? The Cisco Certified Network Associate (CCNA) Routing and Switching certification demonstrates you have a knowledge of foundational technologies and ensures you stay relevant with skill sets needed for the adoption of next generation technologies. IST 166 – Introduction to Networks Page 5 Luse – Spring 2018