Christian Daniel M. Mangio WD-301 1. How has the internet changed the way we work and play? Internet has completely changed the way companies collaborate. Internet has helped us connect with people anywhere and at any time. This increased collaboration has brought a high level of flexibility in communication that allows employees, co-workers, and managers to connect with each other easily 2. What is an end device? Give 3 examples. An end device forms the interface between users and the underlying communication network. Examples: (1) Computers (2) Security cameras (3) Mobile phones 3. What is an intermediary network device? List some examples of the types of intermediary devices you must pass through to access the internet. These devices provide connectivity and work behind the scenes to ensure that data flows across the network. Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Examples: switches and wireless access points (network access) routers (internetworking) firewalls (security) 4. What is a server? Explain the Client – Server relationship. A server is a computer equipped with specific programs and/or hardware that enables it to offer services to other computers (clients) on its network. There are different types and capabilities of servers. The client-server model describes how a server provides resources and services to one or more clients. 5. What are the criteria for choosing network media? the distance the media can successfully carry a signal the environment in which the media is to be installed the amount of data and the speed at which it must be transmitted the cost of the media and installation. 6. Compare and Contrast between Physical and Logical Topologies. A physical topology describes how network devices are physically connected - in other words, how devices are actually plugged into each other. We're talking about cables, wireless connectivity, and more. While a logical topology describes how network devices appear to be connected to each other. They both describe devices connectivity in each other but in a different way. 7. Define the following Network Infrastructures: o Local Area Network (LAN) – a network infrastructure that provides access to users and end devices in a limited area o Wide Area Network (WAN) – a network infrastructure that interconnects LANs over wide geographical areas o Metropolitan Area Network (MAN) – a network infrastructure that interconnects users with computer resources in a geographic region of the size of a metropolitan area o Wireless LAN (WLAN) – is a wireless network infrastructure that links two or more devices using wireless communication to form a local area network (LAN) within a limited area o Storage Area Network (SAN) – is a specialized, high-speed network that provides block-level network access to storage 8. Explain the difference between and Intranet, Extranet and Internet: Intranet is shared content accessed by members within a single organization. Extranet is shared content accessed by groups through cross-enterprise boundaries. Internet is global communication accessed through the Web. 9. Explain the difference between a traditional dedicated network and a converged network. Early data networks were limited to exchanging character-based information between connected computer systems. Traditional telephone, radio, and television networks were maintained separately from data networks. While converged data networks carry multiple services on one network. 10. Give some key characteristics of each type of Internet connection: o Cable – attenuation and bandwitdh o DSL – digital signal that travels on the same telephone lines o Cellular – ability to re-use frequencies to increase both coverage and capacity Satellite – Provides connections between the Earth-based base station and the satellites o Dial-up Telephone – uses the facilities of the public switched telephone network to establish a connection to an Internet service provider by dialing a telephone number o Dedicated Leased Line – each side of the line is permanently connected, always active and dedicated to the other o Metro Ethernet – scalable bandwidth that begins from 3 megabits per second and goes up to 1 gigabit per second 11. What is a Fault Tolerant Network? o A network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure 12. Compare and Contrast: Circuit Switched Networks and Packet Switched Networks Packet-switched networks move data in separate, small blocks -- packets -based on the destination address in each packet. When received, packets are reassembled in the proper sequence to make up the message. Circuitswitched networks require dedicated point-to-point connections during calls. Circuit-switched networks and packet-switched networks have traditionally occupied different spaces within corporations. Circuit-switched networks were used for phone calls and packet-switched networks handled data. But because of the reach of phone lines and the efficiency and low cost of data networks, the two technologies have shared chores for years. 13. How can you make a network scalable? a scalable network is a network that can cope with the existing demands placed upon it but also one that be expanded to meet future demands in a planned, graceful way. When you scale a network, you design for the current needs but you also design with future needs in mind. 14. How is QoS used to make congested networks more efficient? Quality of Service (QoS) is a feature of routers and switches which prioritizes traffic so that more important traffic can pass first. The result is a performance improvement for critical network traffic. 15. What are some consequences of having a network that is not secure? Computer viruses, Software Vulnerabilities Pose Network Security Risks, Hackers and others. 16. Explain the three goals of network security: o Ensuring Confidentiality – the function of confidentiality is to protect precious business data from unauthorized persons o Maintaining Communication Integrity –the function of integrity is to make sure that the data is reliable and is not changed by unauthorized persons o Ensuring Availability – the function of availability in Network Security is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require it 17. List some Advantages and Disadvantages of the BYOD trend. Advantages: Cost savings, Morale, Productivity Disadvantages: Security, Exit procedures, Support 18. What are some things that have led to the need for an increase in Video Communication? Video communication boosts productivity, saves time, reduces travel expenses, and overall promotes collaboration. The advantage of video communication is the ability to facilitate all of those benefits without requiring constant travel for face-to-face communication. 19. What are some benefits of Cloud Computing? Reduced IT costs, Scalability, Business continuity, Collaboration efficiency, Flexibility of work practices and Access to automatic updates. 20. What is a data center, and what are some of its common components? A data center's design is based on a network of computing and storage resources that enable the delivery of shared applications and data. The key components of a data center design include routers, switches, firewalls, storage systems, servers, and application-delivery controllers.